Electronic Resources Security: A look at Unauthorized Users

Much of the literature written on electronic resources security focuses on systematic downloading.  However, when the unauthorized use from two cases of stolen identities at the University of Saskatchewan was studied in more depth, a different pattern emerged.  By analyzing proxy server data, we fou...

Full description

Bibliographic Details
Main Author: Heather Tones White
Format: Article
Language:English
Published: Code4Lib 2010-12-01
Series:Code4Lib Journal
Online Access:http://journal.code4lib.org/articles/4117
id doaj-ef2be743d16f4585b7f68189c4bde3d2
record_format Article
spelling doaj-ef2be743d16f4585b7f68189c4bde3d22020-11-25T03:50:51ZengCode4LibCode4Lib Journal1940-57582010-12-0112Electronic Resources Security: A look at Unauthorized UsersHeather Tones WhiteMuch of the literature written on electronic resources security focuses on systematic downloading.  However, when the unauthorized use from two cases of stolen identities at the University of Saskatchewan was studied in more depth, a different pattern emerged.  By analyzing proxy server data, we found that the unauthorized use was coming from all over the world, was focused on science, technology and medical resources, and included both small-scale and excessive downloading.  This article outlines some steps that libraries can take to detect and prevent small-scale unauthorized use and implications as libraries move towards Shibboleth authentication. http://journal.code4lib.org/articles/4117
collection DOAJ
language English
format Article
sources DOAJ
author Heather Tones White
spellingShingle Heather Tones White
Electronic Resources Security: A look at Unauthorized Users
Code4Lib Journal
author_facet Heather Tones White
author_sort Heather Tones White
title Electronic Resources Security: A look at Unauthorized Users
title_short Electronic Resources Security: A look at Unauthorized Users
title_full Electronic Resources Security: A look at Unauthorized Users
title_fullStr Electronic Resources Security: A look at Unauthorized Users
title_full_unstemmed Electronic Resources Security: A look at Unauthorized Users
title_sort electronic resources security: a look at unauthorized users
publisher Code4Lib
series Code4Lib Journal
issn 1940-5758
publishDate 2010-12-01
description Much of the literature written on electronic resources security focuses on systematic downloading.  However, when the unauthorized use from two cases of stolen identities at the University of Saskatchewan was studied in more depth, a different pattern emerged.  By analyzing proxy server data, we found that the unauthorized use was coming from all over the world, was focused on science, technology and medical resources, and included both small-scale and excessive downloading.  This article outlines some steps that libraries can take to detect and prevent small-scale unauthorized use and implications as libraries move towards Shibboleth authentication.
url http://journal.code4lib.org/articles/4117
work_keys_str_mv AT heathertoneswhite electronicresourcessecurityalookatunauthorizedusers
_version_ 1724490286526103552