Please wait a minute...
New Technology of Library and Information Service  2010, Vol. 26 Issue (7/8): 39-44    DOI: 10.11925/infotech.1003-3513.2010.07-08.08
article Current Issue | Archive | Adv Search |
Control of Information Security Risk in Digital Libraries
Huang Shuiqing  Ren Ni
(College of Information Science and Technology,Nanjing Agricultural University,  Nanjing 210095,China)
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

According to characteristics and the realistic need of digital library, the paper takes the common criteria of ISO27002 as a standard, summarizes some control measures for information security management of digital library. Then it screens out the core control elements and referenced control elements about information security in digital library, and carries out risk control on digital library from organization control and technology control.

Key wordsDigital library      Information security      Risk control     
Received: 27 May 2010      Published: 19 September 2010
: 

G251

 
Corresponding Authors: Huang Shuiqing     E-mail: sqhuang@njau.edu.cn
About author:: Huang Shuiqing Ren Ni

Cite this article:

Huang Shuiqing Ren Ni. Control of Information Security Risk in Digital Libraries. New Technology of Library and Information Service, 2010, 26(7/8): 39-44.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2010.07-08.08     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2010/V26/I7/8/39

[1] 北京知识安全工程中心.信息安全风险评估——概论、方法和实践[M].北京:中国标准出版社,2007:40-43.
[2] ISO/IEC 27001:2005, Information Technology—Security Techniques—Information Security Management Systems—Requirements[S]. Geneva: International Organization for Standardization, 2005.
[3] ISO/IEC 27002:2005,Information Technology-Security Techniques-Code of Practice for Information Security Management [S]. Geneva: International Organization for Standardization, 2005.
[4] ISO/IEC 27006:2007, Information Technology—Security Techniques—Requirements for Bodies Providing Audit and Certification of Information Security Management Systems[S].Geneva: International Organization for Standardization, 2007.
[5]  张红旗,王新昌,杨英杰,等.信息安全管理[M].北京:人民邮电出版社,2007:98-116.

[1] Zhu Guang,Feng Mining,Zhang Weiwei. Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach[J]. 数据分析与知识发现, 2018, 2(6): 13-24.
[2] Qi Yunfei,Zhao Yuxiang,Zhu Qinghua. Linked Data for Mobile Visual Search System of Digital Library[J]. 数据分析与知识发现, 2017, 1(1): 81-90.
[3] Hong Liang,Qian Chen,Fan Xing. Context-aware Recommendation System for Mobile Digital Libraries[J]. 现代图书情报技术, 2016, 32(7-8): 110-119.
[4] Liu Jian,Bi Qiang,Ma Zhuo. Assessment of Digital Library’s Micro-services: An Empirical Study[J]. 现代图书情报技术, 2016, 32(5): 22-29.
[5] Chen Guo, Hu Changping. Research on the Structural Features of Keyword Network of Scientific Research Areas:An Empirical Study of LIS[J]. 现代图书情报技术, 2014, 30(7): 84-91.
[6] Xiong Yongjun, Yuan Xiaoyi. Design and Implementation of Automatic Monitoring System about Library Document Database Running State[J]. 现代图书情报技术, 2014, 30(7): 127-132.
[7] Wang Chuanqing, Bi Qiang. System Model of Digital Library Automatic Semantic Annotation Tool[J]. 现代图书情报技术, 2014, 30(6): 17-24.
[8] Wei Meng. Literature Recommendation Using Evolution Patterns[J]. 现代图书情报技术, 2014, 30(4): 20-26.
[9] Hu Changping, Chen Guo. A New Feature Selection Method Based on Term Contribution in Co-word Analysis[J]. 现代图书情报技术, 2013, 29(7/8): 89-93.
[10] Wang Zhongyi, Xia Lixin, Shi Yijin, Zheng Senmao. The Creation and Publishing of Middle Linked Data in Digital Library[J]. 现代图书情报技术, 2013, (5): 28-33.
[11] Liu Wei, Xia Cuijuan, Zhang Chunjing. Big Data and Linked Data: The Emerging Data Technology for the Future of Librarianship[J]. 现代图书情报技术, 2013, (4): 2-9.
[12] Zhou Shanshan, Bi Qiang, Gao Junfeng. A Method of Information Retrieval Results Visualization Based on Social Network Analysis[J]. 现代图书情报技术, 2013, 29(11): 81-85.
[13] Chen Junjie, Huang Guofan. Construction Strategy and Main Technology of the Mobile Library APP——Take iOS for Instance[J]. 现代图书情报技术, 2012, (9): 75-80.
[14] Dong Li, Zeng Ting, Chen Wu, Jiang Airong. A Review of ICADL 2011[J]. 现代图书情报技术, 2012, 28(7): 33-39.
[15] Qiao Jianzhong. Statistical Characteristics Based Web Page Relevance Judgment Strategy for the “Type” Topics Crawled[J]. 现代图书情报技术, 2012, 28(6): 9-16.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn