Please wait a minute...
New Technology of Library and Information Service  2010, Vol. 26 Issue (7/8): 27-32    DOI: 10.11925/infotech.1003-3513.2010.07-08.06
article Current Issue | Archive | Adv Search |
Current Situation of Information Security Management in Digital Libraries
Zheng Dejun  Ren Ni  Xiong Jian  Huang Shuiqing
(College of Information Science and Technology, Nanjing Agricultural University,  Nanjing 210095,China)
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

This paper introduces the concepts of information security in digital library and summarizes the findings of academic circles at home and abroad. Based on the survey of  30 public libraries and college libraries which have established digital libraries, this paper analyzes and summarizes the current situations and problems of information security management in domestic digital libraries. 

Key wordsDigital library      Information security      Information security management     
Received: 27 May 2010      Published: 19 September 2010
: 

G251

 
Corresponding Authors: Huang Shuiqing     E-mail: sqhuang@njau.edu.cn
About author:: Zheng Dejun Ren Ni Xiong Jian Huang Shuiqing

Cite this article:

Zheng Dejun Ren Ni Xiong Jian Huang Shuiqing. Current Situation of Information Security Management in Digital Libraries. New Technology of Library and Information Service, 2010, 26(7/8): 27-32.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2010.07-08.06     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2010/V26/I7/8/27

[1] 吴亚非,李新友,禄凯.信息安全风险评估[M].北京:清华大学出版社,2007.
[2] 王春东,杨宏,赵俊阁.信息安全管理[M].武汉:武汉大学出版社,2008.
[3] ISO/IEC 27001:2005,Information Technology-Security Techniques-Information Security Management Systems-Requirements[S].Genevan: International Organization for Standardization,2005:11-12.
[4] 李文渊.谈数字图书馆的网络信息安全[J]. 图书馆论坛, 2003(1):54-56.
[5] 王东波.数字图书馆信息安全策略研究[J]. 江西图书馆学刊, 2004,34(3):76-78.
[6] 黎平国,钟守机. 数字图书馆的信息安全问题与相关对策的探讨[J]. 现代情报, 2005,25(9):73-77.
[7] 张学宏,张振圣.高校图书馆的信息安全问题研究[J].图书情报工作, 2006(z):178-181.
[8] 郭建峰.数字图书馆安全体系探析[J].科技情报开发与经济, 2007(18):7-9.
[9] 李耀辉.试论数字图书馆的信息安全[J].情报探索,2009(9):102.
[10] 徐宽,刘万国,房玉琦.数字图书馆安全特点及影响因素研究[J].现代情报, 2008,28(11):84-86.
[11] 秦浩.浅谈数字图书馆的信息安全管理[J].科技情报开发与经济, 2008(4):40-51.
[12] 刘杰,王志成.王薇.浅谈数字图书馆的网络信息安全[J].现代情报,2005,25(12):87-88.
[13] 黄永跃.数字图书馆的安全防护技术[J].现代情报,2005,25(3):97-99.
[14] 李书宁,马明霞.数字水印技术在数字图书馆安全性问题中的应用[J].现代图书情报技术,2002(1):17-19.
[15] 李文静,王福生.防火墙在图书馆网络中的安全策略[J].现代情报,2008,28(6):72-73.
[16] 王长全,艾雰.云计算时代的数字图书馆信息安全思考[J].图书馆建设,2010(1):51-52.
[17] 王尊新,丛鲁丽.入侵检测系统在图书馆网络安全中的应用研究[J].现代图书情报技术,2004(6): 67-70.
[18] 张鹰,李理,王昆鹏,等.数据库入侵检测技术在数字图书馆中的研究[J].图书与情报,2008(1):67-69.
[19] 张凌云.构建图书馆网络防病毒体系[J].图书馆工作与研究,2004(2):20-22.
[20] 宋红,吴建军,岳俊梅.计算机安全技术[M].北京:中国铁道出版社,2003:143-173.
[21] 赵幽兰.高校数字图书馆网络安全解决方略[J].成都理工大学学报:自然科学版,2007 (3):364-368.
[22] 凌征强.高校图书馆远程访问系统实现技术研究[J].图书馆学研究,2009(5):43-46.
[23] 胡凤娥,吴晓波.数字图书馆信息安全与容灾[J].赣南师范学院学报,2008,29(5):87-88.
[24] Robertson G. Downsizing the Binder: Effective Security Planning for Libraries[J].Feliciter,2003,49(5):263-265.
[25] Ives D J. Security Management Strategies for Protecting Your Library’s Network[J].Computers in Libraries,1996,16(2):36-42.
[26] Tennant R, Coping with Disasters[J].Library Journal, 2001,126(19):26-27.
[27] Gladney H M, Cantu A. Authorization Management for Digital Libraries[J]. Communications of the ACM, 2001, 44(5):63-65.
[28] Eduardo Fernández-Medina, Piattini M. Designing Secure Databases[J]. Information and Software Technology,2005,47(7):463-477.
[29] Drake M A. Safeguarding Patrons’ Privacy[J].Information Today,2003,20(2):35.
[30] 鲁向禹.美国的数字图书馆计划与信息高速公路[J].江西图书馆学刊,1994 (4):72-80.
[31] 李学诗.计算机、信息、安全——计算机系统安全与机密保护[J].吉林大学学报:工学版,1984 (4):19-22.
[32] 吴新年.数字图书馆技术之进展[J].图书与情报,2000 (2):62-68.
[33] 李媛.近五年来数字图书馆信息安全问题研究综述[J].图书馆学研究,2005 (12):12-14.

