Descriptor
Author
Banerjee, Kyle | 1 |
Freedman, Maurice J. | 1 |
Ives, David J. | 1 |
King, Monica | 1 |
Uhler, Scott F. | 1 |
Weiss, Philippe R. | 1 |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 5 |
Guides - Non-Classroom | 1 |
Education Level
Audience
Location
New York | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Banerjee, Kyle – Computers in Libraries, 2003
Explains how to keep library systems healthy and functioning by taking sensible security measures. Examines why hackers would target library systems and how library systems are compromised. Describes tools that can help, including: firewalls; antivirus software; alarms; network analysis tools; and encryption. Identifies several strategies for…
Descriptors: Computer Networks, Computer Security, Libraries, Library Administration

King, Monica – Public Libraries, 1999
Describes one public library's development of a computer-security plan, along with helpful products used. Discussion includes Internet policy, physical protection of hardware, basic protection of the operating system and software on the network, browser dilemmas and maintenance, creating clear intuitive interface, and administering fair use and…
Descriptors: Computer Security, Computer Software, Information Policy, Information Technology
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources
Freedman, Maurice J. – Library Journal, 1996
Committed to utilizing information technology, the Westchester Library System (New York) made the World Wide Web publicly accessible. Describes the planning, implementation, and management process; obstacles involving financing; establishing Internet connectivity; and vendor negotiations. Westchester hired a Web manager, created Internet use…
Descriptors: Access to Information, Computer Security, Financial Support, Information Technology
Uhler, Scott F.; Weiss, Philippe R. – Illinois Libraries, 1996
With the 1996 defeat of the Communications Decency Act, under which providing offensive material on computer systems accessible to children would have become a felony, no legal guidelines exist for library use of the Internet. Libraries can avoid becoming the center of an Internet controversy by encouraging parental involvement; by protecting…
Descriptors: Access to Information, Censorship, Child Welfare, Computer Networks