NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Mallon, Melissa, Ed. – Public Services Quarterly, 2012
In their Top Trends of 2012, the Association of College and Research Libraries (ACRL) named data curation as one of the issues to watch in academic libraries in the near future (ACRL, 2012, p. 312). Data curation can be summarized as "the active and ongoing management of data through its life cycle of interest and usefulness to scholarship,…
Descriptors: Academic Libraries, Research Libraries, Library Services, Librarians
Balas, Janet L. – Computers in Libraries, 1999
Describes several online resources devoted to the issue of information access by the disabled; librarians serving disabled users and seeking to employ adaptive technology will find a great deal of information on these sites. (AEF)
Descriptors: Access to Information, Assistive Devices (for Disabled), Disabilities, Information Sources
Peer reviewed Peer reviewed
Leach, Ronald G.; Tribble, Judith E. – Journal of Academic Librarianship, 1993
Examines commercial electronic document delivery services that are available to academic libraries. Highlights include collection development issues; criteria for selection and evaluation; remote access systems, including CARL UnCover 2, Faxon Finder and Faxon Xpress, ContentsFirst and ArticleFirst, and CitaDel; and on-site access systems,…
Descriptors: Academic Libraries, Evaluation Criteria, Higher Education, Library Automation
Peer reviewed Peer reviewed
Kilpatrick, Thomas L., Ed. – Library Software Review, 1998
Provides annotations of 29 journal articles and six book reviews on a variety of topics related to technology in libraries, including collection development, computer-assisted instruction, databases, distance education, ergonomics, hardware, information technology, interlibrary loan and document supply, Internet, online catalogs, preservation,…
Descriptors: Annotated Bibliographies, Book Reviews, Computer Assisted Instruction, Computer Security