NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20260
Since 20250
Since 2022 (last 5 years)0
Since 2017 (last 10 years)0
Since 2007 (last 20 years)1
Education Level
Location
Cambodia1
Idaho1
Laws, Policies, & Programs
First Amendment2
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 25 results Save | Export
Berry, John N., III – Library Journal, 2000
Describes Martha B. Gould's agenda for the United States National Commission on Libraries and Information Science (NCLIS). Highlights include: political savvy and the National Technical Information Service; Internet policy for libraries; her status as the first public librarian to chair NCLIS; library education; federal responsibility in library…
Descriptors: Federal Government, Government Role, Internet, Libraries
Peer reviewed Peer reviewed
Direct linkDirect link
Johnson, Jason – Knowledge Quest, 2007
While the need for a data retention policy is rapidly becoming clear to schools, little guidance is available for crafting one. Most schools depend on backup and recovery plans that generally focus on individual servers or devices. However, retention policies also need to focus on the type of data contained on those servers and how it will be…
Descriptors: Boards of Education, Library Policy, Retention (Psychology), Client Server Architecture
Peer reviewed Peer reviewed
Direct linkDirect link
Bowers, Stacey L. – Journal of Academic Librarianship, 2006
This paper summarizes the history of privacy as it relates to library records. It commences with a discussion of how the concept of privacy first originated through case law and follows the concept of privacy as it has affected library records through current day and the "USA PATRIOT Act."
Descriptors: Privacy, Libraries, Library Services, Library Policy
Banerjee, Kyle – Computers in Libraries, 2003
Explains how to keep library systems healthy and functioning by taking sensible security measures. Examines why hackers would target library systems and how library systems are compromised. Describes tools that can help, including: firewalls; antivirus software; alarms; network analysis tools; and encryption. Identifies several strategies for…
Descriptors: Computer Networks, Computer Security, Libraries, Library Administration
Uhler, Scott; Weiss, Philippe – Illinois Libraries, 1995
As a result of the 1992 federal appellate court decision, "Kreimer versus Morristown," libraries have the right to define appropriate patron behavior while in a library and to address behavior considered disruptive. Discusses details of the case and practical interpretations of the ruling. (JKP)
Descriptors: Behavior, Court Litigation, Libraries, Library Policy
Peer reviewed Peer reviewed
Stelk, Roger; Lu, Suping – Reference Librarian, 1997
Discusses philosophical issues and human elements in reference desk scheduling for public and academic libraries, highlighting institutionalization of a desk scheduling policy, the relationship between scheduler and schedulee (impartiality, consistency, flexibility, collegiality, diplomacy, dedication to reference service), and conflict management…
Descriptors: Collegiality, Conflict Resolution, Librarians, Libraries
Porck, Henk J. – 1996
This report provides an update of the possibilities and limitations of currently available mass deacidification methods, focusing on the major developments in research and application of the main operational systems. This study is intended primarily to support the development of a well-considered preservation policy by librarians and archivists,…
Descriptors: Archives, Chemical Reactions, History, Libraries
Allison, Rinda Y.; Uhler, Scott F. – Illinois Libraries, 1998
Discusses library policy and Internet access, highlighting (1) legal distinctions between books and the Internet; (2) ways to restrict access without violating First Amendment rights; (3) the library as a limited public forum rather than a traditional public forum; and (4) the library's governmental interest in protecting children. (PEN)
Descriptors: Access to Information, Censorship, Children, Internet
Peer reviewed Peer reviewed
Sarkodie-Mensah, Kwasi – Catholic Library World, 2000
Discusses the problem library patron from various fronts: historical, personality traits, importance of complaints, nature and types of problem patrons and their behavior, technology and the newly-bred problem patron, strategies for dealing with problem patrons, and ensuring that library administrators and other supervisors understand the need to…
Descriptors: Behavior Problems, Libraries, Library Administration, Library Policy
Peer reviewed Peer reviewed
Buck, Richard M. – Reference Librarian, 1994
Discusses censorship of the arts and humanities in libraries. Highlights include statistics regarding school and school library challenges; reactions to controversial art in public places; Madonna's book "Sex" and the resulting protests; and what librarians can do, including materials selection policies. (LRW)
Descriptors: Censorship, Elementary Secondary Education, Fine Arts, Libraries
Johnson, Carolyn – Wilson Library Bulletin, 1993
Discusses the use of signs in libraries and lists 12 steps to create successful signage. Highlights include consistency, location, color, size, lettering, types of material, user needs, signage policy, planning, in-house fabrication versus vendors, and evaluation, A selected bibliography of 24 sources of information on library signage is included.…
Descriptors: Color, Evaluation Needs, Graphic Arts, Guidelines
Peer reviewed Peer reviewed
Chadwick, William E. – Journal of Library Administration, 1998
Because of the high incidence of special-collections thefts and embezzlements during the past decade, library management must reassess its "user friendly" philosophy for both library patrons and employees. An internal control system is described. Causes of theft, and policies and procedures for protecting the collection are discussed. (AEF)
Descriptors: Archives, Crime, Libraries, Library Administration
Chepesiuk, Ron – Wilson Library Bulletin, 1992
Describes efforts to conserve library materials in Cambodia being undertaken by a Cornell University library program. Topics discussed include the absence of educated librarians; environmental problems, including insects; an absence of preservation facilities and supplies; a lack of policies for the National Library; and physical and bibliographic…
Descriptors: Developing Nations, Foreign Countries, Higher Education, Librarians
Braun, Linda W. – School Library Journal, 1998
Describes selected commercial and academic Web sites providing interactive services (Amazon; Jones Library, Amherst, MA; Pine Crest Lower School, Ft. Lauderdale, FL; Barnes & Noble; Cal State's Information Literacy Tutorials; PBS's techknow site; K.I.D.S. Report), and argues that libraries that stop at links and policy statements miss…
Descriptors: Business, Computer Uses in Education, Guides, Higher Education
Coyle, Karen – American Libraries, 1997
To prevent vastly different Internet access policies from creating uneven service for patrons from community to community, the author argues that librarians, as the logical champions, must define "universal service." Offers hardware, software, Internet functions, training, and service as some of the elements of access that should be…
Descriptors: Access to Information, Computer Software, Computers, Information Services
Previous Page | Next Page ยป
Pages: 1  |  2