id author title date pages extension mime words sentences flesch summary cache txt dltj-org-4853 User Behavior Access Controls at a Library Proxy Server are Okay | Disruptive Library Technology Jester .html text/html 2206 140 62 What had riled up the people I follow on Twitter was the first presentation: "Security Collaboration for Library Resource Access" by Cory Roach, the chief information security officer at the University of Utah. Many of the tweets and articles linked in tweets were about a proposal for a new round of privacy-invading technology coming from content providers as a condition of libraries subscribing to publisher content. One speaker proposed a novel tactic publishers could take to protect their intellectual property rights against data theft: introducing spyware into the proxy servers academic libraries use to allow access to their online services, such as publishers' databases. The point of Cory's presentation is that the username/password checking at the web proxy server is a weak form of access control that is subject to four problems: ./cache/dltj-org-4853.html ./txt/dltj-org-4853.txt