• • s whales an~ &coloqy d !Pg~nJIFlOiyl~qdniiDovniiDuvniiDowni!DovntiDovnJ{DovniiDovnliDovn)(DovniiDovnl IDovnJIOovnl!DovniiDovnJIDovnliDovn!IDowniiDovn)(upllup}(up!lupllupllupl(upl !up! h•pl {up) (up! !upiiFlOI yii!Bc}s (IL!lltFTic!olphln !LIIHFTI•ILSHFTI or potpol'e !LSHFTJ•!LSHFTI or delphlnldae or turslop~ILSHFTIIILSHFTI and ILSHFTI(I~SHFTI leapiLSHFTJ•ILSHFTI or svlaiLSHFTJ•)ILSHFTl cl IPqdnliFIOJy!PqdniiPqupJ!Pgdni!Pq~ni!Pgdni!PqdnJIDovnJIDo~ni!DovnJIOovn)IDownl IDovnl!Powni!Downi!Dovn)(OovniiDowniiDowni!DovniiDovni!Downt!OovniiOovn!CDovnl (DovniiDownJIDovnJIDownltOovn)IOovnJIFIOiy!Escl• aubaar1se!BSI IBSJne and canyoniLSHFTJ•(LSHFTJ c! Total Recall supports monochrome monitors, color graphics adapters (CGA), and enhanced graphics adapters (EGA). It is available for $79 from Computer Foundations. 2604 Elmwood Ave, Suite 320, Rochester, NY 14618 (716) 586--9756. IPgdnJIFlOJyiPqdnJIPqdnJ!FlOiyiPgdnJ!DovniiDovn)IDo~nll~ovnJIDovnJIDovnliPgdnJ IDavniiOovnliDavnJIDavniiDowniiDovni!Dovnl!DovnJ!DovniiP9dni!FlOiy!Escl• ~nd call!n•nla and cu•~ent plan~ton(LSHFTJ•ILS~FTJ d IPqdni!Pqdni!FlOJy{E~c)x Mr. Brueggeman would like to thank L_------------------------------~ Computer Foundations for provision of Figure 3. The recorded lurystrolce file converted inlo ASCII format. a review copy of Total Recall. The au. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - , thor can be reached at Scripps Institu• vhales and ecology tion of Oceanography Library, Univerd IF10Jy!Fl0ly!Esc) sity of California at San Diego, UCSD 0 a (dolphin• ar porpolse• or delphinldae or turalopsl and !leap• or svlm 1 d C075C,LaJolla, CA 92093-0175 (619) fFlDJyiFlOly/Escl 5 sub•arlm~IBSI IBSine anc! canyon• 534-1230, and on TELEMAIL: d IFlOJyfFlDJyiFlOJyiEscl lSCRIPPSLIBRARYJOMNET] MAIL/ . s plankton• and eallfornla and current USA. ONTYME: CLASS.UCSDJSIOL, il . !FllllyiEscl and DIALMAIL: BRUEGGEMAN/. X Figure 4. ASC/l keystroke file "tr-immed" using search-and-replace function. Issues in CD-ROM Security Mark Stover CD-ROM is undeniably a powerful and popular force in ··the world of library technology. The number of installations and the relative success of CD-ROM vendors make it almost certain that CD-ROM will continue to play an important role in libraries for at least a few more years. But some librarians have expressed concern that disc and hardware security tends to be lax, especially when compared with the relatively expensive nature of the medium. This article will draw on the experience of one library to illustrate some of the security problems that confront libraries using CD·ROM. Vendor policies and possible solutions will also be discussed. Mark Stover is Automation Project Manager and Theological Librarian at Calvin College.· and Seminary Library. Grand Rapids, MI. 16 The Calvin Library Experience We had high hopes for our new CD-ROM discs. Since their installation near the end of the summer they had been used quite frequently. First came InfoTrac, that bulwark of user-friendliness and friend of freshman researchers. From the day it was installed InfoTrac attracted users with its white veneer, beckoning sign, and ease of use. Thrilled by our success we invested in two more microcomputers, three CD-ROM drives, and a subscription to SilvcrPiau.er's ERIC. ERIC was not as easy to use as InfoTrac, but it served what some of us perceived to be a higher purpose: it met the needs of graduate education students in one of the few graduate programs at our small college. These students-as well as students from neighboring schools-kept ERIC well used, and despite our occasional struggles with the software interface, we rejoiced in the apparent wisdom of our venture into high technology. JUNE 1989 );\ >! ~ ; :: • • ~ Basking in glory. so to speak, we moved ever further into the brave new wor\d of automation. Our library serves both a college and a theological seminary, and religious studies play a large role in the cuniculum of each institution. Thus it seemed only natural that our next purchase would be in the field of theology. The REX System At the time of our decision only one CO-ROM-based periodical index existed for religious studies, and so we bought it. Some of the librarians were hesitant because, among orhcr things, this systcm-REX~was even more difficult to use than ERIC. But we bought it anyway, and installed it in a prominent area of the library. REX was popular among the more sophisticated users of our library, and also among those patrons who were willing to spend some time learning how to use it. But many students were frustrated with REX; some did not understand what it was, and others just could not comprehend the search interface. Some of the frustrated patrons asked for help at the reference desk, but we suspect that the majority of stymied users simply got up and walked away. This sort of thing did not gladden our hearts. Reference librarians have an inner need to please people, and