Authentication and library access computers

Authentication is creeping quietly into academic libraries. It is often initiated by groups external to the library, mainly campus computing personnel, database vendors and serials publishers. This article's primary focus is access to academic library resources by patrons unaffiliated with the...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:College & Research Libraries News 2004-05, Vol.65 (5), p.269
1. Verfasser: Courtney, Nancy
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 5
container_start_page 269
container_title College & Research Libraries News
container_volume 65
creator Courtney, Nancy
description Authentication is creeping quietly into academic libraries. It is often initiated by groups external to the library, mainly campus computing personnel, database vendors and serials publishers. This article's primary focus is access to academic library resources by patrons unaffiliated with the institution and how the adoption of authentication on public access computers can limit or deny access to library materials.
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_reports_203718853</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>680454511</sourcerecordid><originalsourceid>FETCH-proquest_reports_2037188533</originalsourceid><addsrcrecordid>eNqNyk0KAiEYAFCJguznDrYO4XNkTJcRRQdoP5gZGZOany66fZsO0Opt3oTQTvTAlTJ6SiiAMRxAqzlZID4BQBijKNnuW334WIOzNaTIbLyxMVyLLR9mnfOIzKVXbtUXXJHZ3Y7o1z-XZHM6Xg5nnkt6N491KD6nUnHoQO6E1r2U_5wvliAx4g</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>203718853</pqid></control><display><type>article</type><title>Authentication and library access computers</title><source>Education Source (EBSCOhost)</source><source>Free E-Journal (出版社公開部分のみ)</source><creator>Courtney, Nancy</creator><creatorcontrib>Courtney, Nancy</creatorcontrib><description>Authentication is creeping quietly into academic libraries. It is often initiated by groups external to the library, mainly campus computing personnel, database vendors and serials publishers. This article's primary focus is access to academic library resources by patrons unaffiliated with the institution and how the adoption of authentication on public access computers can limit or deny access to library materials.</description><identifier>ISSN: 0099-0086</identifier><identifier>EISSN: 2150-6698</identifier><language>eng</language><publisher>Chicago: Association of College and Research Libraries</publisher><subject>Academic libraries ; Access control ; Authentication protocols ; Computers ; Library resources ; Library science ; Public access</subject><ispartof>College &amp; Research Libraries News, 2004-05, Vol.65 (5), p.269</ispartof><rights>Copyright Association of College and Research Libraries May 2004</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>312,776,780,787</link.rule.ids></links><search><creatorcontrib>Courtney, Nancy</creatorcontrib><title>Authentication and library access computers</title><title>College &amp; Research Libraries News</title><description>Authentication is creeping quietly into academic libraries. It is often initiated by groups external to the library, mainly campus computing personnel, database vendors and serials publishers. This article's primary focus is access to academic library resources by patrons unaffiliated with the institution and how the adoption of authentication on public access computers can limit or deny access to library materials.</description><subject>Academic libraries</subject><subject>Access control</subject><subject>Authentication protocols</subject><subject>Computers</subject><subject>Library resources</subject><subject>Library science</subject><subject>Public access</subject><issn>0099-0086</issn><issn>2150-6698</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2004</creationdate><recordtype>article</recordtype><recordid>eNqNyk0KAiEYAFCJguznDrYO4XNkTJcRRQdoP5gZGZOany66fZsO0Opt3oTQTvTAlTJ6SiiAMRxAqzlZID4BQBijKNnuW334WIOzNaTIbLyxMVyLLR9mnfOIzKVXbtUXXJHZ3Y7o1z-XZHM6Xg5nnkt6N491KD6nUnHoQO6E1r2U_5wvliAx4g</recordid><startdate>20040501</startdate><enddate>20040501</enddate><creator>Courtney, Nancy</creator><general>Association of College and Research Libraries</general><scope>E3H</scope><scope>F2A</scope></search><sort><creationdate>20040501</creationdate><title>Authentication and library access computers</title><author>Courtney, Nancy</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_reports_2037188533</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Academic libraries</topic><topic>Access control</topic><topic>Authentication protocols</topic><topic>Computers</topic><topic>Library resources</topic><topic>Library science</topic><topic>Public access</topic><toplevel>online_resources</toplevel><creatorcontrib>Courtney, Nancy</creatorcontrib><collection>Library &amp; Information Sciences Abstracts (LISA)</collection><collection>Library &amp; Information Science Abstracts (LISA)</collection><jtitle>College &amp; Research Libraries News</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Courtney, Nancy</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Authentication and library access computers</atitle><jtitle>College &amp; Research Libraries News</jtitle><date>2004-05-01</date><risdate>2004</risdate><volume>65</volume><issue>5</issue><spage>269</spage><pages>269-</pages><issn>0099-0086</issn><eissn>2150-6698</eissn><abstract>Authentication is creeping quietly into academic libraries. It is often initiated by groups external to the library, mainly campus computing personnel, database vendors and serials publishers. This article's primary focus is access to academic library resources by patrons unaffiliated with the institution and how the adoption of authentication on public access computers can limit or deny access to library materials.</abstract><cop>Chicago</cop><pub>Association of College and Research Libraries</pub></addata></record>
fulltext fulltext
identifier ISSN: 0099-0086
ispartof College & Research Libraries News, 2004-05, Vol.65 (5), p.269
issn 0099-0086
2150-6698
language eng
recordid cdi_proquest_reports_203718853
source Education Source (EBSCOhost); Free E-Journal (出版社公開部分のみ)
subjects Academic libraries
Access control
Authentication protocols
Computers
Library resources
Library science
Public access
title Authentication and library access computers
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-04T16%3A15%3A27IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Authentication%20and%20library%20access%20computers&rft.jtitle=College%20&%20Research%20Libraries%20News&rft.au=Courtney,%20Nancy&rft.date=2004-05-01&rft.volume=65&rft.issue=5&rft.spage=269&rft.pages=269-&rft.issn=0099-0086&rft.eissn=2150-6698&rft_id=info:doi/&rft_dat=%3Cproquest%3E680454511%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=203718853&rft_id=info:pmid/&rfr_iscdi=true