Descriptor
| Library Policy | 3 |
| Reprography | 3 |
| Access to Information | 2 |
| Library Personnel | 2 |
| Library Services | 2 |
| Academic Libraries | 1 |
| Access to Computers | 1 |
| Archives | 1 |
| Classification | 1 |
| Copyrights | 1 |
| Electronic Libraries | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 3 |
| Reports - Descriptive | 3 |
| Guides - Non-Classroom | 1 |
Education Level
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
| Media Staff | 1 |
Location
| District of Columbia | 1 |
| Illinois | 1 |
| Massachusetts | 1 |
| New Hampshire | 1 |
| New York | 1 |
| New Zealand | 1 |
| North Carolina | 1 |
| Spain | 1 |
| United Kingdom (England) | 1 |
| United Kingdom (Scotland) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedStrassberg, Richard – Reference Librarian, 1997
Examines an effective response to library or archive theft and vandalism of valuable materials: the restricted access reading room. Discusses the need for an alert staff, user identification, restriction of carry-in items, electronic surveillance, record keeping, limits to quantities of collection materials, exiting procedure, photocopying, theft…
Descriptors: Access to Information, Archives, Library Collections, Library Personnel
Koulouris, Alexandros; Kapidakis, Sarantos – Journal of Librarianship and Information Science, 2005
The access and reproduction policies of the digital collections of 10 leading university digital libraries worldwide are classified according to factors such as the creation type of the material, acquisition method, copyright ownership etc. The relationship of these factors is analysed, showing how acquisition methods and copyright ownership…
Descriptors: Library Policy, Reprography, Access to Information, Electronic Libraries
Peer reviewedSager, Don – Public Libraries, 2001
Identifies public library policies, programs, services, or practices that have ruined customer relations and offers suggestions on how they could have been avoided. Highlights include automated telephone answering systems; staff monitoring of computer use; self-service equipment, particularly photocopiers; release forms; staff parking; loan…
Descriptors: Access to Computers, Legal Responsibility, Library Circulation, Library Personnel

Direct link
