Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Access to Information | 74 |
Computer Networks | 74 |
Databases | 74 |
Higher Education | 32 |
Online Systems | 31 |
Information Networks | 29 |
Information Technology | 17 |
Optical Data Disks | 17 |
Telecommunications | 17 |
Academic Libraries | 16 |
Information Retrieval | 15 |
More ▼ |
Source
Author
Publication Type
Education Level
Higher Education | 1 |
Two Year Colleges | 1 |
Audience
Practitioners | 7 |
Media Staff | 5 |
Administrators | 3 |
Laws, Policies, & Programs
Equal Access | 1 |
Freedom of Information Act | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Le, Meixing – ProQuest LLC, 2013
In this dissertation, we discuss the problem of enabling cooperative query execution in a multi-cloud environment where the data is owned and managed by multiple enterprises. Each enterprise maintains its own relational database using a private cloud. In order to implement desired business services, parties need to share selected portion of their…
Descriptors: Data, Access to Information, Computer Networks, Internet
Foley, Marianne – Journal of Electronic Resources Librarianship, 2012
The absence of a well-defined space for library resources within course-management systems has been well documented in library literature. Academic libraries have sought to remedy this deficiency in numerous ways. This article describes how a "library nugget," or module, was added to the Buffalo State College course-management system,…
Descriptors: Academic Libraries, Management Systems, State Colleges, Library Services
Helsing, Cheryl; And Others – 1989
Computers have changed the way information resources are handled. Large amounts of information are stored in one central place and can be accessed from remote locations. Users have a personal responsibility for the security of the system and the data stored in it. This document outlines the user's responsibilities and provides security and control…
Descriptors: Access to Information, Computer Networks, Confidentiality, Databases
Machovec, George S. – Online Libraries and Microcomputers, 1997
Discusses computer user authentication and authorization issues when libraries need to let valid users access databases and information services without making the process too difficult for either party. Common solutions are explained, including filtering, passwords, and kerberos (cryptographic authentication scheme for secure use over public…
Descriptors: Academic Libraries, Access to Information, Computer Networks, Databases

Weiskel, Timothy C. – Library Hi Tech, 1991
An online system designed to help global environmental research, the electronic research system called Eco-Link draws data from various electronic sources including online catalogs and databases, CD-ROMs, electronic news sources, and electronic data subscription services to produce briefing booklets on environmental issues. It can be accessed by…
Descriptors: Access to Information, Computer Networks, Databases, Environmental Research

Rand, Roberta Y. – Information Technology and Libraries, 1995
Describes a prototype online search system called ASK (Assisted Search for Knowledge) that will provide Internet and dial-up access to an array of databases related to environmental and demographic change. The Global Change Data and Information system that is being organized by federal agencies is described. (Author/LRW)
Descriptors: Access to Information, Computer Networks, Databases, Demography

Bortnick, Jane; And Others – Government Information Quarterly, 1991
This issue includes six articles that discuss access to information provided by computerized databases and communications networks for legislators. Highlights include state legislative systems; information systems in the Senate; online services in the House of Representatives; information technology in the Congressional Research Service; the…
Descriptors: Access to Information, Computer Networks, Databases, Foreign Countries

McClellan, Gregory A.; Garrison, William V. – Library Hi Tech, 1997
Illustrates an approach for providing networked access to licensed databases over the Internet by positioning the library between patron and vendor. Describes how the gateway systems and database connection servers work and discusses how treatment of security has evolved with the introduction of the World Wide Web. Outlines plans to reimplement…
Descriptors: Access to Information, Computer Networks, Computer Security, Databases
Lukanuski, Mary – American Libraries, 1992
Describes the development of the WAIS (Wide Area Information Servers) protocol, a system that allows users access to personal, corporate, and commercial electronic information from one interface. The availability of WAIS on the Internet and the reactions of users are addressed. Several problems are considered, including funding, hardware…
Descriptors: Access to Information, Computer Networks, Computer Software, Databases
Saunders, Laverna M. – Computers in Libraries, 1992
Discussion of the concept of a virtual library focuses on the needs of the user. Topics addressed include searching remote library catalogs and databases; the availability of information through the Internet and other networks; and the expertise needed by library staff to instruct and assist users. (11 references) (LRW)
Descriptors: Access to Information, Computer Networks, Databases, Information Networks

Costello, Diane – Information Technology and Libraries, 1999
Describes CAUL (The Council of Australian University Librarians) which is dedicated to improving access by the staff and students of Australian universities to scholarly information resources. Discusses funding, access to databases, electronic information resources, information infrastructure and network information support, and electronic…
Descriptors: Academic Libraries, Access to Information, Computer Networks, Consortia
Tennant, Roy – 1996
This update to a previous digest briefly describes the Internet computer network, the physical connections and communication protocols that make it possible, and the applications and information resources the network provides. The applications covered include electronic mail and listservs, the world wide web, telnet connections with remote library…
Descriptors: Access to Information, Computer Mediated Communication, Computer Networks, Costs

Sprehe, J. Timothy – Government Information Quarterly, 1992
Discusses the growing trend of federal agencies permitting online public access to their computers. Highlights include examples of public access programs, differences in agencies' stands on dissemination of information, agency computer networks and databases that are the basis for the National Research and Education Network, and security…
Descriptors: Access to Information, Computer Networks, Databases, Federal Government

Love, James P. – Government Publications Review, 1993
Discusses national information policy changes that are hoped to occur in the Clinton administration. Topics addressed include the Reagan/Bush legacy of privatization; public access to electronic databases; citizen involvement through information technologies such as computer networks; pricing for government information products and services;…
Descriptors: Access to Information, Citizen Participation, Computer Networks, Databases
Millea, Megan – 1996
Silverplatter's Electronic Reference Library (ERL) provides wide area network access to its databases using TCP/IP communications and client-server architecture. ERL has two main components: The ERL clients (retrieval interface) and the ERL server (search engines). ERL clients provide patrons with seamless access to multiple databases on multiple…
Descriptors: Access to Information, Computer Mediated Communication, Computer Networks, Computer Software