Bulletin Board Systems

The Evolution of Cybercrime

Littlejohn Shinder , Michael Cantankerous , in Scene of the Cybercrime (Second Edition), 2008

How BBSes Fostered Criminal Behavior

In addition to networking PCs together at one location to create a LAN, PCs could be used to link to one another from remote locations using a modem and a telephone line. This led to the advent of the message board system (BBS), a computer system equipped with one or more modems so that users tin punch in and use its services. BBSes were a predecessor of the Cyberspace, providing many of the services people are familiar with today. Although BBSes were by and large text-based, users were able to download files, exchange private e-mail, post messages to a "lath" to carry on public virtual discussions, play online games, and use many other features. And though message networks were used to discuss topics with others throughout the earth, BBS users would generally dial into systems that were local to them.

Ward Christensen and Randy Suess developed the software for the Computerized Bulletin Board Organization (CBBS) in the 1970s in Chicago. They described it in an article published in Byte Magazine in 1978. The organization was a huge success, and BBSes sprang up all over the country. To run into how popular they were, you can see a historical list of BBSes at http://bbslist.textfiles.com.

Early on hackers and phreakers seized on the BBS thought as a mode to communicate with ane another and share their tricks and techniques. Nearly boards included both the public forum and e-mail service between members of the BBS. Although many BBSes were legitimate "places" where computer hobbyists could gather and share the software they'd written themselves or discuss issues of the day, the BBS had a natural appeal to the criminal element. The BBSes spawned the showtime large-scale method of distributing warez (hacker jargon for pirated software), oftentimes computer games. Other BBSes specialized in the sharing of pornographic pictures and/or stories.

Early on BBSes were wearisome (2400-baud modems were height of the line at the time) and expensive unless you lot were lucky enough to live in the same locality as your cohorts or you lot were a phreaker who didn't pay for long distance calls. It was often difficult to become connected because most BBSes were operated out of someone's abode on a express budget, then the average systems operator, or sysop (the person who ran the BBS), didn't have a large number of modems and phone lines. Although some sysops ran these systems for love, many (peculiarly those who dealt in pornography) charged members a monthly or almanac fee to connect.

The popularity of these forums began to pass up in the tardily 1990s, when Net admission became commercially available at an affordable cost and the graphical nature of the Globe Wide Web fabricated the Bulletin board system systems with their ASCII drawings seem hopelessly outdated.

On the Scene

Bulletin Lath Systems

What was allowed on a detail BBS was dependent on the system operator (sysop) who endemic the figurer. Whereas most boards were community-based forums for reckoner enthusiasts, others existed that provided hacking tools and information, pirated software, copies of virus files, or distributed child pornography.

Because sysops in a item surface area were generally in contact with 1 another, they (and the other Bbs users) frequently knew which boards allowed illegal fabric and which users were troublemakers. Unfortunately, because computer-related crime wasn't by and large understood and few laws existed, information technology wasn't unheard of for local police to brush off those who chosen to complain. In addition to this, there was a fright of police seizing the complainant's computer as evidence, as the officeholder might not sympathize how remote computers were being accessed. Go along in listen that at the time, it cost a few thousand dollars to purchase a PC, and then they weren't every bit common as today, and most people didn't really sympathize them. To put this period into further perspective, the controversy about sharing music involved taping it on cassettes.

Well-nigh sysops monitored what was happening on their systems, and acted accordingly. In about cases, users who uploaded illegal material or harassed other users would simply be banned from the board. Word might then spread to other sysops, who would likewise ban them. As BBSes policed themselves, sysops acted as the sheriffs of their online communities.

Read full chapter

URL:

https://world wide web.sciencedirect.com/science/article/pii/B9781597492768000029

Exploitation

James Wide , Andrew Bindner , in Hacking with Kali, 2014

A Brief History

In the beginning, at that place was nothing… a random void and anarchy of tools strewn about the far reaches of the tangled earth-wide-web. Scattered letters and pieces of random lawmaking lay in the shadows of subconscious bulletin board systems. Backdoor deals and geek costless-for-alls roamed freely amidst the mundane noobs and wannabees. This was a place where phreakers were in charge before the NSA could necktie its shoes or even count to 2600, the wild westward of security globe; riddled with spies and full of outlaws.....

