NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)8
Location
Canada1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 19 results Save | Export
Barrera-Gomez, Julianna; Erway, Ricky – OCLC Online Computer Library Center, Inc., 2013
This document is a companion to the report, "You've Got to Walk before You Can Run: First Steps for Managing Born-Digital Content Received on Physical Media." Like the "First Steps" report, the intended audience is those who are just starting to manage born-digital materials, from those wondering where to begin, to those who…
Descriptors: Archives, Electronic Publishing, Documentation, Computer Software
Diamanduros, Terry; Downs, Elizabeth – Library Media Connection, 2011
Technology has changed the school yard or neighborhood bully. It no longer requires physical intimidation to be a bully. In fact, bullying can be done anonymously, on or off campus, and physical size does not enter into the scenario. Every year headlines identify children who take their own lives as a result of being victims of various forms of…
Descriptors: Bullying, School Libraries, Educational Technology, Media Specialists
Kaye, Alan L. – Library Journal, 2008
Take a look around the bus or subway and see just how many people are bumping along to an iPod or an MP3 player. What they are listening to is their secret, but the many signature earbuds in sight should give one a real sense of just how pervasive digital audio has become. This article describes how that popularity is mirrored in library audio…
Descriptors: Library Services, Audio Equipment, Library Materials, Public Libraries
Peer reviewed Peer reviewed
Direct linkDirect link
Shelton, Kay – Community & Junior College Libraries, 2009
The media often report on the negativity of Facebook, with horror stories of people losing their jobs because of something they posted. There can be useful purposes for Facebook, however, especially after the unthinkable happens on a college campus. Community college libraries can incorporate Facebook into their security planning.
Descriptors: Community Colleges, College Libraries, Social Networks, Computer Mediated Communication
Balas, Janet L. – Computers in Libraries, 2006
It is easy for a library systems administrator to sometimes feel quite overwhelmed by the responsibilities of the job. Keeping a network running smoothly is a challenge in itself, but they must also be concerned with protecting the network from the many threats that exist. Constant vigilance is necessary to guard against electronic attacks…
Descriptors: Computer Security, Emergency Programs, Libraries, Information Systems
Huang, Phil – Computers in Libraries, 2007
By providing the public with online computing facilities, librarians make available a world of information resources beyond their traditional print materials. Internet-connected computers in libraries greatly enhance the opportunity for patrons to enjoy the benefits of the digital age. Unfortunately, as hackers become more sophisticated and…
Descriptors: Computers, Computer Software, Internet, Computer Security
Roberts, Gary – Computers in Libraries, 2006
An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…
Descriptors: Computer Security, Libraries, Librarians, Computer Networks
Breeding, Marshall – Computers in Libraries, 2005
Many libraries are or soon will be offering Wi-Fi, also known as wireless networks. The largest perceived barriers to providing this service are concerns about security. The prime rule when deploying Wi-Fi is segregation, having a clear separation between a public wireless network and the rest of the library?s network. A number of devices can be…
Descriptors: Libraries, Internet, Computer Networks, Computer Security
Balas, Janet – Computers in Libraries, 2005
This article, written by a systems librarian at the Monroeville Public Library, discusses a major issue affecting all computer users, security. It indicates that while, staying up-to-date on the latest security issues has become essential for all computer users, it's more critical for network managers who are responsible for securing computer…
Descriptors: Public Libraries, Computers, Computer Security, Computer Software
Breeding, Marshall – Computers in Libraries, 2005
Who can be trusted on the Web? These days, with identity theft seemingly rampant, it's more important than ever to take all possible measures to protect privacy and to shield personal information from those who might not have good intentions. Today, librarians also have to take reasonable precautions to ensure that the online services that they…
Descriptors: Web Sites, Librarians, Trust (Psychology), Internet
Peer reviewed Peer reviewed
Lavagnino, Merri Beth – Library Hi Tech, 1997
When the Committee on Institutional Cooperation (CIC), an academic consortium of 12 major teaching and research universities began implementing the Virtual Electronic Library, a Continuum of Security Needs list was created which outlines the security and authentication issues that must be addressed. The thirteen security items on the list are…
Descriptors: Academic Libraries, Computer Security, Consortia, Electronic Libraries
Peer reviewed Peer reviewed
Fore, Julie A. – Library Hi Tech, 1997
Introduces concepts of server security and includes articles and sidebars of firsthand accounts of consequences of not devoting enough time to security measures. Outlines the following factors to consider when evaluating a server's risk potential: confidentiality/reproducibility of the data; complexity of the system; backup system and hardware…
Descriptors: Computer Networks, Computer Security, Computer System Design, Data
Peer reviewed Peer reviewed
Breeding, Michael – Library Hi Tech, 1997
Focuses on designing a library network to maximize security. Discusses UNIX and file servers; connectivity to campus, corporate networks and the Internet; separation of staff from public servers; controlling traffic; the threat of network sniffers; hubs that eliminate eavesdropping; dividing the network into subnets; Switched Ethernet;…
Descriptors: Computer Networks, Computer Security, Computer System Design, Internet
Peer reviewed Peer reviewed
McClellan, Gregory A.; Garrison, William V. – Library Hi Tech, 1997
Illustrates an approach for providing networked access to licensed databases over the Internet by positioning the library between patron and vendor. Describes how the gateway systems and database connection servers work and discusses how treatment of security has evolved with the introduction of the World Wide Web. Outlines plans to reimplement…
Descriptors: Access to Information, Computer Networks, Computer Security, Databases
Peer reviewed Peer reviewed
Cole, Timothy W. – Library Hi Tech, 1997
Describes the security issues Bluestem, a Web authentication and access control system under development at the University of Illinois at Urbana-Champaign, is designed to resolve. Provides an overview of how Bluestem works and details how Bluestem is currently being used to control end-user access to bibliographic resources licensed by the…
Descriptors: Access to Information, Computer Security, Computer System Design, Higher Education
Previous Page | Next Page ยป
Pages: 1  |  2