Login | Register

Going to the cloud vs. doing it in-house

Title:

Going to the cloud vs. doing it in-house

Carson, Pamela ORCID: https://orcid.org/0000-0002-2963-7764, Botter, Kathleen and Krujelskis, Stephen (2013) Going to the cloud vs. doing it in-house. Computers in Libraries, 33 (6). pp. 4-10. ISSN 1041-7915

[thumbnail of Pre-print]
Text (Pre-print) (application/vnd.openxmlformats-officedocument.wordprocessingml.document)
Going_to_the_cloud_vs._doing_it_in-house_(Carson,_Botter_and_Krujelskis).docx - Accepted Version
Available under License Spectrum Terms of Access.
32kB

Official URL: http://www.infotoday.com/cilmag/ciltop.htm

Abstract

The article reports on the potential of cloud computing to revolutionize library information technology (IT) technology. It cites library service providers that offer a range of services from complete hosting and system management to software-only and support-only solutions. It cites the increasing importance of an adaptive IT services evaluation strategy that can change and be responsive to the speed with which technology evolves regardless of whether the library goes in-house or cloud-based.

Divisions:Concordia University > Library
Item Type:Article
Refereed:No
Authors:Carson, Pamela and Botter, Kathleen and Krujelskis, Stephen
Journal or Publication:Computers in Libraries
Date:July 2013
Keywords:cloud computing in libraries, library information technology
ID Code:978406
Deposited By: Pamela Carson
Deposited On:09 Apr 2014 22:07
Last Modified:18 Jan 2018 17:46

References:

CANARIE (2012). Retrieved from http://www.canarie.ca
Cloudorado (2013). Retrieved from http://www.cloudorado.com
Cardozo, N., Cohn, C., Higgins, P., Hofmann, M., & Reitman, R. (2013, April 30). Who has your back? Which companies help protect your data from the government. Electronic Frontier Foundation. Retrieved from https://www.eff.org/sites/default/files/filenode/who-has-your-back-2013-report.pdf
Cervone, H. F. (2011). Cloud computing: Pros and cons. In E. M. Corrado, & H. L. Moulaison (Eds.), Getting started with cloud computing: A LITA guide (pp. 29-35). New York, NY: Neal-Schuman Publishers, Inc.
Fried, I. (2009, December 10). Mozilla worker touts Bing over Google, citing privacy. News.CNET.com. Retrieved from http://news.cnet.com/8301-13860_3-10413473-56.html
Galvin, D., & Sun, M. (2012). Avoiding the death zone: Choosing and running a library project in the cloud. Library Hi Tech, 30(3), 418-427.
Geist, M. (2013, February 27). NDP MP Charmaine Borg tries to kickstart Canada’s dormant privacy reform. MichaelGeist.ca. Retrieved from http://www.michaelgeist.ca/content/view/6794/99999/
Google (n.d.). Transparency report: User data requests: United States. Retrieved from http://www.google.com/transparencyreport/userdatarequests/US/
Han, Y. (2010). On the clouds: A new way of computing. Information Technology and Libraries, 29(2), 87-92.
Huff, S. (2012, October 2). Hackers ‘Team GhostShell’ leak 120,000 records from 100 major universities. Betabeat. Retrieved from http://betabeat.com/2012/10/hackers-team-ghostshell-leak-120000-records-from-100-major-universities-in-project-westwind/
Kavur, J. (2010, July 5). Don’t use the Patriot Act as an excuse. IT World Canada. Retrieved from http://www.itworldcanada.com/news/dont-use-the-patriot-act-as-an-excuse/141033
Krishnamurthy, B., Naryshkin, K., and Craig, W. (2011). Privacy leakage vs. protection measures: the growing disconnect. WISP. Retrieved from http://www.goodtimesweb.org/documentation/2012/w2sp11.pdf
Luo, L. (2013) Reference librarians’ adoption of cloud computing technologies: An exploratory study. Internet Reference Services Quarterly, 17(3/4), 147-166.
McDonald, A. M., & Cranor, L. F. (2008-2009). The cost of reading privacy policies. I/S: A Journal of Law and Policy for the Information Society, 4(3), 543-568.
Microsoft (2012). Law enforcement requests report. Retrieved from http://download.microsoft.com/download/F/3/8/F38AF681-EB3A-4645-A9C4-D4F31B8BA8F2/MSFT_Reporting_Data.pdf
National Conference of State Legislatures (2013). 2012 security breach legislation. Retrieved from http://www.ncsl.org/issues-research/telecom/security-breach-legislation-2012.aspx
Nicholson, S., & Arnott Smith, C. (2007). Using lessons from health care to protect the privacy of library users: Guidelines for the de-identification of library data based on HIPAA. Journal for the American Society for Information Science and Technology, 58(8), 1198-1206.
Office of the Privacy Commissioner of Canada (2008). Findings under the Personal Information Protection and Electronic Documents Act (PIPEDA): PIPEDA Case Summary #2008-394: Archived: Outsourcing of canada.com e-mail services to U.S.-based firm raises questions for subscribers. Retrieved from http://www.priv.gc.ca/cf-dc/2008/394_20080807_e.asp
Office of the Privacy Commissioner of Canada (2009). Your guide to PIPEDA: The Personal Information Protection and Electronic Documents Act. Retrieved from http://www.priv.gc.ca/information/02_05_d_08_e.pdf
Office of the Privacy Commissioner of Canada (2012a, September). Infographic: How does web leakage happen? Retrieved from http://www.priv.gc.ca/resource/tool-outil/infographic/wl_info_201209_e.asp
Office of the Privacy Commissioner of Canada (2012b, September). Web leakage research by the Office of the Privacy Commissioner of Canada – Test Results. Retrieved from http://www.priv.gc.ca/information/research-recherche/2012/wl_201209_e.asp
Primary Research Group. (2011). Survey of library use of cloud computing. New York, NY: Primary Research Group.
RISQ (2011). Retrieved from http://www.risq.qc.ca
Rumsfeld, D. (2002, June 6). Secretary Rumsfeld press conference at NATO headquarters, Brussels, Belgium. Retrieved from http://www.defense.gov/transcripts/transcript.aspx?transcriptid=3490
Saleh Rauf, D. (2011, November 29). PATRIOT Act clouds picture for tech. Politico.com. Retrieved from http://www.politico.com/news/stories/1111/69366.html
Smith, S. D., & Caruso, J. B. (2010). ECAR study of undergraduate students and information technology. EDUCAUSE. Retrieved from http://www.educause.edu/library/resources/ecar-study-undergraduate-students-and-information-technology-2010
Twitter (2012). Twitter transparency report. Retrieved from https://transparency.twitter.com/
Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT Act) Act of 2001, Pub. L. No. 107 –56. 115 Stat. 288 (2001). Retrieved from http://www.gpo.gov/fdsys/pkg/PLAW-107publ56/pdf/PLAW-107publ56.pdf
All items in Spectrum are protected by copyright, with all rights reserved. The use of items is governed by Spectrum's terms of access.

Repository Staff Only: item control page

Downloads per month over past year

Research related to the current document (at the CORE website)
- Research related to the current document (at the CORE website)
Back to top Back to top