Well, not quite; however, non very far from the truth.

In tardily 2003, HD Moore, the inventor and genius of the Metasploit Framework, released the then perl-based first version with a mere xi exploits to concentrate his efforts of parsing through massive lines of bugs, exploit code, and publicly available vulnerabilities into a unmarried, easy-to-apply program. Version two, released in 2004, touted 19 exploits just included close to thirty payloads. With the release of version 3 in 2007, Moore'south project exploded and rapidly became the de facto standard and necessary tool of choice for penetration testers all over the earth. Today Metasploit is up to version 4.7 and integrated as a cherry-red-based programme that comes standard on Kali Linux. At the time of this writing, Metasploit offers over 1080 exploits, 675 auxiliary modules, 275 payloads, 29 different types of encoders, and aims its sights on all platforms, Microsoft, Linux, and Mac alike. At that place is no bias from the Rapid7 team and no protocol will go unchecked.

Read full affiliate

URL:

https://www.sciencedirect.com/science/commodity/pii/B9780124077492000094

Resource Management in Large Data Processing Systems

S. Tang , ... B.-S. Lee , in Big Data, 2016

Improvement of application performance

Fig. 6 shows the normalized awarding performance for different resources allocation schemes. All schemes provision resources according to the applications' average need (α  =   1). In the T-shirt model, all applications prove the worst performance and we refer it every bit a baseline. In other models, all applications show performance improvement due to resource sharing. For RUBBoS, RRF leads to much more improved awarding performance than other schemes. This is because RRF provides 2 mechanisms (IRT   +   IWA) to preserve tenants' assets, and thus RRF allow RUBBoS receive more than resources than other schemes, as shown in Fig. 5. For other workloads, RRF is also comparable to the other resources-sharing schemes. In summary, RRF achieves 45% performance improvement for all workloads on average (geometric mean). DRF achieves the best performance for kernel-build and TPC-C, but achieves very bad performance for RUBBoS. It shows the largest performance differentiation for different workloads. DRF ever tends to satisfy the demand of the application with the smallest dominant share, and thus applications that have resource demands of pocket-sized sizes or small-scale skewness e'er benefit more from resource sharing. In dissimilarity, the performance of Hadoop shows slight variations betwixt unlike allocation schemes due to its rather stable resource demands.

Read full chapter

URL:

https://world wide web.sciencedirect.com/science/article/pii/B9780128053942000076

Agreement Electronic mail and Internet Crimes

Littlejohn Shinder , Michael Cross , in Scene of the Cybercrime (Second Edition), 2008

Driven from Back Alleys to the Information Superhighway

The Internet provided a relative safe haven for those who sought child pornography. Prior to the Internet, the availability of child porn was oft limited to behind-the-counter purchases at adult bookstores or to ordering magazines and films from other countries and receiving them through the mail. In the 1970s, adult bookstores began to sell child porn openly, which incited new laws and police crackdowns, making the availability of these items more difficult to purchase. This lasted until the 1980s, when computers provided a new method of exchanging information. Bulletin board systems (BBSes) are programs that can exist installed on a figurer, allowing other computers to dial in and admission e-mail service, exchange messages, download files, and perform other functions that became commonplace on the Internet. During the 1980s, those who sought kid pornography no longer had to travel to unsafe neighborhoods; they could at present download child porn to a computer.

Because BBSes were privately run, what was allowed on the lath depended on the person who owned the reckoner on which the BBS was installed. Individuals could start their own BBSes, and create individual areas that limited access to anything they wanted, ranging from illegal software to child pornography. All the same, although BBSes did exist that provided access to folders filled with child pornography, many of those who ran these boards discouraged such activities and usually banned people from their BBS. Another reason they were cocky-policed was that almost of those in police enforcement were computer-illiterate—think that computers were relatively new at this time. Past the fourth dimension the police took a serious interest in BBSes, many of them were shutting down from lack of use, because almost people had discovered the Internet.

