Abstract
PurposeThe purpose of this paper is to point out, to non‐technical library users, the hazards of using the library's public computers.Design/methodology/approachThe purpose of this paper is to articulate the dangers faced by library users, whether they be students, faculty, or staff. This paper is geared towards education and enlightenment of non‐technical users of public computers.FindingsThere are many hazards to computing, both online and off. Most public computers are not well prepared to cope with worms, Trojans and other malware. There are remedies for a lot of the malware, but as in an arms race it is a matter of catching up with the latest weapon to be presented.Practical implicationsSince public computers are so vulnerable to attack, library IT must be constantly vigilant for the menaces that are present. The paper shows how computers can be protected.Originality/valueIf this can help save one computer's workload by making people aware of the dangers involved, the information is well worthwhile.
Subject
Library and Information Sciences,Computer Science Applications
Reference14 articles.
1. Adomi, E.E. and Igun, S.E. (2008), “Combating cyber crime in Nigeria”, The Electronic Library, Vol. 26 No. 5, p. 716.
2. Butler, R. (2007), “A framework of anti‐phishing measures aimed at protecting the online consumer's identity”, The Electronic Library, Vol. 25 No. 5, p. 517.
3. Chen, Z., Wei, P. and Delis, A. (2008), “Catching Remote Administration Trojans (RATs)”, Software, Practice & Experience, Vol. 38 No. 7, pp. 667‐703.
4. Etsebeth, V. (2007), “Malware: the new legal risk”, The Electronic Library, Vol. 25 No. 5, p. 534.
5. Goodwin, B. (2006), Hackers Collaborating to Create Big Rise in Malware, Reed Business Information, Sutton.