Show simple item record

dc.contributor.authorTones White, Heather
dc.date.accessioned2010-12-22T16:43:47Z
dc.date.available2010-12-22T16:43:47Z
dc.date.issued2010
dc.identifier.citationCode4Lib Journal, Issue 12 (2010)en
dc.identifier.otherhttp://journal.code4lib.org/articles/4117
dc.identifier.urihttp://hdl.handle.net/10388/360
dc.description.abstractMuch of the literature written on electronic resources security focuses on systematic downloading. However, when the unauthorized use from two cases of stolen identities at the University of Saskatchewan was studied in more depth, a different pattern emerged. By analyzing proxy server data, we found that the unauthorized use was coming from all over the world, was focused on science, technology and medical resources, and included both small-scale and excessive downloading. This article outlines some steps that libraries can take to detect and prevent small-scale unauthorized use and implications as libraries move towards Shibboleth authentication.en
dc.language.isoenen
dc.subjectElectronic resources, security, download, authentication, theften
dc.titleElectronic resources security: a look at unauthorized usersen
dc.typeArticleen
dc.typeRefereed Paper


Files in this item

Thumbnail
Thumbnail
Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record