WorldWideScience

Sample records for securing library technology

  1. The Security Research of Digital Library Network

    Science.gov (United States)

    Zhang, Xin; Song, Ding-Li; Yan, Shu

    Digital library is a self-development needs for the modern library to meet the development requirements of the times, changing the way services and so on. digital library from the hardware, technology, management and other aspects to objective analysis of the factors of threats to digital library network security. We should face up the problems of digital library network security: digital library network hardware are "not hard", the technology of digital library is relatively lag, digital library management system is imperfect and other problems; the government should take active measures to ensure that the library funding, to enhance the level of network hardware, to upgrade LAN and prevention technology, to improve network control technology, network monitoring technology; to strengthen safety management concepts, to prefect the safety management system; and to improve the level of security management modernization for digital library.

  2. Mobile technologies for every library

    CERN Document Server

    Gleason, Ann Whitney

    2015-01-01

    If you are wondering what mobile technology adoption means for your library or how to get started, Mobile Technologies for Every Library will answer your questions! This book will detail the opportunities and pitfalls in using mobile technology in libraries. It will also address platforms, options, security, and best practices for starting new mobile services programs or improving existing services. Gleason previews many useful apps for libraries. Web links and resources are also included.

  3. New Technology's Surprising Security Threats. Building Digital Libraries

    Science.gov (United States)

    Huwe, Terence

    2005-01-01

    In recent years, security issues have increasingly come to dominate the technological development process--although still in a more reactive than proactive mode. It now seems more important than ever to monitor security trends and policy developments, especially if technology is regarded as a potential community builder. This article suggests…

  4. SECURING DIGITIZED LIBRARY CIRCULATORY SYSTEM

    African Journals Online (AJOL)

    user

    The widespread application of the developed system on smart library circulation .... database management system; [9] through securing .... system running on a Windows 8 Operating system .... mini library for their support, advice and unlimited.

  5. School Library Supplement. Putting Your Library Automation System to Work [and] Using Videodiscs in Research Projects [and] Library Security: What to Look For [and] Expanding Library/Media Services with Media Retrieval [and] How to Network CD-ROMs (and) The School Library Resource Directory.

    Science.gov (United States)

    Karpisek, Marian; And Others

    1995-01-01

    Presents five articles and a company resource directory to help librarians successfully incorporate technology into school libraries. Discusses actual situations, examines student needs, and gives advice to help librarians with library automation systems, videodiscs, library security systems, media retrieval, networking CD-ROMs, and locating…

  6. Security Risks Management in Selected Academic Libraries in Osun ...

    African Journals Online (AJOL)

    The survival of a library depends to a large extent on how secured its collections are. Security of collections constitutes a critical challenge facing academic libraries in Nigeria. It is against this background that this study investigated the security risks management in selected academic libraries in Osun State, Nigeria.

  7. Information security in academic libraries: the role of the librarian in planning and introducing institutional policies

    Directory of Open Access Journals (Sweden)

    Juliana Soares Lima

    2017-04-01

    Full Text Available This study presents a short discussion about the role of the librarian as a mediator at planning, developing and implementing an Information Security Policy in Academic Libraries, by working together with professionals in the field of Information Technology. It also discusses the main virtual threats and some risks that are prone to infect computers in libraries. Based on the current legislation and on some normative documents about information security, it is confirmed the importance of the librarian take part in the main decision-making related to information security, such as planning a consistent Information Security Policy which be able to see the specific needs of Academic Libraries as institutions prone to cyberattacks. The main topics and guidelines to carry out an Information Security Policy are presented based on the results that were obtained through an action research, by visiting libraries to fill in application forms and to compose reports whose content was analyzed. Finally, the study concludes that Information Security Policy must be validated by managers of sectors or departments which the Academic Library is hierarchically subordinate to.

  8. How Much Security Does Your Library Need?

    Science.gov (United States)

    Banerjee, Kyle

    2003-01-01

    Explains how to keep library systems healthy and functioning by taking sensible security measures. Examines why hackers would target library systems and how library systems are compromised. Describes tools that can help, including: firewalls; antivirus software; alarms; network analysis tools; and encryption. Identifies several strategies for…

  9. Computer and Network Security in Small Libraries: A Guide for Planning.

    Science.gov (United States)

    Williams, Robert L.

    This manual is intended to provide a free resource on essential network security concepts for non-technical managers of small libraries. Managers of other small nonprofit or community organizations will also benefit from it. An introduction defines network security; outlines three goals of network security; discusses why a library should be…

  10. Security issues and service provision in Laz Otti Memorial Library ...

    African Journals Online (AJOL)

    Lagos Journal of Library and Information Science ... Data was analysed with the aid of Statistical Package for Social Sciences (SPSS. ... To curb this menace, library management must educate users on use of library resources ... Keywords: Library security, Theft, Mutilation, Vandalism, Library resources; Laz Otti Memorial ...

  11. Security Management Strategies for Protecting Your Library's Network.

    Science.gov (United States)

    Ives, David J.

    1996-01-01

    Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…

  12. Management of library and archival security from the outside looking in

    CERN Document Server

    O'Neill, Robert K

    2014-01-01

    Providing a substantive approach to the issue, Management of Library and Archival Security: From the Outside Looking In gives librarians and collection directors practical and helpful suggestions for developing policies and procedures to minimize theft. In addition, this text prepares you to deal with the aftermath of a robbery or natural disaster that destroys priceless materials. Through expert opinions and advice, Management of Library and Archival Security will teach you how to protect and secure invaluable collections and the finances invested in them.In addition, Management of Library an

  13. Security and Crime Challenges in Academic Libraries in Nigeria

    African Journals Online (AJOL)

    Security and prevention of crimes in academic libraries is essential library duties .... From the earliest time to the present, librarians are bothered on how to ensure the protection ..... OPAC (Online Public Access Catalogue) computer system etc.

  14. McDonald and Company Securities Library User Survey, 1996.

    Science.gov (United States)

    Wolfgram, Derek E.

    The library of McDonald and Company Securities is important to the success of the business and its employees. This study assesses the needs and expectations of the library users, and analyzes how well the current library services are meeting those needs and expectations. A questionnaire was distributed to a large random sample of the firm's…

  15. Measuring Library Vendor Cyber Security: Seven Easy Questions Every Librarian Can Ask

    Directory of Open Access Journals (Sweden)

    Alex Caro

    2016-04-01

    Full Text Available This article is based on an independent cyber security risk management audit for a public library system completed by the authors in early 2015 and based on a research paper by the same group at Clark University in 2014. We stress that while cyber security must include raising public knowledge in regard to cyber security issues and resources, and libraries are indeed the perfect place to disseminate this knowledge, librarians are also in a unique position as the gatekeepers of information services provided to the public and should conduct internal audits to ensure our content partners and IT vendors take cyber security as seriously as the library and its staff. One way to do this is through periodic reviews of existing vendor relationships. To this end, the authors created a simple grading rubric you can adopt or modify to help take this first step towards securing your library data. It is intended to be used by both technical and non-technical staff as a simple measurement of what vendor agreements currently exist and how they rank, while at the same time providing a roadmap for which security features or policy statements the library can or should require moving forward.

  16. SECURING DIGITIZED LIBRARY CIRCULATORY SYSTEM | Olaniyi ...

    African Journals Online (AJOL)

    Journal Home > Vol 35, No 3 (2016) > ... Despite the potential benefits of Information and Communication Technology (ICT) in library automation, ... The widespread application of the developed system on smart library circulation unit would ...

  17. The National Resource Library for Science and Technology in Sweden: A Nordic model of cooperating technology libraries

    Science.gov (United States)

    Lagar, Gunnar

    1994-01-01

    The scope of this presentation is to give a state-of-the-art report on the present situation of Nordic technology libraries, to elaborate on a plan for national resource libraries in Sweden, and to share how the Royal Institute of Technology Library in Stockholm (KTHB) has fostered a network of cooperating libraries in order to optimize government funding for the system of resource libraries.

  18. Educational Technologies in Health Science Libraries: Teaching Technology Skills

    Science.gov (United States)

    Hurst, Emily J.

    2014-01-01

    As technology rapidly changes, libraries remain go-to points for education and technology skill development. In academic health sciences libraries, trends suggest librarians provide more training on technology topics than ever before. While education and training have always been roles for librarians, providing technology training on new mobile devices and emerging systems requires class creation and training capabilities that are new to many. To appeal to their users, many health sciences librarians are interested in developing technology-based classes. This column explores the question: what skills are necessary for developing and teaching technology in an academic health sciences library setting? PMID:24528269

  19. Educational technologies in health sciences libraries: teaching technology skills.

    Science.gov (United States)

    Hurst, Emily J

    2014-01-01

    As technology rapidly changes, libraries remain go-to points for education and technology skill development. In academic health sciences libraries, trends suggest librarians provide more training on technology topics than ever before. While education and training have always been roles for librarians, providing technology training on new mobile devices and emerging systems requires class creation and training capabilities that are new to many librarians. To appeal to their users, many health sciences librarians are interested in developing technology-based classes. This column explores the question: what skills are necessary for developing and teaching technology in an academic health sciences library setting?

  20. Libraries Achieving Greatness: Technology at the Helm

    Science.gov (United States)

    Muir, Scott P.

    2009-01-01

    Libraries have been around for thousands of years. Many of them are considered great because of their magnificent architecture or because of the size of their collections. This paper offers ten case studies of libraries that have used technology to achieve greatness. Because almost any library can implement technology, a library does not have to…

  1. Helping the Hacker? Library Information, Security, and Social Engineering

    Directory of Open Access Journals (Sweden)

    Samuel T. C. Thompson

    2006-12-01

    Full Text Available Social engineering is the use of nontechnical means to gain unauthorized access to information or computer systems. While this method is recognized as a major security threat in the computer industry, little has been done to address it in the library field. This is of particular concern because libraries increasingly have access to databases of both proprietary and personal information. This tutorial is designed to increase the awareness of library staff in regard to the issue of social engineering.

  2. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  3. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  4. 76 FR 4079 - Information Technology (IT) Security

    Science.gov (United States)

    2011-01-24

    ... Security, consistent with Federal policies for the security of unclassified information and information... Certification Program, and provide a Web site link within a contract clause to a library where contractors can... Security should be addressed through government-wide policies, standards, and requirements. NASA response...

  5. Gender, Technology, and Libraries

    Directory of Open Access Journals (Sweden)

    Melissa Lamont

    2009-09-01

    Full Text Available Information technology (IT is vitally important to many organizations, including libraries. Yet a review of employment statistics and a citation analysis show that men make up the majority of the IT workforce, in libraries and in the broader workforce. Research from sociology, psychology, and women’s studies highlights the organizational and social issues that inhibit women. Understanding why women are less evident in library IT positions will help inform measures to remedy the gender disparity.

  6. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  7. Towards improving security measures in Nigeria University Libraries ...

    African Journals Online (AJOL)

    A questionnaire designed by the researchers titled “Towards Improving Security Measures in Nigerian University Libraries (TISMINUL)” was used to collect the needed data. The questionnaire was designed in two parts. Part one was to gather information on the size of collection, frequency of stock taking and book loss.

  8. Evaluation of the central libraries information security management at governmental universities located in Tehran, according to the international standard ISO/IEC 27002

    Directory of Open Access Journals (Sweden)

    Milad Malekolkalami

    2014-02-01

    Full Text Available This study assessed the evaluation of information security management status in central Libraries of governmental universities located in Tehran, according to ISO / I.E.C. 27002. Research method applied for the study is descriptive Survey and a questionnaire was used for collecting information. The questionnaire was distributed between the 74 central library managers of governmental universities in Tehran according to the recent list on the website of Ministry of Science, Research and Technology, that includes 39 components based on 11 indicators of the standard ISO/ I.E.C. 27002. Analysis of data has been done by using both descriptive and inferential statistics by Microsoft Excel 2007and SPSS statistical softwares. The results of research showed that the mean for libraries in 11 indexes are as follows: The mean for the first index, Security policy, is 3.91 , in the second index, organization of information security, is 4.23, in the third index, asset security management, is 4.38, in the fourth index, Human Resources Security management, is 4, in the fifth index, physical and environment Security management, is 4.07, in the sixth index, operations management and communications, is 4.15, in the Seventh index, access controls management, is 4.38, in the eighth index, information system acquisition, development and maintenance, is 3.92, in the ninth index, information security incident management, is 3.84, in the tenth index, business continuity management, is 3.46, in the eleventh index, compliance, is 3.69 that match with the standard ISO / IEC. 27002. The results of Research shown that totally mean for standard ISO/I.E.C. 27002 in the field of information security management in the central libraries, is 4 being in a good condition and there is no significant differences between the performance of the Central libraries of the governmental Universities in Tehran, since It is not observed significant difference between them in the field of

  9. School Security Technologies

    Science.gov (United States)

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  10. Mobile technology for expansion of service range medan public library

    Science.gov (United States)

    Siregar, A. R.; Dewiyana, H.

    2018-03-01

    The information society, especially library users, expects an easier and faster way to get information and share knowledge. The library also implements the best way to provide the best service and the easiest way to disseminate and share information with its users. One technology that allows libraries more closely with their users is mobile technology. This paper aims to determine the basic conditions of mobile technology services and mobile services most needed library users, as well as constraints faced by libraries and users in the application of mobile technology. This paper will help libraries to develop better M-Library services in expanding the reach of library services. Methods of data collection were conducted through surveys through questionnaires, interviews, and direct observation. The results of the use of mobile technology applications in libraries bring great advantages to provide better library services and to improve accessibility of library resources in the easiest way, but due to lack of funds, lack of skills and lack of staff, many libraries are unable to provide this service with very successful.

  11. Security of Heterogeneous Content in Cloud Based Library Information Systems Using an Ontology Based Approach

    Directory of Open Access Journals (Sweden)

    Mihai DOINEA

    2014-01-01

    Full Text Available As in any domain that involves the use of software, the library information systems take advantages of cloud computing. The paper highlights the main aspect of cloud based systems, describing some public solutions provided by the most important players on the market. Topics related to content security in cloud based services are tackled in order to emphasize the requirements that must be met by these types of systems. A cloud based implementation of an Information Library System is presented and some adjacent tools that are used together with it to provide digital content and metadata links are described. In a cloud based Information Library System security is approached by means of ontologies. Aspects such as content security in terms of digital rights are presented and a methodology for security optimization is proposed.

  12. Library and Archival Security: Policies and Procedures To Protect Holdings from Theft and Damage.

    Science.gov (United States)

    Trinkaus-Randall, Gregor

    1998-01-01

    Firm policies and procedures that address the environment, patron/staff behavior, general attitude, and care and handling of materials need to be at the core of the library/archival security program. Discussion includes evaluating a repository's security needs, collections security, security in non-public areas, security in the reading room,…

  13. Exploring Information Security and Shared Encrypted Spaces in Libraries

    Directory of Open Access Journals (Sweden)

    Keith Engwall

    2015-07-01

    Full Text Available Libraries are sensitive to the need to protect patron data, but may not take measures to protect the data of the library. However, in an increasingly collaborative online environment, the protection of data is a concern that merits attention. As a follow-up to a new patron privacy policy, the Oakland University William Beaumont Medical Library evaluated information security tools for use in day-to-day operations in an attempt to identify ways to protect private information in communication and shared storage, as well as a means to manage passwords in a collaborative team environment. This article provides an overview of encryption measures, outlines the Medical Library’s evaluation of encryption tools, and reflects on the benefits and challenges in their adoption and use.

  14. Multimedia technologies in university libraries: opportunities and tasks

    Directory of Open Access Journals (Sweden)

    Tavalbekh Serkhan Ali

    2010-03-01

    Full Text Available Multimedia technologies (MMT are considered as a factor of qualitative changes of informational environment of education. Leading role of libraries in the process of integration of MMT environment of university is determined. Influence of libraries experience in usage of informational technologies both traditional and computer-aided, Internet in particular is observed. Determined that introduction of MMT noticeable improving the importance of library in MMT environment organization of universities, improvement of library informational service. Tasks of university libraries with integration into united media space are defining.

  15. Investigating the issue of copyright and security measures in digital libraries

    Directory of Open Access Journals (Sweden)

    Sedigheh Ahmadi Fasih

    2013-11-01

    Full Text Available During the past few years, digital libraries have been the primary source of retrieving necessary information. IT helps many scholars have the access to recently published value added researches around the world. However, information security and copyright concerns are among the most important issues and there must be good rules and regulation to protect authors against any sort of copyright violation. In this paper, we present an empirical investigation to find out about the status of copyright issues in one of Iranian libraries. The proposed study of this paper designs a questionnaire in Likert scale and distributes it among 96 librarian experts. Cronbach alpha is equal to 0.76, which is well above the minimum acceptable level. The results of our investigation indicate that although expert believe the status of copyright is in desirable level when the level of significance is five percent, there are some concerns on some issues. In other words, experts believed that all copyrights are not well protected and digital libraries do not follow governmental rules and regulation on fully protecting authors’ rights. In addition, experts believed that the security of sources available on digital libraries is not well protected.

  16. IFLA General Conference, 1986. Special Libraries Division. Section: Science and Technology Libraries. Papers.

    Science.gov (United States)

    International Federation of Library Associations and Institutions, The Hague (Netherlands).

    Papers on science and technology libraries which were presented at the 1986 International Federation of Library Associations (IFLA) conference include: (1) "Online Information Service of the Japan Information Center of Science and Technology" (Ryuko Igarashi, Japan); (2) "A View from the Chip--The Influence of Information…

  17. Adaptive technologies for library and information services for ...

    African Journals Online (AJOL)

    Adaptive technologies for library and information services for physically challenged in special education schools of Kaduna State. ... special education schools because; these are genuine demand from adaptive technology users of the library.

  18. Discussion on AI Technology in Information Library Design

    OpenAIRE

    日比野, 省三; Shozo, HIBINO; 中京大学社会学部

    1987-01-01

    This paper deals with the discussion on the importance of AI (Artificial Intelligence) Technology in planning and designing a library information system in the near future. First of all, the history of Library and Information Science is reviewed and it is identified that the key technology in the future library will be AI as a mega-trend. After reviewing the concepts of AI technology, a model of a Knowledge-Base system is discussed as a case study, using micro-PROLOG.

  19. Technology Empowerment: Security Challenges.

    Energy Technology Data Exchange (ETDEWEB)

    Warren, Drake Edward [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Backus, George A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Wendell [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nelson, Thomas R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Skocypec, Russell D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-03-01

    Technology empowerment” means that innovation is increasingly accessible to ordinary people of limited means. As powerful technologies become more affordable and accessible, and as people are increasingly connected around the world, ordinary people are empowered to participate in the process of innovation and share the fruits of collaborative innovation. This annotated briefing describes technology empowerment and focuses on how empowerment may create challenges to U.S. national security. U.S. defense research as a share of global innovation has dwindled in recent years. With technology empowerment, the role of U.S. defense research is likely to shrink even further while technology empowerment will continue to increase the speed of innovation. To avoid falling too far behind potential technology threats to U.S. national security, U.S. national security institutions will need to adopt many of the tools of technology empowerment.

  20. Security force effectiveness and technology

    International Nuclear Information System (INIS)

    Seaton, M.B.

    1988-01-01

    No one would propose ineffective security forces. Applied technology always has, as its purpose, to increase effectiveness. Evidence exists, however, that poorly conceived or executed technological solutions can actually do more harm than good. The author argues for improved human factor considerations in physical security applied technology -- especially in the area of security console operations

  1. Handheld Libraries 101: Using Mobile Technologies in the Academic Library

    Science.gov (United States)

    Kosturski, Kate; Skornia, Frank

    2011-01-01

    The 2009 "Horizon Report" called mobile technologies "an opportunity for higher education to reach its constituents in new and compelling ways." The report implied that academic libraries would find them to be the ideal tools for bringing reluctant researchers to the library, mainly for their convenience. It's not hard to see why--in 2008, mobile…

  2. Information Technology in Libraries. A Pakistani Perspective.

    Science.gov (United States)

    Mahmood, Khalid

    This book presents an overview of the present status of the use of library automation hardware and software in Pakistan. The following 20 articles are included: (1) "The Status of Library Automation in Pakistan"; (2) "Promoting Information Technology in Pakistan: the Netherlands Library Development Project"; (3) "Library…

  3. Motivation and library management

    Directory of Open Access Journals (Sweden)

    Tatjana Likar

    2000-01-01

    Full Text Available The present article deals with motivation, its relation to management and its role and use in librarianship in our country and abroad. The countries where librarianship is well developed started to deal with library management and questions of motivation of library workers decades ago, whereas elsewhere the subject is at its start. The prerequisite for modern policy making is attention to the elements of modern library management. Librarians, library managers and directors of libraries should create a work environment providing long term satisfaction with work by means of certain knowledge and tools. The level of motivation of the staff is influenced by the so called higher factors deriving from the work process itself and related to work contents: achieve¬ment, recognition, trust and work itself. Extrinsic factors (income, interpersonal relations, technology of administration, company policy, working conditions, work con¬trol, personal security, job security and position... should exercise lesser impact on the level of motivation.

  4. Public libraries, information society and technology: communication

    Directory of Open Access Journals (Sweden)

    Elsa Barber

    2001-01-01

    Full Text Available The research team focuses in the influence that Argentinian public libraries (popular and public have with library automation and public services oriented to the use of information technologies, and the acquisition of communitarian information skills within the information society. The methodology consists of a survey already successfully approved in previous investigations by the research team (UBACYT FI013 and TF06. The questionnaire focuses on related variables. On one hand, the variables were related to libraries automation processes (equipment, information systems,working modules, retrospective conversion, digitization, networks,and so on. And on the other hand, with given information technologies services (access to networks and documents in every media, Web navigation assistance, information technology local server, services to minorities, and so on. Data would be gathered with specific applications from the social sciences field. The final stage would be to study specific aspects of the automation processes of the libraries surveyed, in order to verify the reciprocal relationship between the automation level reached. And subsequently, to examine the likelihood of establishing new services that respond to the community information trends within the information technology and telecommunications development context.

  5. Personal, Electronic, Secure National Library of Medicine Hosts Health Records Conference

    Science.gov (United States)

    ... Bar Home Current Issue Past Issues EHR Personal, Electronic, Secure: National Library of Medicine Hosts Health Records ... One suggestion for saving money is to implement electronic personal health records. With this in mind, the ...

  6. Report on International Roundtable Meeting on Collection Security held at the British Library

    OpenAIRE

    Andy Stephens; Helen Shenton

    2008-01-01

    Anonymised report on some of the issues raised at an international roundtable on collection security of thirteen major research libraries and national libraries from Europe and North America. Recurring themes of case studies included: 1) perpetrator profiling; 2) relations with the criminal justice system; 3) systems; 4) looking out; 5) aftermath.

  7. International Association of Technological University Libraries (IATUL: Promoting Science and Technology Librarianship in the Changing Library Landscape

    Directory of Open Access Journals (Sweden)

    Maitrayee Ghosh

    2013-11-01

    Full Text Available International Association of Technological University Libraries (IATUL has been in the forefront of providing leadership to information professionals and promoting science and Technology librarianship in today's changing library landscape. The present article is an attempt to comprehend the present status of IATUL and analyze the activities and contribution it has made to overcome the range of challenges facing by tertiary level Technological libraries throughout the world. The SWOT analysis method is used to assess the achievements of IATUL, failures and ascertain constraints being faced in this internet age. The author relied on web sites as well as ephemeral material such as minutes, annu- al reports, newsletters, and memoranda to construct this article. Meeting and Interview with IATUL present and past presidents and other office bearers of the associations provided useful sources of information. It is also attempted to pro- vide relevant information for those interested to join IATUL for professional development.

  8. Measuring patrons' technology habits: an evidence-based approach to tailoring library services.

    Science.gov (United States)

    Wu, Jin; Chatfield, Amy J; Hughes, Annie M; Kysh, Lynn; Rosenbloom, Megan Curran

    2014-04-01

    Librarians continually integrate new technologies into library services for health sciences students. Recently published data are lacking about student ownership of technological devices, awareness of new technologies, and interest in using devices and technologies to interact with the library. A survey was implemented at seven health sciences libraries to help answer these questions. Results show that librarian assumptions about awareness of technologies are not supported, and student interest in using new technologies to interact with the library varies widely. Collecting this evidence provides useful information for successfully integrating technologies into library services.

  9. Optimizing use of library technology.

    Science.gov (United States)

    Wink, Diane M; Killingsworth, Elizabeth K

    2011-01-01

    In this bimonthly series, the author examines how nurse educators can use the Internet and Web-based computer technologies such as search, communication, collaborative writing tools; social networking and social bookmarking sites; virtual worlds; and Web-based teaching and learning programs. This article describes optimizing the use of library technology.

  10. Close the Gate, Lock the Windows, Bolt the Doors: Securing Library Computers. Online Treasures

    Science.gov (United States)

    Balas, Janet

    2005-01-01

    This article, written by a systems librarian at the Monroeville Public Library, discusses a major issue affecting all computer users, security. It indicates that while, staying up-to-date on the latest security issues has become essential for all computer users, it's more critical for network managers who are responsible for securing computer…

  11. Fundamentals of Library Automation and Technology. Participant Workbook.

    Science.gov (United States)

    Bridge, Frank; Walton, Robert

    This workbook presents outlines of topics to be covered during a two-day workshop on the fundamentals for library automation. Topics for the first day include: (1) Introduction; (2) Computer Technology--A Historical Overview; (3) Evolution of Library Automation; (4) Computer Hardware Technology--An Introduction; (5) Computer Software…

  12. Female Public Library Patrons Value the Library for Services, Programs, and Technology. A Review of: Fidishun, Dolores. “Women and the Public Library: Using Technology, Using the Library.” Library Trends 56.2 (2007: 328-43.

    Directory of Open Access Journals (Sweden)

    Virginia Wilson

    2009-03-01

    Full Text Available Objective – This study attempts to give insight into why and how women use the public library and information technology, and how they learned to use the technology.Design – Qualitative survey.Setting – The research took place at the Chester County Library in Exton, Pennsylvania, USA.Subjects – One hundred and eighty-four female library patrons 18 years and older.Methods – An anonymous qualitative survey was handed out to all patrons at the ChesterCounty Library 18 years of age and older who came into the library on four separate days and times. Times were chosen to obtain a good representation of library patrons, and included daytime, evening, and weekend hours. The survey consisted of questions about library use, information sought, information seeking behaviour, technology used, and how the respondents learned to use the technology. The surveys were collated and spreadsheets were created that reported answers to yes/no and other data questions. Word documents facilitated the listing of more qualitative answers. The data were analyzed using a thematic content analysis to find themes and patterns that emerged to create grounded theory. In thematic content analysis, “the coding scheme is based on categories designed to capture the dominant themes in a text (Franzosi 184. There is no universal coding scheme, and this method requires extensive pre-testing of the scheme (Franzosi 184. Grounded theory “uses a prescribed set of procedures for analyzing data and constructing a theoretical model” from the data (Leedy and Ormrod 154.Main Results – The survey asked questions about library use, reasons for library use, using technology, finding information, and learning to use online resources. A total of 465 surveys were distributed and 329 were returned. From the surveys returned, 184 were from female patrons, 127 from male patrons, and 18 did not report gender. The data for this article are primarily taken from the 184 female

  13. Report on International Roundtable Meeting on Collection Security held at the British Library

    Directory of Open Access Journals (Sweden)

    Andy Stephens

    2008-09-01

    Full Text Available Anonymised report on some of the issues raised at an international roundtable on collection security of thirteen major research libraries and national libraries from Europe and North America. Recurring themes of case studies included: 1 perpetrator profiling; 2 relations with the criminal justice system; 3 systems; 4 looking out; 5 aftermath.

  14. Discussion on construction of scientific and technological digital library in nuclear industry

    International Nuclear Information System (INIS)

    Yin Huilan

    2010-01-01

    With the rapid development of digital and network technology, traditional libraries have been unable to meet the needs of the times. Digital libraries will gradually take the place of traditional libraries. Under the circumstances, how will the libraries of the enterprises in nuclear industry face this transformation? This paper gives the brief descriptions and comparative analyses in the four aspects: the definition of the digital library, the meaning of nuclear scientific and technological digital library, the characteristics of the digital library, and major problems in the construction of nuclear scientific and technological digital library that should be solved. Therefore, setting up the digital library is very important. At the same time, it's very necessary and urgent for the libraries of the enterprises in nuclear industry to establish nuclear scientific and technological digital library. (author)

  15. Mobile technology and academic libraries innovative services for research and learning

    CERN Document Server

    Canuel, Robin

    2017-01-01

    In seventeen chapters ranging from A Mobile-First Library Site Redesign to Mobile Technology Support for Field Research to Virtual Reality Library Environments, Mobile Technology and Academic Libraries explores how librarians around the world are working to adapt their spaces, collections, teaching, and services to the new possibilities presented by mobile technology. This is a detailed and thorough examination of technology that's emerging now and how to incorporate it into your library to help the students and researchers of both today and tomorrow.

  16. Library macro-environment: New technological and economic rules

    Directory of Open Access Journals (Sweden)

    Karmen Štular-Sotošek

    2003-01-01

    Full Text Available Fast and flexible adaptation to changes in the macro-environment is also crucial for libraries, which have to review them, respond to them and become a part of them. Consequently, the application of marketing science and tools helps libraries to find out how to survive in the competitive world and how to become better and stronger. The article, which draws from marketing, economic and information disciplines, introduces the main principles in the technological and economic environment of libraries and finds the knowledge about these disciplines to be most crucial for successful management of modern libraries, especially on the pretentious publishing market and on the market of information suppliers. Within the technological and economic environment, the cooperation is the only logical solution, which benefits the producers of information services and products as well as libraries. The following text finds that libraries will achieve long-term success and will be proactive in developing partnerships only by using relationship marketing. This relatively new approach offers libraries new ways for successful and long-term management of alliances between partners.

  17. National Security Technology Incubator Business Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  18. Current Technology Trends for School Library Media Specialists

    OpenAIRE

    Leticia Ekhaml; Joan Hubbard

    2003-01-01

    An overview of some of the current technology trends used in classroom instruction and school library media centers in provided in this article such as the use of handheld electronic organizers, CD recorders, digital video cameras, and interactive whiteboards. The article offers some suggestions or ideas on how to acquire new technologies to school library media centers that are low in budgetary funds.

  19. National Security Technology Incubator Evaluation Process

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.

  20. Smart Card Security; Technology and Adoption

    OpenAIRE

    Hamed Taherdoost; Shamsul Sahibuddin; Neda Jalaliyoon

    2011-01-01

    Newly, smart card technology are being used in a number of ways around the world, on the otherhand, security has become significant in information technology, especially in those applicationinvolving data sharing and transactions through the internet. Furthermore, researches ininformation technology acceptance have identified the security as one of the factor that caninfluence on smart card adoption. This research is chiefly to study the security principals of smartcard and assess the securit...

  1. Current Technology Trends for School Library Media Specialists

    Directory of Open Access Journals (Sweden)

    Leticia Ekhaml

    2003-03-01

    Full Text Available An overview of some of the current technology trends used in classroom instruction and school library media centers in provided in this article such as the use of handheld electronic organizers, CD recorders, digital video cameras, and interactive whiteboards. The article offers some suggestions or ideas on how to acquire new technologies to school library media centers that are low in budgetary funds.

  2. The Adoption of Cloud Computing Technology for Library Services ...

    African Journals Online (AJOL)

    The study investigated the rationales for the adoption of cloud computing technology for library services in NOUN Library. Issues related to the existing computer network available in NOUN library such as LAN, WAN, rationales for the adoption of cloud computing in NOUN library such as the need to disclose their collections ...

  3. Effect of Technology on Librarians in Academic Libraries in Nigeria ...

    African Journals Online (AJOL)

    Keywords: techno stress, librarians, technology, perceptions, Nigeria ... Librarians in academic libraries work in an ever changing technological ... world. It is thus paramount for university libraries to address associated issues related to the use.

  4. Libraries, Self-Censorship, and Information Technologies.

    Science.gov (United States)

    Buschman, John

    1994-01-01

    Explores the theme of self-censorship in libraries in relation to new technologies. Highlights include the results of investing in high-cost electronic resources at the expense of traditional, lower-status formats; the effect of information technologies on literacy and historical records; and market censorship, including centralization and…

  5. Marine data security based on blockchain technology

    Science.gov (United States)

    Yang, Zhao; Xie, Weiwei; Huang, Lei; Wei, Zhiqiang

    2018-03-01

    With the development of marine observation technology and network technology, the volume of marine data growing rapidly. This brings new challenges for data storage and transmission. How to protect data security of marine big data has become an urgent problem. The traditional information security methods’ characteristic is centralization. These technologies cannot provide whole process protection, e.g., data storage, data management and application of data. The blockchain technology is a novel technology, which can keep the data security and reliability by using decentralized methodology. It has aroused wide interest in the financial field. In this paper, we describe the concept, characteristics and key technologies of blockchain technology and introduce it into the field of marine data security.

  6. Enterprise security IT security solutions : concepts, practical experiences, technologies

    CERN Document Server

    Fumy, Walter

    2013-01-01

    Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cr

  7. Information security foundations, technologies and applications

    CERN Document Server

    Awad, Ali Ismail; Fairhurst, Michael

    2018-01-01

    This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security.

  8. Information technology security system engineering methodology

    Science.gov (United States)

    Childs, D.

    2003-01-01

    A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.

  9. Application of LOD Technology in German Libraries and Archives

    Directory of Open Access Journals (Sweden)

    Dong Jie

    2017-12-01

    Full Text Available [Purpose/significance] Linked Open Data (LOD has been widely used in large industries, as well as non-profit organizations and government organizations. Libraries and archives are ones of the early adopters of LOD technology. Libraries and archives promote the development of LOD. Germany is one of the developed countries in the libraries and archives industry, and there are many successful cases about the application of LOD in the libraries and archives. [Method/process] This paper analyzed the successful application of LOD technology in German libraries and archives by using the methods of document investigation, network survey and content analysis. [Result/conclusion] These cases reveal in the traditional field of computer science the relationship among research topics related to libraries and archives such as artificial intelligence, database and knowledge discovery. Summing up the characteristics and experience of German practice can provide more reference value for the development of relevant practice in China.

  10. Improving Information Access through Technology: A Plan for Louisiana's Public Libraries.

    Science.gov (United States)

    Jaques, Thomas F.

    Strengthening technology in Louisiana's public libraries will support equitable and convenient access to electronic information resources for all citizens at library sites, in homes, and in business. The plan presented in this document is intended to enhance and expand technology in the state's public libraries. After discussion of the crucial…

  11. School Library Media Specialists Inform Technology Preparation of Library Science Students: An Evidence-Based Discussion

    Science.gov (United States)

    Snyder, Donna L.; Miller, Andrea L.

    2009-01-01

    What is the relative importance of current and emerging technologies in school library media programs? In order to answer this question, in Fall 2007 the authors administered a survey to 1,053 school library media specialists (SLMSs) throughout the state of Pennsylvania. As a part of the MSLS degree with Library Science K-12 certification, Clarion…

  12. National Security in the Nuclear Age: Public Library Proposal and Booklist. May 1987 Update.

    Science.gov (United States)

    Dane, Ernest B.

    To increase public understanding of national security issues, this document proposes that a balanced and up-to-date collection of books and other materials on national security in the nuclear age be included in all U.S. public libraries. The proposal suggests that the books be grouped together on an identified shelf. Selection criteria for the…

  13. Web 2.0 and libraries impacts, technologies and trends

    CERN Document Server

    Parkes, Dave

    2010-01-01

    In a world where computing power, ubiquity and connectivity create powerful new ways to facilitate learning, this book examines how librarians and information professionals can utilize emerging technologies to expand service and resource delivery. With contributions from leading professionals, including lecturers, librarians and e-learning technologists, this bookl explores strategic approaches for effectively implementing, living with, and managing revolutionary technological change in libraries.Explores the impact of the social and technological aspects of Web 2.0 on librarie

  14. The Leadership Dimension in Information and Communication Technology Adoption in African Libraries

    Directory of Open Access Journals (Sweden)

    Adetoun A. Oyelude

    2014-02-01

    Full Text Available The article focuses on leadership challenges in adaptation to Information and Communication Technologies (ICTs in African libraries. It identifies and discusses the need for adequate leadership styles and behavior in the bid to adapt effectively to new technologies. Online survey, observation arising from personal professional practice experience, personal communication, and interview methods were used to gather data for the study. Older library professionals, many of whom are still very visible across the leadership strata of libraries, were found to exhibit diverse attitude to the adaptation to ICTs deployment and use in their libraries. Some library leaders and older generation professionals were discovered to react somewhat negatively to changes in technology used in their libraries, preventing the younger professionals from performing to full capacity, and generally showing nonchalance to new technologies. Proper training and retraining, mentoring, and harnessing the synergy of ideas, with respectful communication from new generation library professionals, was found to be desirable. Change management workshops and implementation of standard ethics of the profession are recommended, while emphasis is put on the need for library professionals to overcome their technophobia and take leadership in adapting to move the library and information profession forward.

