Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kumbargoudar, Praveenkumar
- Web Logs:The Current Online Information Sources
Abstract Views :269 |
PDF Views:12
Authors
Affiliations
1 Gulbarga University, Gulbarga 585 106, IN
1 Gulbarga University, Gulbarga 585 106, IN
Source
Journal of Information and Knowledge (Formerly SRELS Journal of Information Management), Vol 48, No 4 (2011), Pagination: 415-423Abstract
Web logs are a recent technology in Information Communication. The present paper explains about Web logs. The information available in web logs is also discussed. There are different kinds of web logs based on their information content. The web logs are advantageous to the Library and Library professionals in providing Information Services. The paper discusses about the usefulness and advantages of Web logs to the Library.Keywords
Online Information Sources, Web logs.References
- Scott (P). Weblogs Compendium. http://www.lights.com/weblogs/
- http://www.marketingterms.com/dictionary/blog/
- Soora (Sudhir); Others. Web logs: The emerging Technology in Libraries. 4th International CALIBER 2006. Gulbarga University, 2-4, February 2006. p692-695.
- Herring (Susan C); Others. Weblogs as a bridging genre. Information Technology and People. Vol. 18(2); 2005; p142-171.
- Blood (R): The Weblog handbook: practical advice on creating and maintaining your Blog. Cambridge. M.A: Perseus Publishing, 2000.
- http://en.wikipedia.org/wiki/Types of blogs accessed on 07th June 2006.
- Coates (T). On Permalinks and Paradigms, Personal blog: Plasticbag.org, 11 June 2003, http://www. plasticbag.org/archives/2003/06/on_permalinks_and_paradigms.shtml
- Pew Internet and American Life Project. The State of Blogging, Data Memo, January 2005. available at http://www.pewinternet.org/pdfs/PIP_blogging.pdf
- Brady (Mark). Blogging: Personal Participation on in Public Knowledge building on the Web. Chimera Working Paper 2005-02. Colchester: University of Essex. http://www.essex.ac.uk/chimera/content/pubs/wps/ CWP-2005-02-Blogging-in-the-Knowledge-Society-.MB.pdf accessed on 07th June 2006.
- Clyde (Laurel A). Library Web logs. Library Management. Vol. 25(4/5); 2004; p183-189.
- Clyde (Laurel A). Weblogs- Are you Serious? The Electronic Library. Vol. 22(5); 2004; p390-392.
- Fichter (Darlene). Why and how to use blogs to promote your library‟s services. Marketing Library Services. Vol. 17(6); Nov/Dec 2003. http://www.infotoday.com/MLS/nov03/fichter.shtml accessed on 07th June 2006.
- Biometric Security Technology for Libraries
Abstract Views :266 |
PDF Views:10
Authors
Affiliations
1 Gulbarga University, Gulbarga 585 106, Karnataka, IN
1 Gulbarga University, Gulbarga 585 106, Karnataka, IN
Source
Journal of Information and Knowledge (Formerly SRELS Journal of Information Management), Vol 45, No 1 (2008), Pagination: 37-44Abstract
The paper analyzed the need for different kinds of information security in the libraries. Further, the different information security systems and technological trends such as RFID Systems, Electromagnetic Security Systems and Smart Card Security Systems are studied with reference to information security in the libraries. The paper is concluded with remarks to choose the best information security system for libraries considering several factors such as cost, nature of users, and nature of the organization etc.Keywords
Information Security, Library Security, Biometric Security, Biometric Technology.References
- Omoniyi (Joseph O). The security of computer and other electronic installations in Nigerian University Libraries. Library Management. Vol. 22(6,7); 2001; p272-277.
- Ramamurthy (C R). Information Security: A source book for librarians. Delhi: Authors press, 2001, p18.
- Solms (Rossouw von). Driving safely on the information superhighway. Information Management and Computer Security. Vol. 5(1); 1997; p20.
- Trim (Peter R J). Managing Computer Security issues: preventing and limiting future threats and disasters. Disaster Prevention and Management. Vol. 14(4); 2005; p493-505.
- Liddy (Carrie). Commercial Security on the Internet. Internet Research: Electronic Networking Applications and Policy. Vol. 6(2/3); 1996; p75-78.
- Weiss (Kenneth P). To Serve and Protect: Reconciling Information protection with LAN Environments. Information Management and Computer Security. Vol. 2(3); 1994; p19-25.
- Skoularidou (Victoria) and Spinellis (Diomidis). Security architecture network clients. Information Management and Computer Security. Vol.11(2); 2003; p84-91.
- Biometric Technology. http://www.voice-security.com/Biomet.html accessed on 07th July 2006.
- Harris (Austin Jay) and Yen (David C): Biometric Authentication: assuring access to information. Information Management and Computer Security. Vol. 10(1); 2002; p12-19.
- Biometric Technology Background. http://www.altisinc.com/Biometric/background.html accessed on 07th July 2006.
- Biometric Identification/Authentication Techniques. http://www.altisinc.com/Biometric/techniques.html accessed on 07th July 2006.
- Rosenzweig (Paul) and Others. Biometric Technology: Security, Legal and Policy Implications.
- http://www.heritage.org/Research/HomelandDefense/lm12.cfm accessed on 07th July 2006.
- Vivekandan (K) and Meena (C). Fuzzy Signature Verification and Interpretation system using stroke comparator. Journal of Computer Science. Vol. 1(2); Sept-Oct 2005; p95-108.
- Zorkadis (V) and Donos (P). On biometrics based authentication and identification from privacy protection perspective: Deriving privacy-enhancing requirement. Information Management and Computer Security. Vol. 12 (1); 2004; p125-137.
- Biometric technology holds the key to system-wide IT security. http://www.cryptometrics.com/tech_library_ security.php accessed on 07th July 2006.
- Biometric Security Technology. http://www.peterindia.net/Biometricsview.html#what%20is%a%20 Biometric accessed on 07th July 2006.
- Desmarais (Norman). Body language, security and e-commerce. Library Hi-Tech. Vol. 18(1); 2000; p61-74.
- Heracleous (Loizos) and Wirtz (Jochen). Biometrics: the next frontier in service excellence, productivity and security in the service sector. Managing Service Quality. Vol. 16(1); 2006; p12-22.
- Malovika (S V). The Wizardry of Biometrics. i.t. Vol. 15(6); April 2006; p36-41.