By Masha Garibyan, Simon McLeish, John Paschoud
- what is entry administration and why do libraries do it?
- electronic assets: public and never so public
- principles and definitions of id and entry management
- current entry administration technologies
- authentication technologies
- authorization in accordance with actual location
- authorization in line with consumer identification or affiliation
- federated entry: heritage, present place and destiny developments
- internet entry supplied by way of (or in) libraries
- library statistics
- the company case for libraries.
Read or Download Access and Identity Management for Libraries: Controlling Access to Online Information (Facet Publications (All Titles as Published)) PDF
Similar library management books
The association, functioning, and the position of libraries in collage groups proceed to alter dramatically. whereas educational study libraries proceed to obtain details, manage it, make it to be had, and defend it, the severe concerns for his or her administration groups within the twenty-first century are to formulate a transparent project and function for his or her library, fairly as libraries transition to fulfill the recent info wishes in their collage parts.
Advances in Botanical examine is a multi-volume booklet that brings jointly studies by way of famous specialists on matters of significance to these considering botanical learn. First released in 1963, Advances in Botanical study has earned a name for excellence within the box for greater than thirty years.
Maverick librarian Margaret Edwards not just threw open the gates of her reasonable backyard of literary treasures, yet she spent a life's paintings luring within the beasts. The Centennial version of this younger grownup prone masterpiece authored via the 20 th century's such a lot innovative librarian provides an obtainable and suitable paintings for the YA librarian of the twenty first century.
Practising educational, public, tuition and precise librarians and LIS school within the usa provide useful how-to essays on dealing with pressure as operating librarians. inventive equipment of diffusing rigidity are emphasised, adaptive to varied different types of libraries and activity descriptions. The publication is split into numerous elements: Defusing and lowering clash at paintings; rigidity administration; Library courses for customers and employees; Balancing the pro and the non-public; Juggling tasks; Easing tension on the cheap; Overcoming demanding situations; and Navigating occupation Transitions.
- Informed Systems: Organizational Design for Learning in Action
- Stop the Copying with Wild and Wacky Research Projects
- An Author a Month (for Nickels):
- Academic Search Engines: A Quantitative Outlook (Chandos Information Professional Series)
Additional info for Access and Identity Management for Libraries: Controlling Access to Online Information (Facet Publications (All Titles as Published))
The username will not necessarily be the same as the unique user identifier mentioned above, but is likely to be more memorable and composed of, for example, the users’ own name and initials. A user password should ideally be known only to the individual whose it is, and should be unknown to library or any other staff involved in issuing it. Passwords should not even be ‘known’ to the computer systems which issue them in the first place or those that can recognize and verify them when used. How this can be done is explained in more detail in Chapter 5.
Another issue is that sometimes participating libraries use different definitions for their user groups and may need to agree on common user definitions before they can proceed with the agreement (Lynch, 1998, 4). The same applies to other joint agreements, for example resource sharing. Licensing open content An altogether different aspect of licensing that libraries may have to deal with is licensing open content. As discussed earlier in this chapter, many institutions now have digital repositories, which means that the library has to act as an online publisher.
Obligations to protect personal data about users A library, like most other organizations holding personal information in most countries of the world, will have legal obligations to deal with that information in fair and reasonable ways. In the UK the relevant legislation is the Data Protection Act 1998 (The National Archives, 2011). This is based on the requirements of the European Directive on Data Protection (EUR-Lex, 1995) and parallel legislation imposing broadly similar responsibilities on ‘data controllers’ is in force in all countries of the European Union.