  15. Reflection on the talent structure of knowledge-service oriented nuclear technology library

    International Nuclear Information System (INIS)

    Zhang Xue; Zhang Ruiping

    2010-01-01

    Nuclear technology library is the only authoritative organization in collection of nuclear technology literatures.It has exceptional advantage and a large number of customers with great requirement. With promotion of network and digitization of information resource, new situation is posed before nuclear technology library-transforming from traditional library to knowledge-service oriented library. In order to carry on knowledge service effectively and conveniently, a variety of talents are essential. So establishing a talent team with high quality and complete specialities is the fundamental guarantee. Based on a great deal research and discussion, requirements for establishment of a talent team are put forward in the paper and suggestion are present: 5 basic specialized talents are required in nuclear technology library, including organization and management talent, basic operation talent, search service talent, technology application talent, information development talent. (authors)

  16. RFID Technology Implementation in Two Libraries in New Delhi

    Science.gov (United States)

    Madhusudhan, Margam

    2010-01-01

    Purpose: The purpose of this paper is to examine the use and implementation of RFID technology at the Indian Law Institute Library and National Social Science Documentation Centre Library, New Delhi. Design/methodology/approach: A survey was conducted at the two libraries, using a structured questionnaire comprising 20 questions. Findings: It was…

  17. Fiber Optics and Library Technology.

    Science.gov (United States)

    Koenig, Michael

    1984-01-01

    This article examines fiber optic technology, explains some of the key terminology, and speculates about the way fiber optics will change our world. Applications of fiber optics to library systems in three major areas--linkage of a number of mainframe computers, local area networks, and main trunk communications--are highlighted. (EJS)

  18. Science & Technology Digital Library

    OpenAIRE

    Solodovnik, Iryna

    2014-01-01

    This document contains information on the activities carried out within the project Science & Technology Digital Library and in particular, it describes the Metadata Core Reference Model. Metadata are strategic for semantic interoperability to and, from the repository. Metadata are essential for available and safe management of digital objects, and for their sustainability and preservation. For these reasons, the project needs to define a specific metadata model. The purpose of this document ...

  19. The Impact of Information Technology on Library Anxiety: The Role of Computer Attitudes

    Directory of Open Access Journals (Sweden)

    Qun G. Jiao

    2017-09-01

    Full Text Available Over the past two decades, computer-based technologies have become dominant forces to shape and reshape the products and services the academic library has to offer. The applicationo of library technologies has had a profound impact on the way library resources are being used. Although many students continue to experience high levels of library anxiety, it is likely that the new technologies in the library have led to them experiencing other forms of negative affective states that may be, in part, a function of their attitude towards computers. This study investigates whether students' computer attitudes predict levels of library anxiety.

  20. Building secure network by integrated technology

    International Nuclear Information System (INIS)

    An Dehai; Xu Rongsheng; Liu Baoxu

    2000-01-01

    The author introduces a method which can realize the most powerful network security prevention by the network security integrated technologies such as firewall, realtime monitor, network scanner, Web detection and security, etc

  1. IFLA General Conference, 1985. Division on Special Libraries. Section on Science and Technology Libraries. Papers.

    Science.gov (United States)

    International Federation of Library Associations, The Hague (Netherlands).

    Papers on science and technology libraries which were presented at the 1985 International Federation of Library Associations (IFLA) conference include: (1) "UAP (Universal Availability of Publications) and User Training for Categories of Grey Literature" (Dieter Schmidmaier, Mining Academy Freiberg, East Germany); (2) "Resource…

  2. Internet security technologies

    CERN Multimedia

    CERN. Geneva

    2003-01-01

    The three pillars of Internet Security are Infrastructure, Applications and People. In this series of lectures we will examine those three pillars and how vital it is for individuals to understand the vulnerabilities of this technology so they can made informed decisions about risks and how they can reduce those risks for themselves and their colleagues.First we will focus on the infrastructure: network; servers; operating systems and all those things that are mostly invisible. Moving up a level, into the visible realm, we discuss the application and see things like buffer overflows, viruses and how as application developers and users we can protect ourselves. Finally, it's all about people. The strongest security technology in the world is easily defeated if people don't understand their role in the whole system.

  3. Management and innovation of small science and technology libraries

    International Nuclear Information System (INIS)

    Yang Shumei

    2014-01-01

    This paper describes the new conception of management and service of small science and technology libraries in research and development institutions (R and D institutions), in the light of characteristics of the R and D institution, this paper gives the small science and technology libraries the new and advanced knowledge of management and service. Moreover, this paper gives instructions on knowledge management and service innovation in future practice. (author)

  4. Use of assistive technologies in academic libraries: a survey.

    Science.gov (United States)

    Tripathi, Manorama; Shukla, Archana

    2014-01-01

    The present article attempts to highlight the use of assistive technologies in academic libraries in India, the United Kingdom, the United States, and Canada. It dwells upon the use and importance of assistive technologies in general and their use for visually challenged learners in particular. Further, it gives suggestions for implementing assistive technologies in academic libraries for making visually challenged students self-reliant learners in accomplishing their academic and research pursuits. The present study adopted convenience sampling for collecting the data, which was collected between December 15, 2012 and January 18, 2013.

  5. The DOE safeguards and security technology development program

    International Nuclear Information System (INIS)

    Cherry, R.C.; Wheelock, A.J.

    1991-01-01

    This paper reports that strategic planning for safeguards and security within the Department of Energy emphasizes the contributions of advanced technologies to the achievement of Departmental protection program goals. The Safeguards and Security Technology Development Program provides state-of-the-art technologies, systems and technical services in support of the policies and programmatic requirements for the protection of Departmental assets. The Program encompasses research and development in physical security, nuclear material control and accountability, information security and personnel security, and the integration of these disciplines in advanced applications. Technology development tasks serve goals that range from the maintenance of an effective technology base to the development, testing and evaluation of applications to meet field needs. A variety of factors, from the evolving threat to reconfiguration of the DOE complex and the technical requirements of new facilities, are expected to influence safeguards and security technology requirements and development efforts. Implementation of the Program is based on the systematic identification, prioritization and alignment of technology development tasks and needs. Initiatives currently underway are aimed at enhancing technology development project management. Increased management attention is also being placed on efforts to promote the benefits of the Program through technology transfer and interagency liaison

  6. On the new situation to descend a basic level technology library information service work

    International Nuclear Information System (INIS)

    Sun Haiyan

    2010-01-01

    With information technology fast developing. library can give readers modernization service. The results of information technology revolution can be used in library. Information materials can be supplied by acoustic image and researching in internet. In this document, we analysis the characteristics, present situations and developments of grass-roots libraries. Discuss the questions in grass-roots science-technology library in nuclear industry, improving the grass-roots equipments, developing various data library, and how to improve the quality of information service in grass-roots library. (author)

  7. Making the most of RFID in libraries

    CERN Document Server

    Palmer, Martin

    2009-01-01

    The advantage of radio frequency identification (RFID) over other technologies used in libraries is usually seen to be its ability to combine the functions of the barcode and the security tag, but with the added advantage of not needing line of sight. This book considers the benefits of installing RFID technology; and work with vendors.

  8. Technology for small and one-person libraries a LITA guide

    CERN Document Server

    Erlandson, Rene J

    2013-01-01

    Written for librarians, library staff, and administrators at libraries serving populations of 15,000 or less, this LITA guide shows how to successfully develop, implement, sustain, and grow technology initiatives.

  9. Nuclear energy technology transfer: the security barriers

    International Nuclear Information System (INIS)

    Rinne, R.L.

    1975-08-01

    The problems presented by security considerations to the transfer of nuclear energy technology are examined. In the case of fusion, the national security barrier associated with the laser and E-beam approaches is discussed; for fission, the international security requirements, due to the possibility of the theft or diversion of special nuclear materials or sabotage of nuclear facilities, are highlighted. The paper outlines the nuclear fuel cycle and terrorist threat, examples of security barriers, and the current approaches to transferring technology. (auth)

  10. How Safe Are Our Libraries?

    Science.gov (United States)

    St. Lifer, Evan

    1994-01-01

    Addresses issues of safety and security in libraries. Topics discussed include keeping library collections safe; patron behavioral problems; factoring loss into the budget; staff theft; access versus security; apathy regarding library crime; a need for a unified security apparatus; preventive measures; staff and patron safety; and a…

  11. Implications of Information Technology on the Training of Library ...

    African Journals Online (AJOL)

    Furthermore, training is offered through various modes such as contact (full-time or part-time) ... theoretical background, good interpersonal and teamwork skills, the ability to .... LS 212 Literature and Library Service to Children & Adolescents .... Technology and customer expectation in academic libraries: a special reference.

  12. Technologies to counter aviation security threats

    Science.gov (United States)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  13. Making Technology Work for Campus Security

    Science.gov (United States)

    Floreno, Jeff; Keil, Brad

    2010-01-01

    The challenges associated with securing schools from both on- and off-campus threats create constant pressure for law enforcement, campus security professionals, and administrators. And while security technology choices are plentiful, many colleges and universities are operating with limited dollars and information needed to select and integrate…

  14. A History of the Utilization of Technology in Academic Libraries.

    Science.gov (United States)

    Boden, Dana W. R.

    This paper examines the history of academic libraries with special emphasis on the beginnings, growth, and progress in the uses of technology in those libraries. The earliest libraries were maintained for the preservation of knowledge and information. Access to the items in these collections was limited. With the growth of higher education in the…

  15. Pop-up Library Makerspace: academic libraries provide flexible, supportive space to explore emerging technologies.

    OpenAIRE

    Groves, Antony

    2016-01-01

    The word Makerspace is a general term for a place where people get together to make things, create things and\\ud learn together. Antony Groves presents a look at a recent university library experiment hosting a pop-up makerspace. Working with local edtech leaders MakerClub and colleagues the library organised a two-hour workshop which offered the opportunity for students and staff to explore emerging technologies.

  16. Survey of network and information security technology

    International Nuclear Information System (INIS)

    Liu Baoxu; Wang Xiaozhen

    2007-01-01

    With the rapidly development of the computer network technology and informationize working of our Country, Network and Information Security issues becomes the focal point problem that people shows solicitude for. On the basis analysing security threat and challenge of network information and their developing trend. This paper briefly analyses and discusses the main relatively study direction and content about the theory, technology and practice of Network and Information Security. (authors)

  17. Adapting Digital Libraries to Continual Evolution

    Science.gov (United States)

    Barkstrom, Bruce R.; Finch, Melinda; Ferebee, Michelle; Mackey, Calvin

    2002-01-01

    In this paper, we describe five investment streams (data storage infrastructure, knowledge management, data production control, data transport and security, and personnel skill mix) that need to be balanced against short-term operating demands in order to maximize the probability of long-term viability of a digital library. Because of the rapid pace of information technology change, a digital library cannot be a static institution. Rather, it has to become a flexible organization adapted to continuous evolution of its infrastructure.

  18. Resource sharing in libraries concepts, products, technologies, and trends

    CERN Document Server

    Breeding, Marshall

    2014-01-01

    Supplementing your local collection through resource sharing is a smart way to ensure your library has the resources to satisfy the needs of your users. Marshall Breeding's new Library Technology Report explores technologies and strategies for sharing resources, helping you streamline workflows and improve resource-sharing services by covering key strategies like interlibrary loan, consortial borrowing, document delivery, and shared collections. You'll also learn about such trends and services as:OCLC WorldCat Resource Sharing, and other systems that facilitate cooperative, reciprocal lendingS

  19. E-Books and New Library Service Models: An Analysis of the Impact of E-Book Technology on Academic Libraries.

    Science.gov (United States)

    Jantz, Ronald

    2001-01-01

    Analyzes the implications of electronic book technology (e-books) on academic libraries. Discusses new business models for publishers, including self-publishing, Internet publishing, and partnerships with libraries as publishers; impact on library services, including cataloging, circulation, and digital preservation; user benefits; standards;…

  20. Opportunities and Challenges for Technology Development and Adoption in Public Libraries

    DEFF Research Database (Denmark)

    Serholt, Sofia; Eriksson, Eva; Dalsgaard, Peter

    2018-01-01

    In this paper, we discuss opportunities and challenges for technology development and adoption in public libraries. The results are based on a multi-site comparative study and thematic analysis of six months of extensive ethnographic work in libraries in three different European countries....... The results explore the socio-technical practices, understandings, and perspectives of library staff and patrons when it comes to the role(s) and function(s) of libraries today. The contribution of this paper is two fold. Firstly, the results from the analysis of rich ethnographic data presented under six...... themes. Secondly, we offer a list of identified key opportunities and challenges focusing on 1) media and technology literacy, 2) institutional transformation and technical infrastructures, 3) resource constraints among library staff, and 4) a shift in focus towards supporting activities....

  1. Proceedings of a Conference on Telecommunication Technologies, Networkings and Libraries

    Science.gov (United States)

    Knight, N. K.

    1981-12-01

    Current and developing technologies for digital transmission of image data likely to have an impact on the operations of libraries and information centers or provide support for information networking are reviewed. Technologies reviewed include slow scan television, teleconferencing, and videodisc technology and standards development for computer network interconnection through hardware and software, particularly packet switched networks computer network protocols for library and information service applications, the structure of a national bibliographic telecommunications network; and the major policy issues involved in the regulation or deregulation of the common communications carriers industry.

  2. Factors Underlying Technology Adoption in Academic Libraries in Kuwait

    Science.gov (United States)

    Al-Fadhli, Meshal; Corrall, Sheila; Cox, Andrew

    2016-01-01

    The study analyzed factors shaping adoption of technology in academic libraries in Kuwait. The research was based on interviews conducted with library directors, staff, and users, combined with observation and document analysis. A major aspect of the Kuwaiti context was a relative lack of financial restraints and an enthusiasm for technology…

  3. Applications of a Case Library of Technology Integration Stories for Teachers

    Science.gov (United States)

    Wang, Feng-Kwei; Jonassen, David H.; Strobel, Johannes; Cernusca, Dawn

    2003-01-01

    Stories are the most natural form of communication and learning among humans. In this paper, we describe how we have designed and implemented an case library of technology integration stories to support pre-service and in-service teachers learning how to integrate technologies into their teaching. The case library was built using the artificial…

  4. Cyber security evaluation of II&C technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Ken [Idaho National Laboratory (INL), Idaho Falls, ID (United States)

    2014-11-01

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a

  5. 75 FR 28275 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-05-20

    ...: The Homeland Security Science and Technology Advisory Committee met on April 20, 2010 from 8:30 a.m... and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410, Washington... for the Under Secretary of Homeland Security for Science and Technology. The Homeland Security Science...

  6. Managing information technology security risk

    Science.gov (United States)

    Gilliam, David

    2003-01-01

    Information Technology (IT) Security Risk Management is a critical task for the organization to protect against the loss of confidentiality, integrity and availability of IT resources. As systems bgecome more complex and diverse and and attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security risk. This paper describes a two-pronged approach in addressing IT security risk and risk management in the organization: 1) an institutional enterprise appraoch, and 2) a project life cycle approach.

  7. Engineering Principles for Information Technology Security (A Baseline for Achieving Security)

    National Research Council Canada - National Science Library

    Stoneburner, Gary

    2001-01-01

    The purpose of the Engineering Principles for Information Technology (IT) Security (HP-ITS) is to present a list of system-level security principles to he considered in the design, development, and operation of an information system...

  8. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  9. Transforming Knowledge Creation: An Action Framework for Library Technology Diversity

    Directory of Open Access Journals (Sweden)

    Barbara I. Dewey

    2015-04-01

    Full Text Available This paper will articulate an action framework for library technology diversity consisting of five dimensions and based on the vision for knowledge creation, the academic library’s fundamental vision. The framework focuses on increasing diversity for library technology efforts based on the desire for transformation and inclusiveness within and across the dimensions. The dimensions are people, content and pedagogy, embeddedness and the global perspective, leadership, and the 5th dimension – bringing it all together.

  10. Tracing technology in the Association of Academic Health Sciences Libraries.

    Science.gov (United States)

    Guard, J Roger; Peay, Wayne J

    2003-04-01

    From the beginning of the association, technology and the Association of Academic Health Sciences Libraries (AAHSL) have been intertwined. Technology was the focus of one of the first committees. Innovative applications of technology have been employed in the operations of the association. Early applications of mini-computers were used in preparing the Annual Statistics. The association's use of network communications was among the first in the country and later applications of the Web have enhanced association services. For its members, technology has transformed libraries. The association's support of the early development of Integrated Advanced Information Management Systems (IAIMS) and of its recent reconceptualization has contributed to the intellectual foundation for this revolution.

  11. Research Library

    Science.gov (United States)

    Los Alamos National Laboratory Research Library Search Site submit Contact Us | Remote Access Standards Theses/Dissertations Research Help Subject Guides Library Training Video Tutorials Alerts Research Library: delivering essential knowledge services for national security sciences since 1947 Los

  12. Application on Internet of Things Technology Using in Library Management

    Science.gov (United States)

    Liu, Xueqing; Sheng, Wenwen

    Following the computer, Internet and mobile communication network, the Internet of Things (IOT) will bring a new development of information industry, and moreover is a global technology revolution that is bound to have a profound impact on the economic development and social life. This paper analyzes the key technology and working principle of IOT, its development at home and abroad, its application in the library management, and proposes its development direction in the field of library management and promotion programs.

  13. 75 FR 18516 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-04-12

    ...; notice of closed Federal Advisory Committee meeting SUMMARY: The Homeland Security Science and Technology.... DATES: The Homeland Security Science and Technology Advisory Committee will meet April 20, 2010 from 8...: Ms. Tiwanda Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray...

  14. 75 FR 2555 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-01-15

    ... Technology Advisory Committee will meet January 26-28, 2010, at the Department of Homeland Security, 1120..., Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410... Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410...

  15. Energy technology evaluation report: Energy security

    Science.gov (United States)

    Koopman, R.; Lamont, A.; Schock, R.

    1992-09-01

    Energy security was identified in the National Energy Strategy (NES) as a major issue for the Department of Energy (DOE). As part of a process designed by the DOE to identify technologies important to implementing the NES, an expert working group was convened to consider which technologies can best contribute to reducing the nation's economic vulnerability to future disruptions of world oil supplies, the working definition of energy security. Other working groups were established to deal with economic growth, environmental quality, and technical foundations. Energy Security working group members were chosen to represent as broad a spectrum of energy supply and end-use technologies as possible and were selected for their established reputations as experienced experts with an ability to be objective. The time available for this evaluation was very short. The group evaluated technologies using criteria taken from the NES which can be summarized for energy security as follows: diversifying sources of world oil supply so as to decrease the increasing monopoly status of the Persian Gulf region; reducing the importance of oil use in the US economy to diminish the impact of future disruptions in oil supply; and increasing the preparedness of the US to deal with oil supply disruptions by having alternatives available at a known price. The result of the first phase of the evaluation process was the identification of technology groups determined to be clearly important for reducing US vulnerability to oil supply disruptions. The important technologies were mostly within the high leverage areas of oil and gas supply and transportation demand but also included hydrogen utilization, biomass, diversion resistant nuclear power, and substitute industrial feedstocks.

  16. 75 FR 39955 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-07-13

    ... Homeland Security Science and Technology Advisory Committee meeting will be open to the public on July 20th... Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410... Protection programs in Science & Technology and updates on homeland security sensitive Federally Funded...

  17. Organizational Influences in Technology Adoption Decisions: A Case Study of Digital Libraries

    Science.gov (United States)

    Oguz, Fatih

    2016-01-01

    The purpose of this study was to understand the organizational level decision factors in technology adoption in the context of digital libraries. A qualitative case study approach was used to investigate the adoption of a specific technology, XML-based Web services, in digital libraries. Rogers' diffusion of innovations and Wenger's communities of…

  18. Technology in the Public Library: Results from the 1992 PLDS Survey of Technology.

    Science.gov (United States)

    Fidler, Linda M.; Johnson, Debra Wilcox

    1994-01-01

    Discusses and compares the incorporation of technology by larger public libraries in Canada and the United States. Technology mentioned includes online public access catalogs; remote and local online database searching; microcomputers and software for public use; and fax, voice mail, and Telecommunication Devices for the Deaf and Teletype writer…

  19. Growing a Technology Equipment Service in an Academic Library

    Science.gov (United States)

    Anderson, Sean; Weatherbee, Sue

    2012-01-01

    The 21st-century student is highly technological. In order to encourage and enable the technologically advanced students, the authors wanted to develop a technology equipment service in the library at Texas A&M University-Commerce. They had an idea of what they wanted to accomplish but were unsure of how to get started. They started a small…

  20. Safeguards and security deficiencies fulfilled through technology development

    International Nuclear Information System (INIS)

    Smoot, W.

    1996-01-01

    The Office of Safeguards and Security (OSS) sponsors research and development activities based on identified field and headquarters customer requirements. Annually, a formal solicitation of safeguards and security user needs is conducted. Currently, there are over 300 valid safeguards and security deficiencies that have been identified. These user needs serve as the basis for formulating the OSS Technology Development Program (TDP). Due to budget constraints, the TDP can only address approximately 47% of these needs in FY 1996. This paper will discuss, in a general sense, the current deficiencies and how the TDP is responding to each. Specifically, the paper will highlight technologies in the areas of Material Control and Accounting, Physical Security, and Information Security. A brief discussion of unfulfilled user requirements will also be presented as a catalyst for leveraging available or developing technologies from other similar programs or from private industry

  1. Effect of technology on librarians in academic libraries in Nigeria ...

    African Journals Online (AJOL)

    The purpose of this study is to investigate the effect of technology on librarians working in academic libraries in Nigeria with particular reference to Delta State. The descriptive survey design was adopted. The twelve (12) tertiary institutions libraries in Delta State were used for the study. The purposive sampling technique ...

  2. Bibliothekare ohne Bibliothek? Zur Situation der Pharmabibliotheken / Librarians without a library? The pharmacy library situation

    Directory of Open Access Journals (Sweden)

    Gretz, Marianne

    2011-09-01

    Full Text Available Despite major economic and organizational changes in the pharmaceutical industry, the Pharmaceutical Library Task Force (Arbeitskreis Pharma-Bibliotheken has been going strong in the Medical Library Working Party (Arbeitsgemeinschaft für medizinisches Bibliothekswesen – AGMB for the past 18 years. However, Task Force discussion topics have moved away from questions about spatial or staffing expansion or building up inventory, and toward themes such as outsourcing, training, technology scouting, and building up comprehensive copyright expertise. While actual physical stock is shrinking or has been eliminated entirely from many company libraries, the everyday working lives of company librarians are increasingly taken up with management of electronic media, in-house marketing and the associated user training, evaluation and use of new technologies, and clarification of complex copyright issues. Widespread know-how, in-depth knowledge of specialist areas (such as copyright, communication skills, networking, cost awareness, adaptability, willingness to learn new things, and demonstrating the value they add to the company are the factors that will secure the future of company librarians, whether with – or, in a pinch – without a physical library.

  3. National Security Technology Incubation Project Continuation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  4. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  5. 48 CFR 2452.239-71 - Information Technology Virus Security.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Information Technology... Provisions and Clauses 2452.239-71 Information Technology Virus Security. As prescribed in 2439.107(b), insert the following clause: Information Technology Virus Security (FEB 2006) (a) The contractor hereby...

  6. Cyber security analytics, technology and automation

    CERN Document Server

    Neittaanmäki, Pekka

    2015-01-01

    Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are  Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

  7. Combining overt and covert anti-counterfeiting technologies for securities

    Science.gov (United States)

    Uematsu, Tsuyoshi

    2006-02-01

    The National Printing Bureau of Japan has been developing new anti-counterfeiting technologies as a banknote printer. Some of our technologies have already been effectively introduced into Japan's new banknote series. Anti-counterfeiting technologies can be applied not only to banknotes but also to other security documents depending on desired features. In this presentation, I will introduce three of our newly developed overt and covert security techniques, which are intended for document security and brand protection, as well as banknotes. "Metallic View" is mainly for offset printing. "Copy Check" (micro-structural lines involving luminescence) is for plate making technology. "ImageSwitch" is for a new security solution which has unlimited printing applications. All three techniques create "latent images" (some of which may be better known as "carrier screen images") that are useful in preventing counterfeiting. While each of the techniques is effective by itself, all are more effective when applied together. Combining these techniques could make all security documents harder to copy using IT scanners, and provide cost-effective anti-counterfeiting solutions for all security users.

  8. "A Really Nice Spot": Evaluating Place, Space, and Technology in Academic Libraries

    Science.gov (United States)

    Khoo, Michael J.; Rozaklis, Lily; Hall, Catherine; Kusunoki, Diana

    2016-01-01

    This article describes a qualitative mixed-method study of students' perceptions of place and space in an academic library. The approach is informed by Scott Bennett's model of library design, which posits a shift from a "book-centered" to a technology supported "learning centered" paradigm of library space. Two surveys…

  9. 76 FR 78009 - Information Collection; Implementation of Information Technology Security Provision

    Science.gov (United States)

    2011-12-15

    ...] Information Collection; Implementation of Information Technology Security Provision AGENCY: General Services... collection requirement regarding Implementation of Information Technology Security Provision. Public comments... Information Collection 3090- 0294, Implementation of Information Technology Security Provision, by any of the...

  10. Review of the model of technological pragmatism considering privacy and security

    Directory of Open Access Journals (Sweden)

    Kovačević-Lepojević Marina M.

    2013-01-01

    Full Text Available The model of technological pragmatism assumes awareness that technological development involves both benefits and dangers. Most modern security technologies represent citizens' mass surveillance tools, which can lead to compromising a significant amount of personal data due to the lack of institutional monitoring and control. On the other hand, people are interested in improving crime control and reducing the fear of potential victimization which this framework provides as a rational justification for the apparent loss of privacy, personal rights and freedoms. Citizens' perception on the categories of security and privacy, and their balancing, can provide the necessary guidelines to regulate the application of security technologies in the actual context. The aim of this paper is to analyze the attitudes of students at the University of Belgrade (N = 269 toward the application of security technology and identification of the key dimensions. On the basis of the relevant research the authors have formed assumptions about the following dimensions: security, privacy, trust in institutions and concern about the misuse of security technology. The Prise Questionnaire on Security Technology and Privacy was used for data collection. Factor analysis abstracted eight factors which together account for 58% of variance, with the highest loading of the four factors that are identified as security, privacy, trust and concern. The authors propose a model of technological pragmatism considering security and privacy. The data also showed that students are willing to change their privacy for the purpose of improving security and vice versa.

  11. Roadmap for RFID Implementation in Central library, PEC University of Technology

    OpenAIRE

    Vasishta, Seema

    2009-01-01

    This paper gives brief idea about the emerging Radio Frequency Identification (RFID) technology, its importance in the library management system and its working. It also describes about the basic and optional components required for smooth working of the exercise. The aim is to consider how to extend RFID applications in an academic library keeping in view the scantiness of funds and scarcity of supporting staff. The article also illustrates a vivid picture about how RFID technology is acting...

  12. Restricted access processor - An application of computer security technology

    Science.gov (United States)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  13. Interactions between libraries and technology over the past 30 years

    DEFF Research Database (Denmark)

    Greifeneder, Elke; Seadle, Michael; Lynch, Clifford

    2012-01-01

    Purpose – The purpose of this paper is to look back on the last 30 years of technology development for libraries. Design/methodology/approach – The paper presents an interview that took place at the American Library Association Annual Meeting in Anaheim, California. Findings – The paper reveals...... that many of the developments are slow. There are very few really sudden revolutions in social-scale technologies. They do not switch on quickly and cannot be sudden because the installed base is too thin. Originality/value – The paper reveals that there should be some renewed conversation about how...

  14. Aerospace Communications Security Technologies Demonstrated

    Science.gov (United States)

    Griner, James H.; Martzaklis, Konstantinos S.

    2003-01-01

    In light of the events of September 11, 2001, NASA senior management requested an investigation of technologies and concepts to enhance aviation security. The investigation was to focus on near-term technologies that could be demonstrated within 90 days and implemented in less than 2 years. In response to this request, an internal NASA Glenn Research Center Communications, Navigation, and Surveillance Aviation Security Tiger Team was assembled. The 2-year plan developed by the team included an investigation of multiple aviation security concepts, multiple aircraft platforms, and extensively leveraged datalink communications technologies. It incorporated industry partners from NASA's Graphical Weather-in-the-Cockpit research, which is within NASA's Aviation Safety Program. Two concepts from the plan were selected for demonstration: remote "black box," and cockpit/cabin surveillance. The remote "black box" concept involves real-time downlinking of aircraft parameters for remote monitoring and archiving of aircraft data, which would assure access to the data following the loss or inaccessibility of an aircraft. The cockpit/cabin surveillance concept involves remote audio and/or visual surveillance of cockpit and cabin activity, which would allow immediate response to any security breach and would serve as a possible deterrent to such breaches. The datalink selected for the demonstrations was VDL Mode 2 (VHF digital link), the first digital datalink for air-ground communications designed for aircraft use. VDL Mode 2 is beginning to be implemented through the deployment of ground stations and aircraft avionics installations, with the goal of being operational in 2 years. The first demonstration was performed December 3, 2001, onboard the LearJet 25 at Glenn. NASA worked with Honeywell, Inc., for the broadcast VDL Mode 2 datalink capability and with actual Boeing 757 aircraft data. This demonstration used a cockpitmounted camera for video surveillance and a coupling to

  15. On the Horizon: New Advances in Security Technology

    Science.gov (United States)

    Gamble, Cheryl

    2005-01-01

    The worlds of security and technology have been on an intersecting course since the first published account of the use of fingerprint identification made news in 1880 (although unpublished reports suggest its use as early as 1858). In the three and one half years since the September 11 attacks, technological advances across the security field have…

  16. Practice brief. Securing wireless technology for healthcare.

    Science.gov (United States)

    Retterer, John; Casto, Brian W

    2004-05-01

    Wireless networking can be a very complex science, requiring an understanding of physics and the electromagnetic spectrum. While the radio theory behind the technology can be challenging, a basic understanding of wireless networking can be sufficient for small-scale deployment. Numerous security mechanisms are available to wireless technologies, making it practical, scalable, and affordable for healthcare organizations. The decision on the selected security model should take into account the needs for additional server hardware and administrative costs. Where wide area network connections exist between cooperative organizations, deployment of a distributed security model can be considered to reduce administrative overhead. The wireless approach chosen should be dynamic and concentrate on the organization's specific environmental needs. Aspects of organizational mission, operations, service level, and budget allotment as well as an organization's risk tolerance are all part of the balance in the decision to deploy wireless technology.

  17. The research of network database security technology based on web service

    Science.gov (United States)

    Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin

    2013-03-01

    Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.

  18. Physical security technologies for weapons complex reconfiguration facilities

    International Nuclear Information System (INIS)

    Jaeger, C.D.

    1994-01-01

    Sandia National Laboratories was a member of the Weapons Complex Reconfiguration (WCR) Safeguards and Security (S ampersand S) team providing assistance to the Department of Energy's (DOE) Office of Weapons Complex Reconfiguration. The physical security systems in the new and upgraded facilities being considered for the WCR had to meet DOE orders and other requirements set forth in the WCR Programmatic Design Criteria (PDC), incorporate the latest physical security technologies using proven state-of-the-art systems and meet fundamental security principles. The outcome was to avoid costly retrofits and provide effective and comprehensive protection against current and projected threats with minimal impact on operations, costs and schedule. Physical security requirements for WCR facilities include: (1) reducing S ampersand S life-cycle costs, (2) where feasible automating S ampersand S functions to minimize operational costs, access to critical assets and exposure of people to hazardous environments, (3) increasing the amount of delay to outsider adversary attack, (4) compartmentalizing the facility to minimize the number of personnel requiring access to critical areas and (5) having reliable and maintainable systems. To be most effective against threats physical security must be integrated with facility operations, safety and other S ampersand S activities, such as material control and accountability, nuclear measurements and computer and information security. This paper will discuss the S ampersand S issues, requirements, technology opportunities and needs. Physical security technologies and systems considered in the design effort of the Weapons Complex Reconfiguration facilities will be reviewed

  19. DO Get Technical! Using Technology in Library Instruction

    Directory of Open Access Journals (Sweden)

    Nicole Eva

    2011-12-01

    Full Text Available Today’s post-secondary students are digital natives. Much has been said and written about how to reach this generation, and the consensus seems to be that we need to meet them on their turf. In this session presented at WILU 2011 in Regina, SK, two librarians from the University of Lethbridge shared their experiences with using technology to engage students in library instruction. The hands-on session introduced some simple tools librarians can learn quickly and apply to spice up their instruction with technology. These include creating online animated videos using Xtranormal, a low-cost tool way to create polished and humourous videos to introduce or summarize key information literacy concepts; and adding interactive polling to PowerPoint presentations using a tool called Poll Everywhere, which is an effective way to instantly engage students in instruction using the web or web-enabled devices. Interactive polling eliminates many of the challenges of using clickers which are prevalent in many post-secondary library instruction environments. The presenters also discussed how they have experimented with wikis to encourage active learning and student collaboration in a series of library instruction sessions. Wikis allow for free and paperless student participation in knowledge creation in an online forum. Finally, they demonstrated how they have used Skype to deliver library instruction at a distance, including the use of the screen sharing feature. The presenters stressed the ease of use of these free or low-cost tools to improve classroom engagement and add interest to sessions.

  20. Wearable technology smart watches to Google Glass for libraries

    CERN Document Server

    Bruno, Tom

    2015-01-01

    Emerging devices are placing powerful computing abilities into the wardrobes of consumers through wearable technology which combines fashion and function in new and exciting ways. The most recognizable of these emerging gadgets is Google Glass. Wearable Technology: Smart Watches to Google Glass for Libraries provides a comprehensive overview of the current wearable technology landscape, the types of devices and functionality available, the benefits and limitations of this type of technology, and how you can make use of it in yo

  1. Safety and Security Interface Technology Initiative

    Energy Technology Data Exchange (ETDEWEB)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-05-01

    Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security

  2. Information Security: Past, Present and Future - Impact of Developments in Information Technology on Security

    NARCIS (Netherlands)

    Overbeek, P.L.

    1991-01-01

    The development of information security is addressed in relation to the development of information technology. The leading question is: how has information security developed itself so far, and how should it progress to address tomorrow's security needs. An overwiew is given of the use of

  3. Application of new technologies in the virtual library: Seminars in Turkey, Portugal, and Spain

    Science.gov (United States)

    Hunter, Judy F.; Cotter, Gladys A.

    1994-01-01

    This paper focuses on the technologies that are available today to support the concept of a virtual library. The concept of a 'virtual library' or a 'library without walls' is meant to convey the idea that information in any format should be available to the end-user from the desktop as if it were located on the local workstation. Discussed here are the background, trends, technology enablers, end-user requirements, and the NASA Access Mechanism (NAM) system, one example of how it is possible to apply existing technologies to the client server architecture to logically centralize geographically distributed applications and information.

  4. Library security better communication, safer facilities

    CERN Document Server

    Albrecht, Steve

    2015-01-01

    Through the methods outlined in this book, Albrecht demonstrates that effective communication not only makes library users feel more comfortable but also increases staff morale, ensuring the library is place where everyone feels welcome.

  5. New technology for food systems and security.

    Science.gov (United States)

    Yau, N J Newton

    2009-01-01

    In addition to product trade, technology trade has become one of the alternatives for globalization action around the world. Although not all technologies employed on the technology trade platform are innovative technologies, the data base of international technology trade still is a good indicator for observing innovative technologies around world. The technology trade data base from Sinew Consulting Group (SCG) Ltd. was employed as an example to lead the discussion on security or safety issues that may be caused by these innovative technologies. More technologies related to processing, functional ingredients and quality control technology of food were found in the data base of international technology trade platform. The review was conducted by categorizing technologies into the following subcategories in terms of safety and security issues: (1) agricultural materials/ingredients, (2) processing/engineering, (3) additives, (4) packaging/logistics, (5) functional ingredients, (6) miscellaneous (include detection technology). The author discusses examples listed for each subcategory, including GMO technology, nanotechnology, Chinese medicine based functional ingredients, as well as several innovative technologies. Currently, generation of innovative technology advance at a greater pace due to cross-area research and development activities. At the same time, more attention needs to be placed on the employment of these innovative technologies.

  6. Network security with openSSL cryptography for secure communications

    CERN Document Server

    Viega, John; Chandra, Pravir

    2002-01-01

    Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The library is the only free, full-featured SSL implementation for C and C++, and it can be used programmatically or from the command line to secure most TCP-based network protocols.Network Security with OpenSSL enables developers to use this protocol much more effectively. Traditionally, getting something simple done in OpenSSL could easily take weeks. This concise book gives you the guidance you need to avoid pitfalls, while allowing you to take advantage of the library?s advanced features. And, inst...

  7. Secure, Mobile, Wireless Network Technology Designed, Developed, and Demonstrated

    Science.gov (United States)

    Ivancic, William D.; Paulsen, Phillip E.

