NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
North, William D. – Journal of Library Administration, 1986
Identifies the tasks that the library administrator must complete if the collection is to successfully withstand censorship. Using an analogy of the construction, arming, and manning of a "citadel," a strategy is presented which is adaptable to the broadest range of attack on collection, acquisition, and dissemination policies of…
Descriptors: Censorship, Intellectual Freedom, Library Administration, Library Collection Development
Peer reviewed Peer reviewed
Born, Kathleen – Journal of Library Administration, 1992
Presents the vendor's perspective on how libraries choose and evaluate a vendor's performance. Characteristics of vendors are described, including being profit-oriented, market-driven, and highly competitive; issues in the three basic areas of service, price, and automation are discussed; and the influence of personality is considered. (LRW)
Descriptors: Competition, Evaluation Criteria, Evaluation Methods, Library Acquisition
Peer reviewed Peer reviewed
Allen, Susan M. – Journal of Library Administration, 1998
Addresses the problems of how theft in libraries and archives is discovered, the proper aims of any recovery plan, actions that must included in the recovery plan, and the impact of a theft and recovery effort on the department. Offers concrete solutions vital to any recovery effort. (AEF)
Descriptors: Archives, Crime, Libraries, Library Administration
Peer reviewed Peer reviewed
Clark, Edward F. – Journal of Library Administration, 1998
Presents information on law enforcement relating to library crimes. Discusses jurisdiction, reporting a loss, law enforcement response, law enforcement's expectations, suspects, publicity, the aftermath, and testimony in court. (AEF)
Descriptors: Crime, Guidelines, Law Enforcement, Legal Problems
Peer reviewed Peer reviewed
Chadwick, William E. – Journal of Library Administration, 1998
Because of the high incidence of special-collections thefts and embezzlements during the past decade, library management must reassess its "user friendly" philosophy for both library patrons and employees. An internal control system is described. Causes of theft, and policies and procedures for protecting the collection are discussed. (AEF)
Descriptors: Archives, Crime, Libraries, Library Administration
Peer reviewed Peer reviewed
Webster, Judy – Journal of Library Administration, 1993
Provides an overview of traditional allocation methods for academic library materials budgets and describes a study conducted at the University of Tennessee Libraries that analyzed the MARC records of highly circulated titles to discover patterns of commonality that could be used in future selection work. (Contains 10 references.) (LRW)
Descriptors: Academic Libraries, Bibliographic Records, Budgeting, Higher Education
Peer reviewed Peer reviewed
Hamaker, Charles A. – Journal of Library Administration, 1992
Discusses the use of library management data, particularly circulation data, in making selection decisions for library collection development based on experiences at Louisiana State University. Development of a collection based on actual use rather than perceived research needs is considered, and the decision-making process for serials…
Descriptors: Academic Libraries, Decision Making, Higher Education, Library Administration