Biometric Security Technology for Libraries

Authors

  • Gulbarga University, Gulbarga 585 106, Karnataka
  • Gulbarga University, Gulbarga 585 106, Karnataka

DOI:

https://doi.org/10.17821/srels/2008/v45i1/44161

Keywords:

Information Security, Library Security, Biometric Security, Biometric Technology.

Abstract

The paper analyzed the need for different kinds of information security in the libraries. Further, the different information security systems and technological trends such as RFID Systems, Electromagnetic Security Systems and Smart Card Security Systems are studied with reference to information security in the libraries. The paper is concluded with remarks to choose the best information security system for libraries considering several factors such as cost, nature of users, and nature of the organization etc.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

Omoniyi (Joseph O). The security of computer and other electronic installations in Nigerian University Libraries. Library Management. Vol. 22(6,7); 2001; p272-277.

Ramamurthy (C R). Information Security: A source book for librarians. Delhi: Authors press, 2001, p18.

Solms (Rossouw von). Driving safely on the information superhighway. Information Management and Computer Security. Vol. 5(1); 1997; p20.

Trim (Peter R J). Managing Computer Security issues: preventing and limiting future threats and disasters. Disaster Prevention and Management. Vol. 14(4); 2005; p493-505.

Liddy (Carrie). Commercial Security on the Internet. Internet Research: Electronic Networking Applications and Policy. Vol. 6(2/3); 1996; p75-78.

Weiss (Kenneth P). To Serve and Protect: Reconciling Information protection with LAN Environments. Information Management and Computer Security. Vol. 2(3); 1994; p19-25.

Skoularidou (Victoria) and Spinellis (Diomidis). Security architecture network clients. Information Management and Computer Security. Vol.11(2); 2003; p84-91.

Biometric Technology. http://www.voice-security.com/Biomet.html accessed on 07th July 2006.

Harris (Austin Jay) and Yen (David C): Biometric Authentication: assuring access to information. Information Management and Computer Security. Vol. 10(1); 2002; p12-19.

Biometric Technology Background. http://www.altisinc.com/Biometric/background.html accessed on 07th July 2006.

Biometric Identification/Authentication Techniques. http://www.altisinc.com/Biometric/techniques.html accessed on 07th July 2006.

Rosenzweig (Paul) and Others. Biometric Technology: Security, Legal and Policy Implications.

http://www.heritage.org/Research/HomelandDefense/lm12.cfm accessed on 07th July 2006.

Vivekandan (K) and Meena (C). Fuzzy Signature Verification and Interpretation system using stroke comparator. Journal of Computer Science. Vol. 1(2); Sept-Oct 2005; p95-108.

Zorkadis (V) and Donos (P). On biometrics based authentication and identification from privacy protection perspective: Deriving privacy-enhancing requirement. Information Management and Computer Security. Vol. 12 (1); 2004; p125-137.

Biometric technology holds the key to system-wide IT security. http://www.cryptometrics.com/tech_library_ security.php accessed on 07th July 2006.

Biometric Security Technology. http://www.peterindia.net/Biometricsview.html#what%20is%a%20 Biometric accessed on 07th July 2006.

Desmarais (Norman). Body language, security and e-commerce. Library Hi-Tech. Vol. 18(1); 2000; p61-74.

Heracleous (Loizos) and Wirtz (Jochen). Biometrics: the next frontier in service excellence, productivity and security in the service sector. Managing Service Quality. Vol. 16(1); 2006; p12-22.

Malovika (S V). The Wizardry of Biometrics. i.t. Vol. 15(6); April 2006; p36-41.

Published

2008-03-10

How to Cite

Kumbargoudar, P., & Mestri, M. (2008). Biometric Security Technology for Libraries. Journal of Information and Knowledge, 45(1), 37–44. https://doi.org/10.17821/srels/2008/v45i1/44161

Issue

Section

Articles
Received 2013-12-30
Accepted 2013-12-30
Published 2008-03-10

Most read articles by the same author(s)