NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
First Amendment4
Assessments and Surveys
What Works Clearinghouse Rating
Showing 31 to 45 of 93 results Save | Export
Peer reviewed Peer reviewed
Lavin, Michael R. – Reference Librarian, 1995
Identifies some of the distinguishing characteristics of business information and examines their impact on reference transactions. Topics include characteristics of business patrons; question negotiation; dealing with patrons' expectations; helping patrons devise a search strategy; understanding search results; requisite skills for business…
Descriptors: Job Skills, Librarians, Library Policy, Library Services
Peer reviewed Peer reviewed
Fouty, Kathleen G. – Journal of Academic Librarianship, 1993
Examines issues regarding the privacy of information contained in patron databases that have resulted from online circulation systems. Topics discussed include library policies to protect information in patron records; ensuring compliance with policies; limiting the data collected; security authorizations; and creating and modifying patron…
Descriptors: Compliance (Legal), Confidential Records, Data Collection, Databases
Oder, Norman – Library Journal, 1997
The public library has become the locus for public anxiety about children's access to objectionable material on the Internet. Discusses Judith Krug's (Director of the American Library Association Office for Intellectual Freedom) defense of unrestricted access, acceptable use, and filtering software. Highlights six filtering programs (client and…
Descriptors: Access to Information, Children, Computer Software Evaluation, Intellectual Freedom
Peer reviewed Peer reviewed
Martin, Marilyn J. – Journal of Academic Librarianship, 1991
Discusses the role of academic libraries in the face of rising costs and suggests implications for library policymaking. The nature and value of information are considered; pricing issues for serials, CD-ROM products, and online searching are described; and possible solutions are offered. (26 references) (LRW)
Descriptors: Academic Libraries, Costs, Higher Education, Library Policy
Huff, James – American Libraries, 1999
Discusses the inadequacy of laws protecting the privacy of library patrons and the necessity of improving confidentiality statutes. Addresses the form the statute should take, what should be covered, libraries the statute should apply to, when exceptions are justified, and how the statute should be enforced. (AEF)
Descriptors: Access to Information, Confidentiality, Disclosure, Information Policy
American Library Association Video/Library Video Network, Towson, MD. – 1994
This videotape is designed to help library staff develop and implement a security program in the library, using library personnel or outside security personnel. Eight sections cover: (1) how to design an effective security policy; (2) how to approach disruptive patrons; (3) personal safety--with disruptive patrons, during a robbery, and when…
Descriptors: Crime Prevention, Law Enforcement, Library Administration, Library Materials
Jamison, Martin – 1989
Two surveys were conducted: (1) one of 78 ERIC document users at Ohio State University to gather data on how they find and use the ERIC documents and their attitudes toward the library's lending policy; and (2) one of 218 academic libraries with ERIC microfiche collections to obtain information on their patrons' access to and use of ERIC…
Descriptors: Academic Libraries, Higher Education, Library Circulation, Library Policy
Vaillancourt, Renee J. – 2000
This book is a hands-on guide to the philosophy and practice of young adult services in the public libraries. The following chapters are included: (1) "Young Adult Services Philosophy," including reasons to serve teens, why teens are the way they are, who serves young adults, and how to interact with teens; (2) "Youth Participation," including…
Descriptors: Adolescent Literature, Adolescents, Library Collection Development, Library Planning
Shuman, Bruce A. – American Libraries, 1996
Libraries' commitment to open access can jeopardize personal safety. Violent incidents are increasing in libraries due to factors such as evening hours, variety of clientele, and flaws in building design and materials arrangement. This article provides ideas on how to create a safer library environment and on factors to consider when preparing…
Descriptors: Access to Information, Crime Prevention, Institutional Environment, Library Facilities
Lorenzen, Michael – Illinois Libraries, 1997
A survey of Illinois public libraries found that: security was a problem (58%); material theft was a problem (56%); periodical mutilation was a problem (42%); and a patron or staff member was expelled or arrested in the previous year (26%). Discusses perceptions of security, security incidents, electronic security systems, and security policies.…
Descriptors: Alarm Systems, Legal Problems, Library Materials, Library Personnel
Peer reviewed Peer reviewed
Winters, Sharon – Public Libraries, 1994
Describes building security procedures developed at the Hampton Public Library (Virginia) to deal with problem patrons. Highlights include need for the library monitor program; staffing patterns; monitor selection criteria; training procedures; library behavior guidelines; library policy statements; theft detection systems; and sample job…
Descriptors: Behavior Problems, Criteria, Guidelines, Library Administration
Kreamer, Jean Thibodeaux – Wilson Library Bulletin, 1994
Considers the role of public library trustees in censorship challenges. Topics addressed include the need for clear library policies concerning censorship; informing trustees about First Amendment rights, challenges regarding problem patrons and age restrictions, the trustee as citizen as well as board member, and the board's need for appropriate…
Descriptors: Age Discrimination, Censorship, Citizen Role, Governing Boards
Billington, James H. – American Libraries, 1996
The Librarian of Congress addresses the increasing security threats to the collection at the Library of Congress that caused him to close library stacks, increase police patrol, install surveillance cameras and alarm systems, create material inventories, and limit patron privileges. Many of the security functions are being assessed and monitored…
Descriptors: Access to Information, Alarm Systems, Consultants, Crime Prevention
Benson, Allen C. – Computers in Libraries, 1998
Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…
Descriptors: Access to Information, Computer Security, Computer System Design, Guidelines
Schuyler, Michael – Computers in Libraries, 1999
Suggests that a definitive court ruling is needed to better define rights and responsibilities related to the First Amendment and libraries' Internet use policies so that libraries can provide a comfortable environment for users while maintaining the law. Discusses filters; court cases; claims of the anti-porn cult; research studies on how much of…
Descriptors: Access to Information, Court Litigation, Information Policy, Internet
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7