Standard principles of managing digital rights to access electronic resources of library collections

Author(s):  
Igor Timoshenko ◽  

The key principles of managing digital rights (DRM) of access to electronic documents applicable to book trade and library services are discussed. Digital document types and popular e-book formats where DRM-systems are applicable, are analyzed. The significance of DRM systems standardization, their friendliness to users and e-book rightsholders, is substantiated. The key provisions of international standards implemented this year to regulate typology of copyright security tools as well as DRM systems characteristics based on data coding, are examined. The most popular commercial solutions for DRM systems are reviewed; non-commercial international Readium project is described. The project is aimed at designing and developing software modules to integrate standard DRM technology into automated information systems, including library AIS.

Author(s):  
I. V. Timoshenko

The author reviews the basic types of digital document content protection from unauthorized access and dissemination applied by publishers and book trading companies. The principles of digital rights management (DRM) while accessing digital documents. The author suggests that DRM systems are efficient to be applied to certain types and formats of digital documents in libraries and archives. He also reviews several commercial solutions for DRM-systems plied to the most popular PDF-format and substantiates the importance of DRM-systems standardization for digital document friendliness both for the users and rights holders disseminating digital publications. Existing and newly introduced international standards for DRM-systems are discussed. The typology of digital rights protection software as provided for by the standards is presented along with regulated DRM-system features based on data coding. Readium project by international non-profit Readium Foundation exemplifies standard approach to DRM-system design. The project goal is to develop software modules to integrate standard DRM-technology into computer information systems including ALIS.


2020 ◽  
Vol 9 (8) ◽  
pp. e307983659
Author(s):  
Taufik Wibowo

The aim of this analysis is referred to several problems which are concerning the Land Administration Service in National Land Agency and Law Aspect of Land Administration Service with the Computerization Information System in BPN Sidoarjo. This research applies the Juridical Normative approach especially in Land Law with the Descriptive and Analytic and qualitative analysis. The result showed that Land Data Management used the information technology which is something that absolutely must be done is related to the characteristics of the land data itself which are multidimensional in nature related to economic, political, defense and security and socio-cultural issues. It can be concluded that information and electronic Transaction, some doubts about the use of electronic land data have found a clarity, especially relating to the electronic documents that are used as a means of proving and electronic data security.


2018 ◽  
Vol 106 (3) ◽  
Author(s):  
A. Robin Bowles

Digital Rights Management: The Librarian’s Guide offers a comprehensive view of how digital rights management (DRM) shapes all kinds of library decision-making regarding acquisition, access, and management of electronic resources. It also explores how DRM can both be both a blessing and a curse for the continued evolution of electronic information.


2020 ◽  
pp. 2-18
Author(s):  
Dmitry Tali ◽  
◽  
Oleg Finko ◽  
◽  

The purpose of the research is to increase the level of security of electronic document metadata in the face of destructive influences from authorized users (insiders). Research methods: new scientific results allowed using a combination of data integrity control method based on the «write once» method and of authentication of HMAС messages (hash-based message authentication, as well as graph theory methods. Research result: a method of cryptographic recursive 2-D control of the integrity of electronic documents metadata is proposed. The analysis of the object of the study was carried out, based on the results of which it was concluded that it is necessary to effectively protect the metadata of electronic documents processed by automated information systems of electronic document management. Developed and described a mathematical model of the proposed method, based on graph theory. The developed technical solution makes it possible to implement the functions of cryptographic recursive twodimensional control of the integrity of the metadata of electronic documents, as well as to provide the possibility of localizing modified (with signs of violation of integrity) metadata records, in conditions of destructive influences of authorized users (insiders). This, in turn, reduces the likelihood of collusion between trusted parties by introducing mutual control over the results of their actions. The proposed solution makes it possible to ensure control of the integrity of data processed by departmental automated information systems of electronic document management, where, due to the peculiarities of their construction, it is impossible to effectively use the currently popular blockchain technology.


Author(s):  
Andrea Claudi ◽  
Paolo Sernani ◽  
Aldo Franco Dragoni

One of the key challenges in the healthcare sector is to adapt Health Information Systems to requirements coming from changing societies. In recent years, governments and international healthcare organizations defined a series of requirements for new generation Health Information Systems: they have to preserve past investments on legacy systems, but must also integrate new technologies, include the patient among their users, and ensure that clinical information are available at all times, even in places far from where information are physically stored. This paper proposes a multi agent-oriented architecture for Health Information Systems, which uses international standards for communication and management of clinical documents. The architecture tries to effectively model a generic healthcare organization, and aims at being easily extensible and adaptable to the particularities of specific healthcare systems. The authors present two experimental scenarios to test the proposed multi-agent health information system. In the first, they show how to model a specific use case, a radiology workflow, using agents and well-known standards; in the second one the authors demonstrate how a mobile application can use the services provided by the agents to support the medical staff in an emergency situation.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Lauren Heather Mandel ◽  
Bradley Wade Bishop ◽  
Ashley Marie Orehek

