NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)5
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 24 results Save | Export
Kahn, Miriam B. – ALA Editions, 2012
Fire, water, mold, construction problems, power-outages--mishaps like these can not only bring library services to a grinding halt, but can also destroy collections and even endanger employees. Preparing for the unexpected is the foundation of a library's best response. Expert Kahn comes to the rescue with this timely update of the best…
Descriptors: Emergency Programs, Libraries, Library Administration, Preservation
Peer reviewed Peer reviewed
Direct linkDirect link
Perez, Carmen; Cuadrado, Manuel; Cervera, Amparo – Journal of Academic Librarianship, 2009
This paper analyses university library users' attitudes towards book vandalism in order to develop a basis for intervention. Using a customer oriented approach data was collected from users who attended an academic library exhibition on vandalized books at a University campus. Respondents were asked both for their reactions to the vandalism as…
Descriptors: Vandalism, Books, College Libraries, Universities
Diamanduros, Terry; Downs, Elizabeth – Library Media Connection, 2011
Technology has changed the school yard or neighborhood bully. It no longer requires physical intimidation to be a bully. In fact, bullying can be done anonymously, on or off campus, and physical size does not enter into the scenario. Every year headlines identify children who take their own lives as a result of being victims of various forms of…
Descriptors: Bullying, School Libraries, Educational Technology, Media Specialists
Huang, Phil – Computers in Libraries, 2007
By providing the public with online computing facilities, librarians make available a world of information resources beyond their traditional print materials. Internet-connected computers in libraries greatly enhance the opportunity for patrons to enjoy the benefits of the digital age. Unfortunately, as hackers become more sophisticated and…
Descriptors: Computers, Computer Software, Internet, Computer Security
Roberts, Gary – Computers in Libraries, 2006
An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…
Descriptors: Computer Security, Libraries, Librarians, Computer Networks
Williams, Gene – Wilson Library Bulletin, 1986
Describes how to identify microcomputer problems and determine whether the services of a technician are required by troubleshooting, or using a process of elimination, without needing a technical background or special tools. Prevention methods and the use of diagnostic programs are also explained. (EM)
Descriptors: Computer Software, Equipment Maintenance, Microcomputers, Prevention
Peer reviewed Peer reviewed
Morris, John – Canadian Library Journal, 1987
Describes the damage and salvage efforts resulting from the burning of the Los Angeles Central Library in 1986, and makes several recommendations for fire and arson prevention measures and contingency salvage plans. (CLB)
Descriptors: Alarm Systems, Building Design, Fire Protection, Library Facilities
Towner, Lawrence W. – American Libraries, 1988
Discusses the growing problem of theft of library materials, including rare books, by both scholarly researchers and library staff. Complacence of librarians and their failure to act in the past is also discussed, as well as the effects of tightened security measures on the traditional trust between librarians and researchers. (CLB)
Descriptors: Books, Crime Prevention, Library Materials, Library Personnel
Breeding, Marshall – Computers in Libraries, 2005
Who can be trusted on the Web? These days, with identity theft seemingly rampant, it's more important than ever to take all possible measures to protect privacy and to shield personal information from those who might not have good intentions. Today, librarians also have to take reasonable precautions to ensure that the online services that they…
Descriptors: Web Sites, Librarians, Trust (Psychology), Internet
Commission on Preservation and Access, Washington, DC. – 1990
Preservation efforts are needed immediately to save a quarter of all the volumes housed in research libraries. These books are turning to dust because alum sizing was introduced into the paper-making process in the mid-1800s. The destruction of some books can be reversed through deacidification. The content of other books can be saved only by…
Descriptors: Academic Libraries, Archives, Fund Raising, Higher Education
Robbins, Louise S. – 1988
This report proposes a preservation program assuming a model of a university library serving 5,000 or fewer students and 350 or fewer faculty members. The model program is not for a comprehensive university or research institution, and the library's collection is one developed and used as a curriculum-support collection. The goal of the…
Descriptors: Academic Libraries, Guidelines, Higher Education, Library Facilities
Peer reviewed Peer reviewed
Strong, Gary E. – Special Libraries, 1987
Examples of problems encountered in a new library building--including rats and humidity--and a description of the library's collections provide a framework for this presentation of the California State Library's emergency management planning. Current preservation efforts are documented and the library's disaster and security plans are described.…
Descriptors: Emergency Programs, Fire Protection, Library Administration, Library Materials
State Univ. of New York, Buffalo. Coll. at Buffalo. – 1994
The purpose of this plan is to minimize the potential for disaster and to minimize damage to materials if a disaster should occur. It contains: emergency instructions; evacuation procedures; a disaster contact list; and sections on salvage priorities, prevention, protection, response, recovery, rehabilitation, disaster team responsibilities,…
Descriptors: Accident Prevention, Administrative Policy, Emergency Programs, Fire Protection
State Univ. of New York, Buffalo. Coll. at Buffalo. – 1991
The plan presented in this revised manual is designed to minimize the potential for disaster in the E. H. Butler Library at the State University of New York College at Buffalo, and to minimize damage to materials in the event of a disaster. It contains emergency instructions, evacuation procedures, a disaster contact list, and information on…
Descriptors: Accident Prevention, Administrative Policy, College Libraries, Emergency Programs
Wood Lee, Mary – 1988
This study focuses on the prevention and basic treatment of recurring mold growth in tropical climates where library-wide environmental control is not always possible. The introduction discusses major climatic groups; the effects of climate on specific materials found in library resources; and the range of options for modifying the environment.…
Descriptors: Climate, Climate Control, Emergency Programs, Environmental Influences
Previous Page | Next Page ยป
Pages: 1  |  2