NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Arya, Harsh Bardhan; Mishra, J. K. – Journal of Library & Information Services In Distance Learning, 2012
The paper describes the theory and definition of the practice of librarianship, specifically addressing how Web 2.0 technologies (tools) such as synchronous messaging, collaborative reference service and streaming media, blogs, wikis, social networks, social bookmarking tools, tagging, RSS feeds, and mashups might intimate changes and how…
Descriptors: Web Sites, Electronic Publishing, Social Networks, Reference Services
Peer reviewed Peer reviewed
Direct linkDirect link
Flatley, Robert; Jensen, Robert Bruce – Journal of Electronic Resources Librarianship, 2012
Academic libraries have traditionally collected reference statistics using hash marks on paper. Although efficient and simple, this method is not an effective way to capture the complexity of reference transactions. Several electronic tools are now available to assist libraries with collecting often elusive reference data--among them homegrown…
Descriptors: Academic Libraries, Program Implementation, Reference Services, Library Research
Peer reviewed Peer reviewed
Direct linkDirect link
Deitering, Anne-Marie; Bridgewater, Rachel – Journal of Web Librarianship, 2007
This article details the development of the Library Instruction Wiki (http://instructionwiki.org): an effort to develop a web-based, knowledge-sharing resource. Though some library instruction is specific to a given institution or class, much of what instruction librarians teach is similar. Library instructors have repeatedly expressed the desire…
Descriptors: Knowledge Management, Information Technology, Educational Technology, Library Instruction
Peer reviewed Peer reviewed
Dewey, Patrick R. – Electronic Library, 1986
Discussion of public access microcomputer service areas in public libraries covers walk-in access, software/hardware circulation, online call-in services, and special programs. Principles for successful public access programs are also discussed, including hardware/software selection. Problems relating to equipment breakdown, diskette storage, and…
Descriptors: Computer Software, Decision Making, Information Sources, Library Circulation
Peer reviewed Peer reviewed
Direct linkDirect link
Blummer, Barbara – Journal of Web Librarianship, 2007
This paper discusses the use of online learning communities for library professional organizations to promote collaboration and learning. The addition of an online learning community component to a library organization expands collaborative and educational opportunities for members through a virtual environment. Although technologies used to…
Descriptors: Electronic Learning, Needs Assessment, Online Courses, Cooperation
Peer reviewed Peer reviewed
Brophy, Edward – Catholic Library World, 1986
Provides practical information for librarians beginning to use online searching for reference services at the high school level. Selection of equipment, software, and database vendors are discussed, as well as financing, involvement of the school administration, and working with users to determine their information needs. (CDD)
Descriptors: Computer Software, Financial Support, Guidelines, High Schools
Price, Robert V.; Fred, Bob – Media and Methods, 1986
Compares benefits and problems associated with traditional and newly automated circulation systems in the learning resources center of a modern medium size high school. Descriptions of the two systems include the selection, implementation, and use of the Apple compatible software used. Eight recommendations for implementing an automated system are…
Descriptors: Case Studies, Comparative Analysis, Computer Software, Efficiency
Alberta Dept. of Education, Edmonton. – 1999
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Descriptors: Check Lists, Computer Networks, Computer Security, Computer Software