Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Security | 15 |
Libraries | 15 |
Internet | 10 |
Computer Software | 6 |
Information Technology | 5 |
Library Services | 5 |
Computer Networks | 4 |
Library Automation | 4 |
Computers | 3 |
Electronic Libraries | 3 |
Foreign Countries | 3 |
More ▼ |
Source
Computers in Libraries | 9 |
Library Journal | 2 |
Journal of Information Science | 1 |
Journal of Information… | 1 |
Library Software Review | 1 |
Reference Librarian | 1 |
Author
Bahr, Ellen | 1 |
Balas, Janet L. | 1 |
Banerjee, Kyle | 1 |
Buck, Stephanie | 1 |
Charnetski, J. R. | 1 |
Cheng, Kirby | 1 |
Ferrer, Daniel Fidel | 1 |
Friedman, Stan, Sr. | 1 |
He, Wu | 1 |
Kutty, Ashwin | 1 |
Lorenzen, Elizabeth A., Ed. | 1 |
More ▼ |
Publication Type
Journal Articles | 15 |
Reports - Descriptive | 15 |
Education Level
Higher Education | 2 |
Postsecondary Education | 1 |
Audience
Media Staff | 2 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
He, Wu; Yuan, Xiaohong; Yang, Li – Journal of Information Systems Education, 2013
Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…
Descriptors: Case Method (Teaching Technique), Information Security, Internet, Information Technology
Buck, Stephanie – Computers in Libraries, 2009
As news outlets create headlines such as "A Cloud & A Prayer," "The Cloud Is the Computer," and "Leveraging Clouds to Make You More Efficient," many readers have been left with cloud confusion. Many definitions exist for cloud computing, and a uniform definition is hard to find. In its most basic form, cloud…
Descriptors: Computers, Libraries, Information Technology, Information Scientists
Schneider, Karen G. – Library Journal, 2007
Over the next several decades, libraries will face the potential loss of all the e-journals, ebooks, electronic theses, local digital collections, and other "e-stuff" curated for the public good. A solution to this problem is LOCKSS ("Lots of Copies Keep Stuff Safe"), a free, open-source digital-preservation software from Stanford University that…
Descriptors: Computer Software, Libraries, Library Networks, Library Services
Balas, Janet L. – Computers in Libraries, 2006
It is easy for a library systems administrator to sometimes feel quite overwhelmed by the responsibilities of the job. Keeping a network running smoothly is a challenge in itself, but they must also be concerned with protecting the network from the many threats that exist. Constant vigilance is necessary to guard against electronic attacks…
Descriptors: Computer Security, Emergency Programs, Libraries, Information Systems
Cheng, Kirby – Computers in Libraries, 2005
When I first realized I'd been hacked, I thought, 'Oh, my God, they really did it!" While trying to recover from the shock, I had to call the supervisors of the departments with services affected by the loss of the library's server. In a seemingly calm voice, I told them one by one, "Sorry to let you know, our server is down; it has been hacked…
Descriptors: Internet, Libraries, Computer Security, Library Services
Roberts, Gary – Computers in Libraries, 2006
An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…
Descriptors: Computer Security, Libraries, Librarians, Computer Networks
Bahr, Ellen – Computers in Libraries, 2007
What would technological librarians like to see in the next generation of Integrated Library Systems (ILS)? This question was asked of several well- known library technology experts, and their responses are presented in this article. Survey respondents expressed a clear desire for the following features and functionality: (1) Direct, read-only…
Descriptors: Libraries, Internet, Library Automation, Computer Mediated Communication

Oppenheim, Charles – Journal of Information Science, 1996
Discusses the development a national information policy in the United Kingdom (UK): policies for national information infrastructures, electronic information services, privacy and data protection, copyright, public and national libraries; reviews problems inhibiting Internet use; compares the UK's and the European Commission's approaches to…
Descriptors: Computer Security, Copyrights, Foreign Countries, Information Policy
Banerjee, Kyle – Computers in Libraries, 2003
Explains how to keep library systems healthy and functioning by taking sensible security measures. Examines why hackers would target library systems and how library systems are compromised. Describes tools that can help, including: firewalls; antivirus software; alarms; network analysis tools; and encryption. Identifies several strategies for…
Descriptors: Computer Networks, Computer Security, Libraries, Library Administration
Ferrer, Daniel Fidel; Mead, Mary – Computers in Libraries, 2003
Describes spyware, discusses how it gets on a computer. Explains how spyware can be useful for parents, employers, and libraries. Discusses how spyware is more often used for others' gain or for surveillance without notification, how it can go undetected, and how libraries can help keep computers and patrons protected from remote installation of…
Descriptors: Computer Networks, Computer Security, Computer Software, Libraries
Friedman, Stan, Sr. – Library Journal, 2004
This article describes the results of the 19th annual Computers in Libraries Conference in Washington, DC on March 10-12, 2004. The conference peered into the future, drew lessons from the past, and ran like clockwork. Program chair Jane Dysart and her organizing committee are by now old hands, bringing together three keynote addresses, 100…
Descriptors: Information Technology, Internet, Privacy, Libraries
Charnetski, J. R. – Computers in Libraries, 1998
Discusses the use of firewalls for library intranets, highlighting the move from mainframes to PCs, security issues and firewall architecture, and operating systems. Provides a glossary of basic networking terms and a bibliography of suggested reading. (PEN)
Descriptors: Bibliographies, Computer Networks, Computer Security, Computer System Design

Orr, Giles – Library Software Review, 1998
Presents a method for libraries with limited budgets to create reliable Web servers with existing hardware and free software available via the Internet. Discusses staff, hardware and software requirements, and security; outlines the assembly process. (PEN)
Descriptors: Computer Security, Computer Software, Cost Effectiveness, Information Networks
Nikkel, Terry; Kutty, Ashwin – Computers in Libraries, 2004
Dalhousie is a medium-sized university, with about 15,000 FTE students, located in Halifax, Nova Scotia. It is one of Canada's oldest and most prestigious universities, yet, like many other public institutions, it frequently suffers from a lack of adequate funding to fulfill all the conflicting needs of the various faculties and departments. This…
Descriptors: Foreign Countries, Research Libraries, Internet, Library Services

Lorenzen, Elizabeth A., Ed. – Reference Librarian, 1996
This volume's topics include librarian role and ethical issues in Internet searching, strategies for locating career resources on the Internet and World Wide Web, career information for "Generation X" and for alumni, collaboration between libraries and university career services, career information gophers, and electronic privacy and…
Descriptors: Career Information Systems, Career Planning, Computer Security, Cooperative Programs