NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
Rubin, Michael Rogers – Library Hi Tech, 1987
Describes the development and current uses of computerized databases of information about individuals by the government and private agencies, especially credit bureaus, and discusses three major categories of abusive information practices that threaten personal privacy: information collection, information dissemination, and information management…
Descriptors: Civil Liberties, Computer Networks, Confidential Records, Credit (Finance)
Peer reviewed Peer reviewed
Rubin, Michael Rogers – Library Hi Tech, 1988
The second of three articles on abusive data collection and usage practices and their effect on personal privacy, discusses the evolution of data protection laws worldwide, and compares the scope, major provisions, and enforcement components of the laws. A chronology of key events in the regulation of computer databanks in included. (1 reference)…
Descriptors: Data Collection, Databases, Foreign Countries, Global Approach
Peer reviewed Peer reviewed
Harrison, Nancy; Murphy, Brower – Library Hi Tech, 1987
BiblioFile Intelligent Catalog is a CD-ROM-based public access catalog system which incorporates graphics and sound to provide a multisensory interface and artificial intelligence techniques to increase search precision. The system can be updated frequently and inexpensively by linking hard disk drives to CD-ROM optical drives. (MES)
Descriptors: Artificial Intelligence, Library Automation, Man Machine Systems, Online Catalogs
Peer reviewed Peer reviewed
Bills, Linda G.; Helgerson, Linda W. – Library Hi Tech, 1988
Reports information gathered from eight vendors on the preparation of bibliographic data for CD-ROM public access catalogs: (1) sources of bibliographic records; (2) duplicate record handling; (3) holdings and location information; (4) maintaining the database; (5) authority control; (7) record corrections; (7) extraction of subsets; (8)…
Descriptors: Bibliographic Databases, Bibliographic Records, Comparative Analysis, Database Design
Peer reviewed Peer reviewed
Fore, Julie A. – Library Hi Tech, 1997
Introduces concepts of server security and includes articles and sidebars of firsthand accounts of consequences of not devoting enough time to security measures. Outlines the following factors to consider when evaluating a server's risk potential: confidentiality/reproducibility of the data; complexity of the system; backup system and hardware…
Descriptors: Computer Networks, Computer Security, Computer System Design, Data
Peer reviewed Peer reviewed
Shekhel, Alex; Freeman, Eva – Library Hi Tech, 1987
Discusses the advantages of parallel processor computers in terms of expandibility, cost, performance and reliability, and suggests that such computers be used in library automation systems as a cost effective approach to planning for the growth of information services and computer applications. (CLB)
Descriptors: Computers, Cost Effectiveness, Data Processing, Information Services
Peer reviewed Peer reviewed
Epler, Doris M.; Cassel, Richard E. – Library Hi Tech, 1987
Describes ACCESS PENNSYLVANIA, a statewide program structured around school libraries which has two objectives: (1) production of a union catalog to facilitate resource identification and retrieval, and (2) development of automated support capabilities within the libraries served by the project. The CD-ROM microcomputer technology used, Le Pac, is…
Descriptors: Elementary Secondary Education, Library Automation, Library Cooperation, Online Catalogs