24,729 Hits in 6.1 sec

Assessing the status of library information systems security

Roesnita Ismail, Awang Ngah Zainab
2013 Journal of Librarianship and Information Science  
This study proposes an instrument to assess the current information system security status in libraries.  ...  The instrument was pilot-tested with 50 respondents responsible for information systems or information technology in their libraries.  ...  Awang Ngah Zainab is a professor teaching on the Master of Library and information Science programme offered at the Faculty of Computer Science and Information Technology, University of Malaya since 1994  ... 
doi:10.1177/0961000613477676 fatcat:jawh3jlp7zasrceertj3urnyva

Information Security Measures of Libraries of Central Universities of Delhi : A Study

Vikas Singh, Madhusudhan Margam
2018 DESIDOC Journal of Library & Information Technology  
The findings of the study will not only guide the university librarians to improve their Information security measures, but also open the floodgates for improvements of information security in fast </span  ...  It is hoped that the present study will help in improving the information security </span><span>lacunas in libraries under study.  ...  , integrity and availability of its information resources 6 and help to identify and reduce critical security risks and types of network attacks, for proper management of information security in digital  ... 
doi:10.14429/djlit.38.2.11879 fatcat:p6stpoqneffgxdjmf5nps3jm4y

Information (ICT) security and Libraries

Rajesh Kathane
2020 IP Indian Journal of Library Science and Information Technology  
Also, methodology for assessing information Security in networked libraries is also discussed.  ...  In the present digital world where Information Technology has become an essential part of the libraries.  ...  Organizational Security -The organizational security comprises of four main factors they are as follows The existence of library and information security policies, the emplacement of procedures and control  ... 
doi:10.18231/j.ijlsit.2020.009 fatcat:5znvqpjygngdxbpcfbrwyh4sxy

Risk Assessment Analysis on Library Information System using OCTAVE Allegro Framework

Nela Fitria Ningsih, Imam Riadi
2021 International Journal of Computer Applications  
The results of the research that has been done on the INLISLite Library Information System at the Library Service Center for the Regional Library and Archives of DIY, obtained theapproach is Mitigate 4  ...  To analyze the risks that can occur in the INLISLite library information system using the Framework OCTAVE Allegro.  ...  Library Service Center for the Regional Library and Archives of the Special Region of Yogyakarta (5) Security Requirements What are the security requirements for information assets?  ... 
doi:10.5120/ijca2021921620 fatcat:bbgy3rzobbd3vivptpzitxisry

Health and Safety and Libraries in the Covid-19 Pandemic

Paul Catherall
2021 Zenodo  
The recovery toolkit is cited in the UK Government document for management of safety in Libraries during the Covid-19 crisis - 'Libraries as a statutory service' and in context to Higher Education Libraries  ...  The recovery toolkit sets out the context for control measures in responding to the Covid-19 pandemic, including requirements for closure of Libraries to the public in the UK's Tier 4.  ...  Libraries must involve unions and workers in their risk assessments and recovery plans; Managed in COVID secure ways, in line with the relevant sections in this guidance."  ... 
doi:10.5281/zenodo.4603286 fatcat:m7vkltak4bhlnitrpjqyjoe72y

Security Without Obscurity: Managing Personally Identifiable Information in Born-Digital Archives

Ben Goldman, Timothy D. Pyatt
2013 Library & Archival Security  
This article examines current archival thinking and practice surrounding the identification and management of personally identifiable information (PII) found in born-digital collections in an academic  ...  Data from recent surveys and reports, along with examples of how several different repositories have attempted to balance management of born-digital records that require access control, inform the recommendations  ...  like Who is involved in risk assessment and management?  ... 
doi:10.1080/01960075.2014.913966 fatcat:s25vpr4j7jgvjpcmiobe2y5dzq

Development of Portable Charger for Mobile Phone Using Arduino Microcontroller during Disaster Recovery

Teddy Surya Gunawan, Mira Kartiwi, Nur Hanis Sabrina Suhaimi, Rashidah Abu Bakar
2013 2013 International Conference on Advanced Computer Science Applications and Technologies  
Risk Assessment in Hajj Event-Based on Information Leakage 108. Secure Cryptography Testbed Implementation for SCADA Protocols Security 109.  ...  Computer and Information Security Ethics' Models 32. Conceptualizing the Relationships between Information Security Management Practices and Organizational Agility 33.  ... 
doi:10.1109/acsat.2013.50 fatcat:p4jbqq2qxbhgbipbsdhs33z6xy

A systematic review of information security risk assessment

L. Pan, A. Tomlinson
2016 International Journal of Safety and Security Engineering  
Many standards exist to guide the process of risk assessment, particularly in the field of information security.  ...  This classification aims to help researchers obtain a clear and unbiased picture of the terminology, developments and trends of information security risk assessment in the academic sector.  ...  as information security risk assessment, security risk assessment, assessing risk of information security.  ... 
doi:10.2495/safe-v6-n2-270-281 fatcat:ucesdnowfnclrddtv3hslxkxji

Front Matter: Volume 12175

Fengjie Cen
2022 International Conference on Network Communication and Information Security (ICNIS 2021)  
Printed in the United States of America by Curran Associates, Inc., under license from SPIE. Publication of record for individual papers is online in the SPIE Digital Library.  ...  Some conference presentations may not be available for publication. Additional papers and presentation recordings may be available online in the SPIE Digital Library at  ...  12175 0U A method to analysis the risk factors in information system 12175 0V Analyze the application of digital communication in the library information security based on RFID 12175 0W Intrusion detection  ... 
doi:10.1117/12.2636727 fatcat:o2smlfrjnfac5hpohoxqjo5rze

Information security risk management for computerized health information systems in hospitals: a case study of Iran

Javad Zarei, Farahnaz Sadoughi
2016 Risk Management and Healthcare Policy  
Based on literature review, experts' opinion, and observations at five hospitals, our intensive questionnaire was designed to assess security risk management for CHISs at the concerned hospitals, which  ...  Therefore, Iran's Ministry of Health should develop practical policies to improve information security risk management in the hospitals of Iran.  ...  The authors thank the Office of Hospital Management and Clinical Service Excellence, Vice-Chancellor for Treatment, and the Ministry of Health of Iran for contributions to the study.  ... 
doi:10.2147/rmhp.s99908 pmid:27313481 pmcid:PMC4890691 fatcat:g5jk7eecdbh3lnkmdgtsxdorrq

Information systems security in special and public libraries: an assessment of status [article]

R. Ismail, A. N. Zainab
2013 arXiv   pre-print
Explores the use of an assessment instrument based on a model named library information systems security assessment model (LISSAM) to assess the 155 status in special and public libraries in Malaysia.  ...  Data used was based on questionnaires distributed to a total of 50 individuals who are responsible for the information systems (IS) or IT in the special and public libraries in Malaysia.  ...  THE LIBRARY INFORMATION SYSTEMS SECURITY ASSESSMENT MODEL (LISSAM) A search in literature for an ISS assessment model in libraries could not be located.  ... 
arXiv:1301.5386v1 fatcat:tvricwc3kba77htdog5oxet6ui

Measurement of Security Dangers in University Network

Umesh Kumar, Chanchala Joshi, Neha Gaud
2016 International Journal of Computer Applications  
This paper assessed the security threats evolve specifically in University's information technology environment; and proposes risk management framework for University computing environment, to guide security  ...  and risk executives through the process of network security management.  ...  The authors are highly thankful to Madhya Pradesh Council of Science and Technology, Bhopal for providing financial grant and support for this research project.  ... 
doi:10.5120/ijca2016911584 fatcat:z4hry37rmnfg7cjr5dfkggbzku

Cybersecurity for digital manufacturing

Dazhong Wu, Anqi Ren, Wenhui Zhang, Feifei Fan, Peng Liu, Xinwen Fu, Janis Terpenny
2018 Journal of manufacturing systems  
This paper presents a review of cybersecurity in digital manufacturing systems from system characterization, threat and vulnerability identification, control, and risk determination aspects as well as  ...  Digital manufacturing aims to create highly customizable products with higher quality and lower costs by integrating Industrial Internet of Things, big data analytics, cloud computing, and advanced robots  ...  Any opinions, findings, and conclusions or recommendations expressed in this paper are those of the authors and do not necessarily reflect the views of the University of Central Florida and the Pennsylvania  ... 
doi:10.1016/j.jmsy.2018.03.006 fatcat:mv6lslot4jcapm6btynk6w6yfa

Convolution Neural Network-Based Higher Accurate Intrusion Identification System for the Network Security and Communication

Zhiwei Gu, Shah Nazir, Cheng Hong, Sulaiman Khan
2020 Security and Communication Networks  
With the development of communication systems, information securities remain one of the main concerns for the last few years.  ...  Intrusion detection is a way of identifying security violations and examining unwanted occurrences in a computer network.  ...  Conflicts of Interest e authors declare no conflicts of interest regarding this paper.  ... 
doi:10.1155/2020/8830903 fatcat:gv4eiuzzd5e4xep47teojn3nqq

CS Measures for Nuclear Power Plant Protection: A Systematic Literature Review

Nabin Chowdhury
2021 Signals  
From our literature analysis, it was evidenced that protecting the digital space in NPPs involves three main steps: (i) identification of critical digital assets; (ii) risk assessment and threat analysis  ...  Continued efforts have been made to develop a variety of measures for the cyber defense of these infrastructures, which often consist in adapting security measures previously developed for other critical  ...  Funding: This research was funded by the Norwegian University of Science and Technology (NTNU). Institutional Review Board Statement: Not applicable. Informed Consent Statement: Not applicable.  ... 
doi:10.3390/signals2040046 fatcat:7nd3jijtvrck3a27fddjnykh6m
« Previous Showing results 1 — 15 out of 24,729 results