By Masha Garibyan, Simon McLeish, John Paschoud
With the speedy elevate within the use of digital assets in libraries, handling entry to on-line info is a space many librarians fight with. This useful ebook is the 1st to give an explanation for the foundations in the back of entry administration, the on hand applied sciences and the way they paintings. It presents special case stories describing how entry administration is being applied at organizational and nationwide degrees within the united states and Europe, and serves as a pragmatic advisor to the assets on hand to aid plan, enforce and function entry administration in libraries
Read Online or Download Access and identity management for libraries : controlling access to online information PDF
Similar library management books
Are looking to get the note out approximately your library within the cheapest approach attainable? you could do so with the potent word-of-mouth advertising (WOMM) innovations specified by this e-book. inventive retailers, Peggy Barber and Linda Wallace, deliver you sound advertising and marketing rules to unfold the observe approximately your library in the group with: a technique that works for you, WOMM must-haves, how to successfully bring your message, and most sensible practices and insightful stories.
It is a pioneering advent to the emergent box of knowledge background. It explores how the modern values and issues of our personal info society have helped result in a reconsideration of our historical past, and of what constitutes our historic realizing of knowledge within the twenty-first century.
Written through highly-respected practitioners and students ''In seek of data administration: Pursuing fundamental Principles'' bargains learn and perform insights into the rising self-discipline and box of information administration and goals to speed up an international adoption of data administration (KM) as a unique and demanding box of analysis for cutting-edge pros.
This e-book explores discrete-time dynamic optimization and offers a close creation to either deterministic and stochastic versions. masking issues of finite and limitless horizon, in addition to Markov renewal courses, Bayesian regulate versions and in part observable procedures, the e-book specializes in the fitting modelling of purposes in various parts, together with operations examine, machine technology, arithmetic, facts, engineering, economics and finance.
- Academic Interlibrary Loan Benchmarks
- Convergence of Libraries and Technology Organizations. New Information Support Models
- Transitioning from Librarian to Middle Manager
- An Action Plan for Outcomes Assessment in Your Library
Additional info for Access and identity management for libraries : controlling access to online information
Some commercial ERMs are tied to additional services provided by that company. Maria Collins has produced two excellent articles (2005, 2008) that give a detailed overview of some of the commercial ERMs available today and selection criteria for choosing an ERM. The commercial systems design is largely based on the ERM requirements established by the Digital Library Federation’s Electronic Management Initiative (Digital Library Federation, 2004). While the DLF guidelines have given invaluable assistance to commercial ERM developers, it is still important to evaluate each potential ERM very carefully to make sure it fits closely with the local requirements.
Fairly easy to use; easy Very hard for publishers for institutions to to manage properly; manage; allows likely to be used personalized services; insecurely; difficult to allows granular levels of allow access to some access down to individual subgroups of users but user. not to others. Integrates with existing Can be hard to set up; user/resource users can find federated management processes; access confusing. allows personalized services; can allow anonymity and enhance privacy; allows granular levels of access down to individual user and including groups of users; secure.
How this can be done is explained in more detail in Chapter 5. On registration, a default password may be issued which the user must change before any further use. Authentication When a (registered) user attempts to access a protected online resource, they will often be faced with an ‘authentication challenge’. Authentication is the process in which a user presents credentials of some sort to prove ‘they are who they say they are’. There are many different kinds of credentials which can be used; anything which belongs to the user and not shared with anyone who is not permitted to access the protected resource is usable; usernames and passwords in combination are a commonly used example.
Access and identity management for libraries : controlling access to online information by Masha Garibyan, Simon McLeish, John Paschoud