2006
DOI: 10.1108/10650750610706961
|View full text |Cite
|
Sign up to set email alerts
|

Vandals at the gates

Abstract: PurposeThis paper aims to examine issues surrounding digital stewardship and information security with the digital library.Design/methodology/approachThis paper is exploratory in nature.FindingsThis paper highlights areas in which there needs to be awareness of information security issues in order to protect patrons and library resources.Practical implicationsInformation security is now everyone's business. Librarians who deal heavily in digital content must be active in their stewardship of digital library re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 1 publication
0
6
0
Order By: Relevance
“…Georges (2004), emphasizes issues related to having properly trained staff, types of servers to have, backup of data, damage assessment and recovery and restoring operations. According to Robert Fox (2006), although libraries may assign responsibility for information security to a person or department, it is important for everyone to be aware of the potential risks involved in the security of digital data. There is a need to preserve and guard digital content, prevent digital infiltration and protect electronic infrastructure in a digital library as it is open to the public.…”
Section: Review Of Literaturementioning
confidence: 99%
“…Georges (2004), emphasizes issues related to having properly trained staff, types of servers to have, backup of data, damage assessment and recovery and restoring operations. According to Robert Fox (2006), although libraries may assign responsibility for information security to a person or department, it is important for everyone to be aware of the potential risks involved in the security of digital data. There is a need to preserve and guard digital content, prevent digital infiltration and protect electronic infrastructure in a digital library as it is open to the public.…”
Section: Review Of Literaturementioning
confidence: 99%
“…The methodology for the assessment of information security risks refers to the means and methods of analysis used for the assessment of information security risks, and will affect each step of assessment as well as its final result. In comparison with the numerous studies on such themes as paper-based information security for traditional libraries (Ajegbomogun, 2004; Holt, 2007), information system security (Balas, 2005) and information security for digital libraries (Fox, 2006; Kuzma, 2010), the research on the methodology of assessment of information security risks for digital libraries remains in its incipience, and can be classified into three types.…”
Section: Literature Reviewmentioning
confidence: 99%
“…System security and data protection go hand in hand, part of the same side in what Fox (2006) calls the "two-front war". From one side we must protect our patrons, their privacy and confidentiality as well as their electronic devices.…”
Section: -Data Securitymentioning
confidence: 99%
“…In the backup era, this solution has a drawback: "Ironically that ability to mirror and duplicate digital objects also becomes a liability when data is stolen that was not intended for public consumption" (Fox, 2006). This aspect of digital information is seen as a potential flaw even by Kuny (1997), who notices how "Digital collections facilitate access, but do not facilitate preservation", and by Hedstrom (1998) who claims that "The two terms "mass storage" and "long-term preservation" embody a contradiction in the current state of affairs of digital library development, representing a time bomb that threatens the long-term viability".…”
Section: Data Security Backupmentioning
confidence: 99%
See 1 more Smart Citation