Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 10 |
Descriptor
Computer Security | 16 |
Librarians | 16 |
Internet | 10 |
Information Technology | 6 |
Library Services | 6 |
Computer Networks | 5 |
Privacy | 5 |
Access to Information | 4 |
Computer Mediated… | 3 |
Computer Software | 3 |
Computers | 3 |
More ▼ |
Source
Computers in Libraries | 6 |
Education Digest: Essential… | 1 |
Journal of Web Librarianship | 1 |
Knowledge Quest | 1 |
Library Journal | 1 |
Linworth | 1 |
OCLC Online Computer Library… | 1 |
Reference Librarian | 1 |
Teacher Librarian | 1 |
Author
Lorenzen, Elizabeth A., Ed. | 2 |
Bahr, Ellen | 1 |
Balas, Janet L. | 1 |
Breeding, Marshall | 1 |
Endicott-Popovsky, Barbara | 1 |
Field, Judy | 1 |
Hodgins, Dave | 1 |
Jim Belair | 1 |
Kim, Ann | 1 |
Lewis, Morgan V. | 1 |
Nicole Waskie-Laura | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 13 |
Journal Articles | 12 |
Reports - Evaluative | 2 |
Books | 1 |
Guides - Non-Classroom | 1 |
Numerical/Quantitative Data | 1 |
Education Level
Elementary Secondary Education | 2 |
Higher Education | 1 |
Audience
Media Staff | 2 |
Policymakers | 1 |
Location
California | 1 |
Canada | 1 |
Colorado | 1 |
France | 1 |
Germany | 1 |
Japan | 1 |
New York | 1 |
Ohio | 1 |
United Kingdom | 1 |
United Kingdom (England) | 1 |
United States | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Jim Belair; Nicole Waskie-Laura – Knowledge Quest, 2021
How can school librarians change the view of school librarians to better match the reality of their work? One way is to increase their explicit connections with broad, recognizable initiatives, like digital fluency and computer science. The The New York State Computer Science and Digital Fluency (CS/DF) Standards, in alignment with the "AASL…
Descriptors: School Libraries, Librarians, Role, Educational Technology
Ohler, Jason – Education Digest: Essential Readings Condensed for Quick Review, 2012
The reality of students' cyber lives has thrust upon educators a new approach: creating character education programs tuned to digital youth that are proactive and aggressive. This will help integrate students' digital activities within the context of the communities in which they live, both local and digital. The digital age beckons a new era of…
Descriptors: Virtual Classrooms, Caring, Ethics, Personality
Endicott-Popovsky, Barbara – Teacher Librarian, 2009
Without specific education in online safety and security issues, putting any limitations on access could seem counter to what a librarian is trained to do. At a cybersecurity workshop sponsored by Washington Library Media Association (WLMA) last October, an informal show of hands from attending teacher-librarians uncovered a range of motivations…
Descriptors: Safety, Internet, School Policy, Librarians
Hodgins, Dave – Journal of Web Librarianship, 2010
The explosion of Web 2.0 into libraries has left many smaller academic libraries (and other libraries with limited computing resources or support) to work in the cloud using free Web applications. The use of commercial Web hosting is an innovative approach to the problem of inadequate local resources. While the idea of insourcing IT will seem…
Descriptors: Computers, Academic Libraries, Internet, Word Processing
Linworth, 2012
If you're new to running a library or looking for a refresher, this book can serve as your first reference source for school library operation, providing overview information on a wealth of topics, lists of resources for more in-depth information, and coverage of current topics such as Web 2.0, fundraising, digital booktalks, and cybersafety.…
Descriptors: Fund Raising, Library Administration, School Libraries, Library Automation
Semmelroth, Jim – Computers in Libraries, 2006
Asmall library's essential technical problem is that it has to chart a course through the technology shoals without a navigator on board. Small libraries in small towns often have a very low level of technical skill on staff. Furthermore, obtaining skilled technical support can frequently be pretty expensive. Even when one is available, a clever…
Descriptors: Public Libraries, Library Services, Computer Networks, Computer Security
Roberts, Gary – Computers in Libraries, 2006
An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…
Descriptors: Computer Security, Libraries, Librarians, Computer Networks
Bahr, Ellen – Computers in Libraries, 2007
What would technological librarians like to see in the next generation of Integrated Library Systems (ILS)? This question was asked of several well- known library technology experts, and their responses are presented in this article. Survey respondents expressed a clear desire for the following features and functionality: (1) Direct, read-only…
Descriptors: Libraries, Internet, Library Automation, Computer Mediated Communication
Balas, Janet L. – Computers in Libraries, 2005
Although some people feel that there should be no expectation of privacy in a library because it is a public place, the debate on the library's obligation to protect patron privacy continues. Despite the media attention given to some notorious breaches of privacy (for example, the hacking of Paris Hilton's electronic address book), and the…
Descriptors: Privacy, Public Libraries, Computer Security, Federal Legislation
Field, Judy – Computers in Libraries, 1998
Reviews the Internet and intranets, private communications networks within organizations. Examines extranets (organization's intranet offering password-protected external customer and supplier access to selected portions of its intranet) highlighting the viewpoint of librarians. Discusses extranet issues (security, access, user satisfaction),…
Descriptors: Access to Information, Computer Security, Computer Software Development, Corporations
Breeding, Marshall – Computers in Libraries, 2005
Who can be trusted on the Web? These days, with identity theft seemingly rampant, it's more important than ever to take all possible measures to protect privacy and to shield personal information from those who might not have good intentions. Today, librarians also have to take reasonable precautions to ensure that the online services that they…
Descriptors: Web Sites, Librarians, Trust (Psychology), Internet
Storey, Tom, Ed. – OCLC Online Computer Library Center, Inc., 2007
The practice of using a social network to establish and enhance relationships based on some common ground--shared interests, related skills, or a common geographic location--is as old as human societies, but social networking has flourished due to the ease of connecting on the Web. This OCLC membership report explores this web of social…
Descriptors: Privacy, Foreign Countries, Social Networks, Internet
Kim, Ann – Library Journal, 2006
This article discusses the possible answers to most librarians' questions and how advanced and hi-technology help them in the library world. Many of the answers to librarians' questions regarding digital media depend upon community/patron awareness and library resources. In this article, the author presents some quoted statements from electronic…
Descriptors: Librarians, Library Services, Library Development, Information Retrieval
Lorenzen, Elizabeth A., Ed. – 1996
This book contains 11 papers examining career planning and job searching in the information age. The following papers are included: "The Librarian's Role in the Job Search of the Future: Issues and Ethics in the Electronic Environment" (Elizabeth A. Lorenzen); "The Internet as Career, Job, and Employment Resource: Transition, Assimilation,…
Descriptors: Career Education, Career Planning, Computer Security, Ethics

Lorenzen, Elizabeth A., Ed. – Reference Librarian, 1996
This volume's topics include librarian role and ethical issues in Internet searching, strategies for locating career resources on the Internet and World Wide Web, career information for "Generation X" and for alumni, collaboration between libraries and university career services, career information gophers, and electronic privacy and…
Descriptors: Career Information Systems, Career Planning, Computer Security, Cooperative Programs
Previous Page | Next Page ยป
Pages: 1 | 2