NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Burt, David – Public Libraries, 1997
Public libraries implementing public access to the Internet are faced with making new usage policies. This study examined 75 public library Internet access policies and identifies 26 policy elements. Finds consensus in disclaimers for libraries, parental responsibility for children, warnings about potentially offensive material, and loss of…
Descriptors: Access to Information, Children, Information Policy, Information Sources
Peer reviewed Peer reviewed
King, Monica – Public Libraries, 1999
Describes one public library's development of a computer-security plan, along with helpful products used. Discussion includes Internet policy, physical protection of hardware, basic protection of the operating system and software on the network, browser dilemmas and maintenance, creating clear intuitive interface, and administering fair use and…
Descriptors: Computer Security, Computer Software, Information Policy, Information Technology
Peer reviewed Peer reviewed
Crawford, Gregory A. – Public Libraries, 2000
Plots trends in the growth of Internet use. Discusses pornography on the Web, using filters, and the ALA response. Reports results of a survey of Internet availability within Pennsylvania public libraries. Findings indicate more than 90% of respondents offer access to the Internet, nearly 80% do not use filters, and 50% attempt to control access…
Descriptors: Access to Information, Information Policy, Internet, Library Policy
Peer reviewed Peer reviewed
Sager, Don – Public Libraries, 1997
The librarians and directors contributing to this article review current trends in censorship, and describe strategies, policies, and practices they would recommend. Discussion includes selection policies, educating the public, new technologies and materials, and the Internet. All agree on the library's responsibility of preserving intellectual…
Descriptors: Censorship, Information Policy, Information Technology, Intellectual Freedom