Evolution of a security system in a small library

被引:0
|
作者
Maxson, K [1 ]
机构
[1] Nova SE Univ, Oceanog Ctr, William S Richardson Lib, Dania, FL 33004 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper was written in response to an e-mail request I made to the IAMSLIC listserv for information about security systems in other research libraries. As manager of the library, I was becoming greatly concerned at the increasing loss of books and journals. Instead of receiving solutions and suggestions from the members, however, the majority of the responses were from those in similar situations who wanted the same information. Many who responded were from small research libraries, open twenty-four hours a day, with no security system and a loss problem, much the same as our Center's library, the focus of this paper. As book and journal issue losses seemed to increase, I decided it was time to do an inventory of our holdings. After seeing the results of the inventory, I approached the library director at the main campus, explained our situation and asked for help in obtaining at least a minimal security system. The paper describes the outcome of this request.
引用
收藏
页码:43 / 48
页数:6
相关论文
共 50 条
  • [1] System security in the networked library: Introduction
    Lavagnino, MB
    [J]. LIBRARY HI TECH, 1997, 15 (1-2) : 9 - 10
  • [2] EVOLUTION OF LIBRARY SYSTEM (NEW YORK)
    PRENTISS, SG
    [J]. LIBRARY QUARTERLY, 1969, 39 (01): : 78 - &
  • [3] Research on the security risk evaluation system of library warehouse
    [J]. Kong, Gongsheng, 1600, TeknoScienze, Viale Brianza,22, Milano, 20127, Italy (28):
  • [4] Research on the Security Risk Evaluation System of Library Warehouse
    Kong, Gongsheng
    [J]. AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (03): : 3583 - 3586
  • [5] Construction of Information System Security Precaution in Digital Library
    Wan, Xuemei
    [J]. 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS FOR CRISIS RESPONSE AND MANAGEMENT & 4TH INTERNATIONAL SYMPOSIUM ON GEO-INFORMATION FOR DISASTER MANAGEMENT, 2008, : 263 - 268
  • [6] The Application of IDS in College Library Network Security System
    Huang Rugao
    [J]. PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS I AND II, 2010, : 852 - 854
  • [7] SIMULATION OF LIBRARY SECURITY SYSTEM USING IRIS SCANNING
    Bremananth, R.
    Sharieh, Ahmad
    [J]. 13TH MIDDLE EASTERN SIMULATION & MODELLING MULTICONFERENCE (MESM 2012) 3RD GAMEON-ARABIA CONFERENCE, 2012, : 41 - 46
  • [8] Small system security - There is help and hope
    Blaha, FJ
    [J]. JOURNAL AMERICAN WATER WORKS ASSOCIATION, 2003, 95 (07): : 31 - 32
  • [9] EVOLUTION OF A PROCESSING SYSTEM IN A LARGE BIOMEDICAL LIBRARY
    DARLING, L
    FAYOLLAT, J
    [J]. BULLETIN OF THE MEDICAL LIBRARY ASSOCIATION, 1976, 64 (01): : 20 - 24
  • [10] Small asteroid system evolution
    Jacobson, Seth A.
    [J]. COMPLEX PLANETARY SYSTEMS, 2014, 9 (310): : 108 - 117