NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 33 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Meng Qu – Education and Information Technologies, 2024
This paper introduces a Patron Counting and Analysis (PCA) system that leverages Wi-Fi-connection data to monitor space utilization and analyze visitor patterns in academic libraries. The PCA system offers real-time crowding information to the public and a comprehensive visitor analysis dashboard for library administrators. The system's…
Descriptors: Academic Libraries, Users (Information), Use Studies, Space Utilization
Peer reviewed Peer reviewed
Direct linkDirect link
Mitchell, Erik T. – Journal of Web Librarianship, 2010
One of the first big shifts in how libraries manage resources was the move from print-journal purchasing models to database-subscription and electronic-journal purchasing models. Libraries found that this transition helped them scale their resources and provide better service just by thinking a bit differently about their services. Likewise,…
Descriptors: Libraries, Library Materials, Electronic Publishing, Electronic Libraries
Balas, Janet L. – Computers in Libraries, 2006
It seems that the demand for public access computers grows exponentially every time a library network is expanded, making it impossible to ever have enough computers available for patrons. One solution that many libraries are implementing to ease the demand for public computer use is to offer wireless technology that allows patrons to bring in…
Descriptors: Telecommunications, Access to Computers, Computer Networks, Public Libraries
Banerjee, Kyle – Computers in Libraries, 2003
Explains how to keep library systems healthy and functioning by taking sensible security measures. Examines why hackers would target library systems and how library systems are compromised. Describes tools that can help, including: firewalls; antivirus software; alarms; network analysis tools; and encryption. Identifies several strategies for…
Descriptors: Computer Networks, Computer Security, Libraries, Library Administration
Peer reviewed Peer reviewed
Glogoff, Stuart – Journal of Library Administration, 2001
Describes the impact of networked information technology environments on libraries, users, and library competitors, focusing on the leadership role of library administrators. Discusses the network generation as agents of change; transforming learning; the impact of networked information; the impact on the workplace; and emerging technologies.…
Descriptors: Change Agents, Computer Networks, Information Networks, Information Technology
Pepin, Theresa; And Others – Library Journal, 1997
This report analyzes data gathered from 29 automated library system vendors who responded to a 1996 survey. The survey also requested their perceptions of Java (an object-oriented programming language) and network computers, and issues and trends to be considered by library administrators. Contact information about the vendors is provided. (Four…
Descriptors: Computer Networks, Electronic Libraries, Library Administration, Library Automation
Peer reviewed Peer reviewed
Bertot, John Carlo; McClure, Charles R. – Library Trends, 2003
Identifies research topics related to outcomes assessment in a networked environment and discusses issues affecting these topics. Proposes a framework to relate traditional evaluation components and terminology to the networked environment and identifies factors in the networked environment that affect assessment methods. Suggests outcomes…
Descriptors: Computer Networks, Evaluation Methods, Libraries, Library Administration
Peer reviewed Peer reviewed
Brunell, David H. – Journal of Library Administration, 1991
Discusses management issues that librarians face in offering public access to library resources through internetworking services, e.g., local area networks, campus networks, or the INTERNET. It is concluded that interface problems and lack of an effective technical support structure make access to library information on INTERNET more of an…
Descriptors: Computer Networks, Electronic Libraries, Electronic Mail, Information Management
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources
Berry, John N. III, Ed. – Library Journal, 1994
Contains reprints of four articles showing that librarians foresaw the impact of technology on libraries: (1) "Copyright and the Future of Authorship" (Barbara Ringer); (2) "Inventions and Books--What of the Future?" (Ethel M. Fair); (3) "The Changes Ahead" (Lowell A. Martin); (4) "Trial by Computer" (Basil…
Descriptors: Change Strategies, Computer Networks, Computers, Copyrights
Heath, Fred M. – Library Administration & Management, 1993
Discusses national information networks from the points of view of an academic librarian and the director of the Coalition for Networked Information (CNI). Topics addressed include the roles of libraries, the government, professional library associations, library administrators, and the private sector; user fees; and intellectual property rights.…
Descriptors: Academic Libraries, Administrator Role, Computer Networks, Government Role
Mitchell, Maurice; Saunders, Laverna M. – Computers in Libraries, 1991
Discusses issues related to the idea of a virtual library, or electronic library, in an academic setting. Topics discussed include access to academic libraries via personal computers; online catalogs; wide area networks, such as Internet, and their impact on library and computer center services; administrative issues; human and technological…
Descriptors: Academic Libraries, Access to Information, Computer Centers, Computer Networks
Saunders, Laverna M. – Library Administration & Management, 1992
Discusses the concept of a virtual library. Current systems are described, as well as pilot projects; administrative concerns are addressed, including cooperative collection development and networking; work of the Coalition for Networked Information (CNI) is discussed; and the National Research and Education Network (NREN) is described. (17…
Descriptors: Bibliographic Utilities, Computer Networks, Futures (of Society), Higher Education
Mark, Linda – Wilson Library Bulletin, 1992
Summarizes the 1992 Special Libraries Association (SLA) Annual Conference. Topics discussed include emphasizing internationalism; competing in a global economy; the competitive importance of information; downsizing because of financial constraints; Internet and NREN (National Research and Education Network); recruitment; ethics; standards; and the…
Descriptors: Codes of Ethics, Competition, Computer Networks, Conferences
Peer reviewed Peer reviewed
King, Hannah – Electronic Library, 1993
Questions the wisdom of permitting visions of the electronic library to drive budgets and strategic planning. Social and economic realities limiting user access to information, new roles for librarians, and models that guide management of information resources and services by real librarians for real users are discussed. A proposed action agenda…
Descriptors: Access to Information, Budgets, Computer Networks, Electronic Libraries
Previous Page | Next Page ยป
Pages: 1  |  2  |  3