Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Social and Behavioral Sciences
Impact Of Cloud Computing On Librarians At Small And Rural Academic Libraries, Deborah Deloise Tritt, Kaetrena D. Kendrick
Impact Of Cloud Computing On Librarians At Small And Rural Academic Libraries, Deborah Deloise Tritt, Kaetrena D. Kendrick
Faculty Publications
No abstract provided.
Informing The “Naive Triangle": Evidence-Based Transformations In New Young Adult Library Spaces, Anthony Bernier
Informing The “Naive Triangle": Evidence-Based Transformations In New Young Adult Library Spaces, Anthony Bernier
Faculty Publications
Given recent technological innovations the notion of serving teenage populations obliges libraries to aspire to new design and spatial visions. Youth, historically not deemed entitled to an equitable share of public environments, has frequently been viewed as creating conflict in libraries, or as librarian Lynn Cockett observed, “Inviting young people to a library that is architecturally not prepared to handle normal adolescent behavior can have some pretty negative consequences.” Even under some of the best design processes, however, a kind of “Naïve Triangle” develops: architects, who frequently know little about libraries or youth aesthetics, work with librarians (with little architectural …
Library Security Gates: Effectiveness And Current Practice, Jonathan H. Harwell
Library Security Gates: Effectiveness And Current Practice, Jonathan H. Harwell
Faculty Publications
For years, library personnel have relied on security gates to prevent theft from their collections. However, recent anecdotal evidence suggests that libraries are removing the gates for various reasons, including cost and patron frustration with false alarms. This study examines current practices via a survey of libraries and security gate vendors and analyzes the effectiveness of security gates by empirical testing of alarms and with loss inventories of collection samples, supplemented by lost item statistics from interlibrary loan. Thus we use three primary methods to assess libraries’ approaches to security gates.