NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 12 results Save | Export
Willems, Harry – Computers in Libraries, 1998
Argues that Internet filters are censorship tools that rob librarians of their materials selection responsibility. Six factors that make filters unacceptable are listed. The discussion covers pornography; filter improvements; proposals and solutions; ALA (American Library Association) Bill of Rights to Electronic Information; and library policy…
Descriptors: Access to Information, Censorship, Computer Software, Decision Making
Peer reviewed Peer reviewed
Cubbage, Charlotte – Reference Librarian, 2002
Discusses problems with patron Internet access in academic libraries and describes a study conducted at Northwestern University (Illinois) that used Internet tracking software to assess user Internet behavior. Topics include Internet use policies; pornography; and loss of control over library services and information content that is provided. (LRW)
Descriptors: Academic Libraries, Behavior Problems, Computer Software, Higher Education
Peer reviewed Peer reviewed
Schrader, Alvin – Teacher Librarian, 1999
Describes and critiques emerging issues about Internet access in schools and school libraries. Discusses software products for filtering and rating expressive content on the Internet, reader-response-theory implications for filtering and rating Internet content, ambiguities, and the role of school librarians and acceptable-use policies. (AEF)
Descriptors: Access to Information, Computer Software, Elementary Secondary Education, Information Policy
Peer reviewed Peer reviewed
Chapin, Betty – Teacher Librarian, 1999
Reviews the technological, political, professional, and educational issues associated with filtering or blocking access to electronic information. Suggests strategies for handling the unique situations that might arise in school libraries and outlines age-appropriate alternatives to filtering. (AEF)
Descriptors: Access to Information, Computer Software, Elementary Secondary Education, Information Policy
Benson, Allen C. – 1998
This handbook is designed to help readers identify and eliminate security risks, with sound recommendations and library-tested security software. Chapter 1 "Managing Your Facilities and Assessing Your Risks" addresses fundamental management responsibilities including planning for a secure system, organizing computer-related information, assessing…
Descriptors: Computer Security, Computer Software, Computer System Design, Information Systems
Peer reviewed Peer reviewed
King, Monica – Public Libraries, 1999
Describes one public library's development of a computer-security plan, along with helpful products used. Discussion includes Internet policy, physical protection of hardware, basic protection of the operating system and software on the network, browser dilemmas and maintenance, creating clear intuitive interface, and administering fair use and…
Descriptors: Computer Security, Computer Software, Information Policy, Information Technology
Banks, Michael A. – Computers in Libraries, 1998
Examines issues and decision-making involved in restricting Internet access in libraries, for the most part favoring filtering devices. Questions to consider when selecting a filtering program are provided. Some of the better filtering programs are described, and Web addresses are included for each. Security risks associated with Java and…
Descriptors: Access to Information, Censorship, Computer Software, Computer Software Evaluation
Coyle, Karen – American Libraries, 1997
To prevent vastly different Internet access policies from creating uneven service for patrons from community to community, the author argues that librarians, as the logical champions, must define "universal service." Offers hardware, software, Internet functions, training, and service as some of the elements of access that should be…
Descriptors: Access to Information, Computer Software, Computers, Information Services
Bennett, Valerie M.; Palmer, Eileen M. – Microcomputers for Information Management, 1993
Compares the use of a telefacsimile network and the Internet-based software, Ariel, for interlibrary loan document delivery in the Health Sciences Libraries Consortium. Topics discussed include document processing efficiency, impact of the Ariel workstations on interlibrary loan procedures, interlibrary loan policies, and possible prototype…
Descriptors: Comparative Analysis, Computer Networks, Computer Software, Consortia
Truett, Carol; And Others – Learning & Leading with Technology, 1997
Provides advice for making school Internet-use guidelines. Outlines responsible proactive use of the Internet for educators and librarians, discusses strengths and weaknesses of Internet blocking software and rating systems, and describes acceptable-use policies (AUP). Lists resources for creating your own AUP, Internet filtering software, and…
Descriptors: Access to Information, Computer Software, Computer Uses in Education, Educational Policy
Peer reviewed Peer reviewed
Siegel, Loren – Update on Law-Related Education, 1998
Reviews problems with using blocking software to regulate children's access to areas of the Internet deemed inappropriate. Discusses how blocking software functions, and provides examples of types of consequences that can result. Points out an upcoming court case on the use of blocking software by public libraries and schools. (DSK)
Descriptors: Access to Information, Censorship, Children, Civics
Peer reviewed Peer reviewed
Taylor, Bruce – Update on Law-Related Education, 1998
Supports the use of filtering software by parents, schools, and libraries as a least restrictive alternative to criminal prosecution to restrict the availability of pornographic materials on the Internet. Argues that filtering programs work well and do not make most of the mistakes attributed to them by detractors. (DSK)
Descriptors: Access to Information, Censorship, Children, Civics