Biometric Security Technology for Libraries
DOI:
https://doi.org/10.17821/srels/2008/v45i1/44161Keywords:
Information Security, Library Security, Biometric Security, Biometric Technology.Abstract
The paper analyzed the need for different kinds of information security in the libraries. Further, the different information security systems and technological trends such as RFID Systems, Electromagnetic Security Systems and Smart Card Security Systems are studied with reference to information security in the libraries. The paper is concluded with remarks to choose the best information security system for libraries considering several factors such as cost, nature of users, and nature of the organization etc.Downloads
Metrics
References
Omoniyi (Joseph O). The security of computer and other electronic installations in Nigerian University Libraries. Library Management. Vol. 22(6,7); 2001; p272-277.
Ramamurthy (C R). Information Security: A source book for librarians. Delhi: Authors press, 2001, p18.
Solms (Rossouw von). Driving safely on the information superhighway. Information Management and Computer Security. Vol. 5(1); 1997; p20.
Trim (Peter R J). Managing Computer Security issues: preventing and limiting future threats and disasters. Disaster Prevention and Management. Vol. 14(4); 2005; p493-505.
Liddy (Carrie). Commercial Security on the Internet. Internet Research: Electronic Networking Applications and Policy. Vol. 6(2/3); 1996; p75-78.
Weiss (Kenneth P). To Serve and Protect: Reconciling Information protection with LAN Environments. Information Management and Computer Security. Vol. 2(3); 1994; p19-25.
Skoularidou (Victoria) and Spinellis (Diomidis). Security architecture network clients. Information Management and Computer Security. Vol.11(2); 2003; p84-91.
Biometric Technology. http://www.voice-security.com/Biomet.html accessed on 07th July 2006.
Harris (Austin Jay) and Yen (David C): Biometric Authentication: assuring access to information. Information Management and Computer Security. Vol. 10(1); 2002; p12-19.
Biometric Technology Background. http://www.altisinc.com/Biometric/background.html accessed on 07th July 2006.
Biometric Identification/Authentication Techniques. http://www.altisinc.com/Biometric/techniques.html accessed on 07th July 2006.
Rosenzweig (Paul) and Others. Biometric Technology: Security, Legal and Policy Implications.
http://www.heritage.org/Research/HomelandDefense/lm12.cfm accessed on 07th July 2006.
Vivekandan (K) and Meena (C). Fuzzy Signature Verification and Interpretation system using stroke comparator. Journal of Computer Science. Vol. 1(2); Sept-Oct 2005; p95-108.
Zorkadis (V) and Donos (P). On biometrics based authentication and identification from privacy protection perspective: Deriving privacy-enhancing requirement. Information Management and Computer Security. Vol. 12 (1); 2004; p125-137.
Biometric technology holds the key to system-wide IT security. http://www.cryptometrics.com/tech_library_ security.php accessed on 07th July 2006.
Biometric Security Technology. http://www.peterindia.net/Biometricsview.html#what%20is%a%20 Biometric accessed on 07th July 2006.
Desmarais (Norman). Body language, security and e-commerce. Library Hi-Tech. Vol. 18(1); 2000; p61-74.
Heracleous (Loizos) and Wirtz (Jochen). Biometrics: the next frontier in service excellence, productivity and security in the service sector. Managing Service Quality. Vol. 16(1); 2006; p12-22.
Malovika (S V). The Wizardry of Biometrics. i.t. Vol. 15(6); April 2006; p36-41.
Downloads
Published
How to Cite
Issue
Section
License
All the articles published in Journal of Information and Knowledge are held by the Publisher. Sarada Ranganathan Endowment for Library Science (SRELS), as a publisher requires its authors to transfer the copyright prior to publication. This will permit SRELS to reproduce, publish, distribute and archive the article in print and electronic form and also to defend against any improper use of the article.
Accepted 2013-12-30
Published 2008-03-10