Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 5 of 5
Full-Text Articles in Education
Digital Object Identifiers And Their Use In Libraries, Jue Wang
Digital Object Identifiers And Their Use In Libraries, Jue Wang
DLPS Faculty Publications
Digital Object Identifiers (DOIs) are persistent identifications that are assigned to any entity in order to manage intellectual content on digital networks. The DOI system has been managed by an open membership consortium, the International DOI Foundation (IDF), founded in 1998. Usage of the DOI system is cross-industry beyond academic publishing. This article provides an overview of what a DOI is; the structure of DOI; DOI Registration Agencies (RA); metadata associated with DOIs, and advantages for libraries.
Electronic Reserves And The Failed Confu Guidelines: A Place To Start Negotiations, Bryan M. Carson
Electronic Reserves And The Failed Confu Guidelines: A Place To Start Negotiations, Bryan M. Carson
DLPS Faculty Publications
No abstract provided.
The Importance Of Intellectual Property Licensing In 21st Century Libraries, Bryan M. Carson
The Importance Of Intellectual Property Licensing In 21st Century Libraries, Bryan M. Carson
DLPS Faculty Publications
No abstract provided.
Legally Speaking — Drama In The Library: Always Seek Permission To Publicly Peform Scripts, Even When The Library Owns Them, Bryan M. Carson
Legally Speaking — Drama In The Library: Always Seek Permission To Publicly Peform Scripts, Even When The Library Owns Them, Bryan M. Carson
DLPS Faculty Publications
No abstract provided.
Security At Western Kentucky University Libraries: A Case Study And Overview, Dan Forrest
Security At Western Kentucky University Libraries: A Case Study And Overview, Dan Forrest
DLPS Faculty Publications
Using an actual incident from the spring of 2006, this article provides an overview of the security arrangements at WKU libraries. They include a Library Security Officer, student patrollers, security gates and strips in books and other materials in the library, as well as a networked system of security cameras. The article includes conclusions drawn from the discussed incident and recommendations for other libraries.