Filling the Gap Between Vendor & User Practice Denise Troll Covey Associate University Librarian, Carnegie Mellon DLF Forum, November 2002.

Slides:



Advertisements
Similar presentations
SOFTWARE SOLUTIONS Identification, Server-Side Printing, Tracking & Mobility Software TEKLYNX CENTRAL Bundled Solutions.
Advertisements

Access & Identity Management “An integrated set of policies, processes and systems that allow an enterprise to facilitate and control access to online.
Remote User Authentication Steve Hunt Systems Librarian Santa Monica College Library
ELAG Trondheim Distributed Access Control - BIBSYS and the FEIDE solution Sigbjørn Holmslet, BIBSYS, Norway Ingrid Melve, UNINET, Norway.
Take your CMS to the cloud to lighten the load Brett Pollak Campus Web Office UC San Diego.
Information and Technology Services Customer Services.
Using Assessment Data to Improve Library Services Christopher Stewart Dean of Libraries, Illinois Institute of Technology Charles Uth, Head of Collection.
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Company Confidential The Internet offers no inherent security services to its users; the data transmitted.
Changes in Library Usage, Usability, & User Support Denise A. Troll Distinguished Fellow, Digital Library Federation Associate University Librarian, Carnegie.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
The Million Book Project: Removing Obstacles to Use, Satisfaction, & Success Denise Troll Covey Principal Librarian for Special Projects – Carnegie Mellon.
Faculty Self-Archiving: The Gap between Opportunity and Practice Denise Troll Covey Carnegie Mellon University Libraries DLF Forum – November 2007.
Flexible Network Access Overview. Flexible Access an Integral part of Universal Access Policy Universal Access to Campus IT Resources Managed LAN portsFlexible.
Using a Third-Party Proxy System with the Innovative Patron API Emalee Craft, Jennifer Ward University of Washington Libraries Innovative Users Group Meeting,
Library Prepared By : System Unit, UniMAP Library.
Mobile Computing and Security Authenticated Network Access (ANA) Jon Peters Associate Director Dave Packham Manager of Network Engineering NetCom University.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Application Service Providers. Introduction Application Service Provider or (ASP) has a significant placement in the business world. ASP provides customers.
Fermilab VPN Service What is a VPN ?.
AgVantage IT Services Systems Management Team Partnered with You and IBM® Agenda Disaster Recovery Service Disaster Recovery Service IT Visors IT Visors.
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Remote Access Mark Nicolay Computing & Communications.
©2006 Academic Computing Services, NJIT ©2011 Academic Computing Services, NJIT Academic Computing Services Software Availability at NJIT.
REMOTE ACCESS Research Data Management. On Campus There are two networks – the staff network and the student network. Staff network: Access to the shared.
Shibboleth: Improving Access for Library Users InCommon Library/Shibboleth Project Holly Eggleston, UC San Diego.
“Grandpa’s up there somewhere.”. Making your IT skills virtual What it takes to move your services to the cloud Erik Mitchell | Kevin Gilbertson | Jean-Paul.
Chapter 7: Using Windows Servers to Share Information.
Alabama Supercomputer Authority A partnership of … and.
University of Kentucky Proxy Service Presentation By Kelly Vickery
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Introduction The PrinterOn Campus Printing System is an innovative solution that: Makes printing easier Reduces your support costs Enables wireless.
1 Technology Coordinator Meeting Humanities 019 Friday, March 29, 2002.
Illinois Research Connections Researcher Information System Project Rebecca Bryant, PhD
Module 11: Remote Access Fundamentals
 What is intranet What is intranet  FeaturesFeatures  ArchitectureArchitecture  MeritsMerits  applicationsapplications  What is ExtranetWhat is.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
What’s New in Fireware v11.9.5
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
David Kennedy, UMD Shibboleth and Library Resources Internet2 Library/Shibboleth Project.
Dartmouth PKI Update Robert Brentrup Internet2 Member Meeting April 21, 2004.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
Information Technology Practical information for new faculty about information technology at Missouri S&T it.mst.edu Christopher Dew Director, IT Operations.
Holly Eggleston, UCSD Shibboleth and Library Resources InCommon Library/Shibboleth Project.
Assessment: Research in Context Allison Sivak University of Alberta Libraries June 13, 2008.
1 J. Keller, R. Naues: A Collaborative Virtual Computer Security Lab Amsterdam,Dec 4, 2006 Amsterdam, DEC 4, 2006 Jörg Keller FernUniversität in Hagen,
Remote Access Portal Project Ben Dawson Larry Finn Peter Stickney Ken Vedaa May 7, GC.
Systems and Network Design Professional Services for NT Server and NetWare Networks.
Shibboleth: OSU Early Adoption Scenarios Scott Cantor April 10, 2003 Scott Cantor April 10, 2003.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Problems With Centralized Passwords Dartmouth College PKI Lab.
Virtual Reference in CARL Libraries Susan Beatty Head Information Commons University of Calgary Library Peggy White Head Science & Technology Liaison Services.
Holly Eggleston, UCSD Beyond the IP Address: Shibboleth and Electronic Resources InCommon Library/Shibboleth Project.
Illinois Research Connections Researcher Information System Project Rebecca Bryant, PhD
LibQUAL 2005 at London South Bank and a Lincolnshire man in Chicago.
COMPUTER INTERNET, INTRANET & EXTRANET. INTERNET 1) It is a worldwide system which has the following characteristics: 2) Internet is a world-wide / global.
Exploring Access to External Content Providers with Digital Certificates University of Chicago Team Charles Blair James Mouw.
VDI AND DAAS – SAY WHAT?!? Bob Marshall, MD MPH MISM FAAFP Faculty, Valley Family Medicine Residency Faculty, DoD Clinical Informatics Fellowship.
EZAccess User Guide. EZAccess is a web proxy server that allows authorized users to access IP-restricted electronic resources subscribed by UiTM library.
Structured Software Systems Ltd (3SL) Suite 2, 22a Duke Street Barrow-in-Furness Cumbria LA14 1HH, UK Tel: +44 (0) Fax: +44 (0)
Accessing the Academic Library’s online databases from off-campus When you click on the link to a database that you would like to search, you will be prompted.
Chapter 1 Introduction to Networking
Contents Software components All users in one location:
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Third Party Applications: EZproxy
The Move to Hosted Ezproxy Experienced by Texas Tech University
Tell a Vision: 3 Vignettes
Concept of VLAN (Virtual LAN) and Benefits
Presentation transcript:

Filling the Gap Between Vendor & User Practice Denise Troll Covey Associate University Librarian, Carnegie Mellon DLF Forum, November 2002

What gap? Vendors restrict access to licensed resources by institutional IP address Many institutional affiliated users use computers without an institutional IP address Libraries are providing proxy servers or virtual private networks to fill the gap

Why is the gap important? Users want personal control, self-sufficiency, & remote, easy, convenient access At least half of academic work is remote use Low service adequacy gap (perceived – minimum) Large service superiority gap (desired – perceived) Users perceive licensing restrictions as barrier to successful use of library resources Outsell, OCLC. LibQual+

July 2002 CLIR Survey of Proxy Server & VPN Use DLF, ULG, & Oberlin libraries 55% response rate 92% run a proxy server 30% run or are testing VPN Proxy Server VPN 46% Liberal arts colleges85%18% 30% Private universities100%38% 13% Public universities100%31% 6% Other75%

Proxy Server Implementations 65 implementations 62% implemented by libraries 54% implemented by central IT 2% outsourced 11 different products 37% run Ezproxy 11% run Squid 9% run Innovative 8 others named, each with 1-5 implementations

VPN Implementations 16 implementations + 5 implementing or testing 14% implemented by libraries 95% implemented by central IT organization 5 different products 43% Cisco 4 others named, each with 1 implementation

Problem Frequencies 47% weekly or daily proxy server problems 7% weekly or daily VPN problems – caution!

Problem Types Percentage

Other Problems Proxy server User errors – 15% Proxy configuration – 11% Vendor changes – 6% Firewalls – 6% ISPs – 2% Complexity – 2% VPN ISPs – 13% Administration – 6% User errors – 6% Marketing – 6% Cost – 6% Macintosh – 6%

Vendor Problems Most frequent ISI Web of Science Elsevier Science Direct ProQuest Most difficult ISI Web of Science Lexis Nexis IEEE NetLibrary & Proquest

Problem Reporting & Solving Over 50% is not very well organized 7% said downright haphazard

Help Desk Time Time to problem discovery varies Only 13% said find out within hours or phone calls from users or librarians Only 10% said find out via automatic message 15% said spend 20% - 40% of help desk time 4% proxy sites spend 70% - 90% of time Problem Reporting

Time Explaining to Users 73% said spend < 5 hours per month 14% spend 1 to 3 days per month 10% spend > 3 days per month

Proxy Server Staff Time > 60% said spend < 1 day per month 25% T - 19% NT spend 1 to 3 days per month 3% T - 5% NT spend > 3 days per month

VPN Staff Time 60% T - 47% NT said spend < 1 day per month 33% spend 1 to 3 days per month Substantial library time for IT implementations

Annual Staff Costs 55% said spend < $5000 per year 20% said spend > $5000 per year 7% said spend > $10,000 per year 6% said spend > $15,000 per year 13% said no staff costs

Negative Impacts Percentage

Negative Impacts Percentage

Satisfaction 64% proxy always or usually satisfied 37% proxy dissatisfied or seldom satisfied 54% VPN always or usually satisfied 45% VPN dissatisfied or seldom satisfied More satisfied with proxy server Dissatisfaction is more intense with proxy server

Motivations to Change Percentage

Motivations to Change Percentage

Other Requirements 1. No user training, client installation, or browser or machine configuration 2. Easy set-up & maintenance 3. Integration with campus authentication & authorization services Other Reliable online support or support by central IT Support by all vendors Consensus from users

LDAP 80% have or are working on LDAP

Single Sign-On 72% have or are working on SSO

Conclusions Proxy server & VPN support are problematic & expensive Nevertheless, many libraries are satisfied Change will require a robust, widely adopted technology that takes little effort to implement, maintain, & use

Research Question Why are libraries satisfied with investing in remote access services that Lower user satisfaction Lower service quality Cause delays in other projects Lead to less effective allocation of resources Why are libraries satisfied when users are not?

Thank You DLF Forum audience Deanna Marcum & CLIR Peter Brantley Dale Flecker