Authentication and Access
Authentication and Access
Authentication and Access
Lynne Webber ([email protected]) is Access Services Librarian and Peg Lawrence ([email protected]) is Systems
Librarian, Minnesota State University, Mankato.
Literature Review
Since the 1950s there has been considerable discussion
within library literature about academic libraries serving
external, secondary, or outside users. The subject
has been approached from the viewpoint of access to
the library facility and collections, reference assistance,
interlibrary loan (ILL) service, borrowing privileges, and
(more recently) access to computers and Internet privileges, including the use of proprietary databases.
Deale emphasized the importance of public relations
to the academic library.3 While he touched on creating
bonds both on and off campus, he described the positive
effect of privilege cards to community members.4 Josey
described the variety of services that Savannah State
College offered to the community.5 He concluded his
essay with these words:
Why cannot these tried methods of lending books to
citizens of the community, story hours for children
. . . , a library lecture series or other forum, a great
books discussion group and the use of the library staff
the reconciliation of material restrictions against principles of freedom of speech, academic freedom, and the
ALAs condemnation of censorship.23 Lynch discussed
institutional use of authentication and authorization and
the growing difficulty of verifying bona fide users of academic library subscription databases and other electronic
resources. He cautioned that future technical design
choices must reflect basic library values of free speech,
personal confidentiality, and trust between academic
institution and publisher.24
Barsun specifically examined the webpages of one
hundred ARL libraries in search of information pertinent
to unaffiliated users. She included a historic overview of
the changing attitudes of academics toward service to the
unaffiliated population and described the difficult balance of college community needs with those of outsiders
in 2000 (the survey year).25 Barsun observed a consistent
lack of information on library websites regarding library
guest use of proprietary databases.26 Carlson discussed
academic librarians concerns about Internet-related
crimes and hacking leading to reconsideration of open
computer use, and he described the need to compromise
patron privacy by requiring authentication.27 In a chapter
on the relationship of IT security to academic values,
Oblinger said, One possible interpretation of intellectual
freedom is that individuals have the right to open and
unfiltered access to the Internet.28 This statement was
followed later with equal access to information can also
be seen as a logical extension of fairness.29
A short article in Library and Information Update alerted
the authors to a UK project investigating improved
online access to resources for library visitors not affiliated with the host institution.30 Salotti described Higher
Education Access to E-Resources in Visited Institutions
(HAERVI) and its development of a toolkit to assist with
the complexities of offering electronic resources to guest
users.31 Salotti summarized existing resources for sharing
within the United Kingdom and emphasized that no
single solution is likely to suit all universities and colleges, so we hope that the toolkit will offer a number of
options.32 Launched by the Society of College, National
and University Libraries (SCONUL), and Universities
and Colleges Information Systems Association (UCISA),
HAERVI has created a best-practice guide.33
By far the most useful articles for this investigation have
been those by Nancy Courtney. Barbarians at the Gates: A
Half-Century of Unaffiliated Users in Academic Libraries,
a literature review on the topic of visitors in academic
libraries, included a summary of trends in attitude and
practice toward visiting users since the 1950s.34 The article
concluded with a warning: The shift from printed to electronic formats . . . combined with the integration of library
resources with campus computer networks and the Internet
poses a distinct threat to the publics access to information
even onsite. It is incumbent upon academic librarians to
Method
We constructed a survey designed to obtain current data
about authentication in ARL libraries and to provide
insight into how guest access is granted at various academic institutions. It should be noted that the object of
the survey was access to computers located in the public
areas of the library for use by patrons, not access to staff
computers. We constructed a simple, fourteen-question
survey using the Zoomerang online tool (http://www
.zoomerang.com/). A list of the deans, directors, and
chief operating officers from the 123 ARL libraries was
compiled from an Internet search. We eliminated the
few library administrators whose addresses could not
be readily found and sent the survey to 117 individuals
with the request that it be forwarded to the appropriate
respondent. The recipients were informed that the goal of
the project was determination of computer authentication and current computer access practices within ARL
libraries and that the intention was to reflect practices
at the main or central library on the respondents campus. Recipients were further informed that the names of
the participating libraries and the responses would be
reported in the findings, but that there would be no link
between responses given and the name of the participating library. The survey introduction included the name
and contact information of the institutional review board
administrator for Minnesota State University, Mankato.
Potential respondents were advised that the e-mail served
as informed consent for the study. The survey was
administered over approximately three weeks. We sent
reminders three, five, and seven days after the survey was
launched to those who had not already responded.
Number of libraries
Number of libraries
Figure 5. Provisions for the online use of government documents where authentication is required
Number of libraries
Number of libraries
Figure 6. Number of open-access computers offered
Number of libraries
Authentication
requirements
2007 (N = 69)
2008 (N = 61)
Some required
28 (46%)
23 (38%)
15 (25%)
9 (15%)
Not required
18 (30%)
29 (48%)
Other policy information was obtained by an examination of the 28 websites listed by respondents:
Guest-authentication policies
Of the 23 libraries that had the means to authenticate
their guests, 15 had a policy for guests obtaining a
username and password to authenticate, and 6 outlined
their requirements of showing identification and issuing
access. The other 9 had open-access computers that guests
might use.
The following are some of the varied approaches to
guest authentication:
Duration of the access (when mentioned) ranged
from 30 days to 12 months.
One library had a form of sponsored access where
current faculty or staff could grant a temporary username and password to a visitor.
One library had an online vouching system that
allowed the visitor to issue his or her own username
and password online.
One library allowed guests to register themselves by
swiping an ID or credit card.
One library had open-access computers for local
resources and only required authentication to leave
the library domain.
One library had the librarians log the users in as
guests.
One library described the privacy protection of collected personal information.
No library mentioned charging a fee for allowing
computer access.
Eight libraries stated that the computers were for academic use and that users might be asked to give up
their workstation if others were waiting.
Figure 11. Online resources available to authenticated affiliated users, guest users, open-access users
Further study
Although the survey answered many of our questions,
other questions arose. While the number of libraries
requiring affiliated users to log on to their public computers is increasing, this study does not explain why
this is the case. Reasons could include reactions to the
September 11 disaster, the USA PATRIOT Act, general
security concerns, or the convenience of the personalized
desktop and services for each authenticated user. Perhaps
a future investigation could focus on reasons for more
frequent requirement of authentication. Other subjects
that arose in the examination of institutional policies were
guest fees for services, age limits for younger users, computer time limits for guests, and collaboration between
academic and public libraries.
Conclusions
While we were able to gather more than 50 years of literature pertaining to unaffiliated users in academic libraries,
it soon became apparent that the scope of consideration
changed radically through the years. In the early years,
there was discussion about the obligation to provide
service and access for the community balanced with the
challenge to serve two clienteles. Despite lengthy debate,
there was little exception to offering the community
some level of service within academic libraries. Early
preoccupation with physical access, material loans, ILL,
basic reference, and other services later became a discussion of the right to use computers, electronic resources,
and other services without imposing undue difficulty to
the guest.
Current discussions related to guest users reflect
obvious changes in public computer administration over
the years. Authentication presently is used at a more
fundamental level than in earlier years. In many libraries, users must be authorized to use the computer in any
way whatsoever. As more and more institutions require
authentication for their primary users, accommodation
must be made if guests are to continue being served. In
addition, as Courtneys 2003 research indicates, an ever
increasing number of electronic databases, indexes, and
journals replace print resources in library collections. This
multiplies the roadblocks for guest users and exacerbates
the issue.48 Unless special provisions are made for computer access, community users are left without access to a
major part of the librarys collections.
Because 104 of the 123 ARL libraries (85 percent) are
Federal Depository or Canadian Depository Services
Libraries, the researchers hypothesized that most libraries responding to the survey would offer open-access
computers for the use of nonaffiliated patrons. This
study has shown that Federal Depository Libraries have
remained true to their mission and obligation of providing public access to government-generated documents.
Every Federal Depository respondent indicated that some
means was in place to continue providing visitor and
guest access to the majority of their electronic resources
whether through open-access computers, temporary or
guest logins, or even librarians logging on for users. While
access to government resources is required for the libraries housing government-document collections, libraries
can use considerably more discretion when considering
what other resources guest patrons may use. Despite the
commitment of libraries to the dissemination of government documents, the increasing use of authentication
may ultimately diminish the libraries ability and desire
to accommodate the information needs of the public.
This survey has provided insight into the various ways
academic libraries serve guest users. Not all academic
libraries provide public access to all library resources.
References
1. Lori Driscoll, Library Public Access Workstation Authentication, SPEC Kit 277 (Washington, D.C.: Association of Research
Libraries, 2003).
2. Martin Cook and Mark Shelton, Managing Public Computing, SPEC Kit 302 (Washington, D.C.: Association of Research
Libraries, 2007): 16.
3. H. Vail Deale, Public Relations of Academic Libraries,
Library Trends 7 (Oct. 1958): 26977.
4. Ibid., 275.
5. E. J. Josey, The College Library and the Community,
Faculty Research Edition, Savannah State College Bulletin (Dec.
1962): 6166.
6. Ibid., 66.
7. H. Vail Deale, Campus vs. Community, Library Journal
89 (Apr. 15, 1964): 169597.
8. Ibid., 1696.
9. John Waggoner, The Role of the Private University
Library, North Carolina Libraries 22 (Winter 1964): 5557.
10. E. J. Josey, Community Use of Academic Libraries: A
Symposium, College & Research Libraries 28, no. 3 (May 1967):
18485.
11. E. J. Josey, Implications for College Libraries, in Community Use of Academic Libraries, 198202.
12. Don L. Tolliver, Citizens May Use Any Tax-Supported
Library? Wisconsin Library Bulletin (Nov./Dec. 1976): 253.
13. Ibid., 254.
14. Ralph E. Russell, Services for Whom: A Search for Identity, Tennessee Librarian: Quarterly Journal of the Tennessee Library
Association 31, no. 4 (Fall 1979): 37, 39.
15. Ralph E. Russell, Carolyn L. Robison, and James E.
Prather, External User Access to Academic Libraries, The
Southeastern Librarian 39 (Winter 1989): 135.
16. Ibid., 136.
17. Brenda L. Johnson, A Case Study in Closing the University Library to the Public, College & Research Library News 45, no.
8 (Sept. 1984): 4047.
18. Lloyd M. Jansen, Welcome or Not, Here They Come:
Unaffiliated Users of Academic Libraries, Reference Services
Review 21, no. 1 (Spring 1993): 714.
19. Mary Ellen Bobp and Debora Richey, Serving Secondary
Users: Can It Continue? College & Undergraduate Libraries 1, no.
2 (1994): 115.
20. Eric Lease Morgan, Access Control in Libraries, Computers in Libraries 18, no. 3 (Mar. 1, 1998): 3840, http://search
.ebscohost.com/login.aspx?direct=true&db=aph&AN=306709&
site=ehost-live (accessed Aug. 1, 2008).
21. Susan K. Martin, A New Kind of Audience, Journal of
Academic Librarianship 24, no. 6 (Nov. 1998): 469, Library, Information Science & Technology Abstracts, http://search.ebsco
host.com/login.aspx?direct=true&db=aph&AN=1521445&site=
ehost-live (accessed Aug. 8, 2008).
22. Peggy Johnson, Serving Unaffiliated Users in Publicly
Funded Academic Libraries, Technicalities 18, no. 1 (Jan. 1998):
811.
23. Julie Still and Vibiana Kassabian, The Moles Dilemma:
Ethical Aspects of Public Internet Access in Academic Libraries,
Internet Reference Services Quarterly 4, no. 3 (1999): 9.
24. Clifford Lynch, Authentication and Trust in a Networked
World, Educom Review 34, no. 4 (Jul./Aug. 1999), http://search
.ebscohost.com/login.aspx?direct=true&db=aph&AN=2041418
&site=ehost-live (accessed July 16, 2008).
25. Rita Barsun, Library Web Pages and Policies Toward
Outsiders: Is the Information There? Public Services Quarterly
1, no. 4 (2003): 1127.
26. Ibid., 24.
27. Scott Carlson, To Use That Library Computer, Please
You may preview the survey by scrolling to the text below this message. If, after previewing you believe it should
be handled by another member of your library team, please forward this message appropriately. Alternatively, you may
print the survey, answer it manually and mail it to:
Systems/ Access Services Survey
Library Services
Minnesota State University, Mankato
ML 3097PO Box 8419
Mankato, MN 56001-8419 (USA)
We ask you or your representative to take 5 minutes to answer 14 questions about computer authentication practices
in your main library. Participation is voluntary, but follow-up reminders will be sent. This e-mail serves as your informed
consent for this study. Your participation in this study includes the completion of an online survey. Your name and identity will not be linked in any way to the research reports. Clicking the link to take the survey shows that you understand
you are participating in the project and you give consent to our group to use the information you provide. You have the
right to refuse to complete the survey and can discontinue it at any time. To take part in the survey, please click the link
at the bottom of this e-mail.
Thank you in advance for your contribution to our project. If you have questions, please direct your inquiries to the
contacts given below.
Thank you for responding to our invitation to participate in the survey.
This survey is intended to determine current academic library practices for computer authentication and open access.
Your participation is greatly appreciated.
Below are the definitions of terms used within this survey:
Authentication: a username and password are required to verify the identity and status of the user in order to log
on to computer workstations in the library.
Affiliated user: a library user who is eligible for campus privileges.
Non-affiliated user: a library user who is not a member of the institutional community (an alumnus may be a nonaffiliated user). This may be used interchangeably with guest user.
Guest user: visitor, walk-in user, nonaffiliated user.
Open Access Computer: Computer workstation that does not require authentication by user.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.
51.
52.
53.
54.
55.
56.
57.
58.
59.
60.
61.
University of Maryland
University of Massachusetts Amherst
University of Michigan
Michigan State University
University of Minnesota
University of Missouri
Massachusetts Institute of Technology
National Agricultural Library
University of Nebraska-Lincoln
New York Public Library
Northwestern University
Ohio State University
Oklahoma State University
University of Oregon
University of Pennsylvania
University of Pittsburgh
Purdue University
Rice University
Smithsonian Institution
University of Southern California
Southern Illinois University Carbondale
Syracuse University
Temple University
University of Tennessee
Texas A&M University
Texas Tech University
Tulane University
University of Toronto
Vanderbilt University
Copyright of Information Technology & Libraries is the property of American Library Association and its
content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's
express written permission. However, users may print, download, or email articles for individual use.