unhappy patrons do not fulfill this need. But aside from failing to provide users with information, the lack of user-friendliness in REX gave us even bigger worries. Oqe of our goals in installing CD-ROM systems in our library was to make users feel comfortable with computers, with a view toward complete library automation during the next few years. A difficult-to-usc computer system, on the other hand, could make students afraid of computers or at the very least hesitant to use them. End-User Aids Nevertheless, REX was enough of a success with enough patrons that we tried not to worry about the ones who· couldn't figure it out. We wrote what we thought were clear user instructions, mentioned REX hi our bibliographic instruction, and tried to be aware of any problems that patrons were having. Beyond these precautions there really isn•t much more that a librarian can do. One of our biggest fears for all of our CD-ROM systems was security~r the lack of it-in our library. We "Like my counterparts in EBSCO Regional Offices acr?ss the country, I work with the other members of your senals supportgroup-the EBSCO Sales Representative, General Manager and Customer Service Representativeto ensure that the routine aspects of your subscription program are handled promptly and efficiently. But I'm also _available to help with the more sophisticated, non· routm~ needs you might have-like customized budget analrs•s repo':ls, collection development reports, training sem mars, rev1ews of services provided and of others available through EBSCO ... whatever your special needs maybe." because i~ l?ffers so mariy · opportunities for service to my colleagues in academic libraries. . "I s~ent 16 years in an academic library where I expenenced firsthand the complexities of serials management, the challenges of collection development and the ~reat deman~s P.l~ced on academic librarians. At EBSCO 1ve found as!gntflcant way to put that experience to work for our customers. an Accoun~ Services Manager, a position that's um~ue to EBSCO m the serials subscription business lt's my JOb to see that you get all the help you need from . i~~O to manag~ your serials responsibilities effectively o 1Sten ... 1advise ... and I solve problems. . ·:rm Lee Ketcham, MLS Account Services Manager At .~BSCO, we think academic librarians deserve qualified personnel who know and understand the challen!Jes they face. Isn't that what you expect from a profess1onalsubscription agency? Wtlt•] rr R'loltES International Headquarters P.O. Box 1943 • Birmingham, AL3520l 1-800-635-4350 In AL call collect99l-ll82 · CALL US fiLL FREE AT 1-800-635-435010 LEARN MORE. CD-ROM LIBRARIAN 17 • • weren't as concerned with the computer hardware (although maybe we should have been) as with the discs themselves. InfoTrac replaces free of charge any lost or broken discs, and SilverPlatter will replace them for a charge of $200. Replacement Penalties The REX people told me that a broken disc would be replaced for a nominal fee ("between $50 and $1 00"), but a lost or stolen disc would not be replaced unless full subscription payment was made. "Treat iL as you would treat a rare book," they said. Well, this was hard to swallow for a free-access minded librarian. Our Hitachi drives were onlockable, and anyone could come up to the computer and, with a press of a button, walk off wilh an expensive disc. Reading about Tandy's push to put a CD-ROM drive in every home didn't make me feel any better. On the other hand, we wanted these systems to be used by patrons, which probably wouldn't happen very often if the discs were kept in the rare book room. At first I wanted to remove the REX disc during evening hours, when the theological reference desk-and thus REX itself-would be unsupervised. The other librarians talked me out of it, arguing that a sly patron could just as easily steal the disc during the day as at night. Feeling slightly nervous about my precious disc but proud that we were providing free and easy access to information, I allowed REX to be used without restriction during all hours that the library was open. The Broken Disc About a week after REX was installed I came in to work one morning to find the system out of order. Opening the drive I discovered that the REX disc had been broken into three pieces. Two pieces had been placed back into the drive, and the third piece was nowhere to be found. My shock soon turned to anger, and I suggested to another librarian that the police be cal1ed in since fingerprints were clearly and abundantly spread all over the disc. Later my anger subsided, and instead I was hit with a mild fonn of depression. It wasn't the cost of replacing the disc, for after all, with REX a stolen disc would have been much more expensive to replace than a broken one. I think that my depression was related, more than anything else, to the feeling that I had been betrayed. I had made an effort to help patrons find information in a quicker and easier man.. ner, and my efforts had been rewarded wilh vandalism. 