{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:54:28Z","timestamp":1754157268053,"version":"3.41.2"},"reference-count":14,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2011,2,15]],"date-time":"2011-02-15T00:00:00Z","timestamp":1297728000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,2,15]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to point out, to non\u2010technical library users, the hazards of using the library's public computers.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The purpose of this paper is to articulate the dangers faced by library users, whether they be students, faculty, or staff. This paper is geared towards education and enlightenment of non\u2010technical users of public computers.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>There are many hazards to computing, both online and off. Most public computers are not well prepared to cope with worms, Trojans and other malware. There are remedies for a lot of the malware, but as in an arms race it is a matter of catching up with the latest weapon to be presented.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>Since public computers are so vulnerable to attack, library IT must be constantly vigilant for the menaces that are present. The paper shows how computers can be protected.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>If this can help save one computer's workload by making people aware of the dangers involved, the information is well worthwhile.<\/jats:p><\/jats:sec>","DOI":"10.1108\/02640471111111406","type":"journal-article","created":{"date-parts":[[2011,2,12]],"date-time":"2011-02-12T11:54:39Z","timestamp":1297511679000},"page":"5-19","source":"Crossref","is-referenced-by-count":0,"title":["The dangers of malware in a library computing environment"],"prefix":"10.1108","volume":"29","author":[{"given":"Martin","family":"Zimerman","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2022012220164876900_b3","doi-asserted-by":"crossref","unstructured":"Adomi, E.E. and Igun, S.E. (2008), \u201cCombating cyber crime in Nigeria\u201d, The Electronic Library, Vol. 26 No. 5, p. 716.","DOI":"10.1108\/02640470810910738"},{"key":"key2022012220164876900_b4","doi-asserted-by":"crossref","unstructured":"Butler, R. (2007), \u201cA framework of anti\u2010phishing measures aimed at protecting the online consumer's identity\u201d, The Electronic Library, Vol. 25 No. 5, p. 517.","DOI":"10.1108\/02640470710829514"},{"key":"key2022012220164876900_b5","doi-asserted-by":"crossref","unstructured":"Chen, Z., Wei, P. and Delis, A. (2008), \u201cCatching Remote Administration Trojans (RATs)\u201d, Software, Practice & Experience, Vol. 38 No. 7, pp. 667\u2010703.","DOI":"10.1002\/spe.837"},{"key":"key2022012220164876900_b6","doi-asserted-by":"crossref","unstructured":"Etsebeth, V. (2007), \u201cMalware: the new legal risk\u201d, The Electronic Library, Vol. 25 No. 5, p. 534.","DOI":"10.1108\/02640470710829523"},{"key":"key2022012220164876900_b7","unstructured":"Goodwin, B. (2006), Hackers Collaborating to Create Big Rise in Malware, Reed Business Information, Sutton."},{"key":"key2022012220164876900_b8","unstructured":"Harris, S. (2008), Gray Hat Hacking: The Ethical Hacker's Handbook, 2nd ed., McGraw\u2010Hill, Maidenhead, online."},{"key":"key2022012220164876900_b9","unstructured":"Larkin, E. (2008), \u201cTen quick fixes for security nightmares\u201d, PC World, Vol. 26 No. 11, pp. 117\u201019."},{"key":"key2022012220164876900_b2","unstructured":"Microsoft (2009), \u201cUSA: Microsoft warns of 100 per cent increase in virus threats\u201d, BBC Monitoring Media."},{"key":"key2022012220164876900_b10","unstructured":"Snipes, P.R. and Clay, M.N. (2006), \u201cProtecting your home computer: an in\u2010service workshop with teachers\u201d, Teacher Librarian, Vol. 34 No. 1, pp. 41\u20104."},{"key":"key2022012220164876900_b11","unstructured":"Spector, L. (2007), \u201cAnswer line\u201d, PC World, Vol. 25 No. 9, p. 142."},{"key":"key2022012220164876900_b12","doi-asserted-by":"crossref","unstructured":"Stamp, M. (2006), Information Security: Principles and Practice, Wiley\u2010Interscience, Hoboken, NJ.","DOI":"10.1002\/0471744190"},{"key":"key2022012220164876900_b13","unstructured":"Stein, R.J. (2009), Internet Safety, H.W. Wilson Co., New York, NY."},{"key":"key2022012220164876900_b14","doi-asserted-by":"crossref","unstructured":"Waters, J.K. (2009), \u201cIT security: target: the web\u201d, T.H.E. Journal, Vol. 36 No. 2, pp. 34\u201040.","DOI":"10.1016\/S1353-4858(09)70105-9"},{"key":"key2022012220164876900_b1","unstructured":"Zero Day Threat (2009), \u201cZero Day Threat\u201d, Computerworld, Vol. 42 No. 22, pp. 28\u201030, Business Source Complete, EBSCOhost (accessed November 8)."}],"container-title":["The Electronic Library"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02640471111111406","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02640471111111406\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02640471111111406\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:42:47Z","timestamp":1753400567000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/el\/article\/29\/1\/5-19\/43585"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,2,15]]},"references-count":14,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,2,15]]}},"alternative-id":["10.1108\/02640471111111406"],"URL":"https:\/\/doi.org\/10.1108\/02640471111111406","relation":{},"ISSN":["0264-0473"],"issn-type":[{"type":"print","value":"0264-0473"}],"subject":[],"published":{"date-parts":[[2011,2,15]]}}}