Open Access
Subscription Access
Open Access
Subscription Access
Biometric Security Technology for Libraries
Subscribe/Renew Journal
The paper analyzed the need for different kinds of information security in the libraries. Further, the different information security systems and technological trends such as RFID Systems, Electromagnetic Security Systems and Smart Card Security Systems are studied with reference to information security in the libraries. The paper is concluded with remarks to choose the best information security system for libraries considering several factors such as cost, nature of users, and nature of the organization etc.
Keywords
Information Security, Library Security, Biometric Security, Biometric Technology.
User
About The Authors
Information
- Omoniyi (Joseph O). The security of computer and other electronic installations in Nigerian University Libraries. Library Management. Vol. 22(6,7); 2001; p272-277.
- Ramamurthy (C R). Information Security: A source book for librarians. Delhi: Authors press, 2001, p18.
- Solms (Rossouw von). Driving safely on the information superhighway. Information Management and Computer Security. Vol. 5(1); 1997; p20.
- Trim (Peter R J). Managing Computer Security issues: preventing and limiting future threats and disasters. Disaster Prevention and Management. Vol. 14(4); 2005; p493-505.
- Liddy (Carrie). Commercial Security on the Internet. Internet Research: Electronic Networking Applications and Policy. Vol. 6(2/3); 1996; p75-78.
- Weiss (Kenneth P). To Serve and Protect: Reconciling Information protection with LAN Environments. Information Management and Computer Security. Vol. 2(3); 1994; p19-25.
- Skoularidou (Victoria) and Spinellis (Diomidis). Security architecture network clients. Information Management and Computer Security. Vol.11(2); 2003; p84-91.
- Biometric Technology. http://www.voice-security.com/Biomet.html accessed on 07th July 2006.
- Harris (Austin Jay) and Yen (David C): Biometric Authentication: assuring access to information. Information Management and Computer Security. Vol. 10(1); 2002; p12-19.
- Biometric Technology Background. http://www.altisinc.com/Biometric/background.html accessed on 07th July 2006.
- Biometric Identification/Authentication Techniques. http://www.altisinc.com/Biometric/techniques.html accessed on 07th July 2006.
- Rosenzweig (Paul) and Others. Biometric Technology: Security, Legal and Policy Implications.
- http://www.heritage.org/Research/HomelandDefense/lm12.cfm accessed on 07th July 2006.
- Vivekandan (K) and Meena (C). Fuzzy Signature Verification and Interpretation system using stroke comparator. Journal of Computer Science. Vol. 1(2); Sept-Oct 2005; p95-108.
- Zorkadis (V) and Donos (P). On biometrics based authentication and identification from privacy protection perspective: Deriving privacy-enhancing requirement. Information Management and Computer Security. Vol. 12 (1); 2004; p125-137.
- Biometric technology holds the key to system-wide IT security. http://www.cryptometrics.com/tech_library_ security.php accessed on 07th July 2006.
- Biometric Security Technology. http://www.peterindia.net/Biometricsview.html#what%20is%a%20 Biometric accessed on 07th July 2006.
- Desmarais (Norman). Body language, security and e-commerce. Library Hi-Tech. Vol. 18(1); 2000; p61-74.
- Heracleous (Loizos) and Wirtz (Jochen). Biometrics: the next frontier in service excellence, productivity and security in the service sector. Managing Service Quality. Vol. 16(1); 2006; p12-22.
- Malovika (S V). The Wizardry of Biometrics. i.t. Vol. 15(6); April 2006; p36-41.
Abstract Views: 334
PDF Views: 10