NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Peer reviewed Peer reviewed
Moulton, Lynda W. – Special Libraries, 1987
Outlines the process involved in selecting or developing software for building a machine-readable database and the special librarian's role in that process. The following steps are identified: (1) needs assessment; (2) project cost and justification; (3) software selection; (4) implementation; and (5) startup and maintenance. Twelve references are…
Descriptors: Database Management Systems, Library Automation, Needs Assessment, Program Implementation
Kaufman, Roger – Educational Technology, 1986
An algorithm or decision chart is presented which provides basic decision steps to help management decide what data should be collected to derive valid and correct objectives, and to determine what levels of objectives will be selected relative to products, outputs, or outcomes of an organization. (MBR)
Descriptors: Algorithms, Decision Making, Needs Assessment, Organizational Effectiveness
Peer reviewed Peer reviewed
Kington, Robert A. – Library Hi Tech, 1987
Outlines factors used by online vendors to decide whether to bid on RFPs (requests for proposals) for library automation systems, including specifications for software, hardware or performance requirements not met by the vendor; specifications based on competitors' systems; the size and complexity of the request itself; and vendors' time…
Descriptors: Bids, Decision Making, Evaluation Criteria, Library Automation
Peer reviewed Peer reviewed
Adkins, Meredith C.; Lucas, Kathleen C. – Electronic Library, 1986
This checklist provides guidance on how to measure adequacy of control and security of computer systems, identifies areas of risk, raises management and user awareness of their stewardship responsibilities, and reviews issues relative to system documentation, maintenance, integrity, and reliability. (MBR)
Descriptors: Check Lists, Computer Software, Cost Effectiveness, Integrity
Association of Coll. and Research Libraries, Chicago, IL. Education and Behavioral Sciences Section. – 1988
The first of two parts of this document is a basic outline to be used in the preliminary preparation for a library accreditation visit. It is appropriate for use in a range of education/psychology/behavioral sciences libraries in an academic setting, from those of a small college library to those of a departmental library in a university library…
Descriptors: Academic Libraries, Accreditation (Institutions), Annotated Bibliographies, Higher Education
Tucker, Susan – 1986
This digest discusses several aspects of electronic networking, including network functions, implementation, and applications in education. Electronic networking is defined as including the four basic services of electronic mail (E-mail), electronic "bulletin boards," teleconferencing, and online databases, and an overview of these four…
Descriptors: Check Lists, Computer Software, Computer Uses in Education, Databases
Helsing, Cheryl; And Others – 1989
This guide introduces information systems security concerns and outlines the issues that must be addressed by all agency managers in meeting their responsibilities to protect information systems within their organizations. It describes the essential components of an effective information resource protection process that applies to an individual…
Descriptors: Access to Information, Computer System Design, Confidentiality, Decision Making
Cresap, Rosslyn, VA. – 1990
This guide is a product of a study conducted as part of a broader effort by the Department of Education to identify the causes of rising college costs and find and disseminate ways to contain these costs. In institutions of higher education most costs are manageable and can be contained without jeopardizing key services. This can be achieved by…
Descriptors: Budgeting, College Administration, Cost Containment, Cost Effectiveness