Lexington Public Library Surveillance policy

User Generated

OVTQ8713

Writing

MMPA 5480

Description

The focus of this course is on applied learning and your ability to take the information from the course and apply it to a real problem, program, or policy. There really is no one best way to design a research project. The emphasis is on finding the most appropriate way. For example, choosing exercise over eating unhealthy foods is almost always the best choice. Unfortunately, things are not that clear in research. An evaluation design is not always the best in every circumstance. For example, if you are evaluating the effectiveness of an entitlement program that provides cash to low income families, you should not use an experimental design in which some families are randomly excluded from receiving these benefits. You cannot deny benefits that someone is legally entitled to receive. While an experimental design is usually seen as a good design, in this instance, it would not be appropriate.

For this Assignment, you will develop an effective research question and select an appropriate evaluation design for your program, problem, or policy. Review the Learning Resources for this week. Use the organization that you selected as the topic of your Discussion post for this week, and reference your colleagues’ feedback to guide you in selecting your research question(s) and evaluation design. You will be using their feedback to help you further develop and refine the research question and evaluate design you choose for your research project.

In your Assignment, include the following:

  • Briefly describe the organization that you will use for your Final Project.
  • Briefly describe the program, problem, or policy within that organization that might benefit from evaluation.
  • Develop a research question(s) that defines the purpose of the evaluation.
  • Describe the evaluation design that is most appropriate for this program, problem, or policy, and justify your selection. Include a discussion of validity and reliability.

Use at least three scholarly sources from the library that were published within the past five years to support your paper. Be sure to follow APA guidelines when citing your sources.

Papers should be double-spaced and be 3–5 pages in length, not including the cover and reference pages.

Readings

  • Johnson, G. (2014). Research methods for public administrators (3rd ed.). Armonk, NY: M. E. Sharpe.
    • Chapter 3, “What is the Question?” (pp. 34–47)
    • Chapter 4, “Identifying Measures and Measurement Strategy” (pp. 48–63)
    • Chapter 5, “Designs for Research: The Xs and Os Framework” (pp. 64–83)
    • Chapter 6, “Other Research Approaches” (pp. 84–96)
  • StatPac. (2009). Qualities of a good question. Retrieved from http://www.statpac.com/surveys/question-qualities.http

