Access and identity management for libraries : controlling by Masha Garibyan, Simon McLeish, John Paschoud

By Masha Garibyan, Simon McLeish, John Paschoud

With the fast bring up within the use of digital assets in libraries, coping with entry to on-line details is a space many librarians fight with. This sensible ebook is the 1st to give an explanation for the rules in the back of entry administration, the to be had applied sciences and the way they paintings. It offers specific case reviews describing how entry administration is being applied at organizational and nationwide degrees within the united states and Europe, and serves as a realistic advisor to the assets to be had to aid plan, enforce and function entry administration in libraries

Show description

Read Online or Download Access and identity management for libraries : controlling access to online information PDF

Similar library management books

Handbook of Critical Information Systems Research: Theory and Application

The severe culture in info structures learn, in accordance with Howcroft (Manchester company university, U. of Manchester, united kingdom) and Trauth (School of data Sciences and expertise, US), is characterised via the subjects of emancipation from strength kinfolk, critique of culture, rejection of the primacy of monetary potency (non-performative intent), critique of technological selection, and methodological reflexitivity.

Collection Management For Youth: Responding To The Needs Of Learners

It truly is not approximately near to having the "best" assortment. As schooling shifts to a learner-centered surroundings, assortment improvement needs to handle the dynamic interaction among all stakeholders within the wider tuition neighborhood. according to the most recent academic conception and examine, Hughes-Hassell and Mancall suggest a plan to function college media facilities in the course of radical flux, whereas assembly scholars' details wishes in a holistic context.

The Power of Survey Design: A User's Guide for Managing Surveys, Interpreting Results, and Influencing Respondents

A pragmatic how-to advisor on the entire steps concerned with survey implementation, this quantity covers survey administration, questionnaire layout, sampling, respondent's psychology and survey participation, and knowledge administration. A finished and functional reference if you happen to either use and convey survey facts.

Implementing and Managing eGovernment: An International Text

The 1st textbook on details structures to particularly handle public quarter and executive matters, 'Implementing and coping with eGovernment' deals a really overseas viewpoint and insurance, incorporating hundreds and hundreds of case reviews and case sketches. half ONE: handling eGOVERNMENT realizing eGovernment techniques to administration of eGovernment structures eGovernment method handling Public information middle administration matters for eGovernment rising administration concerns for eGovernment half : enforcing eGOVERNMENT eGovernment approach Lifecycle and undertaking overview research of present fact layout of the hot eGovernment method eGovernment possibility overview and Mitigation eGovernment method development, Implementation and past constructing eGovernment Hybrids

Additional resources for Access and identity management for libraries : controlling access to online information

Example text

Old exam papers and dissertations. Some libraries have intranets that contain both restricted and open content (Rowley, 1998, 194). Electronic reading list systems are also gaining popularity amongst academic libraries. All these resources and services may be available to all but they also need access management, as discussed above. Publishers and licensing issues In January 2011 Primary Research Group published a survey of library database practices (Primary Research Group, 2011). The survey looked at how 70 academic, special and public libraries in the UK, USA, Europe, Canada and Australia managed their commercial database subscriptions.

For example, it is not uncommon for an individual to have a series of relationships with an organization like a university: appearing first as a potential undergraduate student, then as a student, then (possibly after a gap) enrolling at the same institution for a postgraduate course; and then perhaps turning up again later as an academic staff member. Some of the identifying details of an individual may well change during the average human lifetime: names (on marriage or for other reasons), gender, and certainly appearance.

Illingworth, H. and Reynolds, P. (2000) Authentication and Supervision: a survey of user attitudes, Computers and Security, 19, 529–39. htm. Lynch, C. ) (1998) A White Paper on Authentication and Access Management Issues in Cross-Organizational Use of Networked Information Resources, Coalition for Networked Information, Garibyan et al. org/about-cni/staff/clifford-a-lynch/publications. uk/ukpga/1998/29/contents. aspx. Garibyan et al. Access & identity TEXT PROOF 04 07/10/2013 14:01 Page 31 4 Current access management technologies This chapter gives an overview of some current access management technologies and the advantages and disadvantages of using a particular technology.

Download PDF sample

Rated 4.49 of 5 – based on 15 votes