Descriptor
Author
Banerjee, Kyle | 1 |
Coulter, Joan M. | 1 |
Dixon, Judith | 1 |
Galler, Anne M. | 1 |
Gorman, Audrey J. | 1 |
Ives, David J. | 1 |
King, Monica | 1 |
Publication Type
Reports - Descriptive | 7 |
Journal Articles | 5 |
Guides - Non-Classroom | 2 |
Legal/Legislative/Regulatory… | 1 |
Education Level
Audience
Media Staff | 1 |
Policymakers | 1 |
Practitioners | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Banerjee, Kyle – Computers in Libraries, 2003
Explains how to keep library systems healthy and functioning by taking sensible security measures. Examines why hackers would target library systems and how library systems are compromised. Describes tools that can help, including: firewalls; antivirus software; alarms; network analysis tools; and encryption. Identifies several strategies for…
Descriptors: Computer Networks, Computer Security, Libraries, Library Administration

King, Monica – Public Libraries, 1999
Describes one public library's development of a computer-security plan, along with helpful products used. Discussion includes Internet policy, physical protection of hardware, basic protection of the operating system and software on the network, browser dilemmas and maintenance, creating clear intuitive interface, and administering fair use and…
Descriptors: Computer Security, Computer Software, Information Policy, Information Technology

Gorman, Audrey J. – Knowledge Quest, 1999
Focuses on the library service principles of multisensory thinking, respect for the question, and respect for the questioner as they relate to people with learning disabilities and all users. Discusses reading difficulties of people with dyslexia, along with audiotape and computer technologies that libraries can use. Presents approaches to the…
Descriptors: Assistive Devices (for Disabled), Dyslexia, Information Services, Information Technology
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources

Dixon, Judith – Public Libraries, 1996
The Dallas Public Library surveyed 21 surrounding public library systems to help identify barriers that limit children's use of public libraries. Describes identified barriers, examines causes of the barriers, and offers possible solutions. Tables present study results and list discontinued and current library outreach programs. (JMV)
Descriptors: Access to Information, Children, Library Equipment, Library Facilities
California State Postsecondary Education Commission, Sacramento. – 1991
This report examines the newly proposed systemwide library plan of the California State University (CSU), which will govern the planning and development of library space on CSU campuses for the next 10 years. The commission's report evaluates the state university's updated library space standards and discusses policy issues that relate to on-site…
Descriptors: Academic Libraries, Higher Education, Information Technology, Library Administration

Galler, Anne M.; Coulter, Joan M. – 1991
This manual provides practical information on the planning, organization, and operation of school libraries. Some of the guidelines differentiate between small libraries with minimal collections and larger, better-equipped libraries with more resources. Introductory materials include definitions of terms used in this manual. Guidelines are then…
Descriptors: Card Catalogs, Cataloging, Classification, Dewey Decimal Classification