Computers in Libraries

Monthly magazine provides library information technology news and practical application.

Articles from Vol. 36, No. 5, June

A Career Guide for Librarians and Managing Electronic Resources
Rethinking Information Work: A Career Guide for Librarians and Other Information Professionals, Second Edition (ISBN: 978-1610699594, 264 pp., $55), by G. Kim Dority, offers library information science (LIS) professionals- and those who wish to enter...
Balancing Privacy and Free Expression Online
Privacy and security often seem to be rights that compete with freedom of expression in an information age. Based on the experience of Index on Censorship--the 43-year-old anti-censorship organization that I have the privilege to lead--I want to argue...
Balancing Privacy and Free Expression Online
[This is an edited version of a speech originally given at the Internet Librarian conference in 2015. - Ed.lPrivacy and security often seem to be rights that compete with freedom of expression in an information age. Based on the experience of Index on...
Cybersecurity as an Extension of Privacy in Libraries
I was asked by someone in the telecom industry about the overlap between cybersecurity and library issues. This edition of CIL encouraged me to get my thoughts in order on this topic. As library workers, we often have other priorities that take precedence...
Cybersecurity as an Extension of Privacy in Libraries
I was asked by someone in the telecom industry about the overlap between cybersecurity and library issues. This edition of CIL encouraged me to get my thoughts in order on this topic. As library workers, we often have other priorities that take precedence...
Digital Acquisitions and Donor Relations: Assets, Apprehensions, and Anxieties
Recently, I spoke at a meeting of the Mid-Atlantic Regional Archives Conference (MARAC) on digital acquisitions and donor relations. It got me thinking about how soliciting collections with digital files changes the donor/institution dynamic and that...
Digital Acquisitions and Donor Relations: Assets, Apprehensions, and Anxieties
Recently, I spoke at a meeting of the Mid-Atlantic Regional Archives Conference (MARAC) on digital acquisitions and donor relations. It got me thinking about how soliciting collections with digital files changes the donor/institution dynamic and that...
High Security and Flexible Privacy for Library Services
Ensuring the privacy of patrons as they make use of library services has been a longstanding priority for the profession. Maintaining ironclad computer and network security not only makes certain that the operations of the library function without...
High Security and Flexible Privacy for Library Services
THE CHALLENGES OF ESTABLISHING ADEQUATE DEFENSIVE MEASURES HAVE NEVER BEEN MORE DAUNTING, WITH ATTACKERS AT THE READY TO TAKE ADVANTAGE OF ANY VULNERABILITY.Ensuring the privacy of patrons as they make use of library services has been a longstanding...
News Desk
CSP's New OA JournalCanadian Science Publishing (CSP) introduced FACETS, a multidisciplinary open access (OA) science journal. It includes six major research fields and more than 30 subjects (others will be added), covering topics such as science and...
Noted & Quoted
The American Library Association (ALA) announced that Maureen Sullivan is the recipient of the 2016 Joseph W. Lippincott Award. According to the announcement, she received this award for her service to the profession. Sullivan has held various positions:...
Points of View
This issue is full of voices. Voices speaking up about privacy. Voices speaking out about security. Voices advocating for intellectual freedom and the right to speak up and out at all.Research conducted by Pew Research Center's Internet & American...
Respecting Privacy: Consensus Is Reached on NISO Privacy Principles
There are many ways to address differences among various positions, whether they're in politics, business, or personal relationships. One can take an adversarial approach and advocate a position through legal channels. Another strategy is to negotiate...
Respecting Privacy: Consensus Is Reached on NISO Privacy Principles
There are many ways to address differences among various positions, whether they're in politics, business, or personal relationships. One can take an adversarial approach and advocate a position through legal channels. Another strategy is to negotiate...
Secure Your Reputation to Secure the Library
Cybersecurity is receiving more attention than ever before. University campuses everywhere--including the one I work at--face repeated hacking attempts and are heightening security measures. What was once rare now seems to be a universal dilemma, and...
Secure Your Reputation to Secure the Library
Cybersecurity is receiving more attention than ever before. University campuses everywhere-including the one I work at-face repeated hacking attempts and are heightening security measures. What was once rare now seems to be a universal dilemma, and the...
The Intentional Data Scientist: Three Ways to Get Started
Hello there! How nice to see you again. After a few years away, Dick Kaser graciously welcomed me back to CIL to share some of what I've learned about the burgeoning field of data science. This month, and again in an upcoming issue, I'll offer some...
The Intentional DATA SCIENTIST: Three Ways to Get Started
Hello there! How nice to see you again. After a few years away, Dick Kaser graciously welcomed me back to CIL to share some of what I've learned about the burgeoning field of data science. This month, and again in an upcoming issue, I'll offer some concrete...
Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.