Electronic Resources Security: A look at Unauthorized Users
Much of the literature written on electronic resources security focuses on systematic downloading. However, when the unauthorized use from two cases of stolen identities at the University of Saskatchewan was studied in more depth, a different pattern emerged. By analyzing proxy server data, we fou...
Main Author: | Heather Tones White |
---|---|
Format: | Article |
Language: | English |
Published: |
Code4Lib
2010-12-01
|
Series: | Code4Lib Journal |
Online Access: | http://journal.code4lib.org/articles/4117 |
Similar Items
-
DETECTION OF UNAUTHORIZED USERS OF QUANTUM COMMUNICATION CHANNEL
by: I. R. Gulakov, et al.
Published: (2019-06-01) -
Unauthorized Access : The Crisis in Online Privacy and Security
by: Sloan, Robert H.
Published: (2014) -
Unauthorized Access : The Crisis in Online Privacy and Security
by: Sloan, Robert
Published: (2017) -
A Practice Study on Unauthorized Disposal and Unauthorized Agency
by: CHEN, PEI-CHUN, et al.
Published: (2017) -
Unauthorized Access The Crisis in Online Privacy and Security
Published: (2014)