Descriptor
Information Systems | 5 |
Microcomputers | 5 |
Systems Analysis | 5 |
Library Automation | 3 |
Access to Information | 2 |
Computer Software | 2 |
Confidentiality | 2 |
Decision Making | 2 |
Information Management | 2 |
Local Area Networks | 2 |
Public Agencies | 2 |
More ▼ |
Publication Type
Opinion Papers | 3 |
Guides - General | 2 |
Journal Articles | 2 |
Reference Materials -… | 1 |
Reports - Evaluative | 1 |
Reports - General | 1 |
Reports - Research | 1 |
Education Level
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating

Cheney, Hal – Library Software Review, 1986
Addresses problems encountered by self-taught "talented amateurs" doing microcomputer systems work for libraries: not maintaining design control, not maintaining operational control, attempting to use someone else's database, having variety of diverse systems activity converging on common database, attempting to run whole show, and…
Descriptors: Computer Software, Databases, Information Systems, Library Automation

Burton, Paul – Electronic Library, 1987
Discusses the need for careful systems analysis and design in the implementation of microcomputer based information systems. Checklists of system requirements and a bibliography of relevant journals, printed, and online sources are provided. (CLB)
Descriptors: Evaluation Criteria, Information Centers, Information Services, Information Systems
Helsing, Cheryl; And Others – 1989
This guide introduces information systems security concerns and outlines the issues that must be addressed by all agency managers in meeting their responsibilities to protect information systems within their organizations. It describes the essential components of an effective information resource protection process that applies to an individual…
Descriptors: Access to Information, Computer System Design, Confidentiality, Decision Making
Helsing, Cheryl; And Others – 1989
The purpose of this guide is to help the policy maker address a series of questions regarding the protection and safety of computer systems and data processed within his/her agency. It introduces information systems security concerns, outlines the management issues that must be addressed by agency policies and programs, and describes the essential…
Descriptors: Access to Information, Confidentiality, Decision Making, Information Management
Lazinger, Susan S.; Shoval, Peretz – 1987
This report examines and evaluates the application of prototyping methodology in the design of a microcomputer-based online library catalog. The methodology for carrying out the research involves a five-part examination of the problem on both the theoretical and applied levels, each of which is discussed in a separate section as follows: (1) a…
Descriptors: Academic Libraries, Case Studies, Computer Software, Foreign Countries