Security evaluation of digital libraries

  • Nnatubemugo Ngwum
  • , Sagar Raina
  • , Gerald Onwujekwe
  • , Blair Taylor
  • , Siddharth Kaza

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Abstract

    With contextualizing security requirements of digital libraries (DLs) being the focus of this study, we extend our previous work by evaluating multiple digital libraries in validation of our security model. Our model for security evaluation of digital libraries captures specific security considerations unique to complex information systems, specifically digital library systems. Under five security assessment criteria that we identified, an assessment tool (a checklist), which was developed based on guidelines, security standards and literature, captures both tool-based (technical) and qualitative assessment requirements for evaluating DLs. We select three widely used, open-source digital software (DSpace, Eprints and Greenstone) and conduct both vulnerability scanning and expert review of their security features using our checklist. The comparative results, which attest to DSpace's superior security features, goes to further demonstrate that our model can be used to effectively evaluate digital libraries.

    Original languageEnglish
    Title of host publication26th Americas Conference on Information Systems, AMCIS 2020
    PublisherAssociation for Information Systems
    ISBN (Electronic)9781733632546
    StatePublished - 2020
    Event26th Americas Conference on Information Systems, AMCIS 2020 - Salt Lake City, Virtual, United States
    Duration: Aug 10 2020Aug 14 2020

    Publication series

    Name26th Americas Conference on Information Systems, AMCIS 2020

    Conference

    Conference26th Americas Conference on Information Systems, AMCIS 2020
    Country/TerritoryUnited States
    CitySalt Lake City, Virtual
    Period08/10/2008/14/20

    Keywords

    • Digital libraries
    • Security evaluation
    • Security metrics

    Fingerprint

    Dive into the research topics of 'Security evaluation of digital libraries'. Together they form a unique fingerprint.

    Cite this