Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Access to Information | 8 |
Computer Security | 8 |
Library Services | 8 |
Internet | 5 |
Academic Libraries | 4 |
Users (Information) | 4 |
Computer Software | 3 |
Higher Education | 3 |
Computers | 2 |
Electronic Libraries | 2 |
Information Dissemination | 2 |
More ▼ |
Source
Computers in Libraries | 1 |
D-Lib Magazine | 1 |
Library Software Review | 1 |
OCLC Online Computer Library… | 1 |
Program: Electronic Library… | 1 |
Author
Bacon, Jean | 1 |
Beckett, George | 1 |
Briden, Judi | 1 |
Ely, Donald P. | 1 |
Hayton, Richard | 1 |
Huang, Phil | 1 |
Hudomalj, Emil | 1 |
Jauk, Avgust | 1 |
Moody, Ken | 1 |
Reeb, Brenda | 1 |
Shaw, Beth Hansen | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 6 |
Journal Articles | 4 |
Numerical/Quantitative Data | 2 |
Speeches/Meeting Papers | 2 |
Opinion Papers | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Media Staff | 1 |
Location
Canada | 1 |
France | 1 |
Germany | 1 |
Japan | 1 |
United Kingdom | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Hudomalj, Emil; Jauk, Avgust – Program: Electronic Library and Information Systems, 2006
Purpose: To give an overview of the current state and trends in authentication and authorisation in satisfying academic library users' mobility and instant access to digital information resources, and to propose that libraries strongly support efforts to establish a global authentication and authorisation infrastructure.…
Descriptors: Academic Libraries, Library Services, Access to Information, Computer Security
Huang, Phil – Computers in Libraries, 2007
By providing the public with online computing facilities, librarians make available a world of information resources beyond their traditional print materials. Internet-connected computers in libraries greatly enhance the opportunity for patrons to enjoy the benefits of the digital age. Unfortunately, as hackers become more sophisticated and…
Descriptors: Computers, Computer Software, Internet, Computer Security
Storey, Tom, Ed. – OCLC Online Computer Library Center, Inc., 2007
The practice of using a social network to establish and enhance relationships based on some common ground--shared interests, related skills, or a common geographic location--is as old as human societies, but social networking has flourished due to the ease of connecting on the Web. This OCLC membership report explores this web of social…
Descriptors: Privacy, Foreign Countries, Social Networks, Internet

Beckett, George – Library Software Review, 1994
Describes a new software program called "Everywhere Access" that provides remote access to libraries' networked personal computers and that is suitable for use with the Internet. Highlights include installation; operation; security; standards issues; documentation and technical support; and potential uses and applications. (LRW)
Descriptors: Access to Information, Computer Security, Computer Selection, Computer Software
Bacon, Jean; Hayton, Richard; Moody, Ken – D-Lib Magazine, 1998
Describes a security architecture, Oasis, which runs on a middleware platform extended for asynchronous operation; shows how the interoperation of independently developed services may be supported under the Oasis architecture. Uses the provision of digital academic library services as an example. (Author/AEF)
Descriptors: Academic Libraries, Access to Information, Computer Security, Computer Software Development
Shaw, Beth Hansen – 1999
This document reports results of an online survey that examined practices and procedures in the management of electronic resources in 65 academic library reference departments. Responses are related to: (1) student population; (2) library use by community people; (3) number of public access workstations, workstations with World Wide Web access,…
Descriptors: Academic Libraries, Access to Information, Computer Security, Databases
Ely, Donald P. – 1997
The definition, role, and functions of "library" are changing. The National Library of Education (NLE) is in transition from a traditional library to a virtual library encompassing "one stop [any stop] shopping" through conventional and digital means. To adequately plan for the transition, the customer and potential customers…
Descriptors: Access to Computers, Access to Information, Computer Security, Copyrights
Briden, Judi; Reeb, Brenda; Zhang, Allison – 1997
The Electronic Resources Team at the University of Rochester (New York) River Campus Libraries pursued the concept of one-stop shopping as a component of their new integrated library system Voyager, which debuted in January 1997. Faced with a growing variety of electronic resources with no single guide to their existence and access, the Team dealt…
Descriptors: Academic Libraries, Access to Information, Computer Networks, Computer Security