Whereas BBSes provided access to a local community of computer users, the Internet provided availability to international sources. In terms of child pornography, information technology opened upwardly the marketplace. It allowed pedophiles from around the world the chance to communicate with ane another and share pictures and videos, with a greater degree of anonymity than they'd ever had before.

The power to download more pornography and salve information technology to a estimator besides stemmed from advances in connectivity and storage media. The sizes of hard disks on computers increased and their prices dropped during the early 1990s, allowing them to acquire more files in less time. A 500 KB file would have taken more than 35 minutes to download from a BBS using a 2400-baud modem, merely when the Internet became popular, ISPs required people to have a modem that could connect at 28.eight- or 33.six Kbps. This aforementioned 500 KB file now took less than three minutes to download. Today, people commonly have high-speed connections to the Net, significant that it now takes a few seconds to download this same file. The advances in speed and storage made information technology possible for college-quality images and full videos to be distributed over the Net.

As we'll meet in the next section, the Internet provided a number of features and areas where child porn could hands be obtained. In many cases, the pornography could be acquired at no additional price, making it significantly cheaper than previous methods. Consider that in the 1970s, kiddie porn would have to be ordered through the mail. The postal service was the main distribution source for child pornography at that fourth dimension. Whenever child porn was identified, the package would exist delivered to the intended recipient, meaning that he or she would have to sign for information technology. Postal inspectors and police would execute a search warrant and arrest the person who signed. Using data associated with the social club, the evidence in a single instance could include the order form, the bank check or money order to pay for the porn, the signature provided by the person who accustomed the order, and the porn itself. The newspaper trail was easy to follow, making the risks associated with manufacturing and possessing child pornography extreme. The risks were less so with the Internet, and considering the costs of those risks weren't passed on to the consumer, information technology was cheap to pay for the porn when required to do and then.

Read full affiliate

URL:

https://www.sciencedirect.com/scientific discipline/article/pii/B9781597492768000091

Domain three: Security Engineering (Engineering and Management of Security)

Eric Conrad , ... Joshua Feldman , in CISSP Study Guide (Tertiary Edition), 2016

PGP

Pretty Good Privacy (PGP) brought asymmetric encryption to the masses. Phil Zimmerman created a controversy when he released PGP in 1991. For the first time, an average calculator user could easily leverage the power of asymmetric encryption, which allows strangers (including criminals) to securely communicate without pre-sharing a fundamental.

Zimmerman was investigated for munitions export violations by the U.s.a. regime after the PGP source code was posted to the Usenet message board system in 1991. The prosecutors dropped the instance in 1996. RSA complained to Zimmerman for including the (then) patented RSA algorithm in PGP. Zimmerman had encouraged users to pay RSA for a license if they used the algorithm. Zimmerman agreed to terminate publishing PGP to address the patent consequence (though copies were freely available from other sources).

PGP provides the mod suite of cryptography: confidentiality, integrity, authentication, and nonrepudiation. Information technology can be used to encrypt emails, documents, or an entire disk drive. PGP uses a Web of trust model to authenticate digital certificates, instead of relying on a primal certificate potency (CA). If you lot trust that my digital certificate authenticates my identity, the Web of trust means y'all trust all the digital certificates that I trust. In other words, if you trust me, y'all trust everyone I trust.

Read full chapter

URL:

https://www.sciencedirect.com/science/article/pii/B9780128024379000047

Counterspy: Are Yous Existence Watched?

Ted Off-white , ... Technical Editor, in Cyber Spying, 2005

Using PGP Freeware with E-mail Clients

Although at that place are more contempo releases, we demonstrate this version of PGP freeware because of its nearly seamless interface with Microsoft Outlook and Outlook Limited. A bulletin can be sent encrypted using this application in nearly the same way as sending a plaintext bulletin. Create the message as normal, only when you are finished select the Encrypt (PGP) option from the drib-down tool bar on the right (encounter Figure eleven.fourteen).

