Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Security

Discipline
Institution
Publication Year
Publication
File Type

Articles 1 - 30 of 36

Full-Text Articles in Library and Information Science

Protecting The Integrity Of Archives, Sean Daigle Jan 2024

Protecting The Integrity Of Archives, Sean Daigle

School of Information Sciences Student Scholarship

This article examines the problem of fraudulent and stolen materials being introduced into archives. If these issues become common enough, people will not trust archives or history itself. Archivists can fight these problems by learning how to spot potential sellers of stolen or fraudulent items. They can also catalog unique aspects of their collections and share them on the internet, dedicate more resources to security, and hire experts when items’ authenticity is called into question. The most helpful step they can take, however, is being so diligent about establishing provenance that provenance becomes a security measure in itself. Ultimately, resources …


Ethical Implications Of Artificial Intelligence And Machine Learning In Libraries And Information Centers: A Frameworks, Challenges, And Best Practices, Sudhakar Mishra Jun 2023

Ethical Implications Of Artificial Intelligence And Machine Learning In Libraries And Information Centers: A Frameworks, Challenges, And Best Practices, Sudhakar Mishra

Library Philosophy and Practice (e-journal)

The use of artificial intelligence (AI) and machine learning (ML) is increasingly becoming prevalent in libraries and information centres, promising to improve service delivery and efficiency. However, the use of these technologies also poses significant ethical challenges and risks, including bias and discrimination, privacy and security, automation and job displacement, and the lack of human interaction in service delivery. This conceptual paper provides an overview of the key ethical frameworks and principles relevant to the use of AI and ML in libraries and information centres, and analyses how these frameworks can be applied to this specific context. The paper also …


The Privacy Librarian Is In!: How Privacy Issues Affect Researchers And Libraries, John Felts, Heather Staines, Tim Lloyd, Beth Bernhardt, Russell Palmer Mar 2023

The Privacy Librarian Is In!: How Privacy Issues Affect Researchers And Libraries, John Felts, Heather Staines, Tim Lloyd, Beth Bernhardt, Russell Palmer

Library Faculty Presentations

Faced with an increasingly complex online environment through which libraries provide access to scholarly resources, librarians have found it difficult to educate users in protecting their personal information and online behaviors from inappropriate and sometimes unauthorized use while promoting the personalization services that users find beneficial. Modeled after the long-running Peanuts cartoon with Lucy offering advice for 5 cents, this interactive session will tackle key privacy issues in the researcher, vendor, and library framework. It will kick off with John Felts of Coastal Carolina staffing his post as "Privacy Librarian" while training a new library employee.


After this tour through …


Security Of Information Resources In Academic Libraries In Kwara State, Nigeria, Abdrahman Atanda Moustapha Oct 2022

Security Of Information Resources In Academic Libraries In Kwara State, Nigeria, Abdrahman Atanda Moustapha

Library Philosophy and Practice (e-journal)

This study was on the security of information resources in academic libraries in Kwara State, Nigeria. Academic libraries in Kwara State include both private and public institutions. The libraries were predominantly selected for academic purposes, such as Kwara State University, University of Ilorin, Al-Hikmah University, and Kwara State Polytechnic Ilorin. Four research questions and four corresponding objectives of the study were framed. The case study design was approved for research. Targeted sampling was used to select 25 respondents from a pool of 115 professionals in all four academic libraries in Kwara State. Semi-structured interview guides were used to collect data …


Awareness Of Social Media Privacy & Security: A Study Among Engineering Students In Spsr Nellore Dist., A.P., Nagaraju Kuppugari Oct 2022

Awareness Of Social Media Privacy & Security: A Study Among Engineering Students In Spsr Nellore Dist., A.P., Nagaraju Kuppugari

Library Philosophy and Practice (e-journal)

This paper presents the results of a study conducted on the engineering student’s awareness of social media privacy and security issues. For this purpose, the survey method was adopted and a questionnaire was administered among the engineering students. The results revealed that majority of the respondents (60.8 percent) are reading the privacy policies on social media Majority of the respondents (76.31 percent) are avoiding friend requests from unknown persons. The study recommends that the users of social media should not assume that all privacy policies are identical; they vary from one platform to another; also, they do not provide sufficient …


Relevance Of Digital Libraries In The Promotion Of Security Through Community Policing Strategies In Rivers State, Nigeria, Adaobi Nwoye, Judith Ugwueke, Chinyere Anigbogu, Christian Olori Jul 2022

Relevance Of Digital Libraries In The Promotion Of Security Through Community Policing Strategies In Rivers State, Nigeria, Adaobi Nwoye, Judith Ugwueke, Chinyere Anigbogu, Christian Olori

Library Philosophy and Practice (e-journal)

No abstract provided.


