Descriptor
Source
| Computers in Libraries | 4 |
Publication Type
| Journal Articles | 4 |
| Reports - Descriptive | 2 |
| Guides - Non-Classroom | 1 |
| Opinion Papers | 1 |
| Reports - Evaluative | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Banerjee, Kyle – Computers in Libraries, 2003
Explains how to keep library systems healthy and functioning by taking sensible security measures. Examines why hackers would target library systems and how library systems are compromised. Describes tools that can help, including: firewalls; antivirus software; alarms; network analysis tools; and encryption. Identifies several strategies for…
Descriptors: Computer Networks, Computer Security, Libraries, Library Administration
Feinman, Valerie Jackson – Computers in Libraries, 1999
Discussion of strategic planning in libraries focuses on a five-step process based on academic libraries. Highlights include a situational and environmental analysis; development of organizational direction, including vision, mission, and objectives; formulation of the strategic plan; implementation; and control, feedback, and evaluation. (LRW)
Descriptors: Academic Libraries, Evaluation Methods, Feedback, Higher Education
Banks, Michael A. – Computers in Libraries, 1998
Examines issues and decision-making involved in restricting Internet access in libraries, for the most part favoring filtering devices. Questions to consider when selecting a filtering program are provided. Some of the better filtering programs are described, and Web addresses are included for each. Security risks associated with Java and…
Descriptors: Access to Information, Censorship, Computer Software, Computer Software Evaluation
Benson, Allen C. – Computers in Libraries, 1998
Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…
Descriptors: Access to Information, Computer Security, Computer System Design, Guidelines


