Abstract
The background to this paper is the introduction of public access IT facilities in public libraries. These facilities have seen recorded instances of misuse alongside weaknesses in checking identities of users and in explaining Acceptable Use Policies (AUPs) to users. The FRILLS (Forensic Readiness of Local Libraries in Scotland) project, funded by the Scottish Library and Information Council, attempted to survey the situation in Scottish public libraries and develop a forensic readiness logging regime for use in them. There is in depth discussion of the use of logging in public library computer facilities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Brophy, P.: The People’s Network: A turning point for public libraries: first findings, 23 p. Resource, The Council for Museums, Archives and Libraries, London (2002)
Brophy, P.: The People’s Network: moving forward, 27 p. Museums, Libraries and Archives, London (2004)
McMenemy, D.: Internet access in UK Public Libraries: notes and queries from a small scale study. Library Review 57(7) (2008)
Edinburgh Evening News. Jail for father who looked at child porn on school PC (August 10, 2005), http://edinburghnews.scotsman.com/scotland.cfm?id=1757852005
Riley, W.: Student Ran Kiddie Porn Ring At Café. The Express (Scottish Edition), October 15, p. 38 (2005)
Cullen, D.: EasyInternet abandons CD burning court appeal: pays damages, costs to BPI. The Register (2003), http://www.theregister.co.uk/2003/04/09/easyinternet_abandons_cd_burning_court/
BBC Library sex surfer gets apology, http://news.bbc.co.uk/1/hi/wales/south_east/4356316.stm (October 19, 2005)
American Library Association Library Worker’s Firing Sparks Firestorm. American Libraries Libraries Direct 4/2/2008, http://www.ala.org/ala/alonline/currentnews/newsarchive/2008/march2008/tularefirestorm.cfm
Coombs, K.: Protecting user privacy in the age of digital libraries. Computers in Libraries 25(6), 16–20 (2005)
Huang, P.: How You Can Protect Public Access Computers and their Users. 2007 Computers in Libraries 27(5), 16–20 (2007)
Gitta, S., Ikoja-Odongo, J.R.: The impact of cybercafés on information services in Uganda. First Monday (2003), http://www.firstmonday.dk/issues/issue8_4/gitta/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Poulter, A., Ferguson, I., McMenemy, D., Glassey, R. (2009). Question: Where Would You Go to Escape Detection If You Wanted to Do Something Illegal on the Internet? Hint: Shush!. In: Jahankhani, H., Hessami, A.G., Hsu, F. (eds) Global Security, Safety, and Sustainability. ICGS3 2009. Communications in Computer and Information Science, vol 45. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04062-7_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-04062-7_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04061-0
Online ISBN: 978-3-642-04062-7
eBook Packages: Computer ScienceComputer Science (R0)