To see the other types of publications on this topic, follow the link: Library Security.

Journal articles on the topic 'Library Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Library Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Latuszek, Thomas. "Library Security." Library & Archival Security 15, no. 2 (June 22, 2000): 3–7. http://dx.doi.org/10.1300/j114v15n02_02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bahr, Alice Harrison. "Library Security Training." Library & Archival Security 9, no. 1 (April 21, 1989): 37–43. http://dx.doi.org/10.1300/j114v09n01_06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Abifarin, Amimbola. "Library Stock Security." Library & Archival Security 14, no. 1 (May 15, 1997): 11–19. http://dx.doi.org/10.1300/j114v14n01_02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lincoln, Alan Jay, and Carol Zall Lincoln. "Patterns of Library Security." Library & Archival Security 8, no. 1-2 (September 9, 1987): 115–43. http://dx.doi.org/10.1300/j114v08n01_05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chadwick, William E. "Special Collections Library Security." Journal of Library Administration 25, no. 1 (March 13, 1998): 15–31. http://dx.doi.org/10.1300/j111v25n01_03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Trinkaus-Randall, Gregor. "Library and Archival Security." Journal of Library Administration 25, no. 1 (March 13, 1998): 91–112. http://dx.doi.org/10.1300/j111v25n01_07.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Carey, Jeanne. "Library Security by Design." Library & Archival Security 21, no. 2 (September 11, 2008): 129–40. http://dx.doi.org/10.1080/01960070802201540.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Westenkirchner, Suzy. "Integrated Library Security Systems." Library & Archival Security 21, no. 2 (September 11, 2008): 159–67. http://dx.doi.org/10.1080/01960070802201789.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sokolov, Arkadiy V. "National Security and National Library." Bibliotekovedenie [Library and Information Science (Russia)] 68, no. 3 (July 27, 2019): 231–47. http://dx.doi.org/10.25281/0869-608x-2019-68-3-231-247.

Full text
Abstract:
The purpose of the study is to understand the mission of national library in the system of national security of Russia. The author formulates definition of national security basing on the analysis of state concepts and doctrines of national security. The national library is conceived as a humanistic resource of national security, which is protected from information wars. The author considers the components of national security: the nation at the level of individual, society and state; national values in the form of demographic stability, cultural heritage, favourable environment; hazards — hostile phenomena detrimental to the nation; types of security — the types of activities necessary to overcome external and internal hazards; resources — social institutions that ensure the integrity and sustainable development of the nation. The paper proposes definition of bibliosphere as a super-system (system of systems), carrying out production, preservation, use and further development of the national book communication. The components of bibliosphere are: professionally specialized social institutions (publishing, printing industry, book trade, librarianship, bibliography); bibliophile social and cultural movement; commercial and non-profit associations; government authorities and censorship, etc. Considering the doctrine of information security, the author notes that bibliosphere is not an element of information sphere and an object of information security. Culture is presented as a key factor in national security. The paper characterizes the dilemma of militarization and humanization of society in the post-industrial era and emphasizes the urgency of formation of moral and creative individual. The author grounds the new understanding of social mission of the national library.
APA, Harvard, Vancouver, ISO, and other styles
10

Nielsen, Erland Kolding. "Library Security Management: An Introduction." LIBER Quarterly 12, no. 4 (March 27, 2002): 293. http://dx.doi.org/10.18352/lq.7694.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Beisler, Lynn, Janet Hill, Mandy Janjigian, David Murphy, and Joanne Schmidt. "Emerson College Library Security Guidelines." Library & Archival Security 10, no. 1 (August 10, 1990): 43–54. http://dx.doi.org/10.1300/j114v10n01_04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Arndt, Donald A. "Problem Patrons and Library Security." Legal Reference Services Quarterly 19, no. 1-2 (May 2001): 19–40. http://dx.doi.org/10.1300/j113v19n01_03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Arcand, Janet. "Security and the digital library." Library Collections, Acquisitions, & Technical Services 24, no. 2 (June 2000): 344–46. http://dx.doi.org/10.1080/14649055.2000.10765683.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Ewing, David. "Library Security in the UK." Library Management 15, no. 2 (March 1994): 18–26. http://dx.doi.org/10.1108/01435129410052409.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Rasslan, Mohamed, Mahmoud Nasreldin, Ghada Elkabbany, and Aya Elshobaky. "On the Security of the Sensor Cloud Security Library (SCSlib)." Journal of Computer Science 14, no. 6 (June 1, 2018): 793–803. http://dx.doi.org/10.3844/jcssp.2018.793.803.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Alemna, Anaba. "Library Security, Book Theft and Mutilation." Library & Archival Security 11, no. 2 (January 26, 1993): 23–35. http://dx.doi.org/10.1300/j114v11n02_02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Smith, Frederick E. "Questionable Strategies in Library Security Studies." Library & Archival Security 6, no. 4 (February 20, 1985): 43–53. http://dx.doi.org/10.1300/j114v06n04_05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Calvert, Philip. "Library Security: Better Communication, Safer Facilities." Electronic Library 34, no. 3 (June 6, 2016): 550–51. http://dx.doi.org/10.1108/el-11-2015-0227.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Ketchum, David. "Library Security: Better Communication, Safer Facilities." Journal of Access Services 14, no. 3 (February 22, 2017): 159–60. http://dx.doi.org/10.1080/15367967.2017.1290531.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Zhao, Li, and Yun Zi. "The Network Security Management Problem of Library." Advanced Materials Research 760-762 (September 2013): 1241–43. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.1241.

Full text
Abstract:
The application and development of computer network system bring a great convenience for library management and readers. At the same time, the security of computer network system in library is faced with all kinds of threats. How to guarantee the security of library computer network system has become the most important question for each library. This paper analyzes the factors which affect the library network security, such as network hardware, network operating system and application system, data security and so on, and puts forward corresponding security strategies and solutions.
APA, Harvard, Vancouver, ISO, and other styles
21

Shafack, Rosemary M. "Securing Library and Information Resources: The Situation in Two State University Libraries in Cameroon." European Journal of Education and Pedagogy 2, no. 1 (January 11, 2021): 25–31. http://dx.doi.org/10.24018/ejedu.2021.2.1.13.

Full text
Abstract:
Information services such as the library, under normal international standards should consider safety and security of its infrastructure and resources (human resources inclusive) as part of its workflow. Information is expanding and covering untold grounds every day and information bearing facilities are equally being transformed with the help of Information and Communication Technologies (ICTs) whose evolution seem to know no bounds. This trend is not only changing the role of the Library and Information Professional but urging this professional to ensure the security of access to the information resources platform. Thus it is not only worthwhile to collect, organize and make accessible information resources but it is equally important to secure these resources to last long and prevent unauthorized and unethical access. This therefore calls for a carefully developed security policy for every information service that can be updated as knowledge expands and the ICT platform continue to expand and evolve. Such a policy should be well thought out to cover all the forms information takes and include, print, electronic and graphics. It should equally include securing the human resources implicated in the running and using of the Library services. This paper is an investigation of the challenges faced in securing information resources in public university libraries in Anglophone Cameroon. The research design used for the study is a survey with data collecting instruments made of a questionnaire and an interview guide from library staff and library administrators respectively. Three main research questions were coined for the study having as thrust the following: security challenges faced, security policies put in place to secure library resources and difficulties libraries face in providing appropriate security and how these difficulties could be solved. The analysis of the data collected was done by a simple calculation of the percentages of the responses of the respondents to determine the threats and the extent of each threat. Academic libraries have been plagued with security issues for a long time. It is difficult to replace materials that are under security threats in libraries. Theft, mutilation and unauthorised access to libraries and their resources constitute serious problems which affect users. It is important that libraries with physical security systems reinforce these systems with electronic security systems. More effort is needed to properly train and encourage staff to be security conscious and to take the necessary precautionary measures. It is anticipated that if the right measures are put in place to resolve library security issues, libraries would be able to better protect their resources and render better services.
APA, Harvard, Vancouver, ISO, and other styles
22

Zhou, Xiao Yan, Zhi Hua Hu, and Jian Kun Shun. "Security Architecture of Digital Library Research in General Knowledge Environment." Applied Mechanics and Materials 198-199 (September 2012): 601–5. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.601.

Full text
Abstract:
Ubiquitous service is a bran-new service idea and model of digital library. It emphasizes that the library should be centered on users, provide services at anytime and anywhere, and be embedded into user's work. The ubiquitous service model of digital library is mainly embodied in the mobile library service, the user environment-embedded service, the “cloud computing” -based service and the global network library service. Combined with the relevant application examples, this paper expatiates on and analyzes the basic types, characteristics and application status of digital library ubiquitous service. The Digital Library of the security threats facing and the reasons, according to OSI security architecture, examining the safety and security objectives of digital library, based on the principle of new casks, from the security strategy of several major Digital Library in the process of data security issues and propose appropriate safety measures and solutions, is intended to strengthen the library data from various aspects of information security.
APA, Harvard, Vancouver, ISO, and other styles
23

Sun, Ning Ning, and Li Hua Ma. "Research and Maintenance of Computer Network Security." Applied Mechanics and Materials 687-691 (November 2014): 2431–34. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2431.

Full text
Abstract:
This paper of University Library in the computer network security situation analysis, proposed the threat factors of current university library computer network security faces, proposed the university library computer software maintenance and maintenance measures to ensure the safety of computer network application system in the library.
APA, Harvard, Vancouver, ISO, and other styles
24

Forrest, Dan. "Book Review: Case Studies in Library Security." Library Resources & Technical Services 49, no. 4 (October 1, 2005): 287–88. http://dx.doi.org/10.5860/lrts.49n4.287.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Lincoln, Alan Jay. "Library Legislation Related to Crime and Security." Library & Archival Security 10, no. 2 (January 24, 1991): 77–101. http://dx.doi.org/10.1300/j114v10n02_05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Lincoln, Alan Jay. "Library Legislation Related to Crime and Security." Library & Archival Security 11, no. 1 (August 26, 1991): 71–101. http://dx.doi.org/10.1300/j114v11n01_06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Lincoln, Alan Jay. "Library Legislation Related to Crime and Security." Library & Archival Security 11, no. 2 (January 26, 1993): 37–48. http://dx.doi.org/10.1300/j114v11n02_03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Nicewamer, Metta, and Shelley Heaton. "Providing Security in an Urban Academic Library." Library & Archival Security 13, no. 1 (September 7, 1995): 9–19. http://dx.doi.org/10.1300/j114v13n01_02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Harwell, Jonathan H. "Library Security Gates: Effectiveness and Current Practice." Journal of Access Services 11, no. 2 (April 3, 2014): 53–65. http://dx.doi.org/10.1080/15367967.2014.884876.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Wang, Xu. "Research on Security Management of Library Computer Network System." Applied Mechanics and Materials 687-691 (November 2014): 1720–23. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1720.

Full text
Abstract:
With the rapid development of network science and technology, people are dependent on the network and usage greatly improved, but the network to bring convenience, but it also brings a lot of network security issues, it has become a constraint library computer network construction greatest limiting factor. This paper describes the impact of the library computer network system security management of specific issues, according to the system requirements of practical application, in terms of the system operating environment, hardware systems, software systems, network systems and system data, such as design of the library computer network system security policy and implementation are discussed. Through the library computer network security threats faced by the system proposed safety management, regulations are important to ensure the development and implementation of computer network system security. Proposed library computer network system security management strategies, we hope to enhance the library computer network security have some help.
APA, Harvard, Vancouver, ISO, and other styles
31

San Nicolas-Rocca, Tonia, and Richard J. Burkhard. "Information Security in Libraries." Information Technology and Libraries 38, no. 2 (June 17, 2019): 58–71. http://dx.doi.org/10.6017/ital.v38i2.10973.

Full text
Abstract:
Libraries in the United States handle sensitive patron information, including personally identifiable information and circulation records. With libraries providing services to millions of patrons across the U.S., it is important that they understand the importance of patron privacy and how to protect it. This study investigates how knowledge transferred within an online cybersecurity education affects library employee information security practices. The results of this study suggest that knowledge transfer does have a positive effect on library employee information security and risk management practices.
APA, Harvard, Vancouver, ISO, and other styles
32

Wang, Hai Xia. "Study on the Security Strategy of Digital Information – Take our School Library as an Example." Applied Mechanics and Materials 526 (February 2014): 367–71. http://dx.doi.org/10.4028/www.scientific.net/amm.526.367.

