Are your library systems secure? If your answer is “yes,” drop everything and read this issue now! Ask any computer security experts: they will tell you there is no such thing as a totally secure networked system. If your answer is “no,” this issue will clarify the problems of security, suggest some approaches to them, and describe some actual library experiences.
This collection of articles is organized into three sections: Public Workstation Security, Authentication and Authorization of Patrons, and Security Breach Consequences. In each section, the authors lay out general issues and techniques and describe real-life development projects, production implementations, and actual experiences.
Detailed Table of Contents / Introduction, by Merri Beth Lavagnino
Part 1 – Designing Secure Library Networks by Marshall Breeding
Part 2 – A Commercial Software Approach to Workstation Security by Dan Marmion
Part 3 – Public Workstation Security: Using Operating System and Hardware Tricks by Garvin Brakel
Part 4 – Securing Public Workstations by Maintaining Software Centrally by Erik J. Biever
Authentication and Authorization
Part 1 – The Changing Role in a Networked Information Environment by Clifford A. Lynch
Part 2 – Tao of Gateway: Providing Internet Access to Licensed Databases by William V. Garrison and Gregory A. McClellan
Part 3 – Decentralized Account Management in a Library Consortium: A Report of HSLC’s Implementation of Guardian by Anita S. Wagner, Alan C. Simon, Cindy A. Pitchon, and Dennis J. Gormley
Part 4 – Using Bluestem for Web User Authentication and Access Control of Library Resources by Timothy W. Cole
Part 5 – The ICAAP Project, Part One: A Continuum of Security Needs for the CIC Virtual Electronic Library by Merri Beth Lavagnino
Part 6 – The ICAAP Project, Part Two: The Web Architecture by Bob Riddle
Part 7 – The ICAAP Project, Part Three: OSF Distributed Computing Environment by Scott Cantor
Part 1-Things That Go “Bump” in the Virtual Night by Julie A. Fore with sidebars by Dan Simpson, Marshall Breeding, and Julie A. Fore
Part 2 – After the Break-in Occurs: How to Handle the Student Hacker by Scott Muir
Part 3 – To Catch a Hacker by Greg German
Part 4 – Give Yourself a Break; Don’t Give the Hackers One by Jim Rosaschi
PC Articles Worth Noting: January-March 1997 by Walt Crawford
Time for New OPAC Initiatives: An Overview of Landmarks in the Literature and Introduction to WordFocus by Joseph R. Matthews
It is time to move beyond “the same old systems” into a new era that incorporates improvements of a library’s existing databases, embraces the research results of the information-seeking process, and makes fundamental improvements by adding new databases. These new systems should convert the frustrated user of today’s OPAC into the eager user of tomorrow’s local library system.
The Impact of Electronic Information Sources on Collection Development: A Survey of Current Practice by O. Gene Norman
The effects of electronic information sources on collection development in 15 academic libraries is studied, including impacts on the materials budget, collection development policies, and licenses; identifying, evaluating, selecting, and developing the collection; training subject specialists to use electronic resource tools; and the changes in the role of the collection development librarian.
Authorware for Computer-Assisted Instruction by Chris Niemeyer
Authorware is a sophisticated computer application that is ideal for computer-assisted instruction. The Iowa State University Library has used Authorware extensively for its mandatory library skills class. This article focuses on Authorware features and the methods for learning it, and describes a process for creating a tutorial using this application.
Information Dropshipping by T.D. Webb and Bin Zhang
The appearance of revolutionary information technologies must elicit equivalent responses from the library profession, if for no other reason than simply to provide services that are fast becoming desired and needed by users. Because the implications of the new technology also suggest the possible demise of libraries, it is incumbent on us to make a revolutionary response.