Open Access. Powered by Scholars. Published by Universities.®
Library and Information Science Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (5)
- Computer Engineering (4)
- Computer Sciences (4)
- Physical Sciences and Mathematics (4)
- Scholarly Communication (4)
-
- Digital Communications and Networking (2)
- Electrical and Computer Engineering (2)
- Information Literacy (2)
- Information Security (2)
- Intellectual Property Law (2)
- Law (2)
- Law Librarianship (2)
- Other Computer Engineering (2)
- Public Affairs, Public Policy and Public Administration (2)
- Science and Technology Policy (2)
- Arts and Humanities (1)
- Biomedical (1)
- Cataloging and Metadata (1)
- Computer Law (1)
- Data Storage Systems (1)
- Defense and Security Studies (1)
- Development Studies (1)
- Education (1)
- Engineering Education (1)
- Judges (1)
- Law and Gender (1)
- Legal Education (1)
- Legal Profession (1)
- Institution
-
- University of Nebraska - Lincoln (17)
- University of Kentucky (3)
- City University of New York (CUNY) (2)
- Syracuse University (2)
- California Polytechnic State University, San Luis Obispo (1)
-
- Coastal Carolina University (1)
- Georgia Southern University (1)
- Illinois State University (1)
- Roger Williams University (1)
- Singapore Management University (1)
- St. Cloud State University (1)
- Thomas Jefferson University (1)
- University at Albany, State University of New York (1)
- University of Georgia School of Law (1)
- Wayne State University (1)
- Western University (1)
- Publication Year
- Publication
-
- Library Philosophy and Practice (e-journal) (17)
- Information Science Faculty Publications (3)
- School of Information Studies - Faculty Scholarship (2)
- Academic Commons and Scott Memorial Library Staff Papers and Presentations (1)
- Articles, Chapters and Online Publications (1)
-
- Events (1)
- Faculty and Staff Publications – Milner Library (1)
- LACUNY Institute 2015 (1)
- Law Library Newsletters/Blog (1)
- Library Faculty Presentations (1)
- Library Faculty Publications (1)
- Research Collection Library (1)
- Robert E. Kennedy Library (1)
- School of Information Sciences Student Scholarship (1)
- University Libraries Faculty Scholarship (1)
- University Libraries News Online (2008-2023) (1)
- Western Libraries Presentations (1)
- File Type
Articles 1 - 30 of 36
Full-Text Articles in Library and Information Science
Protecting The Integrity Of Archives, Sean Daigle
Protecting The Integrity Of Archives, Sean Daigle
School of Information Sciences Student Scholarship
This article examines the problem of fraudulent and stolen materials being introduced into archives. If these issues become common enough, people will not trust archives or history itself. Archivists can fight these problems by learning how to spot potential sellers of stolen or fraudulent items. They can also catalog unique aspects of their collections and share them on the internet, dedicate more resources to security, and hire experts when items’ authenticity is called into question. The most helpful step they can take, however, is being so diligent about establishing provenance that provenance becomes a security measure in itself. Ultimately, resources …
Ethical Implications Of Artificial Intelligence And Machine Learning In Libraries And Information Centers: A Frameworks, Challenges, And Best Practices, Sudhakar Mishra
Ethical Implications Of Artificial Intelligence And Machine Learning In Libraries And Information Centers: A Frameworks, Challenges, And Best Practices, Sudhakar Mishra
Library Philosophy and Practice (e-journal)
The use of artificial intelligence (AI) and machine learning (ML) is increasingly becoming prevalent in libraries and information centres, promising to improve service delivery and efficiency. However, the use of these technologies also poses significant ethical challenges and risks, including bias and discrimination, privacy and security, automation and job displacement, and the lack of human interaction in service delivery. This conceptual paper provides an overview of the key ethical frameworks and principles relevant to the use of AI and ML in libraries and information centres, and analyses how these frameworks can be applied to this specific context. The paper also …
The Privacy Librarian Is In!: How Privacy Issues Affect Researchers And Libraries, John Felts, Heather Staines, Tim Lloyd, Beth Bernhardt, Russell Palmer
The Privacy Librarian Is In!: How Privacy Issues Affect Researchers And Libraries, John Felts, Heather Staines, Tim Lloyd, Beth Bernhardt, Russell Palmer
Library Faculty Presentations
Faced with an increasingly complex online environment through which libraries provide access to scholarly resources, librarians have found it difficult to educate users in protecting their personal information and online behaviors from inappropriate and sometimes unauthorized use while promoting the personalization services that users find beneficial. Modeled after the long-running Peanuts cartoon with Lucy offering advice for 5 cents, this interactive session will tackle key privacy issues in the researcher, vendor, and library framework. It will kick off with John Felts of Coastal Carolina staffing his post as "Privacy Librarian" while training a new library employee.
After this tour through …
Security Of Information Resources In Academic Libraries In Kwara State, Nigeria, Abdrahman Atanda Moustapha
Security Of Information Resources In Academic Libraries In Kwara State, Nigeria, Abdrahman Atanda Moustapha
Library Philosophy and Practice (e-journal)
This study was on the security of information resources in academic libraries in Kwara State, Nigeria. Academic libraries in Kwara State include both private and public institutions. The libraries were predominantly selected for academic purposes, such as Kwara State University, University of Ilorin, Al-Hikmah University, and Kwara State Polytechnic Ilorin. Four research questions and four corresponding objectives of the study were framed. The case study design was approved for research. Targeted sampling was used to select 25 respondents from a pool of 115 professionals in all four academic libraries in Kwara State. Semi-structured interview guides were used to collect data …
Awareness Of Social Media Privacy & Security: A Study Among Engineering Students In Spsr Nellore Dist., A.P., Nagaraju Kuppugari
Awareness Of Social Media Privacy & Security: A Study Among Engineering Students In Spsr Nellore Dist., A.P., Nagaraju Kuppugari
Library Philosophy and Practice (e-journal)
This paper presents the results of a study conducted on the engineering student’s awareness of social media privacy and security issues. For this purpose, the survey method was adopted and a questionnaire was administered among the engineering students. The results revealed that majority of the respondents (60.8 percent) are reading the privacy policies on social media Majority of the respondents (76.31 percent) are avoiding friend requests from unknown persons. The study recommends that the users of social media should not assume that all privacy policies are identical; they vary from one platform to another; also, they do not provide sufficient …
Relevance Of Digital Libraries In The Promotion Of Security Through Community Policing Strategies In Rivers State, Nigeria, Adaobi Nwoye, Judith Ugwueke, Chinyere Anigbogu, Christian Olori
Relevance Of Digital Libraries In The Promotion Of Security Through Community Policing Strategies In Rivers State, Nigeria, Adaobi Nwoye, Judith Ugwueke, Chinyere Anigbogu, Christian Olori
Library Philosophy and Practice (e-journal)
No abstract provided.
Security Problems Of Academic Libraries In Nigeria, Angelyna Mindapa
Security Problems Of Academic Libraries In Nigeria, Angelyna Mindapa
Library Philosophy and Practice (e-journal)
Abstract
Librarians across Nigeria are gradually more concerned with the safety and physical integrity of important intellectual property or properties. Security and prevention of crimes in libraries more specifically academic libraries are necessary library duties for librarians to accomplish. Due to security breaches in university libraries, users at times are not able to get the information resources needed and this makes the library ineffective in satisfying users’ information needs. The security of collections in a library embraces a large number of responsibilities. The cost of acquiring processing, and maintaining collections are soaring. If information materials are stolen or damaged or …
Law Library Blog (March 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (March 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
Relevance Of Internet Of Things To Health Institutions In Clinical Data Management: Implication For Librarians, Faith O. Mesagan, Moses Elechi, Francis O. Adurota, Chinedu Obinna Ejimonye, Onyinyechi G. Ossai
Relevance Of Internet Of Things To Health Institutions In Clinical Data Management: Implication For Librarians, Faith O. Mesagan, Moses Elechi, Francis O. Adurota, Chinedu Obinna Ejimonye, Onyinyechi G. Ossai
Library Philosophy and Practice (e-journal)
The Internet of Things (IoT) is the internetworking of physical devices which consists of an embedded system with sensors, actuators and network connectivity that enable collection and exchange of data. Each day, we are witnessing the emergence of new technologies that have the capability to embed into our environment and measure the physical, social and contextual phenomenon. The technology behind IOT is driven by various technological forces such as smart devices, wireless network, and pervasive connectivity among others. Data collection, management and accessibility are made easy with Internet of Things IOT. The Internet of Things (IoT) is aimed at formulating …
Recent Advances In Wearable Sensing Technologies, Alfredo J. Perez, Sherali Zeadally
Recent Advances In Wearable Sensing Technologies, Alfredo J. Perez, Sherali Zeadally
Information Science Faculty Publications
Wearable sensing technologies are having a worldwide impact on the creation of novel business opportunities and application services that are benefiting the common citizen. By using these technologies, people have transformed the way they live, interact with each other and their surroundings, their daily routines, and how they monitor their health conditions. We review recent advances in the area of wearable sensing technologies, focusing on aspects such as sensor technologies, communication infrastructures, service infrastructures, security, and privacy. We also review the use of consumer wearables during the coronavirus disease 19 (COVID-19) pandemic caused by the severe acute respiratory syndrome coronavirus …
The Impact Of Cloud Computing On Academic Libraries, Sivankalai S
The Impact Of Cloud Computing On Academic Libraries, Sivankalai S
Library Philosophy and Practice (e-journal)
With the introduction of computers and other forms of communication technology, library services have undergone a significant transformation. Libraries have been automated, networked, and are currently being converted into virtual or paperless libraries. This article is dedicated to many aspects of cloud computing, including different kinds and applications. There is a discussion about the advantages and drawbacks of cloud computing in academic libraries. The article also includes recommendations for professional librarians and academic libraries across the globe on how to take advantage of cloud computing resources. This article may be of use in the development of cloud-based services for university …
Secure Self-Checkout Kiosks Using Alma Api With Two-Factor Authentication, Ron Bulaon
Secure Self-Checkout Kiosks Using Alma Api With Two-Factor Authentication, Ron Bulaon
Research Collection Library
Self-checkout kiosks have become a staple feature of many modern and digitized libraries. These devices are used by library patrons for self-service item loans. Most implementations are not new, in fact many of these systems are simple, straight forward and work as intended. But behind this useful technology, there is a security concern on authentication that has to be addressed.
