NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 12 results Save | Export
Guenther, Kim – Computers in Libraries, 2001
Considers how privacy issues related to online profiling affect library patrons and what librarians should do to protect them. Discusses the need for a privacy policy and provides guidelines from the OECD (Organisation for Economic Cooperation and Development) privacy statement generator that can be adapted for libraries. (LRW)
Descriptors: Electronic Libraries, Guidelines, Internet, Library Policy
Balas, Janet L. – Computers in Libraries, 2001
Discusses privacy issues related to electronic libraries. Highlights include finding guidance and information on the Web, including the American Library Association, Center for Democracy and Technology, and the Electronic Privacy Information Center; legal responsibilities in maintaining privacy rights of patrons who access the Internet; and…
Descriptors: Electronic Libraries, Internet, Legal Responsibility, Library Policy
Peer reviewed Peer reviewed
Cubbage, Charlotte – Reference Librarian, 2002
Discusses problems with patron Internet access in academic libraries and describes a study conducted at Northwestern University (Illinois) that used Internet tracking software to assess user Internet behavior. Topics include Internet use policies; pornography; and loss of control over library services and information content that is provided. (LRW)
Descriptors: Academic Libraries, Behavior Problems, Computer Software, Higher Education
Oder, Norman – Library Journal, 1997
The public library has become the locus for public anxiety about children's access to objectionable material on the Internet. Discusses Judith Krug's (Director of the American Library Association Office for Intellectual Freedom) defense of unrestricted access, acceptable use, and filtering software. Highlights six filtering programs (client and…
Descriptors: Access to Information, Children, Computer Software Evaluation, Intellectual Freedom
Benson, Allen C. – Computers in Libraries, 1998
Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…
Descriptors: Access to Information, Computer Security, Computer System Design, Guidelines
Schuyler, Michael – Computers in Libraries, 1999
Suggests that a definitive court ruling is needed to better define rights and responsibilities related to the First Amendment and libraries' Internet use policies so that libraries can provide a comfortable environment for users while maintaining the law. Discusses filters; court cases; claims of the anti-porn cult; research studies on how much of…
Descriptors: Access to Information, Court Litigation, Information Policy, Internet
Peck, Robert S. – 2000
Intended to be a practical guide to the issues that arise under the First Amendment for libraries that provide public access to the Internet, this book contains the following chapters: (1) "Questions and Answers about the First Amendment: Sex, Lies, and Cyberspace"; (2) "Basic First Amendment Principles and Their Application to…
Descriptors: Access to Information, Confidentiality, Elementary Secondary Education, Freedom of Speech
Uhler, Scott F.; Weiss, Philippe R. – Illinois Libraries, 1996
With the 1996 defeat of the Communications Decency Act, under which providing offensive material on computer systems accessible to children would have become a felony, no legal guidelines exist for library use of the Internet. Libraries can avoid becoming the center of an Internet controversy by encouraging parental involvement; by protecting…
Descriptors: Access to Information, Censorship, Child Welfare, Computer Networks
Shaw, Beth Hansen – 1999
This document reports results of an online survey that examined practices and procedures in the management of electronic resources in 65 academic library reference departments. Responses are related to: (1) student population; (2) library use by community people; (3) number of public access workstations, workstations with World Wide Web access,…
Descriptors: Academic Libraries, Access to Information, Computer Security, Databases
Palgi, Rebecca D. – School Library Journal, 1996
With increasing Internet access, library media specialists are implementing acceptable use policies to govern student conduct online. Policy components include definition and purpose; rights, responsibilities, and risks; penalties; and parental consent. Effective policies have input from all community members, are concise, and serve as guidelines…
Descriptors: Access to Information, Elementary Secondary Education, Guidelines, Information Policy
Grygierczyk, Natalia – 1996
This paper investigates the need for electronic provision of information, and advises that the purpose and motivation for providing electronic resources be explored before embarking on a project to provide them. Many projects at universities and other institutes have been begun arbitrarily just because there happened to be financial resources…
Descriptors: Academic Libraries, Computer Networks, Electronic Libraries, Foreign Countries
Whitesides, William L., Sr., Ed. – 1998
This book, written by graduate students at the Catholic University (District of Columbia) School of Library and Information Science, examines current priorities, policies, and practices of public libraries. Following an introduction, "Reinventing Libraries: Responding to the Forces of Change" (Lisa Crisman), chapters include: (1) "A…
Descriptors: Access to Information, Appropriate Technology, Change, Cultural Context