I think I would call this a hot multi-topic really. Authentication
in itself is approaching the too-hot-to-handle-with-bare-hands stage. It has
always, and inherently, been a vital issue within the HE sector for fairly
obvious reasons.
Back in public libraryland, establishing local/remote user
cross-platform cross-information source authentication processes is at a
relatively rudimentary stage. Linking this into developing management
information requirements, i.e. not just access to fairly unuseable server
logs, but rather to customized management information that undoubtedly we
will expect to serve a variety of purposes, (e.g. inappropriate use and/or
user issues, monitoring/appraising use of expensive content licenses,
proportional use for variety of types of use
"internet/word-processing/spreadsheets etc.") is quite a challenge!
Ideally this multi-role management tool needs to network link
(internet/intranet/extranet) across as yet unjoined/partly joined-up
environments. We will expect it to cover stock
(lending/circulationmanagement) /CDROM networking/free & open www web
access/webmail/subscription based services with web access/desktop software
useage (office/graphics suites etc.)/internal intranet-based databases etc.,
etc.
And being very dedicated pursuers of best value we might even find
ourselves hankering after the finer detail ... what sorts of users are using
what types of resources at what time of the day ... and so on.
Any software providers listening in care to comment? Even to suggest
that they are looking at all this from the viewpoint of developing products
that are intended to go in this direction ... or is this all so complex that
we need some sort of multi-party development process with government
funding?
It's only a partial solution, but my prayer mat is out for the day
when as part of a government response to "Empowering the learning community
..." the public library sector is allowed (funded) to join in the current
vigorous developments in the HE sector (DNER etc.) But of course, that also
raises the issue of public libraries being sufficiently funded to afford
access to subscription based services or are "given" such access at greatly
reduced prices or "for free".
Mike
Mike Maguire
Group Librarian S & E Devon
Devon Lifelong Learning
01392 384223
mailto:[log in to unmask]
http://www.devon.gov.uk/eal/
Unless otherwise stated the views expressed are
personal and not necessarily those of Devon County Council
> -----Original Message-----
> From: [log in to unmask] [SMTP:[log in to unmask]]
> Sent: 14 December 2000 17:45
> To: [log in to unmask]
> Subject: Re: Monitoring public use of internet access
>
> Sorry for any cross-posting
>
> This is becoming a "hot topic"!
>
> Such systems as exist require the use of User Access Management and
> Authentication techniques which allow access to a user database, such as
> exists
> within the Library Management system (LMS) - trouble is, obtaining access
> to
> that database for applications which are not related to it!
>
> Self-Issue machines are related, as is connection to Internet based
> subscription
> services for users not in our buildings.
>
> Epixtech have "Remote Patron Authentication", which goes some way towards
> this -
> other suppliers vary, if they do it at all.
>
> Some Third Party providers such as Fenwood/Esprit are providing "Proxy
> Server"
> solutions which are moving towards this.
>
> The Academic Sector handles this in a number of ways, and there is a
> Mailbase/JISCMail list to cover this sort of thing, run from the LITC at
> Southbank University, called, unsurprisingly, "Authentication", which is
> worth a
> look - http://www.JISCMail.ac.uk
>
> Think we all, public libraries and system suppliers need effective
> solutions to
> this, soon!
>
> Regards
>
> John
>
> -------------------------------------------
> John Usher "I'd rather be Flying!"
> ICT Development Librarian
> Islington Library & Information Service
> Education Department
> Central Library
> 2 Fieldway Crescent
> LONDON N5 1PF
>
> Tel: +44 (0)20 7527 6920
> Fax: +44 (0)20 7527 6926
> Switchboard: +44 (0)20 7527 6900
> mailto:[log in to unmask]
> http://www.islington.gov.uk/libraries
>
> Warning! This email may be read by others in the owner's absence
>
>
> ____________________Reply Separator____________________
> Subject: Monitoring public use of internet access
> Author: [log in to unmask]
> Date: 14/12/00 15:43
>
> As part of our "People's Network" strategy, we need to monitor the kind of
> use - morally-acceptable and otherwise - made of our public-access
> internet
> points.
> Questionnaires, however brief, are of limited use. The ideal, to my mind,
> woild be a system whereby a user logs onto the computer by means of
> scanning
> his/her reader's ticket. A programme on board could then not only record
> the
> user's identity but also the use made of the facility -
> internet/word-processing/spreadsheets etc.
>
> Does anyone know of such a system currently in use?
>
> Many thanks.
>
> Alun Williams
> -------------------------------------------------------------
> Mae'r e-bost hwn ac unrhyw atodiad iddo yn gyfrinachol ac fe'i bwriedir ar
> gyfer
> y sawl a enwir arno yn unig. Gall gynnwys gwybodaeth freintiedig. Os yw
> wedi
> eich cyrraedd trwy gamgymeriad ni ellwch ei gop?o, ei ddosbarthu na'i
> ddangos i
> unrhyw un arall a dylech gysylltu ?'r Cyngor ar unwaith.
> Mae unrhyw gynnwys nad yw'n ymwneud ? busnes swyddogol Cyngor Gwynedd yn
> personol i'r awdur ac nid yw'n awdurdodedig gan y Cyngor.
> -------------------------------------------------------------
> This email and any attachments are confidential and intended for the named
> recipient only. The content may contain privileged information. If it has
> reached you by mistake, you should not copy, distribute or show the
> content to
> anyone and please contact Gwynedd Council at once.
> Any content that is not pertinent to Gwynedd Council business is personal
> to the
> author, and is not necessarily the view of the Council.
> -------------------------------------------------------------
|