Descriptor
Source
Computers in Libraries | 10 |
Author
Allmang, Nancy | 1 |
Banerjee, Kyle | 1 |
Benson, Allen C. | 1 |
Ferrer, Daniel Fidel | 1 |
Marks, Kenneth E. | 1 |
Mead, Mary | 1 |
Morgan, Eric Lease | 1 |
Pezzulo, Judy | 1 |
Sathan, Eleanor | 1 |
Saunders, Laverna | 1 |
Schaake, Glenda | 1 |
More ▼ |
Publication Type
Journal Articles | 10 |
Reports - Descriptive | 9 |
Guides - Non-Classroom | 2 |
Opinion Papers | 1 |
Reference Materials -… | 1 |
Education Level
Audience
Location
Canada | 1 |
Colorado | 1 |
Pennsylvania | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Saunders, Laverna – Computers in Libraries, 1992
Reports on a postconference workshop on virtual libraries that was presented at the third annual Computers in Libraries Canada Conference. Highlights include networks; technological change; administrative issues, including organizational structure, staff training, strategic planning, and financial resources; a case study of the University of…
Descriptors: Case Studies, Computer Networks, Conferences, Electronic Journals
Banerjee, Kyle – Computers in Libraries, 2003
Explains how to keep library systems healthy and functioning by taking sensible security measures. Examines why hackers would target library systems and how library systems are compromised. Describes tools that can help, including: firewalls; antivirus software; alarms; network analysis tools; and encryption. Identifies several strategies for…
Descriptors: Computer Networks, Computer Security, Libraries, Library Administration
Ferrer, Daniel Fidel; Mead, Mary – Computers in Libraries, 2003
Describes spyware, discusses how it gets on a computer. Explains how spyware can be useful for parents, employers, and libraries. Discusses how spyware is more often used for others' gain or for surveillance without notification, how it can go undetected, and how libraries can help keep computers and patrons protected from remote installation of…
Descriptors: Computer Networks, Computer Security, Computer Software, Libraries
Morgan, Eric Lease – Computers in Libraries, 1999
Considers ways in which library services can be more proactive in today's networked-computer environment. Discusses how to find and use patterns of behavior, such as borrowing behavior and profiles of patrons' interests; making a CD-ROM with information describing the library's services and products; and reviving telephone reference. (LRW)
Descriptors: Behavior Patterns, Computer Networks, Library Circulation, Library Planning
Schaake, Glenda; Sathan, Eleanor – Computers in Libraries, 2003
Memorial Hall Library in Andover, Massachusetts wanted to offer live reference service online but with limited resources, they couldn't do it alone. The 24/7 Reference cooperative program administered by the California State Library required Memorial Hall's librarians to monitor only 10 hours a week in return for live reference coverage. Memorial…
Descriptors: Cooperative Programs, Information Networks, Information Services, Library Cooperation
Benson, Allen C. – Computers in Libraries, 1998
Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…
Descriptors: Access to Information, Computer Security, Computer System Design, Guidelines
Allmang, Nancy – Computers in Libraries, 2003
Discusses the planning for wireless technology at the research library of the National Institute of Standards and Technology (NIST). Highlights include computer equipment, including laptops and PDAs; local area networks; equipment loan service; writing a business plan; infrastructure; training programs; and future considerations, including…
Descriptors: Computer Printers, Futures (of Society), Library Circulation, Library Planning
Marks, Kenneth E.; And Others – Computers in Libraries, 1993
This special section on local area networks includes three articles: (1) a description of migration at Joyner Library, East Carolina University (North Carolina) to a new network server; (2) a discussion of factors to consider for network planning in school libraries; and (3) a directory of companies supplying cable, hardware, software, and…
Descriptors: College Libraries, Computer Software, Computer System Design, Elementary Secondary Education
Sisler, Eric; Smith, Veronica – Computers in Libraries, 2000
Describes library automation issues during the planning and construction of College Hill Library (Colorado), a joint-use facility shared by a community college and a public library. Discuses computer networks; hardware selection; public access to catalogs and electronic resources; classification schemes and bibliographic data; children's…
Descriptors: Access to Information, Bibliographic Records, Childrens Libraries, Classification
Pezzulo, Judy – Computers in Libraries, 1993
Discusses the present status of technology use by students in Pennsylvania public school libraries, including membership in ACCESS PENNSYLVANIA, the statewide interlibrary loan network. The role of library media specialists in developing outcome-based curricula to facilitate use of technology tools is considered. (EA)
Descriptors: Access to Information, Curriculum Development, Elementary Secondary Education, Information Technology