Assessing the Components of Information Security in Accessing & Use of Digital Libraries

Authors

Abstract

Information security is one of the effective factors in protecting and using digital libraries which can help improve the status of these libraries.This research reviews the accessibility to information security of digital libraries in digital libraries of Qom city. In this study, definitions of digital libraries include libraries based on their mission and using experts, organize digital documents and provide them to members in the form of information services.

This study is a survey and research community was both public and academic digital libraries (including 5 libraries) in Qom city. Data collection tool is a questionnaire based on the standard ISO/ IEC 27002 which is an information security standard developed by the international organization for standardization (ISO) and International Electrotechnical Commission (IEC).
The results of this study indicate that the average information security among digital libraries in Qom city is estimated to be 0.801, which considering the research evaluation method, it can be said that it has a strong level of information security. The development of information systems to provide effective services in digital libraries has played an effective role .There is also a significant relationship between different indicators of information security in digital libraries of Qom city. Weaknesses and strengths of digital libraries in Qom city, respectively, include physical and environmental security as a weakness and business continuity management has been introduced as a strength. Utilizing passive defense, participation of security groups to prevent hackers, identifying security gaps, training specialized forces and having an executive plan for information security are among the suggestions of this research. Finally, it must be stated that information security is at a high level in libraries in Qom city.

Keywords


  1. الهی، شعبان، مهدی طاهری، و علیرضا حسن‌زاده. 1388. ارائه چارچوبی برای عوامل انسانی مرتبط در امنیت سیستم‌های اطلاعاتی. پژوهش‌های مدیریت در ایران 61: 1-22.
  2. الهی، شعبان، مهدی طاهری، و علیرضا حسن‌زاده. 1388. ارائه چارچوبی برای عوامل انسانی مرتبط در امنیت سیستم‌های اطلاعاتی. پژوهش‌های مدیریت در ایران 61: 1-22.
  3. حریری، نجلا، و زهرا نظری. 1391. امنیت اطلاعات در کتابخانه‎‌های دیجیتال ایران. فصلنامه کتابداری و اطلاع‌رسانی 15 (2): 61-90.
  4. حریری، نجلا، و زهرا نظری. 1391. امنیت اطلاعات در کتابخانه‎‌های دیجیتال ایران. فصلنامه کتابداری و اطلاع‌رسانی 15 (2): 61-90.
  5. رضوانی، شهلا. 1397. طراحی الگوی مدیریت امنیت اطلاعات در کتابخانه‌های دیجیتال. پژوهشنامه کتابداری و اطلاع‌رسانی 8 (1): 337-356.
  6. رضوانی، شهلا. 1397. طراحی الگوی مدیریت امنیت اطلاعات در کتابخانه‌های دیجیتال. پژوهشنامه کتابداری و اطلاع‌رسانی 8 (1): 337-356.
  7. عیدی قلعه‌شیری، داود. 1395. ارزیابی چالش‌های امنیتی طراحی کتابخانه‌های دیجیتال (مطالعه موردی: کتابخانه دیجیتالی آستان قدس رضوی). پایان‌نامه کارشناسی ارشد. دانشگاه گیلان، مرکز آموزش الکترونیکی.
  8. عیدی قلعه‌شیری، داود. 1395. ارزیابی چالش‌های امنیتی طراحی کتابخانه‌های دیجیتال (مطالعه موردی: کتابخانه دیجیتالی آستان قدس رضوی). پایان‌نامه کارشناسی ارشد. دانشگاه گیلان، مرکز آموزش الکترونیکی.
  9. Anday, A., E. Francese, H. C. Huurdeman, M. Yilmaz, & D. Zengenene. 2012. Information Security Issues in a Digital Library Environment: A Literature Review. Information World/Bilgi Dunyasi 13 (1): 117-137. [DOI:10.15612/BD.2012.171]
  10. Anday, A., E. Francese, H. C. Huurdeman, M. Yilmaz, & D. Zengenene. 2012. Information Security Issues in a Digital Library Environment: A Literature Review. Information World/Bilgi Dunyasi 13 (1): 117-137. [DOI:10.15612/BD.2012.171]
  11. Awad, A. I., & M. Fairhurst. 2018. Information Security: Foundations, Technologies and Applications. Herts (United kingdom): Institution of Engineering and Technology. [DOI:10.1049/PBSE001E]
  12. Awad, A. I., & M. Fairhurst. 2018. Information Security: Foundations, Technologies and Applications. Herts (United kingdom): Institution of Engineering and Technology. [DOI:10.1049/PBSE001E]
  13. Bârsan, M. 2017. Aspects regarding the implementation of information security standards in organizations. Revista Română de Biblioteconomie și Știința Informării 13 (1): 21-26. [DOI:10.26660/rrbsi.2017.13.1.21]
  14. Bârsan, M. 2017. Aspects regarding the implementation of information security standards in organizations. Revista Română de Biblioteconomie și Știința Informării 13 (1): 21-26. [DOI:10.26660/rrbsi.2017.13.1.21]
  15. Candela, L., Y. I. Castelli, S. Ross, C. Thanos, P. Pagano, G. Koutrika, ... & H. Schuldt. 2007. Setting the foundations of digital libraries. D-Lib Magazine 13 (3/4): Retrieved from: http://www.dlib.org/dlib/march07/castelli/03castelli.html (accessed: April 20, 2020)
  16. Candela, L., Y. I. Castelli, S. Ross, C. Thanos, P. Pagano, G. Koutrika, ... & H. Schuldt. 2007. Setting the foundations of digital libraries. D-Lib Magazine 13 (3/4): Retrieved from: http://www.dlib.org/dlib/march07/castelli/03castelli.html (accessed: April 20, 2020)
  17. Di Sarno, C., A. Garofalo, I. Matteucci, & M. Vallini. 2016. A novel security information and event management system for enhancing cyber security in a hydroelectric dam. International Journal of Critical Infrastructure Protection 13: 39-51. [DOI:10.1016/j.ijcip.2016.03.002]
  18. Di Sarno, C., A. Garofalo, I. Matteucci, & M. Vallini. 2016. A novel security information and event management system for enhancing cyber security in a hydroelectric dam. International Journal of Critical Infrastructure Protection 13: 39-51. [DOI:10.1016/j.ijcip.2016.03.002]
  19. Han, Z., S. Huang, H. Li, & N. Ren. 2016. Risk assessment of digital library information security: a case study. The Electronic Library 34 (3): 471-487. [DOI:10.1108/EL-09-2014-0158]
  20. Han, Z., S. Huang, H. Li, & N. Ren. 2016. Risk assessment of digital library information security: a case study. The Electronic Library 34 (3): 471-487. [DOI:10.1108/EL-09-2014-0158]
  21. Hao, T. 2015. The information security analysis of digital library. In 2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA) (983-984). IEEE. Nanchang, China. [DOI:10.1109/ICICTA.2015.250]
  22. Hao, T. 2015. The information security analysis of digital library. In 2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA) (983-984). IEEE. Nanchang, China. [DOI:10.1109/ICICTA.2015.250]
  23. Huang, S., Z. Han, B. Yang, & N. Ren. 2019. Factor identification and computation in the assessment of information security risks for digital libraries. Journal of Librarianship and Information Science 51 (1): 78-94. [DOI:10.1177/0961000616668572]
  24. Huang, S., Z. Han, B. Yang, & N. Ren. 2019. Factor identification and computation in the assessment of information security risks for digital libraries. Journal of Librarianship and Information Science 51 (1): 78-94. [DOI:10.1177/0961000616668572]
  25. Jiang, Q., L. Lin, & Y. He. 2018. Analysis on Network Security and Its Countermeasures. Information and Computer Security (TRANSFERRED) 1 (1): 1-5.
  26. Jiang, Q., L. Lin, & Y. He. 2018. Analysis on Network Security and Its Countermeasures. Information and Computer Security (TRANSFERRED) 1 (1): 1-5.
  27. Liu, S. 2014. Design of Network System Security System of Digital Library. In Applied Mechanics and Materials (644, 3212-3215). Baech: Trans Tech Publications Ltd. [DOI:10.4028/www.scientific.net/AMM.644-650.3212]
  28. Liu, S. 2014. Design of Network System Security System of Digital Library. In Applied Mechanics and Materials (644, 3212-3215). Baech: Trans Tech Publications Ltd. [DOI:10.4028/www.scientific.net/AMM.644-650.3212]
  29. Liu, Y. 2019. Risk and Preventive Strategy of Network Security in University Digital Library. In: 9th International Conference on Management, Education and Information (MEICI 2019). Bali, Indonesia.
  30. Liu, Y. 2019. Risk and Preventive Strategy of Network Security in University Digital Library. In: 9th International Conference on Management, Education and Information (MEICI 2019). Bali, Indonesia.
  31. Meng, Q., & C. Gong. 2013. Research of cloud computing security in digital library. In 6th International Conference on Information Management, Innovation Management and Industrial Engineering (2, 41-44). IEEE. Xi'an, China. [DOI:10.1109/ICIII.2013.6703173]
  32. Meng, Q., & C. Gong. 2013. Research of cloud computing security in digital library. In 6th International Conference on Information Management, Innovation Management and Industrial Engineering (2, 41-44). IEEE. Xi'an, China. [DOI:10.1109/ICIII.2013.6703173]
  33. Nandagaoli, J. M., & S. R. Lihitakar. 2019. Information Security Measures for Web Based Digital Library Management System. Journal of Advancements in Library Sciences 6 (1): 90-98.
  34. Nandagaoli, J. M., & S. R. Lihitakar. 2019. Information Security Measures for Web Based Digital Library Management System. Journal of Advancements in Library Sciences 6 (1): 90-98.
  35. Shiri, A. 2003. Digital library research: current developments and trends. Library review 52 (5): 198-202. [DOI:10.1108/00242530310476689]
  36. Shiri, A. 2003. Digital library research: current developments and trends. Library review 52 (5): 198-202. [DOI:10.1108/00242530310476689]
  37. Singh, M. A. K. 2019. Digital Library and its Security Issues: An Overview. Journal Current Science 20 (1). Retrieve from: http://www.ijournal.scienceacad.com (accessed: April 20, 2020)
  38. Singh, M. A. K. 2019. Digital Library and its Security Issues: An Overview. Journal Current Science 20 (1). Retrieve from: http://www.ijournal.scienceacad.com (accessed: April 20, 2020)
  39. Soleimanzade, N., A. Asemi, M. CheshmehSohrabi, & A. Shabani. 2019. The Scientific Information Exchange General Model at Digital Library Context: Internet of Things. Library Philosophy and Practice. 2150, Retrieve from:http://digitalcommons.unl.edu/libphilprac/2150 (accessed: April 20, 2020)
  40. Soleimanzade, N., A. Asemi, M. CheshmehSohrabi, & A. Shabani. 2019. The Scientific Information Exchange General Model at Digital Library Context: Internet of Things. Library Philosophy and Practice. 2150, Retrieve from:http://digitalcommons.unl.edu/libphilprac/2150 (accessed: April 20, 2020)
  41. Zhang, X., D. L. Song, & S. Yan. 2016. The Security Research of Digital Library Network. In Mechanical Engineering and Control Systems: Proceedings of 2015 International Conference on Mechanical Engineering and Control Systems (MECS2015) (232-235). Wuhan, China. [DOI:10.1142/9789814740616_0051]
  42. Zhang, X., D. L. Song, & S. Yan. 2016. The Security Research of Digital Library Network. In Mechanical Engineering and Control Systems: Proceedings of 2015 International Conference on Mechanical Engineering and Control Systems (MECS2015) (232-235). Wuhan, China. [DOI:10.1142/9789814740616_0051]
  43. Zhao, L., L. Zhang, & D. Wang. 2018. Security Management and Operation Mechanism of Digital Libraries in Military Academies. In 3rd International Conference on Contemporary Education, Social Sciences and Humanities (ICCESSH 2018). Atlantis Press. Moscow, Russia. [DOI:10.2991/iccessh-18.2018.231]
  44. Zhao, L., L. Zhang, & D. Wang. 2018. Security Management and Operation Mechanism of Digital Libraries in Military Academies. In 3rd International Conference on Contemporary Education, Social Sciences and Humanities (ICCESSH 2018). Atlantis Press. Moscow, Russia. [DOI:10.2991/iccessh-18.2018.231]