Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Library and Information Science

Ethical Implications Of Artificial Intelligence And Machine Learning In Libraries And Information Centers: A Frameworks, Challenges, And Best Practices, Sudhakar Mishra Jun 2023

Ethical Implications Of Artificial Intelligence And Machine Learning In Libraries And Information Centers: A Frameworks, Challenges, And Best Practices, Sudhakar Mishra

Library Philosophy and Practice (e-journal)

The use of artificial intelligence (AI) and machine learning (ML) is increasingly becoming prevalent in libraries and information centres, promising to improve service delivery and efficiency. However, the use of these technologies also poses significant ethical challenges and risks, including bias and discrimination, privacy and security, automation and job displacement, and the lack of human interaction in service delivery. This conceptual paper provides an overview of the key ethical frameworks and principles relevant to the use of AI and ML in libraries and information centres, and analyses how these frameworks can be applied to this specific context. The paper also …


Security Of Information Resources In Academic Libraries In Kwara State, Nigeria, Abdrahman Atanda Moustapha Oct 2022

Security Of Information Resources In Academic Libraries In Kwara State, Nigeria, Abdrahman Atanda Moustapha

Library Philosophy and Practice (e-journal)

This study was on the security of information resources in academic libraries in Kwara State, Nigeria. Academic libraries in Kwara State include both private and public institutions. The libraries were predominantly selected for academic purposes, such as Kwara State University, University of Ilorin, Al-Hikmah University, and Kwara State Polytechnic Ilorin. Four research questions and four corresponding objectives of the study were framed. The case study design was approved for research. Targeted sampling was used to select 25 respondents from a pool of 115 professionals in all four academic libraries in Kwara State. Semi-structured interview guides were used to collect data …


Awareness Of Social Media Privacy & Security: A Study Among Engineering Students In Spsr Nellore Dist., A.P., Nagaraju Kuppugari Oct 2022

Awareness Of Social Media Privacy & Security: A Study Among Engineering Students In Spsr Nellore Dist., A.P., Nagaraju Kuppugari

Library Philosophy and Practice (e-journal)

This paper presents the results of a study conducted on the engineering student’s awareness of social media privacy and security issues. For this purpose, the survey method was adopted and a questionnaire was administered among the engineering students. The results revealed that majority of the respondents (60.8 percent) are reading the privacy policies on social media Majority of the respondents (76.31 percent) are avoiding friend requests from unknown persons. The study recommends that the users of social media should not assume that all privacy policies are identical; they vary from one platform to another; also, they do not provide sufficient …


Relevance Of Digital Libraries In The Promotion Of Security Through Community Policing Strategies In Rivers State, Nigeria, Adaobi Nwoye, Judith Ugwueke, Chinyere Anigbogu, Christian Olori Jul 2022

Relevance Of Digital Libraries In The Promotion Of Security Through Community Policing Strategies In Rivers State, Nigeria, Adaobi Nwoye, Judith Ugwueke, Chinyere Anigbogu, Christian Olori

Library Philosophy and Practice (e-journal)

No abstract provided.


Security Problems Of Academic Libraries In Nigeria, Angelyna Mindapa Jun 2022

Security Problems Of Academic Libraries In Nigeria, Angelyna Mindapa

Library Philosophy and Practice (e-journal)

Abstract

Librarians across Nigeria are gradually more concerned with the safety and physical integrity of important intellectual property or properties. Security and prevention of crimes in libraries more specifically academic libraries are necessary library duties for librarians to accomplish. Due to security breaches in university libraries, users at times are not able to get the information resources needed and this makes the library ineffective in satisfying users’ information needs. The security of collections in a library embraces a large number of responsibilities. The cost of acquiring processing, and maintaining collections are soaring. If information materials are stolen or damaged or …


Relevance Of Internet Of Things To Health Institutions In Clinical Data Management: Implication For Librarians, Faith O. Mesagan, Moses Elechi, Francis O. Adurota, Chinedu Obinna Ejimonye, Onyinyechi G. Ossai Jan 2022

Relevance Of Internet Of Things To Health Institutions In Clinical Data Management: Implication For Librarians, Faith O. Mesagan, Moses Elechi, Francis O. Adurota, Chinedu Obinna Ejimonye, Onyinyechi G. Ossai

Library Philosophy and Practice (e-journal)

The Internet of Things (IoT) is the internetworking of physical devices which consists of an embedded system with sensors, actuators and network connectivity that enable collection and exchange of data. Each day, we are witnessing the emergence of new technologies that have the capability to embed into our environment and measure the physical, social and contextual phenomenon. The technology behind IOT is driven by various technological forces such as smart devices, wireless network, and pervasive connectivity among others. Data collection, management and accessibility are made easy with Internet of Things IOT. The Internet of Things (IoT) is aimed at formulating …


The Impact Of Cloud Computing On Academic Libraries, Sivankalai S Sep 2021

The Impact Of Cloud Computing On Academic Libraries, Sivankalai S

Library Philosophy and Practice (e-journal)

With the introduction of computers and other forms of communication technology, library services have undergone a significant transformation. Libraries have been automated, networked, and are currently being converted into virtual or paperless libraries. This article is dedicated to many aspects of cloud computing, including different kinds and applications. There is a discussion about the advantages and drawbacks of cloud computing in academic libraries. The article also includes recommendations for professional librarians and academic libraries across the globe on how to take advantage of cloud computing resources. This article may be of use in the development of cloud-based services for university …


Recent Trends In Software-Defined Networking: A Bibliometric Review, Jones Jefferson, Harikrishnan R Jun 2021

Recent Trends In Software-Defined Networking: A Bibliometric Review, Jones Jefferson, Harikrishnan R

Library Philosophy and Practice (e-journal)

Software-Defined Networking is referred to as the next big thing in the field of networking. Legacy networks contain various components such as switches, routers, etc. with a variety of complex protocols. A network administrator is responsible for configuring all these various components. Apart from complex network management, network security is also a persistent issue in the field of networking. SDN promises simplicity in network management while also dramatically improving the security of networks. This paper gives an analysis of the current trends in in SDN as well as Security challenges with SDN. A bibliometric review on SDN has also been …


Security Challenges In Central University Libraries In India, Anam Jamal Ansari, Pm Naushad Ali Apr 2021

Security Challenges In Central University Libraries In India, Anam Jamal Ansari, Pm Naushad Ali

Library Philosophy and Practice (e-journal)

Safety and security are substantial issues for all kinds of libraries in the present time. It is an ever-evolving subject that should be discussed coherently.

This paper attempts to scrutinize security challenges faced by two major funded university libraries in India, i.e., Maulana Azad Library, Aligarh Muslim University, Aligarh, and Dr. B.R. Ambedkar Central Library, Jawaharlal Nehru University, New Delhi. It looks at the measures adopted by these libraries to ensure their collection's safety and explores the reasons and methods of theft, mutilation, and misplacement of the library collection. The survey research method was employed. Two separate questionnaires were used …


Bibliometric Survey On Zero-Knowledge Proof For Authentication, Adwait Pathak, Tejas Patil, Shubham Pawar, Piyush Raut, Smita Khairnar, Dr. Shilpa Gite Jan 2021

Bibliometric Survey On Zero-Knowledge Proof For Authentication, Adwait Pathak, Tejas Patil, Shubham Pawar, Piyush Raut, Smita Khairnar, Dr. Shilpa Gite

Library Philosophy and Practice (e-journal)

Background: Zero Knowledge Proof is a persuasive cryptographic protocol employed to provide data security by keeping the user's identity, using the services anonymously. Zero Knowledge Proof can be the preferred option to use in multiple circumstances. Instead of using the public key cryptographic protocols, the zero-knowledge proof usage does not expose or leak confidential data or information during the transmission. Zero Knowledge Proof protocols are comparatively lightweight; this results in making it efficient in terms of memory. Zero Knowledge Proof applications can reside in authentication, identity management, cryptocurrency transactions, and many more. Traditional authentication schemes are vulnerable to attacks …


Time Series Data Analysis Using Machine Learning-(Ml) Approach, Mvv Prasad Kantipudi Dr., Pradeep Kumar N.S Dr., S.Sreenath Kashyap Dr., Ss Anusha Vemuri Ms Jan 2021

Time Series Data Analysis Using Machine Learning-(Ml) Approach, Mvv Prasad Kantipudi Dr., Pradeep Kumar N.S Dr., S.Sreenath Kashyap Dr., Ss Anusha Vemuri Ms

Library Philosophy and Practice (e-journal)

Healthcare benefits related to continuous monitoring of human movement and physical activity can potentially reduce the risk of accidents associated with elderly living alone at home. Based on the literature review, it is found that many studies focus on human activity recognition and are still active towards achieving practical solutions to support the elderly care system. The proposed system has introduced a joint approach of machine learning and signal processing technology for the recognition of human's physical movements using signal data generated by accelerometer sensors. The framework adopts the concept of DSP to select very descriptive feature sets and uses …


