Table of contents
Designing secure library networks
Marshall BreedingFocuses on designing a library network to maximize security. Considers various options including separation of staff servers from public servers, subdividing the network using a…
A commercial software approach to workstation security
Dan MarmionUses the experience of Western Michigan University to consider ways of eliminating deliberate misuse of public library systems. Outlines the use of Fortes 101, an Integrity Kiosk…
Public workstation security: using operating systems and hardware tricks
Garvin BrakelPresents the security experiences of Spokane public library, which operates a client/server‐based wide area network of 200 PCs and four servers. Outlines its main security…
Securing public workstation by maintaining software centrally
Erik J. BieverConsiders the maintenance of secure public workstations through the use of a network server which centralizes software maintenance. Presents the experience of the libraries of the…
The changing role in a networked information environment
Clifford A. LynchOutlines the traditional issues surrounding authentication and authorization before charting the changing nature of the requirements for these services, as a fully networked…
TAO of gateway: providing Internet access to licensed databases
William V. Garrison, Gregory A. McClellanPresents the use of libraries as gateways providing the patron with access to the commercial vendor. Outlines the methods employed by the Mann Library at Cornell University and…
Decentralized account management in a library consortium: a report of HSLC’s implemenation of Guardian
Anita S. Wagner, Alan C. Simon, Cindy A. Pitchon, Dennis J. GormleyPresents a case study of the Health Sciences Libraries Consortium in Philadelphia using Ovid Technologies’ search system, database and Web gateway. Considers the authentication…
Using Bluestem for Web user authentication and access control of library resources
Timothy W. ColeProfiles the use of the program Bluestem developed by the University of Illinois for the control of access and authentication. Uses HTTPs and HTTP cookies to identify users from a…
The ICAAP Project, Part One: a continuum of security needs for the CIC virtual electronic library
Merri Beth LavagninoIntroduces a continuum of security needs for electronic libraries, starting from the most basic protection through to complicated encryption systems. Considers these against the…
The ICAAPProject, Part Two: the Web architecture
Bob RiddleOutlines the goals and objectives of the Inter Committee on Insitutional Co‐operation Authentication and Authorisation project (ICAAP) project in relation to the infrastructure…
The ICAAP Project, Part Three: OSF distributed computing environment
Scott CantorOutlines the use of distributed computing environment (DCE) software in the Inter Committee on Institutional Co‐operation Authentication and Authorisation project (ICAAP) project…
Things that go “bump” in the virtual night
Julie A. ForeConsiders the security of a server through the limiting of access, validity and integrity of information stored and maintenance of the availability and reliability of service…
After the break‐in occurs: how to handle the student hacker
Scott MuirOutlines the experience of the University of Alabama when a hacker bypassed the preventative security measures of the library management system and accessed the operating system…
To catch a hacker
Greg GermanPresents the experience of the Ohio Library and Information Network, OhioLINK, when a group of hackers accessed the system in 1994. Discusses the identification and collection of…
Give yourself a break; don’t give the hackers one
Jim RosaschiDiscusses the experience of Sonoma County Library when a hacker accessed the network and caused chaos to the maintenance of the system. Covers the effect of the hacker, the…
Time for new OPAC initiatives: an overview of landmarks in the literature and introduction to WordFocus
Joseph R. MatthewsComputer technology continues to evolve and improve at an astonishing rate; and the cost for most computer equipment will continue to decline over time. Now library automation…
The impact of electronic information sources on collection development: a survey of current practice
O. Gene NormanThis study investigates the effects of electronic information sources on collection development in 15 academic libraries, primarily in the Midwest. A search of the literature and…
Authorware for computer‐assisted instruction
Chris NiemeyerAuthorware is a sophisticated computer application that is ideal for computer‐assisted instruction. The application is at once powerful yet easy to learn. The Iowa State…
Information dropshipping
T.D. Webb, Bin ZhangThe appearance of revolutionary information technologies must elicit equivalent responses from the library profession, if for no other reason than simply to provide services that…
Buying your next PC: comments and perspectives
Walt CrawfordUnless you’re an inveterate upgrader, you’ll replace your personal computer every few years. Computer crazies say “every 18 months,” and a few retrograde managers might say “when…
ISSN:
0737-8831e-ISSN:
2054-166XISSN-L:
0737-8831Online date, start – end:
1983Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditors:
- Dr Dickson K.W. Chiu
- Dr Kevin K.W. Ho