NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources
Uhler, Scott F.; Weiss, Philippe R. – Illinois Libraries, 1996
With the 1996 defeat of the Communications Decency Act, under which providing offensive material on computer systems accessible to children would have become a felony, no legal guidelines exist for library use of the Internet. Libraries can avoid becoming the center of an Internet controversy by encouraging parental involvement; by protecting…
Descriptors: Access to Information, Censorship, Child Welfare, Computer Networks
Grygierczyk, Natalia – 1996
This paper investigates the need for electronic provision of information, and advises that the purpose and motivation for providing electronic resources be explored before embarking on a project to provide them. Many projects at universities and other institutes have been begun arbitrarily just because there happened to be financial resources…
Descriptors: Academic Libraries, Computer Networks, Electronic Libraries, Foreign Countries