Descriptor
Library Administration | 4 |
Guidelines | 2 |
Library Automation | 2 |
Library Personnel | 2 |
Library Planning | 2 |
Library Policy | 2 |
Strategic Planning | 2 |
Access to Information | 1 |
Change | 1 |
Change Strategies | 1 |
Compliance (Legal) | 1 |
More ▼ |
Source
Computers in Libraries | 4 |
Publication Type
Guides - Non-Classroom | 4 |
Journal Articles | 4 |
Reports - Descriptive | 3 |
Education Level
Audience
Administrators | 1 |
Practitioners | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Byerly, Greg – Computers in Libraries, 1990
Suggests guidelines to be followed by library administrators and managers to deal effectively with changes caused by the introduction of automation or technology projects within a library. The need for planning is emphasized, staff participation is stressed, adequate training and preparation are discussed, and financial planning is considered.…
Descriptors: Change, Change Strategies, Guidelines, Library Administration
Cunningham, Jim – Computers in Libraries, 1997
Identifies key issues and provides strategies for building a library Web site. Highlights include defining the purpose in accordance with what is technically possible; the server; connectivity; designation of responsibilities; page and link maintenance and enhancement; administrative organization, including a Web Governing Group, Web…
Descriptors: Library Administration, Library Development, Library Planning, Program Implementation
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources
Harris, Lesley Ellen – Computers in Libraries, 1998
Presents steps for creating copyright policies: appoint an officer; arrange access to a lawyer; understand copyright principles; know how copyright applies to Internet and CD-ROMs; understand permissions procedures; collect reference materials; use Internet information; understand international law; stay updated; attend seminars; educate others;…
Descriptors: Access to Information, Compliance (Legal), Copyrights, Electronic Mail