NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Bowers, Stacey L. – Journal of Academic Librarianship, 2006
This paper summarizes the history of privacy as it relates to library records. It commences with a discussion of how the concept of privacy first originated through case law and follows the concept of privacy as it has affected library records through current day and the "USA PATRIOT Act."
Descriptors: Privacy, Libraries, Library Services, Library Policy
Drobnicki, John A. – 1992
Many activities that take place in the library, including circulation and interlibrary loan and reserve requests, result in the creation of records linking clients to specific kinds of information. Several groups, including law enforcement officials, have attempted on various occasions to gain access to these records. This research paper provides…
Descriptors: Confidential Records, Confidentiality, Constitutional Law, Court Litigation
Peer reviewed Peer reviewed
Direct linkDirect link
Ward, David; Kern, M. Kathleen – portal: Libraries and the Academy, 2006
Driven by studies showing that Millennials (ages 18-24) have adopted IM (instant messaging) as a standard communications medium, many libraries are reaching out to their own patrons in this way. At the same time, some of these libraries have invested thousands of dollars in vendor-based chat reference solutions that provide duplicate…
Descriptors: Library Services, Outreach Programs, Computer Mediated Communication, Time
Peer reviewed Peer reviewed
Lorenzen, Elizabeth A., Ed. – Reference Librarian, 1996
This volume's topics include librarian role and ethical issues in Internet searching, strategies for locating career resources on the Internet and World Wide Web, career information for "Generation X" and for alumni, collaboration between libraries and university career services, career information gophers, and electronic privacy and…
Descriptors: Career Information Systems, Career Planning, Computer Security, Cooperative Programs