NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Dula, Michael; Jacobsen, Lynne; Ferguson, Tyler; Ross, Rob – Computers in Libraries, 2012
This article presents the story of how Pepperdine University migrated its library management functions to the cloud using what is now known as OCLC's WorldShare Management Services (WMS). The story of implementing this new service is told from two vantage points: (1) that of the library; and (2) that of the service provider. The authors were the…
Descriptors: Pilot Projects, Library Administration, Management Systems, Internet
Gharst, Loretta – Computers in Libraries, 2010
The rumored death of librarianship caused by the advent of technology has not, and will not, come to pass. In this article, the author describes how technology has exponentially increased the librarian's ability to provide library service at the Calcasieu Parish Public Library, where she serves as head of Collection & Computing Services. The…
Descriptors: Public Libraries, Library Services, Librarians, Library Administration
Bernstein, Joan E. – Computers in Libraries, 2007
In this article, the author recounts her experience in 2005 as a library director at the Mount Laurel Library in New Jersey. She thought her people at the library were in fairly good shape in terms of the professional staff's understanding of the confidentiality rules governing their customer information. However, she was wrong. This was driven…
Descriptors: Professional Personnel, Confidentiality, Library Personnel, Library Administration
Schuyler, Michael – Computers in Libraries, 1999
Suggests that a definitive court ruling is needed to better define rights and responsibilities related to the First Amendment and libraries' Internet use policies so that libraries can provide a comfortable environment for users while maintaining the law. Discusses filters; court cases; claims of the anti-porn cult; research studies on how much of…
Descriptors: Access to Information, Court Litigation, Information Policy, Internet
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources