Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Biometric Security Technology for Libraries


Affiliations
1 Gulbarga University, Gulbarga 585 106, Karnataka, India
     

   Subscribe/Renew Journal


The paper analyzed the need for different kinds of information security in the libraries. Further, the different information security systems and technological trends such as RFID Systems, Electromagnetic Security Systems and Smart Card Security Systems are studied with reference to information security in the libraries. The paper is concluded with remarks to choose the best information security system for libraries considering several factors such as cost, nature of users, and nature of the organization etc.

Keywords

Information Security, Library Security, Biometric Security, Biometric Technology.
User
About The Authors

Praveenkumar Kumbargoudar
Gulbarga University, Gulbarga 585 106, Karnataka
India

Mamata Mestri
Gulbarga University, Gulbarga 585 106, Karnataka
India


Notifications

  • Omoniyi (Joseph O). The security of computer and other electronic installations in Nigerian University Libraries. Library Management. Vol. 22(6,7); 2001; p272-277.
  • Ramamurthy (C R). Information Security: A source book for librarians. Delhi: Authors press, 2001, p18.
  • Solms (Rossouw von). Driving safely on the information superhighway. Information Management and Computer Security. Vol. 5(1); 1997; p20.
  • Trim (Peter R J). Managing Computer Security issues: preventing and limiting future threats and disasters. Disaster Prevention and Management. Vol. 14(4); 2005; p493-505.
  • Liddy (Carrie). Commercial Security on the Internet. Internet Research: Electronic Networking Applications and Policy. Vol. 6(2/3); 1996; p75-78.
  • Weiss (Kenneth P). To Serve and Protect: Reconciling Information protection with LAN Environments. Information Management and Computer Security. Vol. 2(3); 1994; p19-25.
  • Skoularidou (Victoria) and Spinellis (Diomidis). Security architecture network clients. Information Management and Computer Security. Vol.11(2); 2003; p84-91.
  • Biometric Technology. http://www.voice-security.com/Biomet.html accessed on 07th July 2006.
  • Harris (Austin Jay) and Yen (David C): Biometric Authentication: assuring access to information. Information Management and Computer Security. Vol. 10(1); 2002; p12-19.
  • Biometric Technology Background. http://www.altisinc.com/Biometric/background.html accessed on 07th July 2006.
  • Biometric Identification/Authentication Techniques. http://www.altisinc.com/Biometric/techniques.html accessed on 07th July 2006.
  • Rosenzweig (Paul) and Others. Biometric Technology: Security, Legal and Policy Implications.
  • http://www.heritage.org/Research/HomelandDefense/lm12.cfm accessed on 07th July 2006.
  • Vivekandan (K) and Meena (C). Fuzzy Signature Verification and Interpretation system using stroke comparator. Journal of Computer Science. Vol. 1(2); Sept-Oct 2005; p95-108.
  • Zorkadis (V) and Donos (P). On biometrics based authentication and identification from privacy protection perspective: Deriving privacy-enhancing requirement. Information Management and Computer Security. Vol. 12 (1); 2004; p125-137.
  • Biometric technology holds the key to system-wide IT security. http://www.cryptometrics.com/tech_library_ security.php accessed on 07th July 2006.
  • Biometric Security Technology. http://www.peterindia.net/Biometricsview.html#what%20is%a%20 Biometric accessed on 07th July 2006.
  • Desmarais (Norman). Body language, security and e-commerce. Library Hi-Tech. Vol. 18(1); 2000; p61-74.
  • Heracleous (Loizos) and Wirtz (Jochen). Biometrics: the next frontier in service excellence, productivity and security in the service sector. Managing Service Quality. Vol. 16(1); 2006; p12-22.
  • Malovika (S V). The Wizardry of Biometrics. i.t. Vol. 15(6); April 2006; p36-41.

Abstract Views: 334

PDF Views: 10




  • Biometric Security Technology for Libraries

Abstract Views: 334  |  PDF Views: 10

Authors

Praveenkumar Kumbargoudar
Gulbarga University, Gulbarga 585 106, Karnataka, India
Mamata Mestri
Gulbarga University, Gulbarga 585 106, Karnataka, India

Abstract


The paper analyzed the need for different kinds of information security in the libraries. Further, the different information security systems and technological trends such as RFID Systems, Electromagnetic Security Systems and Smart Card Security Systems are studied with reference to information security in the libraries. The paper is concluded with remarks to choose the best information security system for libraries considering several factors such as cost, nature of users, and nature of the organization etc.

Keywords


Information Security, Library Security, Biometric Security, Biometric Technology.

References