    2004-01-01

    The inability to seamlessly disseminate data securely over a high-integrity, wireless broadband network has been identified as a primary technical barrier to providing an order-of-magnitude increase in aviation capacity and safety. Secure, autonomous communications to and from aircraft will enable advanced, automated, data-intensive air traffic management concepts, increase National Air Space (NAS) capacity, and potentially reduce the overall cost of air travel operations. For the first time ever, secure, mobile, network technology was designed, developed, and demonstrated with state-ofthe- art protocols and applications by a diverse, cooperative Government-industry team led by the NASA Glenn Research Center. This revolutionary technology solution will make fundamentally new airplane system capabilities possible by enabling secure, seamless network connections from platforms in motion (e.g., cars, ships, aircraft, and satellites) to existing terrestrial systems without the need for manual reconfiguration. Called Mobile Router, the new technology autonomously connects and configures networks as they traverse from one operating theater to another. The Mobile Router demonstration aboard the Neah Bay, a U.S. Coast Guard vessel stationed in Cleveland, Ohio, accomplished secure, seamless interoperability of mobile network systems across multiple domains without manual system reconfiguration. The Neah Bay was chosen because of its low cost and communications mission similarity to low-Earth-orbiting satellite platforms. This technology was successfully advanced from technology readiness level (TRL) 2 (concept and/or application formation) to TRL 6 (system model or prototype demonstration in a relevant environment). The secure, seamless interoperability offered by the Mobile Router and encryption device will enable several new, vehicle-specific and systemwide technologies to perform such things as remote, autonomous aircraft performance monitoring and early detection and

  8. The Threat of Security: Hindering Technology Integration in the Classroom

    Science.gov (United States)

    Robinson, LeAnne K.; Brown, Abbie; Green, Tim

    2007-01-01

    For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…

  9. Biometrics: libraries have begun to see the value of biometrics

    OpenAIRE

    Panneerselvam, Selvi, M. G.

    2007-01-01

    It explains the Biometric Technologies which are becoming the foundation of an extensive array of highly secure identification and personal verification solution. Biometric devices with special reference to finger print recognition is dealt in detail. The benefits of Biometrics in Libraries, its employees and members are highlighted.

  10. Surviving security how to integrate people, process, and technology

    CERN Document Server

    Andress, Amanda

    2003-01-01

    WHY DO I NEED SECURITY? Introduction The Importance of an Effective Security Infrastructure People, Process, and Technology What Are You Protecting Against? Types of Attacks Types of Attackers Security as a Competitive Advantage Choosing a Solution Finding Security Employees The Layered Approach UNDERSTANDING REQUIREMENTS AND RISK What Is Risk? Embracing Risk Information Security Risk Assessment Assessing Risk Insurance SECURITY POLICIES AND PROCEDURES Internal Focus Is Key Security Awareness and Education Policy Life Cycle Developing Policies Components of a Security Policy Sample Security Po

  11. National Security in the Nuclear Age. A Proposed Booklist and Public Education Ideas for Libraries.

    Science.gov (United States)

    Dane, Ernest B.

    A bibliography on national security in the nuclear age is divided into three sections. The first section describes a proposal calling for the compilation of a balanced and up-to-date collection of books and other materials on this issue to be included in all U.S. public libraries. Also discussed are selection criteria for the book list, project…

  12. The influence of the latest information and communication technology on the libraries in the primary schools

    Directory of Open Access Journals (Sweden)

    Franceska Žumer

    2000-01-01

    Full Text Available The article presents the information and communication equipment in primary school libraries and the end usage of the above mentioned technology. A detailed research, including 109 primary schools throughout Slovenia, was performed. The research showed that the schools do not have the basic information technology needed to perform the latest and up-to-date services. Not a single library, included in the research, has a completely automated library collection. But the percentage of libraries, which do not perform automated lending and do not use the various offered possibilites of the already existing technology, automated collections and on-line library, is significantly lower. A systematic solution of the present situation is needed. Only in this way will school libraries be successfully included in the educational system of schools and will be able to perform the library inter-subject information knowledge and information literacy programs in the new nine-year primary school.

  13. Managing Technological Change in Libraries and Information Services.

    Science.gov (United States)

    Klobas, Jane E.

    1990-01-01

    Examines factors to be considered in the management of technological change in libraries and information services. The organizational climate for change is discussed, and factors to consider when developing a strategy for introducing a new product, service, or system are described, including leadership, goals, political processes, marketing, and…

  14. Are We Ready for the Virtual Library? Technology Push, Market Pull and Organisational Response.

    Science.gov (United States)

    Gilbert, J. D.

    1993-01-01

    Discusses virtual libraries, i.e., library services available to users via personal computers; considers the issues of technological development, user demands, and organizational response; and describes progress toward virtual libraries in the Netherlands, including networks, online systems, navigation tools, subject classification, coordination…

  15. Physical security technology base programs for physical security

    International Nuclear Information System (INIS)

    Jacobs, J.

    1986-01-01

    Sandia National Laboratories is the US Department of Energy's lead laboratory for physical security research and development (R and D). In support of this mission, Sandia has maintained for several years an R and D program in each of the following technology areas: Intrusion Detection, Entry Control, CCTV Assessment, Access Delay, Alarm Display, and Guard Equipment and Training. The purpose of the technology base programs is to maintain cognizance of the capabilities of the commercial market, identify improvements and transfer technology to industry and facilities. The output of these programs supports the development of new equipment and advanced system concepts, demonstrations of proof-of-principles and system implementation. This paper will review the status of current developments and discuss trends in new technologies which are being explored for future applications, i.e., artificial intelligence, expert systems, robotics, and more automated systems

  16. ENDF/B-VII.0: Next Generation Evaluated Nuclear Data Library for Nuclear Science and Technology

    Energy Technology Data Exchange (ETDEWEB)

    Chadwick, M B; Oblozinsky, P; Herman, M; Greene, N M; McKnight, R D; Smith, D L; Young, P G; MacFarlane, R E; Hale, G M; Haight, R C; Frankle, S; Kahler, A C; Kawano, T; Little, R C; Madland, D G; Moller, P; Mosteller, R; Page, P; Talou, P; Trellue, H; White, M; Wilson, W B; Arcilla, R; Dunford, C L; Mughabghab, S F; Pritychenko, B; Rochman, D; Sonzogni, A A; Lubitz, C; Trumbull, T H; Weinman, J; Brown, D; Cullen, D E; Heinrichs, D; McNabb, D; Derrien, H; Dunn, M; Larson, N M; Leal, L C; Carlson, A D; Block, R C; Briggs, B; Cheng, E; Huria, H; Kozier, K; Courcelle, A; Pronyaev, V; der Marck, S

    2006-10-02

    biases in fast systems are largely removed; (c) ENDF/B-VI.8 good agreement for simulations of highly enriched uranium assemblies is preserved; (d) The underprediction of fast criticality of {sup 233,235}U and {sup 239}Pu assemblies is removed; and (e) The intermediate spectrum critical assemblies are predicted more accurately. We anticipate that the new library will play an important role in nuclear technology applications, including transport simulations supporting national security, nonproliferation, advanced reactor and fuel cycle concepts, criticality safety, medicine, space applications, nuclear astrophysics, and nuclear physics facility design. The ENDF/B-VII.0 library is archived at the National Nuclear Data Center, BNL. The complete library, or any part of it, may be retrieved from www.nndc.bnl.gov.

  17. An Overview of Computer Network security and Research Technology

    OpenAIRE

    Rathore, Vandana

    2016-01-01

    The rapid development in the field of computer networks and systems brings both convenience and security threats for users. Security threats include network security and data security. Network security refers to the reliability, confidentiality, integrity and availability of the information in the system. The main objective of network security is to maintain the authenticity, integrity, confidentiality, availability of the network. This paper introduces the details of the technologies used in...

  18. Nuclear material facilities - security systems and technology R and D trends

    International Nuclear Information System (INIS)

    Ellis, D.; Steele, B.

    2002-01-01

    Full text: In the US, physical security research and development (R and D) during the 1970s and 1980s created a body of technology and systems engineering that largely defined the industry for several decades. However, despite today's terrorists threats and risks, the overall funding of new and innovative physical security solutions is relatively very small. Such factors constraining physical security R and D include the expansion of overall security responsibilities, the emphasis on programmatic and business performance, in addition to evolving (mis)perceptions that 'the problem has been solved' or that 'anyone can do security'. Underlying these factors, the lack of robust standards and certifications has limited the development and application of physical security products, systems, and services. The research and development of new security technologies must be evaluated against very demanding constraints - including costs/benefits, emerging threats, and policies. Going forward, the goal will be to create a more comprehensive approach to physical security of nuclear material facilities that matches evolving threats and that will complement the transition to an integrated security/operations management environment. Such a management model evaluates the additional value of increasing security alternatives in addition to determining trade-offs between the programmatic mission and security issues. Correspondingly, more explicit and strategically useful measures must be developed to determine importance that, in turn, will influence security-related R and D efforts. The research and development of security technologies should be based upon identified needs and requirements resulting from a systematic analysis of the threat and other conditions. In particular, security technologies and systems must be evaluated in terms of current and long-term impacts. Such needs are (will be) diverse and will depend upon sustained research investments in a broad range of technologies

  19. Scanning technology with multi-slice helical CT in security inspection domain

    International Nuclear Information System (INIS)

    Wang Jue; Wang Fuquan; Jiang Zenghui

    2008-01-01

    The paper analyzes the technology conditions of security inspection in home and abroad, and expatiates technology of spiral CT and how to define CT value etc, with studying on the key technology of spiral CT scanning way (X-RAY, detector, technology of pulley etc) and mutual relation. By comparing the present products of security inspection, the conclusion was drawn that it is inevitable to develop the tendency of security inspection area with the checking and discerning the substance by using the technology of multi-layer spiral CT. (authors)

  20. End-user satisfaction analysis on library management system unnes using technology acceptance model towards national standard of integrated library

    Science.gov (United States)

    Hardyanto, W.; Purwinarko, A.; Adhi, M. A.

    2018-03-01

    The library which is the gate of the University should be supported by the existence of an adequate information system, to provide excellent service and optimal to every user. Library management system that has been in existence since 2009 needs to be re-evaluated so that the system can meet the needs of both operator and Unnes user in particular, and users from outside Unnes in general. This study aims to evaluate and improve the existing library management system to produce a system that is accountable and able to meet the needs of end users, as well as produce a library management system that is integrated Unnes. Research is directed to produce evaluation report with Technology Acceptance Model (TAM) approach and library management system integrated with the national standard.

  1. The application of data encryption technology in computer network communication security

    Science.gov (United States)

    Gong, Lina; Zhang, Li; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-04-01

    With the rapid development of Intemet and the extensive application of computer technology, the security of information becomes more and more serious, and the information security technology with data encryption technology as the core has also been developed greatly. Data encryption technology not only can encrypt and decrypt data, but also can realize digital signature, authentication and authentication and other functions, thus ensuring the confidentiality, integrity and confirmation of data transmission over the network. In order to improve the security of data in network communication, in this paper, a hybrid encryption system is used to encrypt and decrypt the triple DES algorithm with high security, and the two keys are encrypted with RSA algorithm, thus ensuring the security of the triple DES key and solving the problem of key management; At the same time to realize digital signature using Java security software, to ensure data integrity and non-repudiation. Finally, the data encryption system is developed by Java language. The data encryption system is simple and effective, with good security and practicality.

  2. The Energy Science and Technology Database on a local library system: A case study at the Los Alamos National Research Library

    Energy Technology Data Exchange (ETDEWEB)

    Holtkamp, I.S.

    1994-10-01

    This paper presents an overview of efforts at Los Alamos National Laboratory to acquire and mount the Energy Science and Technology Database (EDB) as a citation database on the Research Library`s Geac Advance system. The rationale for undertaking this project and expected benefits are explained. Significant issues explored are loading non-USMARC records into a MARC-based library system, the use of EDB records to replace or supplement in-house cataloging of technical reports, the impact of different cataloging standards and database size on searching and retrieval, and how integrating an external database into the library`s online catalog may affect staffing and workflow.

  3. 14 CFR 1274.937 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-01-01

    ... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...

  4. Extending the Technological, Discursive, and Rhetorical Horizons of Academic Research Libraries' Information Architectures: An Analysis of North Carolina State University's James B. Hunt Jr. Library

    Science.gov (United States)

    Carr, Patrick L.

    2017-01-01

    This dissertation analyzes how North Carolina State University's (NCSU) James B. Hunt Jr. Library extends the ways in which the information architectures of academic research libraries can function as a technology, as discourse, and as rhetoric. The starting point for the analysis is the libraries of antiquity, which functioned technologically as…

  5. Review: Security in Wireless Technologies in Business

    Science.gov (United States)

    Sattarova, F. Y.; Kim, Tai-Hoon

    Wireless technology seems to be everywhere now - but it is still relatively in its infancy. New standards and protocols continue to emerge and problems and bugs are discovered. Nevertheless, wireless networks make many things much more convenient and it appears that wireless networks are here to stay. The differences and similarities of wireless and wired security, the new threats brought by mobility, the security of networks and devices and effects of security, or lack of it are shortly discussed in this review paper.

  6. Safety and Security Interface Technology Initiative

    International Nuclear Information System (INIS)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-01-01

    Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. ''Supporting Excellence in Operations Through Safety Analysis'', (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is ''Safeguards/Security Integration with Safety''. This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ''tool box'' of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated

  7. Assessing security technology's impact: old tools for new problems.

    Science.gov (United States)

    Kreissl, Reinhard

    2014-09-01

    The general idea developed in this paper from a sociological perspective is that some of the foundational categories on which the debate about privacy, security and technology rests are blurring. This process is a consequence of a blurring of physical and digital worlds. In order to define limits for legitimate use of intrusive digital technologies, one has to refer to binary distinctions such as private versus public, human versus technical, security versus insecurity to draw differences determining limits for the use of surveillance technologies. These distinctions developed in the physical world and are rooted in a cultural understanding of pre-digital culture. Attempts to capture the problems emerging with the implementation of security technologies using legal reasoning encounter a number of problems since law is by definition oriented backwards, adapting new developments to existing traditions, whereas the intrusion of new technologies in the physical world produces changes and creates fundamentally new problems.

  8. Positioning of a Peaceful Use of Nuclear Technology in National Security Aspects

    International Nuclear Information System (INIS)

    Kim, Hyun Jun; Chang, Moon Hee; Kim, Hark Rho; Lee, Young Joon; Lee, Sang Heon

    2012-01-01

    Many cases have shown that a peaceful use of nuclear technology should play an important role in national securities such as energy, economic and science and technology securities, etc. It would be interesting to know what the positioning of the peaceful use of nuclear technology is in the national security aspects. In this paper, a positioning of nuclear power on various national security components is intended by using a positioning process that has been widely used for marketing. Findings can be used for directing further R and Ds to develop nuclear power technology

  9. Positioning of a Peaceful Use of Nuclear Technology in National Security Aspects

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyun Jun; Chang, Moon Hee; Kim, Hark Rho; Lee, Young Joon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Lee, Sang Heon [Korea National Defense University, Goyang (Korea, Republic of)

    2012-05-15

    Many cases have shown that a peaceful use of nuclear technology should play an important role in national securities such as energy, economic and science and technology securities, etc. It would be interesting to know what the positioning of the peaceful use of nuclear technology is in the national security aspects. In this paper, a positioning of nuclear power on various national security components is intended by using a positioning process that has been widely used for marketing. Findings can be used for directing further R and Ds to develop nuclear power technology

  10. Smart Buildings: An Introduction to the Library of the Future.

    Science.gov (United States)

    Hoy, Matthew B

    2016-01-01

    Advances in building technologies are combining energy efficiency, networked sensors, and data recording in exciting ways. Modern facilities can adjust lighting, heating, and cooling outputs to maximize efficiency, provide better physical security, improve wayfinding for occupants, and provide detailed reports of building use. This column will briefly explore the idea of "smart buildings," describe some of the technologies that are being developed for these buildings, and explore their implications for libraries. A brief listing of selected smart building technologies is also provided.

  11. 48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...

  12. 48 CFR 1252.239-71 - Information technology security plan and accreditation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...

  13. Network security system for health and medical information using smart IC card

    Science.gov (United States)

    Kanai, Yoichi; Yachida, Masuyoshi; Yoshikawa, Hiroharu; Yamaguchi, Masahiro; Ohyama, Nagaaki

    1998-07-01

    A new network security protocol that uses smart IC cards has been designed to assure the integrity and privacy of medical information in communication over a non-secure network. Secure communication software has been implemented as a library based on this protocol, which is called the Integrated Secure Communication Layer (ISCL), and has been incorporated into information systems of the National Cancer Center Hospitals and the Health Service Center of the Tokyo Institute of Technology. Both systems have succeeded in communicating digital medical information securely.

  14. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  15. Security Problems of Mobile Technologies

    Directory of Open Access Journals (Sweden)

    A. G. Beltov

    2012-09-01

    Full Text Available The article provides an overview of security problems which exist in the mobile devices. The main technologies aimed to protect the phones from various types of attacks are considered. The authors justify the necessity of developing new improved tools and methods to ensure the safety of such devices.

  16. The Ten Commandments revisited: the Qualities of Good Library Space

    Directory of Open Access Journals (Sweden)

    Andrew McDonald

    2006-06-01

    Full Text Available An increasing diversity of imaginative new academic libraries are being constructed around the world, successfully combining exciting architectural expression, inspiring internal spaces and good functionality. Library managers must have a strong vision for the new library and this should inspire the design and the whole building process. This paper explores the key qualities of good learning space, whether in new or refurbished buildings. It is suggested that, ideally, learning space should be functional, adaptable, accessible, varied, interactive, conducive, environmentally suitable, safe and secure, efficient and suitable for information technology. New space should also have “oomph”, capturing the minds of users and the spirit of the university. These indicative issues should be discussed in the brief and throughout the planning process, and the priority given to them will depend on the mission and culture of the library. Greater attention is being given to daylight, natural ventilation, cultural artwork, noise management, security, disabled access, information skills training and provision for e-services. Planning is increasingly centred on people or the learner, emphasising the need for social, interactive and collaborative learning spaces as well as for traditional spaces for quiet study and reflection. Some libraries are joined-up with other services. The academic library is an enduring physical ‘place’, providing a blended, hybrid environment of traditional and electronic services crucial for the future of our universities and their communities.

  17. Factors Influencing the Adoption of Biometric Security Technologies by Decision Making Information Technology and Security Managers

    OpenAIRE

    Lease, David R.

    2005-01-01

    The research conducted under this study offers an understanding of the reasons why information technology (IT) and/or information assurance (IA) managers choose to recommend or not to recommend particular technologies, specifically biometric security, to their organizations. A review of the relevant literature provided the foundation to develop a set of research questions and factors for this research effort. The research questions became the basis of the study’s stated hypotheses for examini...

  18. Marketing Plan for the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubator program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.

  19. ENDF/B-VII.0: Next Generation Evaluated Nuclear Data Library for Nuclear Science and Technology

    International Nuclear Information System (INIS)

    Chadwick, M.B.; Oblozinsky, P.; Herman, M.

    2006-01-01

    agreement for simulations of thermal high-enriched uranium assemblies is preserved; (d) The underprediction of fast criticality of 233,235 U and 239 Pu assemblies is removed; and (e) The intermediate spectrum critical assemblies are predicted more accurately. We anticipate that the new library will play an important role in nuclear technology applications, including transport simulations supporting national security, nonproliferation, advanced reactor and fuel cycle concepts, criticality safety, fusion, medicine, space applications, nuclear astrophysics, and nuclear physics facility design. The ENDF/B-VII.0 library is archived at the National Nuclear Data Center, BNL, and can be retrieved from www.nndc.bnl.gov

  20. Denial technology, the neglected security element

    International Nuclear Information System (INIS)

    Mauney, C.H.

    1982-01-01

    Even though there has been an increased concern over providing adequate security during the past decade, and even though some aspects of existing security systems have been enhanced during this period, much remains to be done to provide that balance which is so necessary to have all elements function as an effective unit. The area that primarily has been neglected is the delay element - the part of the system which makes possible the needed time for the security force to respond after an intrustion is detected and prior to the adversary attaining his desired goal. The purpose of this paper is to address the vulnerabilities of a security system which exist without the proper delay elements and to suggest how current technology can provide, through the use of activated barriers, that needed delay time to bring the system into balance. Security managers desire reliability and effectiveness; plant managers require safety, non-interference with operations, cost considerate capability, and aesthetic application - these characteristics will be addressed in the context of providing the required delay. This paper, hopefully, will set the stage for dialogue between developer and user, yielding a mutally acceptable approach to balanced security protection

  1. The Implementation of Web 2.0 Technology for Information Literacy Instruction in Thai University Libraries

    Science.gov (United States)

    Sawetrattanasatian, Oranuch

    2014-01-01

    Web 2.0 technology has drawn much attention recently as a fascinating tool for Information Literacy Instruction (ILI), especially in academic libraries. This research was aimed to investigate the implementation of Web 2.0 technology for ILI in Thai university libraries, in terms of information literacy skills being taught, types of Web 2.0…

  2. Technological Change in the Workplace: A Statewide Survey of Community College Library and Learning Resources Personnel.

    Science.gov (United States)

    Poole, Carolyn E.; Denny, Emmett

    2001-01-01

    Discussion of the effects of technostress on library personnel focuses on an investigation that examined how employees in Florida community college libraries and learning resources centers are dealing with technological change in their work environment. Considers implications for planning and implementing technological change and includes…

  3. Center for Coastline Security Technology, Year-2

    National Research Council Canada - National Science Library

    Glegg, Stewart; Glenn, William; Furht, Borko; Beaujean, P. P; Frisk, G; Schock, S; VonEllenrieder, K; Ananthakrishnan, P; An, E; Granata, R

    2007-01-01

    ...), the Imaging Technology Center, the Department of Computer Science and Engineering, and the University Consortium for Intermodal Transportation Safety and Security at Florida Atlantic University...

  4. Modern Quantum Technologies of Information Security

    OpenAIRE

    Korchenko, Oleksandr; Vasiliu, Yevhen; Gnatyuk, Sergiy

    2010-01-01

    In this paper, the systematisation and classification of modern quantum technologies of information security against cyber-terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of the quantum technologies used is given. A qualitative analysis of the advantages and disadvantages of concrete quantum protocols is made. The current status of the problem of practical quantum cryptography use in telecommunication networks is consider...

  5. Application of Information Technology in Nigerian special libraries in ...

    African Journals Online (AJOL)

    Also some of the problems impeding promotion of the use of the information technology in the libraries were highlighted as well as the consequences on effective information storage retrieval and delivery. Four research questions were constructed to serve as a guide. Data were collected through questionnaire, interviews ...

  6. The application of RFIDs in libraries : an assessment of technological, management and professional issues

    OpenAIRE

    Gibb, Forbes; Thornley, Clare V.; Ferguson, Stuart; Weckert, John

    2011-01-01

    This paper starts by outlining the technologies involved in RFIDs and reviews the issues raised by their general application. It then identifies their potential application areas within the library sector based on a generic process view of library activities. Finally it highlights the issues that are raised by their application in libraries and provides an assessment of which of these issues are likely to raise ethical concerns for library professionals. The purpose is to provide an overview ...

  7. Libraries as a venue for exciting education technology, both high tech and low

    Science.gov (United States)

    Harold, J. B.; Dusenbery, P.; Holland, A.

    2016-12-01

    Public libraries provide a broad range of possibilities for reaching diverse audiences with NASA and STEM related content and activities, from hands-on activities, to interactive kiosks incorporating science based games, simulations, and real-time data. NCIL/SSI has been developing STEM-based exhibits and program activities for public libraries since 2007, and is currently managing 7 national tours in partnership with the American Library Association and other organizations. Past and current exhibitions will reach over 100 libraries and an estimated 1.5 million patrons. In this paper we will discuss a range of findings from almost a decade of deploying both high and low tech STEM learning strategies into libraries, including usage and engagement by library patrons, and challenges (and solutions) for deploying technologically sophisticated components into libraries which may or may not have dedicated technical staff.

  8. Safeguards and Security Technology Development Directory. FY 1993

    Energy Technology Data Exchange (ETDEWEB)

    1993-06-01

    The Safeguards and Security Technology Development Directory is published annually by the Office of Safeguards and Security (OSS) of the US Department of Energy (DOE), and is Intended to inform recipients of the full scope of the OSS R&D program. It is distributed for use by DOE headquarters personnel, DOE program offices, DOE field offices, DOE operating contractors, national laboratories, other federal agencies, and foreign governments. Chapters 1 through 7 of the Directory provide general information regarding the Technology Development Program, including the mission, program description, organizational roles and responsibilities, technology development lifecycle, requirements analysis, program formulation, the task selection process, technology development infrastructure, technology transfer activities, and current research and development tasks. These chapters are followed by a series of appendices which contain more specific information on aspects of the Program. Appendix A is a summary of major technology development accomplishments made during FY 1992. Appendix B lists S&S technology development reports issued during FY 1992 which reflect work accomplished through the OSS Technology Development Program and other relevant activities outside the Program. Finally, Appendix C summarizes the individual task statements which comprise the FY 1993 Technology Development Program.

  9. DNA-encoded libraries - an efficient small molecule discovery technology for the biomedical sciences.

    Science.gov (United States)

    Kunig, Verena; Potowski, Marco; Gohla, Anne; Brunschweiger, Andreas

    2018-06-27

    DNA-encoded compound libraries are a highly attractive technology for the discovery of small molecule protein ligands. These compound collections consist of small molecules covalently connected to individual DNA sequences carrying readable information about the compound structure. DNA-tagging allows for efficient synthesis, handling and interrogation of vast numbers of chemically synthesized, drug-like compounds. They are screened on proteins by an efficient, generic assay based on Darwinian principles of selection. To date, selection of DNA-encoded libraries allowed for the identification of numerous bioactive compounds. Some of these compounds uncovered hitherto unknown allosteric binding sites on target proteins; several compounds proved their value as chemical biology probes unraveling complex biology; and the first examples of clinical candidates that trace their ancestry to a DNA-encoded library were reported. Thus, DNA-encoded libraries proved their value for the biomedical sciences as a generic technology for the identification of bioactive drug-like molecules numerous times. However, large scale experiments showed that even the selection of billions of compounds failed to deliver bioactive compounds for the majority of proteins in an unbiased panel of target proteins. This raises the question of compound library design.

  10. Infrared: A Key Technology for Security Systems

    OpenAIRE

    Corsi, Carlo

    2012-01-01

    Infrared science and technology has been, since the first applications, mainly dedicated to security and surveillance especially in military field, besides specialized techniques in thermal imaging for medical diagnostic and building structures and recently in energy savings and aerospace context. Till recently the security applications were mainly based on thermal imaging as surveillance and warning military systems. In all these applications the advent of room temperature, more reliable due...

  11. Survey of current technologies of security management for distributed information systems; Bunsangata joho system no security iji kanri hoshiki no genjo

    Energy Technology Data Exchange (ETDEWEB)

    Matsui, S [Central Research Institute of Electric Power Industry, Tokyo (Japan)

    1997-05-01

    The latest situation of the security management for a distributed information system was examined and systematically summarized to indicate the management design in future. This paper describes the threat of the distributed information system to security, the risk for confidentiality, integrity, and availability due to the threat, and the measures to be taken. The basic technology of security management is classified into the `user certification to prevent an incorrect access` and the `encipherment to prevent data from being used incorrectly.` The technology for certification has been almost completed. It can be securely done using an expendable password or IC card system. In Internet, multiple enciphering technologies for constructing a virtual private network that can secure the almost the same security as for a private network can be used. In an electronic mail, the enciphering technology can also be used easily. The tool that manages the security of very many servers, clients, and networks is in the initial stage. 16 refs., 1 fig., 5 tabs.

  12. Case Library Construction Technology of Energy Loss in Distribution Networks Considering Regional Differentiation Theory

    Directory of Open Access Journals (Sweden)

    Ze Yuan

    2017-11-01

    Full Text Available The grid structures, load levels, and running states of distribution networks in different supply regions are known as the influencing factors of energy loss. In this paper, the case library of energy loss is constructed to differentiate the crucial factors of energy loss in the different supply regions. First of all, the characteristic state values are selected as the representation of the cases based on the analysis of energy loss under various voltage classes and in different types of regions. Then, the methods of Grey Relational Analysis and the K-Nearest Neighbor are utilized to implement the critical technologies of case library construction, including case representation, processing, analysis, and retrieval. Moreover, the analysis software of the case library is designed based on the case library construction technology. Some case studies show that there are many differences and similarities concerning the factors that influence the energy loss in different types of regions. In addition, the most relevant sample case can be retrieved from the case library. Compared with the traditional techniques, constructing a case library provides a new way to find out the characteristics of energy loss in different supply regions and constitutes differentiated loss-reducing programs.

  13. Grid-supported Medical Digital Library.

    Science.gov (United States)

    Kosiedowski, Michal; Mazurek, Cezary; Stroinski, Maciej; Weglarz, Jan

    2007-01-01

    Secure, flexible and efficient storing and accessing digital medical data is one of the key elements for delivering successful telemedical systems. To this end grid technologies designed and developed over the recent years and grid infrastructures deployed with their use seem to provide an excellent opportunity for the creation of a powerful environment capable of delivering tools and services for medical data storage, access and processing. In this paper we present the early results of our work towards establishing a Medical Digital Library supported by grid technologies and discuss future directions of its development. These works are part of the "Telemedycyna Wielkopolska" project aiming to develop a telemedical system for the support of the regional healthcare.

  14. 77 FR 59407 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-27

    ... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... Security Challenges; Accelerating Innovation Through Systems Analysis; and Leveraging Industry for Impact... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0053] Homeland Security Science and...

  15. Evolution of Biotechnology and Information Technology and Its Impact on Human Security

    Directory of Open Access Journals (Sweden)

    Elena S. Zinovieva

    2015-01-01

    Full Text Available Abstract: The development of post-industrial society initiates profound economic, technological and cultural change in the way of life of all mankind. The revolutionary breakthroughs in the field of new technologies such as biotechnology and information technology are reflected in all spheres of human activity, directly affecting the human security. The article analyzes the consequences of widespread usage biotechnology and information technology in the foreign policy practice on the basis of the human security theory. The detailed description of the main directions of the use of biometric technology in the foreign policy and consular practices is provided, the challenges and threats to information security associated with biometrics are analyzed, arising from widespread biotechnology are the main challenges and threats to as well as human security threats arising at the present stage of development and application of these technologies. Human security threats associated with the use of biotechnology are placed in the broader context of global trends in scientific and technological development. The recommendations are formulated in the field of foreign policy and international cooperation, which would neutralize new threats to international and personal safety arising at the present stage of development of biotechnology. The authors conclude that in order to ensure ethical regulation of new technologies that address issues of human security, it is necessary to organize multi-stakeholder partnerships at national and international level with the participation of states, representatives of civil society, business and the research community.

  16. 78 FR 66949 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-11-07

    ... Technology, such as new developments in systems engineering, cyber-security, knowledge management and how... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0071] Homeland Security Science and... Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Science and...

  17. Effective surveillance for homeland security balancing technology and social issues

    CERN Document Server

    Flammini, Francesco; Franceschetti, Giorgio

    2013-01-01

    Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current technological challenges involving multi-disciplinary problem analysis and systems engineering approaches, it provides an overview of the most relevant aspects of surveillance systems in the framework of homeland security. Addressing both advanced surveillance technologies and the related socio-ethical issues, the book consists of 21 chapters written by international experts from the various sectors of homeland security. Part I, Surveillance and Society, focuses on the societal dimension of surveillance-stressing the importance of societal acceptability as a precondition to any surveillance system. Part II, Physical and Cyber Surveillance, presents advanced technologies for surveillance. It considers developing technologie...

  18. Implementation of RFID Technology in University of Pune Library

    Science.gov (United States)

    Bansode, Sadanand Y.; Desale, Sanjay K.

    2009-01-01

    Purpose: The purpose of this paper is to describe the implementation of a radio frequency identification (RFID) system in Pune University Library. Design/methodology/approach: The paper provides a brief overview of background of the project, barriers faced and changes that have been experienced after the implementation of the technology. Findings:…

  19. New trends in science and technology implications for international peace and security

    International Nuclear Information System (INIS)

    1991-01-01

    In December 1988, the General Assembly requested the Secretary-General to follow future scientific and technological developments, especially those with potential military applications, and to evaluate their impact on international security. In resolution 43/77 A it also requested the Secretary-General to report to it at its forty-fifth session. The broad fields in which scientific and technological developments are taking place were identified as: information technology, biotechnology, materials technology, nuclear technology and space technology. These assessments were discussed by a wider group of experts at a high-level conference on ''New trends in science and technology: implications for international peace and security'', held in April 1990 in the city of Sendai, Japan. The Conference, which was attended by nearly 100 participants from over 20 countries, addressed issues of technological change and global security, new technologies and the search for security in the post-cold-war era, and national policy-making and international diplomacy in an era of rapid technological change. General approaches to technology assessment and technology trends in selected areas were also discussed. The positions taken by Member States on the subject of establishing a mechanism for technology assessment were also taken into account. The highlights of the report are summarized

  20. HF RFID versus UHF RFID--Technology for Library Service Transformation at City University of Hong Kong

    Science.gov (United States)

    Ching, Steve H.; Tai, Alice

    2009-01-01

    Since libraries first used RFID systems in the late 1990s, more and more libraries have identified the advantages of the technology. With advances in HF and UHF RFID, both alternatives are now viable in library applications. While some librarians are still skeptical towards UHF RFID as unproven in the library arena, the City University of Hong…

  1. How the Office of Safeguards and Security Technology development program facilitates safeguarding and securing the DOE complex

    International Nuclear Information System (INIS)

    Smoot, W.

    1995-01-01

    The technology development program's (TDP's) mission is to provide technologies or methodologies that address safeguards and security requirements throughout the U.S. DOE complex as well as to meet headquarters' policy needs. This includes developing state-of-the-art technologies or modifying existing technologies in physical security, material control and accountability, information security, and integrated safeguards systems. The TDP has an annual process during which it solicits user requirements from the field. These requirements are analyzed by DOE headquarters and laboratory personnel for technical merit. The requirements are then prioritized at headquarters, and the highest priorities are incorporated into our budget. Although this user-needs process occurs formally once a year, user requirements are accepted at any time. The status of funded technologies is communicated through briefings, programs reviews, and various documents that are available to all interested parties. Participants in several interagency groups allows our program to benefit from what others are doing and to prevent duplications of efforts throughout the federal community. Many technologies are transferred to private industry

  2. 78 FR 14101 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-03-04

    ... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... HSSTAC input on how to improve that collaboration. --Cyber Security and the evolution of the Cyber... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0014] Homeland Security Science and...

  3. Secure messaging via the cloud and mobile devices: data security issues emerge with new technologies.

    Science.gov (United States)

    Prestigiacomo, Jennifer

    2011-05-01

    The secure messaging space is alive with new innovations that are moving the industry forward. Key in this space is the push toward moving secure messaging to the cloud and pushing it out to mobile devices. Among the examples are solutions that allow physicians to receive encrypted email on mobile devices, as well as ones that allow doctors to securely text-message each other to coordinate care. However, the security issues around these emerging technologies in this very active space must be further explored.

  4. 75 FR 3948 - Big Sky Energy Corp., Biomedical Waste Systems, Inc., Biometrics Security Technology, Inc...

    Science.gov (United States)

    2010-01-25

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Big Sky Energy Corp., Biomedical Waste Systems, Inc., Biometrics Security Technology, Inc., Biosys, Inc., Bolder Technologies Corp., Boyds Wheels, Inc... securities of Biometrics Security Technology, Inc. because it has not filed any periodic reports since...

  5. Wireless Technology in the Library: The RIT Experience: Overview of the Project.

    Science.gov (United States)

    Pitkin, Pat

    2001-01-01

    Provides an overview of a project at RIT (Rochester Institute of Technology) that experimented with wireless technology, including laptop computers that circulate within the library building. Discusses project requirements, including ease of use, low maintenance, and low cost; motivation, including mobility; implementation; and benefits to the…

  6. Capitalization of Defense Technology Security Administration Equipment

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1996-01-01

    ... $5.2 million in the Equipment in Use account on its trial balance. Starting with FY 1996, Defense Technology Security Administration financial data will be included in consolidated DoD financial statements...

  7. Information and technology: Improving food security in Uganda ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2014-06-23

    Jun 23, 2014 ... Information and technology: Improving food security in Uganda ... knowledge to make decisions about planting, harvesting, and managing livestock, but ... to be effective for minimizing risks and increasing agricultural productivity. ... In time, this network of information – made possible by digital technology ...

  8. Implications of information technology on the training of library and ...

    African Journals Online (AJOL)

    Implications of information technology on the training of library and information science professionals in Nigeria: an analysis of the curricula of some selected ... Information Impact: Journal of Information and Knowledge Management. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives.

