Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Library Administration | 19 |
| Library Policy | 19 |
| Users (Information) | 19 |
| Library Services | 10 |
| Library Personnel | 9 |
| Public Libraries | 7 |
| Policy Formation | 5 |
| Problems | 5 |
| Academic Libraries | 4 |
| Library Materials | 4 |
| Access to Information | 3 |
| More ▼ | |
Source
Author
Publication Type
| Journal Articles | 12 |
| Reports - Descriptive | 8 |
| Guides - Non-Classroom | 6 |
| Reports - Research | 5 |
| Books | 3 |
| Opinion Papers | 2 |
| Speeches/Meeting Papers | 2 |
| Non-Print Media | 1 |
| Reports - Evaluative | 1 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 2 |
Audience
| Media Staff | 3 |
| Practitioners | 3 |
| Administrators | 1 |
| Students | 1 |
Location
| Virginia | 2 |
| Australia | 1 |
| New Jersey | 1 |
| United Kingdom | 1 |
Laws, Policies, & Programs
| First Amendment | 3 |
Assessments and Surveys
What Works Clearinghouse Rating
Jetton, Lora Lennertz; Bailey, Alberta S. – Journal of Access Services, 2010
This article updates a previous article published in 1992 that described the role of the access services manager in policy formation. Since that time, the access services department and mission has matured and evolved to a prominent position within the library organization. Technological changes and innovation in the marketplace of wired and…
Descriptors: Administrator Role, Library Services, Policy Formation, Library Policy
Metz, Paul – College & Research Libraries, 2011
Circulation data from the Virginia Tech Libraries were analyzed to determine the extent of continuity or change between the author's study of the use of subject collections in 1982 and the present. Book circulation has declined, largely due to much less use by undergraduates. The overall profile of subject use has changed in ways traceable to…
Descriptors: Library Services, Library Materials, Library Research, Use Studies
Bernstein, Joan E. – Computers in Libraries, 2007
In this article, the author recounts her experience in 2005 as a library director at the Mount Laurel Library in New Jersey. She thought her people at the library were in fairly good shape in terms of the professional staff's understanding of the confidentiality rules governing their customer information. However, she was wrong. This was driven…
Descriptors: Professional Personnel, Confidentiality, Library Personnel, Library Administration
Evans, G. Edward – 1995
Designed to help library students gain an understanding of building library collections for specific communities of users, this text presents the process of collection development. Emphasizing collection development in general, rather than the process in any particular institutional setting, the book provides a discussion of needs assessment,…
Descriptors: Library Administration, Library Collection Development, Library Material Selection, Library Policy
Peer reviewedSarkodie-Mensah, Kwasi – Catholic Library World, 2000
Discusses the problem library patron from various fronts: historical, personality traits, importance of complaints, nature and types of problem patrons and their behavior, technology and the newly-bred problem patron, strategies for dealing with problem patrons, and ensuring that library administrators and other supervisors understand the need to…
Descriptors: Behavior Problems, Libraries, Library Administration, Library Policy
American Library Association Video/Library Video Network, Towson, MD. – 1994
This videotape is designed to help library staff develop and implement a security program in the library, using library personnel or outside security personnel. Eight sections cover: (1) how to design an effective security policy; (2) how to approach disruptive patrons; (3) personal safety--with disruptive patrons, during a robbery, and when…
Descriptors: Crime Prevention, Law Enforcement, Library Administration, Library Materials
Peer reviewedWinters, Sharon – Public Libraries, 1994
Describes building security procedures developed at the Hampton Public Library (Virginia) to deal with problem patrons. Highlights include need for the library monitor program; staffing patterns; monitor selection criteria; training procedures; library behavior guidelines; library policy statements; theft detection systems; and sample job…
Descriptors: Behavior Problems, Criteria, Guidelines, Library Administration
Kreamer, Jean Thibodeaux – Wilson Library Bulletin, 1994
Considers the role of public library trustees in censorship challenges. Topics addressed include the need for clear library policies concerning censorship; informing trustees about First Amendment rights, challenges regarding problem patrons and age restrictions, the trustee as citizen as well as board member, and the board's need for appropriate…
Descriptors: Age Discrimination, Censorship, Citizen Role, Governing Boards
Schuyler, Michael – Computers in Libraries, 1999
Suggests that a definitive court ruling is needed to better define rights and responsibilities related to the First Amendment and libraries' Internet use policies so that libraries can provide a comfortable environment for users while maintaining the law. Discusses filters; court cases; claims of the anti-porn cult; research studies on how much of…
Descriptors: Access to Information, Court Litigation, Information Policy, Internet
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources
Clark, James H. – Library Administration and Management, 1997
Discusses three major components of library security: physical security of the environment; operating procedures for library staff, the public, and security personnel; and a contract security force (or campus security in academic institutions.) Topics include risk management; maintenance; appropriate technology, including security systems and…
Descriptors: Alarm Systems, Appropriate Technology, Emergency Programs, Equipment Maintenance
Turner, Anne M. – 1993
Written from the perspective of a working director, this book is a guide to setting fair and appropriate behavior rules and training staff in how to implement them. Policies for exhibit and meeting room use; issues surrounding street people, the mentally ill, and substance abusers; sexual deviancy and parental child abuse in the library;…
Descriptors: Censorship, Child Abuse, Exhibits, Homeless People
Usherwood, Bob – 1995
There are many different approaches to the concept of "quality," which focus on both "what" defines the quality of a service and "who" defines quality. A study funded by the British Library (England) sought to define an approach to quality appropriate for the delivery and effective management of public library…
Descriptors: Evaluation Criteria, Foreign Countries, Library Administration, Library Facilities
Lorenzen, Michael – 1998
A survey was conducted in January 1997 to determine security issues of Ohio public libraries. The survey was distributed to 100 libraries of differing sizes with a 70% completion rate. The following questions were asked: (1) Do you believe that security is a problem at your library? (2) Do you believe that mutilation of periodicals is a problem at…
Descriptors: Aggression, Alarm Systems, Librarian Attitudes, Library Administration
Peck, Robert S. – 2000
Intended to be a practical guide to the issues that arise under the First Amendment for libraries that provide public access to the Internet, this book contains the following chapters: (1) "Questions and Answers about the First Amendment: Sex, Lies, and Cyberspace"; (2) "Basic First Amendment Principles and Their Application to…
Descriptors: Access to Information, Confidentiality, Elementary Secondary Education, Freedom of Speech
Previous Page | Next Page ยป
Pages: 1 | 2
Direct link
