Protect your library's computers

被引:2
作者
Zimerman, Martin [1 ]
机构
[1] Long Isl Univ, Brooklyn, NY 11201 USA
关键词
Libraries; Computers; Viruses; Computer crime;
D O I
10.1108/03074801011044070
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Purpose - The purpose of this paper is to describe how malware can harm the library's computers, and how technology can be used to protect them, in a way that can be understood by the non-technical. Design/methodology/approach - The searches encompassed articles and books on the issues of malware and technology-based code organisms. Findings - There were complex issues dealing with hackers and other malevolent and unscrupulous characters trying to break into computer systems for profit. Research limitations/implications - Only small indicators of the overall problem have been addressed. Much more has to be investigated and learned. Practical implications - It is advisable to learn to protect your computers more effectively when "online." Originality/value - Although much has been written about the problem, few articles offer concrete solutions to the problems.
引用
收藏
页码:203 / 212
页数:10
相关论文
共 13 条
[1]  
Brandt A., 2009, PC WORLD, V27, P62
[2]   Catching Remote Administration Trojans (RATs) [J].
Chen, Zhongqiang ;
Wei, Peter ;
Delis, Alex .
SOFTWARE-PRACTICE & EXPERIENCE, 2008, 38 (07) :667-703
[3]  
Dunham K., 2007, Information Systems Security, V16, P123, DOI 10.1080/10658980601051763
[4]  
HADHAZY AT, 2009, DISCOVER, V30, P12
[5]  
Johnston S. J., 2008, PC WORLD, V26, P54
[6]  
Lemos R., 2006, PC MAGAZINE, V25, P117
[7]  
Luo X., 2007, INFORM SECURITY J, V16, P195, DOI DOI 10.1080/10658980701576412
[8]  
Naraine R., 2008, EWEEK, V25, P12
[9]  
Prince B, 2008, EWEEK, V25, P16
[10]  
Rubenking N. J., 2008, ZDNET