Descriptor
Computer Security | 9 |
Library Policy | 9 |
Internet | 6 |
Library Administration | 5 |
Library Planning | 5 |
Access to Information | 4 |
Computer Networks | 4 |
Library Equipment | 4 |
Users (Information) | 4 |
Information Technology | 3 |
Library Automation | 3 |
More ▼ |
Author
Benson, Allen C. | 2 |
Banerjee, Kyle | 1 |
Freedman, Maurice J. | 1 |
Ives, David J. | 1 |
King, Monica | 1 |
Shaw, Beth Hansen | 1 |
Uhler, Scott F. | 1 |
Weiss, Philippe R. | 1 |
Williams, Robert L. | 1 |
Publication Type
Journal Articles | 6 |
Reports - Descriptive | 5 |
Guides - Non-Classroom | 4 |
Books | 1 |
Numerical/Quantitative Data | 1 |
Reports - Research | 1 |
Tests/Questionnaires | 1 |
Education Level
Audience
Administrators | 1 |
Practitioners | 1 |
Location
New York | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Banerjee, Kyle – Computers in Libraries, 2003
Explains how to keep library systems healthy and functioning by taking sensible security measures. Examines why hackers would target library systems and how library systems are compromised. Describes tools that can help, including: firewalls; antivirus software; alarms; network analysis tools; and encryption. Identifies several strategies for…
Descriptors: Computer Networks, Computer Security, Libraries, Library Administration
Williams, Robert L. – 2001
This manual is intended to provide a free resource on essential network security concepts for non-technical managers of small libraries. Managers of other small nonprofit or community organizations will also benefit from it. An introduction defines network security; outlines three goals of network security; discusses why a library should be…
Descriptors: Computer Networks, Computer Security, Libraries, Library Administration
Benson, Allen C. – 1998
This handbook is designed to help readers identify and eliminate security risks, with sound recommendations and library-tested security software. Chapter 1 "Managing Your Facilities and Assessing Your Risks" addresses fundamental management responsibilities including planning for a secure system, organizing computer-related information, assessing…
Descriptors: Computer Security, Computer Software, Computer System Design, Information Systems

King, Monica – Public Libraries, 1999
Describes one public library's development of a computer-security plan, along with helpful products used. Discussion includes Internet policy, physical protection of hardware, basic protection of the operating system and software on the network, browser dilemmas and maintenance, creating clear intuitive interface, and administering fair use and…
Descriptors: Computer Security, Computer Software, Information Policy, Information Technology
Benson, Allen C. – Computers in Libraries, 1998
Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…
Descriptors: Access to Information, Computer Security, Computer System Design, Guidelines
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources
Freedman, Maurice J. – Library Journal, 1996
Committed to utilizing information technology, the Westchester Library System (New York) made the World Wide Web publicly accessible. Describes the planning, implementation, and management process; obstacles involving financing; establishing Internet connectivity; and vendor negotiations. Westchester hired a Web manager, created Internet use…
Descriptors: Access to Information, Computer Security, Financial Support, Information Technology
Uhler, Scott F.; Weiss, Philippe R. – Illinois Libraries, 1996
With the 1996 defeat of the Communications Decency Act, under which providing offensive material on computer systems accessible to children would have become a felony, no legal guidelines exist for library use of the Internet. Libraries can avoid becoming the center of an Internet controversy by encouraging parental involvement; by protecting…
Descriptors: Access to Information, Censorship, Child Welfare, Computer Networks
Shaw, Beth Hansen – 1999
This document reports results of an online survey that examined practices and procedures in the management of electronic resources in 65 academic library reference departments. Responses are related to: (1) student population; (2) library use by community people; (3) number of public access workstations, workstations with World Wide Web access,…
Descriptors: Academic Libraries, Access to Information, Computer Security, Databases