18 Security Problems CD-ROM security is not a new problem. Libraries have been worried about theft (but who wouid have thought of vandalism?) ever since these shiny discs appeared on the scene several years ago. However, the discs are not the only vulnerable part of the CD-ROM workstation. I know of one library in which the entire workstation was stolen, including computer, CD-ROM drive, and disc! But it is not just those with bad intentions who pose a threat to libraries using CD-ROM. Once a user has physical access to a disc, anything can happen, including the occasional user who innocently tries to insert the disc into an open disk drive on the microcomputer! Interestingly enough, we have found that when our equipment was tampered with, the culprit was almost always a young student. The younger generation, having essentially "grown up" with computers and compact disc players, typi~Uy does not have the healthy fear that we oldsters (over 25!) often have. Our problem is that we are sometimes hesitant to use the new technology because of the mistaken notion that "we might break it." The young~ sters have lhe opposite problem. At Limes it seems as though they believe that computers and peripherals are indestructible! Possible Solutions What should librarians do to prevent vandalism, theft, or even "innocent" tampering with expensive discs? There are several possible solutions to the pmblem of CD-ROM security. I Treat the discs as valuable books. For example, keep them under lock and key, and only make them available after the patron has given up something of va1ue in return (like a driver's license, keys, credit card, etc.). There are some obvious problems with this approach. Librarians, especially those who have never worked in a rare book environment, generally do not enjoy the role of caretaker or policeman. Why should we be forced to stand guard over this chunk of computer technology that was supposed to make our lives easier? Another drawback concerns free access to information. There is something almost magical about spontaneously sitting down at a computer terminal, quickly devising a search strategy, and receiving instant results. Those results might not be as accurate as if a librarian had perfonned the search, but something more important has happened. The user, who may previously have been a little shy with computers, now feels more comfortable with technology. Call it chance, serendipity, spontaneity, but it probably JUNE 1989 • • never would have happened if the screen had been blank and the disc safely tucked away behind a librarian's desk. I Implement a greater degree of supervision (dare we call it surveillance?) around the CD-ROM workstations. Student assistants or clerical workers could be hired as monitors to closely watch the activities of users. Or. the workstations could be placed in close proximity to a public desk. There are flaws with this method. however, not the least of which is, again, the common librarian complaint of not being trained to be a police officer. And, as anyone who has ever watched a crime/detective television show knows. if someone really wants to commit a crime, no amount of surveillance will stop them. I Some CD-ROM drives (e.g., Philips' and Sony' s) can be locked. Ours; an Hitachi, could not be. Half-height drives can be placed in a bay and hidden from the user's curious fingers. We considered authorizing the college's physical plant to build a customized, lockable cabinet for our external, full-height Hitachi drives, protecting both the disc and the drive from theft. · Locks, however cumbersome they may be, are a fact of life. Very few of us leave our cars unlocked at ·nighL Would we fail to protect other irems of value that we are entrusted with? intentioned, so much the better. But if the patrons are dishonest and given to vandalism, these libraries may ultimately find themselves without much to show for their invesunent. There are those who predict that in the near future CD-ROM subscription and replacement prices will fall below print prices, and replacement costs will be miniscule. This may indeed occur if trends continue as they have. But until then librarians would be foolish to ignore CD-ROM security. Vendor Policies The response of vendors to CD-ROM security problems has generally been positive. Many vendors arc sympathetic to disc secwity problems, and usually will not take a..hard line" when customer satisfaction is at stake. Large companies that can more easily afford it arc more likely to replace discs free of charge, even though it is the mastering process (and not the duplication of copies) that is so expensive. I Some libraries are beginning to implement multi-user access as a way of keeping their CD-ROM investments more secure. Most often Local-Area Networks (LANs) are installed. although there are now other