REFERENCES
- Beckstrom, M., & Jones, B. (2015). Protecting patron privacy: Safe practices for public computers. Santa Barbara, CA: Libraries Unlimited.
- Belanger, J., Faber, M., & Oakleaf, M. (2018). Three thousand library users can’t be wrong: Demonstrating library impact using one open-ended survey. In M. Britto & K. Kinsley (Eds.), Academic libraries and the academy: Strategies and approaches to demonstrate your value, impact, and return on investment (pp. 151–160). Chicago, IL: Association of College and Research Libraries.
- Conyers, A., Lambert, J., Wong, L., Jones, H, Bamkin, M, & Dalton, P. (2017). E-book usage: Counting the challenges and opportunities. Insights: UKSG, 30(2), 25. doi:10.1629/uksg.370
- Dempsey, L. (2016, January 31). The facilitated collection. Lorcan Dempsey’s Weblog, Retrieved from http://orweblog.oclc.org/towards-the-facilitated-collection/
- Hulbert, L., Roach, D., & Julian, G. (2011). Integrating usage statistics into collection development decisions. Serials Librarian, 60(1–4), 158–163. doi:10.1080/0361526X.2011.556027
- Kohn, K. (2018). Using logistic regression to examine multiple factors related to e-book use. Library Resources & Technical Services, 62(2), 54–65. doi:10.5860/lrts.62n2.54
- Kinman, V. (2009). E-metrics and library assessment in action. Journal of Electronic Resources Librarianship, 21(1), 15–36. doi:10.1080/19411260902858318
- Levine-Clark, M., Paulson, K., & Moeller, P. (2015). 10,000 Libraries, 4 years: A large-scale study of e-book usage and how you can use the data to move forward. Serials Librarian, 68(1–4), 262–268. doi:10.1080/0361526X.2015.1017709
- Linden, J., Tudesco, S., & Dollar, D. (2018). Collections as a service: A research library’s perspective. College & Research Libraries, 79(1), 97. doi:10.5860/crl.79.1.86
- Littman, J., & Connaway, L. (2004). A circulation analysis of print books and e-books in an academic research library. Library Resources and Technical Services, 48, 256.
- Luzius, J. (2005). A look at circulation statistics. Journal of Access Services, 2(4), 16. doi:10.1300/J204v02n04_03.
- Martell, C. R. (2005). The ubiquitous user: A reexamination of Carlson’s deserted library. Portal: Libraries and the Academy, 5(4), 441–453. Retrieved from https://muse.jhu.edu/.
- Michalak, R., & Rysavy, M. D. T. (2019). Assessing library customer interactions and staff satisfaction. Journal of Library Administration, 59(3), 314–324. doi:10.1080/01930826.2019.1583020
- Michalak, R., Rysavy, M. D. T., Dawes, T. A., & Daly, B. (2018). Are they finding what they are looking for? An analysis of two years of customer EDS searches compared to full-text downloads. Austin, TX: ER&L. Retrieved from https://sched.co/CrgV
- Morrisey, L. (2010). Data-driven decision making in electronic collection development. Journal of Library Administration, 50(3), 283–290. doi:10.1080/01930821003635010
- Murray, T. E. (2013). How much is a special library worth? Valuing and communicating information in an organizational context. Journal of Library Administration, 53(7–8), 462–471. doi:10.1080/01930826.2013.882200
- Newman, B. L., & Tijerina, B. (2017). Introduction. In B. Newman & B. Tijerina (Eds.), Protecting patron privacy (p. 1). Lanham, MD: Roman & Littlefield.
- Pesch, O. (2007). Usage statistics: About COUNTER and SUSHI. Information Services & Use, 27(4), 207–213. doi:10.3233/ISU-2007-27412
- Regazzi, J. J. (2012). Constrained? an analysis of U.S. Academic library shifts in spending, staffing, and utilization, 1998–2008. College & Research Libraries, 73(5), 463. doi:10.5860/crl-260
- Shelburne, W. A. (2009). E-book usage in an academic library: User attitudes and behaviors. Library Collections, Acquisitions, & Technical Services, 33(2–3), 59–72. doi:10.1080/14649055.2009.10766234
- Sweeney, M., & Lubowicka, K. (2018). What is PII, non-PII, and personal data? Retrieved from https://piwik.pro/blog/what-is-pii-personal-data/