The Journal of Information Science and Technology Association
We introduce the featuring topics of new technologies related to information science, information technology, and information management as review articles. We also publish serializations or lectures related to searcher's practical affairs (e.g. how to search necessary information, comparing databases) and translated papers, book reviews, forum reports for providing free remarks of each member. It is also a place to present original papers on the theory and applications of information science technology and its peripheral fields. We make the articles open access after 6 months of embargo.
Shizuoka University has been completely renewing its information infrastructure every 4 to 5 years due to the aging of information equipment and changes in the ICT society. In the ICT industry over the past decade or so, information assets have shifted from ownership to usage with the spread of cloud computing. Shizuoka University has also changed its information infrastructure to fully apply cloud computing after several renewals. This paper outlines the changes in technology, operations, and procurement methods before and after the introduction of cloud computing.
Due to the rapid introduction of telework in recent years, security models that assume “everything is unreliable” are attracting attention. In this paper, we will explain the security configuration and representative implementation methods for realizing telework in each of the conventional perimeter defense type and zero trust. In addition, many products and solutions have been released with the keyword “Zero Trust”. It also describes Zero Trust implemented by Digital Workplace, and suggests not only an understanding of Zero Trust itself, but also how it should be utilized.
The function and the role of University library have remarkably expanded recently. In the past years. Kyoritsu library has mainly engaged in constructing Kyoritsu collection and operating its navigation system, Today the library has been requested to supply academic support for the studies in-depth and to offer academic activities as well as the core engagement in the past, In order to meet the needs for its educational involvement the newly established library (September 2016) add its human resources another role of supporting students besides its ordinary activity in the past. In addition, as for its material resources, we facilitate the library to use as a study for students as well as a storage of books. We have also worked out to establish a system of Network and Information and Technology Communication, by which we will explain various details such as its introduction, plans, functions and operational measures of equipment.
It has become essential service for library services to use computers. The spec of computers are getting so high, and we can use them for many porposes. As for public machines, however, a configration which is fit for someone may be less convenience for other person. It is very important for administrators to development a security policy to keep same environment. There are many purpose of public machines, and there are many security policies each of them. In this article, the security policy problems in case of an library are discussed.