NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 11 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Xiaojun Xu; Guanghui Cheng – College & Research Libraries, 2024
The purpose of this study is to explore the realization of users' information rights (IRs) in the smart service of university libraries. Based on the LibQUAL model, principal component analysis (PCA) is used to measure the quality of smart services in university libraries. The contribution weight of various services to the realization of IRs is…
Descriptors: Foreign Countries, Research Libraries, Academic Libraries, Library Services
Estabrook, Leigh S. – Library Journal, 1996
Examines libraries' policies of keeping patron records private and confidential. Addresses the idea that libraries use their automated systems to retain and use patron data to develop and improve library services. Describes uses of patron data that can help libraries develop targeted services to users to better meet their information needs. (JMV)
Descriptors: Confidential Records, Improvement, Library Automation, Library Policy
Peer reviewed Peer reviewed
Garoogian, Rhoda – Library Trends, 1991
Examines moral, legal, and professional arguments for the protection of a library patron's privacy; gives examples of confidentiality challenges; and concludes that librarians should lobby for legal recognition of librarian/patron privilege of confidentiality. Computer technology and privacy are discussed, and the American Library Association…
Descriptors: Confidential Records, Confidentiality, Ethics, Legal Problems
Peer reviewed Peer reviewed
Fouty, Kathleen G. – Journal of Academic Librarianship, 1993
Examines issues regarding the privacy of information contained in patron databases that have resulted from online circulation systems. Topics discussed include library policies to protect information in patron records; ensuring compliance with policies; limiting the data collected; security authorizations; and creating and modifying patron…
Descriptors: Compliance (Legal), Confidential Records, Data Collection, Databases
Benson, Allen C. – Computers in Libraries, 1998
Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…
Descriptors: Access to Information, Computer Security, Computer System Design, Guidelines
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources
Gorman, Michael – 2001
This paper discusses issues for libraries related to privacy in the digital environment. The first section defines the meaning of privacy. The second section discusses the impact of technology and the use of technology, including principles issued by the U.S. Department of Health, Education, and Welfare in 1973 that still provide a basis for…
Descriptors: Access to Information, Ethics, Information Technology, Integrated Library Systems
Peer reviewed Peer reviewed
Lehmann, Stephen; Spohrer, James H. – Library Resources and Technical Services, 1993
Reviews the collection development literature of 1992. Topics addressed include selection and collecting policies; cooperation; assessment and evaluation, including citation studies and user studies; organization and staffing; budget and allocations; electronic technologies of the present; and possible future developments. (Contains 178…
Descriptors: Budgeting, Citation Analysis, Futures (of Society), Library Automation
Peer reviewed Peer reviewed
Galbreath, Robert – North Carolina Libraries, 1997
Discusses collection management in academic libraries in light of computer-mediated access to remote electronic databases and online resources. Topics include the library collection, ownership of versus access to information, the selection process, collection evaluation, collection development policies, materials budget, serials, and user liaison.…
Descriptors: Academic Libraries, Access to Information, Databases, Evaluation Methods
Fjallbrant, Nancy, Ed. – IATUL Proceedings, 1985
Papers presented at an August 1984 international seminar on online user education include "Library Policies and Strategies in The Netherlands" (Chris J. van Wijk, The Netherlands); "Promotion and Marketing of Library Services" (Nancy Fjallbrant, Sweden); "Library Promotion by Computer" (Ian Malley, United Kingdom); "Library User Education and…
Descriptors: Database Producers, Databases, Foreign Countries, Information Centers
Whitesides, William L., Sr., Ed. – 1998
This book, written by graduate students at the Catholic University (District of Columbia) School of Library and Information Science, examines current priorities, policies, and practices of public libraries. Following an introduction, "Reinventing Libraries: Responding to the Forces of Change" (Lisa Crisman), chapters include: (1) "A…
Descriptors: Access to Information, Appropriate Technology, Change, Cultural Context