Assessing the status of library information systems security
Recommend Documents
mation systems and security research stressed the socio- ... a model named LISSAM (library information systems security assessment model), which comprises ...
Dec 2, 2005 - Center for Information Systems Research ... pirical results concerning the actual contribution of applying IT and information systems in business ...... discipline is then â to a certain degree â reflected in the perception by those
Oct 3, 2005 - highly respected journals and business school support has ...... idea of a computer-based information system that would support ...... Global competition, ..... Richard O. Mason: http://faculty.smu.edu/rmason/Mresume.html.
programs in Information Systems and have been widely reviewed. The standards drew heavily on the existing computer science accreditation standard and.
Information Security Requirements in the Information Systems Planning Process. Aleksandar .... criteria integrity and availability, are almost equally important for ...
Office of the National Security Council, Jurjevska 34, Zagreb, Croatia [email protected]. ... government information systems, especially in the context of ...
Describe the various existing security solutions in an open network environment.
... Ref 1: "Security in Computing (Fourth Edition)", Charles P. Pfleeger, Prentice- ...
ing techniques: a questionnaire containing anteced- ent factors, and ... the questionnaire and to ensure that the questionnaire ..... The practically of super bowl.
Describe the various existing security solutions in an open network environment.
... Ref 1: "Security in Computing (Fourth Edition)", Charles P. Pfleeger, Prentice- ...
However, the bulk of the research in FNs is on homogeneous balanced FNs [3], since the DES falls into this category. As a direct consequence, the research ...
THOMAS J. RODHOUSE,1,6 PATRICIA C. ORMSBEE,2 KATHRYN M. IRVINE,3 LEE A. VIERLING,4 JOSEPH M. SZEWCZAK,5. AND KERRI T. VIERLING. 1.
Procedia Computer Science 100 ( 2016 ) 979 â 986 ... enterprises assess their information systems with some techniques and tools. .... monitoring, assessments, maintenance and development by the organization in a standardized ... customer relations
The information and communication technologies advances made available enormous and vast amounts ... Keywords: Information System Risks, Audit, Security.
13335 also included ISO/IEC TR 13335-2:1997 [6] that has been withdrawn and ..... ISO/IEC 9797-1:1999 [58] specifies six MAC algorithms that use a secret key and an n-bit ..... authentication -- Part 6: Mechanisms using manual data transfer.
risks, and to prepare a security policy for clinical information systems. 1.1 Scope
of ..... Examples in current and proposed NHS systems include: • the proposed ...
Information Technology. Information Security ... Information Security Vulnerability
Assessment Program. Version: 1.2 .... See Appendices for sample reporting.
information security culture frameworks and assessment in addition to a detailed ... Available frameworks have focused on the information security culture in an.
Aug 9, 2014 - Background: Radiology Information System (RIS) coordinates the organizational processes and administrative based .... master patient index.
54 - Journal of Applied Information Science and Technology, (2), 2008. Assessing the .... would help them master the skills involved in effective use of ...
SCIENTIFIC AND TECHNICAL INFORMATION PROCESSING Vol. 43 No. 1 2016. THE ONTOLOGICAL STATUS OF TRUST IN INFORMATION SECURITY. 59.
Nov 20, 2014 - Development Assistance to Refugee Hosting Areas. DFID. Department for ...... sufficient to guarantee social protection in both good and bad times ..... budget to finance social security in the social development and other sectors. ....
Issuu is a digital publishing platform that makes it simple to publish magazines catalogs newspapers books and more onli
Maintenance ... Computer-based system for managing the practical works in the lab (has been ... to apply computer- and Internet-assisted teaching and learning;.
effect analysis pertaining to the auditing best practices, cost effectiveness, and ... especially B2B, to be successful, each of the participants requires security.
Assessing the status of library information systems security
a model named LISSAM (library information systems security assessment model), which .... implementation of technological measures, and 'good' on ..... 3) NOT libraries at primary or secondary schools, therefore NOT school libraries.
77676
LIS45310.1177/0961000613477676Journal of Librarianship and Information ScienceIsmail and Zainab
Article
Assessing the status of library information systems security
Abstract This study proposes an instrument to assess the current information system security status in libraries. The instrument is based on a model named LISSAM (library information systems security assessment model), which comprises five components: technological security foundation, information security policy, procedures and control, administrative tools, methods, and awareness creation. The instrument was pilot-tested with 50 respondents responsible for information systems or information technology in their libraries. All components received Cronbach alpha scores of