Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 8 |
Descriptor
Computer Security | 8 |
Computer Software | 3 |
Crime Prevention | 3 |
Library Services | 3 |
Computer Mediated… | 2 |
Educational Technology | 2 |
Information Security | 2 |
Libraries | 2 |
Library Materials | 2 |
Library Role | 2 |
Vandalism | 2 |
More ▼ |
Source
Computers in Libraries | 3 |
Community & Junior College… | 1 |
Information Science Publishing | 1 |
Library Journal | 1 |
Library Media Connection | 1 |
OCLC Online Computer Library… | 1 |
Author
Balas, Janet L. | 1 |
Barrera-Gomez, Julianna | 1 |
Diamanduros, Terry | 1 |
Downs, Elizabeth | 1 |
Erway, Ricky | 1 |
Howell, Scott | 1 |
Hricko, Mary | 1 |
Huang, Phil | 1 |
Kaye, Alan L. | 1 |
Roberts, Gary | 1 |
Shelton, Kay | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 7 |
Journal Articles | 6 |
Books | 1 |
Guides - Classroom - Teacher | 1 |
Guides - Non-Classroom | 1 |
Education Level
Adult Education | 1 |
Elementary Secondary Education | 1 |
Higher Education | 1 |
Postsecondary Education | 1 |
Two Year Colleges | 1 |
Audience
Media Staff | 8 |
Administrators | 1 |
Support Staff | 1 |
Teachers | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Walk This Way: Detailed Steps for Transferring Born-Digital Content from Media You Can Read In-House
Barrera-Gomez, Julianna; Erway, Ricky – OCLC Online Computer Library Center, Inc., 2013
This document is a companion to the report, "You've Got to Walk before You Can Run: First Steps for Managing Born-Digital Content Received on Physical Media." Like the "First Steps" report, the intended audience is those who are just starting to manage born-digital materials, from those wondering where to begin, to those who…
Descriptors: Archives, Electronic Publishing, Documentation, Computer Software
Diamanduros, Terry; Downs, Elizabeth – Library Media Connection, 2011
Technology has changed the school yard or neighborhood bully. It no longer requires physical intimidation to be a bully. In fact, bullying can be done anonymously, on or off campus, and physical size does not enter into the scenario. Every year headlines identify children who take their own lives as a result of being victims of various forms of…
Descriptors: Bullying, School Libraries, Educational Technology, Media Specialists
Kaye, Alan L. – Library Journal, 2008
Take a look around the bus or subway and see just how many people are bumping along to an iPod or an MP3 player. What they are listening to is their secret, but the many signature earbuds in sight should give one a real sense of just how pervasive digital audio has become. This article describes how that popularity is mirrored in library audio…
Descriptors: Library Services, Audio Equipment, Library Materials, Public Libraries
Shelton, Kay – Community & Junior College Libraries, 2009
The media often report on the negativity of Facebook, with horror stories of people losing their jobs because of something they posted. There can be useful purposes for Facebook, however, especially after the unthinkable happens on a college campus. Community college libraries can incorporate Facebook into their security planning.
Descriptors: Community Colleges, College Libraries, Social Networks, Computer Mediated Communication
Balas, Janet L. – Computers in Libraries, 2006
It is easy for a library systems administrator to sometimes feel quite overwhelmed by the responsibilities of the job. Keeping a network running smoothly is a challenge in itself, but they must also be concerned with protecting the network from the many threats that exist. Constant vigilance is necessary to guard against electronic attacks…
Descriptors: Computer Security, Emergency Programs, Libraries, Information Systems
Huang, Phil – Computers in Libraries, 2007
By providing the public with online computing facilities, librarians make available a world of information resources beyond their traditional print materials. Internet-connected computers in libraries greatly enhance the opportunity for patrons to enjoy the benefits of the digital age. Unfortunately, as hackers become more sophisticated and…
Descriptors: Computers, Computer Software, Internet, Computer Security
Roberts, Gary – Computers in Libraries, 2006
An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…
Descriptors: Computer Security, Libraries, Librarians, Computer Networks
Hricko, Mary; Howell, Scott – Information Science Publishing, 2006
Online learning is one of the most important topics in distance learning, but practitioners and researchers have experienced difficulty in defining the process. "Online Assessment and Measurement: Foundations and Challenges" approaches the topic by finding a common ground to properly analyze online assessment and measurement. "Online Assessment…
Descriptors: Electronic Learning, Distance Education, Student Evaluation, Measurement