Unformatted Attachment Preview

The organization I chose to examine is one that I am very familiar with and currently work for. The Lexington Public Library system. The Lexington Public Library system has six library branches. The largest being the downtown Lexington Central library, The Village Branch, The Northside Branch, The Beaumont Branch, The Eastside Branch and The Tate’s Creek Branch. These branches make up the Lexington Public library system which service the city of Lexington and surrounding counties in central Kentucky. The library has a strategic plan process that follows these six key elements: Education, Access, Inclusion, Space, Culture, and Stewardship (Lexington public library, n.d.). As part of these six elements the library follows a strict guideline laid out in the Lexington public libraries policy and procedure manual. This effects all library staff, operations, and implementations within all the library system. As director of security, my staff and I follow closely the Lexington Public Library Policy and Procedures manual. In strictly following the Lexington public library policy and procedure manual the certain policy implementations have been reviewed by myself and my staff that could further use methods of research and evaluation implement better and safer practices inside the Lexington public library systems. The library policy and procedure dealing with surveillance of library property and access of customer information is one that needs further research and evaluation especially in clarifying and finding proper solutions to vague policy understanding and enforcement of the actual policy as it stands. With examining these areas of the Lexington public library policy and procedures and finding actual realistic data certain research methods would help identify key solutions that would institute better policy implementation including Quantitative research that depends essentially on the accumulation of quantitative information, Qualitative or research that depends on the gathering of subjective information and Mixed research that utilization both quantitative and qualitative in a joint evaluation of research (Johnson, 2014) .Research on this issue of surveillance of library property and the access to customer information is a vital problem inside the library policy and procedure and could gather the necessary data to better institute the policy and procedure in a more effective manner. Lexington Public Library. (n.d.). Retrieved December 08, 2017, from https://www.lexpublib.org/strategic-plan Johnson, G. (2014). Research methods for public administrators (3rd ed.). Armonk, NY: M. E. Sharpe. Very well done! This should work well for the research design. Please remember to alphabetize the sources in the reference page. Responsiveness: 25 Content: 25 Quality: 23 73/75 Video Surveillance Policy Purpose The Library strives to maintain a safe and secure environment for its customers and staff. Selected areas of the Library are equipped with video cameras that are recording at all times. A sign is posted at the Library entrance informing the public that security cameras are in use. Video monitoring and recording is conducted in a manner consistent with all existing local and applicable laws and ordinances. The Library’s video surveillance system is used for the protection and safety of customers, employees, assets, property, and to identify persons breaking the law or violating the Library’s Code of Conduct. No video is released without the permission of the Executive Director. Approved by the Board of Trustees June 13, 2012 Video Surveillance Procedures Security Camera Locations Reasonable efforts are made to safeguard the privacy of customers and employees. The video security cameras are positioned to record only those areas specified by the Executive Director or Director of Support Service, and will complement other measures to maintain a safe and secure environment. Camera locations shall not be changed or added without the permission of the Executive Director or Director of Support Service. Cameras may be installed in locations where staff and customers would not have an expectation of privacy. Examples include common areas of the Library such as entrances, accounts desks, near book and media collections, public seating, delivery areas and parking lots. Cameras will not be installed in areas where staff and public have a reasonable expectation of privacy, such as restrooms, nor are they positioned to identify a person’s reading, viewing or listening activities in the Library. Use, Disclosure, and Access to Digital Images The Security Team Leader and Security Officers, in the course of their normal duties, monitor and operate the live video security system. The Garage Technician may monitor the live garage camera feed only and notify security if he or she notices suspicious activity. Only the following individuals are authorized to access the recorded archival data in pursuit of incidents of criminal activity, litigation, or violation of the Library Code of Conduct: Executive Director, Director of Support Service, Security Team Leader, Security Officers, Director of Library Services, and designated Persons – in – Charge. Authorized individuals, with notice to the Executive Director or designee, may access or ask other staff to review recorded data in order to identify security concerns related to a specific incident. With the written permission of the Executive Director, individuals authorized under this policy may use a still shot or selected portions of recorded data to request law enforcement review for assessing the security risk of a specific individual or for investigating a crime on Library property. Video records may contain personally identifiable information about an individual who has used any Library service or borrowed any Library materials (“patron information”). Every effort will be made to ensure confidentiality and protection of Library users within the parameters of the Open Records Law. All requests for security camera footage or still shots by law enforcement will be referred to the Library Executive Director or Director of Support Service. In his or her absence, direct requests to the Senior Administrative Staff Member. In the event of a search warrant, which is executable immediately, Administration will comply with the search warrant and consult with legal counsel. Upon receipt of a subpoena or other court order, Administration shall consult with legal counsel to determine if the document is in proper form and that good cause for its issuance in a court of proper jurisdiction is demonstrated. If not, Administration shall insist any defect be remedied before releasing patron records which contain patron information. General Public Requesting Access to Security Camera Footage Confidentiality/privacy issues require that the general public submit an Open Records Request before being allowed to view any security camera footage. Retention of Digital Images Images from the Library video security system are stored digitally on hardware in the Library. Security camera footage will be kept confidential. Security recording equipment will be housed in a locked area. Recordings are kept for a minimum of 14 days and no longer than 30 days in accordance with the Library’s approved records retention schedule, unless required as part of an ongoing investigation or litigation. Unauthorized Access and/or Disclosure A breach of this procedure may result in disciplinary action up to and including termination of employment. Any Library employee who becomes aware of any unauthorized disclosure of a video record and/or a potential privacy breach has a responsibility to ensure that the Executive Director is immediately informed of the breach.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Please find attached. Thank you.

Outline

Introduction

Body

Conclusion


Running head: LEXINGTON PUBLIC LIBRARY

Lexington Public Library Surveillance Policy
Name
Institution
Instructor
Date

1

LEXINGTON PUBLIC LIBRARY

2

Lexington Public Library Surveillance Policy
Lexington Public Library
The Lexington Public Library comprises of six library branches that serve the city of
Lexington and the surrounding central Kentucky countries. The branches are The Village
Branch, Beaumont, Eastside, Northside, Tate's Creek branches and the largest of them all- the
downtown Lexington Central library. Through its services, the library meets the needs of more
than 300,000 members of the public of all ages. Over the years the literature material has been
updated, and currently, it has over 560,000 items which are a combination of a wide variety of
books, audiobooks, e-books, magazines, movies, music and much more (Lexington Public
Library, 2017).
The facility managed to serve roughly 2 million visitors last year, and at the same time
maintains an online presence that saw it get over 8 million visitors. Additionally, the library uses
a mobile application that was used over 6 million of its members. Despite the great increase and
availability of a wide array of digital material, print formats were still preferred ...


Anonymous
Awesome! Perfect study aid.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags