Access and Identity Management for Libraries: Controlling access to online information

Author:   Mariam Garibyan ,  Simon McLeish ,  John Paschoud
Publisher:   Facet Publishing
ISBN:  

9781856045889


Pages:   272
Publication Date:   31 October 2013
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $147.00 Quantity:  
Add to Cart

Share |

Access and Identity Management for Libraries: Controlling access to online information


Add your own review!

Overview

Practical guidance to ensuring that your users can access and personalise the online resources they are entitled to use with the minimum of fuss. With the rapid increase in the use of electronic resources in libraries, managing access to online information is an area many librarians struggle with. Managers of online information wish to implement policies about who can access the information and under what terms and conditions but often they need further guidance. Written by experts in the field, this practical book is the first to explain the principles behind access management, the available technologies and how they work. This includes an overview of federated access management technologies, such as Shibboleth, that have gained increasing international recognition in recent years. This book provides detailed case studies describing how access management is being implemented at organizational and national levels in the UK, USA and Europe, and gives a practical guide to the resources available to help plan, implement and operate access management in libraries. Key topics include: what is access management and why do libraries do it? electronic resources: public and not so public principles and definitions of identity and access management current access management technologies authentication technologies authorization based on physical location authorization based on user identity or affiliation federated access: history, current position and future developments internet access provided by (or in) libraries library statistics the business case for libraries. Readership: This is essential reading for all who need to understand the principles behind access management or implement a working system in their library.

Full Product Details

Author:   Mariam Garibyan ,  Simon McLeish ,  John Paschoud
Publisher:   Facet Publishing
Imprint:   Facet Publishing
Dimensions:   Width: 15.60cm , Height: 1.60cm , Length: 23.20cm
Weight:   0.191kg
ISBN:  

9781856045889


ISBN 10:   1856045889
Pages:   272
Publication Date:   31 October 2013
Audience:   Professional and scholarly ,  Professional and scholarly ,  Professional & Vocational ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Foreword - Clifford Lynch 1. What is access management and why do libraries do it? Historical role of libraries in managing access to information The role of libraries in the 21st century The history of access management of online information resources The role of e-commerce in library access management The ‘birth’ of access management principles – Clifford Lynch’s white paper 2. Electronic resources: public and not so public Managing access to electronic collections How and where users may want to access e-resources What needs to be protected, and why Commercially produced resources that need to be protected Publicly available information that may also require access management Publishers and licensing issues Library management of licences Summary References 3. Principles and definitions of identity and access management Introduction Managing access? . . . or identities? . . . or both? The business relationships The processes of identity and access management Identifying the person using a resource – or not Obligations to protect personal data about users Summary References 4. Current access management technologies IP address Barcode patterns Proxy servers Shared passwords User registration with publishers Federated access Summary 5. Authentication technologies ‘Something you know, something you have, or something you are’ Authentication technologies overview Authentication by third parties Choosing an authentication system 6. Authorization based on physical location: how does the internet know where I am? Introduction Domains and domain names (How) is all this governed? IP addresses IP spoofing Benefits and problems of using IP address-based licensing Summary References 7. Authorization based on user identity or affiliation with a library: who you are? or what you do? Basing access on identity, or on affiliation with a library Role-based authorization Matching roles against licence conditions Benefits of role-based authorization Summary References 8. Federated access: history, current position and future developments Single sign-on and the origins of federated access management The development of standards Federated access in academia Future of federated access References 9. How to choose access management and identity management products and services Introduction Identity management and access management solution capabilities Establishing requirements with suppliers Asserting library requirements in a wider-scale system procurement Implementation options The range of access and identity management products Conclusion References 10. Internet access provided by (or in) libraries Introduction Wired access Wireless access Public access issues Summary References 11. Library statistics Why libraries collect electronic resource usage statistics Challenges in collecting electronic resource usage data How libraries collect usage data Concluding thoughts References 12. The business case for libraries Introduction Key benefits of quality identity management Designing an IdM project Putting together a business case Conclusion References and further reading Afterword References Appendix 1: Case studies Extending access management to business and community engagement activities at Kidderminster College, UK Moving from Athens to Shibboleth at University College London, UK Online reciprocal borrowing registration for Western Australian University Libraries Library and IT collaboration: driving strategic improvements to identity and access management practices and capabilities Managing affiliated users with federated identity management at UNC-Chapel Hill, USA Tilburg University and the SURFfederatie, the Netherlands Delivering access to resources in a joint academic and public library building Single sign-on across the USMAI Consortium, USA Appendix 2: A White Paper on Authentication and Access Management Issues in Cross-organizational Use of Networked Information Resources

Reviews

...provides an excellent, well-organized overview of the structures, protocols, and skills necessary for controlling online access to proprietary information resources. The book, including introduction, glossary, appendices, and index, is just slightly over 250 pages long and presents the topic in a logical manner with an appropriate level of detail and useful, real-world examples. -- Journal of Access Services If you, like me, are somewhat befuddled by the various technologies available for managing access to online resources, you will benefit from this practical guide. It provides a very thorough overview of the topic, starting in Chapter 1 with the broad question What is access management, and why do libraries do it? and narrowing its focus from there. By the end, you will have learned everything you ever wanted to know (and probably much more) about a topic that generally flies under the radar but nonetheless has great importance for libraries. -- Journal of Electronic Resources Librarianship


Author Information

Masha Garibyan has worked as part of the London School of Economics (LSE) Library Projects Team since 2004 where she has been actively supporting the LSE Library's transition to federated access management. For the last two years Masha has been seconded as a member of the JISC Access Management Team, helping UK institutions and service providers in their transition to federated access management. John Paschoud is InfoSystems Engineer and Projects Manager at the Library of the London School of Economics & Political Science (LSE) and is a member of the UK Federation Technical Advisory Group. He is currently part-seconded as a member of the JISC Outreach Team supporting institutions, publishers and technology vendors in their adoption of Federated Access Management.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List