In my proposed presentation, I will discuss the risk factors of self-checkout kiosks and propose a solution using Alma APIs. I will address the technical shortcomings of the current implementations, compared to the proposed solution, and where the weakest link …
Recent Trends In Software-Defined Networking: A Bibliometric Review, Jones Jefferson, Harikrishnan R
Recent Trends In Software-Defined Networking: A Bibliometric Review, Jones Jefferson, Harikrishnan R
Library Philosophy and Practice (e-journal)
Software-Defined Networking is referred to as the next big thing in the field of networking. Legacy networks contain various components such as switches, routers, etc. with a variety of complex protocols. A network administrator is responsible for configuring all these various components. Apart from complex network management, network security is also a persistent issue in the field of networking. SDN promises simplicity in network management while also dramatically improving the security of networks. This paper gives an analysis of the current trends in in SDN as well as Security challenges with SDN. A bibliometric review on SDN has also been …
Security Challenges In Central University Libraries In India, Anam Jamal Ansari, Pm Naushad Ali
Security Challenges In Central University Libraries In India, Anam Jamal Ansari, Pm Naushad Ali
Library Philosophy and Practice (e-journal)
Safety and security are substantial issues for all kinds of libraries in the present time. It is an ever-evolving subject that should be discussed coherently.
This paper attempts to scrutinize security challenges faced by two major funded university libraries in India, i.e., Maulana Azad Library, Aligarh Muslim University, Aligarh, and Dr. B.R. Ambedkar Central Library, Jawaharlal Nehru University, New Delhi. It looks at the measures adopted by these libraries to ensure their collection's safety and explores the reasons and methods of theft, mutilation, and misplacement of the library collection. The survey research method was employed. Two separate questionnaires were used …
Bibliometric Survey On Zero-Knowledge Proof For Authentication, Adwait Pathak, Tejas Patil, Shubham Pawar, Piyush Raut, Smita Khairnar, Dr. Shilpa Gite
Bibliometric Survey On Zero-Knowledge Proof For Authentication, Adwait Pathak, Tejas Patil, Shubham Pawar, Piyush Raut, Smita Khairnar, Dr. Shilpa Gite
Library Philosophy and Practice (e-journal)
Background: Zero Knowledge Proof is a persuasive cryptographic protocol employed to provide data security by keeping the user's identity, using the services anonymously. Zero Knowledge Proof can be the preferred option to use in multiple circumstances. Instead of using the public key cryptographic protocols, the zero-knowledge proof usage does not expose or leak confidential data or information during the transmission. Zero Knowledge Proof protocols are comparatively lightweight; this results in making it efficient in terms of memory. Zero Knowledge Proof applications can reside in authentication, identity management, cryptocurrency transactions, and many more. Traditional authentication schemes are vulnerable to attacks …
Time Series Data Analysis Using Machine Learning-(Ml) Approach, Mvv Prasad Kantipudi Dr., Pradeep Kumar N.S Dr., S.Sreenath Kashyap Dr., Ss Anusha Vemuri Ms
Time Series Data Analysis Using Machine Learning-(Ml) Approach, Mvv Prasad Kantipudi Dr., Pradeep Kumar N.S Dr., S.Sreenath Kashyap Dr., Ss Anusha Vemuri Ms
Library Philosophy and Practice (e-journal)
Healthcare benefits related to continuous monitoring of human movement and physical activity can potentially reduce the risk of accidents associated with elderly living alone at home. Based on the literature review, it is found that many studies focus on human activity recognition and are still active towards achieving practical solutions to support the elderly care system. The proposed system has introduced a joint approach of machine learning and signal processing technology for the recognition of human's physical movements using signal data generated by accelerometer sensors. The framework adopts the concept of DSP to select very descriptive feature sets and uses …
Library Security: Perceptions Of Preparedness, Abby Adams, Karen E. Kiorpes
Library Security: Perceptions Of Preparedness, Abby Adams, Karen E. Kiorpes
University Libraries Faculty Scholarship
This article details the results of two parallel surveys sent to the heads of campus security and the libraries at 54 schools within the SUNY system. We undertook this study to determine the extent of collaboration between these groups and to learn where library and security staff perceptions of safety and preparedness differ. The findings indicated that most campuses have emergency response plans in place for the possibility of a high-impact violent event or a human-caused emergency. However, libraries are less likely to have dedicated emergency plans and report an inconsistent mix of physical security measures and staff safety trainings. …
Improving Records Management And Security For Successful Business Performance: The Role Of New Media, Olufemi K. Aramide Phd, Rita E. Ajibola, Olusoji S. Olatunji, Peter Oduroye
Improving Records Management And Security For Successful Business Performance: The Role Of New Media, Olufemi K. Aramide Phd, Rita E. Ajibola, Olusoji S. Olatunji, Peter Oduroye
Library Philosophy and Practice (e-journal)
The paper identifies how New Media has become one important phenomenon in shaping records management and security of information for successful business performance. With the advent of new media, paper documents could be read and converted automatically into electronic files thereby saving man hour of expensive data entry labour. The paper examines how records stored on electronic media can be readily accessed, and the importance of document security through proper document management. The paper findings reveals that records management plays a vital role in running a successful business and that businesses maintain sensitive information daily, as a result security measures …
The Future Of Security, Yesterday: All About Authentication, Authorization And More…, Rachel S. Evans
The Future Of Security, Yesterday: All About Authentication, Authorization And More…, Rachel S. Evans
Articles, Chapters and Online Publications
Rachel Evans crafts a summary of useful terminology aimed at other new CS-SIS members and attempts to demystify by way of definitions and explanations the tangled concepts of authentication and authorization.
The CS-SIS Blog Committee is charged with providing CS-SIS members with timely and useful information through an official yet informal medium about relevant subjects for the membership, including the activities of the members, committees, and Executive Board.
Transhumanism (Dot) Mil: A Bibliometric Analysis Of Technoprogressive Terms In Military Publications, K. Durwood Evans
Transhumanism (Dot) Mil: A Bibliometric Analysis Of Technoprogressive Terms In Military Publications, K. Durwood Evans
Library Philosophy and Practice (e-journal)
Has transhumanism influenced military thinking? Previous work found that transhumanist terms did not appear widely in military publications. The present work analyzes and improves on previous content analysis of transhumanist terms in military literature using the tools of library and information studies.
The Use Of Ict For Security And Theft Prevention In Two University Libraries In Nigeria, Akor Usman Philip, Justina N. Ekere Dr, Solomon O. Akor Mr
The Use Of Ict For Security And Theft Prevention In Two University Libraries In Nigeria, Akor Usman Philip, Justina N. Ekere Dr, Solomon O. Akor Mr
Library Philosophy and Practice (e-journal)
The study investigated the use of ICT for security and theft prevention in two university libraries in Nigeria. Population of the study is made up of 80 library staff of the two universities, 40 library staff from Umaru Musa Yar’adua University, Katsina and 40 library staff from Al-Qalam University Katsina. Five research questions guided the study. The data was analyzed with the use of simple statistical tools like frequencies and percentages. Findings of the study revealed that maximum security in the libraries will prevent theft mutilation. It also revealed that a video surveillance system working in conjunction with a barcode …
Disaster And Security Preparedness Of Libraries In India, Sandip Pathak
Disaster And Security Preparedness Of Libraries In India, Sandip Pathak
Library Philosophy and Practice (e-journal)
Academic libraries are the “heart” of the learning community, providing a place for Users and advance their knowledge. Simmonds, (2001). Libraries must be safe from security threats and physical weakness. To secure and protectthe collections will facilitate to libraries give an efficient service in response to theinformation required of the university community
Websites Of Indian Banks: A Webometric Study, Arindam Sarkar, Ashok Pal
Websites Of Indian Banks: A Webometric Study, Arindam Sarkar, Ashok Pal
Library Philosophy and Practice (e-journal)
Abstract: Web Impact Factor (WIF), Search Engine Optimization (SEO) ranking improve the visibility of a website’s presence in online environment. The present study predominantly focuses on the WIFs of the Indian banking websites. On the basis of SEO (search engine optimization) effort has been made to measure the usability, performance, security of the websites, used headings, usage of images and alt tags, linking with social networking sites as well as to count the backlinks, page size, load time, request, traffic score, SEO score and speed score. Popularity ranking of the selected bank websites has also been done. Calculating three types …
Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally
Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally
Information Science Faculty Publications
One of the most important Internet of Things applications is the wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control. Due to large deployments of small scale smart sensors in WBSNs, security, and privacy guarantees (e.g., security and safety-critical data, sensitive private information) are becoming a challenging issue because these sensor nodes communicate using an open channel, i.e., Internet. We implement data integrity (to resist against malicious tampering) using the secure hash algorithm 3 (SHA-3) when smart sensors in WBSNs communicate with each other using the Internet. Due to the limited resources (i.e., storage, …
"This Was Actually Fun!": Engaging Users In Conversations About Digital Literacy, Madisson Goldhawk, Erin Johnson, Lillian S. Rigling
"This Was Actually Fun!": Engaging Users In Conversations About Digital Literacy, Madisson Goldhawk, Erin Johnson, Lillian S. Rigling
Western Libraries Presentations
This interactive presentation highlights pop-up programming designed to improve 21st century digital literacies. The session includes an overview of activity development and reflections on its success. Participants will explore light-touch digital literacy games on their personal devices and take home tools to recreate similar programming at their library.
Investigating Security For Ubiquitous Sensor Networks, Alfredo J. Perez, Sherali Zeadally, Nafaa Jabeur
Investigating Security For Ubiquitous Sensor Networks, Alfredo J. Perez, Sherali Zeadally, Nafaa Jabeur
Information Science Faculty Publications
The availability of powerful and sensor-enabled mobile and Internet-connected devices have enabled the advent of the ubiquitous sensor network paradigm which is providing various types of solutions to the community and the individual user in various sectors including environmental monitoring, entertainment, transportation, security, and healthcare. We explore and compare the features of wireless sensor networks and ubiquitous sensor networks and based on the differences between these two types of systems, we classify the security-related challenges of ubiquitous sensor networks. We identify and discuss solutions available to address these challenges. Finally, we briefly discuss open challenges that need to be addressed …
The Library As Safe Space, Rachel S. Wexelbaum
The Library As Safe Space, Rachel S. Wexelbaum
Library Faculty Publications
Purpose: This chapter will explain how libraries define safe space through policies, procedures, and professional codes of ethics. The chapter will generate a history of the concept of libraries as safe space, will explain how libraries attempt to create safe spaces in physical and online environments, and will show how library practices both help and harm patrons in need of safe space.
Design/methodology/approach: This chapter provides a review of the literature that illustrates how libraries provide safe space—or not—for their patrons. The author will deconstruct the ALA Code of Ethics and Bill of Rights to demonstrate how libraries remain heteronormative …
Freedom In My Heart, Karen Sandler
Privacy Advocacy In Libraries In The Age Of Mass Surveillance, Alison Macrina
Privacy Advocacy In Libraries In The Age Of Mass Surveillance, Alison Macrina
LACUNY Institute 2015
Alison Macrina is the founder and director of the Library Freedom Project, an initiative that aims to make real the promise of intellectual freedom in libraries. The Library Freedom Project trains librarians on the state of global surveillance, privacy rights, and privacy-protecting technology, so that librarians may in turn teach their communities about safeguarding privacy. In 2015, Alison was named one of Library Journal‘s Movers and Shakers. Read more about the Library Freedom Project at libraryfreedomproject.org.
Security Management For Prevention Of Book Thefts In University Libraries. A Case Study Of Benue State University Library, Nigeria, Philip Usman Akor Dr
Security Management For Prevention Of Book Thefts In University Libraries. A Case Study Of Benue State University Library, Nigeria, Philip Usman Akor Dr
Library Philosophy and Practice (e-journal)
ABSTRACT
This paper examines the security management for prevention of book thefts in University libraries with Benue State University Library, Makurdi. Benue State. Nigeria serving as a case study. The aim of the study was to identify the causes of book thefts and mutilation in University libraries and how to curb and preserve the continuous use of this information resources in the library. The survey research method was employed. Questionnaire are the main instrument for data collection. Frequency, tables, percentages is the main statistical tools used for data analysis. Results of the analysis showed that the university library books are …