Security Problems Of Academic Libraries In Nigeria, Angelyna Mindapa Jun 2022

Security Problems Of Academic Libraries In Nigeria, Angelyna Mindapa

Library Philosophy and Practice (e-journal)

Abstract

Librarians across Nigeria are gradually more concerned with the safety and physical integrity of important intellectual property or properties. Security and prevention of crimes in libraries more specifically academic libraries are necessary library duties for librarians to accomplish. Due to security breaches in university libraries, users at times are not able to get the information resources needed and this makes the library ineffective in satisfying users’ information needs. The security of collections in a library embraces a large number of responsibilities. The cost of acquiring processing, and maintaining collections are soaring. If information materials are stolen or damaged or …


Law Library Blog (March 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law Mar 2022

Law Library Blog (March 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Relevance Of Internet Of Things To Health Institutions In Clinical Data Management: Implication For Librarians, Faith O. Mesagan, Moses Elechi, Francis O. Adurota, Chinedu Obinna Ejimonye, Onyinyechi G. Ossai Jan 2022

Relevance Of Internet Of Things To Health Institutions In Clinical Data Management: Implication For Librarians, Faith O. Mesagan, Moses Elechi, Francis O. Adurota, Chinedu Obinna Ejimonye, Onyinyechi G. Ossai

Library Philosophy and Practice (e-journal)

The Internet of Things (IoT) is the internetworking of physical devices which consists of an embedded system with sensors, actuators and network connectivity that enable collection and exchange of data. Each day, we are witnessing the emergence of new technologies that have the capability to embed into our environment and measure the physical, social and contextual phenomenon. The technology behind IOT is driven by various technological forces such as smart devices, wireless network, and pervasive connectivity among others. Data collection, management and accessibility are made easy with Internet of Things IOT. The Internet of Things (IoT) is aimed at formulating …


Recent Advances In Wearable Sensing Technologies, Alfredo J. Perez, Sherali Zeadally Oct 2021

Recent Advances In Wearable Sensing Technologies, Alfredo J. Perez, Sherali Zeadally

Information Science Faculty Publications

Wearable sensing technologies are having a worldwide impact on the creation of novel business opportunities and application services that are benefiting the common citizen. By using these technologies, people have transformed the way they live, interact with each other and their surroundings, their daily routines, and how they monitor their health conditions. We review recent advances in the area of wearable sensing technologies, focusing on aspects such as sensor technologies, communication infrastructures, service infrastructures, security, and privacy. We also review the use of consumer wearables during the coronavirus disease 19 (COVID-19) pandemic caused by the severe acute respiratory syndrome coronavirus …


The Impact Of Cloud Computing On Academic Libraries, Sivankalai S Sep 2021

The Impact Of Cloud Computing On Academic Libraries, Sivankalai S

Library Philosophy and Practice (e-journal)

With the introduction of computers and other forms of communication technology, library services have undergone a significant transformation. Libraries have been automated, networked, and are currently being converted into virtual or paperless libraries. This article is dedicated to many aspects of cloud computing, including different kinds and applications. There is a discussion about the advantages and drawbacks of cloud computing in academic libraries. The article also includes recommendations for professional librarians and academic libraries across the globe on how to take advantage of cloud computing resources. This article may be of use in the development of cloud-based services for university …


Secure Self-Checkout Kiosks Using Alma Api With Two-Factor Authentication, Ron Bulaon Aug 2021

Secure Self-Checkout Kiosks Using Alma Api With Two-Factor Authentication, Ron Bulaon

Research Collection Library

Self-checkout kiosks have become a staple feature of many modern and digitized libraries. These devices are used by library patrons for self-service item loans. Most implementations are not new, in fact many of these systems are simple, straight forward and work as intended. But behind this useful technology, there is a security concern on authentication that has to be addressed.

In my proposed presentation, I will discuss the risk factors of self-checkout kiosks and propose a solution using Alma APIs. I will address the technical shortcomings of the current implementations, compared to the proposed solution, and where the weakest link …


Recent Trends In Software-Defined Networking: A Bibliometric Review, Jones Jefferson, Harikrishnan R Jun 2021

Recent Trends In Software-Defined Networking: A Bibliometric Review, Jones Jefferson, Harikrishnan R

Library Philosophy and Practice (e-journal)

Software-Defined Networking is referred to as the next big thing in the field of networking. Legacy networks contain various components such as switches, routers, etc. with a variety of complex protocols. A network administrator is responsible for configuring all these various components. Apart from complex network management, network security is also a persistent issue in the field of networking. SDN promises simplicity in network management while also dramatically improving the security of networks. This paper gives an analysis of the current trends in in SDN as well as Security challenges with SDN. A bibliometric review on SDN has also been …


Security Challenges In Central University Libraries In India, Anam Jamal Ansari, Pm Naushad Ali Apr 2021

Security Challenges In Central University Libraries In India, Anam Jamal Ansari, Pm Naushad Ali

Library Philosophy and Practice (e-journal)

Safety and security are substantial issues for all kinds of libraries in the present time. It is an ever-evolving subject that should be discussed coherently.

This paper attempts to scrutinize security challenges faced by two major funded university libraries in India, i.e., Maulana Azad Library, Aligarh Muslim University, Aligarh, and Dr. B.R. Ambedkar Central Library, Jawaharlal Nehru University, New Delhi. It looks at the measures adopted by these libraries to ensure their collection's safety and explores the reasons and methods of theft, mutilation, and misplacement of the library collection. The survey research method was employed. Two separate questionnaires were used …


Bibliometric Survey On Zero-Knowledge Proof For Authentication, Adwait Pathak, Tejas Patil, Shubham Pawar, Piyush Raut, Smita Khairnar, Dr. Shilpa Gite Jan 2021

Bibliometric Survey On Zero-Knowledge Proof For Authentication, Adwait Pathak, Tejas Patil, Shubham Pawar, Piyush Raut, Smita Khairnar, Dr. Shilpa Gite

Library Philosophy and Practice (e-journal)

Background: Zero Knowledge Proof is a persuasive cryptographic protocol employed to provide data security by keeping the user's identity, using the services anonymously. Zero Knowledge Proof can be the preferred option to use in multiple circumstances. Instead of using the public key cryptographic protocols, the zero-knowledge proof usage does not expose or leak confidential data or information during the transmission. Zero Knowledge Proof protocols are comparatively lightweight; this results in making it efficient in terms of memory. Zero Knowledge Proof applications can reside in authentication, identity management, cryptocurrency transactions, and many more. Traditional authentication schemes are vulnerable to attacks …


Time Series Data Analysis Using Machine Learning-(Ml) Approach, Mvv Prasad Kantipudi Dr., Pradeep Kumar N.S Dr., S.Sreenath Kashyap Dr., Ss Anusha Vemuri Ms Jan 2021

Time Series Data Analysis Using Machine Learning-(Ml) Approach, Mvv Prasad Kantipudi Dr., Pradeep Kumar N.S Dr., S.Sreenath Kashyap Dr., Ss Anusha Vemuri Ms

Library Philosophy and Practice (e-journal)

Healthcare benefits related to continuous monitoring of human movement and physical activity can potentially reduce the risk of accidents associated with elderly living alone at home. Based on the literature review, it is found that many studies focus on human activity recognition and are still active towards achieving practical solutions to support the elderly care system. The proposed system has introduced a joint approach of machine learning and signal processing technology for the recognition of human's physical movements using signal data generated by accelerometer sensors. The framework adopts the concept of DSP to select very descriptive feature sets and uses …


Library Security: Perceptions Of Preparedness, Abby Adams, Karen E. Kiorpes Jan 2021

Library Security: Perceptions Of Preparedness, Abby Adams, Karen E. Kiorpes

University Libraries Faculty Scholarship

This article details the results of two parallel surveys sent to the heads of campus security and the libraries at 54 schools within the SUNY system. We undertook this study to determine the extent of collaboration between these groups and to learn where library and security staff perceptions of safety and preparedness differ. The findings indicated that most campuses have emergency response plans in place for the possibility of a high-impact violent event or a human-caused emergency. However, libraries are less likely to have dedicated emergency plans and report an inconsistent mix of physical security measures and staff safety trainings. …


Improving Records Management And Security For Successful Business Performance: The Role Of New Media, Olufemi K. Aramide Phd, Rita E. Ajibola, Olusoji S. Olatunji, Peter Oduroye Jan 2020

Improving Records Management And Security For Successful Business Performance: The Role Of New Media, Olufemi K. Aramide Phd, Rita E. Ajibola, Olusoji S. Olatunji, Peter Oduroye

Library Philosophy and Practice (e-journal)

The paper identifies how New Media has become one important phenomenon in shaping records management and security of information for successful business performance. With the advent of new media, paper documents could be read and converted automatically into electronic files thereby saving man hour of expensive data entry labour. The paper examines how records stored on electronic media can be readily accessed, and the importance of document security through proper document management. The paper findings reveals that records management plays a vital role in running a successful business and that businesses maintain sensitive information daily, as a result security measures …


The Future Of Security, Yesterday: All About Authentication, Authorization And More…, Rachel S. Evans Sep 2019

The Future Of Security, Yesterday: All About Authentication, Authorization And More…, Rachel S. Evans

Articles, Chapters and Online Publications

Rachel Evans crafts a summary of useful terminology aimed at other new CS-SIS members and attempts to demystify by way of definitions and explanations the tangled concepts of authentication and authorization.

The CS-SIS Blog Committee is charged with providing CS-SIS members with timely and useful information through an official yet informal medium about relevant subjects for the membership, including the activities of the members, committees, and Executive Board.


Transhumanism (Dot) Mil: A Bibliometric Analysis Of Technoprogressive Terms In Military Publications, K. Durwood Evans Sep 2019

Transhumanism (Dot) Mil: A Bibliometric Analysis Of Technoprogressive Terms In Military Publications, K. Durwood Evans

Library Philosophy and Practice (e-journal)

Has transhumanism influenced military thinking? Previous work found that transhumanist terms did not appear widely in military publications. The present work analyzes and improves on previous content analysis of transhumanist terms in military literature using the tools of library and information studies.


The Use Of Ict For Security And Theft Prevention In Two University Libraries In Nigeria, Akor Usman Philip, Justina N. Ekere Dr, Solomon O. Akor Mr May 2019

The Use Of Ict For Security And Theft Prevention In Two University Libraries In Nigeria, Akor Usman Philip, Justina N. Ekere Dr, Solomon O. Akor Mr

Library Philosophy and Practice (e-journal)

The study investigated the use of ICT for security and theft prevention in two university libraries in Nigeria. Population of the study is made up of 80 library staff of the two universities, 40 library staff from Umaru Musa Yar’adua University, Katsina and 40 library staff from Al-Qalam University Katsina. Five research questions guided the study. The data was analyzed with the use of simple statistical tools like frequencies and percentages. Findings of the study revealed that maximum security in the libraries will prevent theft mutilation. It also revealed that a video surveillance system working in conjunction with a barcode …


Disaster And Security Preparedness Of Libraries In India, Sandip Pathak Jan 2019

Disaster And Security Preparedness Of Libraries In India, Sandip Pathak

Library Philosophy and Practice (e-journal)

Academic libraries are the “heart” of the learning community, providing a place for Users and advance their knowledge. Simmonds, (2001). Libraries must be safe from security threats and physical weakness. To secure and protectthe collections will facilitate to libraries give an efficient service in response to theinformation required of the university community


Websites Of Indian Banks: A Webometric Study, Arindam Sarkar, Ashok Pal Dec 2018

Websites Of Indian Banks: A Webometric Study, Arindam Sarkar, Ashok Pal

Library Philosophy and Practice (e-journal)

Abstract: Web Impact Factor (WIF), Search Engine Optimization (SEO) ranking improve the visibility of a website’s presence in online environment. The present study predominantly focuses on the WIFs of the Indian banking websites. On the basis of SEO (search engine optimization) effort has been made to measure the usability, performance, security of the websites, used headings, usage of images and alt tags, linking with social networking sites as well as to count the backlinks, page size, load time, request, traffic score, SEO score and speed score. Popularity ranking of the selected bank websites has also been done. Calculating three types …


Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally Jul 2018

Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally

Information Science Faculty Publications

One of the most important Internet of Things applications is the wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control. Due to large deployments of small scale smart sensors in WBSNs, security, and privacy guarantees (e.g., security and safety-critical data, sensitive private information) are becoming a challenging issue because these sensor nodes communicate using an open channel, i.e., Internet. We implement data integrity (to resist against malicious tampering) using the secure hash algorithm 3 (SHA-3) when smart sensors in WBSNs communicate with each other using the Internet. Due to the limited resources (i.e., storage, …


"This Was Actually Fun!": Engaging Users In Conversations About Digital Literacy, Madisson Goldhawk, Erin Johnson, Lillian S. Rigling Jun 2018

"This Was Actually Fun!": Engaging Users In Conversations About Digital Literacy, Madisson Goldhawk, Erin Johnson, Lillian S. Rigling

Western Libraries Presentations

This interactive presentation highlights pop-up programming designed to improve 21st century digital literacies. The session includes an overview of activity development and reflections on its success. Participants will explore light-touch digital literacy games on their personal devices and take home tools to recreate similar programming at their library.


Investigating Security For Ubiquitous Sensor Networks, Alfredo J. Perez, Sherali Zeadally, Nafaa Jabeur Jun 2017

Investigating Security For Ubiquitous Sensor Networks, Alfredo J. Perez, Sherali Zeadally, Nafaa Jabeur

Information Science Faculty Publications

The availability of powerful and sensor-enabled mobile and Internet-connected devices have enabled the advent of the ubiquitous sensor network paradigm which is providing various types of solutions to the community and the individual user in various sectors including environmental monitoring, entertainment, transportation, security, and healthcare. We explore and compare the features of wireless sensor networks and ubiquitous sensor networks and based on the differences between these two types of systems, we classify the security-related challenges of ubiquitous sensor networks. We identify and discuss solutions available to address these challenges. Finally, we briefly discuss open challenges that need to be addressed …


The Library As Safe Space, Rachel S. Wexelbaum Jan 2017

The Library As Safe Space, Rachel S. Wexelbaum

Library Faculty Publications

Purpose: This chapter will explain how libraries define safe space through policies, procedures, and professional codes of ethics. The chapter will generate a history of the concept of libraries as safe space, will explain how libraries attempt to create safe spaces in physical and online environments, and will show how library practices both help and harm patrons in need of safe space.

Design/methodology/approach: This chapter provides a review of the literature that illustrates how libraries provide safe space—or not—for their patrons. The author will deconstruct the ALA Code of Ethics and Bill of Rights to demonstrate how libraries remain heteronormative …


Freedom In My Heart, Karen Sandler Jun 2015

Freedom In My Heart, Karen Sandler

Events

No abstract provided.


Privacy Advocacy In Libraries In The Age Of Mass Surveillance, Alison Macrina May 2015

Privacy Advocacy In Libraries In The Age Of Mass Surveillance, Alison Macrina

LACUNY Institute 2015

Alison Macrina is the founder and director of the Library Freedom Project, an initiative that aims to make real the promise of intellectual freedom in libraries. The Library Freedom Project trains librarians on the state of global surveillance, privacy rights, and privacy-protecting technology, so that librarians may in turn teach their communities about safeguarding privacy. In 2015, Alison was named one of Library Journal‘s Movers and Shakers. Read more about the Library Freedom Project at libraryfreedomproject.org.


Security Management For Prevention Of Book Thefts In University Libraries. A Case Study Of Benue State University Library, Nigeria, Philip Usman Akor Dr Oct 2013

Security Management For Prevention Of Book Thefts In University Libraries. A Case Study Of Benue State University Library, Nigeria, Philip Usman Akor Dr

Library Philosophy and Practice (e-journal)

ABSTRACT

This paper examines the security management for prevention of book thefts in University libraries with Benue State University Library, Makurdi. Benue State. Nigeria serving as a case study. The aim of the study was to identify the causes of book thefts and mutilation in University libraries and how to curb and preserve the continuous use of this information resources in the library. The survey research method was employed. Questionnaire are the main instrument for data collection. Frequency, tables, percentages is the main statistical tools used for data analysis. Results of the analysis showed that the university library books are …