Descriptor
| Computer Security | 2 |
| Library Personnel | 2 |
| Library Policy | 2 |
| Users (Information) | 2 |
| Academic Libraries | 1 |
| Access to Information | 1 |
| Computer Interfaces | 1 |
| Computer Networks | 1 |
| Databases | 1 |
| Electronic Mail | 1 |
| Higher Education | 1 |
| More ▼ | |
Source
| Computers in Libraries | 1 |
Author
| Ives, David J. | 1 |
| Shaw, Beth Hansen | 1 |
Publication Type
| Guides - Non-Classroom | 1 |
| Journal Articles | 1 |
| Numerical/Quantitative Data | 1 |
| Reports - Descriptive | 1 |
| Reports - Research | 1 |
| Tests/Questionnaires | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources
Shaw, Beth Hansen – 1999
This document reports results of an online survey that examined practices and procedures in the management of electronic resources in 65 academic library reference departments. Responses are related to: (1) student population; (2) library use by community people; (3) number of public access workstations, workstations with World Wide Web access,…
Descriptors: Academic Libraries, Access to Information, Computer Security, Databases


