Please wait a minute...
New Technology of Library and Information Service  2010, Vol. 26 Issue (7/8): 33-38    DOI: 10.11925/infotech.1003-3513.2010.07-08.07
article Current Issue | Archive | Adv Search |
Assessment of Information Security Risk in Digital Libraries
Huang Shuiqing  Mao Yihong  Xiong Jian
(College of Information Science and Technology,Nanjing Agricultural University,  Nanjing 210095,China)
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

In accordance with the ISO27000 series standards, this paper proposes the measures of digital library information security risk assessment. On the basis of distinguishing and evaluating the digital library assets, threats and vulnerabilities, this paper calculates and analyzes the risks which digital library faces with, puts forward the measures of dividing risk levels, and forms the model of digital library information security risk assessment.

Key wordsDigital library      Information security      Information security management      Risk assessment     
Received: 27 May 2010      Published: 19 September 2010
: 

G251

 
Corresponding Authors: Huang Shuiqing     E-mail: sqhuang@njau.edu.cn
About author:: Huang Shuiqing Mao Yihong Xiong Jian

Cite this article:

Huang Shuiqing Mao Yihong Xiong Jian. Assessment of Information Security Risk in Digital Libraries. New Technology of Library and Information Service, 2010, 26(7/8): 33-38.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2010.07-08.07     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2010/V26/I7/8/33

[1] ISO/IEC 27001:2005, Information Technology—Security Techniques—Information Security Management Systems—Requirements[S].Geneva: International Organization for Standardization, 2005.
[2] 张红旗,王新昌,杨英杰,等.信息安全管理[M].北京:人民邮电出版社,2007:64-68.
[3] 范红.信息安全风险评估规范国家标准理解与实施[M].北京:中国标准出版社,2008:37-44.
[4] 赵战生,谢宗晓.信息安全风险评估:概念、方法和实践[M].北京:中国标准出版社,2007:46-60.
[5] GB/T 20984-2007,信息安全技术 信息安全风险评估规范[S].北京:国家质量监督检验检疫总局,2007.

[1] Zhu Guang,Feng Mining,Zhang Weiwei. Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach[J]. 数据分析与知识发现, 2018, 2(6): 13-24.
[2] Liu Minghui. Risk Assessment of Civil Aviation Terrorism Based on K-means Clustering[J]. 数据分析与知识发现, 2018, 2(10): 21-26.
[3] Feng Wen’gang,Li Yan,Li Fuhai,Wang Xin,Zhou Xiping. Risk Assessment and Decision Analysis of Civil Aviation Security with Risk Ranking and Decision Tree[J]. 数据分析与知识发现, 2018, 2(10): 27-36.
[4] Qi Yunfei,Zhao Yuxiang,Zhu Qinghua. Linked Data for Mobile Visual Search System of Digital Library[J]. 数据分析与知识发现, 2017, 1(1): 81-90.
[5] Hong Liang,Qian Chen,Fan Xing. Context-aware Recommendation System for Mobile Digital Libraries[J]. 现代图书情报技术, 2016, 32(7-8): 110-119.
[6] Liu Jian,Bi Qiang,Ma Zhuo. Assessment of Digital Library’s Micro-services: An Empirical Study[J]. 现代图书情报技术, 2016, 32(5): 22-29.
[7] Chen Guo, Hu Changping. Research on the Structural Features of Keyword Network of Scientific Research Areas:An Empirical Study of LIS[J]. 现代图书情报技术, 2014, 30(7): 84-91.
[8] Xiong Yongjun, Yuan Xiaoyi. Design and Implementation of Automatic Monitoring System about Library Document Database Running State[J]. 现代图书情报技术, 2014, 30(7): 127-132.
[9] Wang Chuanqing, Bi Qiang. System Model of Digital Library Automatic Semantic Annotation Tool[J]. 现代图书情报技术, 2014, 30(6): 17-24.
[10] Wei Meng. Literature Recommendation Using Evolution Patterns[J]. 现代图书情报技术, 2014, 30(4): 20-26.
[11] Hu Changping, Chen Guo. A New Feature Selection Method Based on Term Contribution in Co-word Analysis[J]. 现代图书情报技术, 2013, 29(7/8): 89-93.
[12] Wang Zhongyi, Xia Lixin, Shi Yijin, Zheng Senmao. The Creation and Publishing of Middle Linked Data in Digital Library[J]. 现代图书情报技术, 2013, (5): 28-33.
[13] Liu Wei, Xia Cuijuan, Zhang Chunjing. Big Data and Linked Data: The Emerging Data Technology for the Future of Librarianship[J]. 现代图书情报技术, 2013, (4): 2-9.
[14] Zhou Shanshan, Bi Qiang, Gao Junfeng. A Method of Information Retrieval Results Visualization Based on Social Network Analysis[J]. 现代图书情报技术, 2013, 29(11): 81-85.
[15] Chen Junjie, Huang Guofan. Construction Strategy and Main Technology of the Mobile Library APP——Take iOS for Instance[J]. 现代图书情报技术, 2012, (9): 75-80.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn