In the second of a two-part article on the use of content aggregation services and intelligence platforms and the privacy issues that arise in relation to both the individuals and businesses that deploy those products, Paul Pedley takes a more in-depth look at the potential privacy risks posed by these relationships with vendors in the context of library and information services and how to mitigate those risks by developing a robust plan.
The use of content aggregation services and intelligence platforms gives rise to privacy issues in relation to both the individuals and businesses that deploy those products. As a result, information professionals need to be aware of the risks posed by third-party relationships with vendors, suppliers, and distributors. This article looks at some of the platforms available and the types of data they generate as well as the legal landscape in relation to the privacy of both individuals and companies.
Are you up to speed with the General Data Protection Regulation (GDPR), an EU initiative impacting on data privacy across Europe and coming into force on 25th May?
In February, SLA Europe president, Katharine Schopflin, presented a webinar in which she examined the imminent changes to existing data protection legislation. This article presents some of the highlights from this webinar and looks at some of the myths around the General Data Protection Regulation (GDPR) and what organisations need to do to be compliant.
In this market landscape we look at eight products in the field of authentication and access: AuthAnvil Gluu server IAM platform Okta IT OneLogin SSO OpenAthens PingFederate Shibboleth Identity Provider WSo2 Identity Server. We provide a brief description of...
We know about BYOD but what about the impact on work of CYOD (Choose Your Own Device) and remote working policies? Kate Lomax explores changing expectations of work, new findings about employee engagement, and how employee-owned devices can increase productivity.
User authentication is one of the most challenging aspects of information access and delivery. In a recent FreePint webinar Isabelle Garcia, library manager at Qualcomm, outlined the strengths and weaknesses of different approaches to authentication, including single sign-on, IP authentication as well as other popular tools such as EZproxy. Sophie Alexander extracts practical next steps and need-to-know information in her article.
The corporate pharma field is research-intensive with literature searching a key component of the work. We interview Eduserv and find out more about their OpenAthens access management product, specfic authentication and access challenges facing corporate libraries, and how Eduserv aims to bring organisations and publishers closer to seamless user access.
Sophie Alexander interviewed Peter Borchers, managing director of Priory Solutions, to find out more about the company, its products Quest and SmartRecharge, and its flagship online resource management software ResearchMonitor and its cost analysis features. She also looks at what makes them so different from their competitors.
The future of authentication solutions is "complex", says Eduserv's Jon Bentley in an interview with researcher Sophie Alexander which covers Eduserv's OpenAthens authentication software, facilitating secure access in a variety of corporations and organisations, and why collaboration is the key to solving the authentication challenge.
Are you overloaded with authentication and terms such as IP, Single Sign-On, SAML, EZProxy and Good? Take a look at the resources we've developed to help information managers cope with the anxiety of authentication - they're part of the Topic Series, "All About Usage".
Many organisations are struggling to decide on the best approach to authentication - we hear from Isabelle Garcia, an information manager who shares the decisions and conclusions she and her colleagues at wireless technology and innovation company Qualcomm arrived at... and how they made changes to their approach to authentication and worked with vendors and internal colleagues to implement those changes.
Information managers are moving authentication higher up the agenda, fuelled by increased mobile working, new ways of using content, and potential security breaches. In this report we present FreePint's research results into authentication, including the research methodology, respondents... and...
Authentication solutions need to address a range of requirements, both internal and external, and operate seamlessly and invisibly to the user. Large organisations are coping with situations where they're multiplying those requirements against dozens and sometimes hundreds of suppliers, in multiple countries, on mobile devices... Find out more about FreePint's research investigating these challenges and approaches.
How can information managers grapple with the complex set of requirements required to solve the challenges of authentication? It's critical to have a strategy for gathering of information, as well as reliable sources of that information. The third installment of analysis of findings from FreePint's research looks as those sources of information as well as free-form comments on technologies from SSO to IP authentication, plus the role of senior leadership and a host of other issues.
Information managers in many industries are grappling with less-than-perfect authentication methods, with some industries placing greater importance than others on drivers such as a single view of usage or access to resources for partners and affiliates. Read the analysis of findings from FreePint's research into approaches, priorities and plans in the second installment of our feedback on this exciting fresh research.
Information managers are moving authentication higher up the agenda, fuelled by increased mobile working, new ways of using content, and potential security breaches. In the first section of results of FreePint's research results we look at the methodology, respondents... and at the factors which make authentication such a unique challenge.
As the FreePint Topic Series "All About Usage" launches, Catherine Dhanjal reports from a recent Pharma Documentation Ring (P-D-R) event focusing on "Authentication Technologies - Challenges and Opportunities for the Scientific Corporate Information Centre", where discussion centred around balancing the need to drive a simple, if not seamless, sign-on process for end users against cost, complexity and technical possibilities.
In 2013 James Mullan wrote about "shadow IT" and the potential threat it poses. Now at the start of a new year shadow IT is back on the agenda. There are a number of reasons for this and in this article James looks at two recent reports which highlight some of the concerns organisations have with shadow IT where staff use software and other tools for work reasons which have not been approved by their employers.
Whatever their other differences, the United States and Russian authorities seem to be of one mind when it comes to the desire to poke around privately held data whenever they feel like it. Their approaches to penetrating the cloud may be different but the motives are the same. Europe, where big hitters like Microsoft and Salesforce are both planning data centre expansion, may be the gainer because of its generally tougher privacy laws. So for anyone responsible for commissioning or managing an organisation's cloud services, the soil on which those clouds rain is really starting to matter.
This Research Focus provides tools, research and the original data you need to evaluate your current awareness provision and plot where you are in the movement towards intelligence systems. (October - December 2018).
Popular Blog content:
Latest Subscription content:
Register for our twice-monthly newsletter and keep up to date with what's new from Jinfo:
Latest: Jinfo Newsletter No.508 06 Dec 2018
(Opens in a new window)
© Jinfo Limited 1997-2018 · Cookies, Privacy, Legal