TY - GEN
T1 - Security evaluation of digital libraries
AU - Ngwum, Nnatubemugo
AU - Raina, Sagar
AU - Onwujekwe, Gerald
AU - Taylor, Blair
AU - Kaza, Siddharth
N1 - Publisher Copyright:
© 2020 26th Americas Conference on Information Systems, AMCIS 2020. All rights reserved.
PY - 2020
Y1 - 2020
N2 - With contextualizing security requirements of digital libraries (DLs) being the focus of this study, we extend our previous work by evaluating multiple digital libraries in validation of our security model. Our model for security evaluation of digital libraries captures specific security considerations unique to complex information systems, specifically digital library systems. Under five security assessment criteria that we identified, an assessment tool (a checklist), which was developed based on guidelines, security standards and literature, captures both tool-based (technical) and qualitative assessment requirements for evaluating DLs. We select three widely used, open-source digital software (DSpace, Eprints and Greenstone) and conduct both vulnerability scanning and expert review of their security features using our checklist. The comparative results, which attest to DSpace's superior security features, goes to further demonstrate that our model can be used to effectively evaluate digital libraries.
AB - With contextualizing security requirements of digital libraries (DLs) being the focus of this study, we extend our previous work by evaluating multiple digital libraries in validation of our security model. Our model for security evaluation of digital libraries captures specific security considerations unique to complex information systems, specifically digital library systems. Under five security assessment criteria that we identified, an assessment tool (a checklist), which was developed based on guidelines, security standards and literature, captures both tool-based (technical) and qualitative assessment requirements for evaluating DLs. We select three widely used, open-source digital software (DSpace, Eprints and Greenstone) and conduct both vulnerability scanning and expert review of their security features using our checklist. The comparative results, which attest to DSpace's superior security features, goes to further demonstrate that our model can be used to effectively evaluate digital libraries.
KW - Digital libraries
KW - Security evaluation
KW - Security metrics
UR - https://www.scopus.com/pages/publications/85097712183
M3 - Conference contribution
AN - SCOPUS:85097712183
T3 - 26th Americas Conference on Information Systems, AMCIS 2020
BT - 26th Americas Conference on Information Systems, AMCIS 2020
PB - Association for Information Systems
T2 - 26th Americas Conference on Information Systems, AMCIS 2020
Y2 - 10 August 2020 through 14 August 2020
ER -