  9. Multimedia Bootcamp: a health sciences library provides basic training to promote faculty technology integration.

    Science.gov (United States)

    Ramsey, Ellen C

    2006-04-25

    Recent research has shown a backlash against the enthusiastic promotion of technological solutions as replacements for traditional educational content delivery. Many institutions, including the University of Virginia, have committed staff and resources to supporting state-of-the-art, showpiece educational technology projects. However, the Claude Moore Health Sciences Library has taken the approach of helping Health Sciences faculty be more comfortable using technology in incremental ways for instruction and research presentations. In July 2004, to raise awareness of self-service multimedia resources for instructional and professional development needs, the Library conducted a "Multimedia Bootcamp" for nine Health Sciences faculty and fellows. Case study. Program stewardship by a single Library faculty member contributed to the delivery of an integrated learning experience. The amount of time required to attend the sessions and complete homework was the maximum fellows had to devote to such pursuits. The benefit of introducing technology unfamiliar to most fellows allowed program instructors to start everyone at the same baseline while not appearing to pass judgment on the technology literacy skills of faculty. The combination of wrapping the program in the trappings of a fellowship and selecting fellows who could commit to a majority of scheduled sessions yielded strong commitment from participants as evidenced by high attendance and a 100% rate of assignment completion. Response rates to follow-up evaluation requests, as well as continued use of Media Studio resources and Library expertise for projects begun or conceived during Bootcamp, bode well for the long-term success of this program. An incremental approach to integrating technology with current practices in instruction and presentation provided a supportive yet energizing environment for Health Sciences faculty. Keys to this program were its faculty focus, traditional hands-on instruction, unrestricted

  10. Self-Service Charge Systems: Current Technological Applications and Their Implications for the Future Library.

    Science.gov (United States)

    Mardikian, Jackie

    1995-01-01

    Discusses a possible shift to self-service check-out systems for academic library patrons. Provides an annotated bibliography of 51 items that discuss the impact of self-service technology on the quality of service and customer satisfaction in libraries, service sectors, banking, and the vending industry. (LRW)

  11. NILDE, Network Inter Library Document Exchange: An Italian Document Delivery System

    Science.gov (United States)

    Brunetti, F.; Gasperini, A.; Mangiaracina, S.

    2007-10-01

    This poster presents NILDE, a document delivery system supporting the exchange of documents via the internet. The system has been set up by the Central Library of the National Research Council of Bologna (Italy) in order to make use of new internet technology, to promote cooperation between Italian university libraries and research libraries, and to achieve quick response times in satisfying DD requests. The Arcetri Astrophysical Observatory Library was the first astronomical library to join the NILDE project from its earliest days in 2002. Many were the reasons for this choice: automation of the DD processes, security and reliability of the network, creation of usage statistics and reports, reduction of DD System management costs and so on. This work describes the benefits of NILDE and discusses the role of an organized document delivery system as an important tool to cope with the difficult constraints of the publishing market.

  12. Uranium mining and metallurgy library science and technology literature retrieval of network

    International Nuclear Information System (INIS)

    Tang Lilei

    2014-01-01

    This paper introduces the network resources and characteristics retrieve service of Beijing research Institute of Chemical Engineering of Metallurgy library, Analyzes the problems often encountered in the literature retrieval in science and technology, And puts forward the solution, Puts forward the thinking and Suggestions of science and technology literature retrieval. (author)

  13. National Libraries Section. General Research Libraries Division. Papers.

    Science.gov (United States)

    International Federation of Library Associations, The Hague (Netherlands).

    Papers on national library services and activities, which were presented at the 1983 International Federation of Library Associations (IFLA) conference, include: (1) "The National Library of China in its Gradual Application of Modern Technology," a discussion by Zhu Nan and Zhu Yan (China) of microform usage and library automation; (2)…

  14. Security and privacy issues with health care information technology.

    Science.gov (United States)

    Meingast, Marci; Roosta, Tanya; Sastry, Shankar

    2006-01-01

    The face of health care is changing as new technologies are being incorporated into the existing infrastructure. Electronic patient records and sensor networks for in-home patient monitoring are at the current forefront of new technologies. Paper-based patient records are being put in electronic format enabling patients to access their records via the Internet. Remote patient monitoring is becoming more feasible as specialized sensors can be placed inside homes. The combination of these technologies will improve the quality of health care by making it more personalized and reducing costs and medical errors. While there are benefits to technologies, associated privacy and security issues need to be analyzed to make these systems socially acceptable. In this paper we explore the privacy and security implications of these next-generation health care technologies. We describe existing methods for handling issues as well as discussing which issues need further consideration.

  15. Security training with interactive laser-video-disk technology

    International Nuclear Information System (INIS)

    Wilson, D.

    1988-01-01

    DOE, through its contractor EG and G Energy Measurements, Inc., has developed a state-of-the-art interactive-video system for use at the Department of Energy's Central Training Academy. Called the Security Training and Evaluation Shooting System (STRESS), the computer-driven decision shooting system employs the latest is laservideo-disk technology. STRESS is designed to provide realistic and stressful training for security inspectors employed by the DOE and its contractors. The system uses wide-screen video projection, sophisticated scenario-branching technology, and customized video scenarios especially designed for the DOE. Firing a weapon that has been modified to shoot ''laser bullets,'' and wearing a special vest that detects ''hits'': the security inspector encounters adversaries on the wide screen who can shoot or be shot by the inspector in scenarios that demand fast decisions. Based on those decisions, the computer provides instantaneous branching to different scenes, giving the inspector confrontational training with the realism and variability of real life

  16. 48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...

  17. Discussion on the Technology and Method of Computer Network Security Management

    Science.gov (United States)

    Zhou, Jianlei

    2017-09-01

    With the rapid development of information technology, the application of computer network technology has penetrated all aspects of society, changed people's way of life work to a certain extent, brought great convenience to people. But computer network technology is not a panacea, it can promote the function of social development, but also can cause damage to the community and the country. Due to computer network’ openness, easiness of sharing and other characteristics, it had a very negative impact on the computer network security, especially the loopholes in the technical aspects can cause damage on the network information. Based on this, this paper will do a brief analysis on the computer network security management problems and security measures.

  18. Soils and food security | Nortcliff | Nigerian Journal of Technological ...

    African Journals Online (AJOL)

    A threat impacting on food security strongly in Africa is nutrient mining where insufficient nutrients are returned to the soil after crop production. The impacts of global change on food security and the potential impacts of global markets for food and land are also briefly discussed. Nigerian Journal of Technological Research ...

  19. External Service Providers to the National Security Technology Incubator: Formalization of Relationships

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-04-30

    This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.

  20. The Search for Security Technology Funding.

    Science.gov (United States)

    Fickes, Michael

    2003-01-01

    Explains that although it is difficult to find money to pay for school security technology, there are places to look. For example, the Department of Education has a list serve that summarizes various funding opportunities. There is also a Federal Register list serve and a site put out by the Department of Justice. A sidebar presents three…

  1. STRATEGIC IMPERATIVES OF THE DEVELOPMENT OF THE SCIENTIFIC LIBRARY OF THE RESEARCH UNIVERSITY

    Directory of Open Access Journals (Sweden)

    M. Sitnitskiy

    2017-09-01

    Full Text Available The article presents strategic imperatives that influence the development of scientific libraries and systematizes the criteria that the scientific library of the research university must meet in order to ensure effective development in accordance with modern trends in science and technology. Strategic imperatives for the development of the library of the research university consist in providing: modern technologies of codification and transfer of information containing knowledge; Compliance with international standards of existing information and technical infrastructure of scientific libraries; Equal access to world-class advanced science-computer databases; Timely updating of library funds; Proactive visitor system and automate the processing of relevance of their queries; The fastest and most accurate search and access to information; availability of an effective information security system contained in the cloud of scientific library; Development of adjacent commercial services, which allow to receive a "package" of information generalized by professional specialists; Creation of creative space for a comfortable visit to the library by interested persons for obtaining existing knowledge and creating new ones. The only way for Ukraine to slow down the outflow of skilled scientific and pedagogical staff and students with high intellectual potential is to preserve and balance the system of research universities and to develop within their walls powerful scientific libraries that will be able to meet the above-mentioned development imperatives.

  2. Library Operations Policies and Procedures, Volume 2. Central Archive for Reusable Defense Software (CARDS)

    Science.gov (United States)

    1994-02-28

    use and customize those policies and procedures applicable to the implementor’s situation. It is not the intent of this manual to restrict the library...improvements. Pare 10 ka•- V •DkI U Release Manager The Release Manager provides franchisees with media copies of existing libraries, as needed. Security...implementors, and potential library franchisees . Security Team The Security Team assists the Security Officer with security analysis. Team members are

  3. Three Essays on Information Technology Security Management in Organizations

    Science.gov (United States)

    Gupta, Manish

    2011-01-01

    Increasing complexity and sophistication of ever evolving information technologies has spurred unique and unprecedented challenges for organizations to protect their information assets. Companies suffer significant financial and reputational damage due to ineffective information technology security management, which has extensively been shown to…

  4. Technostress and Library Values.

    Science.gov (United States)

    Gorman, Michael

    2001-01-01

    Discusses information overload and society's and libraries' responses to technology. Considers eight values that libraries should focus on and how they relate to technology in libraries: democracy, stewardship, service, intellectual freedom, privacy, rationalism, equity of access, and building harmony and balance. (LRW)

  5. The Science, Engineering and Technology Career Library Corner. Final report, February 1, 1995--January 31, 1996

    Energy Technology Data Exchange (ETDEWEB)

    Cole, P.R.

    1996-03-01

    A grant was made to install and pilot-test the Science, Engineering and Technology (SET) Career Library Corner at the New York Hall of Science. The SET Career Library Corner is located in a multi-media library setting where visitors can explore careers in a quiet, uninterrupted environment, in contrast to the original installation designed as a museum floor exhibit.

  6. Technological Advances Impacting Libraries and Libraries of the Future Kütüphaneleri Etkileyen Teknolojik Yenilikler ve Geleceğin Kütüphaneleri

    Directory of Open Access Journals (Sweden)

    Nazan Özenç Uçak

    1995-03-01

    Full Text Available Developments in libraries which began with the use of computers accelerate with the emergence of new technologies every day. Especially, the widespread use of microcomputers, developments in communication and optic disk technologies, and the use ofartifxcal intelligence and expert systems in libraries have impact upon the library profession. The assortment, quality and speed of library services have increased due to these developments. Along with the technological advances, the organizational structure of , and the management approcah to, libraries changes, too. These ongoing changes bring forth the question of what would happen to the libraries and librarianship of the future. Kütüphanelerde bilgisayarların kullanımı ile başlayan gelişmeler, her geçen gün yeni teknolojilerin ortaya çıkmasıyla giderek büyümektedir, özellikle mikrobilgisayarların geniş kullanım alanı bulması, iletişim teknolojisinin hızlı gelişimi, optik disk teknolojisindeki yenilikler, yapay zeka ve uzman sistemlerden kütüphanecilik alanında yararlanılabilmesi kütüphanecilik mesleğini etkilemektedir. Bu gelişmelere bağlı olarak verilen hizmetlerin çeşidi, niteliği ve hızı artmaktadır. Kütüphanelerin Örgüt yapılarında, yönetim anlayışlarında da değişimler söz konusudur. Bugün yaşanan bu değişimler geleceğin kütüphanelerinin ve kütüphaneciliğinin neolacağı sorularını gündeme getirmektedir.

  7. Pengelolaan Perpustakaan Khusus = Special Library Management

    OpenAIRE

    Surachman, Arif

    2005-01-01

    This article describes every aspects needed to manage special library and complete with its example and explanation. The author uses the American corner UGM and PSKP UGM (Pusat Studi Keamanan dan Perdamaian = Security and Peace Studies Center) Library as a case study of the implementation special library management in UGM university.

  8. Rapid access to compound libraries through flow technology: fully automated synthesis of a 3-aminoindolizine library via orthogonal diversification.

    Science.gov (United States)

    Lange, Paul P; James, Keith

    2012-10-08

    A novel methodology for the synthesis of druglike heterocycle libraries has been developed through the use of flow reactor technology. The strategy employs orthogonal modification of a heterocyclic core, which is generated in situ, and was used to construct both a 25-membered library of druglike 3-aminoindolizines, and selected examples of a 100-member virtual library. This general protocol allows a broad range of acylation, alkylation and sulfonamidation reactions to be performed in conjunction with a tandem Sonogashira coupling/cycloisomerization sequence. All three synthetic steps were conducted under full automation in the flow reactor, with no handling or isolation of intermediates, to afford the desired products in good yields. This fully automated, multistep flow approach opens the way to highly efficient generation of druglike heterocyclic systems as part of a lead discovery strategy or within a lead optimization program.

  9. Competitive Technologies for National Security: Review and Recommendations

    National Research Council Canada - National Science Library

    Carafano, James J; Gudgel, Andew; Kochems, Alane

    2008-01-01

    .... Innovation will always be a national security wild card. New technologies may unleash or accelerate social and cultural changes that affect how nations protect themselves on battlefields and behind the scenes...

  10. Reducing security risk using data loss prevention technology.

    Science.gov (United States)

    Beeskow, John

    2015-11-01

    Data loss/leakage protection (DLP) technology seeks to improve data security by answering three fundamental questions: > Where are confidential data stored? > Who is accessing the information? > How are data being handled?

  11. After Globalization Future Security in a Technology Rich World

    Energy Technology Data Exchange (ETDEWEB)

    Gilmartin,T J

    2001-08-17

    Over the course of the year 2000, five workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats to international security in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. The participants included US national leaders and experts from the Department of Energy National Laboratories; the Department of Defense: Army, Navy, Air Force, Office of the Secretary of Defense, Defense Threat Reduction Agency, and Defense Advanced Research Projects Agency; the Department of State, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. The threats ranged from local/regional to global, from intentional to unintended to natural, from merely economic to massively destructive, and from individual and group to state actions. We were not concerned in this exercise with defining responses to the threats, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be executed or countered. At the concluding review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and national responsibility, and discussed the workshop findings to determine what is most certain or uncertain, and what might be needed to resolve our uncertainties. This paper summarizes the consenses and

  12. A study of the security technology and a new security model for WiFi network

    Science.gov (United States)

    Huang, Jing

    2013-07-01

    The WiFi network is one of the most rapidly developing wireless communication networks, which makes wireless office and wireless life possible and greatly expands the application form and scope of the internet. At the same time, the WiFi network security has received wide attention, and this is also the key factor of WiFi network development. This paper makes a systematic introduction to the WiFi network and WiFi network security problems, and the WiFi network security technology are reviewed and compared. In order to solve the security problems in WiFi network, this paper presents a new WiFi network security model and the key exchange algorithm. Experiments are performed to test the performance of the model, the results show that the new security model can withstand external network attack and ensure stable and safe operation of WiFi network.

  13. enforcing tertiary school library rules and regulations

    African Journals Online (AJOL)

    2014-10-31

    Oct 31, 2014 ... beings -library users/patrons. It is also a standard rule that library ... degree of criminal behaviors in the use of their resources (Momodu, 2002). It is also a well known fact that some individual users of academic libraries display disruptive or criminal behaviors within the library and this often poses security ...

  14. Using Science Driven Technologies for the Defense and Security Applications

    Science.gov (United States)

    Habib, Shahid; Zukor, Dorthy; Ambrose, Stephen D.

    2004-01-01

    For the past three decades, Earth science remote sensing technologies have been providing enormous amounts of useful data and information in broadening our understanding of our home planet as a system. This research, as it has expanded our learning process, has also generated additional questions. This has further resulted in establishing new science requirements, which have culminated in defining and pushing the state-of-the-art technology needs. NASA s Earth science program has deployed 18 highly complex satellites, with a total of 80 sensors, so far and is in a process of defining and launching multiple observing systems in the next decade. Due to the heightened security alert of the nation, researchers and technologists are paying serious attention to the use of these science driven technologies for dual use. In other words, how such sophisticated observing and measuring systems can be used in detecting multiple types of security concerns with a substantial lead time so that the appropriate law enforcement agencies can take adequate steps to defuse any potential risky scenarios. This paper examines numerous NASA technologies such as laser/lidar systems, microwave and millimeter wave technologies, optical observing systems, high performance computational techniques for rapid analyses, and imaging products that can have a tremendous pay off for security applications.

  15. The use of mobile technology in health libraries: a summary of a UK-based survey.

    Science.gov (United States)

    Chamberlain, David; Elcock, Martin; Puligari, Preeti

    2015-12-01

    Health libraries have changed over the past fifteen years in the format of the information they provide. This is driven by developments in technology. To conduct a survey of NHS health libraries in the United Kingdom in order to summarise how mobile technologies are being used, how they are promoted and how they are delivered, highlighting good practice and solutions to issues. An online survey was carried out in 2013 and sent to academic and NHS web-based discussion lists. There were 199 responses. Main replies were from large Acute Hospital Trusts. Only 18% of respondents had conducted research into use of mobile technology (MT) within their Trust. Forty per cent of Trusts offered clinical point of care tools, 29% mobile catalogues, and 30% had mobile enabled web sites. Libraries utilised third-party partnerships rather than develop their own applications or tools. Seventy per cent of Trusts promoted new MT services via e-mail. Network restrictions were the main barrier to development as well as finance and expertise. Uptake and development of MT is sporadic and driven by individuals. There is an opportunity for collaboration and sharing resources and expertise. There are benefits to adopting user-friendly resources. © 2015 Health Libraries Group.

  16. The Status of Information Technology in Iranian Hospital Libraries: A Comparative Study of Managers' Attitude

    Science.gov (United States)

    Isfandyari-Moghaddam, Alireza; Sedehi, Maryam; Dehghani, Mozhdeh; Nemati-Anaraki, Leila; Hasanzadeh-Dizaji, Elaheh

    2013-01-01

    Purpose: The purpose of this paper is to compare the attitude of the managers of libraries located at Iran, Tehran and Shahid Beheshti Medical Sciences Universities' training hospitals, on the status of information technology (IT) in the mentioned libraries. Design/methodology/approach: This study employed a researcher-made questionnaire. The…

  17. New technologies and the search for security: Prospects for a post-cold-war era

    International Nuclear Information System (INIS)

    Brown, G.E. Jr.

    1990-01-01

    Technology alone will not solve our many environmental, economic and military problems. The search for peace and security must be based on a concept of international security that extends beyond the bounds of military concerns and into the realm of environmental and economic matters. In our efforts to understand how science and technology fit within this security context, we should not look simply at emerging technologies, even those that are sustainable and stabilizing, as being the principal candidates for drastic improvements in peace and security on our planet. One must keep in mind that security for as many as one fourth to one half of the world's inhabitants would be revolutionized if they had access to some of the most basic existing technologies of our times. Equitable access to resources and technology is an age-old problem. Today it must be faced on a global basis. It demands creating a new world economic order that combines the best that the capitalist and socialist economies can offer. We must declare today that a secure global society cannot exist which is half in slavery to poverty and deprived of opportunity, and half free to develop its potential and achieve its dreams

  18. Public assessment of new surveillance-oriented security technologies: Beyond the trade-off between privacy and security.

    Science.gov (United States)

    Pavone, Vincenzo; Esposti, Sara Degli

    2012-07-01

    As surveillance-oriented security technologies (SOSTs) are considered security enhancing but also privacy infringing, citizens are expected to trade part of their privacy for higher security. Drawing from the PRISE project, this study casts some light on how citizens actually assess SOSTs through a combined analysis of focus groups and survey data. First, the outcomes suggest that people did not assess SOSTs in abstract terms but in relation to the specific institutional and social context of implementation. Second, from this embedded viewpoint, citizens either expressed concern about government's surveillance intentions and considered SOSTs mainly as privacy infringing, or trusted political institutions and believed that SOSTs effectively enhanced their security. None of them, however, seemed to trade privacy for security because concerned citizens saw their privacy being infringed without having their security enhanced, whilst trusting citizens saw their security being increased without their privacy being affected.

  19. Know Thy Neighbor: Crypto Library Detection in Cloud

    Directory of Open Access Journals (Sweden)

    Irazoqui Gorka

    2015-04-01

    Full Text Available Software updates and security patches have become a standard method to fix known and recently discovered security vulnerabilities in deployed software. In server applications, outdated cryptographic libraries allow adversaries to exploit weaknesses and launch attacks with significant security results. The proposed technique exploits leakages at the hardware level to first, determine if a specific cryptographic library is running inside (or not a co-located virtual machine (VM and second to discover the IP of the co-located target. To this end, we use a Flush+Reload cache side-channel technique to measure the time it takes to call (load a cryptographic library function. Shorter loading times are indicative of the library already residing in memory and shared by the VM manager through deduplication. We demonstrate the viability of the proposed technique by detecting and distinguishing various cryptographic libraries, including MatrixSSL, PolarSSL, GnuTLS, OpenSSL and CyaSSL along with the IP of the VM running these libraries. In addition, we show how to differentiate between various versions of libraries to better select an attack target as well as the applicable exploit. Our experiments show a complete attack setup scenario with single-trial success rates of up to 90% under light load and up to 50% under heavy load for libraries running in KVM.

  20. SCHOOL COMMUNITY PERCEPTION OF LIBRARY APPS AGAINTS LIBRARY EMPOWERMENT

    Directory of Open Access Journals (Sweden)

    Achmad Riyadi Alberto

    2017-07-01

    Full Text Available Abstract. This research is motivated by the development of information and communication technology (ICT in the library world so rapidly that allows libraries in the present to develop its services into digital-based services. This study aims to find out the school community’s perception of library apps developed by Riche Cynthia Johan, Hana Silvana, and Holin Sulistyo and its influence on library empowerment at the library of SD Laboratorium Percontohan UPI Bandung. Library apps in this research belong to the context of m-libraries, which is a library that meets the needs of its users by using mobile platforms such as smartphones,computers, and other mobile devices. Empowerment of library is the utilization of all aspects of the implementation of libraries to the best in order to achieve the expected goals. An analysis of the schoolcommunity’s perception of library apps using the Technology Acceptance Model (TAM includes: ease of use, usefulness, usability, usage trends, and real-use conditions. While the empowerment of the library includes aspects: information empowerment, empowerment of learning resources, empowerment of human resources, empowerment of library facilities, and library promotion. The research method used in this research is descriptive method with quantitative approach. Population and sample in this research is school community at SD Laboratorium Percontohan UPI Bandung. Determination of sample criteria by using disproportionate stratified random sampling with the number of samples of 83 respondents. Data analysis using simple linear regression to measure the influence of school community perception about library apps to library empowerment. The result of data analysis shows that there is influence between school community perception about library apps to library empowerment at library of SD Laboratorium Percontohan UPI Bandung which is proved by library acceptance level and library empowerment improvement.

  1. 78 FR 41954 - TA-W-82,634, Prudential Global Business Technology Solutions Central Security Services Dresher...

    Science.gov (United States)

    2013-07-12

    ... Business Technology Solutions Central Security Services Iselin, New Jersey; TA-W-82,634B, Prudential Global Business Technology Solutions Central Security Services Plymouth, Minnesota; TA- W-82,634C, Prudential Global Business Technology Solutions Central Security Services Scottsdale, Arizona; TA-W-82,634D...

  2. Data Content Protection for Virtual Libraries Heritage

    Directory of Open Access Journals (Sweden)

    Mihai DOINEA

    2016-01-01

    Full Text Available This paper presents aspects of digital content protection in virtual library systems. The legislation aspects are presented to better emphasize the need of new security mechanisms. Integrated library systems architecture is presented with focus on their main purpose, manipulating and rendering digital content to end-users. The cultural heritage stored in such systems is an important asset that needs to be protected against malicious manipulation. The characteristics of a smart virtual library, supported by an integrated library system, are analyzed and a security model is proposed for implementation, based on its particularities. The model aims to be an interface between the interactions of anonymous users with the Online Public Access Catalog of a virtual library that assures the protection of digital content. Conclusions are drawn to better support the idea of cultural persistence by the use of Information Systems.

  3. Use of Information and Communication Technology (ICT) in Collection Development in Scientific and Research Institute Libraries in Iran: A study

    Science.gov (United States)

    Khademizadeh, Shahnaz

    2012-08-01

    The explosion of information communication technology (ICT) since the beginning of the 20th century has been rendering manual-based library system in academic, research, special and public libraries less relevant. This is because using and implementing information communication technology in the library depend largely on the librarian attitude toward the current digital age. This study examined the attitudinal correlates of some selected scientific and research institutes libraries in Irantowards the use and application of ICT in their various libraries. A total of ten libraries from all the forty nine libraries in Iran formed the studyís population. It is observed that 'Internet/intranet etc' (1046; 67.5%) is the most important source through which the users become aware of modern information technologies used in their libraries. The vast majority of the respondents who answered electronic sources make it 'Easier' to gather and use information are (1313; 84.7%). The results indicate that there is a significant relationship between e-environment and collection development (?262.86, p=0.000). Findings further show that all of librarians (9; 100%) opined they feel that ICT application affects the collection development of library. Based on these findings, it is recommended that libraries in the developing countries should consider training those librarians who do not have knowledge of ICT in order to remove the fear and anxiety hindering them from developing good attitude towards the use of ICT in their libraries.

  4. Sharing of information and knowledge among staff in King Abdullah University of Science and Technology (KAUST) library

    KAUST Repository

    Ramli, Rindra M.

    2011-01-01

    This paper describes strategies and initiatives undertaken by the King Abdullah University of Science and Technology (KAUST) library in sharing information and knowledge among its staff. KAUST Library adopted several IT platforms to enable staff

  5. 78 FR 56263 - HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc...

    Science.gov (United States)

    2013-09-12

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc., SLM Holdings, Inc., Spring Creek Healthcare Systems... securities of Security Intelligence Technologies, Inc. because it has not filed any periodic reports since...

  6. A Proactive Approach to Building Security.

    Science.gov (United States)

    Winters, Sharon

    1994-01-01

    Describes building security procedures developed at the Hampton Public Library (Virginia) to deal with problem patrons. Highlights include need for the library monitor program; staffing patterns; monitor selection criteria; training procedures; library behavior guidelines; library policy statements; theft detection systems; and sample job…

  7. Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks.

    Science.gov (United States)

    Lin, Zhaowen; Tao, Dan; Wang, Zhenji

    2017-04-21

    For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel security protection architecture for SDN. We design a security service orchestration center in the control plane of SDN, and this center physically decouples from the SDN controller and constructs SDN security services. We adopt virtualization technology to construct a security meta-function library, and propose a dynamic security service composition construction algorithm based on web service composition technology. The rule-combining method is used to combine security meta-functions to construct security services which meet the requirements of users. Moreover, the RETE algorithm is introduced to improve the efficiency of the rule-combining method. We evaluate our solutions in a realistic scenario based on OpenStack. Substantial experimental results demonstrate the effectiveness of our solutions that contribute to achieve the effective security protection with a small burden of the SDN controller.

  8. Nevada National Security Site Environmental Report 2013

    Energy Technology Data Exchange (ETDEWEB)

    Wills, C.

    2014-09-09

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.

  9. The library catalogue as a retrieval tool in academic libraries: a case ...

    African Journals Online (AJOL)

    The library catalogue as a retrieval tool in academic libraries: a case study of federal university of technology Owerri library. ... Information Technologist (The) ... be emphasized and made compulsory for a ll library users and strengthening the ...

  10. Security technology discussion for emergency command system of nuclear power plant

    International Nuclear Information System (INIS)

    Liu Zhenjun

    2014-01-01

    Nuclear power plant emergency command system can provide valuable data for emergency personnel, such as the unit data, weather data, environmental radiation data. In the course of emergency response, the emergency command system provides decision support to quickly and effectively control and mitigate the consequences of the nuclear accident, to avoid and reduce the dose received by staff and the public, to protect the environment and the public. There are high performance requirements on the security of the system and the data transmission. Based on the previous project and new demand after the Fukushima incident, the security technology design of emergency system in nuclear power plant was discussed. The results show that the introduction of information security technology can effectively ensure the security of emergency systems, and enhance the capacity of nuclear power plant to deal with nuclear accidents. (author)

  11. New technologies and the search for security: Prospects for a post-cold-war era

    Energy Technology Data Exchange (ETDEWEB)

    Brown, Jr, G E

    1991-12-31

    Technology alone will not solve our many environmental, economic and military problems. The search for peace and security must be based on a concept of international security that extends beyond the bounds of military concerns and into the realm of environmental and economic matters. In our efforts to understand how science and technology fit within this security context, we should not look simply at emerging technologies, even those that are sustainable and stabilizing, as being the principal candidates for drastic improvements in peace and security on our planet. One must keep in mind that security for as many as one fourth to one half of the world`s inhabitants would be revolutionized if they had access to some of the most basic existing technologies of our times. Equitable access to resources and technology is an age-old problem. Today it must be faced on a global basis. It demands creating a new world economic order that combines the best that the capitalist and socialist economies can offer. We must declare today that a secure global society cannot exist which is half in slavery to poverty and deprived of opportunity, and half free to develop its potential and achieve its dreams

  12. Technology scale and supply chains in a secure, affordable and low carbon energy transition

    International Nuclear Information System (INIS)

    Hoggett, Richard

    2014-01-01

    Highlights: • Energy systems need to decarbonise, provide security and remain affordable. • There is uncertainty over which technologies will best enable this to happen. • A strategy to deal with uncertainty is to assess a technologies ability to show resilience, flexibility and adaptability. • Scale is important and smaller scale technologies are like to display the above characteristics. • Smaller scale technologies are therefore more likely to enable a sustainable, secure, and affordable energy transition. - Abstract: This research explores the relationship between technology scale, energy security and decarbonisation within the UK energy system. There is considerable uncertainty about how best to deliver on these goals for energy policy, but a focus on supply chains and their resilience can provide useful insights into the problems uncertainty causes. Technology scale is central to this, and through an analysis of the supply chains of nuclear power and solar photovoltaics, it is suggested that smaller scale technologies are more likely to support and enable a secure, low carbon energy transition. This is because their supply chains are less complex, show more flexibility and adaptability, and can quickly respond to changes within an energy system, and as such they are more resilient than large scale technologies. These characteristics are likely to become increasingly important in a rapidly changing energy system, and prioritising those technologies that demonstrate resilience, flexibility and adaptability will better enable a transition that is rapid, sustainable, secure and affordable

  13. 78 FR 45255 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-07-26

    ..., cyber-security, knowledge management and how best to leverage related technologies funded by other... INFORMATION CONTACT: Mary Hanson, HSSTAC Executive Director, Science and Technology Directorate, Department of... Technology Advisory Committee (HSSTAC) ACTION: Notice of Federal Advisory Committee charter renewal. SUMMARY...

  14. The USF Libraries Virtual Library Project: A Blueprint for Development.

    Science.gov (United States)

    Metz-Wiseman, Monica; Silver, Susan; Hanson, Ardis; Johnston, Judy; Grohs, Kim; Neville, Tina; Sanchez, Ed; Gray, Carolyn

    This report of the Virtual Library Planning Committee (VLPC) is intending to serve as a blueprint for the University of South Florida (USF) Libraries as it shifts from print to digital formats in its evolution into a "Virtual Library". A comprehensive planning process is essential for the USF Libraries to make optimum use of technology,…

  15. The impact of computerisation of library operations on library ...

    African Journals Online (AJOL)

    The use of computer-based systems in libraries and information units is now a vogue. The era of manual system in library operations is on its way to extinction. Recent developments in information world tend towards a globalized information communication technology (ICT). The library as a dynamic institution cannot afford ...

  16. Clean fuel technology for world energy security

    Energy Technology Data Exchange (ETDEWEB)

    Sunjay, Sunjay

    2010-09-15

    Clean fuel technology is the integral part of geoengineering and green engineering with a view to global warming mitigation. Optimal utilization of natural resources coal and integration of coal & associated fuels with hydrocarbon exploration and development activities is pertinent task before geoscientist with evergreen energy vision with a view to energy security & sustainable development. Value added technologies Coal gasification,underground coal gasification & surface coal gasification converts solid coal into a gas that can be used for power generation, chemical production, as well as the option of being converted into liquid fuels.

  17. High-Performance Secure Database Access Technologies for HEP Grids

    Energy Technology Data Exchange (ETDEWEB)

    Matthew Vranicar; John Weicher

    2006-04-17

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist’s computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications.” There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the

  18. High-Performance Secure Database Access Technologies for HEP Grids

    International Nuclear Information System (INIS)

    Vranicar, Matthew; Weicher, John

    2006-01-01

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist's computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that 'Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications'. There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the secure

  19. Library Standards: Evidence of Library Effectiveness and Accreditation.

    Science.gov (United States)

    Ebbinghouse, Carol

    1999-01-01

    Discusses accreditation standards for libraries based on experiences in an academic law library. Highlights include the accreditation process; the impact of distance education and remote technologies on accreditation; and a list of Internet sources of standards and information. (LRW)

  20. Information Technology Security Professionals' Knowledge and Use Intention Based on UTAUT Model

    Science.gov (United States)

    Kassa, Woldeloul

    2016-01-01

    Information technology (IT) security threats and vulnerabilities have become a major concern for organizations in the United States. However, there has been little research on assessing the effect of IT security professionals' knowledge on the use of IT security controls. This study examined the unified theory of acceptance and use of technology…

  1. DNA-encoded chemical libraries: advancing beyond conventional small-molecule libraries.

    Science.gov (United States)

    Franzini, Raphael M; Neri, Dario; Scheuermann, Jörg

    2014-04-15

    DNA-encoded chemical libraries (DECLs) represent a promising tool in drug discovery. DECL technology allows the synthesis and screening of chemical libraries of unprecedented size at moderate costs. In analogy to phage-display technology, where large antibody libraries are displayed on the surface of filamentous phage and are genetically encoded in the phage genome, DECLs feature the display of individual small organic chemical moieties on DNA fragments serving as amplifiable identification barcodes. The DNA-tag facilitates the synthesis and allows the simultaneous screening of very large sets of compounds (up to billions of molecules), because the hit compounds can easily be identified and quantified by PCR-amplification of the DNA-barcode followed by high-throughput DNA sequencing. Several approaches have been used to generate DECLs, differing both in the methods used for library encoding and for the combinatorial assembly of chemical moieties. For example, DECLs can be used for fragment-based drug discovery, displaying a single molecule on DNA or two chemical moieties at the extremities of complementary DNA strands. DECLs can vary substantially in the chemical structures and the library size. While ultralarge libraries containing billions of compounds have been reported containing four or more sets of building blocks, also smaller libraries have been shown to be efficient for ligand discovery. In general, it has been found that the overall library size is a poor predictor for library performance and that the number and diversity of the building blocks are rather important indicators. Smaller libraries consisting of two to three sets of building blocks better fulfill the criteria of drug-likeness and often have higher quality. In this Account, we present advances in the DECL field from proof-of-principle studies to practical applications for drug discovery, both in industry and in academia. DECL technology can yield specific binders to a variety of target

  2. Intelligent Technologies in Library and Information Service Applications. ASIST Monograph Series.

    Science.gov (United States)

    Lancaster, F. W.; Warner, Amy

    The objective of this study was to gain enough familiarity with developments in artificial intelligence (AI) and related technologies to be able to advise the information service community on what can be applied today and what one might reasonably expect to be applicable to library and information services in the near future. The emphasis is on…

  3. New Information Technologies: Some Observations on What Is in Store for Libraries.

    Science.gov (United States)

    Black, John B.

    This outline of new technological developments and their applications in the library and information world considers innovations in three areas: automation, telecommunications, and the publishing industry. There is mention of the growth of online systems, minicomputers, microcomputers, and word processing; the falling costs of automation; the…

  4. Development of IT-based Cyber Security Technology for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Hong, S. B.; Lee, J. C.; Choi, Y. S.; Choi, Y. R.; Cho, J. W.; Jung, C. E.; Jeong, K. I.; Park, B.; Koo, I. S.

    2009-11-01

    Development and enlargement of the high speed communication network make it possible the user to access online information easily. It generates changing offline activities to online in the economics, expansion of cultural interchanges and convenient life. But it also causes misuse, wiretapping, forgery and alteration of the information via illegal invasion(virus, hacking), and these are derived from the open network characteristic, weakness of the securities of the TCP/IP protocol and information systems. The security of individual and the national foundation facility(industry and government) can be threatened because of these problems, and theses can be used as a instrument of cyber-war. Many cyber security technologies have been developed to corp with the cyber threat. One of the most important national facility is the nuclear power plant and the necessity of the cyber security for the digital I and C of it have been proposed since middle of the 2000. KINS announced the regulation of the cyber security for the digital I and C of the nuclear power plant in 2007. The main concept of the cyber security for it is similar to the IT field that is treated as a leader of the cyber security. Because of the difference of the characteristics between the IT field and the nuclear industry, applying the cyber security technologies developed and used in the IT field to the nuclear industry has some critical constraints. We will analyze these problems and propose a cyber security method based on cryptograph and authentication for the I and C communication network in this report

  5. Development of IT-based Cyber Security Technology for Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Hong, S. B.; Lee, J. C.; Choi, Y. S.; Choi, Y. R.; Cho, J. W.; Jung, C. E.; Jeong, K. I.; Park, B.; Koo, I. S

    2009-11-15

    Development and enlargement of the high speed communication network make it possible the user to access online information easily. It generates changing offline activities to online in the economics, expansion of cultural interchanges and convenient life. But it also causes misuse, wiretapping, forgery and alteration of the information via illegal invasion(virus, hacking), and these are derived from the open network characteristic, weakness of the securities of the TCP/IP protocol and information systems. The security of individual and the national foundation facility(industry and government) can be threatened because of these problems, and theses can be used as a instrument of cyber-war. Many cyber security technologies have been developed to corp with the cyber threat. One of the most important national facility is the nuclear power plant and the necessity of the cyber security for the digital I and C of it have been proposed since middle of the 2000. KINS announced the regulation of the cyber security for the digital I and C of the nuclear power plant in 2007. The main concept of the cyber security for it is similar to the IT field that is treated as a leader of the cyber security. Because of the difference of the characteristics between the IT field and the nuclear industry, applying the cyber security technologies developed and used in the IT field to the nuclear industry has some critical constraints. We will analyze these problems and propose a cyber security method based on cryptograph and authentication for the I and C communication network in this report.

