Descriptor
| Computer Software | 4 |
| Library Services | 4 |
| Workstations | 4 |
| Academic Libraries | 3 |
| Higher Education | 3 |
| Access to Computers | 2 |
| Computer Networks | 2 |
| Computer Security | 2 |
| Cost Effectiveness | 2 |
| Computer Printers | 1 |
| Computer Selection | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 4 |
| Reports - Descriptive | 3 |
| Reports - Research | 1 |
Education Level
Audience
Location
| Kansas | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Sendze, Monique – Computers in Libraries, 2006
Securing public access workstations should be a significant part of any library's network and information-security strategy because of the sensitive information patrons enter on these workstations. As the IT manager for the Johnson County Library in Kansas City, Kan., this author is challenged to make sure that thousands of patrons get the access…
Descriptors: Workstations, Public Libraries, Library Services, Library Role
Peer reviewedKohler, Stuart – Journal of Interlibrary Loan, Document Delivery & Information Supply, 1997
Describes "Self-Serve Reserve", an electronic application developed at the library of Norwich University (Vermont) to handle reserve reading and be easy to use, reduce or eliminate the need for paper copies, deliver imaged documents, require modest start-up costs, and be scalable from a stand-alone workstation to network access.…
Descriptors: Academic Libraries, Computer Networks, Computer Selection, Computer Software
Daehn, Ralph M. – Computers in Libraries, 2000
Explains the public printing services available at computer terminals for patrons at the University of Guelph (Ontario) libraries. Highlights include configurations of the public workstations; client and server hardware and software; security features; cost projections; and printing charges. (LRW)
Descriptors: Academic Libraries, Computer Printers, Computer Security, Computer Software
Peer reviewedKonomos, Philip; Herrington, Scott – Electronic Library, 2000
Discusses concerns at the Arizona State University library regarding inappropriate uses of their public workstations, including Web surfing, personal email, and accessing pornography. Describe data collection techniques, including observation and electronic data collection software, which investigated use and availability data for workstations.…
Descriptors: Academic Libraries, Access to Computers, Computer Software, Computer Uses in Education

Direct link
