NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 616 to 630 of 887 results Save | Export
Peer reviewed Peer reviewed
Stoan, Stephen K. – College and Research Libraries, 1984
This examination of misunderstandings between librarians and teaching faculty over concepts of library use and research concludes that library skills and research skills are essentially different things that can be learned in isolation from each other. Implications of these findings for bibliographic instruction and library policies are discussed.…
Descriptors: Information Needs, Information Retrieval, Information Sources, Library Instruction
Peer reviewed Peer reviewed
Lutz, Marilyn – Library Hi Tech, 1984
Describes four major subsystems of OCLC's LS/2000, an integrated local library system which can be adapted to wide variety of library environments: multibranch circulation and online catalog searching; online cataloging and authority file maintenance; management report generation; and system set up parameters that translate local library policy…
Descriptors: Cataloging, Computer Oriented Programs, Databases, Display Systems
Kotch, Marianne – 2002
This document provides guidelines on policymaking for public librarians and public library trustees in Vermont. Topics covered include: (1) the importance of policies in bringing order, logic, stability, and continuity to a library's operation; (2) the roles of trustees and librarians in adopting carrying out policies; (3) reasons why policies…
Descriptors: Access to Information, Confidentiality, Federal Legislation, Intellectual Freedom
Rowley, Gordon, Comp.; Rounds, Laura A., Ed. – 1995
Published 10 times a year, Systems and Procedures Exchange Center (SPEC) Kits and Flyers contain information on issues of concern to libraries and librarians; they are the result of surveys on topics related to practice and management of library programs in the Association of Research Libraries (ARL). This document focuses on the organization of…
Descriptors: Information Sources, Information Technology, Library Administration, Library Collection Development
Biggins, Barbara; Handsley, Elizabeth – 2000
This paper discusses the legal obligations owed by librarians to the users of their facilities, focusing on the viewing of pornography on the Internet in the public library. The meanings commonly ascribed to the word censorship are presented. Australian federal law that governs the classification of films, videos, computer games, and publications…
Descriptors: Access to Information, Censorship, Children, Classification
Freedman, Maurice J. – Library Journal, 1996
Committed to utilizing information technology, the Westchester Library System (New York) made the World Wide Web publicly accessible. Describes the planning, implementation, and management process; obstacles involving financing; establishing Internet connectivity; and vendor negotiations. Westchester hired a Web manager, created Internet use…
Descriptors: Access to Information, Computer Security, Financial Support, Information Technology
Peer reviewed Peer reviewed
Lee, Hur-Li – Journal of Academic Librarianship, 2003
This case study examines social influences in research libraries' collection development. It shows that individuals' ideologies and political agenda shape their impression of user needs and their decision making. The study also reveals how the institution's operating structures, campus politics of interdisciplinarity, personnel deployment, and…
Descriptors: Academic Libraries, Case Studies, Decision Making, Higher Education
Clark, James H. – Library Administration and Management, 1997
Discusses three major components of library security: physical security of the environment; operating procedures for library staff, the public, and security personnel; and a contract security force (or campus security in academic institutions.) Topics include risk management; maintenance; appropriate technology, including security systems and…
Descriptors: Alarm Systems, Appropriate Technology, Emergency Programs, Equipment Maintenance
Willits, Robert L. – Library Administration and Management, 1997
Discusses violence in the workplace and suggests a three-tier approach to dealing with violence in libraries that focuses on personnel issues: (1) preventive measures, including applicant screening, supervisory training, and employee assistance programs; (2) threat management, including policy formation and legal action; and (3) crisis/post-trauma…
Descriptors: Crisis Management, Employee Assistance Programs, Libraries, Library Administration
Galganski, Carol; Peters, Tom; Bell, Lori – Computers in Libraries, 2002
Describes the integration of personal digital assistants into a medical center library's services in Illinois. Discusses training for users; hardware selection; software selection and content; technical support; the role of libraries, including the creation of policies and procedures; and future challenges. (LRW)
Descriptors: Computer Selection, Computer Software Selection, Futures (of Society), Information Technology
Peer reviewed Peer reviewed
Dowd, Frances Smardo – Public Libraries, 1989
Describes a survey of public libraries that addressed the presence of latchkey children in libraries, library policies regarding this population, and services that are or should be offered. In-depth interviews with 10 librarians explored ideal responses to latchkey children, advice on library services, and community services for children. (14…
Descriptors: Community Services, Day Care, Interviews, Latchkey Children
Anders, Vicki; Jackson, Kathy M. – Online, 1988
Reports on a study of the impact of CD-ROM on online searching at an academic library. Data are presented on online connect time, numbers of online users, and types of users of various services. The effects of library policy and fees are discussed. (MES)
Descriptors: Academic Libraries, Comparative Analysis, Graphs, Higher Education
Peer reviewed Peer reviewed
Amey, Larry – Emergency Librarian, 1988
Discusses the need for written collection policies in learning resources centers as a defense against censorship and as a collection planning device. A model collection policy is reviewed, with emphasis on the sections and wording that bear directly on censorship and intellectual freedom. (8 references) (CLB)
Descriptors: Censorship, Elementary Secondary Education, Institutional Autonomy, Intellectual Freedom
Lubelski, Greg W. – Library Journal, 1995
Describes one library's development of a CD-ROM lending collection. Topics include survey results, policies, procedures, troubleshooting, and promotion. A sidebar contains a brief bibliography of journals which review CD-ROMs and publishers who provide CD samplers. (AEF)
Descriptors: Bibliographies, Costs, Information Technology, Library Circulation
Peer reviewed Peer reviewed
Dillon, Ken; Williams, Claire Louise – Emergency Librarian, 1994
Reviews recent media treatment of the issue of selection and censorship of print and nonprint materials for school-age children in Australia, and discusses the findings of a survey which investigated actual practices in schools and attitudes of teacher-librarians. (37 references) (LRW)
Descriptors: Censorship, Elementary Secondary Education, Foreign Countries, Learning Resources Centers
Pages: 1  |  ...  |  38  |  39  |  40  |  41  |  42  |  43  |  44  |  45  |  46  |  ...  |  60