首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到17条相似文献,搜索用时 171 毫秒
1.
本文介绍了国内外大学图书馆合法用户校外访问电子资源的方式,提出开展校外访问图书馆电子资源急待解决的现实问题。  相似文献   

2.
关于合法用户在校外访问图书馆电子资源的研究   总被引:1,自引:1,他引:1  
随意访问和传播图书馆自建或购买的电子资源会造成侵犯版权的问题,而各种因素使得合法用户在校外访问图书馆电子资源的需求日益迫切。本文拟在对国内外高校关于校外访问图书馆电子资源境况的调查基础上,分析、探讨各种校外访问服务方式的优劣,并提出其他补充方式和相关配套管理要求的可行建议,以期对同行开展校外访问服务起到一定的参考作用。  相似文献   

3.
文章在介绍国外大学合法用户校外访问图书馆电子资源方式的基础上,结合国内校外访问现实背景,对国内图书馆实现合法用户远程访问图书馆电子资源的方式进行了分析和探讨。  相似文献   

4.
认为提供校外访问电子资源服务是保障图书馆电子资源得以充分利用,维护合法用户权益的方法之一。通过对我国201所高校图书馆进行调查,发现我国高校图书馆与美国高校图书馆之间存在较大差距,大陆地区的高校图书馆校外访问电子资源提供服务尚不普及,并就开展校外访问需要解决的问题进行简明分析。  相似文献   

5.
校外访问代理软件的分析与比较   总被引:12,自引:0,他引:12  
校外访问是图书馆基于互联网而开展的一种新型的电子资源服务方式。校外访问能够通过代理软件来实现,其原理就是将校外访问用户的IP地址虚拟成校园网内部的私有IP地址。本文将对能够实现校外访问的三种较为典型的代理软件,即EZproxy、ISA Server(VPN)和Squid进行分析与比较,旨在对我国图书馆同行开展校外访问服务能够起到一定的抉择和指导作用。  相似文献   

6.
在丰富的校园电子资源中,图书馆电子资源占有举足轻重的地位,但是图书馆的电子资源基本上来源于购买和自建。由于知识产权保护的需要,其中大部分电子资源是限制访问的,只有一小部分是免费访问的。通过对美国52所大学图书馆电子资源的校外访问方式的调查与研究,认为美国大学图书馆既重视电子资源的知识产权保护,也重视本单位合法用户的权益保护。  相似文献   

7.
随着校外用户对有IP限制的数据库资源访问需求的日益迫切,校外远程访问图书馆电子资源的技术越来越受到关注。详细介绍EZproxy软件及其使用方法。  相似文献   

8.
利用EZproxy实现图书馆电子资源的远程访问   总被引:4,自引:1,他引:3  
随着校外用户对有IP限制的数据库资源访问需求的日益迫切,校外远程访问图书馆电子资源的技术越来越受到关注。文章详细介绍EZproxy软件及其使用方法。  相似文献   

9.
电子资源远程访问地址重写代理EZproxy研究   总被引:1,自引:0,他引:1  
针对高校校园网用户对图书馆所购买电子资源利用方式日益多元化的需求与现状,介绍了专为图书馆电子资源远程访问而开发的URL地址重写代理软件EZproxy,重点研究了EZproxy的URL重写策略、用户认证、持久标识技术以及EZproxy软件在国外获得广泛应用的启示。最后指出,国内图书馆应密切关注校外访问技术的发展,并借鉴国外先进技术经验,在重视电子资源产权保护的基础上重视本校合法用户的使用权限,采用EZproxy与计算机中心提供的VPN多种并存方式,有效满足本校用户的校外访问需求。  相似文献   

10.
文章论述了虚拟专用网技术在图书馆中的应用,并结合图书馆的实际情况具体详细地描述如何在Linux系统中构建基于PPTP的VPN访问服务器,解决了校外用户无法使用图书馆电子资源的问题。  相似文献   

11.
《图书馆管理杂志》2013,53(1-2):315-326
Abstract

Students and faculty have come to expect off-campus access to the full portfolio of electronic resources made available by their library. They demand, and should be provided, simple access to electronic information sources 24 hours a day, 7 days a week, regardless of their location. Proxy servers have been the solution of choice for remote authentication for some time now, but library users tend to have difficulty with manually configured proxies, and there are beginning to be robust alternatives that can provide secure off-campus access to library resources. Remote authentication should not be a matter of getting a proxy server running and then forgetting about it. New developments should be investigated to ensure the easiest, most reliable and most secure access possible-in the interests of libraries and their users.  相似文献   

12.
When library staff resources are limited, administering post-cancellation access to electronic journal content can often be neglected when other demands of managing electronic resources take priority. Difficulties handling perpetual access include determining access rights from publishers’ license terms, verifying the paid content to which the library is entitled, and retaining access when a journal is transferred to a new publisher. Libraries can utilize their existing electronic resources management tools to develop staff workflows for perpetual access entitlements. This article is based on a presentation given at the Mississippi State University Libraries eResource & Emerging Technologies Summit on August 3, 2012.  相似文献   

13.
论文从高校图书馆电子资源侵权案例透析用户侵权行为,调查用户利用电子资源的行为规律及对版权的认知.提出了建立版权网络监控系统,在电子资源中植入监控程序,重点监控校外用户等规避用户利用电子资源过程中产生版权风险的措施。  相似文献   

14.
ABSTRACT

Saint Leo University faculty provide instruction at SCE sites located on eight community college campuses and three military bases in the Florida region. This article will examine ways in which the Distance Learning/Reference (DL/Ref) librarian facilitates off-campus student access to both the university library's online and print resources and to library resources at nearby supporting, or “proximal,” libraries for students who are too far from the University Campus to use anything except the Ask-a-Librarian, 1–800 reference, and Interlibrary Loan services. These students must rely on proximal libraries, which include large public library systems, library consortia, community college libraries, and military base libraries, for access to print resources as well as Internet access to the university's online content. Providing library access services for such a large, disparate group requires the additional combined efforts of administrators, other faculty librarians, and supporting libraries.  相似文献   

15.
《期刊图书馆员》2013,64(4):195-203
ABSTRACT

Libraries, publishers, and agents all face unique challenges related to the acquisition of electronic resources. Among the many variables that figure into the acquisition of an e-resource are access rights, pricing models, and packaging options. This article looks at several of these variables from both the publisher's and the agent's view, evaluating the current state of affairs and addressing forthcoming developments.  相似文献   

16.
Providing access to electronic resources is a core service for most libraries, and for more than two decades librarians have used Internet Protocol (IP) addresses as a way to authenticate users and prove they should have access to their institution’s licensed materials. But in recent years, IP addresses have become a less accurate method of determining whether a user is affiliated with a particular library. Key players in the publishing industry and academia are working together on a new set of protocols to replace IP authentication called Resource Access for the 21st Century, or RA21. This column will briefly explore what RA21 is, what problems it purports to solve, and what problems it may create. A list of resources for further reading on RA21 is provided.  相似文献   

17.
在介绍SSL协议、SSL VPN技术特点的基础上,详细阐述了如何利用SSL VPN系统实现数字图书馆资源远程访问,从而有效解决了职工在校外也能随时随地检索图书馆数字资源的问题,进而大大提高了数字图书馆资源的利用率。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号