  6. A Survey On Biometric Security Technologies From Cloud Computing Perspective

    Directory of Open Access Journals (Sweden)

    Shivashish Ratnam

    2015-08-01

    Full Text Available Cloud computing is one of the rising technologies that takes set of connections users to the next level. Cloud is a technology where resources are paid as per usage rather than owned. One of the major challenges in this technology is Security. Biometric systems provide the answer to ensure that the rendered services are accessed only by a legal user or an authorized user and no one else. Biometric systems recognize users based on behavioral or physiological characteristics. The advantages of such systems over traditional validation methods such as passwords and IDs are well known and hence biometric systems are progressively gaining ground in terms of usage. This paper brings about a new replica of a security system where in users have to offer multiple biometric finger prints during Enrollment for a service. These templates are stored at the cloud providers section. The users are authenticated based on these finger print designed templates which have to be provided in the order of arbitrary numbers or imaginary numbers that are generated every time continuously. Both finger prints templates and images are present and they provided every time duration are encrypted or modified for enhanced security.

  7. Digital Libraries with Embedded Values: Combining Insights from LIS and Science and Technology Studies

    Science.gov (United States)

    Fleischmann, Kenneth R.

    2007-01-01

    In the digital age, libraries are increasingly being augmented or even replaced by information technology (IT), which is often accompanied by implicit assumptions of objectivity and neutrality, yet the field of science and technology studies (STS) has a long history of studying what values are embedded in IT and how they are embedded. This article…

  8. Reform of the National Security Science and Technology Enterprise

    National Research Council Canada - National Science Library

    Berry, William; Coffey, Timothy; DeYoung, Donald; Kadtke, James; Loeb, Cheryl

    2008-01-01

    A strong science and technology (S&T) program has been vitally important to American national security since World War II and has to date given the United States a strategic advantage over competitors...

  9. The Development of E-Library at Delta State University Library, Abraka

    African Journals Online (AJOL)

    The study is on the automation of Delta University Library Abraka. The processes involved in the acquisition of information communication technology equipments to complement the traditional Library Services were stated. Major issues discussed include acquisition of computers hardware and library software, telephone ...

  10. Information Technology Planning: Computers in the School Library--How Many Are Enough?

    Science.gov (United States)

    Simpson, Carol

    2002-01-01

    Describes the development of a formula to determine the needed quantity of computers for a school library. Four types of information technology activities (administrative, personal productive, class/group productive, online public access catalog) and several variables (age levels served, campus focus, number of staff, size of student body, average…

  11. Proposal for Implementing Multi-User Database (MUD) Technology in an Academic Library.

    Science.gov (United States)

    Filby, A. M. Iliana

    1996-01-01

    Explores the use of MOO (multi-user object oriented) virtual environments in academic libraries to enhance reference services. Highlights include the development of multi-user database (MUD) technology from gaming to non-recreational settings; programming issues; collaborative MOOs; MOOs as distinguished from other types of virtual reality; audio…

  12. RFID for libraries a practical guide

    CERN Document Server

    Pandian, M Paul

    2010-01-01

    Many modern technologies give the impression that they somehow work by magic, particularly when they operate automatically and their mechanisms are invisible. A technology called RFID (Radio Frequency Identification), which is relatively new, has exactly this characteristic. Librarians everywhere are closely watching RFID technology. Advances over using bar codes on library materials, RFID tags are being touted as a way to radically redesign how library materials are handled. But it is expensive. The tags are vulnerable to wear and tear and the technology is not fully developed. It's unclear what sort of return on investment (ROI) it provides. While it is common for libraries to now have information technology expertise within their organizations, RFID may appear unfamiliar. RFID for Libraries: A practical guide examines what RFID technology is and how it works. The book reviews the development of computer technology and its effects on library operations over the last couple of decades. Further examination fe...

  13. Shock Waves Science and Technology Library

    CERN Document Server

    2012-01-01

    This book, as a volume of the Shock Wave Science and Technology Reference Library, is primarily concerned with the fundamental theory of detonation physics in gaseous and condensed phase reactive media. The detonation process involves complex chemical reaction and fluid dynamics, accompanied by intricate effects of heat, light, electricity and magnetism - a contemporary research field that has found wide applications in propulsion and power, hazard prevention as well as military engineering. The seven extensive chapters contained in this volume are: - Chemical Equilibrium Detonation (S. Bastea and LE Fried) - Steady One-Dimensional Detonations (A Higgins) - Detonation Instability (HD Ng and F Zhang) - Dynamic Parameters of Detonation (AA Vasiliev) - Multi-Scaled Cellular Detonation (D Desbordes and HN Presles) - Condensed Matter Detonation: Theory and Practice (C Tarver) - Theory of Detonation Shock Dynamics (JB Bdzil and DS Stewart) The chapters are thematically interrelated in a systematic descriptive appro...

  14. The impact of medical technology on sense of security in the palliative home care setting.

    Science.gov (United States)

    Munck, Berit; Sandgren, Anna

    2017-03-02

    The increase in the use of medical devices in palliative home care requires that patients and next-of-kin feel secure. Therefore, the aim was to describe medical technology's impact on the sense of security for patients, next-of-kin and district nurses. Deductive content analysis was conducted on data from three previous studies, using the theoretical framework 'palliative home care as a secure base'. The use of medical technology was shown to have an impact on the sense of security for all involved. A sense of control was promoted by trust in staff and their competence in managing the technology, which was linked to continuity. Inner peace and being in comfort implied effective symptom relief facilitated by pain pumps and being relieved of responsibility. Health care professionals need to have practical knowledge about medical technology, but at the same time have an awareness of how to create and maintain a sense of security.

  15. Optical Disk Technology and the Library. Part 1: The Technology and Its Applications. Part 2: The National Library Videodisc Demonstration Project. Canadian Network Papers Number 9 = Technologie du Videodisque et la Bibliotheque. Premiere partie: La Technologie et ses Applications. Deuxieme partie: Projet de Demonstration du Videodisque a la Bibliotheque Nationale. Documents sur les Reseaux Canadiens Numero 9.

    Science.gov (United States)

    Duchesne, Roddy; Sonnemann, Sabine S.

    This report is intended to assist Canadian libraries in assessing potential library applications of optical disk technology. Part 1 provides a general outline of the technology and describes a number of library applications and projects. Descriptions are purposely general and illustrative in nature since the technology and its applications are…

  16. Central Libraries in Uncertain Times.

    Science.gov (United States)

    Kenney, Brian J.

    2001-01-01

    Discusses security and safety issues for public libraries, especially high-profile central facilities, in light of the September 11 terrorist attacks. Highlights include inspecting bags as patrons enter as well as exit; the need for security guidelines for any type of disaster or emergency; building design; and the importance of communication.…

  17. 76 FR 31350 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Science.gov (United States)

    2011-05-31

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2011-0357] Cruise Vessel Safety and Security Act of 2010, Available Technology AGENCY: Coast Guard, DHS. ACTION: Notice of request for comments... Security and Safety Act of 2010(CVSSA), specifically related to video recording and overboard detection...

  18. 76 FR 45645 - 10-Day Notice of Proposed Information Collection: Technology Security/Clearance Plans, Screening...

    Science.gov (United States)

    2011-07-29

    ...: Technology Security/Clearance Plans, Screening Records, and Non-Disclosure Agreements ACTION: Notice of... Information Collection: Technology Security/ Clearance Plans, Screening Records, and Non-Disclosure Agreements...: None. Respondents: Business and Nonprofit Organizations, Foreign Governments. Estimated Number of...

  19. 48 CFR 1252.239-70 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-10-01

    ... unclassified information technology resources. 1252.239-70 Section 1252.239-70 Federal Acquisition Regulations... of Provisions and Clauses 1252.239-70 Security requirements for unclassified information technology... Unclassified Information Technology Resources (APR 2005) (a) The Contractor shall be responsible for...

  20. Tinkering with Technology: A Library Workshop to Support 4-H Youth Development

    Science.gov (United States)

    Hendrix, Beth; Williamson, Evan

    2017-01-01

    When University of Idaho (UI) Extension brought the Idaho 4-H Teen Conference to UI's main campus, the conference organizers collaborated with UI librarians to organize a workshop in the library's newly established makerspace, the Making, Innovating, and Learning Laboratory (MILL). In the MILL, the students used cutting-edge technology to foster…

  1. Satellite Technology Contribution to Water and Food Security

    Science.gov (United States)

    Brown, Molly E.

    2010-01-01

    This slide presentation reviews the issue of supplies of food, the relationship to food security, the ability of all people to attain sufficient food for an active and healthy life, and the ability to use satellite technology and remote sensing to assist with planning and act as an early warning system.

  2. 48 CFR 3052.204-70 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-10-01

    ... unclassified information technology resources. 3052.204-70 Section 3052.204-70 Federal Acquisition Regulations... for unclassified information technology resources. As prescribed in (HSAR) 48 CFR 3004.470-3, insert a clause substantially the same as follows: Security Requirements for Unclassified Information Technology...

  3. Impact of information technology on the role of medical libraries in information managment: normative background

    Directory of Open Access Journals (Sweden)

    Anamarija Rožić-Hristovski

    1998-01-01

    Full Text Available Exponential growth of biomedical knowledge and information technology development is changing the infrastructure of health care systems, education and research. So medical libraries roles have shifted from managing containers of information toward influencing biomedical information resource content and education. These new tasks are formalised in modem American standards for medical libraries, stressing information management role in evolving environment.In Slovenia medical libraries also are aware of development imperative of information activities for advances in medicine. At one side they are faced with lack of specific guidelines for proactive action and on the other with inadequate assessment in legal documents and insufficient funding.

  4. The Black Belt Librarian: Real-World Safety & Security

    Science.gov (United States)

    Graham, Warren

    2012-01-01

    Sharing expertise gleaned from more than two decades as a library security manager, Graham demonstrates that libraries can maintain their best traditions of openness and public access by creating an unobtrusive yet effective security plan. In straightforward language, the author: (1) Shows how to easily set clear expectations for visitors'…

  5. Strategic Management for IT Services on Outsourcing Security Company

    Directory of Open Access Journals (Sweden)

    Lydia Wijaya

    2018-04-01

    Full Text Available Information Technology (IT is used by many organizations to enhance competitive advantage, but many outsource security firms have not used IT in their business processes. In this research, we will design Strategic Management for IT Services for outsourcing security company. We use an outsourcing security company as a case study of IT Strategy Management for IT Services development. The purpose of this study is to create an IT services strategy for security outsourcing companies. The framework used is the ITIL (Information Technology Infrastructure Library framework service strategy in strategy management for IT services process. There are several steps taken in the making of the strategy: (a Strategic assessment stage to analyzed internal and external factors of the company. (b Strategy generation by creating the strategic plan. (c Strategy execution to determine the tactical plan. And (d strategy measurement and evaluation. This study produced the proposed IT service system that suits the needs of the company in the form of strategic, tactical plans and strategy measurement. This result can be used as the foundations of IT service development in outsourcing security company. In the process of this study, we work closely with stakeholders; every work product has been verified and validated by stakeholders.

  6. Controlling hospital library theft.

    Science.gov (United States)

    Cuddy, Theresa M; Marchok, Catherine

    2003-04-01

    At Capital Health System/Fuld Campus (formerly Helene Fuld Medical Center), the Health Sciences Library lost many books and videocassettes. These materials were listed in the catalog but were missing when staff went to the shelves. The hospital had experienced a downsizing of staff, a reorganization, and a merger. When the library staff did an inventory, $10,000 worth of materials were found to be missing. We corrected the situation through a series of steps that we believe will help other libraries control their theft. Through regularly scheduling inventories, monitoring items, advertising, and using specific security measures, we have successfully controlled the library theft. The January 2002 inventory resulted in meeting our goal of zero missing books and videocassettes. We work to maintain that goal.

  7. Threats or threads: from usable security to secure experience

    DEFF Research Database (Denmark)

    Bødker, Susanne; Mathiasen, Niels Raabjerg

    2008-01-01

    While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing...... mainly on adjusting user behavior to behave securely. With our background in newer HCI perspectives we address secure interaction from the perspective of security technology as experience. We analyze a number of collected user stories to understand what happens when everyday users encounter security...... dependent technologies. We apply McCarthy & Wright's [12] experience framework to the security domain and our collected stories. We point out that there are significant differences between being secure and having a secure experience, and conclude that classical usable security, focus on people's immediate...

  8. Analysis of the Technology New Media Operation Mode and Its Enlightenment to Library Mobile Knowledge Service Platforms

    Directory of Open Access Journals (Sweden)

    Wang Junyu

    2017-12-01

    Full Text Available [Purpose/significance] Technology new media are the products of the combination of the technological information and new media communication tools. The innovation of contents, models and carriers are worth all kinds of knowledge service platforms’ reference. [Method/process] This paper selected the top ten new media of “Chinese Technology New Media Ranking in 2016” and combed the contents, communication channels, online and offline activities and profit models of the top ten media to analyze the characteristics of technology new media and the existing problems. [Result/conclusion] Library mobile knowledge service platforms should learn from these technology new media. In the future, library mobile knowledge service platforms should attract more users to take part in contributing knowledge on the basis of ensuring the content quality and form a model of information dissemination, online services and offline activities to make their own market competitiveness.

  9. NativeProtector: Protecting Android Applications by Isolating and Intercepting Third-Party Native Libraries

    OpenAIRE

    Hong , Yu-Yang; Wang , Yu-Ping; Yin , Jie

    2016-01-01

    Part 9: Software Security; International audience; An increasing number of Android developers are incorporating third-party native libraries in their applications for code reuse, CPU-intensive tasks and other purposes. However current Android security mechanism can not regulate the native code in applications well. Many approaches have been proposed to enforce security of Android applications, but few of them involve security of the native libraries in Android applications.In this paper, we p...

  10. Assessment of the Technological Changes Impact on the Sustainability of State Security System of Ukraine

    Directory of Open Access Journals (Sweden)

    Olexandr Yemelyanov

    2018-04-01

    Full Text Available Currently, the governments of many countries are facing with a lack of funds for financing programs for social protection of population. Among the causes of this problem, we can indicate the high unemployment rate, which, among other things, is due to implementation of labor-saving technologies. The purpose of this work is to study the impact of technological changes on the sustainability of the state social security system in Ukraine. The general approaches to the assessment of the stability of the state social security system are described. The simulation of the effect of economically efficient technological changes on the company’s income and expenses was carried out. Some patterns of such changes are established. The group of productive technological changes types is presented. The model is developed, and an indicator of the impact estimation of efficiently effective technological changes on the stability of the state social security system is proposed. The analysis of the main indicators of the state social security system functioning of Ukraine is carried out. The dynamics of indicators characterizing the labor market of Ukraine is analyzed. The influence of changes in labor productivity on costs and profits by industries of Ukraine is estimated. The evaluation of the impact of economically efficient technological changes in the industries of Ukraine on the stability of its state social security system is carried out. The different state authorities can use the obtained results for developing measures to manage the sustainability of the state social security system.

  11. Library/vendor relationships

    CERN Document Server

    Brooks, Sam

    2014-01-01

    A view of the mutual dependence between libraries and vendorsAs technology advances, libraries are forced to reach beyond their own resources to find effective ways to maintain accuracy and superior service levels. Vendors provide databases and integrated library systems that perform those functions for profit. Library/Vendor Relationships examines the increasing cooperation in which libraries find they must participate in, and vice versa, with the vendors that provide system infrastructure and software. Expert contributors provide insights from all sides of this unique collaboration, offering

  12. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  13. The Battle to Secure Our Public Access Computers

    Science.gov (United States)

    Sendze, Monique

    2006-01-01

    Securing public access workstations should be a significant part of any library's network and information-security strategy because of the sensitive information patrons enter on these workstations. As the IT manager for the Johnson County Library in Kansas City, Kan., this author is challenged to make sure that thousands of patrons get the access…

  14. PACFEST 2004 : enabling technologies for maritime security in the Pacific region.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Whitley, John B.; Chellis, Craig (Pacific Disaster Center, Kihei, HI)

    2005-06-01

    In October of 2003 experts involved in various aspects of homeland security from the Pacific region met to engage in a free-wheeling discussion and brainstorming (a 'fest') on the role that technology could play in winning the war on terrorism in the Pacific region. The result was a concise and relatively thorough definition of the terrorism problem in the Pacific region, emphasizing the issues unique to Island nations in the Pacific setting, along with an action plan for developing working demonstrations of advanced technological solutions to these issues. Since PacFest 2003, the maritime dimensions of the international security environment have garnered increased attention and interest. To this end, PacFest 2004 sought to identify gaps and enabling technologies for maritime domain awareness and responsive decision-making in the Asia-Pacific region. The PacFest 2004 participants concluded that the technologies and basic information building blocks exist to create a system that would enable the Pacific region government and private organizations to effectively collaborate and share their capabilities and information concerning maritime security. The proposed solution summarized in this report integrates national environments in real time, thereby enabling effective prevention and first response to natural and terrorist induced disasters through better use of national and regional investments in people, infrastructure, systems, processes and standards.

  15. 24-Hour Academic Libraries: Adjusting to Change

    Science.gov (United States)

    Bowman, Adam C.

    2013-01-01

    The purpose of this study was to explore the adaptive measures that academic libraries perform when implementing and operating a 24-hour schedule. Five in-depth interviews were conducted with current managerial-level librarians at 24-hour academic libraries. The exploratory interviews revealed similar measures for security, budgeting, employee…

  16. Sharing of information and knowledge among staff in King Abdullah University of Science and Technology (KAUST) library

    KAUST Repository

    Ramli, Rindra M.

    2011-03-01

    This paper describes strategies and initiatives undertaken by the King Abdullah University of Science and Technology (KAUST) library in sharing information and knowledge among its staff. KAUST Library adopted several IT platforms to enable staff to contribute, share, collaborate, extract and act upon knowledge in order to serve our users better. They include: Sharepoint and Google Docs. As Duffy (2000) stated, that “success depends on capitalizing on every available resource including what a company knows and how it uses what it knows”. Therefore, to provide value-added services to our community of researchers and academicians, library staff needs to be equipped with the right skills and tools to be able to act upon users’ inquiries and information needs. KAUST library which was opened in Aug 2009 aims to support education and advanced scientific research. With its state of the art learning and information resource center, the library provides instructional assistance and reference services to its research and academic community. With the influx of information coupled the pervasive use of information technology and Web2.0, the library has to grapple with the issue of information overload. It is important to be able to sieve through the rubbles of information to apply the relevant ones during the point of transaction. Based on our experience in using various IT platforms, this paper will share the impacts of such tools. Lessons learnt and future directions in this area will also be discussed.

  17. Implementing Information Security and Its Technology: A LineManagement Perspective

    Energy Technology Data Exchange (ETDEWEB)

    Barletta, William A.

    2005-08-22

    Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

  18. 76 FR 41274 - Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2011-07-13

    ..., cyber-security, knowledge management and how best to leverage related technologies funded by other... Science and Technology Advisory Committee (HSSTAC) ACTION: Committee Management; Notice of Federal... FURTHER INFORMATION CONTACT: Mary Hanson, HSSTAC Executive Director, Science and Technology Directorate...

  19. Tomorrow's Library: The American View.

    Science.gov (United States)

    Dempsey, Mary A.

    1998-01-01

    Explores the continuing role of the public library in society, discussing the mission of the library (highlights the Chicago Public Library's new mission statement), funding collections and buildings, technology, capital improvements, challenges to intellectual freedom, librarian education, library outreach, and private-sector partnerships. (PEN)

  20. Debunking the Computer Science Digital Library: Lessons Learned in Collection Development at Seneca College of Applied Arts & Technology

    Science.gov (United States)

    Buczynski, James Andrew

    2005-01-01

    Developing a library collection to support the curriculum of Canada's largest computer studies school has debunked many myths about collecting computer science and technology information resources. Computer science students are among the heaviest print book and e-book users in the library. Circulation statistics indicate that the demand for print…

  1. E-library Implementation in Library University of Riau

    Science.gov (United States)

    Yuhelmi; Rismayeti

    2017-12-01

    This research aims to see how the e-book implementation in Library University of Riau and the obstacle in its implementation. In the Globalization era, digital libraries should be developed or else it will decrease the readers’ interest, with the recent advanced technology, digital libraries are one of the learning tools that can be used to finding an information through the internet access, hence digital libraries or commonly known as E-Library is really helping the students and academic community in finding information. The methods that used in this research is Observation, Interview, and Literature Study. The respondents in this research are the staff who involved in the process of digitization in Library University of Riau. The result of this research shows that implementation of e-library in Library University of Riau is already filled the user needs for now, although there is obstacle faced just like technical problems for example the internet connection speed and the technical problem to convert the format from Microsoft Word .doc to Adobe.pdf

  2. Virtual Libraries: Service Realities.

    Science.gov (United States)

    Novak, Jan

    2002-01-01

    Discussion of changes in society that have resulted from information and communication technologies focuses on changes in libraries and a new market for library services with new styles of clients. Highlights client service issues to be considered when transitioning to a virtual library situation. (Author/LRW)

  3. Factors affecting food security and contribution of modern technologies in food sustainability.

    Science.gov (United States)

    Premanandh, Jagadeesan

    2011-12-01

    The concept of food insecurity is complex and goes beyond the simplistic idea of a country's inability to feed its population. The global food situation is redefined by many driving forces such as population growth, availability of arable lands, water resources, climate change and food availability, accessibility and loss. The combined effect of these factors has undeniably impacted global food production and security. This article reviews the key factors influencing global food insecurity and emphasises the need to adapt science-based technological innovations to address the issue. Although anticipated benefits of modern technologies suggest a level of food production that will sustain the global population, both political will and sufficient investments in modern agriculture are needed to alleviate the food crisis in developing countries. In this globalised era of the 21st century, many determinants of food security are trans-boundary and require multilateral agreements and actions for an effective solution. Food security and hunger alleviation on a global scale are within reach provided that technological innovations are accepted and implemented at all levels. Copyright © 2011 Society of Chemical Industry.

  4. Creating Tomorrow's Technologists: Contrasting Information Technology Curriculum in North American Library and Information Science Graduate Programs against Code4lib Job Listings

    Science.gov (United States)

    Maceli, Monica

    2015-01-01

    This research study explores technology-related course offerings in ALA-accredited library and information science (LIS) graduate programs in North America. These data are juxtaposed against a text analysis of several thousand LIS-specific technology job listings from the Code4lib jobs website. Starting in 2003, as a popular library technology…

  5. After globalization future security in a technology rich world

    Energy Technology Data Exchange (ETDEWEB)

    Gilmartin, T J

    2000-02-12

    Over the course of the year 2000, five one-day workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats that might come against the US and its allies in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. In December, an Integration Workshop and Senior Review before national leaders and experts were held. The participants and reviewers were invited from the DOE National Laboratories, the DOD Services, OSD, DTRA, and DARPA, the DOS, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on national security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. We were not concerned in this exercise with defining responses, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be countered. At the concluding Integration Workshop and Senior Panel Review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and responsibility, and discussed the workshop findings to determine what is most certain, and uncertain, and what might be needed to resolve our uncertainties. This document reports the consensus and important variations of both the reviewers and the participants. In all, 45 threats over a wide range of lethality and probability of occurrence were identified. Over 60 enabling technologies were also discussed. These are

  6. Relevance of Clean Coal Technology for India’s Energy Security: A Policy Perspective

    Science.gov (United States)

    Garg, Amit; Tiwari, Vineet; Vishwanathan, Saritha

    2017-07-01

    Climate change mitigation regimes are expected to impose constraints on the future use of fossil fuels in order to reduce greenhouse gas (GHG) emissions. In 2015, 41% of total final energy consumption and 64% of power generation in India came from coal. Although almost a sixth of the total coal based thermal power generation is now super critical pulverized coal technology, the average CO2 emissions from the Indian power sector are 0.82 kg-CO2/kWh, mainly driven by coal. India has large domestic coal reserves which give it adequate energy security. There is a need to find options that allow the continued use of coal while considering the need for GHG mitigation. This paper explores options of linking GHG emission mitigation and energy security from 2000 to 2050 using the AIM/Enduse model under Business-as-Usual scenario. Our simulation analysis suggests that advanced clean coal technologies options could provide promising solutions for reducing CO2 emissions by improving energy efficiencies. This paper concludes that integrating climate change security and energy security for India is possible with a large scale deployment of advanced coal combustion technologies in Indian energy systems along with other measures.

  7. A Study Of Cyber Security Challenges And Its Emerging Trends On Latest Technologies

    OpenAIRE

    Reddy, G. Nikhita; Reddy, G. J. Ugander

    2014-01-01

    Cyber Security plays an important role in the field of information technology .Securing the information have become one of the biggest challenges in the present day. When ever we think about the cyber security the first thing that comes to our mind is cyber crimes which are increasing immensely day by day. Various Governments and companies are taking many measures in order to prevent these cyber crimes. Besides various measures cyber security is still a very big concern to many. This paper ma...

  8. Mobile Technology: The Foundation for an Engaged and Secure Campus Community

    Science.gov (United States)

    Chapel, Edward

    2008-01-01

    Montclair State University, a public New Jersey institution with more than 17,000 students enrolled, has harnessed the cell phone and cellular broadband technology to foster a stronger sense of community and provide students with a safe, secure, and rich learning environment. This paper discusses the potential for new technologies to foster…

  9. Performance Testing of Homeland Security Technologies in U.S. EPA's Environmental Technology Verification (ETV) Program

    National Research Council Canada - National Science Library

    Kelly, Thomas J; Hofacre, Kent C; Derringer, Tricia L; Riggs, Karen B; Koglin, Eric N

    2004-01-01

    ... (reports and test plans available at www.epa.gov/etv). In the aftermath of the terrorist attacks of September 11, 2001, the ETV approach has also been employed in performance tests of technologies relevant to homeland security (HS...

  10. Content Management for the Virtual Library

    Directory of Open Access Journals (Sweden)

    Ed Salazar

    2006-09-01

    Full Text Available Traditional, larger libraries can rely on their physical collection, coffee shops, and study rooms as ways to entice patrons into their library. Yet virtual libraries merely have their online presence to attract students to resources. This can only be achieved by providing a fully functional site that is well designed and organized, allowing patrons to navigate and locate information easily. One such technology significantly improving the overall usefulness of Web sites is a content management system (CMS. Although the CMS is not a novel technology per se, it is a technology smaller libraries cannot afford to ignore. In the fall of 2004, the Northcentral University Electronic Learning Resources Center (ELRC, a small, virtual library, moved from a static to a database-driven Web site. This article explains the importance of a CMS for the virtual or smaller library and describes the methodology used by ELRC to complete the project.

  11. Tomorrow's Research Library: Vigor or Rigor Mortis?

    Science.gov (United States)

    Hacken, Richard D.

    1988-01-01

    Compares, contrasts, and critiques predictions that have been made about the future of research libraries, focusing on the impact of technology on the library's role and users' needs. The discussion includes models for the adaptation of new technologies that may assist in library planning and change. (38 references) (CLB)

  12. Promoter library-based module combination (PLMC) technology for optimization of threonine biosynthesis in Corynebacterium glutamicum.

    Science.gov (United States)

    Wei, Liang; Xu, Ning; Wang, Yiran; Zhou, Wei; Han, Guoqiang; Ma, Yanhe; Liu, Jun

    2018-05-01

    Due to the lack of efficient control elements and tools, the fine-tuning of gene expression in the multi-gene metabolic pathways is still a great challenge for engineering microbial cell factories, especially for the important industrial microorganism Corynebacterium glutamicum. In this study, the promoter library-based module combination (PLMC) technology was developed to efficiently optimize the expression of genes in C. glutamicum. A random promoter library was designed to contain the putative - 10 (NNTANANT) and - 35 (NNGNCN) consensus motifs, and refined through a three-step screening procedure to achieve numerous genetic control elements with different strength levels, including fluorescence-activated cell sorting (FACS) screening, agar plate screening, and 96-well plate screening. Multiple conventional strategies were employed for further precise characterizations of the promoter library, such as real-time quantitative PCR, sodium dodecyl sulfate polyacrylamide gel electrophoresis, FACS analysis, and the lacZ reporter system. These results suggested that the established promoter elements effectively regulated gene expression and showed varying strengths over a wide range. Subsequently, a multi-module combination technology was created based on the efficient promoter elements for combination and optimization of modules in the multi-gene pathways. Using this technology, the threonine biosynthesis pathway was reconstructed and optimized by predictable tuning expression of five modules in C. glutamicum. The threonine titer of the optimized strain was significantly improved to 12.8 g/L, an approximate 6.1-fold higher than that of the control strain. Overall, the PLMC technology presented in this study provides a rapid and effective method for combination and optimization of multi-gene pathways in C. glutamicum.

  13. Food Security, Institutional Framework and Technology: Examining the Nexus in Nigeria Using ARDL Approach.

    Science.gov (United States)

    Osabohien, Romanus; Osabuohien, Evans; Urhie, Ese

    2018-04-01

    Growth in agricultural science and technology is deemed essential for in-creasing agricultural output; reduce the vulnerability of rural poverty and in turn, food security. Food security and growth in agricultural output depends on technological usages, which enhances the pro-ductive capacity of the agricultural sector. The indicators of food security utilised in this study in-clude: dietary energy supply, average value of food production, prevalence of food inadequacy, among others. In this paper, we examined the level of technology and how investment in the agriculture and technology can improve technical know-how in Nigeria with a view to achieving food security. We carried out the analysis on how investment in technology and institutional framework can improve the level of food availability (a key component of food security) in Nigeria using econ-ometric technique based on Autoregressive Distribution Lag (ARDL) framework. The results showed, inter alia, that in Nigeria, there is a high level of food insecurity as a result of low attention on food production occasioned by the pervasive influence of oil that become the major export product. It was noted that the availability of arable land was one of the major factors to increase food production to solve the challenge of food insecurity. Thus, the efforts of reducing the rate of food insecurity are essential in this regards. This can also be achieved, among others, by active interactions between government and farmers, to make contribution to important planning issues that relate to food production in the country and above all, social protection policies should be geared or channelled to agricultural sector to protect farmers who are vulnerable to shocks and avert risks associated with agriculture.

  14. Advanced technologies: Trends and implications for security

    International Nuclear Information System (INIS)

    Shaw, A.

    1990-01-01

    As the world moves towards the close of the twentieth century, three technological trends will strongly influence security. In order of importance they are: first, the increasing globalization of the ability to develop and use high technology, much of which has both civilian and military applications; secondly, the broad dissemination of militarily-relevant technology world-wide; and thirdly, the continued development by the United States and the USSR (and a few other nations) of advanced technology for military applications. The military balance between the super-Powers and their allies has been strongly rooted in advancing military technology. Great changes in technology have resulted in adjustments -mostly in limited aspects such as the armour/ anti-armour balance - but have not caused it to change wildly. This seems likely to remain the case for the foreseeable future. There are arguments that Western technology has been a prime causative factor behind Soviet willingness to engage in negotiations to reduce forces. They claim that fear of the Strategic Defense Initiative is behind progress in the Strategic Arms Reduction Talks, and that perceived Western mastery of the technology for systems combining quick reaction, deep strike and high kill probabilities led the Soviet Union to reassess its potential for a successful land campaign in Europe. If current arms control negotiations are successful, the momentum is maintained, and other political changes take hold, the military balance could be taken to a point where ft would not be very sensitive to technological change. One should be aware that the arms control negotiations are very complex, primarily because of technological issues, and we should not yet bank on it all working out well. If it fails, the military technical competition will heat up again. Even under a strict arms control regime we can expect the competition to continue as each side seeks to develop counters to what ft sees as the other side

  15. E-Commerce for Library Promotion and Sustainability: How Library Technicians Can Market Themselves and Their Library's Services Online

    Science.gov (United States)

    von Retzlaff, Lothar

    2006-01-01

    As players in the delivery of services and online information, libraries are in the best position to use staff expertise and the technology they have developed to foster community awareness of social, professional and commercial interactions on the internet. Historically, libraries have been progressive institutions, undertaking constant…

  16. Report of the National Libraries Committee.

    Science.gov (United States)

    Department of Education and Science, London (England).

    The study was undertaken to examine the functions and organization of the British Museum Library, the National Central Library, the National Lending Library for Science and Technology, and the Science Museum Library in providing national library facilities; to consider whether in the interests of efficiency and economy such facilities should be…

  17. Microsoft Technology as an Optimization Tool in Promoting Security and Functionality of the Educational System

    Directory of Open Access Journals (Sweden)

    Jelena Jardas Antonic

    2008-10-01

    Full Text Available Abstract - In the cooperation with the City of Rijeka, the project of analysis of the functional and security situation of information infrastructure has been initiated in 24 schools in the authority of the city. Having completed the multicriteria analysis of the collected data, we have built a model of implementing Microsoft service technologies. The implementation should satisfy the elementary security principles that are required by the security standards today, maximizing functionality of infrastructure and minimizing network administration tasks. Server technology that has been used in this solution is Microsoft Widows 2003 Server R2 and Internet Security and Acceleration Server 2006, as well as the GFI WebMonitor and antivirus.

  18. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  19. STAR Library Education Network: a hands-on learning program for libraries and their communities

    Science.gov (United States)

    Dusenbery, P.

    2010-12-01

    Science and technology are widely recognized as major drivers of innovation and industry (e.g. Rising above the Gathering Storm, 2006). While the focus for education reform is on school improvement, there is considerable research that supports the role that out-of-school experiences can play in student achievement and public understanding of STEM disciplines. Libraries provide an untapped resource for engaging underserved youth and their families in fostering an appreciation and deeper understanding of science and technology topics. Designed spaces, like libraries, allow lifelong, life-wide, and life-deep learning to take place though the research basis for learning in libraries is not as developed as other informal settings like science centers. The Space Science Institute’s National Center for Interactive Learning (NCIL) in partnership with the American Library Association (ALA), the Lunar and Planetary Institute (LPI), and the National Girls Collaborative Project (NGCP) have received funding from NSF to develop a national education project called the STAR Library Education Network: a hands-on learning program for libraries and their communities (or STAR-Net for short). STAR stands for Science-Technology, Activities and Resources. The overarching goal of the project is to reach underserved youth and their families with informal STEM learning experiences. This project will deepen our knowledge of informal/lifelong learning that takes place in libraries and establish a learning model that can be compared to the more established free-choice learning model for science centers and museums. The project includes the development of two STEM hands-on exhibits on topics that are of interest to library staff and their patrons: Discover Earth and Discover Tech. In addition, the project will produce resources and inquiry-based activities that libraries can use to enrich the exhibit experience. Additional resources will be provided through partnerships with relevant

  20. 9th International Bielefeld Conference 2009: Upgrading the eLibrary: Enhanced Information Services Driven by Technology and Economics

    Directory of Open Access Journals (Sweden)

    Almuth Gastinger

    2009-10-01

    Full Text Available Thisarticle reports on the 9th International Bielefeld Conference ‘Upgrading the eLibrary: Enhanced Information Services Driven by Technology and Economics’, 3-5 February 2009, in Bielefeld, Germany. The conference focused on future challenges for libraries regarding the development of information services and infrastructures that meet the changing needs of scholarly communication, collaboration (e-science and publication (open access as well as new requirements regarding teaching and learning (virtual learning spaces. In addition attention was paid to economic conditions and strategic positioning of libraries as a general framework for information services.

  1. The Rise of the Digital Public Library

    Science.gov (United States)

    McKendrick, Joseph

    2012-01-01

    There is a growing shift to digital offerings among public libraries. Libraries increasingly are fulfilling roles as technology hubs for their communities, with high demand for technology and career development training resources. Ebooks and other digital materials are on the rise, while print is being scaled back. More libraries are turning to…

  2. New Strategies in Library Services Organization: Consortia University Libraries in Spain

    Directory of Open Access Journals (Sweden)

    Miguel Duarte Barrionuevo

    2017-09-01

    Full Text Available New political, economic, and technological developments, as well as the growth of information markets, in Spain have created a foundation for the creation of library consortia. The author describes the process by which different regions in Spain have organized university library consortia.

