Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 2 |
Descriptor
Source
Author
Balas, Janet L. | 1 |
Banerjee, Kyle | 1 |
Blatecky, Alan R. | 1 |
Diller, Karen | 1 |
Glogoff, Stuart | 1 |
Goodman, Naomi J. | 1 |
Goodrich, Jeanne | 1 |
He, Peter Wei | 1 |
Hinchcliff, Carole L. | 1 |
Huang, Samuel T., Ed. | 1 |
Huling, Nancy | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 25 |
Journal Articles | 18 |
Opinion Papers | 4 |
Collected Works - Serials | 1 |
Guides - Non-Classroom | 1 |
Information Analyses | 1 |
Numerical/Quantitative Data | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Administrators | 1 |
Policymakers | 1 |
Practitioners | 1 |
Laws, Policies, & Programs
Americans with Disabilities… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Meng Qu – Education and Information Technologies, 2024
This paper introduces a Patron Counting and Analysis (PCA) system that leverages Wi-Fi-connection data to monitor space utilization and analyze visitor patterns in academic libraries. The PCA system offers real-time crowding information to the public and a comprehensive visitor analysis dashboard for library administrators. The system's…
Descriptors: Academic Libraries, Users (Information), Use Studies, Space Utilization
Balas, Janet L. – Computers in Libraries, 2006
It seems that the demand for public access computers grows exponentially every time a library network is expanded, making it impossible to ever have enough computers available for patrons. One solution that many libraries are implementing to ease the demand for public computer use is to offer wireless technology that allows patrons to bring in…
Descriptors: Telecommunications, Access to Computers, Computer Networks, Public Libraries
Banerjee, Kyle – Computers in Libraries, 2003
Explains how to keep library systems healthy and functioning by taking sensible security measures. Examines why hackers would target library systems and how library systems are compromised. Describes tools that can help, including: firewalls; antivirus software; alarms; network analysis tools; and encryption. Identifies several strategies for…
Descriptors: Computer Networks, Computer Security, Libraries, Library Administration

Glogoff, Stuart – Journal of Library Administration, 2001
Describes the impact of networked information technology environments on libraries, users, and library competitors, focusing on the leadership role of library administrators. Discusses the network generation as agents of change; transforming learning; the impact of networked information; the impact on the workplace; and emerging technologies.…
Descriptors: Change Agents, Computer Networks, Information Networks, Information Technology
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources
Association of Research Libraries, Washington, DC. – 1988
Three papers are compiled here for research library directors: (1) "Background: Open Systems Interconnection," in which David F. Bishop provides fundamental background information to explain the concept of the emerging technology of linked systems and open systems interconnection--i.e., an agreed upon standard set of conventions or rules…
Descriptors: Academic Libraries, Bibliographic Utilities, Computer Networks, Cooperative Programs
Mark, Linda – Wilson Library Bulletin, 1992
Summarizes the 1992 Special Libraries Association (SLA) Annual Conference. Topics discussed include emphasizing internationalism; competing in a global economy; the competitive importance of information; downsizing because of financial constraints; Internet and NREN (National Research and Education Network); recruitment; ethics; standards; and the…
Descriptors: Codes of Ethics, Competition, Computer Networks, Conferences

Webb, John – Information Technology and Libraries, 1998
Presents a holistic view of the management of licensed, networked information resources in a university library. Highlights include licensing and copyrights; collection development and acquisitions; aggregators, which combine electronic resources from disparate suppliers or locations into larger resource units for users; consortia; managing…
Descriptors: Academic Libraries, Access to Information, Computer Networks, Consortia
Saunders, Laverna – Computers in Libraries, 1992
Reports on a postconference workshop on virtual libraries that was presented at the third annual Computers in Libraries Canada Conference. Highlights include networks; technological change; administrative issues, including organizational structure, staff training, strategic planning, and financial resources; a case study of the University of…
Descriptors: Case Studies, Computer Networks, Conferences, Electronic Journals

Goodrich, Jeanne – Journal of Library Administration, 1999
This case study describes the use of an information technology vendor conference to assure the smooth opening of a public library in Portland, Oregon. Vendors for hardware, telecommunications, integrated library systems, and networks met with library administration and staff to troubleshoot problems and share information and to ensure a timely…
Descriptors: Case Studies, Computer Networks, Computer Selection, Conferences

Yavarkovsky, Jerome – Journal of Library Administration, 1993
Describes the New York State Library's planning process and visions for its future in networked services. Topics discussed include roles for the library in a networked environment; leadership in networked services and training; network navigation; organizational response; services to state agencies and local government; and public kiosk services.…
Descriptors: Computer Networks, Futures (of Society), Information Networks, Leadership

Blatecky, Alan R. – North Carolina Libraries, 1992
Discusses the future of computer networks and libraries in light of rapid advances in technology. Topics discussed include information growth; decreasing costs and increasing performance; and changes needed in libraries, including organizational structure and culture, increased access rather than increased holdings, more classification schemes,…
Descriptors: Access to Information, Change, Classification, Computer Networks
South Carolina State Library, Columbia. – 1989
This annual report documents the activities and accomplishments of the South Carolina State Library in 1988-1989. Introductory materials include lists of the members of both the South Carolina State Library Board and the library staff; an organizational chart; the goals and mission statement of the South Carolina State Library; a history of the…
Descriptors: Academic Libraries, Administrative Organization, Annual Reports, Blindness
South Carolina State Library, Columbia. – 1987
This report to the Governor and state assembly members reports two major achievements during the year: the opening of a new library facility for the blind and physically handicapped, and the continued growth of the computerized networking system linking the public libraries of the state. Introductory materials include lists of the members of the…
Descriptors: Academic Libraries, Administrative Organization, Annual Reports, Blindness

Paster, Amy; Osif, Bonnie – Special Libraries, 1992
Discussion of the scope of electronic information resources available to libraries includes examples of several new sources. Solutions to increasing patron demand for materials are considered, including interlibrary loan, for-profit companies and agencies, and services that allow patrons to request materials directly. Issues of staff training,…
Descriptors: Academic Libraries, Access to Information, Computer Networks, Higher Education
Previous Page | Next Page ยป
Pages: 1 | 2