Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Social and Behavioral Sciences

Impact Of Cloud Computing On Librarians At Small And Rural Academic Libraries, Deborah Deloise Tritt, Kaetrena D. Kendrick Oct 2014

Impact Of Cloud Computing On Librarians At Small And Rural Academic Libraries, Deborah Deloise Tritt, Kaetrena D. Kendrick

Faculty Publications

No abstract provided.


Informing The “Naive Triangle": Evidence-Based Transformations In New Young Adult Library Spaces, Anthony Bernier Aug 2014

Informing The “Naive Triangle": Evidence-Based Transformations In New Young Adult Library Spaces, Anthony Bernier

Faculty Publications

Given recent technological innovations the notion of serving teenage populations obliges libraries to aspire to new design and spatial visions. Youth, historically not deemed entitled to an equitable share of public environments, has frequently been viewed as creating conflict in libraries, or as librarian Lynn Cockett observed, “Inviting young people to a library that is architecturally not prepared to handle normal adolescent behavior can have some pretty negative consequences.” Even under some of the best design processes, however, a kind of “Naïve Triangle” develops: architects, who frequently know little about libraries or youth aesthetics, work with librarians (with little architectural …


Library Security Gates: Effectiveness And Current Practice, Jonathan H. Harwell Apr 2014

Library Security Gates: Effectiveness And Current Practice, Jonathan H. Harwell

Faculty Publications

For years, library personnel have relied on security gates to prevent theft from their collections. However, recent anecdotal evidence suggests that libraries are removing the gates for various reasons, including cost and patron frustration with false alarms. This study examines current practices via a survey of libraries and security gate vendors and analyzes the effectiveness of security gates by empirical testing of alarms and with loss inventories of collection samples, supplemented by lost item statistics from interlibrary loan. Thus we use three primary methods to assess libraries’ approaches to security gates.