  3. M-libraries 4 from margin to mainstream : mobile technologies transforming lives and libraries

    CERN Document Server

    Ally, Mohamed

    2014-01-01

    A brand new edition of the highly successful M-Libraries series, this draws together cutting-edge international contributions from the leading authorities in the field. It explores the variety of work that libraries are doing across the world to deliver resources to users via mobile and hand-held devices.

  4. User Characteristics、User Involvement and Technology Acceptance in Library Automation System Usage

    Directory of Open Access Journals (Sweden)

    Piching Chu

    2002-12-01

    Full Text Available This paper looks into the relationship of user characteristics, user involvement and technology acceptance, also try to find the relationship of the above three variables and library automation system usage. By interview and questionnaire study, the results are described, according to the analysis of the relative literature and the main conclusions, the researcher offers some suggestions for improving the system usage.[Article content in Chinese

  5. Library 2.0 A New Service Model For Libraries

    Directory of Open Access Journals (Sweden)

    Agnes Erich

    2007-01-01

    Full Text Available The utilization of the new information and communication technologies implies a series of changes concerning the libraries. Currently it is spoken more and more about a new type of service offered by them, Library 2.0, which brings in foreground the user who becomes a modeler of the library services and resources. The information structures customer is not satisfied anymore by the unidirectional access to the resources, he wanted to be involved in the evaluation of them, making comments and sharing his ideas with another user. In this sense the library managers are looking for more efficient means to deliver services so that to obtain a proper feedback which enable them to take the best measures to make profitable them. Library 2.0 can be a solution for all these problems.

  6. A Model of Building Multi-campus Library Education Resourses Network Based on MPLS VPN

    Directory of Open Access Journals (Sweden)

    WANG Guang-ze

    2017-06-01

    Full Text Available For the problems of most merged schools that it is difficulty to integrate the original library education resources network due to scattered campus,and it is inconvenient to use teaching resources for outwork teachers and students,this paper puts forward the technology of using multi - protocol label switching virtual private network ( MPLS VPN to integrate education resources in multi - campus library. Through setting up security tunnel between the library education subnet,MPLS VPN ensure the safety of data transmission,so as achieve the goal of resource integration,optimization and share,implements the exclusive use for the electronic teaching business of library. Experimental data show that this model has advantages compared with traditional VPN networking.

  7. The role of an academic library in research: researchers’ perspectives at a South African University of Technology

    Directory of Open Access Journals (Sweden)

    Genevieve Hart

    2011-01-01

    Full Text Available Academic libraries typically identify research support as a central pillar in their mission. But they need to examine how their mission statements relate to the perspectives of researchers themselves, especially in view of reported changes in researchers’ information seeking and sharing in the online environment. By means of a questionnaire survey of 102 full time academic staff at the Cape Peninsula University of Technology, the project examined how researchers use their institution’s library in their research and what their expectations are. For various historical reasons universities of technology lag behind in terms of their research output and in recent years CPUT has prioritised research. This is reflected in the virtual unanimity among the 102 respondents that research is essential to their job despite their heavy teaching loads. Overall, the study finds that most (over 65% continue to rely on the library for access to print and electronic resources. It finds a heavy emphasis on the traditional functions of an academic library, such as resource and information management. A few gaps emerge between the delivery of library services and researchers’ desires. For example, very few attend the library’s scheduled database training workshops; yet most see database training as one of the library’s key contributions to research. The most pressing desire is to be kept informed of new research in their fields; yet only a minority experience this level of service and less than half express confidence in the discipline knowledge of librarians.

  8. ShockWave science and technology reference library

    CERN Document Server

    2007-01-01

    This book is the first of several volumes on solids in the Shock Wave Science and Technology Reference Library. These volumes are primarily concerned with high-pressure shock waves in solid media, including detonation, high-velocity impact, and penetration. Of the eight chapters in this volume three chapters survey recent, exciting experimental advances in - ultra-short shock dynamics at the atomic and molecular scale (D.S. More, S.D. Mcgrane, and D.J. Funk), - Z accelerator for ICE and Shock compression (M.D. Knudson), and - failure waves in glass and ceramics (S.J. Bless and N.S. Brar). The subsequent four chapters are foundational, and cover the subjects of - equation of state (R. Menikoff), - elastic-plastic shock waves (R. Menikoff), - continuum plasticity (R. M. Brannon), and - numerical methods (D. J. Benson). The last chapter, but not the least, describes a tour de force illustration of today’s computing power in - modeling heterogeneous reactive solids at the grain scale (M.R. Baer). All chapters a...

  9. Shock wave science and technology reference library

    CERN Document Server

    2009-01-01

    This book, as a volume of the Shock Wave Science and Technology Reference Library, is primarily concerned with detonation waves or compression shock waves in reactive heterogeneous media, including mixtures of solid, liquid and gas phases. The topics involve a variety of energy release and control processes in such media - a contemporary research field that has found wide applications in propulsion and power, hazard prevention as well as military engineering. The six extensive chapters contained in this volume are: - Spray Detonation (SB Murray and PA Thibault) - Detonation of Gas-Particle Flow (F Zhang) - Slurry Detonation (DL Frost and F Zhang) - Detonation of Metalized Composite Explosives (MF Gogulya and MA Brazhnikov) - Shock-Induced Solid-Solid Reactions and Detonations (YA Gordopolov, SS Batsanov, and VS Trofimov) - Shock Ignition of Particles (SM Frolov and AV Fedorov) Each chapter is self-contained and can be read independently of the others, though, they are thematically interrelated. They offer a t...

  10. Shock wave science and technology reference library

    CERN Document Server

    2009-01-01

    This book is the second of several volumes on solids in the Shock Wave Science and Technology Reference Library. These volumes are primarily concerned with high-pressure shock waves in solid media, including detonation and high-velocity impact and penetration events. Of the four extensive chapters in this volume, the first two describe the reactive behavior of condensed phase explosives, - Condensed-Phase Explosives: Shock Initiation and Detonation Phenomena (SA Sheffield and R Engelke) - First Principles Molecular Simulations of Energetic Materials at High-Pressures (F Zhang, S Alavi, and TK Woo), and the remaining two discuss the inert, mechanical response of solid materials. - Combined Compression and Shear Plane Waves (ZP Tang and JB Aidun), and - Dynamic Fragmentation of Solids (D Grady). All chapters are each self-contained, and can be read independently of each other. They offer a timely reference, for beginners as well as professional scientists and engineers, on the foundations of detonation phenomen...

  11. Europe, Middle East and North Africa Conference on Technology and Security to Support Learning 2016

    CERN Document Server

    Serrhini, Mohammed; Felgueiras, Carlos

    2017-01-01

    This book contains a selection of articles from The Europe, Middle East and North Africa Conference on Technology and Security to Support Learning 2016 (EMENA-TSSL'16), held between the 3th and 5th of October at Saidia, Oujda, Morocco. EMENA-TSSL'16 is a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences and challenges in Information & Communication Technologies, and Security to support Learning. The main topics covered are: A) Online Education; B) Emerging Technologies in Education; C) Artificial Intelligence in Education; D) Gamification and Serious games; E) Network & Web Technologies Applications; F) Online experimentation and Virtual Laboratories; G) Multimedia Systems and Applications; H) Security and Privacy; I) Multimedia, Computer Vision and Image Processing; J) Cloud, Big Data Analytics and Applications; K) Human-Computer Interaction; L) Software Systems, Architectures, Applications and Tools; M) Onli...

  12. Libraries in society

    DEFF Research Database (Denmark)

    Kristiansson, Michael; Skouvig, Laura Henriette Christine

    2008-01-01

    The purpose of the paper is to investigate the phenomenon of openness in relation to library development. The term openness is presented and related to library development from historical and theoretical perspectives. The paper elaborates on the differences over time on to how openness has been...... understood in a library setting. Historically, openness in form of the open shelves played a crucial role in developing the modern public library. The paper examines this openness-centred library policy as adopted by Danish public libraries in the beginning of the 20th century by applying the theories...... by Michel Foucault on discourse and power to the introduction of open shelves. Furthermore, the paper discusses current challenges facing the modern public library in coping with openness issues that follow from changes in society and advances in technology. These influences and developments are not least...

  13. Information and communication technologies for knowledge management in academic libraries in Nigeria and South Africa

    Directory of Open Access Journals (Sweden)

    Rexwhite T. Enakrire

    2017-05-01

    improve the understanding of how librarians manage the organisation in present-day library operations. We recommend that staff development be intensified to enable how librarians could cope with changes and new technologies for modern information services being encouraged and acquired. This article provides a unique long-term survey on the use of ICT facilities and services, strategy and structure in an academic and/or university library services.

  14. RFID技术在高校图书馆的应用与研究%RFID technology application and research in university library

    Institute of Scientific and Technical Information of China (English)

    王铁; 董四十九

    2012-01-01

    简要论述了RFID技术在高校图书馆的应用与研究,对UHF-RFID和HF-RFID技术在图书馆中的应用进行了比较,对UHF-RFID在未来图书馆发展中的作用进行了展望。%This paper briefly discussed the RFID technology application and research in university library, UHF-RFID and HF-RFID technology application in library were compared, put forward UHF-RFID development and its application prospects in future library.

  15. MUSES RT2AE V P/DP: On the Road to Privacy-Friendly Security Technologies in the Workplace

    OpenAIRE

    Van Der Sype, Yung Shin Marleen; Guislain, Jonathan; Seigneur, Jean-Marc; Titi, Xavier

    2016-01-01

    Successful protection of company data assets requires strong technological support. As many security incidents still occur from within, security technologies often include elements to monitor the behaviour of employees. As those security systems are considered as privacy-intrusive, they are hard to align with the privacy and data protection rights of the employees of the company. Even though there is currently no legal obligation for developers to embed privacy and data protection in security...

  16. Libraries Today, Libraries Tomorrow: Contemporary Library Practices and the Role of Library Space in the L

    Directory of Open Access Journals (Sweden)

    Ana Vogrinčič Čepič

    2013-09-01

    Full Text Available ABSTRACTPurpose: The article uses sociological concepts in order to rethink the changes in library practices. Contemporary trends are discussed with regard to the changing nature of working habits, referring mostly to the new technology, and the (emergence of the third space phenomenon. The author does not regard libraries only as concrete public service institutions, but rather as complex cultural forms, taking in consideration wider social context with a stress on users’ practices in relation to space.Methodology/approach: The article is based on the (self- observation of the public library use, and on the (discourse analysis of internal library documents (i.e. annual reports and plans and secondary sociological literature. As such, the cultural form approach represents a classic method of sociology of culture.Results: The study of relevant material in combination with direct personal experiences reveals socio-structural causes for the change of users’ needs and habits, and points at the difficulty of spatial redefinition of libraries as well as at the power of the discourse.Research limitations: The article is limited to an observation of users’ practices in some of the public libraries in Ljubljana and examines only a small number of annual reports – the discoveries are then further debated from the sociological perspective.Originality/practical implications: The article offers sociological insight in the current issues of the library science and tries to suggest a wider explanation that could answer some of the challenges of the contemporary librarianship.

  17. Library Technology and Architecture; Report of a Conference Held at the Harvard Graduate School of Education, February 9, 1967.

    Science.gov (United States)

    Harvard Univ., Cambridge, MA. Graduate School of Education.

    The purpose of the conference was to investigate the implications of new technologies for library architecture and to use the findings in planning new Library Research Facility for the Harvard Graduate School of Education. The first half of this document consists of reports prepared by six consultants on such topics as microforms, computers,…

  18. Audit Teknologiinformasiatas Physical Security Control Dan Logical Security Control Serta Penentuan Kondisi Security Risk Studi Kasus: PT Talc Indonesia

    OpenAIRE

    Inggrid; Arfianti, Rizka I; Utami, Viany

    2009-01-01

    Abstract The fast growth of technology has an impact to the accounting field. This relates to the term of information technology (17) auditing. One of the risI6 of using information technology in business which can be fatal enough i fignored is security risk Security risk can be reduced by security controls which include physical security control and logical security contra Information technology auditing is the process of collecting and evaluating evidence to determine whether or not a co...

  19. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  20. The Importance of the Brain Neuro-Programming Technologies in National and Regional Security

    Directory of Open Access Journals (Sweden)

    Vasyl H. Fatkhutdinov

    2018-02-01

    Full Text Available The authors’ understanding of neuro-programming is the result of the impact on the human brain of information and communication technology (including educational one, through which in the human brain the programs of manifestation in the ontogenesis of internal creative potentials are written. This article summarizes the history of the formation of key neuro-programming technologies of the human brain as well as proves that the changes in the society’s worldview are caused by the possibilities and quality of neuro-programming technologies that society uses. Having influence over worldview stereotypes and behaviour set by the society, neuro-programming technologies essentially ensure the national security of any state and the peaceful coexistence of states in the regions and on the planet as a whole. Using historical and philosophical methods, methods of conceptualization, systematization, modeling, etc., the authors have come to the conclusion that the modern world lies in a confrontation of security strategies, in which neuro-programming technologies play a key role.

  1. Microcomputers in the Anesthesia Library.

    Science.gov (United States)

    Wright, A. J.

    The combination of computer technology and library operation is helping to alleviate such library problems as escalating costs, increasing collection size, deteriorating materials, unwieldy arrangement schemes, poor subject control, and the acquisition and processing of large numbers of rarely used documents. Small special libraries such as…

  2. The challenges of library automation in Nigerian universities of ...

    African Journals Online (AJOL)

    The challenges of library automation in Nigerian universities of technology: the example of ... library functions in Federal University of Technology library, Owerri, Imo State. ... Findings reveal that insufficient power supply, poor funding, poor ...

  3. Library and Education

    Directory of Open Access Journals (Sweden)

    Gheorghe Buluţă

    2011-01-01

    Full Text Available The psycho-social phenomena generated by mass-media and the new information and communication technologies at the level of the young generations have led to new communication practices that bypass libraries and revolutionized the intellectual labor practices, with texts being rather used than read. In this context, our article examines the need to increase the library's role in developing the quality of education and research and brings to attention a few possible solutions which include a partnership between various types of libraries and between librarians' associations and NGOs to facilitate education through library and safeguard reading.

  4. Human Resource Development in Hybrid Libraries

    OpenAIRE

    Prakasan, E. R.; Swarna, T.; Vijai Kumar, *

    2000-01-01

    This paper explores the human resources and development implications in hybrid libraries. Due to technological changes in libraries, which is a result of the proliferation of electronic resources, there has been a shift in workloads and workflow, requiring staff with different skills and educational backgrounds. Training of staff at all levels in information technology is the key to manage change, alleviate anxiety in the workplace and assure quality service in the libraries. Staff developmen...

  5. Delivering Library Services to Remote Students.

    Science.gov (United States)

    Casado, Margaret

    2001-01-01

    Discusses library services at the University of Tennessee to reach off-campus and distance education students. Topics include online research; email; library instruction for faculty and students; Web interfaces; fax; telephone service; chat technology; the library's Web page; virtual classrooms; library links from a course management system; and…

  6. Library Informational Technology Workers: Their Sense of Belonging, Role, Job Autonomy and Job Satisfaction

    Science.gov (United States)

    Lim, Sook

    2007-01-01

    This study examines the characteristics of library information technology (IT) workers using a mail survey. The IT workers showed a moderate level of a sense of belonging, playing the broker's role, job autonomy, and job satisfaction. There were differences between librarian IT workers and non-librarian IT workers regarding most of these…

  7. The Effects of Information Technology on Library and Documentation Centers: A Review of Social, Structural, Managerial and Functional Aspects

    Directory of Open Access Journals (Sweden)

    Mesut Kurulgan

    2013-11-01

    Full Text Available In the context of protecting academic and cultural heritage, the purpose of libraries and information and documentation centers is to research, document, and archive and to transfer to future generations, domestically and internationally, a society ’s culture. This study examines the structural, functional and administrative innovations that have resulted from the implementation of information technology (IT in libraries since the 1990 ’s. The study also mentions how IT can be used in an efficient way in libraries and information and documentation centers.

  8. The Evolving Relationship Between Technology and National Security in China: Innovation, Defense Transformation, and China’s Place in the Global Technology Order

    Science.gov (United States)

    2016-02-12

    Stockmann, Xiao Qiang. Changing Media, Changing China , New York: Oxford University Press, (01 2011) Dieter Ernst. Indigenous Innovation and...2211 China , science, technology, dual use, defense, security, innovation REPORT DOCUMENTATION PAGE 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 10...ABSTRACT Final Report: The Evolving Relationship Between Technology and National Security in China : Innovation , Defense Transformation, and China’s

  9. Video surveillance in public libraries : A case of unintended consequences?

    NARCIS (Netherlands)

    Newell, Bryce; Randall, David P.

    This paper presents the findings of an exploratory qualitative research study in which we examine why two public libraries have implemented video security systems and why one of these libraries has reversed course and recently removed a previously installed surveillance system.

  10. Eye tracking in Library and Information Science

    DEFF Research Database (Denmark)

    Lund, Haakon

    2016-01-01

    Purpose The purpose of this paper is to present a systematic literature review of the application of eye-tracking technology within the field of library and information science. Eye-tracking technology has now reached a level of maturity, which makes the use of the technology more accessible....... Subsequently, a growing interest in employing eye tracking as a methodology within library and information science research must be anticipated. Design/methodology/approach The review follows the guidelines set in the Preferred Reporting Items for Systematic Reviews and Meta-Analyses recommendations. Two...... reference databases are searched for relevant references: Library and Information Science Abstracts and Library, Information Science and Technology Abstracts. The main selection criteria are peer-reviewed literature that describes the experimental setting, including which eye-tracking equipment was used...

  11. The E-rate Program and Libraries and Library Consortia, 2000-2004: Trends and Issues

    Directory of Open Access Journals (Sweden)

    Paul T. Jaeger

    2005-06-01

    Full Text Available The E-rate program has provided tremendous benefits to libraries, allowing many libraries and library systems to acquire technological equipment and services that would otherwise be too expensive, increasing the availability of public Internet access through libraries. This article analyzes the data related to the E-rate program and the discounts that it has provided to libraries and library systems between 2000 and 2004. By examining the E-rate data in a longitudinal manner, this article explores the trends in the application for and the provision of E-rate discounts to libraries and library consortia at national and state levels. The data suggest that, despite a number of controversies over the years, the program has provided a significant level of support for libraries and library consortia.

  12. Building Library Collections: The Horse Is Riding Us!

    Directory of Open Access Journals (Sweden)

    Milton T. Wolf

    2003-06-01

    Full Text Available Unsound use of automation and digital idolatry are reducing access to research information.Technology should be the means not the end to better libraries. By understanding how digital information has been captured by multinational corporations,one must thread one s way through the labyrinth of mis-information clones and data corruption to a more wholesome collection of diverse points of view. Collection building will always be labor intensive, and therefore time-consuming,because intellectual judgments are involved. Giving away selection to vendors and publishers only furthers the degradation of research and ultimately threatens not only intellectual investigation but also national security. The way forward is backward to the hard work of selecting.

  13. Energy Assurance: Essential Energy Technologies for Climate Protection and Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Greene, David L [ORNL; Boudreaux, Philip R [ORNL; Dean, David Jarvis [ORNL; Fulkerson, William [University of Tennessee, Knoxville (UTK); Gaddis, Abigail [University of Tennessee, Knoxville (UTK); Graham, Robin Lambert [ORNL; Graves, Ronald L [ORNL; Hopson, Dr Janet L [University of Tennessee, Knoxville (UTK); Hughes, Patrick [ORNL; Lapsa, Melissa Voss [ORNL; Mason, Thom [ORNL; Standaert, Robert F [ORNL; Wilbanks, Thomas J [ORNL; Zucker, Alexander [ORNL

    2009-12-01

    We present and apply a new method for analyzing the significance of advanced technology for achieving two important national energy goals: climate protection and energy security. Quantitative metrics for U.S. greenhouse gas emissions in 2050 and oil independence in 2030 are specified, and the impacts of 11 sets of energy technologies are analyzed using a model that employs the Kaya identity and incorporates the uncertainty of technological breakthroughs. The goals examined are a 50% to 80% reduction in CO2 emissions from energy use by 2050 and increased domestic hydrocarbon fuels supply and decreased demand that sum to 11 mmbd by 2030. The latter is intended to insure that the economic costs of oil dependence are not more than 1% of U.S. GDP with 95% probability by 2030. Perhaps the most important implication of the analysis is that meeting both energy goals requires a high probability of success (much greater than even odds) for all 11 technologies. Two technologies appear to be indispensable for accomplishment of both goals: carbon capture and storage, and advanced fossil liquid fuels. For reducing CO2 by more than 50% by 2050, biomass energy and electric drive (fuel cell or battery powered) vehicles also appear to be necessary. Every one of the 11 technologies has a powerful influence on the probability of achieving national energy goals. From the perspective of technology policy, conflict between the CO2 mitigation and energy security is negligible. These general results appear to be robust to a wide range of technology impact estimates; they are substantially unchanged by a Monte Carlo simulation that allows the impacts of technologies to vary by 20%.

  14. The Handheld Library: Developments at the Rector Gabriel Ferraté Library, UPC

    Directory of Open Access Journals (Sweden)

    Beatriz Benítez Juan

    2011-10-01

    Full Text Available The purpose of this paper is to highlight the mobile services developed by the Rector Gabriel Ferraté Library (BRGF of the Universitat Politècnica de Catalunya (UPC-Barcelona Tech in Barcelona, Spain. We hope this paper will be of use to other libraries exploring new technologies for communicating and delivering their services to users at a time when mobile services are an emerging topic in librarianship and information science literature. By setting out the successive steps involved in the as yet unfinished process of building our mobile services portfolio, we aim to offer a detailed picture of the mobile services and features offered by a university library from a case study perspective. The main topics to be discussed include: The BRGF’s mobile website, including the information available, its interactive capabilities and the services it provides to its users. The mobile-friendly version of UP Commons(the UPC Library Service’s institutional repositories. The UPC Library Service’s mobile OPAC. The mobile version of u-win(BRGF’s videogame service. The use of QR codes to deliver information to mobile devices. Text message notifications. Additional topics for discussion include: The library’s organisation and the organisational concepts that underpin and make possible its technological developments (including mobile. BRGF’s concern regarding the reduction of investment in the development of mobile services. The criteria and tools used to guide the library’s decisions regarding the design and orientation of current and future mobile services. How mobile services can help to improve the image of the library as a leading technology site. Selected mobile features that BRGF plans to offer in the near future. Ultimately, this paper aims to delineate the effectiveness and potential of delivering library services by the preferred means of communication of a new generation of students and teachers.

  15. THE IMPACT OF TECHNOLOGY ON THE LIBRARY BUILDING.

    Science.gov (United States)

    Educational Facilities Labs., Inc., New York, NY.

    LIBRARY PLANNERS SHOULD EXPECT AUTOMATION, MICROFORMS, AND FACSIMILE TRANSMISSION TO MODIFY BUT NOT RADICALLY CHANGE THE LIBRARY AS THE INSTITUTION WE NOW KNOW IT TO BE. CHANGES WILL INVOLVE TRADE-OFFS IN SPACE AND DEMANDS FOR ADDITIONAL SPACE. (MF)

  16. Information technology - Security techniques - Information security management systems - Requirements

    CERN Document Server

    International Organization for Standardization. Geneva

    2005-01-01

    ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties. ISO/IEC 27001:2005 is intended to be suitable for several different types of use, including the following: use within organizations to formulate security requirements and objectives; use within organizations as a way to ensure that security risks are cost effectively managed; use within organizations to ensure comp...

  17. Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security through the Combination of Policy Management and Technology

    Science.gov (United States)

    Zahadat, Nima

    2016-01-01

    With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…

  18. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  19. Utilization of Information and Communication Technology (ICT) Resources and Job Effectiveness among Library Staff in the University of Calabar and Cross River University of Technology, Nigeria

    Science.gov (United States)

    Ntui, Aniebiet Inyang; Inyang, Comfort Linus

    2015-01-01

    This study investigated utilization of Information and Communication Technology (ICT) resources and job effectiveness among library staff in the University of Calabar and Cross River University of Technology, Nigeria. To achieve the purpose of this study, four hypotheses were formulated to guide the study. Ex-post facto research design was adopted…

  20. CERN Central Library : 2000 year old technology transfer. Two fragments of columns from a Roman building discovered during excavations for the PS in 1956 have prominent places in the Library where they can be enjoyed by all

    CERN Multimedia

    Laurent Guiraud

    2001-01-01

    CERN Central Library : 2000 year old technology transfer. Two fragments of columns from a Roman building discovered during excavations for the PS in 1956 have prominent places in the Library where they can be enjoyed by all

  1. The library as a hybrid organisation

    NARCIS (Netherlands)

    Waaijers, L.

    1998-01-01

    In the last decade technology exploded into libraries. It impacted not only library work processes but imported also new strategic options. Library systems, i.e. databases, imported notions of project management and efficiency and resulted in catalog sharing. The Internet with Gopher and Veronica,

  2. Arms and technology transfers: Security and economic considerations among importing and exporting states

    International Nuclear Information System (INIS)

    Lodgaard, S.; Pfaltzgraff, R.L. Jr.

    1995-01-01

    The issues of technology and armament transfers are increasingly at the forefront of problems of international security and disarmament. Three major reasons could explain this. First, the disarmament process has been very successful in the last few years, especially in the field of nuclear, as well chemical and conventional, weapons. Second the disarmament effort underway concerns primarily the old partners of the East-West confrontation. Last, the general context, characterized by the opening and widening of exchanges, the increasingly open and transparent circulation of techniques and material, and the globalization of economic relations, must be taken into account. This report, prepared by UNIDIR comprises the following subjects: General trends in defense related transfers; Political/military factors associated with the diffusion of advanced technology; economic and technological consideration; and facilitation of economic growth/maximization of regional security and stability

  3. The National electronic library a guide to the future for library managers

    CERN Document Server

    1996-01-01

    The National Information Infrastructure will bring information to the doorstep of every household. Librarianship must respond to this development through the National Electronic Library. Librarianship as a profession must set the information agenda if it is to be a viable and influential entity in the electronic environment. Traditional library services are being redefined by technology, and the concept of the National Electronic Library must combine the roles of the academic institution, public enterprise, and library education. This professional reference is a guide to assist librarians in planning for the future.||The volume maintains that the growing electronic environment is driving a cultural transformation in which libraries must examine and understand what libraries have been, what they are, and what they need to be. Libraries need to participate actively in this transformation in order to remain the central providers of information and related services. The book explores the National Electronic Libra...

  4. "Measuring Operational Effectiveness of Information Technology Infrastructure Library (IIL) and the Impact of Critical Facilities Inclusion in the Process."

    Science.gov (United States)

    Woodell, Eric A.

    2013-01-01

    Information Technology (IT) professionals use the Information Technology Infrastructure Library (ITIL) process to better manage their business operations, measure performance, improve reliability and lower costs. This study examined the operational results of those data centers using ITIL against those that do not, and whether the results change…

  5. National Security Science and Technology Initiative: Air Cargo Screening

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; White, Tim [Pacific Northwest National Laboratory (PNNL); Cespedes, Ernesto [Idaho National Laboratory (INL); Bowerman, Biays [Brookhaven National Laboratory (BNL); Bush, John [Battelle

    2010-11-01

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security's Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009. The primary results of this effort are described in this document and can be summarized as follows: (1) Completed a gap analysis that identified threat signatures and observables, candidate technologies for detection, their current state of development, and provided recommendations for improvements to meet air cargo screening requirements. (2) Defined a Commodity/Threat/Detection matrix that focuses modeling and experimental efforts, identifies technology gaps and game-changing opportunities, and provides a means of summarizing current and emerging capabilities. (3) Defined key properties (e.g., elemental composition, average density, effective atomic weight) for basic commodity and explosive benchmarks, developed virtual models of the physical distributions (pallets) of three commodity types and three

  6. New technologies and emerging threats: personnel security adjudicative guidelines in the age of social networking

    OpenAIRE

    Festa, James P.

    2012-01-01

    Approved for public release; distribution is unlimited Publicized incidents involving espionage or violence by government employees with security clearances have raised concern for the personnel security community. The guidelines used to adjudicate security clearances were last updated in 2005; since that time, significant technological developments, especially in social media and communications, have emerged. This thesis developed a comprehensive list of current Internet behaviors, and us...

  7. Public Libraries: Adapting to Change.

    Science.gov (United States)

    Durrance, Joan; Van Fleet, Connie

    1992-01-01

    Reports on a study of changing trends in public libraries. Interviews with public library leaders identified five areas of changing emphasis: information technology, community needs, strategic planning, public relations and marketing, and funding. (seven references) (EA)

  8. academic libraries

    African Journals Online (AJOL)

    Information Impact: Journal of Information and Knowledge Management

    Information Impact: Journal of Information and Knowledge Management ... Key words: academic libraries, open access, research, researchers, technology ... European commission (2012) reports that affordable and easy access to the results ...

  9. Information Security Issues in a Digital Library Environment: A Literature Review = Dijital Kütüphane Ortamında Bilgi Güvenliği Sorunları: Literatür Değerlendirmesi

    Directory of Open Access Journals (Sweden)

    Anday, Audrey

    2012-01-01

    Full Text Available This paper aimed to explore the literature on security issues that digital libraries should consider in managing digital resources. Books on information security and network security were consulted as well as several databases such as ERIC, Ebrary, LISA, Science Direct, EbscoHost, ISI, Google Scholar, ProQuest, Emerald Insight, ACM were searched to understand what particular aspect of information security and privacy in digital libraries exist from 2000 - 2010. Security in digital libraries is an issue of the most important, and should be considered carefully in creating policies and strategic plans of institutions wanting to set up a digital library. This paper focused on the four main streams that concerns security in the digital environment, namely: infrastructure, digital content, users and standards and legal issues. This literature review also built upon previous literature reviews, and is one of the few of its kind in the topic. / Bu çalışma dijital kütüphanelerin kaynakların yönetiminde göz önünde bulundurmasıgereken güvenlik sorunlarına ilişkin literatürü ortaya koymayı amaçlamaktadır. Bilgi Güvenliği, Ağ Güvenliği, Kişisel Gizlilik konuları üzerine 2000 - 2010 yıl aralığını kapsayan kitaplar ve makaleler ERIC, Ebrary, LISA, Science Direct, EbscoHost, ISI, Google Akademik, ProQuest, Emerald Insight ve ACM gibi çeşitli veri tabanlarından taranmıştır. İncelenen literatürden elde edilen sonuçlara göre,bilgi güvenliği dijital kütüphaneler için son derece önemli bir konudur ve dijitalleşme sürecinde bir kütüphane, güvenlik politikalarını ve stratejik planlarını dikkatle göz önünde bulundurmalıdır. Bu araştırmada dijital ortamda güvenliği ilgilendiren Altyapı, Dijital İçerik, Kullanıcılar, Standartlar ve Hukuki Konular olmak üzere dört ana madde üzerinde durulmuştur. Bu çalışma ayrıca daha önceki literatür taramalarını da kapsamaktadır.

  10. Proceedings of the 1989 Carnahan conference on security technology

    International Nuclear Information System (INIS)

    DeVore, R.W.

    1989-01-01

    This book contains the proceedings of the 1989 Carnahan conference on security technology and crime countermeasures. Topics covered include: study of methods for the enhancement of classified document control and protection; research and development of a portable microfocus x-ray system capable of providing ultra-high resolution images of improvised explosive devices; and BombCAD - a CAD-based technique for assessing bomb vulnerability and designing and evaluating bomb defense measures

  11. Use Of Computer Among Library Staff In Four Universities Of ...

    African Journals Online (AJOL)

    4) selected Universities of Technology Libraries in Northern Nigeria. Survey research was adopted with population of 151 Library staff and a random sample size of 120 staff in four (4) selected Universities of Technology Libraries in Northern ...

  12. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  13. An Evaluation Methodology for the Usability and Security of Cloud-based File Sharing Technologies

    Science.gov (United States)

    2012-09-01

    FISMA, ISO 27001 , FIPS 140-2, and ISO 270001) indicate a cloud-based service’s compliance with industry standard security controls, management and...Information Assurance IEEE Institute of Electrical and Electronics Engineers IT Information Technology ITS Insider Threat Study ISO International...effectively, efficiently and with satisfaction” (International Organization for Standardization [ ISO ], 1998). Alternately, information security

  14. RFID for libraries a practical guide

    CERN Document Server

    Pandian, M

    2010-01-01

    Many modern technologies give the impression that they somehow work by magic, particularly when they operate automatically and their mechanisms are invisible. A technology called RFID (Radio Frequency Identification), which is relatively new, has exactly this characteristic. Librarians everywhere are closely watching RFID technology. Advances over using bar codes on library materials, RFID tags are being touted as a way to radically redesign how library materials are handled. But it is expensive. The tags are vulnerable to wear and tear and the technology is not fully developed. It's unclear w

  15. Digital Culture and Digital Library

    Directory of Open Access Journals (Sweden)

    Yalçın Yalçınkaya

    2016-12-01

    Full Text Available In this study; digital culture and digital library which have a vital connection with each other are examined together. The content of the research consists of the interaction of culture, information, digital culture, intellectual technologies, and digital library concepts. The study is an entry work to integrity of digital culture and digital library theories and aims to expand the symmetry. The purpose of the study is to emphasize the relation between the digital culture and digital library theories acting intersection of the subjects that are examined. Also the perspective of the study is based on examining the literature and analytical evaluation in both studies (digital culture and digital library. Within this context, the methodology of the study is essentially descriptive and has an attribute for the transmission and synthesis of distributed findings produced in the field of the research. According to the findings of the study results, digital culture is an inclusive term that describes the effects of intellectual technologies in the field of information and communication. Information becomes energy and the spectrum of the information is expanding in the vertical rise through the digital culture. In this context, the digital library appears as a new living space of a new environment. In essence, the digital library is information-oriented; has intellectual technology support and digital platform; is in a digital format; combines information resources and tools in relationship/communication/cooperation by connectedness, and also it is the dynamic face of the digital culture in time and space independence. Resolved with the study is that the digital libraries are active and effective in the formation of global knowing and/or mass wisdom in the process of digital culture.

  16. Security Sector Reform’s Utility in Conflict Prevention

    Science.gov (United States)

    2013-12-10

    Publications, 1994), 18. 40 Many of these countries in Africa are states in name only due to ill defined borders, fiscal limitations, nomadic ...Security Watch, 12 OCT 2009), Online at http://www.isn.ethz.ch/isn/ Digital -Library/Articles/Detail/?lng= en&id= 108451[accessed on 27 May 2013]. 85...ISN Security Watch, 12 OCT 2009. Online at http://www.isn.ethz.ch/isn/ Digital -Library/Articles/Detail/?lng= en&id= 108451[accessed on 27 May 2013

  17. Technical solutions for mitigating security threats caused by health professionals in clinical settings.

    Science.gov (United States)

    Fernandez-Aleman, Jose Luis; Belen Sanchez Garcia, Ana; Garcia-Mateos, Gines; Toval, Ambrosio

    2015-08-01

    The objective of this paper is to present a brief description of technical solutions for health information system security threats caused by inadequate security and privacy practices in healthcare professionals. A literature search was carried out in ScienceDirect, ACM Digital Library and IEEE Digital Library to find papers reporting technical solutions for certain security problems in information systems used in clinical settings. A total of 17 technical solutions were identified: measures for password security, the secure use of e-mail, the Internet, portable storage devices, printers and screens. Although technical safeguards are essential to the security of healthcare organization's information systems, good training, awareness programs and adopting a proper information security policy are particularly important to prevent insiders from causing security incidents.

  18. ICT security- aspects important for nuclear facilities; Information and Communication Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thunem, Atoosa P-J.

    2005-09-15

    Rapid application growth of complex Information and Communication Technologies (ICT) in every society and state infrastructure as well as industry has revealed vulnerabilities that eventually have given rise to serious security breaches. These vulnerabilities together with the course of the breaches from cause to consequence are gradually about to convince the field experts that ensuring the security of ICT-driven systems is no longer possible by only relying on the fundaments of computer science, IT, or telecommunications. Appropriating knowledge from other disciplines is not only beneficial, but indeed very necessary. At the same time, it is a common observation today that ICT-driven systems are used everywhere, from the nuclear, aviation, commerce and healthcare domains to camera-equipped web-enabled cellular phones. The increasing interdisciplinary and inter-sectoral aspects of ICT security worldwide have been providing updated and useful information to the nuclear domain, as one of the emerging users of ICT-driven systems. Nevertheless, such aspects have also contributed to new and complicated challenges, as ICT security for the nuclear domain is in a much more delicate manner than for any other domains related to the concept of safety, at least from the public standpoint. This report addresses some important aspects of ICT security that need to be considered at nuclear facilities. It deals with ICT security and the relationship between security and safety from a rather different perspective than usually observed and applied. The report especially highlights the influence on the security of ICT-driven systems by all other dependability factors, and on that basis suggests a framework for ICT security profiling, where several security profiles are assumed to be valid and used in parallel for each ICT-driven system, sub-system or unit at nuclear facilities. The report also covers a related research topic of the Halden Project with focus on cyber threats and

  19. The Effects of Information Technology on Functions of Planning and Organizing in the University Libraries and a Study on the Turkish case

    Directory of Open Access Journals (Sweden)

    Mesut Kurulgan

    2005-03-01

    Full Text Available Rapid changes in information technology (IT and a growing downward tendency in the cost of computer hardware, involve the use of IT in the university libraries excessively. University libraries have to make some changes in their organisational processes and bodies in order to be able to use the technology effectively. In this sense, the aim of this study is to determine the university library managers' opinions in Turkey on the effects of ITs on planning and organisation which are the basic managing functions and is to determine if these effects have meaningful differences according to personal and organisational variables. This study aims to light the way for other studies in the field since it is the first example in this field.

