NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 9 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Vasileiou, Magdalini; Rowley, Jennifer; Hartley, Richard – British Journal of Educational Technology, 2013
In the very near future, students are likely to expect their universities to provide seamless access to e-books through online library catalogues and virtual learning environments. A paradigm change in terms of the format of books, and especially textbooks, which could have far-reaching impact, is on the horizon. Based on interviews with a number…
Descriptors: Metadata, Access to Information, Electronic Publishing, Electronic Libraries
Peer reviewed Peer reviewed
Fore, Julie A. – Library Hi Tech, 1997
Introduces concepts of server security and includes articles and sidebars of firsthand accounts of consequences of not devoting enough time to security measures. Outlines the following factors to consider when evaluating a server's risk potential: confidentiality/reproducibility of the data; complexity of the system; backup system and hardware…
Descriptors: Computer Networks, Computer Security, Computer System Design, Data
Taylor, Arlene G. – 1999
This book addresses the history, theory, and practices of the organization of recorded information. Chapter 1, "Organization in Human Endeavors," looks at the basic human need to organize and how it is approached in various environments. Chapter 2, "Retrieval Tools," is concerned with the formats and functions of basic…
Descriptors: Classification, Computer System Design, Information Industry, Information Management
Leed, Arthur – 1996
As more government agencies request information and records from colleges and universities, it is important that all institutions establish standard procedures for handling such requests. Administrators should: learn the personality of the particular agency or office making the request; establish a professional, cooperative, non-adversarial…
Descriptors: Agencies, Compliance (Legal), Confidentiality, Disclosure
Hassler, Ardoth A. – CAUSE/EFFECT, 1998
Reports on a options and issues discussion at a December 1997 Orlando (Florida) meeting of CAUSE97 on providing access to campus technology resources. Options discussed included departmentally and/or university-owned modems, third-party provider contracts, and using wireless access. Issues included providing authentication, assuring network…
Descriptors: Access to Information, Communications, Computer Networks, Decision Making
Stover, Mark – 1999
This book explains through descriptive narrative, illustrative examples, and practical suggestions how today's information specialists can navigate in the new "wired" organizations. The emphasis is on practical, useful, relevant advice. The following ten chapters are included: (1) "Communicating Online: The Heart of the Wired Organization"…
Descriptors: Administration, Computer Security, Ethics, Guidelines
Peer reviewed Peer reviewed
PS: Political Science and Politics, 1997
Outlines 10 basic principles for managing intellectual property in a digital environment. Expands upon each principle and provides specific examples of how and where these principles might be applied. Briefly discusses the history of electronic documentation, recent changes, and how these impact on the world of scholarly communication. (MJP)
Descriptors: Access to Information, Computer Software, Computer Uses in Education, Copyrights
Alberta Dept. of Education, Edmonton. – 1999
The information in this document is based on a study that Alberta Education commissioned on establishing technology systems that are responsive to the requirements of Alberta's Freedom of Information and Protection of Privacy Act (FOIPP). This document provides an overview of key issues and suggested strategies in the following areas: (1)…
Descriptors: Access to Information, Computer Security, Computer Uses in Education, Educational Administration
Gillis, R. Peter; Whitemarsh, Judith – 1999
This study provides suggestions and best practices for superintendents, Freedom of Information and Protection of Privacy (FOIPP) coordinators and school information technologists in dealing with the impact of Alberta's FOIPP Act on the application of information technologies within their organizations. The study explores the relationship between…
Descriptors: Access to Information, Check Lists, Computer Security, Computer Uses in Education