Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Library Policy | 17 |
Access to Information | 8 |
Policy Formation | 8 |
Internet | 7 |
Users (Information) | 7 |
Library Administration | 6 |
Legal Responsibility | 4 |
Library Personnel | 4 |
Library Planning | 4 |
Privacy | 4 |
Computer Security | 3 |
More ▼ |
Source
Computers in Libraries | 17 |
Author
Balas, Janet L. | 1 |
Banerjee, Kyle | 1 |
Banks, Michael A. | 1 |
Bell, Lori | 1 |
Benson, Allen C. | 1 |
Bernstein, Joan E. | 1 |
Cooper, Eric A. | 1 |
Davis, Dave | 1 |
Feinman, Valerie Jackson | 1 |
Galganski, Carol | 1 |
Guenther, Kim | 1 |
More ▼ |
Publication Type
Journal Articles | 17 |
Reports - Descriptive | 14 |
Guides - Non-Classroom | 3 |
Opinion Papers | 3 |
Reports - Evaluative | 1 |
Education Level
Audience
Location
Illinois | 1 |
New Jersey | 1 |
Laws, Policies, & Programs
First Amendment | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Bernstein, Joan E. – Computers in Libraries, 2007
In this article, the author recounts her experience in 2005 as a library director at the Mount Laurel Library in New Jersey. She thought her people at the library were in fairly good shape in terms of the professional staff's understanding of the confidentiality rules governing their customer information. However, she was wrong. This was driven…
Descriptors: Professional Personnel, Confidentiality, Library Personnel, Library Administration
Sauers, Michael – Computers in Libraries, 2006
In this article, the author describes what components should be included in a comprehensive policy for public wireless usage in a library. He lists four basic steps, which include: (1) Introduce the service; (2) List the technical requirements; (3) Spell out disclaimers on access, assistance, and liability; and (4) Alert users to security concerns.
Descriptors: Policy Formation, Information Technology, Library Automation, Library Policy
Guenther, Kim – Computers in Libraries, 2001
Considers how privacy issues related to online profiling affect library patrons and what librarians should do to protect them. Discusses the need for a privacy policy and provides guidelines from the OECD (Organisation for Economic Cooperation and Development) privacy statement generator that can be adapted for libraries. (LRW)
Descriptors: Electronic Libraries, Guidelines, Internet, Library Policy
Banerjee, Kyle – Computers in Libraries, 2003
Explains how to keep library systems healthy and functioning by taking sensible security measures. Examines why hackers would target library systems and how library systems are compromised. Describes tools that can help, including: firewalls; antivirus software; alarms; network analysis tools; and encryption. Identifies several strategies for…
Descriptors: Computer Networks, Computer Security, Libraries, Library Administration
Balas, Janet L. – Computers in Libraries, 2001
Discusses privacy issues related to electronic libraries. Highlights include finding guidance and information on the Web, including the American Library Association, Center for Democracy and Technology, and the Electronic Privacy Information Center; legal responsibilities in maintaining privacy rights of patrons who access the Internet; and…
Descriptors: Electronic Libraries, Internet, Legal Responsibility, Library Policy
Willems, Harry – Computers in Libraries, 1998
Argues that Internet filters are censorship tools that rob librarians of their materials selection responsibility. Six factors that make filters unacceptable are listed. The discussion covers pornography; filter improvements; proposals and solutions; ALA (American Library Association) Bill of Rights to Electronic Information; and library policy…
Descriptors: Access to Information, Censorship, Computer Software, Decision Making
Feinman, Valerie Jackson – Computers in Libraries, 1999
Discussion of strategic planning in libraries focuses on a five-step process based on academic libraries. Highlights include a situational and environmental analysis; development of organizational direction, including vision, mission, and objectives; formulation of the strategic plan; implementation; and control, feedback, and evaluation. (LRW)
Descriptors: Academic Libraries, Evaluation Methods, Feedback, Higher Education
Banks, Michael A. – Computers in Libraries, 1998
Examines issues and decision-making involved in restricting Internet access in libraries, for the most part favoring filtering devices. Questions to consider when selecting a filtering program are provided. Some of the better filtering programs are described, and Web addresses are included for each. Security risks associated with Java and…
Descriptors: Access to Information, Censorship, Computer Software, Computer Software Evaluation
Cooper, Eric A. – Computers in Libraries, 1997
Presents basic design tenets for electronic library guides and the concerns these guides present for internal policymaking. The goal is to help library staffs produce electronic guides that will be effectively utilized by a variety of patrons without creating an added burden for the library. (Author/LRW)
Descriptors: Audience Awareness, Design Requirements, Electronic Publishing, Library Guides
Benson, Allen C. – Computers in Libraries, 1998
Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…
Descriptors: Access to Information, Computer Security, Computer System Design, Guidelines
Schuyler, Michael – Computers in Libraries, 1999
Suggests that a definitive court ruling is needed to better define rights and responsibilities related to the First Amendment and libraries' Internet use policies so that libraries can provide a comfortable environment for users while maintaining the law. Discusses filters; court cases; claims of the anti-porn cult; research studies on how much of…
Descriptors: Access to Information, Court Litigation, Information Policy, Internet
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources
Galganski, Carol; Peters, Tom; Bell, Lori – Computers in Libraries, 2002
Describes the integration of personal digital assistants into a medical center library's services in Illinois. Discusses training for users; hardware selection; software selection and content; technical support; the role of libraries, including the creation of policies and procedures; and future challenges. (LRW)
Descriptors: Computer Selection, Computer Software Selection, Futures (of Society), Information Technology
Lord, Jonathan; Ragon, Bart – Computers in Libraries, 2001
Describes the experiences of two health sciences libraries, at East Carolina University and at the University of Virginia, in developing electronic collections. Highlights include full-text, Web-based resources; licensing issues; joint access to electronic resources through consortia; collection development policies; and an electronic resource…
Descriptors: Academic Libraries, Access to Information, Check Lists, Consortia
Harris, Lesley Ellen – Computers in Libraries, 1998
Presents steps for creating copyright policies: appoint an officer; arrange access to a lawyer; understand copyright principles; know how copyright applies to Internet and CD-ROMs; understand permissions procedures; collect reference materials; use Internet information; understand international law; stay updated; attend seminars; educate others;…
Descriptors: Access to Information, Compliance (Legal), Copyrights, Electronic Mail
Previous Page | Next Page ยป
Pages: 1 | 2