NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 10 results Save | Export
Helsing, Cheryl; And Others – 1989
Computers have changed the way information resources are handled. Large amounts of information are stored in one central place and can be accessed from remote locations. Users have a personal responsibility for the security of the system and the data stored in it. This document outlines the user's responsibilities and provides security and control…
Descriptors: Access to Information, Computer Networks, Confidentiality, Databases
Peer reviewed Peer reviewed
Weiskel, Timothy C. – Library Hi Tech, 1991
An online system designed to help global environmental research, the electronic research system called Eco-Link draws data from various electronic sources including online catalogs and databases, CD-ROMs, electronic news sources, and electronic data subscription services to produce briefing booklets on environmental issues. It can be accessed by…
Descriptors: Access to Information, Computer Networks, Databases, Environmental Research
Peer reviewed Peer reviewed
Lee, Dik L. – Information Processing & Management, 1995
Provides an overview of HYTREM (Hybrid Text-Retrieval Machine), a high-performance, cost-effective text-retrieval machine that handles information in large textual databases. Describes HYTREM's software and hardware design principles and presents an evaluation of system performance in relation to user demand and access versus system capacity. (JMV)
Descriptors: Access to Information, Computer System Design, Cost Effectiveness, Full Text Databases
Helsing, Cheryl; And Others – 1989
This guide introduces information systems security concerns and outlines the issues that must be addressed by all agency managers in meeting their responsibilities to protect information systems within their organizations. It describes the essential components of an effective information resource protection process that applies to an individual…
Descriptors: Access to Information, Computer System Design, Confidentiality, Decision Making
Helsing, Cheryl; And Others – 1989
The purpose of this guide is to help the policy maker address a series of questions regarding the protection and safety of computer systems and data processed within his/her agency. It introduces information systems security concerns, outlines the management issues that must be addressed by agency policies and programs, and describes the essential…
Descriptors: Access to Information, Confidentiality, Decision Making, Information Management
Moline, Judi – Visual Resources, 1991
This report focuses on the user of a prototype hypertext application designed to help coin collectors link ancient coins with relevant numismatic information. It is noted that hypertext systems promote the collection of information that may be multimedia in nature and may be linked so that information can be accessed in a non-linear manner. The…
Descriptors: Access to Information, Computer Software, Computer System Design, Databases
Miami-Dade Community Coll., FL. – 1992
This book contains 37 papers on computer use in higher education originally presented at a May, 1992, conference of college and university computer users. Most of the papers describe programs or systems implemented at particular institutions and cover the following: systems for career planning, automating purchasing and financial commitments,…
Descriptors: Access to Information, Career Information Systems, Computer Networks, Computer Oriented Programs
Online, Inc., Weston, CT. – 1988
Reprints of 18 articles pertaining to library microcomputing appear in this collection, the first of two volumes on this topic in a series of volumes of reprints from "ONLINE" and "DATABASE" magazines. Edited for information professionals who use electronically distributed databases, these articles address such topics as: (1) an integrated library…
Descriptors: Access to Information, Computer Graphics, Computer Software, Information Retrieval
Singleton, Michele; And Others – CAUSE/EFFECT, 1993
To provide better access to information, the University of Arizona information technology center has designed a data warehouse accessible from the desktop computer. A team approach has proved successful in introducing and demonstrating a prototype to the campus community. (Author/MSE)
Descriptors: Access to Information, Case Studies, College Administration, Databases
Rickman, Jon T.; Hubbard, Dean L. – 1992
The Electronic Campus system of Northwest Missouri State University (Maryville) links every office and residence hall room on campus. It also networks these offices and rooms with databases and software applications. The system was developed to provide a low-cost alternative for a public institution where most students could not afford to purchase…
Descriptors: Access to Computers, Access to Information, Case Studies, College Students