Improving Records Management And Security For Successful Business Performance: The Role Of New Media, Olufemi K. Aramide Phd, Rita E. Ajibola, Olusoji S. Olatunji, Peter Oduroye Jan 2020

Improving Records Management And Security For Successful Business Performance: The Role Of New Media, Olufemi K. Aramide Phd, Rita E. Ajibola, Olusoji S. Olatunji, Peter Oduroye

Library Philosophy and Practice (e-journal)

The paper identifies how New Media has become one important phenomenon in shaping records management and security of information for successful business performance. With the advent of new media, paper documents could be read and converted automatically into electronic files thereby saving man hour of expensive data entry labour. The paper examines how records stored on electronic media can be readily accessed, and the importance of document security through proper document management. The paper findings reveals that records management plays a vital role in running a successful business and that businesses maintain sensitive information daily, as a result security measures …


Transhumanism (Dot) Mil: A Bibliometric Analysis Of Technoprogressive Terms In Military Publications, K. Durwood Evans Sep 2019

Transhumanism (Dot) Mil: A Bibliometric Analysis Of Technoprogressive Terms In Military Publications, K. Durwood Evans

Library Philosophy and Practice (e-journal)

Has transhumanism influenced military thinking? Previous work found that transhumanist terms did not appear widely in military publications. The present work analyzes and improves on previous content analysis of transhumanist terms in military literature using the tools of library and information studies.


The Use Of Ict For Security And Theft Prevention In Two University Libraries In Nigeria, Akor Usman Philip, Justina N. Ekere Dr, Solomon O. Akor Mr May 2019

The Use Of Ict For Security And Theft Prevention In Two University Libraries In Nigeria, Akor Usman Philip, Justina N. Ekere Dr, Solomon O. Akor Mr

Library Philosophy and Practice (e-journal)

The study investigated the use of ICT for security and theft prevention in two university libraries in Nigeria. Population of the study is made up of 80 library staff of the two universities, 40 library staff from Umaru Musa Yar’adua University, Katsina and 40 library staff from Al-Qalam University Katsina. Five research questions guided the study. The data was analyzed with the use of simple statistical tools like frequencies and percentages. Findings of the study revealed that maximum security in the libraries will prevent theft mutilation. It also revealed that a video surveillance system working in conjunction with a barcode …


Disaster And Security Preparedness Of Libraries In India, Sandip Pathak Jan 2019

Disaster And Security Preparedness Of Libraries In India, Sandip Pathak

Library Philosophy and Practice (e-journal)

Academic libraries are the “heart” of the learning community, providing a place for Users and advance their knowledge. Simmonds, (2001). Libraries must be safe from security threats and physical weakness. To secure and protectthe collections will facilitate to libraries give an efficient service in response to theinformation required of the university community


Websites Of Indian Banks: A Webometric Study, Arindam Sarkar, Ashok Pal Dec 2018

Websites Of Indian Banks: A Webometric Study, Arindam Sarkar, Ashok Pal

Library Philosophy and Practice (e-journal)

Abstract: Web Impact Factor (WIF), Search Engine Optimization (SEO) ranking improve the visibility of a website’s presence in online environment. The present study predominantly focuses on the WIFs of the Indian banking websites. On the basis of SEO (search engine optimization) effort has been made to measure the usability, performance, security of the websites, used headings, usage of images and alt tags, linking with social networking sites as well as to count the backlinks, page size, load time, request, traffic score, SEO score and speed score. Popularity ranking of the selected bank websites has also been done. Calculating three types …


Security Management For Prevention Of Book Thefts In University Libraries. A Case Study Of Benue State University Library, Nigeria, Philip Usman Akor Dr Oct 2013

Security Management For Prevention Of Book Thefts In University Libraries. A Case Study Of Benue State University Library, Nigeria, Philip Usman Akor Dr

Library Philosophy and Practice (e-journal)

ABSTRACT

This paper examines the security management for prevention of book thefts in University libraries with Benue State University Library, Makurdi. Benue State. Nigeria serving as a case study. The aim of the study was to identify the causes of book thefts and mutilation in University libraries and how to curb and preserve the continuous use of this information resources in the library. The survey research method was employed. Questionnaire are the main instrument for data collection. Frequency, tables, percentages is the main statistical tools used for data analysis. Results of the analysis showed that the university library books are …