Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Access to Information | 10 |
Database Design | 10 |
Information Systems | 10 |
Database Management Systems | 3 |
Information Management | 3 |
Information Retrieval | 3 |
User Needs (Information) | 3 |
Archives | 2 |
Coding | 2 |
Compliance (Legal) | 2 |
Computer System Design | 2 |
More ▼ |
Source
Program: Electronic Library… | 2 |
Data Quality Campaign | 1 |
Information Processing and… | 1 |
Information Research: An… | 1 |
Journal of Information… | 1 |
Library Hi Tech | 1 |
Author
Armstrong, Jane | 1 |
Bergner, Terry | 1 |
Carroll, John M. | 1 |
Chang, Naicheng | 1 |
Chiang, Katherine | 1 |
Everitt, Sian | 1 |
Harej, Viktor | 1 |
Harrison, John G. | 1 |
Mercun, Tanja | 1 |
Murray, Meg Coffin | 1 |
Oddy, Elizabeth Carley | 1 |
More ▼ |
Publication Type
Journal Articles | 6 |
Reports - Descriptive | 6 |
Reports - Evaluative | 3 |
Reports - Research | 2 |
Guides - General | 1 |
Historical Materials | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 2 |
Audience
Policymakers | 2 |
Practitioners | 1 |
Location
California | 1 |
United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Mercun, Tanja; Švab, Katarina; Harej, Viktor; Žumer, Maja – Information Research: An International Electronic Journal, 2013
Introduction: To provide valuable services in the future, libraries will need to create better information systems and set up an infrastructure more in line with the current technologies. The "Functional Requirements for Bibliographic Records" conceptual model provides a basis for this transformation, but there are still a number of…
Descriptors: Information Systems, Library Development, Library Services, Bibliographic Databases
Murray, Meg Coffin – Journal of Information Technology Education, 2010
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…
Descriptors: Information Technology, Database Design, Confidentiality, Compliance (Legal)
Armstrong, Jane; Bergner, Terry; Smith, Nancy – Data Quality Campaign, 2008
States have made dramatic progress in the past few years in implementing longitudinal data systems (LDS) to improve student achievement. These systems collect and house student educational data that make it easy for policymakers and practitioners to access and use it for reporting, policymaking and decision making. So much has happened in states…
Descriptors: Partnerships in Education, Longitudinal Studies, Management Information Systems, Program Implementation

Watters, Carolyn; Shepherd, Michael A. – Information Processing and Management, 1994
Discusses the shift of information access from a data-centered to a user-centered model and describes the Daltext system, a prototype user-centered information system that allows the user to determine how the data will be viewed (i.e., within a datastream model, a set model, a relational model, and/or a hierarchical model). (Contains 30…
Descriptors: Access to Information, Data Processing, Database Design, Information Retrieval

Carroll, John M.; And Others – Library Hi Tech, 1994
Raison d'Etre, a hypermedia design history application, provides access to a database of video clips containing perspectives of design team members during the course of a project. Describes the user needs analysis; methods of collecting information and organizing the database; and the implications for design education, research, and practice. (AEF)
Descriptors: Access to Information, Database Design, Hypermedia, Information Systems
Chang, Naicheng – Program: Electronic Library and Information Systems, 2005
Purpose: To help to clarify the role of XML tools and standards in supporting transition and migration towards a fully XML-based environment for managing access to information. Design/methodology/approach: The Ching Digital Image Library, built on a three-tier architecture, is used as a source of examples to illustrate a number of methods of data…
Descriptors: Electronic Libraries, Visual Aids, Classification, Programming Languages
Chiang, Katherine; And Others – 1991
In 1988 Mann Library at Cornell University proposed to develop a computer system that would support interactive access to significant electronic files in agriculture and the life sciences. This system was titled the Interactive Numeric Files Retrieval System (INFeRS). This report describes how project goals were met and it presents the project's…
Descriptors: Academic Libraries, Access to Information, Agriculture, Computer System Design
Everitt, Sian – Program: Electronic Library and Information Systems, 2005
Purpose: To review a small specialist repository's strategic and opportunistic approach to utilising collaborative regional and national digital initiatives to increase access. The Birmingham Institute of Art and Design (BIAD) Archives activity is evaluated to determine whether a project-based approach recognises and meets the needs of historians,…
Descriptors: Archives, Historians, Access to Information, Library Automation
Oddy, Elizabeth Carley – 1991
This report provides a brief history of the design and development process that the Syracuse University Kellogg Project followed in creating the Kellogg Library and Archive Retrieval System (KLARS), an information storage and retrieval system designed to computerize archival research. This system was developed to preserve, organize, and facilitate…
Descriptors: Access to Information, Adult Education, Archives, Computer System Design
Harrison, John G. – 1988
This report addresses the technical and legal issues attendant to the implementation of a comprehensive student information system in California. It documents the legislative origins of the study and the conditions of state-level information systems within California and other states. It then describes the legal issues arising from the collection,…
Descriptors: Access to Information, Compliance (Legal), Database Design, Database Management Systems