  20. Computer Security: Security operations at CERN (4/4)

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Stefan Lueders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and infrastructure control systems against cyber-threats. Subsequently, he joined the CERN Computer Security Incident Response Team and is today heading this team as CERN's Computer Security Officer with the mandate to coordinate all aspects of CERN's computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN's operational needs. Dr. Lueders has presented on these topics at many different occasions to international bodies, governments, and companies, and published several articles. With the prevalence of modern information technologies and...

  1. New technologies and the search for security: Prospects for a post-cold-war era

    International Nuclear Information System (INIS)

    Petrovsky, V.

    1990-01-01

    New technologies are setting a fast pace in our world. Through science and technology we are able to make our world better, richer and more liveable to everyone. However, the new technologies have brought new mans of destruction and have confronted the world with a real prospect of self destruction. This is one of the main challenges of our age. Greater mutual confidence, openness and, if necessary, checks on how scientific and technological co-operation is used must bring down the existing barriers un the area of technological exchanges. The first results are already evident, for instance in the nuclear field. In our age, science and technology are becoming an inherent element in the comprehensive search for a new, post-confrontational system of peace, security and co-operation. United nations, together with its family of specialized agencies, is called upon to play a major positive role in finding approaches in this area. Scientific and technological progress, especially on the eve of a new millennium in the history of mankind, must serve only to enhance international peace and security and, enable everyone to live a full and worthy life

  2. Two Libraries Working toward Common Goals

    Science.gov (United States)

    Potter, Tonya; Johnson, Kara

    2017-01-01

    Students look to their school library to find new books, seek information, creatively solve problems, and use technology. School libraries play an essential role in students' academic growth and development of lifelong learning skills. All of the wonderful resources and services that school libraries provide are easily accessible to the population…

  3. The Systems Librarian: Implementing Wireless Networks without Compromising Security

    Science.gov (United States)

    Breeding, Marshall

    2005-01-01

    Many libraries are or soon will be offering Wi-Fi, also known as wireless networks. The largest perceived barriers to providing this service are concerns about security. The prime rule when deploying Wi-Fi is segregation, having a clear separation between a public wireless network and the rest of the library?s network. A number of devices can be…

  4. Making Choices in the Virtual World: The New Model at United Technologies Information Network.

    Science.gov (United States)

    Gulliford, Bradley

    1998-01-01

    Describes changes in services of the United Technologies Corporation Information Network from a traditional library system to a virtual system of World Wide Web sites, a document-delivery unit, telephone and e-mail reference, and desktop technical support to provide remote access. Staff time, security, and licensing issues are addressed.…

  5. Spanish Faculty Preferences and Usage of Library Services in the Field of Science and Technology

    Science.gov (United States)

    Pinto, Maria; Fernandez-Ramos, Andres

    2010-01-01

    The authors compare Spanish faculty use of library services and the interest they express in value-added services and improvement actions. The results are based on data from a survey of 546 faculty in the field of science and technology. The study differentiates between the areas of pure science, engineering and architecture, and life sciences.…

  6. Enabling Technologies for Ultra-Safe and Secure Modular Nuclear Energy

    International Nuclear Information System (INIS)

    Mendez Cruz, Carmen Margarita; Rochau, Gary E.; Middleton, Bobby; Rodriguez, Salvador B.; Rodriguez, Carmelo; Schleicher, Robert

    2016-01-01

    Sandia National Laboratories and General Atomics are pleased to respond to the Advanced Research Projects Agency-Energy (ARPA-e)'s request for information on innovative developments that may overcome various current reactor-technology limitations. The RFI is particularly interested in innovations that enable ultra-safe and secure modular nuclear energy systems. Our response addresses the specific features for reactor designs called out in the RFI, including a brief assessment of the current state of the technologies that would enable each feature and the methods by which they could be best incorporated into a reactor design.

  7. Enabling Technologies for Ultra-Safe and Secure Modular Nuclear Energy

    Energy Technology Data Exchange (ETDEWEB)

    Mendez Cruz, Carmen Margarita [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rochau, Gary E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Middleton, Bobby [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Salvador B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Carmelo [General Atomics, San Diego, CA (United States); Schleicher, Robert [General Atomics, San Diego, CA (United States)

    2016-06-01

    Sandia National Laboratories and General Atomics are pleased to respond to the Advanced Research Projects Agency-Energy (ARPA-e)’s request for information on innovative developments that may overcome various current reactor-technology limitations. The RFI is particularly interested in innovations that enable ultra-safe and secure modular nuclear energy systems. Our response addresses the specific features for reactor designs called out in the RFI, including a brief assessment of the current state of the technologies that would enable each feature and the methods by which they could be best incorporated into a reactor design.

  8. Designing and developing library intranets

    CERN Document Server

    McHale, Nina

    2013-01-01

    For the past decade, e-mail has been the preferred method of internal communication in libraries. However, relying on email for organizational knowledge management seems a bit like storing birth certificates, car titles, and deeds in a pile of junk mail: the important documents are lost amongst other items of only minimal or fleeting importance. A successful intranet can provide a secure place for information exchange and storage; however, in order to be successful, a library intranet must be easy to use, have the functionality desired by its users, and be integrated into the daily workflow

  9. Development of library documents in BRICEM on network-based environment

    International Nuclear Information System (INIS)

    Gao Renxi

    2010-01-01

    With the development of the internet, the transformation from a traditional library to a modem one is essential to the development of BRICEM (Beijing Research Institute of Chemical Engineering and Metallurgy) Technology Library and the situations of other libraries, this thesis integrates the reality of BRICEM and its library in an effort to work out a tentative plan, as well as concrete measures and procedures of digitalising and online-sharing the resources of BRICEM Technology Library. (author)

  10. Security threads: effective security devices in the past, present, and future

    Science.gov (United States)

    Wolpert, Gary R.

    2002-04-01

    Security threads were first used to secure banknotes in the mid 1800's. The key to their anti-counterfeiting success was the fact that by being embedded in the paper, they became an integral part of the banknote substrate. Today, all major currencies still utilize this effective security feature. Technological developments have allowed security threads to evolve from a feature authenticated by only visual means to devices that incorporate both visual and machine detectable components. When viewed from the perspective of a thread being a carrier of various security technologies and the fact that they can be incorporated into the core substrate of banknotes, documents, labels, packaging and some high valued articles, it is clear that security threads will remain as effective security devices well into the future. This paper discusses a brief historical background of security threads, current visual and machine authentication technologies incorporated into threads today and a look to the future of threads as effective security devices.

  11. CERN looks to library of the future

    CERN Multimedia

    2002-01-01

    Participants to the International School on the Digital Library and E-publishing for Science and Technology From 3 to 8 March CERN became an information exhange when it hosted the 'International Spring School on the Digital Library and E-publishing for Science and Technology'. The aim was to share knowledge among the various parties that provide a scientific information service to the CERN users, such as academic libraries, research libraries, publishers, and of course CERN itself. The school involved 50 participants and 17 speakers from countries as far away as Japan and the US. 'The event provided an international forum to advance the state of scientific digital libraries', says the course director Rick Luce, research library director at Los Alamos National Laboratory. 'As a result, we believe this will make a tangible contribution to improving the scholarly resources and electronic services available to physicists throughout Europe and beyond.'

  12. Dynamically-Loaded Hardware Libraries (HLL) Technology for Audio Applications

    DEFF Research Database (Denmark)

    Esposito, A.; Lomuscio, A.; Nunzio, L. Di

    2016-01-01

    In this work, we apply hardware acceleration to embedded systems running audio applications. We present a new framework, Dynamically-Loaded Hardware Libraries or HLL, to dynamically load hardware libraries on reconfigurable platforms (FPGAs). Provided a library of application-specific processors......, we load on-the-fly the specific processor in the FPGA, and we transfer the execution from the CPU to the FPGA-based accelerator. The proposed architecture provides excellent flexibility with respect to the different audio applications implemented, high quality audio, and an energy efficient solution....

  13. Nigerian University libraries and Information and Communication ...

    African Journals Online (AJOL)

    This paper attempts to revisit the strength of Nigerian universities involved in the application of modern-day information technology in their libraries. It also dwells on information technology and how it has turned the world into a global village. The decision to apply automated techniques to library operations should be made ...

  14. Let's go to the Library 4.0!

    OpenAIRE

    Kulyk, Evgenia

    2016-01-01

    The potential of modern information and communication technologies for the modernization of library and information services. The prospects for the modernization of library and information services in the next years keeping in mind the further development of information and communication technologies as well as global trends in the practical use were outlined.

  15. New ENDF/B-7.0 library

    International Nuclear Information System (INIS)

    Oblozinsky, P.

    2008-01-01

    We describe the new version of the Evaluated Nuclear Data File, Endf/B-7.0, of recommended nuclear data for advanced nuclear science and technology applications. The library, produced by the US Cross Section Evaluation Working Group, was released in December 2006. The library contains data in 14 sub-libraries, primarily for reactions with incident neutrons, protons and photons, based on the experimental data and nuclear reaction theory predictions. The neutron reaction sub-library contains data for 393 materials. The new library was extensively tested and shows considerable improvements over the earlier Endf/B-6.8 library. (author)

  16. Invigorating Library Service Delivery through the Adoption of M ...

    African Journals Online (AJOL)

    Invigorating Library Service Delivery through the Adoption of M-Learning by Library Users in Nigeria. ... Nigerian School Library Journal ... so as to be at par with the libraries in the developed nations and to keep abreast Nigerian library users with the recent mobile technologies in the library services delivery in the world.

  17. Discovery of Potent and Selective Inhibitors for ADAMTS-4 through DNA-Encoded Library Technology (ELT).

    Science.gov (United States)

    Ding, Yun; O'Keefe, Heather; DeLorey, Jennifer L; Israel, David I; Messer, Jeffrey A; Chiu, Cynthia H; Skinner, Steven R; Matico, Rosalie E; Murray-Thompson, Monique F; Li, Fan; Clark, Matthew A; Cuozzo, John W; Arico-Muendel, Christopher; Morgan, Barry A

    2015-08-13

    The aggrecan degrading metalloprotease ADAMTS-4 has been identified as a novel therapeutic target for osteoarthritis. Here, we use DNA-encoded Library Technology (ELT) to identify novel ADAMTS-4 inhibitors from a DNA-encoded triazine library by affinity selection. Structure-activity relationship studies based on the selection information led to the identification of potent and highly selective inhibitors. For example, 4-(((4-(6,7-dimethoxy-3,4-dihydroisoquinolin-2(1H)-yl)-6-(((4-methylpiperazin-1-yl)methyl)amino)-1,3,5-triazin-2-yl)amino)methyl)-N-ethyl-N-(m-tolyl)benzamide has IC50 of 10 nM against ADAMTS-4, with >1000-fold selectivity over ADAMT-5, MMP-13, TACE, and ADAMTS-13. These inhibitors have no obvious zinc ligand functionality.

  18. The research on information security technology for the industrial control system of special equipment

    International Nuclear Information System (INIS)

    Chen Ligang; Liu Hongye; Zhang Wei; Sun Jianying; Lan Peng; Dai Sidan

    2014-01-01

    With the rapid development of information technology in enterprise application, industrial control network and management network is becoming more and more closely linked. Development and application of special equipment control system from the traditional industrial control system, not considered when designing communication security problem mainly, therefore, the industrial control system opened at the same time, isolation control system and the outside was weakened, the safety problems of industrial control system had become more and more serious. The practical application combined with the special equipment control system, analysis and elaboration in view of security problems for the control network, also, provide appropriate security solutions for professional characteristics of industrial control network, design on process control system specially, provide security partition protection scheme, in order to improve security ability of industrial control system information. (authors)

  19. Blockchain Technology: A new secured Electronic Health Record System

    OpenAIRE

    Tamazirt , Lotfi; Alilat , Farid; Agoulmine , Nazim

    2018-01-01

    International audience; Nowadays, health systems are looking for effective ways to manage more patients in a shorter time, and to increase the quality of care through better coordination to provide quick, accurate and non-invasive diagnostics to patients. This paper aims to solve the dependence on trusted third parties by proposing a new management strategy, storage and security in a decentralized network through Blockchain technology. The proposed system also aims to offer a solution to help...

  20. JCE Digital Library Grand Opening

    Science.gov (United States)

    Journal of Chemical Education, 2004

    2004-01-01

    The National Science, Technology, Engineering and Mathematical Education Digital Library (NSDL), inaugurated in December 2002, is developed to promote science education on a comprehensive scale. The Journal of Chemical, Education (JCE) Digital Library, incorporated into NSDL, contains its own collections of digital resources for chemistry…

  1. Digital library research : current developments and trends

    OpenAIRE

    Shiri, Ali

    2003-01-01

    This column gives an overview of current trends in digital library research under the following headings: digital library architecture, systems, tools and technologies; digital content and collections; metadata; interoperability; standards; knowledge organisation systems; users and usability; legal, organisational, economic, and social issues in digital libraries.

  2. Electronic Libraries and the Future:Implications for Academic Libraries with East Asian Collections

    Directory of Open Access Journals (Sweden)

    Zhijia Shen、Susan Anthes

    2000-04-01

    Full Text Available

    頁次:4-17

    Academic libraries are stepping into uncharted territories with the advent of electronic books (ebooks and electronic libraries. This article provides an overview of the current status of both electronic books and libraries, including a description of a beta test of a new service netLibrary(tm at the University of Colorado at Boulder. Possible implications of new technology for various aspects of academic librarianship in the areas of acquisition, collection development, preservation, reference, circulation, interlibrary loan, and cataloging are discussed. Particular reference is given to East Asian collections. Benefits as well as liabilities are discussed. The authors raise issues regarding the potential of the new technology, and speculate on possible trends and areas for future research for academic librarians.

  3. Discovery of a Potent Class of PI3Kα Inhibitors with Unique Binding Mode via Encoded Library Technology (ELT).

    Science.gov (United States)

    Yang, Hongfang; Medeiros, Patricia F; Raha, Kaushik; Elkins, Patricia; Lind, Kenneth E; Lehr, Ruth; Adams, Nicholas D; Burgess, Joelle L; Schmidt, Stanley J; Knight, Steven D; Auger, Kurt R; Schaber, Michael D; Franklin, G Joseph; Ding, Yun; DeLorey, Jennifer L; Centrella, Paolo A; Mataruse, Sibongile; Skinner, Steven R; Clark, Matthew A; Cuozzo, John W; Evindar, Ghotas

    2015-05-14

    In the search of PI3K p110α wild type and H1047R mutant selective small molecule leads, an encoded library technology (ELT) campaign against the desired target proteins was performed which led to the discovery of a selective chemotype for PI3K isoforms from a three-cycle DNA encoded library. An X-ray crystal structure of a representative inhibitor from this chemotype demonstrated a unique binding mode in the p110α protein.

  4. The Mobile Library and Staff Preparedness: Exploring Staff Competencies Using the Unified Theory of Acceptance and Use of Technology Model

    Science.gov (United States)

    Saravani, Sarah-Jane; Haddow, Gaby

    2011-01-01

    This paper presents preliminary findings of a study investigating the current state of preparedness of staff at institutes of technology and TAFE libraries across Australia and New Zealand in relation to delivering services through mobile technologies. In particular, the skills, knowledge, and competencies of staff in relation to mobile…

  5. Clinicians, security and information technology support services in practice settings--a pilot study.

    Science.gov (United States)

    Fernando, Juanita

    2010-01-01

    This case study of 9 information technology (IT) support staff in 3 Australian (Victoria) public hospitals juxtaposes their experiences at the user-level of eHealth security in the Natural Hospital Environment with that previously reported by 26 medical, nursing and allied healthcare clinicians. IT support responsibilities comprised the entire hospital, of which clinician eHealth security needs were only part. IT staff believed their support tasks were often fragmented while work responsibilities were hampered by resources shortages. They perceived clinicians as an ongoing security risk to private health information. By comparison clinicians believed IT staff would not adequately support the private and secure application of eHealth for patient care. Preliminary data analysis suggests the tension between these cohorts manifests as an eHealth environment where silos of clinical work are disconnected from silos of IT support work. The discipline-based silos hamper health privacy outcomes. Privacy and security policies, especially those influencing the audit process, will benefit by further research of this phenomenon.

  6. Computers, business, and security the new role for security

    CERN Document Server

    Schweitzer, James A

    1987-01-01

    Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating environments and high technology in mind. This book discusses the technological aspects of the total security programs.Organized into three parts encompassing 10 chapters, this book begins with an overview of how the developing information age is affecting business management, operations, and organization. This text then examines a number of vulnerabilities that arise in the process of using business computing and communicat

  7. Library design practices for success in lead generation with small molecule libraries.

    Science.gov (United States)

    Goodnow, R A; Guba, W; Haap, W

    2003-11-01

    The generation of novel structures amenable to rapid and efficient lead optimization comprises an emerging strategy for success in modern drug discovery. Small molecule libraries of sufficient size and diversity to increase the chances of discovery of novel structures make the high throughput synthesis approach the method of choice for lead generation. Despite an industry trend for smaller, more focused libraries, the need to generate novel lead structures makes larger libraries a necessary strategy. For libraries of a several thousand or more members, solid phase synthesis approaches are the most suitable. While the technology and chemistry necessary for small molecule library synthesis continue to advance, success in lead generation requires rigorous consideration in the library design process to ensure the synthesis of molecules possessing the proper characteristics for subsequent lead optimization. Without proper selection of library templates and building blocks, solid phase synthesis methods often generate molecules which are too heavy, too lipophilic and too complex to be useful for lead optimization. The appropriate filtering of virtual library designs with multiple computational tools allows the generation of information-rich libraries within a drug-like molecular property space. An understanding of the hit-to-lead process provides a practical guide to molecular design characteristics. Examples of leads generated from library approaches also provide a benchmarking of successes as well as aspects for continued development of library design practices.

  8. New flexible origination technology based on electron-beam lithography and its integration into security devices in combination with covert features based on DNA authentication

    Science.gov (United States)

    Drinkwater, John K.; Ryzi, Zbynek; Outwater, Chris S.

    2002-04-01

    Embossed diffractive optically variable devices are becoming increasingly familiar security items on plastic cards, banknotes, security documents and on branded goods and media to protect against counterfeit, protect copyright and to evidence tamper. Equally as this devices become both more widely available there is a pressing requirement for security technology upgrades to keep ahead of technology advances available to potential counterfeiters. This paper describes a new generation electron beam DOVID origination technology particularly suitable for high security applications. Covert marking of security devices is provided using the DNA matrix by creating and verifying unique DNA sequences. This integration of this into practical security features in combination with covert features based on DNA matrix authentication and other more straightforwardly authenticable features to provide multi- technology security solutions will be described.

  9. Development programs of cutting-edge technologies for measurement and detection of nuclear material for safeguards and security

    International Nuclear Information System (INIS)

    Seya, Michio; Wakabayashi, Shuji; Naoi, Yosuke; Ohkubo, Michiaki; Senzaki, Masao

    2011-01-01

    The Integrated Support Center for Nuclear Nonproliferation and Nuclear Security ('ISCN', hereafter) of Japan Atomic Energy Agency (JAEA) has development programs of cutting-edge technologies for measurement and detection of nuclear materials for nuclear safeguards and security, under the sponsorship of Japanese government (MEXT: Ministry of Education, Culture, Sports, Science and Technology). ISCN started development programs of the following technologies this year. (1) NRF (Nuclear Resonance Fluorescence) NDA technology using laser Compton scattering (LCS) gamma-rays, (2) Alternative to 3 He neutron detection technology using inorganic solid scintillator. ISCN is also going to conduct a demonstration test of a spent fuel Pu-NDA system that is to be developed by LANL (Los Alamos National Laboratory) using very sophisticated neutron measurement technologies, under JAEA/USDOE cooperation agreement. This presentation shows the above programs of ISCN. (author)

  10. Library Assessment Research: A Content Comparison from Three American Library Journals

    Directory of Open Access Journals (Sweden)

    Ethan J. Allen

    2018-03-01

    Full Text Available Improvement of academic library services as an outcome of continuous assessment is an aim of libraries of higher education institutions. Academic libraries are realizing the need to document evidence of their value to the institutions and the patrons they serve. Publications that include assessment research are reaching library decision makers, who seek to apply evidence to improve services or implement best practices that benefit all stakeholders. Following two previous studies that reported longitudinally on front-line library services, this paper investigates current five-year trending of three prestigious academic library journals in the publication of assessment studies. Data for this study were drawn through a content analysis process, in which the investigators selected studies for inclusion using a set of criteria developed in a pilot exercise. After individually examining 649 research articles, published between 2012 and 2016, 126 met the study’s selection criteria and were categorized according to the type of service they studied. Papers on information literacy instruction dominated, while reference services, technology, and general assessment studies saw less representation in the three journals. This finding reflects the priority placed upon information literacy instruction and describes how three American library journals are responding to current trends across academic libraries.

  11. Development and Synthesis of DNA-Encoded Benzimidazole Library.

    Science.gov (United States)

    Ding, Yun; Chai, Jing; Centrella, Paolo A; Gondo, Chenaimwoyo; DeLorey, Jennifer L; Clark, Matthew A

    2018-04-25

    Encoded library technology (ELT) is an effective approach to the discovery of novel small-molecule ligands for biological targets. A key factor for the success of the technology is the chemical diversity of the libraries. Here we report the development of DNA-conjugated benzimidazoles. Using 4-fluoro-3-nitrobenzoic acid as a key synthon, we synthesized a 320 million-member DNA-encoded benzimidazole library using Fmoc-protected amino acids, amines and aldehydes as diversity elements. Affinity selection of the library led to the discovery of a novel, potent and specific antagonist of the NK3 receptor.

  12. PREFACE: 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies

    Science.gov (United States)

    Shuja Syed, Ahmed

    2013-12-01

    The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want

  13. Research data management and libraries: relationships, activities, drivers and influences.

    Directory of Open Access Journals (Sweden)

    Stephen Pinfield

    Full Text Available The management of research data is now a major challenge for research organisations. Vast quantities of born-digital data are being produced in a wide variety of forms at a rapid rate in universities. This paper analyses the contribution of academic libraries to research data management (RDM in the wider institutional context. In particular it: examines the roles and relationships involved in RDM, identifies the main components of an RDM programme, evaluates the major drivers for RDM activities, and analyses the key factors influencing the shape of RDM developments. The study is written from the perspective of library professionals, analysing data from 26 semi-structured interviews of library staff from different UK institutions. This is an early qualitative contribution to the topic complementing existing quantitative and case study approaches. Results show that although libraries are playing a significant role in RDM, there is uncertainty and variation in the relationship with other stakeholders such as IT services and research support offices. Current emphases in RDM programmes are on developments of policies and guidelines, with some early work on technology infrastructures and support services. Drivers for developments include storage, security, quality, compliance, preservation, and sharing with libraries associated most closely with the last three. The paper also highlights a 'jurisdictional' driver in which libraries are claiming a role in this space. A wide range of factors, including governance, resourcing and skills, are identified as influencing ongoing developments. From the analysis, a model is constructed designed to capture the main aspects of an institutional RDM programme. This model helps to clarify the different issues involved in RDM, identifying layers of activity, multiple stakeholders and drivers, and a large number of factors influencing the implementation of any initiative. Institutions may usefully benchmark their

  14. Research data management and libraries: relationships, activities, drivers and influences.

    Science.gov (United States)

    Pinfield, Stephen; Cox, Andrew M; Smith, Jen

    2014-01-01

    The management of research data is now a major challenge for research organisations. Vast quantities of born-digital data are being produced in a wide variety of forms at a rapid rate in universities. This paper analyses the contribution of academic libraries to research data management (RDM) in the wider institutional context. In particular it: examines the roles and relationships involved in RDM, identifies the main components of an RDM programme, evaluates the major drivers for RDM activities, and analyses the key factors influencing the shape of RDM developments. The study is written from the perspective of library professionals, analysing data from 26 semi-structured interviews of library staff from different UK institutions. This is an early qualitative contribution to the topic complementing existing quantitative and case study approaches. Results show that although libraries are playing a significant role in RDM, there is uncertainty and variation in the relationship with other stakeholders such as IT services and research support offices. Current emphases in RDM programmes are on developments of policies and guidelines, with some early work on technology infrastructures and support services. Drivers for developments include storage, security, quality, compliance, preservation, and sharing with libraries associated most closely with the last three. The paper also highlights a 'jurisdictional' driver in which libraries are claiming a role in this space. A wide range of factors, including governance, resourcing and skills, are identified as influencing ongoing developments. From the analysis, a model is constructed designed to capture the main aspects of an institutional RDM programme. This model helps to clarify the different issues involved in RDM, identifying layers of activity, multiple stakeholders and drivers, and a large number of factors influencing the implementation of any initiative. Institutions may usefully benchmark their activities against the

  15. The library

    International Nuclear Information System (INIS)

    1980-01-01

    A specialized library is essential for conducting the research work of the Uranium Institute. The need was recognized at the foundation of the Institute and a full-time librarian was employed in 1976 to establish the necessary systems and begin the task of building up the collection. A brief description is given of the services offered by the library which now contains books, periodicals, pamphlets and press cuttings, focussed on uranium and nuclear energy, but embracing economics, politics, trade, legislation, geology, mining and mineral processing, environmental protection and nuclear technology. (author)

  16. Building the Digital Library Infrastructure: A Primer.

    Science.gov (United States)

    Tebbetts, Diane R.

    1999-01-01

    Provides a framework for examining the complex infrastructure needed to successfully implement a digital library. Highlights include database development, online public-access catalogs, interactive technical services, full-text documents, hardware and wiring, licensing, access, and security issues. (Author/LRW)

  17. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  18. Customer service in libraries best practices

    CERN Document Server

    Harmon, Charles

    2013-01-01

    In this book, nine librarians from across the country describe their libraries' best practices in this key area. Their contributions range from all-encompassing customer service policies and models any library can both adapt and be proud of to micro-approaches that emphasize offering excellent user-focused technology planning, picture book arrangement with patrons in mind, Web 2.0 tools to connect users with the library, establishing good service delivery chains, and making your library fantastic for homeschoolers.

  19. The importance of professional education programs in libraries and the applications university libraries in Istanbul

    OpenAIRE

    Konya, Ümit

    2007-01-01

    Development of new advanced staff training programs becomes a necessity in this rapidly changing technology environment considering its effects on library services. In this paper, the importance of staff training programs will be emphasized, and examples of such programs at university libraries in Istanbul will be reviewed.

  20. Small libraries a handbook for successful management

    CERN Document Server

    Reed, Sally Gardner

    2002-01-01

    ""A gem""--Booklist; ""outstanding""--Library Journal; ""indispensable, invaluable""--Midwest Book Review; ""one of the best...wonderful""--Wilson Library Bulletin. This fully revised and updated edition provides current information on automation and technology and on advocacy to help small public libraries strive to make available the same basic services as larger libraries. This book is written for the directors of these honest-to-goodness small libraries, providing both a philosophical as well as a common sense basis for decision making.

  1. The Strategies of Academic Library to Serve Net-Generation

    Directory of Open Access Journals (Sweden)

    candra pratama setiawan

    2018-01-01

    Full Text Available The fast developments in information and communication technology have rapidly shaped and created enormous changes in the way people live and use libraries. The generation who grow in this era is called net generation. Academic libraries, where the majority of the users are the netgeneration, have started to implement the concept of hybrid library as a response of the technological advances. The trend of digital collections usage is getting increase, on the other hand, the number of library visitor is getting lower significantly. The condition make librarians afraid of being abandoned by its users, whereas libraries still have many physical collections. This paper is written as a result of simple observation in some libraries where the needs of netgeneration has accomodated. The concept of library as place, and library marketing offer the solutions to deal with the problem. Libraries can develop and provide some facilities that suitable with the net-generation characteristics. In addition, libraries can create some events to promote their services even the collections to attract the users to visit library.

  2. My Kansas Library on the Web

    Science.gov (United States)

    Moreland, Sharon

    2009-01-01

    In this article, the author, a technology consultant for the Northeast Kansas Library System (NEKLS), shares the story of how the Kansas Library on the Web (KLOW) program was created. KLOW's story begins with the initial startup fund finding and the enthusiasm of the six pilot libraries. The middle of the story has to do with building a flexible,…

  3. The National Library Service (SBN towards digital

    Directory of Open Access Journals (Sweden)

    Giuliana Sgambati

    2003-12-01

    Full Text Available In the sector of technologies for the Information Society, the General Direction for Library Heritage and Cultural Institutes has promoted two programs: · SBN: The National Library Service (Servizio Bibliotecario Nazionale · BDI: The Italian Digital Library (Biblioteca Digitale Italiana and another project, which was approved on March 18, 2003: · BDI&NTC: The Italian Digital Library and Cultural Tourist Network

  4. Tapping Teen Talent in Queens: A Library-Based, LSCA-Funded Youth Development Success Story from New York.

    Science.gov (United States)

    Williams, Barbara Osborne

    1996-01-01

    Describes a program developed by the Youth Services Division at the Queens Borough Public Library's Central Library to help teenagers maximize growth opportunities, build self-esteem, and see the library as a life resource. Highlights include securing funding through LSCA (Library Services and Construction Act), recruiting participants, and…

  5. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  6. Identity of a brand new library

    KAUST Repository

    Vijayakumar, J.K.

    2017-01-01

    King Abdullah University of Science and Technology (KAUST) Library in Saudi Arabia aspires to be one of the great new-generation libraries in the field of scientific research. Its services and systems support a digitally born collection, 97

  7. Reinventing a health sciences digital library--organizational impact.

    Science.gov (United States)

    Moore, Margaret E; Garrison, Scott; Hayes, Barrie; McLendon, Wallace

    2003-01-01

    What is the organizational impact of becoming a digital library, as well as a physical entity with facilities and collections? Is the digital library an add-on or an integrated component of the overall library package? Librarians see sweeping environmental and technological changes. The staff members feel exhilarated and challenged by the pressures to adapt quickly and effectively. Librarians recognize that a Web presence, like other technology components, must be continuously enhanced and regularly re-engineered. The Health Sciences Library, University of North Carolina at Chapel Hill, is reinventing its digital presence to better meet the needs of the community. This paper provides a case study focusing on major changes in planning processes, organizational structure, staffing, budgeting, training, communications, and operations at the Health Sciences Library.

  8. Service Standards for the Mobile/Social Library

    Science.gov (United States)

    Thomas, Lisa Carlucci

    2010-01-01

    Customer service is at the core of everything librarians do in libraries. They strive to create positive customer relationships and to provide added value to the library services offered to their patrons. Emerging technologies offer opportunities for creative integration with library services. Staff should be encouraged to explore, learn, and…

  9. Web Interface Security Vulnerabilities of European Academic Repositories

    Directory of Open Access Journals (Sweden)

    Matus Formanek

    2017-02-01

    Full Text Available The given analysis summarizes the status quo of the level of security of web interfaces of selected European academic repositories in the field of library and information science. It focuses on the presence and qualities of the secure HTTPS protocol via SSL/TLS protocols. The security of the transmitted data is particularly important in the network environment of the Internet, especially if log-in user data is transmitted. Disclosure may have a direct impact on saved digital objects and their metadata which together represent the most valuable parts of systems of digital libraries and repositories. Furthermore, the paper points to the most noticeable vulnerabilities of protocols of web interfaces and presents practical recommendations for the expert public. These may contribute to the increase of the level of security of the discussed systems. The authors base their proposals on the currently available scientific publications and scientific articles about the given topic.

  10. University of Dar es Salaam Library Journal

    African Journals Online (AJOL)

    University of Dar es Salaam Library Journal. ... PROMOTING ACCESS TO AFRICAN RESEARCH ... These include organization and dissemination of information, library education and training, information technology and its application in ...

  11. The social library in three contexts

    DEFF Research Database (Denmark)

    Delica, Kristian Nagel; Elbeshausen, Hans

    2016-01-01

    Across different national contexts public libraries have dealt, in diverse yet comparable ways, with the multiple challenges stemming from globalization, migration, marginalization and technological developments. This article argues, by way of dissecting three cases of library planning programmes...... which focused on centring libraries in their neighbourhoods, that we in recent decades witness the contours of a social library. Discussing experiences from initiatives in the UK, Canada and Denmark we, notwithstanding significant national differences, highlight common features – that libraries bring...... together already existing, but hitherto isolated institutional knowledge and competencies. We conclude by proposing a tentative typology of ‘the social library’....

  12. Risk, security and technology: governing football supporters in the twenty-first century

    NARCIS (Netherlands)

    Spaaij, R.

    2013-01-01

    This paper critically examines the security and risk management technologies that are being used to conduct and pre-empt the behaviour of football supporters. It is shown how, in the Netherlands, pre-emptive risk management in the governing of football supporters involves a dispersed and fragmented

  13. The Library of the (Not-So-Distant) Future.

    Science.gov (United States)

    Lyman, Peter

    1991-01-01

    The research library is the focus of a scholarly communication system in crisis. Costs, volume of information, and technological advancement have brought changes that significantly challenge the current library structure. However, technology is not the most important variable; the culture and lifestyle of faculty and students must adapt also. (MSE)

  14. Securing a better future for all: making a difference with nuclear technology

    International Nuclear Information System (INIS)

    Mohamad, Daud; )

    2014-01-01

    The IAEA is an inter-governmental organization and the world's centre of cooperation in the nuclear field. As per its mandate, the IAEA shall seek to accelerate and enlarge the contribution of atomic energy to peace, health and prosperity throughout the world. The IAEA executes its mandate on the basis of three pillars: nuclear verification and security, safety and technology transfer. Nuclear technologies and techniques can offer vital assistance in fighting disease, improving food security and safety, and studying and sustainably managing water resources and the environment. The IAEA's Department of Nuclear Sciences and Applications works to address these critical developmental needs by helping Member States to apply nuclear science and technology more effectively where they have a comparative advantage and can have substantial socio-economic impact. The scale of these needs is growing each day as the world's population and life expectancies increase, as global industry and migration multiply the populations of the world's cities and their demands for resources, and as these trends impact human disease, the availability of safe and sufficient supplies of food and water, the health of our terrestrial and marine ecosystems, and the variability of our climate. These are highly complex challenges, and nuclear science and technology, can make impactful contributions in helping Member States to respond to these challenges

  15. Safeguarding cultural properties security for museums, libraries, parks, and zoos

    CERN Document Server

    Layne, Stevan P

    2014-01-01

    Safeguarding Cultural Properties is a step-by-step guide for creating and maintaining a comprehensive security program in any cultural facility or public institution. Author Stevan P. Layne, the leading expert in the field of cultural property protection, draws from his many years of experience providing protection training and planning to more than 350 cultural and public institutions around the world. Designed especially for those with limited security budgets, the book provides a proven and effective program for hiring the right security personnel, selecting the appropriate electronic s

  16. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  17. Building a Library Web Server on a Budget.

    Science.gov (United States)

    Orr, Giles

    1998-01-01

    Presents a method for libraries with limited budgets to create reliable Web servers with existing hardware and free software available via the Internet. Discusses staff, hardware and software requirements, and security; outlines the assembly process. (PEN)

  18. The Department of Energy's safeguards and security technology development program

    International Nuclear Information System (INIS)

    Smith, G.D.; Pocratsky, C.A.

    1995-01-01

    The US DOE has had a program that develops technologies to protect sensitive nuclear weapons facilities for more than thirty years. The mission of the program is overwhelmingly diverse, as it must be to protect an array of assets such as nuclear weapons, special nuclear material in various forms, components of nuclear weapons, and classified nuclear weapons design information. Considering that the nuclear weapons complex consists of dozens of facilities that are scattered all over the US, the technology development mission is very challenging. Complicating matters further is the ever uncertain future of the DOE. Some examples of dramatic Departmental mission changes that directly impact their security technology development program are given. A few development efforts are highlighted as examples of efforts currently being sponsored. They are: automated sensor testing devices to help reduce the requirement for personnel to enter vaults containing highly radioactive nuclear materials; a vehicle inspection portal to screen vehicles for hidden passengers, nuclear material, explosives, and other contraband; non-lead and short-range ammunition as an environmentally safe alternative to lead ammunition; a complex-wide visitor access control system to allow all DOE employees to travel to all sites with a commonly recognized credential; automated nuclear material monitoring technologies to provide assurance that material in storage has not been tampered with; laser radar as a potential solution to early warning deficiencies throughout the Department; performance testing standards for many security products to include an automated and consistent standard for assessing the quality of video; low temperature pyrotechnic smoke as a possible adversary delay mechanism; modular vaults to provide temporary protection for nuclear material during D and D activities, and a protection approach for restricted passage areas such as the volume above a tiled ceiling or within a crawl space

  19. Systematic, appropriate, and cost-effective application of security technologies in U.S. public schools to reduce crime, violence, and drugs

    Science.gov (United States)

    Green, Mary W.

