Search results

1 – 10 of 472
Article
Publication date: 25 September 2007

Mitchell Brown

Aims to review some new developments in browser toolbars to enhance information searching activities.

684

Abstract

Abstract – Purpose

Aims to review some new developments in browser toolbars to enhance information searching activities.

Design/methodology/approach

A review with descriptions of new options for developing library‐specific internet browser toolbars to enhance user search options.

Findings

Several software development coding platforms are available to create toolbars, bookmarklets, browser extensions, and search tools for library applications.

Originality/value

This article provides descriptions of software development for internet browser toolbars and web gadgets.

Details

Library Hi Tech News, vol. 24 no. 8
Type: Research Article
ISSN: 0741-9058

Keywords

Article
Publication date: 24 October 2008

Elizabeth Jones

The purpose of this article is to review the toolbar creation service, Conduit™ and provide instruction for configuring the toolbar search box.

3138

Abstract

Purpose

The purpose of this article is to review the toolbar creation service, Conduit™ and provide instruction for configuring the toolbar search box.

Design/methodology/approach

This article is based on the experience of the Dulaney‐Browne Library while developing a library toolbar using Conduit™.

Findings

Conduit™ is a free service for creating toolbars to use with Mozilla Firefox and Internet Explorer. Conduit™ is user‐friendly and initiative. However, there is a compatibility issue with the internet explore version and the Ebrary Reader ActiveX Control.

Originality/value

This paper offers helpful tips on developing a library toolbar.

Details

Library Hi Tech News, vol. 25 no. 9
Type: Research Article
ISSN: 0741-9058

Keywords

Article
Publication date: 13 July 2015

Swapan Purkait

This paper aims to report on research that tests the effectiveness of anti-phishing tools in detecting phishing attacks by conducting some real-time experiments using freshly…

Abstract

Purpose

This paper aims to report on research that tests the effectiveness of anti-phishing tools in detecting phishing attacks by conducting some real-time experiments using freshly hosted phishing sites. Almost all modern-day Web browsers and antivirus programs provide security indicators to mitigate the widespread problem of phishing on the Internet.

Design/methodology/approach

The current work examines and evaluates the effectiveness of five popular Web browsers, two third-party phishing toolbar add-ons and seven popular antivirus programs in terms of their capability to detect locally hosted spoofed websites. The same tools have also been tested against fresh phishing sites hosted on Internet.

Findings

The experiments yielded alarming results. Although the success rate against live phishing sites was encouraging, only 3 of the 14 tools tested could successfully detect a single spoofed website hosted locally.

Originality/value

This work proposes the inclusion of domain name system server authentication and verification of name servers for a visiting website for all future anti-phishing toolbars. It also proposes that a Web browser should maintain a white list of websites that engage in online monetary transactions so that when a user requires to access any of these, the default protocol should always be HTTPS (Hypertext Transfer Protocol Secure), without which a Web browser should prevent the page from loading.

Details

Information & Computer Security, vol. 23 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 3 August 2012

Jennifer Koenig Johnson

Purpose – ‐‐ The purpose of this paper is to examine and evaluate five open access state encyclopedias.Design/methodology/approach ‐‐ Each encyclopedia is discussed and evaluated…

419

Abstract

Purpose – ‐‐ The purpose of this paper is to examine and evaluate five open access state encyclopedias.Design/methodology/approach ‐‐ Each encyclopedia is discussed and evaluated separately in regard to the following categories: web design, search functionality, features, scope, and currency.Findings ‐‐ The paper finds that, while many of the evaluated state encyclopedias provide different types of information with varying web design and structure, the end product is the same: offering free, authoritative articles and other media for anyone to access on a given topic related to the selected state. While some encyclopedias are continuously updated with new material and have better interfaces, features, and search functions, each site is valuable for the authoritative information it provides.Originality/value ‐‐ The state encyclopedias discussed are all open access resources that provide scholarly, authoritative information in an easily accessible format. Through evaluation of the web design, search features, currency, and scope and content, librarians can assist their users with searching and locating information in these encyclopedias.

Article
Publication date: 1 April 2006

Annette Bailey and Godmar Back

This paper presents LibX, a software module that enhances library access for users by integrating access to the online public access catalog (OPAC) and to the OpenURL linking…

2069

Abstract

Purpose

This paper presents LibX, a software module that enhances library access for users by integrating access to the online public access catalog (OPAC) and to the OpenURL linking server into the Firefox browser.

Design/methodology/approach

We developed LibX as a Firefox extension. It is implemented using XML user‐interface language (XUL) and JavaScript. LibX offers library access through a toolbar user interface, through context menus, and via cues embedded into web pages. LibX can be branded for use in different libraries.

Findings

LibX demonstrates the power of client‐side technology in providing users with direct access to library resources while doing research on the web.

Practical implications

LibX makes access to library resources immediate and effortless. Therefore, it has the potential to bring those users back to the library who in recent years have turned to internet search engines instead.

Originality/value

LibX is available for adoption by librarians who wish to provide their user community with enhanced library access.

Details

Library Hi Tech, vol. 24 no. 2
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 1 June 2015

Tanmay De Sarkar

The paper aims to present an outline how libraries are harnessing browser extensions to provide an easy and convenient access to library resources and services. Investigating the…

1808

Abstract

Purpose

The paper aims to present an outline how libraries are harnessing browser extensions to provide an easy and convenient access to library resources and services. Investigating the features, purposes of use and types of browser extensions prevalent among libraries in different regions, the paper seeks to measure the degree of implementation of browser extensions.

Design/methodology/approach

Stratified sampling method was followed to select academic libraries, and convenient sampling method was applied to select public libraries from four continents – Asia, Oceania, Europe and North America. Two-step web content analysis was applied to gather data along the select dimensions.

Findings

The study contributes to the recent advances in application of browser extension with numerous examples focussing on the relevance of different approaches adopted by the libraries. Providing a framework of proportionate implementation along checkpoints, the study also highlights degree of acceptance of browser extension among libraries in different regions.

Research limitations/implications

The investigation was restricted to libraries having English websites and confined to four continents only. This study aims at improving understanding among the librarians about the intended use and application of browser extension and helping them benchmark their effort in support of education, research and training. The current investigation expands the scope of future research on remaining regions and website whose contents are in non-English language to attain a broader perspective of its implementation.

Originality/value

The article may guide library professionals to use, develop and promote the implementation of browser extension in libraries. The checkpoints used here may serve as bedrock for framing questionnaire and interview schedule for conducting future research examining users’ perception of browser extension in the context of library resources and usage pattern, to fully comprehend its practicability and usefulness.

Details

The Electronic Library, vol. 33 no. 3
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 4 October 2011

Li Si, Ruoyao Shi and Bijuan Chen

This paper aims to provide an overall picture of the application of Web 2.0 technologies in Chinese university libraries. The focus of the research is what types of Web 2.0…

2423

Abstract

Purpose

This paper aims to provide an overall picture of the application of Web 2.0 technologies in Chinese university libraries. The focus of the research is what types of Web 2.0 technologies were applied in such libraries as well as their function and user interface.

Design/methodology/approach

The top 30 Chinese university libraries were selected to investigate the application of Web 2.0 technologies. Content analysis was used in terms of quantitative approach. Data were collected by accessing these 30 university libraries web sites within five weeks.

Findings

Two‐thirds of Chinese university libraries deployed one or more Web 2.0 technologies. Only one‐tenth of libraries adopted more than four Web 2.0 technologies. RSS was the most widely applied, while Wiki was the least. The application of Web 2.0 technologies among Chinese university libraries was not extensive and profound enough.

Research implications

The findings can be utilized to evaluate the status of Web 2.0 technology applications. The statistical data are very useful and authentic sources for improving the level of Web 2.0 technology application. It may enable future research to analyze other aspects (e.g. the application of RSS or Blogs for services).

Originality/value

This unique study explores the application of Web 2.0 mainly in Chinese university libraries that deployed any types of Web 2.0 technologies. This study is very useful for Chinese university libraries in evaluating/deploying Web 2.0. Library managers, librarians, and other libraries may also find this helpful, once they decide to implement such technologies in their libraries.

Details

The Electronic Library, vol. 29 no. 5
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 4 June 2020

Moruf Akin Adebowale, Khin T. Lwin and M. A. Hossain

Phishing attacks have evolved in recent years due to high-tech-enabled economic growth worldwide. The rise in all types of fraud loss in 2019 has been attributed to the increase…

1394

Abstract

Purpose

Phishing attacks have evolved in recent years due to high-tech-enabled economic growth worldwide. The rise in all types of fraud loss in 2019 has been attributed to the increase in deception scams and impersonation, as well as to sophisticated online attacks such as phishing. The global impact of phishing attacks will continue to intensify, and thus, a more efficient phishing detection method is required to protect online user activities. To address this need, this study focussed on the design and development of a deep learning-based phishing detection solution that leveraged the universal resource locator and website content such as images, text and frames.