alternatives which in some ways are more attractive than the LAN option. In the normal configuration, whether in a LAN or some other type of multi-user network. the file server or primary CPU is kept in a safe and protected environment along with the CD-ROM drives and discs (attached to the file server as peripheral devices). In this way access is provided to many users without compromising the security of expensive CD-ROM drives and discs. Unfortunately, CDROM is a notoriously slow medium, and the multi-user environment generally makes access even slower. Some vendors, however, have promised that access time will in no way be reduced by the multi-user environment if their product is used. Another potential problem for CD-ROM · networking is the attitude of vendors. Some vendors have not yet decided what their policy will be toward networking. Others give all rights (including multi-user rights) to . . the subscriber. But some vendors fear the loss of profits, and require an extra fee for the use of a CD-ROM database on more than one workstation at a time. I Some libraries have chosen to take few if any precau~ lions in securing their CD-ROM drives and discs. If the patrons that frequent these libraries are honest and well- CD-ROM LIBRARIAN 19 • • Some vendors (H.W. Wilson. for example) offer free replacement of discs if they are lost, stolen, or damaged. Others will replace a disc if it is broken or damaged, as long as the library returns the unusable disc, but they will charge a fee to replace lost or stolen discs. SilverPlatter's policy is to charge $200 for replacement of a missing disc, but they emphasize that they are willing to make exceptions. Finally. some vendors will charge a fee whether a disc has been damaged, lost, or stolen. In our case FABS International (a small company) charged us $50 to replace our broken disc. However. we would have been charged the full subscription price if the disc had been lost or stolen. The Bottom Line: CD-ROM security may become less of an issue within the next few years, especially if the cost of producing-and thus replacing-discs is reduced. But at the present time librarians need to understand thereplacement policies of CD-ROM vendors as well as take security measures to protect their investment. There will always be patrons who desire. for themselves and for others, faster and more complete access to information. But unfortunately, there will also be patrons who, whether through malice, ignorance, or selfishness, will attempt to steal or vandalize the sources through which information access is provided. Librarians are not police officers or even caretakers, but we must insist on proper security for the tools of our trade. MEDLINE on CD-ROM: Early Experiences in a Small University Medical Library Nicky Whitsed This paper describes the early experiences of a small U.K. university medical school library that introduced MEDLINE on CD-ROM in 1987 and draws on experiences from other similar U.K. installations. Consideration, operational and otherwise, is given to problems of implementing such a system. Users reactions to the availability of CD-ROM are given and their uses of the system identified. The quality of end-user searching is also discussed. Charing Cross and Westminster Medical School is one of several undergraduate medical schools within the federal institution of the University of London. The School was formed in August 1984 as a result of a merger of the fanner Westminster and Charing Cross Medical Schools. The Library meets the needs of the students and teaching staff of the School, and of medical, paramedical, and tehnical staff of the hospital; the Schools of Nursing are separate. Nicky Whitsed is with the Charing Cross and Westminster Medical School of the University of London. 20 Online searching has been available at Charing Cross through intermediaries since the mid 1970s. The database most frequently used is MEDLINE, based on the established indexing service Index Medicus. Unlike most CDROM databases, there are several versions of MEDLINE on CD-ROM. This is a direct result of the NLM's policy to make a number of licences available for the reproduction of the data in this fonn. The source data remains essentially the same however the user interface and software features are different as are the various marketing elements relating, for example, to cost and frequency of updates. The first product to appear in the U .K. was Cambridge Scientific Abstracts' (CSA) version Compact Cambridge. It has been purchased by a number of medical school libraries and is the current U.K. market leader. This product was followed by SilvcrPlatter and later DIALOG's OnDisc MEDLINE, EBSCO's Comprehensive MEDLINE and Core rvtEDLINE, and BRS Information Technologies' Colleague on Disc. Also mentionable, though not yet available on the U.K. market, are Online Research Systems' Compact Med-Basc and the Aries Knowledge Finder. JUNE 1989