4/18/2006
We specialized in the districts of the province of Beni Suef libraries: A study of the realities and planning for the future
We specialized in the districts of the province of Beni Suef libraries:
Study of the realities and planning for the future
Preparation:
Dasuki Faiza Ahmed Hassan
supervision:
D / Shaaban Abdel Aziz Khalifa.
Post d. Fidan life of a Muslim.
Degree: Master
The study aims to identify the extent to which specialized libraries directorates ability of the province of Beni Suef on supporting directorates, support and provide their information needs. The study showed non-specialized libraries directorates ability of the province of Beni Suef to do its intended role as suffering from a shortage of personnel, budget and space, furniture, equipment, and technical preparation of the holdings. In addition to holdings that do not fit the needs of the beneficiaries, as their services are very weak. The study also revealed a lack of cooperation between the directorates province of Beni Suef specialized libraries, despite the availability of the basic components of cooperation such as geographic proximity and substantive attention. And the researcher during the study to provide solutions and suggestions to overcome the disadvantages suffered by the directorates of the province of Beni Suef libraries so that they can satisfy the needs of the district information.
Abnormal practices of the beneficiaries in libraries and methods of evaluating administratively: a field study about the theft and destruction and rioting in Egyptian libraries
Preparation: Dasuki Faiza Ahmed Hassan.
supervision:
Prof. Tarif Mohamed Shawky (Professor of Psychology).
a. Dr.. Mohammed Sayed Jalal Ghandour (Professor of Library and Information).
Dr.. Carefree Muhyiddin Attia (Assistant Professor of Library and Information).
Degree: PhD.
This study aims to identify the nature of abnormal practices of the beneficiaries of the Egyptian libraries, and the reasons that prompt them to commit, and methods of control.
The study showed that Egyptian libraries suffer from the occurrence of damage and theft and riot them, although it is difficult to draw an accurate picture of these practices; the lack of tools and records monitored. And it revealed the diversity of the reasons behind the occurrence of abnormal practices; there are reasons related to the library, and the causes of beneficiaries. Also showed the lack of combat practices abnormal enough methods in those libraries, and non-availability of materials in state law criminalizing behavior is normal in Egyptian libraries. A researcher at the recommendations also stressed the need for further research and studies to identify more fully on these practices in Egyptian libraries, and work records of monitoring and holding seminars and seminars for discussion, as well as the availability of facilities to control methods; in terms of taking into account the security factors in the library building, and offer good services and rehabilitation workers, and educating the beneficiaries, and the development of regulations and legislation that criminalizes the commission of abnormal behavior of the Egyptian libraries.
Information: Policies and Ethics
D / Fayza Ahmed Desouki
Assistant professor of information
Department of Information Sciences, Faculty of Arts, University of Beni Suef
Beni Suef, Egypt
fayzadesokky@yahoo.com
Chapter informatics policy definition, and the importance of information policy, and objectives of informatics policy, and the areas covered by the informatics policy, the requirements of informatics policy development, and the types of information policies, and models of IT policies, and the impact of modern information in the information policies techniques. In addition to the definition of the ethics of information, and the statement of the difference between law and ethics, ethics and the importance of information, and the areas of the ethics of information, and discuss ethical issues in the field of information, and work to find solutions.
key words:
Information policies, ethics information.
Published in the book:
Basics of Information Studies (co-authored) .- Riyadh: Saudi Arabia Library and Information Association of 0.2008.
E-mail privacy
D / Fayza Ahmed Desouki
Assistant professor of information
Department of Information Sciences, Faculty of Arts, University of Beni Suef
Beni Suef, Egypt
fayzadesokky@yahoo.com
The research aims to study the e-mail privacy issues. The study showed that the e-mail brought a lot of problems for the privacy of the user, where it became difficult for the e-mail user to remain in isolation from the control of others and follow them to him, or being able to identify the information that will be collected from him or about him, and the difficulty of maintaining the confidentiality of that information, and not to disclose it to third parties without consent. There are various agencies that could violate the privacy of e-mail, and the most important e-mail service provider, and the provider of phone service and communications, and law enforcement, employers, businesses and commercial propaganda.
Key words: privacy, e-mail, the privacy of e-mail.
Published in the book:
Information Ethics (co-authored) .- The Arab Federation for Libraries and Information, 2013. The chapter titled: Email privacy. Pp. 517-582.
Abnormal behavior of the beneficiaries in libraries
D / Fayza Ahmed Desouki
Assistant professor of information
Department of Information Sciences, Faculty of Arts, University of Beni Suef
Beni Suef, Egypt
fayzadesokky@yahoo.com
The book aims to study the manifestations of attention behavior is normal in libraries, through a review of what has been the research and studies in this area, and the holding of seminars, conferences and workshops, and the emergence of journals that deal with issues related to abnormal behavior. And know the types of abnormal behavior in libraries, and the reasons for its occurrence, and its impact in the library, staff and beneficiaries. And propose a number of methods and preventive measures to combat the abnormal behavior in libraries. And propose appropriate regulations to combat abnormal behavior in libraries. Among the most important findings of the book: the concept of behavior is normal in the libraries of the concepts in which intra-science studies such as libraries and science of science overlap psychology and criminology and security sciences meeting. There is a growing interest in the issues of abnormal behavior in libraries clearly in foreign studies and research, there is a dearth of Arabic research on these issues. Are varied reasons for committing abnormal behavior libraries; there are special environmental causes libraries, Self and the reasons for private beneficiaries.
Key words: ethics libraries, security libraries, bookstores legislation.
Published in:
Abnormal behavior of the beneficiaries in Almktbaat.- Ariyad.- King Fahd National Library, 2006. 237 pp.
Web-based information services
Taibah University libraries
D / Fayza Ahmed Desouki
Assistant professor of information
Department of Information Sciences, Faculty of Arts, University of Beni Suef
Beni Suef, Egypt
fayzadesokky@yahoo.com
The study aims to identify the information services provided through the Deanship of Library Affairs at the University of good location, and extent of the use of the university faculty and its subsidiaries for these services, and their satisfaction with it. The field study was conducted in the period from April to June 2013 m. Among the most important findings of the study: that a good university to offer information services via the Web site through the Deanship of Library Affairs since 1426. And that the information services available over the Web Taibah University used a large margin reached (82.7%) of the study sample. And that the services provided through the deanship site are: Search standardized, automated and Index, and sources of information, and my library, and I need materials, and information services, and services with special needs, and our sources "digital repository".
Key words: information services, Taibah University libraries.
Published in: The Complete Works of the twenty-fourth of the Conference of the Arab Federation for Libraries and Information 0.2013.
Ethical violations in the virtual world
D / Fayza Ahmed Desouki
Assistant professor of information
Department of Information Sciences, Faculty of Arts, University of Beni Suef
Beni Suef, Egypt
fayzadesokky@yahoo.com
The study aims to explore the ethical violations and crimes that occur in the virtual world, to know the types, and the reasons for their commission, and its impact, and methods meet them, so from the perspective of the residents of the virtual world. One of the main findings of a study that (2.36%) of the sample said the existence of ethical violations in the virtual world, according to their experience in it, and it was more ethical violations frequent: lulled in the ID, and directing racist letters, and the violation of the privacy of others. And that the reasons for committing ethical violations are concentrated in three reasons: the difficulty of detecting the true identity, and that the virtual world of the game no harm from the violence, and the lack of punishment. The proposed means to confront the ethical violations in the virtual world into two categories: the first means to be taken inside the virtual world, and the second legal means outside the virtual world are made in real life. The results also showed that virtual worlds are aware of what is happening inside of ethical violations, so was keen to formulate policies and guidelines clarify behaviors are allowed and not allowed inside, and determine the penalties that apply to the perpetrators of ethical violations.
key words:
Ethics information, the virtual world.
Published in:
Journal of the Faculty of Arts, University of Beni Suef, p 25 (2012 m).
The security of electronic medical records Information: King Fahd Medical City model
D / Fayza Ahmed Desouki
Assistant professor of information
Department of Information Sciences, Faculty of Arts, University of Beni Suef
Beni Suef, Egypt
fayzadesokky@yahoo.com
The study aims to find out how keen the "King Fahd Medical City" on the availability of the security of the information recorded in the electronic until the end of the month of January 2010. The medical records and submission of proposals in which they can help increase the level of security for those records, which can be guided by them also when developing a plan to protect the security of electronic medical records information in hospitals and other health care organizations. Among the most important results that "the King Fahd Medical City" used electronic medical records since its inception in 2004, and it contains a large amount of personal and sensitive information about the patient. And that the city was keen to use a variety of methods to ensure the protection of the confidentiality of electronic medical records information, integrity and availability, it has succeeded in this, where that information security was not compromised. However, there is a need to complete some protection methods such as establishing laws to protect medical information and electronic application, use the "vital characteristics", digital signature, electronic signature, and watermarks to ensure the security of electronic medical records in the future.
key words:
Information security, electronic medical record, King Fahd Medical City.
Published in:
Arabic 3000, Q 11, GS 43 (April 2011 m). Pp. 129. 168. Q and 11, GS 45 (October 2011). Pp. 61-94.
Distance education in the virtual environment
Second Life Second Life model
D / Fayza Ahmed Desouki
Assistant professor of information
Department of Information Sciences, Faculty of Arts, University of Beni Suef
Beni Suef, Egypt
fayzadesokky@yahoo.com
The study aims to find out the advantages offered by the "second life" of the educational process as a model for virtual environments, and obstacles to use, and the extent of use by the faculty members of Taibah University in Medina. As well as the submission of proposals in which they can help raise awareness of the importance of the virtual environment and their use in the educational process. Among the most important findings of the study that the use of virtual environments effectively affect the educational process, but some may contain scenes not compatible with the principles of the Islamic religion. And faculty members at the University of Thebes do not use the "second life" in education, and that there is an urgent need to increase their awareness of the benefits of this new technology, and the development of training courses to ensure effective use.
key words:
Distance education, virtual environment, Second Life.
Published in:
University education seminar in the Information Age: Challenges and Alttalaaat.- Arabia: Taibah University, 2011.- available on:
http://www.taibahu.edu.sa/cms/pages.aspx?pid=7454
Encyclopedias Arab Free:
Exploratory Study
D / Fayza Ahmed Desouki
Assistant professor of information
Department of Information Sciences, Faculty of Arts, University of Beni Suef
Beni Suef, Egypt
fayzadesokky@yahoo.com
The study aims to explore the Arab encyclopedias free on the Internet, and the number of five encyclopedias are "Arabic Wikipedia, and knowledge, and the Arab free encyclopedia in the field of library and information science, and Noel, Wikipedia and an Egyptian." Among the most important findings of the study that the first free Arabic Encyclopedia appeared on the Internet in 2003, and that only Mosustin were established mainly in Arabic. There is no supportive Arab institutions of free encyclopedias Arab While there are two institutions strangers sponsoring three free and Arab encyclopedias, and that the Arab encyclopedias free public over a number of specialized, and four encyclopedias used the GNU Free Documentation license, and the system wiki MediaWiki, and the Encyclopedia of the one used creative participation Creative Commons license, and the system of cooperation References moderated collaboration content management. Encyclopedia and one based on a standardized classification plan. And that the use of the Arabic encyclopedias free is very weak.
key words:
Arab Free encyclopedias, encyclopedias cooperative.
Published in:
Libraries and information magazine Arabah.- Q 30, P 4 (October 2010 m), pp. 187-212. And S. 31, GS 3 (July 2011 m). Pp. 183-208.
Biometrics and information security
D / Fayza Ahmed Desouki
Assistant professor of information
Department of Information Sciences, Faculty of Arts, University of Beni Suef
Beni Suef, Egypt
fayzadesokky@yahoo.com
The paper aims to determine the possibility of using biometrics in information security, as well as make recommendations which they can use those measurements effectively in various institutions to secure their data bases. Among the most important findings, there are three main categories can be used to verify the user's identity in the field of security of computers and information: The first category is something owned by the person, and the second thing he knew the person, and the third is to be the person, any particular physical properties available which is known as vital measurements. And it can be divided biometrics into two categories: physical characteristics (physical / physiological), and behavioral characteristics. And that there are several types of biometrics can be used to document the personal, such as fingerprints, retina, iris, face, and engineering of the hand, and the signature, and the way you use the keyboard, sound, and DNA. And that biometrics are used either to prove identity verification or identification identification systems. And the application of biometrics provides several benefits but there are some problems and defects that REO.
key words:
Information security, biometrics, bio-features, dynamic characteristics.
Published in:
Sixth Conference of the Association of Library and Information Saudi Arabia 0.2010.
Privacy policies on the search engines:
A comparative analysis
D / Fayza Ahmed Desouki
Assistant professor of information
Department of Information Sciences, Faculty of Arts, University of Beni Suef
Beni Suef, Egypt
fayzadesokky@yahoo.com
Abstract:
This study aims to find out the issues addressed by the privacy policies in a sample of Arab and foreign search engines. Among the most important findings that the search engines have the ability to collect a huge amount of information about their users, and can integrate the information it collects about a user in a single file. Are varied reasons behind the collection of information search engines for users, as they share user information with third parties, in several cases. Policies and did not observe the minimum standards set by the Protection of Children's Online Privacy Act. It turns out that the privacy policies in Arabic search engines is much weaker than their counterparts in foreign engines.
key words:
Privacy policies, the search engines.
Published in:
Information, GS 5 studies (May 2009). Pp. 49-80. Full Text: http://informationstudies.net/issue_list.php?action=getbody&titleid=63 link
Internet search privacy
D / Fayza Ahmed Desouki
Assistant professor of information
Department of Information Sciences, Faculty of Arts, University of Beni Suef
Beni Suef, Egypt
fayzadesokky@yahoo.com
Abstract:
The study aims to find out the extent to which search engines to users 'privacy, as well as the submission of proposals in which they can help protect users' privacy during their search on the Internet. Among the most important findings, that the search engines brings a tremendous amount of information about users, and that it is very easy for them to determine the identity of a particular user, if registered in, or bought something while he was on location. And that there is a lot of risk it may fall as a result of the collection of this information. The motors can be shared in the information it collects from users or about them with others, without the user's consent. The majority of the engines do not provide the user, his research could be deleted from the data servers. And these results can be summarized in that: the majority of search engines do not maintain the privacy of the search for the user; they do not give him the opportunity to identify the information that will be collected from him or about him, and they reveal this information to third parties without consent.
key words:
Privacy, the search engines.
Published in:
Cybrarians Journal, p. 18 (March 2009). Link to the full text: http://www.journal.cybrarians.info/index.php?option=com_content&view=article&id=376:2009-07-19-08-46-54&catid=141:2009-05-20-09-52-31&Itemid=59
Digitization at the King Fahd National Library:
Case Study
D / Fayza Ahmed Desouki
Assistant professor of information
Department of Information Sciences, Faculty of Arts, University of Beni Suef
Beni Suef, Egypt
fayzadesokky@yahoo.com
Extract:
This study aims to find out the efforts made by the "King Fahd National Library" of the effort in the field of digitization, assessing that effort, and propose mechanisms by which to further activate the role of the library in the coming period with respect to the field of digitization. Among the most important findings of the study that "the King Fahd National Library" entrusted with the task of digitization to hand off. And it developed a policy of digitization, in cooperation with that body. And they resorted to digitization in order to preserve the origin of information sources, and easily search for blood and use. And they are focused on digitizing their collections of manuscripts, photographs and documents. Also it focused on the digitization of the original manuscripts are abroad, according to a program to protect the national heritage of the manuscript. The digitized blood still in need of more technical operations. Library and focused on providing protection for images digitized only against the misuse of its beneficiaries. There is no written plan specific steps show the actions to be taken to ensure the continued operation of what has been digitized in the future.
key words:
Digitization, King Fahd National Library.
Published in:
The role of information institutions in the Kingdom in the era of the knowledge society: the challenges of reality and future aspirations. Fifth Conference of the Association of Library and Information Alsaudih.- Arabia: Assembly 0.2008.
The role of the Internet in the cognitive development of faculty members at the University of Cairo, Beni Suef Branch
D / Fayza Ahmed Desouki
Assistant professor of information
Department of Information Sciences, Faculty of Arts, University of Beni Suef
Beni Suef, Egypt
fayzadesokky@yahoo.com
Extract:
The study aims to find out the nature of the use of faculty members and their assistants in the "Cairo University Branch Beni Suef" of the Internet, the actual role of the network in the development of knowledge in its various forms, and how keen faculties of that university to provide the necessary infrastructure to provide Internet services to faculty members and their assistants , and the obstacles that stand in the way colleges to provide Internet services to members of the teaching staff and their assistants, and how to overcome them. Among the most important findings, the diversity of the tributaries that gets faculty members and assistants from which the cognitive development they need, libraries have excelled on the Internet in this. And that a large proportion of faculty members and their assistants are using the Internet. And teaching assistants and staff members in the college process more widely used of the Internet than their counterparts in colleges theory. And that the field of "professional development" is the first domain that uses the faculty members of the Internet and their collaborators for. As well as the lack of internet in providing some college faculty members and their assistants, although the possibility of overcoming the obstacles that caused this.
key words:
Cognitive development, use of the Internet
Published in:
Full Fourth Scientific Conference for Community Service and Environmental Development. C. Beni Suef - Faculty of Arts, 2006. pp. 471-503.