Descriptor
| Computer Security | 2 |
| Information Systems | 2 |
| Internet | 2 |
| Library Policy | 2 |
| Access to Information | 1 |
| Censorship | 1 |
| Child Welfare | 1 |
| Computer Networks | 1 |
| Computer Software | 1 |
| Computer System Design | 1 |
| Confidentiality | 1 |
| More ▼ | |
Source
| Illinois Libraries | 1 |
Publication Type
| Books | 1 |
| Guides - Non-Classroom | 1 |
| Journal Articles | 1 |
| Reports - Descriptive | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Benson, Allen C. – 1998
This handbook is designed to help readers identify and eliminate security risks, with sound recommendations and library-tested security software. Chapter 1 "Managing Your Facilities and Assessing Your Risks" addresses fundamental management responsibilities including planning for a secure system, organizing computer-related information, assessing…
Descriptors: Computer Security, Computer Software, Computer System Design, Information Systems
Uhler, Scott F.; Weiss, Philippe R. – Illinois Libraries, 1996
With the 1996 defeat of the Communications Decency Act, under which providing offensive material on computer systems accessible to children would have become a felony, no legal guidelines exist for library use of the Internet. Libraries can avoid becoming the center of an Internet controversy by encouraging parental involvement; by protecting…
Descriptors: Access to Information, Censorship, Child Welfare, Computer Networks