PurposeThe purpose of this paper is to explore library research that uses geographic information systems (GIS) as a tool to evaluate library services and resources to ascertain current trends and establish future directions for this growing research area.Design/methodology/approachThe study searched full text for geographic information systems in two databases: Library and Information Science Source (LISS) and Library, Information Science and Technology Abstracts (LISTA), replicating the method used in a prior literature review. The titles and abstracts of the search results were analyzed to gather only the research that used GIS as a tool to measure and analyze library services.FindingsThis study found growth in the last decade for library research using GIS. There remain two ways the tool is primarily used: to analyze service areas and to manage facilities and collections.Practical implicationsThe findings are relevant for library and information science researchers and practitioners because they summarize a specific area of research that has grown and changed and that still has potential to be used more widely. Using GIS in practice and research could benefit all library users and nonusers because spatial analysis facilitates more precise and informed delivery of services and resources.Originality/valueThe paper provides future directions for use of GIS in library research and attempts to define subdivisions within this research area to clarify the area for researchers and practitioners.


2016 ◽  
Vol 21 (1) ◽  
pp. 36-39
Author(s):  
Valentin Pîrvuţ

Abstract An internal public auditing mission is a complex process with multiple objectives and auditable objects, which offers a most complete management of the audited entity’s identified risks and proposes solutions and recommendations for limiting their impact. In the informatics segment, the calculators, informatics systems (the operation systems, the informatics applications used in the entity, the accounting management systems of the data bases), the communication networks, the procedures and operations adjacent to the informatics systems, the policies in the system are subjected to control and evaluation. To this end, due to the importance the use of the calculator grants within the entities, in some countries there have been elaborated several normative acts regulating the use, control and auditing of the electronic devices used for processing the data. Thus, the most important regulations referring to the auditing within the computerized information systems (CIS - Computerized Information Systems) are the ISA ( International Standards on Auditing) and IAPS ( International Auditing Practice Statement) standards elaborated by IFAC ( International Federation of Accountants).


2016 ◽  
Vol 11 (3) ◽  
pp. 85 ◽  
Author(s):  
Carol L. Perryman

A Review of: Šimunić, Z., Tanacković, S.F., & Badurina, B. (2016). Library services for incarcerated persons: A survey of recent trends and challenges in prison libraries in Croatia. Journal of Librarianship and Information Science, 48(1), 72-89. http://dx.doi.org/10.1177/0961000614538481 Objective – To compare the status of prison libraries in Croatia to prior studies and ultimately, to guidelines for prison library services (Lehmann & Locke, 2005). Two research questions were asked: 1) How are Croatian prison libraries organized and managed? and 2) What kind of library collections and services are offered to incarcerated persons in Croatia? Design – Quantitative survey. Setting – 23 Croatian prison libraries. Subjects – Persons in charge of prison libraries. Methods – A paper survey was mailed to all 23 Croatian prisons in 2013. The survey consisted of 31 questions grouped into 3 categories: general library information, management of the library, and use. Analysis provided descriptive statistics. Main Results – Twenty-one responses (91%) were received. For the 10 institutions providing data on library holdings size, the numbers ranged from 450 to 6122, but per capita figures were not possible to calculate as no responses provided prison population size. Most (65%) maintained an entry book for new acquisitions, while one library kept a card catalogue. Half performed collection assessment on an annual basis. While all but 1 of the prisons had libraries, most (16 of 20) reported that funding was not provided on a regular basis; 13 had space allocated specifically for library purposes, but none were staffed by trained librarians, instead using prison staff or prisoners. Only two libraries practised regularly-scheduled collection development, with half acquiring materials solely through donations resulting in limited topical coverage. All collections included monographs, but only around 25% carried newspapers, magazines, music, or videos. While use of the libraries was high, most responses reflected severely limited educational, rehabilitative or cultural programming and access to the internet, and lack of space for collections and reading purposes. Conclusion – Libraries in Croatia fail to meet international standards for staffing, collections, and services. Recommendations for immediate improvement are made, including legislative advocacy and funding, improved public library involvement, and the creation of national standards aligned with international standards.


2020 ◽  
Vol 15 (6) ◽  
pp. 43-54
Author(s):  
T. E. Rozhdestvenskaya ◽  
A. G. Guznov

The emergence and diffusion of digital assets, especially cryptocurrencies, necessitated their legal regulation. The paper investigates the main approaches to the legal regulation, which is already implemented in the Civil Code of the Russian Federation and other federal laws. Particular attention is paid to the novelties of the legal regulation that have been envisaged in the draft Federal Law “On Digital Financial Assets.” The draft Federal Law is being currently debated in the State Duma of the Russian Federation. The paper analyses in detail the concept of digital financial assets as a specific type of digital rights. The author also compares the concepts of uncertified securities and non-cash money. The author investigates the issues of digital financial assets issuance and peculiarities of their circulation. The paper substantiates the requirements applied to information systems and their operators included into the draft law in compliance with which the issue of digital financial assets is carried out.


Sign in / Sign up

Export Citation Format

Share Document