Elsevier Has Deployed an End-user Tracking Tool for Security. Should Users Be Concerned About Their Privacy?
Should library patrons be concerned about how Elsevier uses ThreatMetrix and how it tracks users? It’s complicated.
Should library patrons be concerned about how Elsevier uses ThreatMetrix and how it tracks users? It’s complicated.
Today, a group of leading publishers is announcing a major new service to plug leakage, improve discovery and access, fight piracy, compete with ResearchGate, and position their platform for the OA ecosystem. This new service shows that publishers are finally beginning to address digital strategy in an environment that has steadily eroded their ability to monetize the value they create. Does it go far enough to reset the competitive environment?
How can an authentication system be granular and protect privacy? @TAC_NISO describes RA21 and attribute release for single sign on systems and how it supports privacy.
RA21 aims to promote a modern, standards-based access management system that preserves patron privacy & control. It is important to dispel some myths about RA21 so we can move on from the outdated world of IP-authentication.
Publishers are understandably concerned about piracy, but the STM/NISO initiative RA21 “to align and simplify pathways to subscribed content across participating scientific platforms” has scoped its problem the wrong way. Simply put: It’s not about security. It’s about identity. Every individual should be in control of their own identity. Can RA21 realize its potential to serve the broader interests of scientists and academia, not just the understandable objectives of publishers and vendors?
RA21 aims to replace IP address authentication (and proxy servers) with federated identity authentication – but have we thought through the implications?
Judy Luther and Todd Carpenter look at the technological challenges of providing access to content in an increasingly dispersed and mobile world.
The information war requires changes — new research priorities, new personal and professional boundaries, higher editorial hurdles, and a hardened infrastructure.
How much privacy are you willing to relinquish for convenience? How much effort are you willing to expend for security? This month we asked the chefs: Where Is The Balance Between Security, Authentication, Marketing, and Privacy?
A presentation to the 2016 ISMTE US Conference. Something of a “state of our industry” overview, or perhaps, everything I needed to know I learned from the other bloggers at The Scholarly Kitchen.
IP authentication is the most important mechanism for authorizing access to licensed e-resources resources. Substantial business and policy issues for libraries and publishers alike connect up to IP authentication. Today, there is substantial interest in eliminating IP authentication, so it is timely to examine the implications if we were soon to see its end.
Many of the popular tools that we use everyday require two-step authentication. It seems odd that universities, who store data much more valuable than cat videos, recipes, and selfies, are slow to require it. That may change shortly.
This year the SSP held its Annual Meeting in Vancouver, BC. It was a great success and held insights and lessons for all. Come see what the Chefs had to say when asked: What Did You Learn At This Year’s SSP Annual Meeting?
The technology developed to create a crypto-currency may be used to solve two intractable problems in scholarly publishing: authenticating users and counting usage.
Publishers and libraries do not completely understand how changing information consumption patterns, especially in the transition to mobile, should affect their product, infrastructure, and acquisitions strategies. Consider enticing or forcing your organization to engage more deeply with the mobile user experience.