Full text
Abstract:
In this paper, we propose a general discussion on the digital library security from the perspectives of management risk, security demand and target, the security architecture of library digital information. The specific solution for implementation is presented for the information security of library digital information in the aspects of hardware infrastructure security, firewall technology, encroachment test, access control, virus protection, data backup and security management.
APA, Harvard, Vancouver, ISO, and other styles
33

Liu, Shuang. "Design of Network System Security System of Digital Library." Applied Mechanics and Materials 644-650 (September 2014): 3212–15. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.3212.

Full text
Abstract:
Digital library is a development direction of library, which has attracted the attention of the countries around the world widely. Digital library is an important part of informationization in university. As an information system, digital library is the backbone of the digital library information resources; the safety of library digital information resources is the key to the normal operation and development of digital library, which is also the guarantee for library to service. How to guarantee the security of information resources and the information system in open network environment has been considered by many people in the industry, the digital library information security has become one of core issues in digital library construction and development.
APA, Harvard, Vancouver, ISO, and other styles
34

Calix, Ricardo A., Sumendra B. Singh, Tingyu Chen, Dingkai Zhang, and Michael Tu. "Cyber Security Tool Kit (CyberSecTK): A Python Library for Machine Learning and Cyber Security." Information 11, no. 2 (February 11, 2020): 100. http://dx.doi.org/10.3390/info11020100.

Full text
Abstract:
The cyber security toolkit, CyberSecTK, is a simple Python library for preprocessing and feature extraction of cyber-security-related data. As the digital universe expands, more and more data need to be processed using automated approaches. In recent years, cyber security professionals have seen opportunities to use machine learning approaches to help process and analyze their data. The challenge is that cyber security experts do not have necessary trainings to apply machine learning to their problems. The goal of this library is to help bridge this gap. In particular, we propose the development of a toolkit in Python that can process the most common types of cyber security data. This will help cyber experts to implement a basic machine learning pipeline from beginning to end. This proposed research work is our first attempt to achieve this goal. The proposed toolkit is a suite of program modules, data sets, and tutorials supporting research and teaching in cyber security and defense. An example of use cases is presented and discussed. Survey results of students using some of the modules in the library are also presented.
APA, Harvard, Vancouver, ISO, and other styles
35

Clark, Sarah. "Book Review: Library Security: Better Communication, Safer Facilities." Reference & User Services Quarterly 55, no. 3 (March 24, 2016): 245. http://dx.doi.org/10.5860/rusq.55n3.245.

Full text
Abstract:
Dr. Steve Albrecht is a renowned security consultant with experience working with and consulting for libraries that are implementing or improving security plans and procedures. He is also a retired San Diego Police reserve sergeant. Library Security: Better Communication, Safer Facilities is a practical book dealing with security and customer service in an era in which workplace violence, mental illness, child neglect, and homelessness are realities for all libraries, regardless of their size or location. Filled with engaging anecdotes and forthright advice, this volume is both readable and useful. Although Albrecht emphasizes issues that are especially common in public libraries, this book provides information beneficial to those working in any kind of library, archive, or information setting that is open to the public.
APA, Harvard, Vancouver, ISO, and other styles
36

Robles, Patricia A. "Security upon moving into a new library building." College & Research Libraries News 57, no. 7 (July 1, 1996): 427–30. http://dx.doi.org/10.5860/crln.57.7.427.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Cain, Mark. "Cybertheft, network security, and the library without walls." Journal of Academic Librarianship 29, no. 4 (July 2003): 245–48. http://dx.doi.org/10.1016/s0099-1333(03)00043-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Zhenning, Yang, Wang Kai, Zhang Liuyang, G. Siva Shanmugam, Ronnie D. Caytiles, and N. Ch S. N. Iyengar. "Library Cloud: Concept and Design with Security Features." International Journal of Software Engineering and Its Applications 11, no. 1 (January 31, 2017): 17–28. http://dx.doi.org/10.14257/ijseia.2017.11.1.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Johansson, David. "Library Material Theft, Mutilation, and Preventive Security Measures." Public Library Quarterly 15, no. 4 (October 1996): 51–66. http://dx.doi.org/10.1300/j118v15n04_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Brown-Syed, Christopher. "Library & Archival Security in the Next Century." Library & Archival Security 14, no. 2 (August 18, 1998): 1–4. http://dx.doi.org/10.1300/j114v14n02_01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Petruželková, Alena. "A Personal Library Screened by the State Security." Acta Musei Nationalis Pragae – Historia litterarum 61, no. 1-2 (September 1, 2016): 93–98. http://dx.doi.org/10.1515/amnpsc-2017-0024.

Full text
Abstract:
Abstract In November 1951, books, manuscripts and other archivalia were confiscated during house searches in the flats of Karel Teige and Eva Ebertová. The confiscated set of books was considered to be lost until 1994, when it was handed over from the State Archives to the Library of the Museum of Czech Literature. The article presents a fragment of Teige’s library in terms of thematic areas and identified provenances (dedications, glosses and additions, stamps, signatures). Another part of the article analyses Teige’s paper ‘Ten Years of Surrealism’, which was presented at a discussion evening of the Left Front and published in the collection Surrealismus v diskusi [Surrealism in Discussion] (1934), and Teige’s corrections and additions found in a copy from the confiscated collection. In the text, Teige systematically removed morphological and syntactic archaisms as well as filler words. In addition, Teige made numerous formulation changes and additions in many places of the text, especially those dealing with the relation of psychoanalysis and surrealism. In these passages and also in a part of his article on the Kharkiv Resolution, Teige refers to A. Breton, he quotes from the First and Second Manifestos of Surrealism, and he maps the Breton / Aragon conflict within the French group. Because of the frequency of the changes in the text, the article covers only selected changes always representing a certain type. Therefore, it is not a textological article, but it turns the attention of Teigean researchers to a previously unknown version of one of Karel Teige’s key texts of from the 1930s.
APA, Harvard, Vancouver, ISO, and other styles
42

Ismail, Roesnita, and Awang Ngah Zainab. "Assessing the status of library information systems security." Journal of Librarianship and Information Science 45, no. 3 (March 11, 2013): 232–47. http://dx.doi.org/10.1177/0961000613477676.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Anderson, Laura Challman, and Jeffrey B. Lotspiech. "Rights Management and Security in the Electronic Library." Bulletin of the American Society for Information Science and Technology 22, no. 1 (January 31, 2005): 21–23. http://dx.doi.org/10.1002/bult.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

李, 若影. "Security Analysis and Verification of the Game Library." Computer Science and Application 08, no. 08 (2018): 1277–91. http://dx.doi.org/10.12677/csa.2018.88138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Lashley, Edwin L. "Library Safety and Security—Campus/Community Police Collaboration." Library & Archival Security 21, no. 2 (September 11, 2008): 195–201. http://dx.doi.org/10.1080/01960070802202027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Antwi, I. K. "The problem of library security: The Bauchi experience." International Library Review 21, no. 3 (July 1989): 363–72. http://dx.doi.org/10.1016/0020-7837(89)90046-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Njoku, Lazarus C., and Eucharia Ken-Agbiriogu. "Towards enhancing national security in Nigeria: The roles of library." Library and Information Perspectives and Research 2, no. 1 (January 2020): 60–70. http://dx.doi.org/10.47524/liprv2i1.5.

Full text
Abstract:
The study investigated the role of the library on national security in Nigeria. It was carried out to identify the extent the library can contribute to national security effectiveness through information sharing, information provision, and public education. This is because if the problem of insecurity must reduce in our society, all the stakeholders, including the library has positive roles to play. The study highlighted the strategies adopted by the library in promoting national security. They include: Moral boosting strategy, selective dissemination of peace information/ education strategy, transformation and change strategy, peace and reconciliation strategy, social integration strategy, national development strategy, and free access to information resources strategy. Based on the these, it was recommended that security agencies should be as a matter of deliberate government policy, work closely with the library in the war against insecurity; library should design a blueprint for security consciousness; and rural libraries/mobile libraries should be more functional to distribute literacy materials to help rural dwellers be better information sensitive in this information driven society.
APA, Harvard, Vancouver, ISO, and other styles
48

Han, Zhengbiao, Shuiqing Huang, Huan Li, and Ni Ren. "Risk assessment of digital library information security: a case study." Electronic Library 34, no. 3 (June 6, 2016): 471–87. http://dx.doi.org/10.1108/el-09-2014-0158.