[1] Zhu Guang,Feng Mining,Zhang Weiwei. Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach[J]. 数据分析与知识发现, 2018, 2(6): 13-24.
[2] Qi Yunfei,Zhao Yuxiang,Zhu Qinghua. Linked Data for Mobile Visual Search System of Digital Library[J]. 数据分析与知识发现, 2017, 1(1): 81-90.
[3] Hong Liang,Qian Chen,Fan Xing. Context-aware Recommendation System for Mobile Digital Libraries[J]. 现代图书情报技术, 2016, 32(7-8): 110-119.
[4] Liu Jian,Bi Qiang,Ma Zhuo. Assessment of Digital Library’s Micro-services: An Empirical Study[J]. 现代图书情报技术, 2016, 32(5): 22-29.
[5] Chen Guo, Hu Changping. Research on the Structural Features of Keyword Network of Scientific Research Areas:An Empirical Study of LIS[J]. 现代图书情报技术, 2014, 30(7): 84-91.
[6] Xiong Yongjun, Yuan Xiaoyi. Design and Implementation of Automatic Monitoring System about Library Document Database Running State[J]. 现代图书情报技术, 2014, 30(7): 127-132.
[7] Wang Chuanqing, Bi Qiang. System Model of Digital Library Automatic Semantic Annotation Tool[J]. 现代图书情报技术, 2014, 30(6): 17-24.
[8] Wei Meng. Literature Recommendation Using Evolution Patterns[J]. 现代图书情报技术, 2014, 30(4): 20-26.
[9] Hu Changping, Chen Guo. A New Feature Selection Method Based on Term Contribution in Co-word Analysis[J]. 现代图书情报技术, 2013, 29(7/8): 89-93.
[10] Wang Zhongyi, Xia Lixin, Shi Yijin, Zheng Senmao. The Creation and Publishing of Middle Linked Data in Digital Library[J]. 现代图书情报技术, 2013, (5): 28-33.
[11] Liu Wei, Xia Cuijuan, Zhang Chunjing. Big Data and Linked Data: The Emerging Data Technology for the Future of Librarianship[J]. 现代图书情报技术, 2013, (4): 2-9.
[12] Zhou Shanshan, Bi Qiang, Gao Junfeng. A Method of Information Retrieval Results Visualization Based on Social Network Analysis[J]. 现代图书情报技术, 2013, 29(11): 81-85.
[13] Chen Junjie, Huang Guofan. Construction Strategy and Main Technology of the Mobile Library APP——Take iOS for Instance[J]. 现代图书情报技术, 2012, (9): 75-80.
[14] Dong Li, Zeng Ting, Chen Wu, Jiang Airong. A Review of ICADL 2011[J]. 现代图书情报技术, 2012, 28(7): 33-39.
[15] Qiao Jianzhong. Statistical Characteristics Based Web Page Relevance Judgment Strategy for the “Type” Topics Crawled[J]. 现代图书情报技术, 2012, 28(6): 9-16.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn