Descriptor
| Computer Software | 22 |
| Library Policy | 22 |
| Internet | 12 |
| Access to Information | 10 |
| Higher Education | 8 |
| Information Policy | 6 |
| Library Services | 6 |
| Elementary Secondary Education | 5 |
| World Wide Web | 5 |
| Academic Libraries | 4 |
| Censorship | 4 |
| More ▼ | |
Source
Author
| Arsenault, Clement | 1 |
| Bakken, Lori | 1 |
| Banks, Michael A. | 1 |
| Bennett, Valerie M. | 1 |
| Benson, Allen C. | 1 |
| Chapin, Betty | 1 |
| Coyle, Karen | 1 |
| Cubbage, Charlotte | 1 |
| Detlor, Brian | 1 |
| Fong, Yem | 1 |
| Hockey, Susan | 1 |
| More ▼ | |
Publication Type
Education Level
Audience
| Media Staff | 2 |
| Practitioners | 2 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Valauskas, Edward J. – Library Journal, 1992
Defines copyright and examines the interests of computer software publishers. Issues related to the rights of libraries in the circulation of software are discussed, including the fair use principle, software vendors' licensing agreements, and cooperation between libraries and vendors. An inset describes procedures for internal auditing of…
Descriptors: Audits (Verification), Computer Software, Contracts, Copyrights
Bakken, Lori; Miller, Michael M. – 1992
This guide presents the policies and procedures used by the North Dakota State University Libraries for indexing "The Forum," a daily newspaper serving eastern North Dakota and western Minnesota. The guide includes lists of material to be included and excluded, timetables for updating the index, duties of the editor and the library…
Descriptors: College Libraries, Computer Software, Databases, Guidelines
Peer reviewedMurray, Peter E. – Information Technology and Libraries, 2001
Outlines the use of proxy Web servers by libraries and reports on a survey on their use in libraries. Highlights include proxy use for remote resource access, for filtering, for bandwidth conservation, and for gathering statistics; privacy policies regarding the use of proxy server log files; and a copy of the survey. (LRW)
Descriptors: Access to Information, Computer Software, Library Policy, Library Services
Willems, Harry – Computers in Libraries, 1998
Argues that Internet filters are censorship tools that rob librarians of their materials selection responsibility. Six factors that make filters unacceptable are listed. The discussion covers pornography; filter improvements; proposals and solutions; ALA (American Library Association) Bill of Rights to Electronic Information; and library policy…
Descriptors: Access to Information, Censorship, Computer Software, Decision Making
Peer reviewedCubbage, Charlotte – Reference Librarian, 2002
Discusses problems with patron Internet access in academic libraries and describes a study conducted at Northwestern University (Illinois) that used Internet tracking software to assess user Internet behavior. Topics include Internet use policies; pornography; and loss of control over library services and information content that is provided. (LRW)
Descriptors: Academic Libraries, Behavior Problems, Computer Software, Higher Education
Peer reviewedSchrader, Alvin – Teacher Librarian, 1999
Describes and critiques emerging issues about Internet access in schools and school libraries. Discusses software products for filtering and rating expressive content on the Internet, reader-response-theory implications for filtering and rating Internet content, ambiguities, and the role of school librarians and acceptable-use policies. (AEF)
Descriptors: Access to Information, Computer Software, Elementary Secondary Education, Information Policy
Peer reviewedChapin, Betty – Teacher Librarian, 1999
Reviews the technological, political, professional, and educational issues associated with filtering or blocking access to electronic information. Suggests strategies for handling the unique situations that might arise in school libraries and outlines age-appropriate alternatives to filtering. (AEF)
Descriptors: Access to Information, Computer Software, Elementary Secondary Education, Information Policy
Benson, Allen C. – 1998
This handbook is designed to help readers identify and eliminate security risks, with sound recommendations and library-tested security software. Chapter 1 "Managing Your Facilities and Assessing Your Risks" addresses fundamental management responsibilities including planning for a secure system, organizing computer-related information, assessing…
Descriptors: Computer Security, Computer Software, Computer System Design, Information Systems
Peer reviewedDetlor, Brian; Arsenault, Clement – Online Information Review, 2002
Discusses the role of intelligent agents in facilitating the seeking and retrieval of information in Web-based library environments. Highlights include an overview of agents; current applications in library domains; an agent-based model for libraries; the design of interface agents; and implications for library policy and digital collections.…
Descriptors: Computer Interfaces, Computer Software, Computer Software Development, Electronic Libraries
Peer reviewedKing, Monica – Public Libraries, 1999
Describes one public library's development of a computer-security plan, along with helpful products used. Discussion includes Internet policy, physical protection of hardware, basic protection of the operating system and software on the network, browser dilemmas and maintenance, creating clear intuitive interface, and administering fair use and…
Descriptors: Computer Security, Computer Software, Information Policy, Information Technology
Banks, Michael A. – Computers in Libraries, 1998
Examines issues and decision-making involved in restricting Internet access in libraries, for the most part favoring filtering devices. Questions to consider when selecting a filtering program are provided. Some of the better filtering programs are described, and Web addresses are included for each. Security risks associated with Java and…
Descriptors: Access to Information, Censorship, Computer Software, Computer Software Evaluation
Coyle, Karen – American Libraries, 1997
To prevent vastly different Internet access policies from creating uneven service for patrons from community to community, the author argues that librarians, as the logical champions, must define "universal service." Offers hardware, software, Internet functions, training, and service as some of the elements of access that should be…
Descriptors: Access to Information, Computer Software, Computers, Information Services
Weaver-Meyers, Pat; Fong, Yem – Library Administration and Management, 1995
Presents issues from a debate about interlibrary loan (ILL) policies and the use of union lists on the OCLC (Online Computer Library Center) ILL subsystem. Highlights include library funding, costs of maintaining serials holdings on a utility, borrowing procedures, quality service, workload leveling, staffing, and problems with OCLC system…
Descriptors: Computer Software, Debate, Interlibrary Loans, Library Expenditures
Bennett, Valerie M.; Palmer, Eileen M. – Microcomputers for Information Management, 1993
Compares the use of a telefacsimile network and the Internet-based software, Ariel, for interlibrary loan document delivery in the Health Sciences Libraries Consortium. Topics discussed include document processing efficiency, impact of the Ariel workstations on interlibrary loan procedures, interlibrary loan policies, and possible prototype…
Descriptors: Comparative Analysis, Computer Networks, Computer Software, Consortia
Truett, Carol; And Others – Learning & Leading with Technology, 1997
Provides advice for making school Internet-use guidelines. Outlines responsible proactive use of the Internet for educators and librarians, discusses strengths and weaknesses of Internet blocking software and rating systems, and describes acceptable-use policies (AUP). Lists resources for creating your own AUP, Internet filtering software, and…
Descriptors: Access to Information, Computer Software, Computer Uses in Education, Educational Policy
Previous Page | Next Page ยป
Pages: 1 | 2