Full text
Abstract:
Purpose This paper uses the GB/T20984-2007 multiplicative method to assess the information security risk of a typical digital library in compliance with the principle and thought of ISO 27000. The purpose of this paper is to testify the feasibility of this method and provide suggestions for improving information security of the digital library. Design/methodology/approach This paper adopts convenience sampling to select respondents. The assessment of assets is through analyzing digital library-related business and function through a questionnaire which collects data to determine asset types and the importance of asset attributes. The five-point Likert scale questionnaire method is used to identify the threat possibility and its influence on the assets. The 12 respondents include directors and senior network technicians from the editorial department, comic library, children’s library, counseling department and the learning promotion centre. Three different Guttman scale questionnaires, tool testing and on-site inspection are combined to identify and assess vulnerabilities. There were different Guttman scale questionnaires for management personnel, technical personnel and general librarian. In all, 15 management librarians, 7 technical librarians and 72 ordinary librarians answered the vulnerability questionnaire. On-site inspection was conducted on the basis of 11 control domains of ISO 27002. Vulnerabilities were scanned using remote security evaluation system NSFOCUS. The scanning covered ten IP sections and a total of 81 hosts. Findings Overall, 2,792 risk scores were obtained. Among them, 282 items (accounting for 10.1 per cent of the total) reached the high risk level; 2 (0.1 per cent) reached the very high risk level. High-risk items involved 26 threat types (accounting for 44.1 per cent of all threat types) and 13 vulnerability types (accounting for 22.1 per cent of all vulnerability types). The evaluation revealed that this digital library faces seven major hidden dangers in information security. The assessment results were well accepted by staff members of this digital library, which testified to the applicability of this method to a Chinese digital library. Research limitations/implications This paper is only a case study of a typical Chinese digital library using a digital library information security assessment method. More case-based explorations are necessary to prove the feasibility of the assessing strategy proposed in this study. Originality/value Based on the findings of recent literature, the authors found that very few researchers have made efforts to develop methods for calculating the indicators for digital library information security risk assessment. On the basis of ISO 27000 and other related information security standards, this case study proposed an operable method of digital library information security risk assessment and used it to assess a the information security of a typical Chinese digital library. This study can offer insights for formulating a digital library information security risk assessment scale.
APA, Harvard, Vancouver, ISO, and other styles
49

Evans, G. Edward. "Library Security and Safety Handbook20002Bruce A. Shuman. Library Security and Safety Handbook. Chicago, IL: American Library Association 1999. , ISBN: ISBN 0 8389 0714 8 £30.50 paperback." Library Management 21, no. 2 (March 2000): 109–15. http://dx.doi.org/10.1108/lm.2000.21.2.109.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Anday, Audrey, Enrico Francese, Hugo C. Huurdeman, Muharrem Yılmaz, and Dydimus Zengenene. "Information Security Issues in a Digital Library Environment: A Literature Review." Bilgi Dünyası 13, no. 1 (April 30, 2012): 117–37. http://dx.doi.org/10.15612/bd.2012.171.

Full text
Abstract:
This paper aimed to explore the literature on security issues that digital libraries should consider in managing digital resources. Books on information security and network security were consulted as well as several databases such as ERIC, Ebrary, LISA, Science Direct, EbscoHost, ISI, Google Scholar, ProQuest, Emerald Insight, ACM were searched to understand what particular aspect of information security and privacy in digital libraries exist from 2000 - 2010. Security in digital libraries is an issue of the most important, and should be considered carefully in creating policies and strategic plans of institutions wanting to set up a digital library. This paper focused on the four main streams that concerns security in the digital environment, namely: infrastructure, digital content, users and standards and legal issues. This literature review also built upon previous literature reviews, and is one of the few of its kind in the topic.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography