Descriptor
| Archives | 3 |
| Library Collections | 3 |
| Library Personnel | 3 |
| Library Policy | 3 |
| Stealing | 3 |
| Users (Information) | 2 |
| Access to Information | 1 |
| Crime | 1 |
| Evaluation | 1 |
| Information Policy | 1 |
| Libraries | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 3 |
| Reports - Descriptive | 3 |
| Guides - Non-Classroom | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedStrassberg, Richard – Reference Librarian, 1997
Examines an effective response to library or archive theft and vandalism of valuable materials: the restricted access reading room. Discusses the need for an alert staff, user identification, restriction of carry-in items, electronic surveillance, record keeping, limits to quantities of collection materials, exiting procedure, photocopying, theft…
Descriptors: Access to Information, Archives, Library Collections, Library Personnel
Peer reviewedTrinkaus-Randall, Gregor – Journal of Library Administration, 1998
Firm policies and procedures that address the environment, patron/staff behavior, general attitude, and care and handling of materials need to be at the core of the library/archival security program. Discussion includes evaluating a repository's security needs, collections security, security in non-public areas, security in the reading room,…
Descriptors: Archives, Evaluation, Information Policy, Library Collections
Peer reviewedChadwick, William E. – Journal of Library Administration, 1998
Because of the high incidence of special-collections thefts and embezzlements during the past decade, library management must reassess its "user friendly" philosophy for both library patrons and employees. An internal control system is described. Causes of theft, and policies and procedures for protecting the collection are discussed. (AEF)
Descriptors: Archives, Crime, Libraries, Library Administration


