Electronic Resources Security: A look at Unauthorized Users
Much of the literature written on electronic resources security focuses on systematic downloading. However, when the unauthorized use from two cases of stolen identities at the University of Saskatchewan was studied in more depth, a different pattern emerged. By analyzing proxy server data, we fou...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Code4Lib
2010-12-01
|
Series: | Code4Lib Journal |
Online Access: | http://journal.code4lib.org/articles/4117 |
id |
doaj-ef2be743d16f4585b7f68189c4bde3d2 |
---|---|
record_format |
Article |
spelling |
doaj-ef2be743d16f4585b7f68189c4bde3d22020-11-25T03:50:51ZengCode4LibCode4Lib Journal1940-57582010-12-0112Electronic Resources Security: A look at Unauthorized UsersHeather Tones WhiteMuch of the literature written on electronic resources security focuses on systematic downloading. However, when the unauthorized use from two cases of stolen identities at the University of Saskatchewan was studied in more depth, a different pattern emerged. By analyzing proxy server data, we found that the unauthorized use was coming from all over the world, was focused on science, technology and medical resources, and included both small-scale and excessive downloading. This article outlines some steps that libraries can take to detect and prevent small-scale unauthorized use and implications as libraries move towards Shibboleth authentication. http://journal.code4lib.org/articles/4117 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Heather Tones White |
spellingShingle |
Heather Tones White Electronic Resources Security: A look at Unauthorized Users Code4Lib Journal |
author_facet |
Heather Tones White |
author_sort |
Heather Tones White |
title |
Electronic Resources Security: A look at Unauthorized Users |
title_short |
Electronic Resources Security: A look at Unauthorized Users |
title_full |
Electronic Resources Security: A look at Unauthorized Users |
title_fullStr |
Electronic Resources Security: A look at Unauthorized Users |
title_full_unstemmed |
Electronic Resources Security: A look at Unauthorized Users |
title_sort |
electronic resources security: a look at unauthorized users |
publisher |
Code4Lib |
series |
Code4Lib Journal |
issn |
1940-5758 |
publishDate |
2010-12-01 |
description |
Much of the literature written on electronic resources security focuses on systematic downloading. However, when the unauthorized use from two cases of stolen identities at the University of Saskatchewan was studied in more depth, a different pattern emerged. By analyzing proxy server data, we found that the unauthorized use was coming from all over the world, was focused on science, technology and medical resources, and included both small-scale and excessive downloading. This article outlines some steps that libraries can take to detect and prevent small-scale unauthorized use and implications as libraries move towards Shibboleth authentication. |
url |
http://journal.code4lib.org/articles/4117 |
work_keys_str_mv |
AT heathertoneswhite electronicresourcessecurityalookatunauthorizedusers |
_version_ |
1724490286526103552 |