Descriptor
| Guidelines | 14 |
| Library Policy | 14 |
| Users (Information) | 14 |
| Access to Information | 7 |
| Academic Libraries | 5 |
| Higher Education | 5 |
| Internet | 5 |
| Policy Formation | 5 |
| Public Libraries | 5 |
| Behavior Problems | 4 |
| Legal Responsibility | 3 |
| More ▼ | |
Source
| Computers in Libraries | 2 |
| Public Libraries | 2 |
| Government Information… | 1 |
| Illinois Libraries | 1 |
| Journal of Information Ethics | 1 |
| RSR Reference Services Review | 1 |
| School Library Journal | 1 |
Author
| Bangs, Patricia | 1 |
| Benson, Allen C. | 1 |
| Bisom, Diane | 1 |
| Geiszler, Robert W. | 1 |
| Guenther, Kim | 1 |
| Jansen, Lloyd M. | 1 |
| Johnson, Denise J. | 1 |
| Kessler, Ridley | 1 |
| Lawrence, Tamiko Danielle | 1 |
| Leung, Shirley | 1 |
| McNeil, Beth | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 9 |
| Reports - Descriptive | 7 |
| Guides - Non-Classroom | 6 |
| Books | 2 |
| Guides - Classroom - Learner | 1 |
| Opinion Papers | 1 |
| Reports - Evaluative | 1 |
| Reports - Research | 1 |
Education Level
Audience
| Practitioners | 2 |
| Support Staff | 2 |
| Media Staff | 1 |
| Students | 1 |
Location
| Virginia | 1 |
Laws, Policies, & Programs
| First Amendment | 2 |
Assessments and Surveys
What Works Clearinghouse Rating
Guenther, Kim – Computers in Libraries, 2001
Considers how privacy issues related to online profiling affect library patrons and what librarians should do to protect them. Discusses the need for a privacy policy and provides guidelines from the OECD (Organisation for Economic Cooperation and Development) privacy statement generator that can be adapted for libraries. (LRW)
Descriptors: Electronic Libraries, Guidelines, Internet, Library Policy
Peer reviewedJansen, Lloyd M. – RSR Reference Services Review, 1993
Discusses academic library users who are not affiliated with the institution and considers the problems associated with them. Ethical issues are raised; possible solutions are suggested, including guidelines, bibliographic instruction, and user fees; and policies implemented at the University of California at Berkeley regarding unaffiliated users…
Descriptors: Academic Libraries, Ethics, Guidelines, Higher Education
Peer reviewedWinters, Sharon – Public Libraries, 1994
Describes building security procedures developed at the Hampton Public Library (Virginia) to deal with problem patrons. Highlights include need for the library monitor program; staffing patterns; monitor selection criteria; training procedures; library behavior guidelines; library policy statements; theft detection systems; and sample job…
Descriptors: Behavior Problems, Criteria, Guidelines, Library Administration
Benson, Allen C. – Computers in Libraries, 1998
Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…
Descriptors: Access to Information, Computer Security, Computer System Design, Guidelines
Peer reviewedGeiszler, Robert W. – Journal of Information Ethics, 1998
The case of an indigent library patron recovering a judgment against a public library is used as a backdrop for discussing patron behavior policies in the public library. Highlights include First Amendment rights, the public library as an expressive forum, government rules, policy lessons from the case, and acceptable policies. (AEF)
Descriptors: Access to Information, Behavior Problems, Civil Rights, Constitutional Law
Peer reviewedBangs, Patricia – Public Libraries, 1998
A Problem Task Force from the Fairfax County Public Library worked with other county agencies such as the police and social services to redesign a "Problem Behavior Manual" and present a training module for staff to better prepare them to deal with socially ill patrons. (Author/AEF)
Descriptors: Behavior Problems, Government Role, Guidelines, Information Services
Leung, Shirley; Bisom, Diane – 1996
The objectives of this survey were: to gather information on the development of institutional information technology policies and guidelines for responsible computing and use of electronic information; to identify the scope of such policies and guidelines; and to determine the role of the library in the development and/or use of the policies and…
Descriptors: Academic Libraries, Access to Information, Fair Use (Copyrights), Guidelines
Austin Community Coll., TX. – 1995
The Learning Resource Services (LRS) department at Austin Community College, in Texas, has developed a procedure for dealing with situations when a library user objects to items in a collection or display or protests that an item is not in the collection. First, three resources have been created to handle challenges. The LRS Materials Selection…
Descriptors: Community Colleges, Grievance Procedures, Guidelines, Learning Resources Centers
Peck, Robert S. – 2000
Intended to be a practical guide to the issues that arise under the First Amendment for libraries that provide public access to the Internet, this book contains the following chapters: (1) "Questions and Answers about the First Amendment: Sex, Lies, and Cyberspace"; (2) "Basic First Amendment Principles and Their Application to…
Descriptors: Access to Information, Confidentiality, Elementary Secondary Education, Freedom of Speech
McNeil, Beth; Johnson, Denise J. – 1996
This book provides strategies for dealing with negative patron behavior in the library and presents guidelines for identifying and effectively responding to, as well as preventing a variety of behavior problems. Fifteen librarians wrote the thirteen chapters, which are divided into three sections. Part 1 deals with patrons who pose the most…
Descriptors: Academic Libraries, Behavior Problems, Crime, Guidelines
Uhler, Scott F.; Weiss, Philippe R. – Illinois Libraries, 1996
With the 1996 defeat of the Communications Decency Act, under which providing offensive material on computer systems accessible to children would have become a felony, no legal guidelines exist for library use of the Internet. Libraries can avoid becoming the center of an Internet controversy by encouraging parental involvement; by protecting…
Descriptors: Access to Information, Censorship, Child Welfare, Computer Networks
Peer reviewedKessler, Ridley – Government Information Quarterly, 1998
Discusses the Wright State University (Ohio) Library policy directive on customer service, and suggests this document as a model to follow in setting up service standards or guidelines for depository-library services. Draft-depository library public-service guidelines for government information in electronic format are appended. (JAK)
Descriptors: Academic Libraries, Access to Information, Depository Libraries, Electronic Libraries
Palgi, Rebecca D. – School Library Journal, 1996
With increasing Internet access, library media specialists are implementing acceptable use policies to govern student conduct online. Policy components include definition and purpose; rights, responsibilities, and risks; penalties; and parental consent. Effective policies have input from all community members, are concise, and serve as guidelines…
Descriptors: Access to Information, Elementary Secondary Education, Guidelines, Information Policy
Lawrence, Tamiko Danielle; Thomas, Susan; Winston, Mark – 1998
The Peer Reference Counseling Program at Valdosta State University (Georgia) is a program designed to provide students with a unique opportunity to work at the Reference Desk at Odum Library. This program employs minority students and trains them to work at the Reference Desk answering basic reference questions and utilizing as well as…
Descriptors: Academic Libraries, Databases, Guidelines, Higher Education


