Authentication and library access computers
Authentication is creeping quietly into academic libraries. It is often initiated by groups external to the library, mainly campus computing personnel, database vendors and serials publishers. This article's primary focus is access to academic library resources by patrons unaffiliated with the...
Gespeichert in:
Veröffentlicht in: | College & Research Libraries News 2004-05, Vol.65 (5), p.269 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 5 |
container_start_page | 269 |
container_title | College & Research Libraries News |
container_volume | 65 |
creator | Courtney, Nancy |
description | Authentication is creeping quietly into academic libraries. It is often initiated by groups external to the library, mainly campus computing personnel, database vendors and serials publishers. This article's primary focus is access to academic library resources by patrons unaffiliated with the institution and how the adoption of authentication on public access computers can limit or deny access to library materials. |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_reports_203718853</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>680454511</sourcerecordid><originalsourceid>FETCH-proquest_reports_2037188533</originalsourceid><addsrcrecordid>eNqNyk0KAiEYAFCJguznDrYO4XNkTJcRRQdoP5gZGZOany66fZsO0Opt3oTQTvTAlTJ6SiiAMRxAqzlZID4BQBijKNnuW334WIOzNaTIbLyxMVyLLR9mnfOIzKVXbtUXXJHZ3Y7o1z-XZHM6Xg5nnkt6N491KD6nUnHoQO6E1r2U_5wvliAx4g</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>203718853</pqid></control><display><type>article</type><title>Authentication and library access computers</title><source>Education Source (EBSCOhost)</source><source>Free E-Journal (出版社公開部分のみ)</source><creator>Courtney, Nancy</creator><creatorcontrib>Courtney, Nancy</creatorcontrib><description>Authentication is creeping quietly into academic libraries. It is often initiated by groups external to the library, mainly campus computing personnel, database vendors and serials publishers. This article's primary focus is access to academic library resources by patrons unaffiliated with the institution and how the adoption of authentication on public access computers can limit or deny access to library materials.</description><identifier>ISSN: 0099-0086</identifier><identifier>EISSN: 2150-6698</identifier><language>eng</language><publisher>Chicago: Association of College and Research Libraries</publisher><subject>Academic libraries ; Access control ; Authentication protocols ; Computers ; Library resources ; Library science ; Public access</subject><ispartof>College & Research Libraries News, 2004-05, Vol.65 (5), p.269</ispartof><rights>Copyright Association of College and Research Libraries May 2004</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>312,776,780,787</link.rule.ids></links><search><creatorcontrib>Courtney, Nancy</creatorcontrib><title>Authentication and library access computers</title><title>College & Research Libraries News</title><description>Authentication is creeping quietly into academic libraries. It is often initiated by groups external to the library, mainly campus computing personnel, database vendors and serials publishers. This article's primary focus is access to academic library resources by patrons unaffiliated with the institution and how the adoption of authentication on public access computers can limit or deny access to library materials.</description><subject>Academic libraries</subject><subject>Access control</subject><subject>Authentication protocols</subject><subject>Computers</subject><subject>Library resources</subject><subject>Library science</subject><subject>Public access</subject><issn>0099-0086</issn><issn>2150-6698</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2004</creationdate><recordtype>article</recordtype><recordid>eNqNyk0KAiEYAFCJguznDrYO4XNkTJcRRQdoP5gZGZOany66fZsO0Opt3oTQTvTAlTJ6SiiAMRxAqzlZID4BQBijKNnuW334WIOzNaTIbLyxMVyLLR9mnfOIzKVXbtUXXJHZ3Y7o1z-XZHM6Xg5nnkt6N491KD6nUnHoQO6E1r2U_5wvliAx4g</recordid><startdate>20040501</startdate><enddate>20040501</enddate><creator>Courtney, Nancy</creator><general>Association of College and Research Libraries</general><scope>E3H</scope><scope>F2A</scope></search><sort><creationdate>20040501</creationdate><title>Authentication and library access computers</title><author>Courtney, Nancy</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_reports_2037188533</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Academic libraries</topic><topic>Access control</topic><topic>Authentication protocols</topic><topic>Computers</topic><topic>Library resources</topic><topic>Library science</topic><topic>Public access</topic><toplevel>online_resources</toplevel><creatorcontrib>Courtney, Nancy</creatorcontrib><collection>Library & Information Sciences Abstracts (LISA)</collection><collection>Library & Information Science Abstracts (LISA)</collection><jtitle>College & Research Libraries News</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Courtney, Nancy</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Authentication and library access computers</atitle><jtitle>College & Research Libraries News</jtitle><date>2004-05-01</date><risdate>2004</risdate><volume>65</volume><issue>5</issue><spage>269</spage><pages>269-</pages><issn>0099-0086</issn><eissn>2150-6698</eissn><abstract>Authentication is creeping quietly into academic libraries. It is often initiated by groups external to the library, mainly campus computing personnel, database vendors and serials publishers. This article's primary focus is access to academic library resources by patrons unaffiliated with the institution and how the adoption of authentication on public access computers can limit or deny access to library materials.</abstract><cop>Chicago</cop><pub>Association of College and Research Libraries</pub></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0099-0086 |
ispartof | College & Research Libraries News, 2004-05, Vol.65 (5), p.269 |
issn | 0099-0086 2150-6698 |
language | eng |
recordid | cdi_proquest_reports_203718853 |
source | Education Source (EBSCOhost); Free E-Journal (出版社公開部分のみ) |
subjects | Academic libraries Access control Authentication protocols Computers Library resources Library science Public access |
title | Authentication and library access computers |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-04T16%3A15%3A27IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Authentication%20and%20library%20access%20computers&rft.jtitle=College%20&%20Research%20Libraries%20News&rft.au=Courtney,%20Nancy&rft.date=2004-05-01&rft.volume=65&rft.issue=5&rft.spage=269&rft.pages=269-&rft.issn=0099-0086&rft.eissn=2150-6698&rft_id=info:doi/&rft_dat=%3Cproquest%3E680454511%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=203718853&rft_id=info:pmid/&rfr_iscdi=true |