By Masha Garibyan, Simon McLeish, John Paschoud
With the fast raise within the use of digital assets in libraries, handling entry to on-line details is a space many librarians fight with. This sensible ebook is the 1st to provide an explanation for the foundations at the back of entry administration, the to be had applied sciences and the way they paintings. It offers targeted case experiences describing how entry administration is being applied at organizational and nationwide degrees within the united states and Europe, and serves as a realistic advisor to the assets to be had to aid plan, enforce and function entry administration in libraries
Read or Download Access and identity management for libraries : controlling access to online information PDF
Best library management books
To aid librarians and academics achieve a deeper realizing of this delicate topic, kin issues: Adoption and Foster Care in kid's Literature takes an in depth examine one hundred fifteen works of kid's literature that experience issues relating to adoption and foster care, together with many who have bought the Newberry Award, Caldecott Award, or different prestigious honors from the yank Library organization.
Mom and dad of Invention: the advance of Library Automation structures within the past due twentieth Century lines the increase and fall of mini-computer-based ILS. In doing so, it deals an insider's view of the method of construction, the technical demanding situations, and the lasting contributions of librarians and programmers at a time whilst librarians and their automation wishes pressured laptop businesses to innovate.
Changing into convinced lecturers examines the instructing function of knowledge pros at a time of transition and alter in better schooling. whereas guideline is now in general approved as a center library functionality within the twenty first century, librarians frequently lack adequate education in pedagogy and tutorial layout; for this reason discovering their instructing obligations to be tense and hard.
While exterior caliber audits were in position for greater than a decade in a few nations, restricted learn exists at the quantity to which such audits were powerful in bettering structures and tactics for caliber insurance in larger schooling associations, and the level to which such audits have enhanced educational criteria, results and scholar adventure.
- Knowledge Management: Historical and Cross-Disciplinary Themes (Libraries Unlimited Knowledge Management Series)
- Evaluating Information Systems: Public and Private Sector
- Project Management for Information Professionals
- Evaluating Acquisitions and Collection Management
Extra resources for Access and identity management for libraries : controlling access to online information
Without further elaboration, this method of access control is simple to use, and simple for a resource publisher to set up. However, it has problems with security, especially with the need to remove access from users who are no longer privileged to access the resource. Another problem is that users do Garibyan et al. g. by writing down the password). With federated access as an alternative, this access control mechanism has largely faded from the access control map. Elaborations of this method can include passwords which have short expiry periods (such as ones based on the current month).
Access & identity TEXT PROOF 04 07/10/2013 14:01 Page 13 ELECTRONIC RESOURCES: PUBLIC AND NOT SO PUBLIC 13 following a model similar to that for physical books where only a few ‘copies’ can be borrowed at a time. Data, maps and other special resources Another important group of commercially available electronic resources consists of different kinds of data, digital copies of maps and other images, and other special resources, such as statistics. Special resources have benefited greatly from going digital.
By writing down the password). With federated access as an alternative, this access control mechanism has largely faded from the access control map. Elaborations of this method can include passwords which have short expiry periods (such as ones based on the current month). g. to provide access to the internet for conference delegates), when the password expires after the event concludes. 4 demonstrates how shared passwords work. For more details, see Chapters 7 and 8. User registration with publishers Another method which was commonly used in the past was direct user registration with publishers, a process familiar still from many consumeroriented sites.