Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Security | 13 |
Internet | 13 |
Library Services | 13 |
Access to Information | 5 |
Computer Software | 4 |
Information Technology | 4 |
Libraries | 4 |
Privacy | 4 |
Users (Information) | 4 |
Computer Networks | 3 |
Electronic Libraries | 3 |
More ▼ |
Source
Computers in Libraries | 6 |
Library Software Review | 2 |
OCLC Online Computer Library… | 1 |
Reference Librarian | 1 |
Author
Breeding, Marshall | 1 |
Briden, Judi | 1 |
Cheng, Kirby | 1 |
Ely, Donald P. | 1 |
Huang, Phil | 1 |
Kilpatrick, Thomas L., Ed. | 1 |
Kutty, Ashwin | 1 |
Lorenzen, Elizabeth A., Ed. | 1 |
Mutch, Andrew | 1 |
Nikkel, Terry | 1 |
Orr, Giles | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 10 |
Journal Articles | 9 |
Numerical/Quantitative Data | 2 |
Speeches/Meeting Papers | 2 |
Book/Product Reviews | 1 |
Reference Materials -… | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 1 |
Audience
Media Staff | 2 |
Location
Canada | 2 |
California | 1 |
France | 1 |
Germany | 1 |
Japan | 1 |
Michigan | 1 |
United Kingdom | 1 |
United Kingdom (England) | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Watkins, Donna – Computers in Libraries, 2006
Wireless hotspots are popping up in local coffee shops everywhere. Anyone with a wireless-ready laptop or PDA can surf the Internet at one of these hotspots. The same is now true for all 32 branches of the Orange County Public Library (OCPL) in California. Though many public library systems are moving toward wireless access, most require patrons…
Descriptors: Computer Networks, Telecommunications, Public Libraries, Internet
Cheng, Kirby – Computers in Libraries, 2005
When I first realized I'd been hacked, I thought, 'Oh, my God, they really did it!" While trying to recover from the shock, I had to call the supervisors of the departments with services affected by the loss of the library's server. In a seemingly calm voice, I told them one by one, "Sorry to let you know, our server is down; it has been hacked…
Descriptors: Internet, Libraries, Computer Security, Library Services
Huang, Phil – Computers in Libraries, 2007
By providing the public with online computing facilities, librarians make available a world of information resources beyond their traditional print materials. Internet-connected computers in libraries greatly enhance the opportunity for patrons to enjoy the benefits of the digital age. Unfortunately, as hackers become more sophisticated and…
Descriptors: Computers, Computer Software, Internet, Computer Security
Mutch, Andrew; Ventura, Karen – Computers in Libraries, 2006
Every place has it--coffee shops, bookstores, universities ... and now libraries are offering wireless Internet access too. At the Waterford Township Public Library (Waterford, Michigan), Andrew Mutch created a wide-open wireless network using Public IP open source software. About 20 miles away, at the Novi Public Library (Novi, Michigan), Karen…
Descriptors: Telecommunications, Computer Networks, Internet, Public Libraries
Breeding, Marshall – Computers in Libraries, 2005
Who can be trusted on the Web? These days, with identity theft seemingly rampant, it's more important than ever to take all possible measures to protect privacy and to shield personal information from those who might not have good intentions. Today, librarians also have to take reasonable precautions to ensure that the online services that they…
Descriptors: Web Sites, Librarians, Trust (Psychology), Internet
Storey, Tom, Ed. – OCLC Online Computer Library Center, Inc., 2007
The practice of using a social network to establish and enhance relationships based on some common ground--shared interests, related skills, or a common geographic location--is as old as human societies, but social networking has flourished due to the ease of connecting on the Web. This OCLC membership report explores this web of social…
Descriptors: Privacy, Foreign Countries, Social Networks, Internet

Orr, Giles – Library Software Review, 1998
Presents a method for libraries with limited budgets to create reliable Web servers with existing hardware and free software available via the Internet. Discusses staff, hardware and software requirements, and security; outlines the assembly process. (PEN)
Descriptors: Computer Security, Computer Software, Cost Effectiveness, Information Networks
Nikkel, Terry; Kutty, Ashwin – Computers in Libraries, 2004
Dalhousie is a medium-sized university, with about 15,000 FTE students, located in Halifax, Nova Scotia. It is one of Canada's oldest and most prestigious universities, yet, like many other public institutions, it frequently suffers from a lack of adequate funding to fulfill all the conflicting needs of the various faculties and departments. This…
Descriptors: Foreign Countries, Research Libraries, Internet, Library Services
Shaw, Beth Hansen – 1999
This document reports results of an online survey that examined practices and procedures in the management of electronic resources in 65 academic library reference departments. Responses are related to: (1) student population; (2) library use by community people; (3) number of public access workstations, workstations with World Wide Web access,…
Descriptors: Academic Libraries, Access to Information, Computer Security, Databases

Lorenzen, Elizabeth A., Ed. – Reference Librarian, 1996
This volume's topics include librarian role and ethical issues in Internet searching, strategies for locating career resources on the Internet and World Wide Web, career information for "Generation X" and for alumni, collaboration between libraries and university career services, career information gophers, and electronic privacy and…
Descriptors: Career Information Systems, Career Planning, Computer Security, Cooperative Programs
Ely, Donald P. – 1997
The definition, role, and functions of "library" are changing. The National Library of Education (NLE) is in transition from a traditional library to a virtual library encompassing "one stop [any stop] shopping" through conventional and digital means. To adequately plan for the transition, the customer and potential customers…
Descriptors: Access to Computers, Access to Information, Computer Security, Copyrights
Briden, Judi; Reeb, Brenda; Zhang, Allison – 1997
The Electronic Resources Team at the University of Rochester (New York) River Campus Libraries pursued the concept of one-stop shopping as a component of their new integrated library system Voyager, which debuted in January 1997. Faced with a growing variety of electronic resources with no single guide to their existence and access, the Team dealt…
Descriptors: Academic Libraries, Access to Information, Computer Networks, Computer Security

Kilpatrick, Thomas L., Ed. – Library Software Review, 1998
Provides annotations of 29 journal articles and six book reviews on a variety of topics related to technology in libraries, including collection development, computer-assisted instruction, databases, distance education, ergonomics, hardware, information technology, interlibrary loan and document supply, Internet, online catalogs, preservation,…
Descriptors: Annotated Bibliographies, Book Reviews, Computer Assisted Instruction, Computer Security