Navegando por Autor "SANTOS, Izabel Lima dos"
Agora exibindo 1 - 2 de 2
Resultados por página
Opções de Ordenação
- ItemA informação e suas leisum paralelo entre o pensamento de Ranganathan e o de Moody e Walsh(2015) SANTOS, Izabel Lima dosThis paper argue about the similarities and dichotomies existing between the Five laws of Ranganathan (Librarianship) and the Laws of Information, formulated by Moody's and Walsh. For this purpose, a literature review was carried out in order to obtain data allowing contextualization of each group of laws inside the scenarios for which it was designed. Following settle relations between them and shows up ways in which the combined use of the Five laws of Ranganathan and Information Laws can contribute to the understanding of contemporary informational scenario. Concludes strengthening the relations and theoretical expansion possibilities that this approach can promote.
- ItemSegurança da informação em bibliotecas universitárias: a atuação do bibliotecário no planejamento e na implantação de políticas institucionais(2017) LIMA, Juliana Soares; ARAÚJO, Ana Rafaela Sales de; SANTOS, Francisco Edvander Pires; BARBOSA, Luiz Gonzaga Mota; SANTOS, Izabel Lima dosThis study presents a short discussion about the role of the librarian as a mediator at planning, developing and implementing an Information Security Policy in Academic Libraries, by working together with professionals in the field of Information Technology. It also discusses the main virtual threats and some risks that are prone to infect computers in libraries. Based on the current legislation and on some normative documents about information security, it is confirmed the importance of the librarian take part in the main decision-making related to information security, such as planning a consistent Information Security Policy which be able to see the specific needs of Academic Libraries as institutions prone to cyberattacks. The main topics and guidelines to carryout an Information Security Policy are presented based on the results that were obtained through an action research, by visiting libraries to fill in application forms and to compose reports whose content was analyzed. Finally, the study concludes that Information Security Policy must be validated by managers of sectors or departments which the Academic Library is hierarchically subordinate to.