References
- Ajie, I. (2019). A review of trends and issues of cybersecurity in academic libraries. Library Philosophy & Practice. 2523. Retrieved from https://digitalcommons.unl.edu/libphilprac/2523
- Anderson, R. (2016, May 19). Sci-Hub and academic identity theft: An open letter to university faculty everywhere. The Scholarly Kitchen. Retrieved from https://scholarlykitchen.sspnet.org/2016/05/19/sci-hub-and-academic-identity-theft-an-open-letter-to-university-faculty-everywhere/
- Anonymous. (2022, March 30). Blog comment on Winter, S. (2022, March 21). Guest post – Cybersecurity and academic libraries: Findings from a recent survey. The Scholarly Kitchen. Retrieved from https://scholarlykitchen.sspnet.org/2022/03/21/guest-post-cybersecurity-and-academic-libraries-findings-from-a-recent-survey/#comments
- Australian Cyber Security Centre. (n.d.). Watch out for threats. Retrieved from https://www.cyber.gov.au/learn-basics/explore-basics/threats
- BBC News. (2019, June 26). Second US town pays up to ransomware hackers. Retrieved from https://www.bbc.com/news/technology-48770128
- Breeding, M. (2003). Defending Your ILS Against Security Threats. Computers in Libraries, 23(5), 38–40.
- Caverly, W. (2021, May 10). Ransomware attacks at libraries: How they happen, what to do. Public Libraries Online. Retrieved from https://publiclibrariesonline.org/2021/05/ransomware-attacks-at-libraries-how-they-happen-what-to-do/
- Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining cybersecurity. Technology Innovation Management Review, 4(10), 13–21. doi:10.22215/timreview/835
- Cybersecurity and Infrastructure Security Agency. (2021, February 1). What is Cybersecurity? Retrieved from https://www.cisa.gov/news-events/news/what-cybersecurity
- Drolet, M. (2017, June 16). What have we learned from WannaCry? CSO. Retrieved from https://www.csoonline.com/article/562009/what-have-we-learned-from-wannacry.html
- Duncan, I. (2019, May 29). Baltimore estimates cost of ransomware attack at $18.2 million as government begins to restore email accounts. The Baltimore Sun (Online). Retrieved October 26, 2023, from ProQuest Central database.
- Dwyer, D. (2021, August 27). A cybersecurity attack is causing ‘significant’ system outages for the Boston Public Library. Boston.com. Retrieved from https://www.boston.com/news/local-news/2021/08/27/boston-public-library-cybersecurity-attack/
- Erickson, B. (2023, May 26). Dallas faces difficult choices as it continues to navigate active ransomware attack. D Magazine. Retrieved from https://www.dmagazine.com/frontburner/2023/05/dallas-faces-difficult-choices-as-it-continues-to-navigate-active-ransomware-attack/
- Faris, G., Warraicj, N. F., & Iftikhar, S. (2023). Digital information security management policy in academic libraries: A systematic review (2010–2022). Journal of Information Science. doi:10.1177/01655515231160026
- Federal Communications Commission. (2023, December 29). Schools and libraries cybersecurity pilot program. Federal Register, 88(249): 90141–90163.
- Fernandez, M., Sanger, D. E., & Trahan Martinez, M. (2019, August 22). Ransomware attacks are testing resolve of cities across America. New York Times, updated April 27, 2021, from https://www.nytimes.com/2019/08/22/us/ransomware-attacks-hacking.html
- Forschung & Lehre. (2020, June 6). Cyberangriff auf Uni-Bibliothek Köln. Retrieved from https://www.forschung-und-lehre.de/politik/cyberangriff-auf-uni-bibliothek-koeln-2835/
- General Services Administration. (n.d.). FedRamp. Retrieved from https://www.gsa.gov/technology/government-it-initiatives/fedramp
- iCe799. (2002). Breaking down the dynix door. 2600: The Hacker Quarterly, 19(3), 47–48.
- International Federation of Library Associations and Institutions. (2020, March 27). Awareness, planning, resilience: Thoughts on libraries’ cyber defense in 2020. Library Policy and Advocacy Blog. Retrieved from https://blogs.ifla.org/lpa/2020/03/27/awareness-planning-resilience-thoughts-on-libraries-cyber-defense-in-2020/
- International Organization for Standardization. (n.d.). ISO/IEC 27001:2022. Retrieved from https://www.iso.org/standard/27001
- Jackson, T. (2018, June 13). It’s complicated: Restrictions in university archives. The Academic Archivist. Retrieved from https://academicarchivist.wordpress.com/2018/06/13/its-complicated-restrictions-in-university-archives/
- Kean, D. (2017, January 23). Ransomware attack paralyses St Louis libraries as hackers demand bitcoins. The Guardian. Retrieved from https://www.theguardian.com/books/2017/jan/23/ransomware-attack-paralyses-st-louis-libraries-as-hackers-demand-bitcoins
- Kim, B. (2016, August 16). Keeping up with… Cybersecurity, usability, and privacy. Keeping Up With. Retrieved from https://www.ala.org/acrl/publications/keeping_up_with/cybersecurity
- Landi, M. (2023, November 2). UK among countries to sign ransomware payments agreement. Independent. Retrieved from https://www.independent.co.uk/news/uk/politics/ransomware-tom-tugendhat-national-cyber-security-centre-government-policy-south-korea-b2440476.html
- Library Policy. (2020, March 27). Awareness, Planning, Resilience: Thoughts on Libraries’ Cyber Defense in 2020. IFLA Library Policy and Advocacy Blog.