Effigy 11.14. Encrypting a Message in Microsoft Outlook Express Using PGP Freeware 6.5.8

Once you have done this, click the Ship button to securely e-mail the message. A window volition prompt you to select all of the keys that you wish to include in the encryption (encounter Figure 11.15).

Figure xi.fifteen. Selecting Encryption Keys for Outgoing E-mail in Microsoft Outlook Express

By default, the window will have an entry for the cardinal that matches the e-postal service accost of the recipient. Nonetheless, if you want others to be able to view this bulletin you can also drag their names down into the "Recipient Option" window. When all of the keys take been included, click OK and the encrypted message will be sent to the recipient(s) (e.g., the encrypted version of the ice cream bulletin in Effigy eleven.14 tin can be seen in Figure 11.xvi).

Figure 11.16. Example of a Message Encrypted Using PGP Freeware 6.5.8

Annotation

Unless you specify otherwise, email letters sent to a recipient are not encrypted using your public encryption primal. This ways that fifty-fifty though yous are the originator of the message, y'all must too drag your proper noun down into the "Recipient Selection" window if you want to view them in the "Sent" binder.

Notes from the Underground

History Behind PGP

Philip R. Zimmermann released the outset version of PGP on June 5, 1991, from the U.Due south., which was chop-chop distributed among several Bulletin Board Organization (BBS) networks. Presently later on, he was notified by RSA Data Security Inc. that PGP was in violation of their patented algorithm. Approximately 1 year later, the side by side major release of this tool fabricated its manner outside of the U.Southward., which prompted U.S. Customs to launch an investigation considering of its alleged violation of the regulation of not-exportable weapons.

In the meantime, Zimmerman sold the rights to the commercial version of PGP to ViaCrypt, which happened to hold a license for the RSA algorithm. This same year (1993), they released ViaCrypt PGP 2.4 for commercial use inside the U.S. In 1994, the Massachusetts Institute of Engineering (MIT) struck an understanding with RSA and Zimmerman to distribute a freeware version of PGP for noncommercial use, which is demonstrated in this book.

Likewise, you can decrypt e-mail messages in much the same style. Well-nigh email clients send the encrypted bulletin as an attachment that ends with .asc. When a message like this arrives, click on the attachment and either Open up it or Save it to disk, depending on your preference. If you cull to Open it, you will be prompted to enter your secret pass phrase before y'all will exist allowed to read the message (encounter Figure xi.17).

Figure 11.17. Receiving and Reading PGP Encrypted Messages in Outlook Express

Other freeware versions of PGP exist, including GNU-licensed version GPG, which is available at www.gnupg.org . (We encourage you lot to experiment and decide which version all-time suits your needs.) Encrypting e-mail is good do and helps maintain privacy both on the computer itself (if messages are stored encrypted) and beyond the network as messages are sent.

Read full chapter

URL:

https://www.sciencedirect.com/science/commodity/pii/B9781931836418500149

Social Dynamics of Deception

Cameron H. Malin , ... Max Kilger , in Deception in the Digital Age, 2017

Social Dynamics in Computer-Mediated Communications

Social dynamics, or "unwritten rules for interacting with others" (Fogg, 2003) in face-to-face transactions tin be impacted by language, gender, facial expressions, and many other interpersonal engagement elements (Liebman & Gergle, 2016 ). With the appearance of CMCs, many of the traditional factors that affect these dynamics no longer existed, or they manifested in alternative modalities and contexts. Early CMC consisted primarily of textual channels of communications, such every bit Internet Relay Chat (IRC), bulletin board systems, and text-based instant messaging. Gradually, over time and user experience, factors such as chronemic cues that capture temporal aspects of letters and paralinguistic cues, such every bit emoticons and creative or expressive use of word spellings, accept supplanted traditional social and behavioral cues and built new, evolving norms and social dynamics (Liebman & Gergle, 2016).

Every bit digital communication channels, modalities, and content richness burgeoned, so too did new ways for users to engage, interact, and develop social behaviors. Emotions, expressions, cues (such equally indicators of deception or veracity) became more than discernible and interpretable. This evolution, in turn, inverse the complexion of social dynamics in groups and interactions online; it as well changed the perceptions of how computing technology in and of itself could convey social presence and influence users viewing and engaging content (Fogg, 2003).

Read total chapter

URL:

https://www.sciencedirect.com/science/article/pii/B9780124116306000049

What is Social Media?

Michael Cantankerous , in Social Media Security, 2014

Brief history of social networking

While the term "social media" is relatively new, the concept of it is non. For decades, computers have been used by people to connect with others, share data and data, play games, work together on projects, and employ software and systems for social interaction. While the technology has changed, the basic premise of its utilise hasn't.

In 1978, Ward Christensen and Randy Suess launched the outset Bulletin Board System (BBS), which immune people to connect to their arrangement of telephone lines. BBSs became a hobby for numerous people, and many organizations came to use them for a diverseness of purposes. For example, a number of libraries used BBSs and then that people could view available books and reserve them. From personal experience, my own lath called Dark Knight Bbs ran for a number of years, allowing computers to use a dial-upwards connection to access the organisation via a modem. On the Bulletin board system, a person would utilise features that were essentially precursors to types of social media. A person could upload and download images, software, and other files (similar to a content community); read textual commentary (which was substantially a web log); and play games. There were hidden areas for those who worked on the BBS with me, allowing us to collaborate on changes made to the system. A major characteristic of BBSs was that people could mail messages to communicate with others. In some cases, the message boards were networked with other BBSs, thereby allowing people to interact with others they wouldn't normally run into. For example, my board in Due north America would make a long distance each night to Arkham BBS in England (run past Nigel Hardy) and transfer letters between the systems. This allowed a community of computer users to socialize overseas as well equally with people inside their own areas. Other message networks also allowed communication with people throughout the earth.

BBSs were widely used until the Internet became popular in the mid-1990s. While the Internet had been bachelor to government, Universities, and military, it wasn't until this fourth dimension that private ISPs provided the ability for everyone to utilize the Internet. In 1994, Geocities was started past Beverly Hills Internet and allowed users to create their own sites. Users had control over their content, and until it was purchased by Yahoo! and shut downwards for American users in 2009, it had approximately 38 million user-created Spider web pages. Other ISPs similar America Online (AOL) allowed people to create searchable profile pages. An initial competitor to AOL that later became a subsidiary of the visitor is CompuServe, which was founded in 1969 equally a computer time-sharing service and was the first to offer electronic mail services.

Connecting with other people was an important part of the early Internet. Usenet was a discussion board that had similarities to the bulletin networks on earlier BBSs. People could post to newsgroups, and the messages were distributed across servers beyond the world, and share files like images and audio. In recent years, usage of Usenet has declined, as people have shifted to using content communities, blogs, and social networks to exchange information and files.

Social networking sites showtime rose to popularity in the mid-1990s with sites like Classmates.com and Six Degrees (www.sixdegress.com). Classmates.com started in 1995 as a way to reconnect with old friends and colleagues from school, work, and the military simply includes online copies of former yearbooks, video, and images. Six Degrees was based on the concept that everyone was connected to each other by half dozen people or less and allowed people to create contour pages, search others, link friends, and create groups. The site failed in 2001 only is at present open to previous members. Another site that followed the same concept of six degrees of separation was Friendster (www.friendster.com), which afterwards displayed the connections between users every bit a "circle of friends." Some of its features in making connections were alike to online dating sites, but its social networking features fabricated information technology popular at the time. Although popularity declined in N America, it remained so in Asia and has since relaunched in 2011 every bit a platform to play online games.

Every bit the mid-2000s approached, more than major social media sites appeared. In 2001, Wikipedia was launched, growing to go the largest wiki in the world. In 2003, Second Life, MySpace, and LinkedIn went online, each with dissimilar target audiences. LinkedIn focused their attention on business professionals, Second Life launched to provide a virtual social world, and while MySpace offered itself up as a generalized social network. For a fourth dimension, MySpace was the most popular social network, simply this popularity has declined in English speaking countries in favor of Facebook. Facebook launched in 2004 by Mark Zuckerberg and his roommates as a social networking site at Harvard Academy but became available to the public in 2006. Between this in 2005, YouTube was launched as media sharing site and allowing people to upload and view videos and other multimedia. The same year Facebook went public; Twitter was launched and chop-chop became the premier microblogging site. In addition to these other sites, in that location take been a considerable number of other social media sites, each of which has experienced varying levels of success. This trend continues, with new sites appearing, such as when Google ventured into the realm of social networking sites, launching Google+.

Whereas the World Wide Web was pioneered in 1989 with Tim Berners-Lee creating the HTML, the creation of Web pages largely required professionals with technical cognition to generate the pages. Over time, the desire for users to generate their ain content became a fundamental part of social media sites, every bit did technologies to make the experience more dynamic. This concept and the technologies that enable users to generate their ain content led to the concept of Web 2.0. The term was coined in 1999 by Darcy DiNucci to depict shift from static Web pages to the Spider web of tomorrow and became popularized to describe the latest technologies being used in the creation of social media.

The concept of Web 2.0 was used in the creation of ane of the common definitions of social media. In a 2010 article published in Business Horizons, Andreas Kaplan and Michael Haenlein formalized a definition of social media, proverb: "Social Media is a group of Internet-based applications that build on the ideological and technological foundations of Spider web 2.0, and that allow the creation and substitution of User Generated Content." All the same, Tim Berners-Lee has said "I think Web 2.0 is, of form, a piece of jargon, nobody fifty-fifty knows what it means. If Spider web 2.0 for yous is blogs and wikis, and then that is people to people. Simply that was what the Spider web was supposed to exist all along."

In looking at what social media is and how it has evolved, a better definition might come from an originator of the term. In 1997, an executive at AOL named Ted Leonsis was largely credited as coining the term social media when talking about the need to offering users "social media, places where they can be entertained, communicate, and participate in a social environment." As yous tin can run across past looking at the history of the Cyberspace and social media, Leonsis describes the bones model of how social media has been used from the get-go.

Read total affiliate

URL:

https://www.sciencedirect.com/science/article/pii/B9781597499866000011

Social media: New technologies of collaboration

Derek Fifty. Hansen , ... Itai Himelboim , in Analyzing Social Media Networks with NodeXL (Second Edition), 2020

Electronic mail lists, discussion forums, Reddit, Quora, and Q&A sites

Electronic mail lists plough email into a community feel past allowing people to send a message to a single email list address, which is then forwarded to anybody who has subscribed to the list. These collective email exchanges are widely used in enterprise discussion lists or Internet Listservs covering a nearly unlimited array of topics. Electronic mail lists facilitate discussions on a topic of interest, technical support, neighborhood gatherings and advocacy, workgroup interactions, internal communities of practice, and even the substitution of goods (due east.k., FreeCycle). They are particularly good for reaching less tech savvy users such as older adults who are familiar with email but not more advanced social media technologies. They differ from discussion forums, Reddit, and Q&A sites similar Stack Overflow in that they are a "push" engineering science that shows up in your inbox rather than requiring y'all to visit a site to get the latest information.

