The clash of principles between protecting privacy and protecting security can create an impasse between libraries, campus IT departments, and academic administration over authentication issues with the public area PCs in the library. This research takes an in-depth look at the state of authentication practices within a specific region (i.e. all the academic libraries in North Carolina) in an attempt to create a profile of those libraries that choose to authenticate or not. The researchers reviewed an extensive amount of data to identify the factors involved with this decision
Libraries have always been places where individuals feel free to explore new ideas and seek out info...
The rapid advance of information and communication technologies (ICT) has permitted the creation of ...
Peer ReviewedAim: To investigate how unaffiliated (walk-in, community) users access electronic resou...
The clash of principles between protecting privacy and protecting security can create an impasse bet...
There is a clash of principles between protecting privacy and that of protecting security that can r...
In the fall of 2004, the Academic Computing Center, a division of the Information Technology Se...
This research investigated the importance of user-library trust in ensuring vital freedom of inquiry...
This paper discussed how identity and access management is applied to libraries to improve their usa...
This presentation talks about how the presenters got started looking into authentication in academic...
Modern authentication systems offer more security and simplified analytics, enable access to reporti...
Privacy and confidentiality are fundamental values of libraries and are vital to the preservation of...
A variety of data collection methods were used to identify access and authentication issues faced by...
Most of 814 academic libraries surveyed allow onsite access to unaffiliated users, and many give bor...
Objective – The tension between upholding privacy as a professional value and the ubiquity of collec...
Gone are the days of unsecure access to electronic resources. Adoption of standards regarding secure...
Libraries have always been places where individuals feel free to explore new ideas and seek out info...
The rapid advance of information and communication technologies (ICT) has permitted the creation of ...
Peer ReviewedAim: To investigate how unaffiliated (walk-in, community) users access electronic resou...
The clash of principles between protecting privacy and protecting security can create an impasse bet...
There is a clash of principles between protecting privacy and that of protecting security that can r...
In the fall of 2004, the Academic Computing Center, a division of the Information Technology Se...
This research investigated the importance of user-library trust in ensuring vital freedom of inquiry...
This paper discussed how identity and access management is applied to libraries to improve their usa...
This presentation talks about how the presenters got started looking into authentication in academic...
Modern authentication systems offer more security and simplified analytics, enable access to reporti...
Privacy and confidentiality are fundamental values of libraries and are vital to the preservation of...
A variety of data collection methods were used to identify access and authentication issues faced by...
Most of 814 academic libraries surveyed allow onsite access to unaffiliated users, and many give bor...
Objective – The tension between upholding privacy as a professional value and the ubiquity of collec...
Gone are the days of unsecure access to electronic resources. Adoption of standards regarding secure...
Libraries have always been places where individuals feel free to explore new ideas and seek out info...
The rapid advance of information and communication technologies (ICT) has permitted the creation of ...
Peer ReviewedAim: To investigate how unaffiliated (walk-in, community) users access electronic resou...