Descriptor
Source
Author
| Bartlett, Virginia | 1 |
| Bazillion, Richard J. | 1 |
| Billington, James H. | 1 |
| Boyer, Janice | 1 |
| Brinkerhoff, Kathie | 1 |
| Bunge, Charles A. | 1 |
| Davis, Marc | 1 |
| Dixon, Judith | 1 |
| Field, Dorothy | 1 |
| Fish, James | 1 |
| Fong, Yem | 1 |
| More ▼ | |
Publication Type
| Reports - Descriptive | 20 |
| Journal Articles | 19 |
| Guides - Non-Classroom | 2 |
| Opinion Papers | 2 |
| Historical Materials | 1 |
| Information Analyses | 1 |
Education Level
Audience
| Media Staff | 1 |
| Practitioners | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Uhler, Scott; Weiss, Philippe – Illinois Libraries, 1995
As a result of the 1992 federal appellate court decision, "Kreimer versus Morristown," libraries have the right to define appropriate patron behavior while in a library and to address behavior considered disruptive. Discusses details of the case and practical interpretations of the ruling. (JKP)
Descriptors: Behavior, Court Litigation, Libraries, Library Policy
Davis, Marc; Boyer, Janice – 1996
The problem of food and drink in libraries and the potential damage to library materials that may occur have always been troublesome issues. Most attempts to totally eliminate food and drink have produced mixed results at best and libraries have expended precious staff time trying to enforce such rules. The food and drink issue is particularly…
Descriptors: Academic Libraries, Change Strategies, Higher Education, Library Materials
Peer reviewedSarkodie-Mensah, Kwasi – Catholic Library World, 2000
Discusses the problem library patron from various fronts: historical, personality traits, importance of complaints, nature and types of problem patrons and their behavior, technology and the newly-bred problem patron, strategies for dealing with problem patrons, and ensuring that library administrators and other supervisors understand the need to…
Descriptors: Behavior Problems, Libraries, Library Administration, Library Policy
Hyman, Karen; Field, Dorothy – American Libraries, 1997
There are no foolproof solutions to Internet access in libraries. This article lists selected library solutions, what not to do, and what to do: pick a common-sense approach, focus on customer service, keep an open mind, avoid accepting or repeating hearsay, and find common ground. Includes highlights of the Orange County (FL) Library System's…
Descriptors: Access to Information, Censorship, Information Dissemination, Intellectual Freedom
Peer reviewedJansen, Lloyd M. – RSR Reference Services Review, 1993
Discusses academic library users who are not affiliated with the institution and considers the problems associated with them. Ethical issues are raised; possible solutions are suggested, including guidelines, bibliographic instruction, and user fees; and policies implemented at the University of California at Berkeley regarding unaffiliated users…
Descriptors: Academic Libraries, Ethics, Guidelines, Higher Education
Peer reviewedBrinkerhoff, Kathie – Government Information Quarterly, 2000
Discusses problems facing federal depository libraries regarding patron behavior when using Web sites. Topics include acceptable use policies; existing laws and enforcement offices; protecting library property; pornography, including child pornography; sexual harassment; and other forms of staff harassment. (LRW)
Descriptors: Depository Libraries, Federal Government, Federal Programs, Laws
Shuman, Bruce A. – American Libraries, 1996
Libraries' commitment to open access can jeopardize personal safety. Violent incidents are increasing in libraries due to factors such as evening hours, variety of clientele, and flaws in building design and materials arrangement. This article provides ideas on how to create a safer library environment and on factors to consider when preparing…
Descriptors: Access to Information, Crime Prevention, Institutional Environment, Library Facilities
Peer reviewedMajka, David R. – RSR: Reference Services Review, 1996
Reviews the research on maintaining information currency in reference collections. Discusses age versus use; continuity of maintenance; problems with irregularly published works; manual maintenance methods; computer-assisted methods; assignment of responsibility; and collection management/maintenance policies. Suggests how to improve reference…
Descriptors: Information Needs, Information Technology, Library Administration, Library Collection Development
Keller, Daniel P. – Library Administration and Management, 1997
Discussion of violence in the workplace focuses on libraries. Highlights include types of violence in libraries; recognizing warning signs of employee violence; preventive action; and strategies for a safer library, including appropriate security systems and other devices. (LRW)
Descriptors: Alarm Systems, Crime Prevention, Employees, Libraries
Billington, James H. – American Libraries, 1996
The Librarian of Congress addresses the increasing security threats to the collection at the Library of Congress that caused him to close library stacks, increase police patrol, install surveillance cameras and alarm systems, create material inventories, and limit patron privileges. Many of the security functions are being assessed and monitored…
Descriptors: Access to Information, Alarm Systems, Consultants, Crime Prevention
Weaver-Meyers, Pat; Fong, Yem – Library Administration and Management, 1995
Presents issues from a debate about interlibrary loan (ILL) policies and the use of union lists on the OCLC (Online Computer Library Center) ILL subsystem. Highlights include library funding, costs of maintaining serials holdings on a utility, borrowing procedures, quality service, workload leveling, staffing, and problems with OCLC system…
Descriptors: Computer Software, Debate, Interlibrary Loans, Library Expenditures
Peer reviewedDixon, Judith – Public Libraries, 1996
The Dallas Public Library surveyed 21 surrounding public library systems to help identify barriers that limit children's use of public libraries. Describes identified barriers, examines causes of the barriers, and offers possible solutions. Tables present study results and list discontinued and current library outreach programs. (JMV)
Descriptors: Access to Information, Children, Library Equipment, Library Facilities
Peer reviewedWatson, Mark – Resource Sharing & Information Networks, 1997
Examines the pros and cons of providing access to the World Wide Web for library patrons as well as suggesting solutions to problems. Discusses the establishment of a library policy governing the use of the Web, as well as the importance of workshops and instructional materials on Web use in libraries. (Author/AEF)
Descriptors: Access to Computers, Access to Information, Internet, Library Instruction
Peer reviewedOlsen, Margaret S. – International Information and Library Review, 1995
Presents a historical background of effects that the end of the Cold War had on Slavic and East European collections, and focuses on declines in the acquisition of new materials via blanket orders and exchanges. Examines results of a survey of Slavic librarians to determine acquisition sources. Tables display survey responses. (JMV)
Descriptors: Change Agents, Exchange Programs, Foreign Countries, Librarians
Peer reviewedLanier, Don; Wilkins, Walter – RQ, 1994
Discusses the use of the Internet for ready reference and considers limitations, reference policy, and cost issues. Highlights include general reference sources; database searching on the Internet; Gopher; bibliographic control and access to Internet resources; personnel issues; and levels of service. (Contains 30 references.) (LRW)
Descriptors: Access to Information, Cataloging, Computer Networks, Costs
Previous Page | Next Page ยป
Pages: 1 | 2

