Loading...

Media is loading
 

Paper Type

Complete

Abstract

With contextualizing security requirements of digital libraries (DLs) being the focus of this study, we extend our previous work by evaluating multiple digital libraries in validation of our security model. Our model for security evaluation of digital libraries captures specific security considerations unique to complex information systems, specifically digital library systems. Under five security assessment criteria that we identified, an assessment tool (a checklist), which was developed based on guidelines, security standards and literature, captures both tool-based (technical) and qualitative assessment requirements for evaluating DLs. We select three widely used, open-source digital software (DSpace, Eprints and Greenstone) and conduct both vulnerability scanning and expert review of their security features using our checklist. The comparative results, which attest to DSpace’s superior security features, goes to further demonstrate that our model can be used to effectively evaluate digital libraries.

Share

COinS
 
Aug 10th, 12:00 AM

Security Evaluation of Digital Libraries

With contextualizing security requirements of digital libraries (DLs) being the focus of this study, we extend our previous work by evaluating multiple digital libraries in validation of our security model. Our model for security evaluation of digital libraries captures specific security considerations unique to complex information systems, specifically digital library systems. Under five security assessment criteria that we identified, an assessment tool (a checklist), which was developed based on guidelines, security standards and literature, captures both tool-based (technical) and qualitative assessment requirements for evaluating DLs. We select three widely used, open-source digital software (DSpace, Eprints and Greenstone) and conduct both vulnerability scanning and expert review of their security features using our checklist. The comparative results, which attest to DSpace’s superior security features, goes to further demonstrate that our model can be used to effectively evaluate digital libraries.

When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.