Descriptor
Computer Software | 6 |
Library Equipment | 6 |
Library Planning | 6 |
Information Technology | 4 |
Libraries | 3 |
Library Administration | 3 |
Computer Security | 2 |
Costs | 2 |
Decision Making | 2 |
Internet | 2 |
Library Automation | 2 |
More ▼ |
Author
Boss, Richard W. | 1 |
Doering, William | 1 |
Ferrer, Daniel Fidel | 1 |
King, Monica | 1 |
Mead, Mary | 1 |
Reppert, James E. | 1 |
Simpson, Carol | 1 |
Publication Type
Reports - Descriptive | 6 |
Journal Articles | 4 |
Books | 1 |
Guides - Non-Classroom | 1 |
Education Level
Audience
Administrators | 1 |
Media Staff | 1 |
Practitioners | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ferrer, Daniel Fidel; Mead, Mary – Computers in Libraries, 2003
Describes spyware, discusses how it gets on a computer. Explains how spyware can be useful for parents, employers, and libraries. Discusses how spyware is more often used for others' gain or for surveillance without notification, how it can go undetected, and how libraries can help keep computers and patrons protected from remote installation of…
Descriptors: Computer Networks, Computer Security, Computer Software, Libraries
Doering, William – Computers in Libraries, 1999
Addresses how libraries can prepare for Y2K problems. Discusses technology that might be affected and equipment that should be examined, difficulty of fixing noncompliant hardware and software, identifying problem areas and developing solutions, and dealing with vendors. Includes a checklist of necessary preparations. (AEF)
Descriptors: Computer Oriented Programs, Computer Software, Information Technology, Libraries

King, Monica – Public Libraries, 1999
Describes one public library's development of a computer-security plan, along with helpful products used. Discussion includes Internet policy, physical protection of hardware, basic protection of the operating system and software on the network, browser dilemmas and maintenance, creating clear intuitive interface, and administering fair use and…
Descriptors: Computer Security, Computer Software, Information Policy, Information Technology
Simpson, Carol – Book Report, 1999
Discusses the processes involved in migrating a library's automation system. Highlights include getting information from vendor demonstrations, setting up an evaluation database to analyze RFPs (requests for proposals), making a spreadsheet that compares costs of packages, making recommendations once the data are analyzed, and implementation…
Descriptors: Computer Software, Computer System Design, Decision Making, Information Systems
Boss, Richard W. – 1997
One of the most significant decisions in a library administrator's career is the decision to automate one or more of a library's operations. This book describes the present state of local library automation; the planning, selection, and implementation process; and the library administrator's role in the process. The bulk of the text provides a…
Descriptors: Computer Software, Costs, Decision Making, Information Technology
Reppert, James E. – 1993
This paper describes the organizational scope, structure, and financial approach of a mock university higher education library media center (i.e., an instructional technology center which functions primarily as a curriculum or training support agency). The paper is organized according to objectives in four main categories. The first category is a…
Descriptors: Academic Libraries, Accreditation (Institutions), Budgets, Case Studies