Skip to main content
logo

ER&L 2016

April 3–6, 2016

Austin, Texas

Visit our "Search the ER&L 2016 Program" page to peruse all the accepted and peer-reviewed sessions for the 11th Anniversary Electronic Resources and Libraries Conference, April 3-6, 2016.

Click to view information about ER&L 2016 Online and Austin registration.


 

S54 - EZproxy Security: When Your Electronic Resources Are Used "Too Much"

Tuesday, April 5, 2016 at 1:15 PM–2:00 PM CDT
Room 301
Conference Track

1. Managing e-Resources & Licensing

Learning Objectives

Understand EZproxy security settings,

Evaluate which optional security settings might be beneficial based on user population,

Regularly monitor EZproxy logs for suspicious activity,

Develop a plan / course of action to quickly identify suspicious activity in the event that access is suspended by a vendor.

Abstract

As Librarians, we want our collections to be used, but what happens when E-Resources are used “too much”?  This presentation will describe how Thomas Jefferson University adjusted security procedures after excessive downloading was detected and access was suspended by a vendor. Discussion will include EZproxy security, log analysis, interdepartmental relationships.

Presenters

[photo]
Laura McNamara, Thomas Jefferson University
Loading…