- Martin, A. (2021, March 19). Sci-Hub: Police warn students and universities against using ‘the pirate bay of science’. Sky News. Retrieved from https://news.sky.com/story/police-warn-students-and-universities-against-using-the-pirate-bay-of-science-12250407
- Mozilla. (2018). Internet health report v.1.0 2018. Retrieved from https://d20x8vt12bnfa2.cloudfront.net/2019/2019InternetHealthReport_shortversion.pdf
- National Cyber Security Centre. (n.d.). A Guide to Ransomware. Retrieved October 31, 2023, from https://www.ncsc.gov.uk/ransomware
- National Institute of Standards and Technology. (n.d.). Cybersecurity Framework. Retrieved from https://www.nist.gov/cyberframework
- Nichols Hess, A., LaPorte-Fiori, R., & Engwall, K. (2015). Preserving patron privacy in the 21st century academic library. The Journal of Academic Librarianship, 41(1), 105–114. doi:10.1016/j.acalib.2014.10.010
- Pagliery, J. (2017, January 19). St. Louis’ public library computers hacked for ransom. CNN Business. Retrieved from https://money.cnn.com/2017/01/19/technology/st-louis-public-library-hack/index.html
- Pattison-Gordon, J. (2022, August 30). Major Library Vendor Disrupted by Ransomware Attack. Government Technology. Retrieved from https://www.govtech.com/security/major-library-vendor-disrupted-by-ransomware-attack
- Perkel, J. M. (2019, April 1). 11 ways to avert a data-storage disaster. Nature Toolbox. Retrieved from https://www.nature.com/articles/d41586-019-01040-w
- Petrowicz, D. (2021, August 10). How libraries can protect themselves from cyberattacks. The Link [ blog]. Retrieved from https://www.springernature.com/gp/librarians/the-link/blog/blogposts-news-initiatives/how-libraries-can-protect-themselves-from-cyberattacks/19556496
- PIPCU. (2021, March 19). Police warn students and universities of accessing an illegal website to download published scientific papers [ Press Release]. Retrieved from https://www.cityoflondon.police.uk/news/city-of-london/news/2021/march/police-warn-students-and-universities-of-accessing-an-illegal-website-to-download-published-scientific-papers/
- Pitts, A. (2018, September 18). Guest post: Think sci-hub is just downloading PDFs? Think again. The Scholarly Kitchen. Retrieved from https://scholarlykitchen.sspnet.org/2018/09/18/guest-post-think-sci-hub-is-just-downloading-pdfs-think-again/
- Proofpoint. (n.d.). 2023 state of the Phish: Europe and the middle east. Retrieved from https://www.proofpoint.com/uk/resources/threat-reports/state-of-phish
- Reed, L. (2021, June 11). Cost of ransomware attack on Baltimore county public schools climbs to $7.7M. Baltimore Sun (Online). Retrieved October 26, 2023, from ProQuest Central.
- Regan, P. M. (2004). Old issues, new context: Privacy, information collection, and homeland security. Government Information Quarterly, 21(4), 481–497. doi:10.1016/j.giq.2004.08.003
- Rohrlich, J. (2019, December 23). The “Robin Hood of science” says she’s not a Russian asset. Quartz. Retrieved from https://qz.com/1773765/sci-hub-creator-says-shes-not-working-for-russian-intelligence
- Ruff, C. (2016, February 18). Librarians find themselves caught between journal pirates and publishers. The Chronicle of Higher Education. Retrieved from https://www.chronicle.com/article/librarians-find-themselves-caught-between-journal-pirates-and-publishers/
- Stanley, M. (2023, March 20). The importance of data backups. Retrieved from https://www.morganstanley.com/articles/data-backup-importance-cybersecurity/.
- Stokes, A. M. (2022). Disruption of library services due to hospital cyberattack: A case study. Medical Reference Services Quarterly, 41(2), 204–212. doi:10.1080/02763869.2022.2054198
- Thompson, M., & Mullen, J. (2017, May 14). World’s biggest cyberattack sends countries into ‘disaster recovery mode’. CNN Business. Retrieved from https://money.cnn.com/2017/05/14/technology/ransomware-attack-threat-escalating/index.html
- Tidy, J. (2021, May 20). Ransomware: Should paying hacker ransoms be illegal? BBC News. Retrieved from https://www.bbc.co.uk/news/technology-57173096
- Universitäts Bibliothek Leipzig. (2022, April 26). Sicherheitslücke in der Universitätsbibliothek. Retrieved from https://www.ub.uni-leipzig.de/aktuelles/aktuelles-einzelansicht/?tx_news_pi1%5Bnews%5D=1768&tx_news_pi1%5Bcontroller%5D=News&tx_news_pi1%5Baction%5D=detail
- University of Chicago Library. (n.d.). Regulations governing access to official records of the University of Chicago in the University of Chicago Archives. Retrieved from https://www.lib.uchicago.edu/scrc/archives/regulations/
- Witt, S. (2017). The evolution of privacy within the American library association, 1906–2002. Library Trends, 65(4), 639–657. doi:10.1353/lib.2017.0022