Protect your library's computers

被引:1
作者
Zimerman, Martin [1 ]
机构
[1] Long Isl Univ, Brooklyn, NY 11201 USA
关键词
Libraries; Computers; Viruses; Computer crime;
D O I
10.1108/03074801011044070
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Purpose - The purpose of this paper is to describe how malware can harm the library's computers, and how technology can be used to protect them, in a way that can be understood by the non-technical. Design/methodology/approach - The searches encompassed articles and books on the issues of malware and technology-based code organisms. Findings - There were complex issues dealing with hackers and other malevolent and unscrupulous characters trying to break into computer systems for profit. Research limitations/implications - Only small indicators of the overall problem have been addressed. Much more has to be investigated and learned. Practical implications - It is advisable to learn to protect your computers more effectively when "online." Originality/value - Although much has been written about the problem, few articles offer concrete solutions to the problems.
引用
收藏
页码:203 / 212
页数:10
相关论文
共 13 条
  • [1] Brandt A., 2009, PC WORLD, V27, P62
  • [2] Catching Remote Administration Trojans (RATs)
    Chen, Zhongqiang
    Wei, Peter
    Delis, Alex
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2008, 38 (07) : 667 - 703
  • [3] Dunham K., 2007, Information Systems Security, V16, P123, DOI 10.1080/10658980601051763
  • [4] HADHAZY AT, 2009, DISCOVER, V30, P12
  • [5] Johnston S. J., 2008, PC WORLD, V26, P54
  • [6] Lemos R., 2006, PC MAGAZINE, V25, P117
  • [7] Luo X., 2007, INFORM SECURITY J, V16, P195, DOI DOI 10.1080/10658980701576412
  • [8] Naraine R., 2008, EWEEK, V25, P12
  • [9] Prince B, 2008, EWEEK, V25, P16
  • [10] Rubenking N. J., 2008, ZDNET