Search results

1 – 10 of over 1000
Article
Publication date: 1 June 2015

Tanmay De Sarkar

The paper aims to present an outline how libraries are harnessing browser extensions to provide an easy and convenient access to library resources and services. Investigating the…

1808

Abstract

Purpose

The paper aims to present an outline how libraries are harnessing browser extensions to provide an easy and convenient access to library resources and services. Investigating the features, purposes of use and types of browser extensions prevalent among libraries in different regions, the paper seeks to measure the degree of implementation of browser extensions.

Design/methodology/approach

Stratified sampling method was followed to select academic libraries, and convenient sampling method was applied to select public libraries from four continents – Asia, Oceania, Europe and North America. Two-step web content analysis was applied to gather data along the select dimensions.

Findings

The study contributes to the recent advances in application of browser extension with numerous examples focussing on the relevance of different approaches adopted by the libraries. Providing a framework of proportionate implementation along checkpoints, the study also highlights degree of acceptance of browser extension among libraries in different regions.

Research limitations/implications

The investigation was restricted to libraries having English websites and confined to four continents only. This study aims at improving understanding among the librarians about the intended use and application of browser extension and helping them benchmark their effort in support of education, research and training. The current investigation expands the scope of future research on remaining regions and website whose contents are in non-English language to attain a broader perspective of its implementation.

Originality/value

The article may guide library professionals to use, develop and promote the implementation of browser extension in libraries. The checkpoints used here may serve as bedrock for framing questionnaire and interview schedule for conducting future research examining users’ perception of browser extension in the context of library resources and usage pattern, to fully comprehend its practicability and usefulness.

Details

The Electronic Library, vol. 33 no. 3
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 2 January 2024

Gautami Jagadhane, Rosy Khan and Anjaneya Reddy N.M.

This study aims to explore browsing extension plugins for searching open scholarly literature and gain an understanding of the various available extensions, their functionalities…

Abstract

Purpose

This study aims to explore browsing extension plugins for searching open scholarly literature and gain an understanding of the various available extensions, their functionalities and their benefits.

Design/methodology/approach

Instant retrieval of scholarly literature on the internet is challenging for any researcher due to incredibly accessible free and paid content, including various forms of resources, despite the availability of federated and discovery tools. This paper aimed to explore “Access Broker Browser extensions” available for quick retrieval of open scholarly literature. This paper explicitly explains browser extensions – Google Scholar Button, Open Access Button, Open Access Helper, Core, GetFTR and EndNote Click. Furthermore, the paper elaborated on the extension’s features, functionalities and usability in finding scholarly literature. This study found that the Google Scholar Button and GetFTR extensions seems more user-friendly, effective and easy to use on all internet browsers.

Findings

This paper identifies that the “Google Scholar Button” and “GetFTR” browser extensions are more effective than any other extensions and very user-friendly to use.

Originality/value

This study recommends that libraries should create awareness and provide training on access broker browser extensions for discovering scholarly open literature for learning.

Article
Publication date: 24 January 2020

Nasser Mohammed Al-Fannah and Chris Mitchell

Browser fingerprinting is increasingly being used for online tracking of users, and, unlike the use of cookies, is almost impossible for users to control. This has a major…

Abstract

Purpose

Browser fingerprinting is increasingly being used for online tracking of users, and, unlike the use of cookies, is almost impossible for users to control. This has a major negative impact on online privacy. Despite the availability of a range of fingerprinting countermeasures as well as some limited attempts by browser vendors to curb its effectiveness, it remains largely uncontrolled. The paper aims to discuss this issue.

Design/methodology/approach

This paper provides the first comprehensive and structured discussion of measures to limit or control browser fingerprinting, covering both user-based and browser-based techniques.

Findings

This study discusses the limitations of counter browser fingerprinting measures and the need for browser vendor support in controlling fingerprinting. Further, a somewhat counterintuitive possible new browser identifier is proposed which could make cookies and fingerprint-based tracking redundant; the need for, and possible effect of, this feature is discussed.

Originality/value

This study provides the first comprehensive and structured discussion of measures to limit or control browser fingerprinting. Also, it proposes a new browser identifier that could make cookies and fingerprint-based tracking redundant.

Details

Journal of Intellectual Capital, vol. 21 no. 2
Type: Research Article
ISSN: 1469-1930

Keywords

Article
Publication date: 25 September 2007

Mitchell Brown

Aims to review some new developments in browser toolbars to enhance information searching activities.

684

Abstract

Abstract – Purpose

Aims to review some new developments in browser toolbars to enhance information searching activities.

Design/methodology/approach

A review with descriptions of new options for developing library‐specific internet browser toolbars to enhance user search options.

Findings

Several software development coding platforms are available to create toolbars, bookmarklets, browser extensions, and search tools for library applications.

Originality/value

This article provides descriptions of software development for internet browser toolbars and web gadgets.

Details

Library Hi Tech News, vol. 24 no. 8
Type: Research Article
ISSN: 0741-9058

Keywords

Article
Publication date: 20 June 2008

Erik Wilde

A growing amount of information available on the web can be classified as contextual information, putting already existing information into a new context rather than creating…

1491

Abstract

Purpose

A growing amount of information available on the web can be classified as contextual information, putting already existing information into a new context rather than creating isolated new information resources. Blogs are a typical and popular example of this category. By looking at blogs from a more context‐oriented view, it is possible to deconstruct them into structures which are more contextual than just focused on the content, facilitating flexible reuse of these structures: that is the aim of this paper.

Design/methodology/approach

The paper looks at the underlying structures of blogs and blog posts, representing them as multi‐ended links. This alternative representation of blogs and blog posts allows us to represent them as reusable information structures. This paper presents blogs as a popular content type, but the approach of restructuring Web 2.0 content can be extended to other classes of information, as long as they can be regarded as being mainly contextual.