Word forums emerged before the World Broad Spider web. In the late 1970s, dial-up bulletin board systems (BBSs) hosted a wide range of bulletin boards that allowed people to mail service and download information shared on early on desktop personal computers. BBS managers selected who could access their services and what content would be retained, exchanged, and copied from other systems. Later, Usenet Newsgroups were created at the Academy of North Carolina in 1979. Before the World Wide Web, there were tens of thousands of different conversation, each devoted to a diverseness of topics and containing chains of letters in reply to i another in structures chosen threads. Usenet newsgroups fostered the collective construction of billions of messages into millions of conversations sorted into tens of thousands of newsgroups. Usenet newsgroups are distinguished from email lists largely in terms of their comparative lack of centralized command and weak boundaries. Anyone could postal service a message to any newsgroup without regard to membership or the desires of others receiving the letters. Similar email and e-mail lists, newsgroups contain a core social network structure chosen a "answer graph" (see Chapter ten) created when authors are continued with those they respond to in a thread. These early on forms of threaded conversations helped inspire innovations that continue to alive on in other forms. For example, the Microsoft Enquiry Netscan project demonstrated the value of visualizing social interaction on Usenet, a hope only now being realized to its full potential [ix]. Usenet newsgroups too helped inspire i of the commencement collaborative filtering systems chosen GroupLens, which made personalized recommendations of content you were probable to bask based on the preferences of similar-minded people [10].

Since the creation of the World wide web, threaded conversations can exist found in discussion forums, blog or news comments, Facebook groups, Reddit or Quora discussions, and Question and Respond (Q&A) sites like Stack Overflow. Advanced features provide users with the ability to proceeds reputations based on the quality of their posts, vote responses up and down (due east.g., Stack Overflow responses), review and approve content, report readership levels, recommend related content, and dynamically filter content based on personal preferences to help overcome information overload. The potential cost is the creation of content that is too filtered to admit alternative views. These "filter bubbling" reverberate the polarization of political beliefs in many populations.

Read full chapter

URL:

https://www.sciencedirect.com/scientific discipline/article/pii/B9780128177563000029

Academic libraries: focusing on service

Conghui Fang , in Chinese Librarianship in the Digital Era, 2013

Reference service

At present, the virtual reference service is an important constituent role of library service. Its link can generally be found easily on the home page of a library. Service content is intended mainly to guide users to the services of a library, such as trial of purchased or leased databases. Service models are diversified, including e-mail interface or spider web forms, FAQ and Message Board Organisation (Bbs). Some libraries provide a existent-time virtual reference service and design a class, so that readers tin inquire online using this. For example, the virtual reference desk of Shanghai Jiaotong University Library and the scientific reference service desk of the National Science Library are relatively successful. Some famous libraries have started to cooperate and coordinate. For instance, Digital Library Reference Service Heart of Lord's day Yat-Sen Library in Guangdong Province ( www.ndcnc.gov.cn/datalib/opensts/2005/2005_01/opensts.2005-01-14.6177989369 ) and the Collaborative Online Reference Service (CORS) platform of the Shanghai Central Library ( http://zsdh.library.sh.cn:8070 ) established a joint online noesis navigation station by utilizing integrated local resources in subject areas and avant-garde it, starting with literature information resources sharing and cooperating among local or professional libraries, in order to reach the functions of public admission, interlibrary loans, coordinated purchase, online catalogs, and and then on. Cathay's Science Digital Library Reference Service Arrangement is a reference service system including 37 member units and its reference service experts provide an online reference service to users (Guo, 2007). CALIS Distributed Collaborative Virtual Reference Organization (CVRS) will be introduced in the next chapter.

Web two.0 improves the service model of digital reference and makes service increasingly diversified, including blogs, wikis, and and then on. Users' participation has greatly improved interaction during the service process. Web iii.0-based references can be more humanized. A user volition enter into a personalized platform automatically when accessing a digital reference arrangement and can browse at that place nether a username when inbound the arrangement; the user can retrieve FAQ, visit information communities, and communicate with reference personnel, registered users, visitors, and and then on. The organisation will analyze and integrate a user'southward information each fourth dimension and store this in its user information database in club to provide users with better service (Li, 2011).

Read full chapter

URL:

https://www.sciencedirect.com/scientific discipline/article/pii/B9781843347071500070