Design/methodology/approach

Deep learning techniques are efficient for natural language and image classification. In this study, the convolutional neural network (CNN) and the long short-term memory (LSTM) algorithm were used to build a hybrid classification model named the intelligent phishing detection system (IPDS). To build the proposed model, the CNN and LSTM classifier were trained by using 1m universal resource locators and over 10,000 images. Then, the sensitivity of the proposed model was determined by considering various factors such as the type of feature, number of misclassifications and split issues.

Findings

An extensive experimental analysis was conducted to evaluate and compare the effectiveness of the IPDS in detecting phishing web pages and phishing attacks when applied to large data sets. The results showed that the model achieved an accuracy rate of 93.28% and an average detection time of 25 s.

Originality/value

The hybrid approach using deep learning algorithm of both the CNN and LSTM methods was used in this research work. On the one hand, the combination of both CNN and LSTM was used to resolve the problem of a large data set and higher classifier prediction performance. Hence, combining the two methods leads to a better result with less training time for LSTM and CNN architecture, while using the image, frame and text features as a hybrid for our model detection. The hybrid features and IPDS classifier for phishing detection were the novelty of this study to the best of the authors' knowledge.

Details

Journal of Enterprise Information Management, vol. 36 no. 3
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 23 November 2012

Swapan Purkait

Phishing is essentially a social engineering crime on the Web, whose rampant occurrences and technique advancements are posing big challenges for researchers in both academia and…

5991

Abstract

Purpose

Phishing is essentially a social engineering crime on the Web, whose rampant occurrences and technique advancements are posing big challenges for researchers in both academia and the industry. The purpose of this study is to examine the available phishing literatures and phishing countermeasures, to determine how research has evolved and advanced in terms of quantity, content and publication outlets. In addition to that, this paper aims to identify the important trends in phishing and its countermeasures and provides a view of the research gap that is still prevailing in this field of study.

Design/methodology/approach

This paper is a comprehensive literature review prepared after analysing 16 doctoral theses and 358 papers in this field of research. The papers were analyzed based on their research focus, empirical basis on phishing and proposed countermeasures.

Findings

The findings reveal that the current anti‐phishing approaches that have seen significant deployments over the internet can be classified into eight categories. Also, the different approaches proposed so far are all preventive in nature. A Phisher will mainly target the innocent consumers who happen to be the weakest link in the security chain and it was found through various usability studies that neither server‐side security indicators nor client‐side toolbars and warnings are successful in preventing vulnerable users from being deceived.

Originality/value

Educating the internet users about phishing, as well as the implementation and proper application of anti‐phishing measures, are critical steps in protecting the identities of online consumers against phishing attacks. Further research is required to evaluate the effectiveness of the available countermeasures against fresh phishing attacks. Also there is the need to find out the factors which influence internet user's ability to correctly identify phishing websites.

Details

Information Management & Computer Security, vol. 20 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 17 April 2009

Karl Suhr

The purpose of this paper is to discuss modifying an existing bookmarklet which is a button‐based tool that adds functionality to a web browser. This modification allows an…

Abstract

Purpose

The purpose of this paper is to discuss modifying an existing bookmarklet which is a button‐based tool that adds functionality to a web browser. This modification allows an individual to search a library's OPAC by ISBN for numbers encountered in the body of web documents such as bibliographies or book reviews.

Design/methodology/approach

The paper documents the code for the bookmarklet and its modification for different browsers.

Findings

The process involves using JavaScript to copy highlighted text from a web page and send it as a search to the local OPAC.

Practical implications

This tool allows the user to check if a particular book encountered on the web is held in a local library by highlighting the ISBN tool and clicking a browser button. The utility may be useful to library patrons as a discovery tool for finding books and can be used to automate aspects of daily library operations. Suggested applications and further variations and modifications to search by data elements other than ISBN, such as ISSN or title are discussed.

Originality/value

The process discussed adds a new way to access a library's holdings.

Details

Collection Building, vol. 28 no. 2
Type: Research Article
ISSN: 0160-4953

Keywords

1 – 10 of 472