NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Strassberg, Richard – Reference Librarian, 1997
Examines an effective response to library or archive theft and vandalism of valuable materials: the restricted access reading room. Discusses the need for an alert staff, user identification, restriction of carry-in items, electronic surveillance, record keeping, limits to quantities of collection materials, exiting procedure, photocopying, theft…
Descriptors: Access to Information, Archives, Library Collections, Library Personnel
Peer reviewed Peer reviewed
Direct linkDirect link
Koulouris, Alexandros; Kapidakis, Sarantos – Journal of Librarianship and Information Science, 2005
The access and reproduction policies of the digital collections of 10 leading university digital libraries worldwide are classified according to factors such as the creation type of the material, acquisition method, copyright ownership etc. The relationship of these factors is analysed, showing how acquisition methods and copyright ownership…
Descriptors: Library Policy, Reprography, Access to Information, Electronic Libraries
Peer reviewed Peer reviewed
Sager, Don – Public Libraries, 2001
Identifies public library policies, programs, services, or practices that have ruined customer relations and offers suggestions on how they could have been avoided. Highlights include automated telephone answering systems; staff monitoring of computer use; self-service equipment, particularly photocopiers; release forms; staff parking; loan…
Descriptors: Access to Computers, Legal Responsibility, Library Circulation, Library Personnel