    1997-01-01

    As problems of violence and crime become more prevalent in our schools, more and more school districts will elect to use security technologies to control these problems. While the desired change in student and community attitudes will require significant systemic change through intense US social programs, security technologies can greatly augment school staff today by providing services similar to having extra adults present. Technologies such as cameras, sensors, drug detection, biometric and personnel identification, lighting, barriers, weapon and explosives detection, anti- graffiti methods, and duress alarms can all be effective, given they are used in appropriate applications, with realistic expectations and an understanding of limitations. Similar to a high-risk government facility, schools must consider a systems approach to security, which includes the use of personnel and procedures as well as security technologies, such that the synergy created by all these elements together contributes more tot he general 'order maintenance' of the facility than could be achieved by separate measures not integrated or related.

  20. Communications and information infrastructure security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology for critical infrastructure consequence mitigation are also discussed.

  1. A Digital Library Example in the Digital Age: İstanbul Bilgi University Library and e-Resources

    Directory of Open Access Journals (Sweden)

    Banu Elçi

    2015-06-01

    Full Text Available This article describes the ongoing of the traditional library and service concept alteration to the library and service concept of the digital age and refers to an instance as İstanbul Bilgi University Library and e-Resources that pioneers technological advances and digital applications to be integrated into the library field. In this sense it involves services, developments, applications and projects provided by Bilgi Libraries.This article also accounts for a number of works which integrated digital resources and applications and social network interactions of the internet and the web of the digital age and how they are adjusted to the library area.In this context, it refers to an evolvement of a different approach of libraries and enhacements diverged from customary and adopted library service concepts and reveals through the medium of samples from İstanbul Bilgi University Library and e-Resources.

  2. 48 CFR 352.239-72 - Security requirements for Federal information technology resources.

    Science.gov (United States)

    2010-10-01

    ..., Security Self-Assessment Guide for Information Technology Systems and FIPS 200, on an annual basis. (C) HHS... basis, the Contractor shall provide to the Contracting Officer verification that the IT-SP remains valid... Contracting Officer verification that the IT-SC&A remains valid. Evidence of a valid system accreditation...

  3. Virtual Libraries: Meeting the Corporate Challenge.

    Science.gov (United States)

    DiMattia, Susan S.; Blumenstein, Lynn C.

    1999-01-01

    Discusses virtual libraries in corporate settings from the viewpoint of five special librarians. Highlights include competitive advantage, space and related collection issues, the use of technology, corporate culture, information overload, library vulnerability and downsizing, and the importance of service over format. (LRW)

  4. User studies for digital library development

    CERN Document Server

    Dobreva, Milena; Feliciati, Pierluigi

    2012-01-01

    As the information environment becomes increasingly electronic, digital libraries have proliferated, but the focus has often been on innovations in technology and not the user. This title provides a clear overview of the user studies domain and user issues in digital libraries.

  5. A Survey of Complex Object Technologies for Digital Libraries

    Science.gov (United States)

    Nelson, Michael L.; Argue, Brad; Efron, Miles; Denn, Sheila; Pattuelli, Maria Cristina

    2001-01-01

    Many early web-based digital libraries (DLs) had implicit assumptions reflected in their architecture that the unit of focus in the DL (frequently "reports" or "e-prints") would only be manifested in a single, or at most a few, common file formats such as PDF or PostScript. DLs have now matured to the point where their contents are commonly no longer simple files. Complex objects in DLs have emerged from in response to various requirements, including: simple aggregation of formats and supporting files, bundling additional information to aid digital preservation, creating opaque digital objects for e-commerce applications, and the incorporation of dynamic services with the traditional data files. We examine a representative (but not necessarily exhaustive) number of current and recent historical web-based complex object technologies and projects that are applicable to DLs: Aurora, Buckets, ComMentor, Cryptolopes, Digibox, Document Management Alliance, FEDORA, Kahn-Wilensky Framework Digital Objects, Metadata Encoding & Transmission Standard, Multivalent Documents, Open eBooks, VERS Encapsulated Objects, and the Warwick Framework.

  6. Working in the Virtual Stacks: The New Library and Information Science

    Science.gov (United States)

    Kane, Laura Townsend, Ed.

    2011-01-01

    Thanks in part to technology, the boundaries of library positions are dissolving. It is no longer practical to discuss the profession in terms of traditional library types, and in today's library, the relationship between librarians and technology is stronger than ever. In this informative volume, veteran author Laura Townsend Kane interviews…

  7. Seamless user experiences in a brand new library

    KAUST Repository

    Vijayakumar, J.K.

    2012-10-30

    In order to provide seamless user experiences, the brand new libraries are far better positioned. They do not have to manage much in print, at least for the journal section, but huge electronic collection accessible via Internet. They do not worry about migrating to new systems or technology; they just start with whatever the latest available in the market, whether it is new generation ILMS, discovery tools, content management systems, mobile technologies, cloud computing etc. Patrons\\' expectations for seamless experience are met - regardless of their location, device and service they opted for. The story of the two and half years old, Saudi Arabia\\'s brand new King Abdullah University of Science and Technology\\'s Library is not different. Huge amount of electronic resources also provide ever increasing challenges to the new generation libraries in collecting, organizing and delivering the right information, to the right person at the right time. Implementation of a good ILMS supported with better electronic resource management features will help in setting the house right. Well-designed user interfaces, supported with the web scale discovery tools will help the users to have a better search experience. Availability of library collection through the campus mobile applications, latest proxy technologies for out-campus access and integrating the resources to the campus e-learning platform are the main features of the library’s seamless experiences. Libguide platform is used for the first time in Saudi Arabia, to create online research guides by subject librarians. An institutional repository, based on D-Space platform is about to release. Ninety percent of our collection is online; they are purchased, organized and accessed online, like any other brand new academic research libraries. Analysis of usage statistics of different resources show that they are highly used and usage is increased over two years, as the technology improved and implemented.

  8. Digital Libraries--Methods and Applications

    Science.gov (United States)

    Huang, Kuo Hung, Ed.

    2011-01-01

    Digital library is commonly seen as a type of information retrieval system which stores and accesses digital content remotely via computer networks. However, the vision of digital libraries is not limited to technology or management, but user experience. This book is an attempt to share the practical experiences of solutions to the operation of…

  9. Library 101: Why, How, and Lessons Learned

    Science.gov (United States)

    Porter, Michael; King, David Lee

    2010-01-01

    This article describes how and why the Library 101 Project was created and the lessons that the developers learned out of this project. The Library 101 is a project that challenges librarians to revise the paradigm of "basic" library services in order to remain relevant in this technology-driven world. It was developed by Michael Porter,…

  10. Information technology as a tool for the Italian Institute of Social Security (INPS) in the management of social security and civil disability: Pro and cons.

    Science.gov (United States)

    Sammicheli, Michele; Scaglione, Marcella

    2018-01-01

    We examine, from a medical-legal perspective, the pro and cons of the information technology procedures that the Italian Institute of Social Security (INPS) has implemented to manage the provision of social disability assistance, meaning that separate from the payment of pension contributions, being welfare, anchored to an administrative requirement by way of the compulsory payment of a minimum social security contribution.

  11. Helping Students Use Virtual Libraries Effectively.

    Science.gov (United States)

    Fitzgerald, Mary Ann; Galloway, Chad

    2001-01-01

    Describes a study in which online behavior of high school and undergraduate students using GALILEO (Georgia Library Learning Online), a virtual library, were observed. Topics include cognitive demands; technology literacy; domain knowledge; search strategies; relevance; evaluation of information; information literacy standards; and suggestions to…

  12. Nuclear data, cross section libraries and their application in nuclear technology

    International Nuclear Information System (INIS)

    1985-01-01

    These proceedings contain the articles presented at the named seminar. The articles deal with evaluated nuclear data libraries, computer codes for neutron transport and reactor calculations using nuclear data libraries, and the application of nuclear data libraries for the calculation of the interaction of neutron beams with materials. (HSI)

  13. Acceptance Factors Influencing Adoption of National Institute of Standards and Technology Information Security Standards: A Quantitative Study

    Science.gov (United States)

    Kiriakou, Charles M.

    2012-01-01

    Adoption of a comprehensive information security governance model and security controls is the best option organizations may have to protect their information assets and comply with regulatory requirements. Understanding acceptance factors of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) comprehensive…

  14. SYSTEM OF INCREASE OF LIBRARY WORKERS INFORMATIVE LITERACY

    Directory of Open Access Journals (Sweden)

    Svitlana M. Ivanova

    2011-02-01

    Full Text Available The article is devoted to the problems of modern information and communication technologies use in professional activity of library workers. The methods of increase of librarian informative literacy are offered. The special course aiming to prepare the skilled specialists who can decide innovative tasks on introduction, management and work with electronic resources is described. The tasks which will help listeners to enter in a theory and practice of electronic resources use in a modern library are decided in the course, such as: to form skills for working in electronic libraries; to teach the methods of modernization of informative librarian services on the base of technologies and resources of electronic libraries, freely Eprints software use.

  15. The State of Development of Digital Libraries in Poland

    Science.gov (United States)

    Gorny, Miroslaw; Catlow, John; Lewandowski, Rafal

    2010-01-01

    Purpose: The purpose of this paper is to describe the state of development of Polish digital libraries. Design/methodology/approach: The paper describes the establishment of the first digital library in Poland, the creation of the Wielkopolska Digital Library and other regional digital libraries. The organisational and technological solutions used…

  16. RFID in libraries a step toward interoperability

    CERN Document Server

    Ayre, Lori Bowen

    2012-01-01

    The approval by The National Information Standards Organization (NISO) of a new standard for RFID in libraries is a big step toward interoperability among libraries and vendors. By following this set of practices and procedures, libraries can ensure that an RFID tag in one library can be used seamlessly by another, assuming both comply, even if they have different suppliers for tags, hardware, and software. In this issue of Library Technology Reports, Lori Bowen Ayre, an experienced implementer of automated materials handling systems, Provides background on the evolution of the standard

  17. Employing Virtualization in Library Computing: Use Cases and Lessons Learned

    Directory of Open Access Journals (Sweden)

    Arwen Hutt

    2009-09-01

    Full Text Available This paper provides a broad overview of virtualization technology and describes several examples of its use at the University of California, San Diego Libraries. Libraries can leverage virtualization to address many long-standing library computing challenges, but careful planning is needed to determine if this technology is the right solution for a specific need. This paper outlines both technical and usability considerations, and concludes with a discussion of potential enterprise impacts on the library infrastructure.

  18. Special Reports; Homeland Security and Information Management; The Development of Electronic Government in the United States: The Federal Policy Experience; Digital Rights Management: Why Libraries Should Be Major Players; The Current State and Future Promise of Portal Applications; Recruitment and Retention: A Professional Concern.

    Science.gov (United States)

    Relyea, Harold C.; Halchin, L. Elaine; Hogue, Henry B.; Agnew, Grace; Martin, Mairead; Schottlaender, Brian E. C.; Jackson, Mary E.

    2003-01-01

    Theses five reports address five special issues: the effects of the September 11 attacks on information management, including homeland security, Web site information removal, scientific and technical information, and privacy concerns; federal policy for electronic government information; digital rights management and libraries; library Web portal…

  19. Map it @ WSU: Development of a Library Mapping System for Large Academic Libraries

    Directory of Open Access Journals (Sweden)

    Paul Gallagher

    2010-06-01

    Full Text Available The Wayne State Library System launched its library mapping application in February 2010, designed to help locate materials in the five WSU libraries. The system works within the catalog to show the location of materials, as well as provides a web form for use at the reference desk. Developed using PHP and MySQL, it requires only minimal effort to update using a unique call number overlay mechanism. In addition to mapping shelved materials, the system provides information for any of the over three hundred collections held by the WSU Libraries. Patrons can do more than just locate a book on a shelf: they can learn where to locate reserve items, how to access closed collections, or get driving maps to extension center libraries. The article includes a discussion of the technology reviewed and chosen during development, an overview of the system architecture, and lessons learned during development.

  20. The Adoption of Innovations in Library Organizations

    Directory of Open Access Journals (Sweden)

    Su-may Sheih Chen

    2001-12-01

    Full Text Available To enhance the quality of library and information service, libraries have borrowed from business theory and practice in planning and evaluating library services. However, an area of business theory that has received relatively little attention in library science is organizational innovation. Reports in the business literature provide evidence that innovation is essential for both development and survival. In increasingly unstable times of rapidly changing information technology, libraries must use the literature of innovation as well as that of planning and evaluation to shape better libraries. This paper explores key issues related to innovation in libraries including the nature, the barriers, and the ways to adopt and implement innovative strategies successfully. [Article content in Chinese

  1. IT Convergence and Security 2012

    CERN Document Server

    Chung, Kyung-Yong

    2013-01-01

    The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and the latest information technology. The intended readership are societies, enterprises, and research institutes, and intended content level is mid- to highly educated personals. The most important features and benefits of the proceedings are the introduction of the most recent information technology and its related ideas, applications and problems related to technology convergence, and its case studies and finally an introduction of converging existing security techniques through convergence security. Overall, through the proceedings, authors will be able to understand the most state of the art information strategies and technologies of convergence security.

  2. Consequence of audio visual collection in school libraries

    OpenAIRE

    Kuri, Ramesh

    2016-01-01

    The collection of Audio-Visual in library plays important role in teaching and learning. The importance of audio visual (AV) technology in education should not be underestimated. If audio-visual collection in library is carefully planned and designed, it can provide a rich learning environment. In this article, an author discussed the consequences of Audio-Visual collection in libraries especially for students of school library

  3. Development of special libraries in Slovenia

    OpenAIRE

    Nada Češnovar

    2002-01-01

    Although Slovenia is a small European country with only 2 million inhabitants, Slovenian librarianship can be compared with any other bigger country. The staffing and information technology in special libraries have been accelerating for the last four decades.Seventeen years have passed since the first meeting of special libraries. When Slovenia attained independence, numerous changes occured in the field of special librarianship.Due to the economic crisis, several special libraries of enterp...

  4. Understand the Big Picture So You Can Plan for Network Security

    Science.gov (United States)

    Cervone, Frank

    2005-01-01

    This article discusses network security for libraries. It indicates that there were only six exploit (security exposure) problems, worldwide, reported to the CERT Coordination Center back in 1988. In that year, the CERT had just been established to provide a clearinghouse for exchanging information about network security problems. By 2003, the…

  5. Academic medical center libraries on the Web.

    Science.gov (United States)

    Tannery, N H; Wessel, C B

    1998-10-01

    Academic medical center libraries are moving towards publishing electronically, utilizing networked technologies, and creating digital libraries. The catalyst for this movement has been the Web. An analysis of academic medical center library Web pages was undertaken to assess the information created and communicated in early 1997. A summary of present uses and suggestions for future applications is provided. A method for evaluating and describing the content of library Web sites was designed. The evaluation included categorizing basic information such as description and access to library services, access to commercial databases, and use of interactive forms. The main goal of the evaluation was to assess original resources produced by these libraries.

  6. Use of Persuasive Technology to Change End-Users- IT Security Aware Behaviour: A Pilot Study

    OpenAIRE

    Ai Cheo Yeo; Md. Mahbubur Rahim; Yin Ying Ren

    2008-01-01

    Persuasive technology has been applied in marketing, health, environmental conservation, safety and other domains and is found to be quite effective in changing people-s attitude and behaviours. This research extends the application domains of persuasive technology to information security awareness and uses a theory-driven approach to evaluate the effectiveness of a web-based program developed based on the principles of persuasive technology to improve the information sec...

  7. Linking Library Automation Systems in the Internet: Functional Requirements, Planning, and Policy Issues.

    Science.gov (United States)

    Lynch, Clifford A.

    1989-01-01

    This guide to functions to consider in selecting an academic library automation system to operate in a networked environment covers (1) the current academic networking environment; (2) library automation hardware and software platforms; (3) user interface requirements for public access; and (4) security and authentication. (10 references) (MES)

  8. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  9. Library Automation and Networking in India: Problems and Prospects.

    Science.gov (United States)

    Vyas, S. D.

    1997-01-01

    Examines the information infrastructure and the impact of information technology in India. Highlights include attempts toward automation; library networking at the national and local level; descriptions of four major networks; library software; and constraints of networking in academic libraries. (LRW)

  10. Science, Technology, Engineering, and Mathematics (STEM) Education Reform to Enhance Security of the Global Cyberspace

    Science.gov (United States)

    2014-05-01

    towards cloud computing technologies and capabilities demand needs for developing new tools that work in ensemble to handle security challenges. A...programs with the schools and/or hire from their pool of students. Therefore, no real STEM standards exist at the tertiary and beyond levels of education ...successful in cyber operations and network security related jobs much early on into the new STEM education model pipeline. Subjects such as computer

  11. An Integrated Library System: Preliminary Considerations.

    Science.gov (United States)

    Neroda, Edward

    Noting difficulties experienced by small to medium sized colleges in acquiring integrated library computer systems, this position paper outlines issues related to the subject with the intention of increasing familiarity and interest in integrated library systems. The report includes: a brief review of technological advances as they relate to…

  12. 77 FR 57072 - Proposed Information Collection; Comment Request; National Security and Critical Technology...

    Science.gov (United States)

    2012-09-17

    ..., DC 20230 (or via the Internet at [email protected] ). FOR FURTHER INFORMATION CONTACT: Requests for... techniques or other forms of information technology. Comments submitted in response to this notice will be... DEPARTMENT OF COMMERCE Bureau of Industry and Security Proposed Information Collection; Comment...

  13. The survey of academic libraries

    CERN Document Server

    2014-01-01

    The Survey of Academic Libraries, 2014-15 Edition looks closely at key benchmarks for academic libraries in areas such as spending for books and e-books, deployment and pay rates for student workers, use of tablet computers, cloud computing and other new technologies, database licensing practices, and much more. The study includes detailed data on overall budgets, capital budgets, salaries and materials spending, and much more of interest to academic librarians and their suppliers. Data in this 200+ page report is broken out by size and type of library for easy benchmarking.

  14. Digital media labs in libraries

    CERN Document Server

    Goodman, Amanda L

    2014-01-01

    Families share stories with each other and veterans reconnect with their comrades, while teens edit music videos and then upload them to the web: all this and more can happen in the digital media lab (DML), a gathering of equipment with which people create digital content or convert content that is in analog formats. Enabling community members to create digital content was identified by The Edge Initiative, a national coalition of leading library and local government organizations, as a library technology benchmark. Surveying academic and public libraries in a variety of settings and sharing a

  15. Virtual Reference Service in Academic Libraries in West Africa

    Science.gov (United States)

    Sekyere, Kwabena

    2011-01-01

    As technology continues to advance, libraries in Europe and America continue to improve upon their virtual reference services by employing new Web technologies and applying them to existing services. West African academic libraries have begun providing resources electronically to their users but still typically lag behind in the services they…

  16. What Technology Skills Do Developers Need? A Text Analysis of Job Listings in Library and Information Science (LIS from Jobs.code4lib.org

    Directory of Open Access Journals (Sweden)

    Monica Maceli

    2015-09-01

    Full Text Available Technology plays an indisputably vital role in library and information science (LIS work; this rapidly moving landscape can create challenges for practitioners and educators seeking to keep pace with such change.  In pursuit of building our understanding of currently sought technology competencies in developer-oriented positions within LIS, this paper reports the results of a text analysis of a large collection of job listings culled from the Code4lib jobs website.  Beginning over a decade ago as a popular mailing list covering the intersection of technology and library work, the Code4lib organization's current offerings include a website that collects and organizes LIS-related technology job listings.  The results of the text analysis of this dataset suggest the currently vital technology skills and concepts that existing and aspiring practitioners may target in their continuing education as developers.

  17. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Scott A. McBride

    2009-04-01

    This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nation’s current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

  18. Connecting people and information: how an African special library is building bridges

    CSIR Research Space (South Africa)

    Halland, Y

    2009-04-30

    Full Text Available : How an African Special Library is Building Bridges Yvonne Halland, BA Library Science Strategic Information Resources Coordinator CSIR Information Services Pretoria, South Africa Member, Science & Technology Division Noxolo Mniki... delivery, information literacy training and knowledge management. Although the CSIR library was at one time regarded as the top science & technology library in the country, the upward spiralling costs of information resources over the last twenty...

  19. Evaluating School Library Information Services in the Digital Age.

    Science.gov (United States)

    Everhart, Nancy

    2000-01-01

    Discusses criteria for evaluating school library information services. Highlights include types of services; physical facilities; library usage; circulation statistics; changes due to technology; fill rate, or the percentage of successful searches for library materials; OPAC (online public access catalog) reports; observation; and examining…

  20. Chemical Space of DNA-Encoded Libraries.

    Science.gov (United States)

    Franzini, Raphael M; Randolph, Cassie

    2016-07-28

    In recent years, DNA-encoded chemical libraries (DECLs) have attracted considerable attention as a potential discovery tool in drug development. Screening encoded libraries may offer advantages over conventional hit discovery approaches and has the potential to complement such methods in pharmaceutical research. As a result of the increased application of encoded libraries in drug discovery, a growing number of hit compounds are emerging in scientific literature. In this review we evaluate reported encoded library-derived structures and identify general trends of these compounds in relation to library design parameters. We in particular emphasize the combinatorial nature of these libraries. Generally, the reported molecules demonstrate the ability of this technology to afford hits suitable for further lead development, and on the basis of them, we derive guidelines for DECL design.

  1. The House of Security: Stakeholder Perceptions of Security Assessment and Importance

    OpenAIRE

    Ang, Wee Horng; Deng, Vicki; Lee, Yang; Madnick, Stuart; Mistree, Dinsha; Siegel, Michael; Strong, Diane

    2007-01-01

    In this paper we introduce a methodology for analyzing differences regarding security perceptions within and between stakeholders, and the elements which affect these perceptions. We have designed the €܈ouse of Security€ݬ a security assessment model that provides the basic framework for considering eight different constructs of security: Vulnerability, Accessibility, Confidentiality, Technology Resources for Security, Financial Resources for Security, Business Strategy for Security, Secur...

  2. Information security awareness in small information technology-dependent business organisations

    OpenAIRE

    2015-01-01

    M.A. (Business Management) Small businesses thrive in the developing economy of South Africa and address the important issue of unemployment and poverty that exist in the country. A large number of these business organisations can be found in the province of Gauteng because of the large and diverse economic contribution the province delivers to the economy of South Africa. With the increased use of technology in the small businesses of Gauteng and South Africa, the risks around cyber-secur...

  3. Understanding the Adoption Process of National Security Technology: An Integration of Diffusion of Innovations and Volitional Behavior Theories.

    Science.gov (United States)

    Iles, Irina A; Egnoto, Michael J; Fisher Liu, Brooke; Ackerman, Gary; Roberts, Holly; Smith, Daniel

    2017-11-01

    After the 9/11 terrorist attacks, the U.S. government initiated several national security technology adoption programs. The American public, however, has been skeptical about these initiatives and adoption of national security technologies has been mandated, rather than voluntary. We propose and test a voluntary behavioral intention formation model for the adoption of one type of new security technology: portable radiation detectors. Portable radiation detectors are an efficient way of detecting radiological and nuclear threats and could potentially prevent loss of life and damage to individuals' health. However, their functioning requires that a critical mass of individuals use them on a daily basis. We combine the explanatory advantages of diffusion of innovation with the predictive power of two volitional behavior frameworks: the theory of reasoned action and the health belief model. A large sample survey (N = 1,482) investigated the influence of factors identified in previous diffusion of innovation research on portable radiation detector adoption intention. Results indicated that nonfinancial incentives, as opposed to financial incentives, should be emphasized in persuasive communications aimed at fostering adoption. The research provides a new integration of diffusion of innovation elements with determinants of volitional behavior from persuasion literature, and offers recommendations on effective communication about new security technologies to motivate public adoption and enhance national safety. © 2017 Society for Risk Analysis.

  4. Comparison of Iranian National Medical Library with digital libraries of selected countries.

    Science.gov (United States)

    Zare-Farashbandi, Firoozeh; Najafi, Nayere Sadat Soleimanzade; Atashpour, Bahare

    2014-01-01

    The important role of information and communication technologies and their influence on methods of storing, retrieving information in digital libraries, has not only changed the meanings behind classic library activates but has also created great changes in their services. However, it seems that not all digital libraries provide their users with similar services and only some of them are successful in fulfilling their role in digital environment. The Iranian National Medical library is among those that appear to come short compared to other digital libraries around the world. By knowing the different services provided by digital libraries worldwide, one can evaluate the services provided by Iranian National Medical library. The goal of this study is a comparison between Iranian National Medical library and digital libraries of selected countries. This is an applied study and uses descriptive - survey method. The statistical population is the digital libraries around the world which were actively providing library services between October and December 2011 and were selected by using the key word "Digital Library" in Google search engine. The data-gathering tool was direct access to the websites of these digital libraries. The statistical study is descriptive and Excel software was used for data analysis and plotting of the charts. The findings showed that among the 33 digital libraries investigated worldwide, most of them provided Browse (87.87%), Search (84.84%), and Electronic information retrieval (57.57%) services. The "Help" in public services (48/48%) and "Interlibrary Loan" in traditional services (27/27%) had the highest frequency. The Iranian National Medical library provides more digital services compared to other libraries but has less classic and public services and has less than half of possible public services. Other than Iranian National Medical library, among the 33 libraries investigated, the leaders in providing different services are Library of

  5. Library and information science practice in Nigeria: trends and issues

    African Journals Online (AJOL)

    Library and information science practice in Nigeria: trends and issues. ... library and information science practice whereby the advent of new technologies has had ... for the Nigerian library schools where future professionals are being trained.

  6. LI-FI TECHNOLOGY AND THE NEW CONCEPT OF DATA TRANSFER SECURITY

    Directory of Open Access Journals (Sweden)

    Ramona DUMITRAȘCU

    2017-05-01

    Full Text Available Li-Fi is a wireless technology that transmits high-speed data using visible light communication (VLC, it can achieve speeds of 224 gigabits per second in the lab. The potential Li-Fi technology can change a lot in virtual word considering it can provide transmission at 1 GB per second - that's 100 times faster than current average Wi-Fi speeds. By flickering the light from a single LED, Li-Fi technology can transmit far more data than a cellular tower, using Visible Light Communication (VLC technology - a medium that uses visible light between 400 and 800 terahertz (THz. It works basically like an incredibly advanced form of Morse code - flicking an LED on and off at extreme speeds and can be used to write and transmit things in binary code. The benefit of Li-Fi over Wi-Fi, other than potentially much faster speeds, is that because light cannot pass through walls, it makes it a whole lot more secure.

  7. Exploring the Application of Shared Ledger Technology to Safeguards and other National Security Topics

    Energy Technology Data Exchange (ETDEWEB)

    Frazar, Sarah L.; Winters, Samuel T.; Kreyling, Sean J.; Joslyn, Cliff A.; West, Curtis L.; Schanfein, Mark J.; Sayre, Amanda M.

    2017-07-17

    In 2016, the Office of International Nuclear Safeguards at the National Nuclear Security Administration (NNSA) within the Department of Energy (DOE) commissioned the Pacific Northwest National Laboratory (PNNL) to explore the potential implications of the digital currency bitcoin and its underlying technologies on the safeguards system. The authors found that one category of technologies referred to as Shared Ledger Technology (SLT) offers a spectrum of benefits to the safeguards system. While further research is needed to validate assumptions and findings in the paper, preliminary analysis suggests that both the International Atomic Energy Agency (IAEA) and Member States can use SLT to promote efficient, effective, accurate, and timely reporting, and increase transparency in the safeguards system without sacrificing confidentiality of safeguards data. This increased transparency and involvement of Member States in certain safeguards transactions could lead to increased trust and cooperation among States and the public, which generates a number of benefits. This paper describes these benefits and the analytical framework for assessing SLT applications for specific safeguards problems. The paper will also describe other national security areas where SLT could provide benefits.

  8. Providing Access to Library Automation Systems for Students with Disabilities.

    Science.gov (United States)

    California Community Colleges, Sacramento. High-Tech Center for the Disabled.

    This document provides information on the integration of assistive computer technologies and library automation systems at California Community Colleges in order to ensure access for students with disabilities. Topics covered include planning, upgrading, purchasing, implementing and using these technologies with library systems. As information…

  9. Technological energy and environmental refurbishment of historical Italian libraries

    OpenAIRE

    Alessandra Battisti; Fabrizio Tucci

    2014-01-01

    Active libraries in Italy are around 13.000 and, taken as a whole, the property and management relate mainly to public institutions such as the state, regions, local authorities, cultural institutions, universities, and partly to religious institutions and individuals. In this paper is presented the work of studies and research, commissioned to the authors by the General Direction for Libraries of the Ministry of Heritage and Culture (Mibac), which ended recently, addressing the architectural...

  10. Playful Technology

    DEFF Research Database (Denmark)

    Johansen, Stine Liv; Eriksson, Eva

    2013-01-01

    In this paper, the design of future services for children in Danish public libraries is discussed, in the light of new challenges and opportunities in relation to new media and technologies. The Danish government has over the last few years initiated and described a range of initiatives regarding...... in the library, the changing role of the librarians and the library space. We argue that intertwining traditional library services with new media forms and engaging play is the core challenge for future design in physical public libraries, but also that it is through new media and technology that new...

  11. Chinese computerized nuclear data library

    International Nuclear Information System (INIS)

    Liang Qichang; Cai Dunjiu

    1996-01-01

    The Second Version of Chinese Evaluated Nuclear Data Library (CENDL-2) includes the complete neutron nuclear data sets of 54 important elements and isotopes used for nuclear science and engineering with the incident neutron energy from 10 -5 eV to 20 MeV, the international universal format ENDF/B-6 was adopted. Now, the Chinese Computerized nuclear data library has been developed and put into operation. That is, the users can make on-line use of the main data libraries for evaluated neutron reaction data in the world of EXFOR experimental nuclear data library on the terminal of computer via the perfect computer software system, carry out directly the nuclear engineering calculation or nuclear data evaluation, enjoy the use of the resource of our nuclear data libraries for their development of nuclear energy and nuclear technology applications

  12. Sustainability Challenge for Academic Libraries: Planning for the Future

    Science.gov (United States)

    Jankowska, Maria Anna; Marcum, James W.

    2010-01-01

    There is growing concern that a variety of factors threaten the sustainability of academic libraries: developing and preserving print and digital collections, supplying and supporting rapidly changing technological and networking infrastructure, providing free services, maintaining growing costs of library buildings, and lowering libraries'…

  13. Academic Library Services in Virtual Worlds: An Examination of the Potential for Library Services in Immersive Environments

    Science.gov (United States)

    Ryan, Jenna; Porter, Marjorie; Miller, Rebecca

    2010-01-01

    Current literature on libraries is abundant with articles about the uses and the potential of new interactive communication technology, including Web 2.0 tools. Recently, the advent and use of virtual worlds have received top billing in these works. Many library institutions are exploring these virtual environments; this exploration and the…

  14. Serials Management In Polytechnic Libraries in Nigeria: A ...

    African Journals Online (AJOL)

    Serials Management In Polytechnic Libraries in Nigeria: A Comparative Study of Kaduna Polytechnic And Yaba College of Technology Libraries. ... Samaru Journal of Information Studies. Journal Home · ABOUT THIS JOURNAL · Advanced ...

  15. Information Technology Convergence, Secure and Trust Computing, and Data Management ITCS 2012 & STA 2012

    CERN Document Server

    Kim, Jongsung; Zou, Deqing; Lee, Yang

    2012-01-01

    ITCS 2012 and STA 2012 address the various theories and practical applications of information technology convergence, secure and trust computing, and data management in future environments. It will present important results of significant value to solve the application services and various problems within the scope of ITCS 2012 & STA 2012. In addition, we expect it will trigger further related research and technology developments which will improve our lives in the future.

  16. A Security Audit Framework to Manage Information System Security

    Science.gov (United States)

    Pereira, Teresa; Santos, Henrique

    The widespread adoption of information and communication technology have promoted an increase dependency of organizations in the performance of their Information Systems. As a result, adequate security procedures to properly manage information security must be established by the organizations, in order to protect their valued or critical resources from accidental or intentional attacks, and ensure their normal activity. A conceptual security framework to manage and audit Information System Security is proposed and discussed. The proposed framework intends to assist organizations firstly to understand what they precisely need to protect assets and what are their weaknesses (vulnerabilities), enabling to perform an adequate security management. Secondly, enabling a security audit framework to support the organization to assess the efficiency of the controls and policy adopted to prevent or mitigate attacks, threats and vulnerabilities, promoted by the advances of new technologies and new Internet-enabled services, that the organizations are subject of. The presented framework is based on a conceptual model approach, which contains the semantic description of the concepts defined in information security domain, based on the ISO/IEC_JCT1 standards.

  17. RANCANGAN INFORMATION TECHNOLOGY SERVICE MANAGEMENT MENGGUNAKAN INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY (Studi Kasus: STMIK AMIKOM Purwokerto

    Directory of Open Access Journals (Sweden)

    Nurfaizah Nurfaizah

    2015-08-01

    Full Text Available STMIK AMIKOM Purwokerto merupakan salah satu perguruan tinggi swasta yang dalam proses pengelolaan dan  penyampaian informasi telah menerapan teknologi informasi. Proses pelayanan suatu perguruan tinggi dipandang sebagai suatu solusi yang nantinya dapat meningkatkan kemampuan perusahaan di dalam pelayanan. Hal ini menyebabkan pentingnya peningkatan peran teknologi informasi agar selaras dengan  investasi baik hardware dan software yang dikeluarkan, sehingga dibutuhkan perencanaan yang optimal.IT Service Management (ITSM digunakan sebagai upaya untuk meningkatkan efisiensi pelayanan teknologi informasi kepada pengguna yang terdapat dalam framework Information Technology Infrastructure Library.Diharapkan dengan penerapan ITSM pengelolaan layanan TI menjadi lebih baik serta mampu menyelesaikan beberapa permasalahan yang ada pada organisasiyang sedang berjalan dengan menggunakan COBIT 4.1. ITSM menghasilkan perancangan pada masing-masing prosesnya dari 2 domain pembangun ITSM yaitu domain service support dan service delivery. Kata Kunci: ITSM, ITIL V3, COBIT 4.1

  18. Security intelligence a practitioner's guide to solving enterprise security challenges

    CERN Document Server

    Li, Qing

    2015-01-01

    Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo

  19. Smart Secure Homes: A Survey of Smart Home Technologies that Sense, Assess, and Respond to Security Threats.

    Science.gov (United States)

    Dahmen, Jessamyn; Cook, Diane J; Wang, Xiaobo; Honglei, Wang

    2017-08-01

    Smart home design has undergone a metamorphosis in recent years. The field has evolved from designing theoretical smart home frameworks and performing scripted tasks in laboratories. Instead, we now find robust smart home technologies that are commonly used by large segments of the population in a variety of settings. Recent smart home applications are focused on activity recognition, health monitoring, and automation. In this paper, we take a look at another important role for smart homes: security. We first explore the numerous ways smart homes can and do provide protection for their residents. Next, we provide a comparative analysis of the alternative tools and research that has been developed for this purpose. We investigate not only existing commercial products that have been introduced but also discuss the numerous research that has been focused on detecting and identifying potential threats. Finally, we close with open challenges and ideas for future research that will keep individuals secure and healthy while in their own homes.

  20. DNA-encoded chemical libraries - achievements and remaining challenges.

    Science.gov (United States)

    Favalli, Nicholas; Bassi, Gabriele; Scheuermann, Jörg; Neri, Dario

    2018-04-23

    DNA-encoded chemical libraries (DECLs) are collections of compounds, individually coupled to DNA tags serving as amplifiable identification barcodes. Since individual compounds can be identified by the associated DNA tag, they can be stored as a mixture, allowing the synthesis and screening of combinatorial libraries of unprecedented size, facilitated by the implementation of split-and-pool synthetic procedures or other experimental methodologies. In this review, we briefly present relevant concepts and technologies, which are required for the implementation and interpretation of screening procedures with DNA-encoded chemical libraries. Moreover, we illustrate some success stories, detailing how novel ligands were discovered from encoded libraries. Finally, we critically review what can realistically be achieved with the technology at the present time, highlighting challenges and opportunities for the future. © 2018 Federation of European Biochemical Societies.