Descriptor
Computer Networks | 17 |
Library Policy | 17 |
Access to Information | 7 |
Academic Libraries | 6 |
Higher Education | 6 |
Information Networks | 6 |
Library Administration | 5 |
Library Services | 5 |
Computer Security | 4 |
Library Materials | 4 |
Library Planning | 4 |
More ▼ |
Source
Author
Banerjee, Kyle | 1 |
Bazillion, Richard J. | 1 |
Behrman, Sara | 1 |
Bennett, Valerie M. | 1 |
Billings, Harold | 1 |
Crawford, Walt | 1 |
Demas, Samuel | 1 |
Flanders, Bruce | 1 |
Gorman, Michael | 1 |
Grygierczyk, Natalia | 1 |
Henneberger, Bob | 1 |
More ▼ |
Publication Type
Journal Articles | 14 |
Reports - Descriptive | 13 |
Guides - Non-Classroom | 4 |
Opinion Papers | 4 |
Reports - Evaluative | 2 |
Books | 1 |
Collected Works - Proceedings | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 1 |
Audience
Administrators | 1 |
Practitioners | 1 |
Location
Canada | 1 |
Netherlands | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Banerjee, Kyle – Computers in Libraries, 2003
Explains how to keep library systems healthy and functioning by taking sensible security measures. Examines why hackers would target library systems and how library systems are compromised. Describes tools that can help, including: firewalls; antivirus software; alarms; network analysis tools; and encryption. Identifies several strategies for…
Descriptors: Computer Networks, Computer Security, Libraries, Library Administration
Williams, Robert L. – 2001
This manual is intended to provide a free resource on essential network security concepts for non-technical managers of small libraries. Managers of other small nonprofit or community organizations will also benefit from it. An introduction defines network security; outlines three goals of network security; discusses why a library should be…
Descriptors: Computer Networks, Computer Security, Libraries, Library Administration

Henneberger, Bob – Microform Review, 1994
Explains the University of Georgia's project to scan rare maps and make the digitized images available on the Internet via World Wide Web. Topics discussed include microfilming procedures; equipment used to convert film images to digital images; the use of CD-ROM; and retention and access policies. (LRW)
Descriptors: Academic Libraries, Access to Information, Computer Networks, Higher Education
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources
McMillan, Gail – Resource Sharing & Information Networks, 2004
While university libraries have a long tradition of preserving scholarship, they are less experienced in the technology-dependent and computer networked environment. By taking advantage of current activities and expertise that exist in various parts of the institution, policies and practices can be linked that will engender long-term…
Descriptors: Preservation, Doctoral Dissertations, Research Libraries, Electronic Libraries

Demas, Samuel; And Others – Library Resources & Technical Services, 1995
Presents guidelines for identifying, evaluating, and selecting Internet resources based on a conceptual model and organizational framework of a collection development policy formulated at Cornell University's library. Topics include collection development in an electronic library and a taxonomy of Internet resources. (Author/LRW)
Descriptors: Academic Libraries, Classification, Computer Networks, Electronic Libraries
Tenopir, Carol – Library Journal, 1995
Discusses the impact of Internet access on library reference services based on 1994 interviews with almost two dozen university librarians. Highlights include library policy, overcrowded workstations and methods of controlling use, recreational use of terminals that interferes with more formal library use, restriction as a form of censorship, and…
Descriptors: Academic Libraries, Access to Information, Censorship, Computer Networks
Bennett, Valerie M.; Palmer, Eileen M. – Microcomputers for Information Management, 1993
Compares the use of a telefacsimile network and the Internet-based software, Ariel, for interlibrary loan document delivery in the Health Sciences Libraries Consortium. Topics discussed include document processing efficiency, impact of the Ariel workstations on interlibrary loan procedures, interlibrary loan policies, and possible prototype…
Descriptors: Comparative Analysis, Computer Networks, Computer Software, Consortia

Lanier, Don; Wilkins, Walter – RQ, 1994
Discusses the use of the Internet for ready reference and considers limitations, reference policy, and cost issues. Highlights include general reference sources; database searching on the Internet; Gopher; bibliographic control and access to Internet resources; personnel issues; and levels of service. (Contains 30 references.) (LRW)
Descriptors: Access to Information, Cataloging, Computer Networks, Costs
Flanders, Bruce – School Library Journal, 1994
Addresses the issue of student access to inappropriate materials on the Internet. Topics discussed include school library policies; the role of parents; public library concerns; access to information; and a sample technical code of conduct for high schools. (seven references) (LRW)
Descriptors: Access to Information, Codes of Ethics, Computer Assisted Instruction, Computer Networks
Behrman, Sara – Library Administration & Management, 1994
Discussion of intellectual freedom, access to information, and public library administration focuses on three main areas: (1) access to minors; (2) access to library services by the poor, including library card registration policies that require a permanent address; and (3) charging fines and fees. Information equality and access to Internet are…
Descriptors: Access to Information, Adolescents, Children, Computer Networks
Uhler, Scott F.; Weiss, Philippe R. – Illinois Libraries, 1996
With the 1996 defeat of the Communications Decency Act, under which providing offensive material on computer systems accessible to children would have become a felony, no legal guidelines exist for library use of the Internet. Libraries can avoid becoming the center of an Internet controversy by encouraging parental involvement; by protecting…
Descriptors: Access to Information, Censorship, Child Welfare, Computer Networks

Bazillion, Richard J.; Scott, Sue – Canadian Library Journal, 1991
Describes the planning process for designing a new library for Algoma University College (Ontario). Topics discussed include the building committee, library policy, design considerations, an electric system that supports computer technology, library automation, the online public access catalog (OPAC), furnishings and interior environment, and…
Descriptors: College Libraries, Computer Networks, Design Requirements, Educational Facilities Design
Crawford, Walt; Gorman, Michael – 1995
Policymakers and library administrators are being drawn to the idea of the "virtual library" and the "library without walls," the webs of electronic resources that supposedly will displace books, physical libraries, and most library staff, and are believing the virtual library to be imminent, adequate, and cost-effective. This…
Descriptors: Computer Networks, Electronic Publishing, Futures (of Society), Information Networks
Grygierczyk, Natalia – 1996
This paper investigates the need for electronic provision of information, and advises that the purpose and motivation for providing electronic resources be explored before embarking on a project to provide them. Many projects at universities and other institutes have been begun arbitrarily just because there happened to be financial resources…
Descriptors: Academic Libraries, Computer Networks, Electronic Libraries, Foreign Countries
Previous Page | Next Page ยป
Pages: 1 | 2