NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Bobish, Greg – Journal of Academic Librarianship, 2011
This article examines the connection between ACRL information literacy standards and constructivist pedagogy. This connection is used to support use of Web 2.0 tools for information literacy instruction. Sample exercises using these tools are provided for each ACRL learning outcome, and the tools' suitability for the constructivist approach is…
Descriptors: Constructivism (Learning), Information Literacy, Library Instruction, Standards
Peer reviewed Peer reviewed
Direct linkDirect link
McMillen, Paula; Fabbi, Jennifer – Public Services Quarterly, 2010
Embedded librarianship is a relatively new term but is a fairly well-established stance in academic librarianship. While the terminology has certainly spawned new activities and vigorous new channels of communication, few are talking about the strategies for expanding and enhancing the position of the librarian and libraries organizationally once…
Descriptors: Academic Libraries, Librarians, Library Role, Case Studies
Peer reviewed Peer reviewed
Direct linkDirect link
Goss, Harold, Jr. – Journal of Library & Information Services In Distance Learning, 2010
The expectations placed on library instruction programs by the Association of College and Research Libraries are high. Many universities also include information literacy competencies as learning objectives to be assessed at the institutional level. With those standards in mind, it is becoming increasingly difficult to adequately educate students…
Descriptors: Web Sites, Electronic Publishing, Research Libraries, Information Literacy
Peer reviewed Peer reviewed
Direct linkDirect link
Kenton, Jeffrey; Blummer, Barbara – Community & Junior College Libraries, 2010
This paper explores the numerous definitions of digital literacy, discusses its relationship to information literacy, and describes applications of digital literacy instruction in institutions of higher education. It also offers opportunities for academic librarians, and especially those in junior and community colleges, to enhance students'…
Descriptors: Management Systems, Colleges, Information Literacy, Librarians
Peer reviewed Peer reviewed
Direct linkDirect link
Wales, Tim; Robertson, Penny – Program: Electronic Library and Information Systems, 2008
Purpose: The aim of this paper is to share the experiences and challenges faced by the Open University Library (OUL) in using screen capture software to develop online literature search tutorials. Design/methodology/approach: A summary of information literacy support at the OUL is provided as background information to explain the decision to…
Descriptors: Electronic Learning, Open Universities, Online Courses, Computer Uses in Education
Anderson, Mary Alice – Library Media Connection, 2005
It is argued that library media specialists should consider technology as integral to their jobs as they do literature and books and use it to create an active learning community. The many ways that technology can be used to enhance student achievement are discussed.
Descriptors: Media Specialists, Active Learning, School Libraries, Educational Technology
Riedl, Richard – School Library Media Activities Monthly, 1986
This basic introduction to three types of computer communications that school libraries can use describes bulletin board systems, information utilities, and bibliographic database systems. Examples are given of applications that would be useful for students and teachers. (EM)
Descriptors: Bibliographic Utilities, Computer Literacy, Computer Uses in Education, Databases
Alberta Dept. of Education, Edmonton. – 1999
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Descriptors: Check Lists, Computer Networks, Computer Security, Computer Software