NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Adkins, Meredith C.; Lucas, Kathleen C. – Electronic Library, 1986
This checklist provides guidance on how to measure adequacy of control and security of computer systems, identifies areas of risk, raises management and user awareness of their stewardship responsibilities, and reviews issues relative to system documentation, maintenance, integrity, and reliability. (MBR)
Descriptors: Check Lists, Computer Software, Cost Effectiveness, Integrity
Peer reviewed Peer reviewed
Davis, R. H.; And Others – Online Review, 1982
A simulation model is developed to reflect characteristics of a typical information retrieval system on three specific microcomputer configurations using Cromemco System 3, Apple II, and Telima 1000. Systems are compared in terms of installation costs, think time, multiprogramming level, response time, and main storage utilization. Three…
Descriptors: Comparative Analysis, Cost Effectiveness, Feasibility Studies, Information Retrieval
Peer reviewed Peer reviewed
Van Houweling, Douglas E. – Library Hi Tech, 1987
Summarizes the historical trend of distributing computer power within universities, and describes a model for an information technology environment for higher education. Based on a broad distribution of information and computing power, this model allows users to share information using micro- and minicomputers. (CLB)
Descriptors: Access to Information, Cost Effectiveness, Decentralization, Higher Education