Download Access and identity management for libraries : controlling by Masha Garibyan, Simon McLeish, John Paschoud PDF

By Masha Garibyan, Simon McLeish, John Paschoud

With the fast raise within the use of digital assets in libraries, handling entry to on-line info is a space many librarians fight with. This sensible booklet is the 1st to give an explanation for the rules at the back of entry administration, the on hand applied sciences and the way they paintings. It offers exact case reports describing how entry administration is being carried out at organizational and nationwide degrees within the united states and Europe, and serves as a realistic advisor to the assets to be had to aid plan, enforce and function entry administration in libraries

Show description

Read Online or Download Access and identity management for libraries : controlling access to online information PDF

Best library management books

Advances in Agronomy, Vol. 46

Less than new editorial course, Advances in Agronomy either maintains its lengthy culture and expands to incorporate leading edge tools and applied sciences. prime overseas scientists hide subject matters in plant and soil sciences, biotechnology, terrestrial ecosystems, and environmental matters. This quantity provides 3 articles dedicated to plant productiveness and development and 3 articles dedicated to advances in soil technology.

Transitioning from Librarian to Middle Manager

Via her distinctive viewpoint the writer presents perception into the numerous assorted components of workmanship which are required in a very good supervisor. those contain how one can deal with cliques, tips to deal with the perceived or actual excellence of the former supervisor, tips on how to deal with tough subordinates, and so forth.

The Power of Language El poder de la palabra: Selected Papers from the Second REFORMA National Conference

Concentrating on selling Spanish-language and Latino-oriented providers and assets in libraries, this feature of 20 papers used to be compiled on the moment REFORMA nationwide convention through specialists within the box. The paintings covers a variety of thought-provoking principles, concerns in Latino library prone, management, functional functions, courses, and bibliographical assets.

Modeling and Visualization of Complex Systems and Enterprises: Explorations of Physical, Human, Economic, and Social Phenomena

Explains multi-level versions of company structures and covers modeling technique This publication addresses the basic phenomena underlying the general behaviors of complicated structures and enterprises.  figuring out those phenomena can let bettering those platforms. those phenomena variety from actual, behavioral, and organizational, to monetary and social, all of which contain major human elements.

Extra info for Access and identity management for libraries : controlling access to online information

Sample text

Where the library is part of a larger organization, such as a university, the same card is likely to identify a student or staff member for other purposes and for access to other services or other physical areas outside the library itself. Just a few academic and public libraries are considering moving away from the idea of issuing their own machine-readable identifying cards or tokens to users, and instead recognizing other commonly used tokens. In London, the UK capital, almost all users of public transport services carry an Oyster card (Transport for London, 2011) to pay for bus and train journeys.

Electronic reading list systems are also gaining popularity amongst academic libraries. All these resources and services may be available to all but they also need access management, as discussed above. Publishers and licensing issues In January 2011 Primary Research Group published a survey of library database practices (Primary Research Group, 2011). The survey looked at how 70 academic, special and public libraries in the UK, USA, Europe, Canada and Australia managed their commercial database subscriptions.

The topics introduced here form the subject of much of the remainder of this book. htm. edu/Resources/TheImportanceofEstablishingLev/154978. uri=CELEX:31995L0046:EN:HTML. pdf. , Illingworth, H. and Reynolds, P. (2000) Authentication and Supervision: a survey of user attitudes, Computers and Security, 19, 529–39. htm. Lynch, C. ) (1998) A White Paper on Authentication and Access Management Issues in Cross-Organizational Use of Networked Information Resources, Coalition for Networked Information, Garibyan et al.

Download PDF sample

Rated 4.43 of 5 – based on 5 votes