Descriptor
Access to Information | 4 |
Computer Security | 4 |
Internet | 4 |
Library Policy | 4 |
Users (Information) | 3 |
Guidelines | 2 |
Information Technology | 2 |
Library Planning | 2 |
Academic Libraries | 1 |
Censorship | 1 |
Child Welfare | 1 |
More ▼ |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 2 |
Guides - Non-Classroom | 1 |
Numerical/Quantitative Data | 1 |
Reports - Research | 1 |
Tests/Questionnaires | 1 |
Education Level
Audience
Location
New York | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Benson, Allen C. – Computers in Libraries, 1998
Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…
Descriptors: Access to Information, Computer Security, Computer System Design, Guidelines
Freedman, Maurice J. – Library Journal, 1996
Committed to utilizing information technology, the Westchester Library System (New York) made the World Wide Web publicly accessible. Describes the planning, implementation, and management process; obstacles involving financing; establishing Internet connectivity; and vendor negotiations. Westchester hired a Web manager, created Internet use…
Descriptors: Access to Information, Computer Security, Financial Support, Information Technology
Uhler, Scott F.; Weiss, Philippe R. – Illinois Libraries, 1996
With the 1996 defeat of the Communications Decency Act, under which providing offensive material on computer systems accessible to children would have become a felony, no legal guidelines exist for library use of the Internet. Libraries can avoid becoming the center of an Internet controversy by encouraging parental involvement; by protecting…
Descriptors: Access to Information, Censorship, Child Welfare, Computer Networks
Shaw, Beth Hansen – 1999
This document reports results of an online survey that examined practices and procedures in the management of electronic resources in 65 academic library reference departments. Responses are related to: (1) student population; (2) library use by community people; (3) number of public access workstations, workstations with World Wide Web access,…
Descriptors: Academic Libraries, Access to Information, Computer Security, Databases