TY - JOUR AB - Outlines the experience of the University of Alabama when a hacker bypassed the preventative security measures of the library management system and accessed the operating system. Discusses how the break‐in occurred, how the hacker was identified and what actions were taken. Concludes that each system will have to decide what direction to take if such a break‐in occurred, suggesting measures such as employing a full‐time investigator for hackers. VL - 15 IS - 1/2 SN - 0737-8831 DO - 10.1108/07378839710307331 UR - https://doi.org/10.1108/07378839710307331 AU - Muir Scott PY - 1997 Y1 - 1997/01/01 TI - After the break‐in occurs: how to handle the student hacker T2 - Library Hi Tech PB - MCB UP Ltd SP - 92 EP - 95 Y2 - 2024/04/23 ER -