Event Title
Loading...
Paper Type
Complete
Abstract
With contextualizing security requirements of digital libraries (DLs) being the focus of this study, we extend our previous work by evaluating multiple digital libraries in validation of our security model. Our model for security evaluation of digital libraries captures specific security considerations unique to complex information systems, specifically digital library systems. Under five security assessment criteria that we identified, an assessment tool (a checklist), which was developed based on guidelines, security standards and literature, captures both tool-based (technical) and qualitative assessment requirements for evaluating DLs. We select three widely used, open-source digital software (DSpace, Eprints and Greenstone) and conduct both vulnerability scanning and expert review of their security features using our checklist. The comparative results, which attest to DSpace’s superior security features, goes to further demonstrate that our model can be used to effectively evaluate digital libraries.
Recommended Citation
Ngwum, Nnatubemugo Innocent; Raina, Sagar; Onwujekwe, Gerald; Taylor, Blair; and Kaza, Siddharth, "Security Evaluation of Digital Libraries" (2020). AMCIS 2020 Proceedings. 24.
https://aisel.aisnet.org/amcis2020/info_security_privacy/info_security_privacy/24
Security Evaluation of Digital Libraries
With contextualizing security requirements of digital libraries (DLs) being the focus of this study, we extend our previous work by evaluating multiple digital libraries in validation of our security model. Our model for security evaluation of digital libraries captures specific security considerations unique to complex information systems, specifically digital library systems. Under five security assessment criteria that we identified, an assessment tool (a checklist), which was developed based on guidelines, security standards and literature, captures both tool-based (technical) and qualitative assessment requirements for evaluating DLs. We select three widely used, open-source digital software (DSpace, Eprints and Greenstone) and conduct both vulnerability scanning and expert review of their security features using our checklist. The comparative results, which attest to DSpace’s superior security features, goes to further demonstrate that our model can be used to effectively evaluate digital libraries.
When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.