Findings

By deconstructing blogs and blog posts into their essential properties, it can be shown how there is a simple and universal representation for blogs. This representation allows the reuse of blog information across specific blog or blogging platforms, and can even go beyond blogs by representing other web content which provides context.

Originality/value

This paper presents a novel approach for mapping a popular web content type to a simple and universal representation. The value of such a unified representation lies in exposing the structural similarities among blogs and blog posts, and making them available for reuse.

Details

Online Information Review, vol. 32 no. 3
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 22 March 2013

Tanmay De Sarkar

The paper seeks to highlight how academic libraries are harnessing widgets to make library resources easily and conveniently accessible to users. Examining the characteristic…

Abstract

Purpose

The paper seeks to highlight how academic libraries are harnessing widgets to make library resources easily and conveniently accessible to users. Examining the characteristic features, purposes of use and types of widget applications, the paper aims to measure the degree of implementation of widget among academic libraries in different regions.

Design/methodology/approach

A stratified sampling method was followed for selecting four samples of population, each representing one of the four continents (North America, Europe, Australia and Asia) and content analysis was used to collect data along the checkpoints.

Findings

Giving a comparative account of widget implementation along the select dimensions, the study focused on relative acceptance of widgets among the continents and emphasized the areas where widget is being applied most. With examples, the study also illustrated the relevance of the different approaches taken by various libraries.

Research limitations/implications

The study was confined to selected libraries of higher education institutes among the four continents only. Libraries having non‐English websites and restricted or limited access were not included.

Originality/value

This unique investigation presented a comprehensive picture of widget implementation among the academic libraries across the world. The findings will serve as a valuable guide for future librarians who wish to incorporate such technologies in library websites. Furthermore, the checkpoints used here may serve as a bedrock for framing questionnaire and interview schedule for conducting future research investigating users' perception of this new web‐based tool in order to comprehend fully the practicability and usefulness of widget.

Details

New Library World, vol. 114 no. 3/4
Type: Research Article
ISSN: 0307-4803

Keywords

Article
Publication date: 20 June 2016

Sarath Tomy and Eric Pardede

The purpose of this paper is to analyse the problem of privacy disclosure of third party applications in online social networks (OSNs) through Facebook, investigate the…

2210

Abstract

Purpose

The purpose of this paper is to analyse the problem of privacy disclosure of third party applications in online social networks (OSNs) through Facebook, investigate the limitations in the existing models to protect users privacy and propose a permission-based access control (PBAC) model, which gives users complete control over users’ data when accessing third party applications.

Design/methodology/approach

A practical model based on the defined permission policies is proposed to manage users information accessed by third party applications and improve user awareness in sharing sensitive information with them. This model is a combination of interfaces and internal mechanisms which can be adopted by any OSN having similar architecture to Facebook in managing third party applications, without much structural changes. The model implemented in Web interface connects with Facebook application programming interface and evaluates its efficacy using test cases.

Findings

The results show that the PBAC model can facilitate user awareness about privacy risks of data passed on to third party applications and allow users who are more concerned about their privacy from releasing such information to those applications.

Research limitations/implications

The study provides further research in protecting users’ privacy in OSNs and thus avoid the risks associated with that, thereby increasing users’ trust in using OSNs.

Originality/value

The research has proven to be useful in improving user awareness on the risk associated with sharing private information on OSNs, and the practically implemented PBAC model guarantees full user privacy from unwanted disclosure of personal information to third party applications.

Abstract

Details

Library Hi Tech News, vol. 37 no. 4
Type: Research Article
ISSN: 0741-9058

Keywords

Article
Publication date: 3 June 2014

Iwan Gulenko

This paper aims to study the influence of emotions on security behaviour by reviewing Information Systems Security (ISS) topics in Information Systems (IS) literature. Researchers…

1598

Abstract

Purpose

This paper aims to study the influence of emotions on security behaviour by reviewing Information Systems Security (ISS) topics in Information Systems (IS) literature. Researchers in ISS study how to motivate people to adhere to security policies; they mainly focus on cognitive models such as the technology acceptance model (Davis, 1985), innovation diffusion theory (Brancheau and Wetherbe, 1990), theory of planned behaviour (Mathieson, 1991) and social cognitive theory (Compeau and Higgins, 1995). Applying positive emotions such as joy and interest is feasible by adding emoticons and positive messages; we use this approach to improve password choosing.

Design/methodology/approach

We apply differential emotional theory (Izard 2002) from psychology to the context of ISS. Twenty-two participants took part in an experiment with the task of choosing strong but memorable passphrases. The dependent variable is the strength of the chosen passphrase. The task for the user is to come up with a passphrase that is both strong and memorable. We choose a between-subject design. The independent variable is the emotional interface that the user is confronted with.

Findings

We found that 5.35 words was the mean when participants were shown positive smiley faces and messages. When exposed to negative emoticons, the mean was only 4.35 words. Through ANOVA, we find the differences to be statistically significant (F1; 20 = 3.16; p < 0.1). We derive from the experiment that positive emotions should be used in ISS when making users start a habit (e.g. developing a new, individual password strategy), and we conclude from our literature review that negative emotions should be used when reinforcing a habit (e.g. taking care of shoulder surfing).

Originality/value

We contribute to practice by developing a user script that can be installed in all established Internet browsers. The script supports the user to choose a good passphrase strategy when registering for a new service. We find that trainings should not rely on facts only but must make use of emotions, which are crucial for human motivation.

Details

Information Management & Computer Security, vol. 22 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Content available
Article
Publication date: 1 September 2005

94

Abstract

Details

Library Hi Tech News, vol. 22 no. 8
Type: Research Article
ISSN: 0741-9058

1 – 10 of over 1000