Information Security and Risk Control Model Based on Plan-Do-Check-Action for Digital Libraries

Authors

  • Yimin Yin Library & Archives, North Sichuan Medical College, Nanchong, 637000, China

DOI:

https://doi.org/10.13052/jcsm2245-1439.1326

Keywords:

PDCA, Digital library, Information security, Risk control model, SVM, PSO

Abstract

To continuously and effectively control the potential risk factors of digital libraries, further improve the quality of digital library usage, ensure the smooth operation and information security of digital libraries, a security and risk factor control model for digital libraries based on the Plan-Do-Check-Action is constructed. A digital library security and risk identification model based on improved support vector machines is constructed. Based on the obtained risk identification results, a Plan-Do-Check-Action management model is implemented for information security in digital libraries. The R2L dataset in the network attack dataset is used for training and testing model performance. Then the proposed method is applied to two different digital libraries. The average accuracy of the risk identification model proposed in the research is 96.46%. The risk error of each level is maintained within 0.4%, which is within an acceptable range. The proposed method has a high recognition effect. It can be used to identify common security and risk issues encountered in digital libraries, and improve the information security performance.

Downloads

Download data is not yet available.

Author Biography

Yimin Yin, Library & Archives, North Sichuan Medical College, Nanchong, 637000, China

Yimin Yin, an associate researcher and deputy director of the Library and Archives of North Sichuan Medical College, and a member of the Scientific Research Integrity Construction Working Committee of China Society for Scientific and Technical Information (CSSTI), received his bachelor’s degree in Information Management and Information Systems from Southwest Normal University in 2004 and master’s degree in Software Engineering from the University of Electronic Science and Technology of China in 2012, and has published more than 30 papers and edited 1 textbook. He interested in the study of library resource construction, information services, and information security.

References

Shandilya S, Arora J, Vinayak K. PMDECS approach of red bin analysis – the art of problem solving in manufacturing industry. International Journal of Six Sigma and Competitive Advantage, 2023,14(3):300–329.

Wolverton Jr. E R, Karen D, Dorkhosh M. Digital library of University of Tehran: opportunities and challenges. Journal of Electronic Resources Librarianship, 2022,34(4):332–336.

Juan S, Wei C, Yang S, Yuan C M. Plan, Do, Check, Act (PDCA) Cycle Nursing Model Reduces the Risk of Hemangioma in Hemodialysis Patients. Iranian journal of public health, 2021,50(12):2560–2566.

Yanez P C A, Macias S G, Clavijo V M M, Patino R C E, Carazas F J G. Excellence model for the maintenance area in Heavy-Duty Truck Company. IFAC PapersOnLine, 2022,55(19):163–168.

Miriam M. Metadata in the digital library: building an integrated strategy with XML. Journal of the Australian Library and Information Association, 2023,72(1):110–111.

Xue B. Application of the PDCA Cycle for Nursing Safety Management in Radiology Department. Journal of Radiology Nursing, 2023,42(2):241–244.

Sally M, David C, Maria V. Using the PDCA cycle to uncover sources of mental health disparities for Hispanics. International Journal of Mental Health Nursing, 2022,32(2):556–566.

Jie C, Cai W H, Feng L, Chen X C, Chen R, Ruan Z W. Application of the PDCA Cycle for Managing Hyperglycemia in Critically Ill Patients. Diabetes therapy: research, treatment and education of diabetes and related disorders, 2022,14(2):293–301.

Amaral Vitória P A F, Bruna R. Internal Logistics Process Improvement using PDCA: A Case Study in the Automotive Sector. Business Systems Research Journal, 2022,13(3):100–115.

Antoaneta S, Velichka M, Daniel S, et al. Food Safety Management System (FSMS) Model with Application of the PDCA Cycle and Risk Assessment as Requirements of the ISO 22000:2018 Standard. Standards, 2022,2(3):329–351.

Elizarov A. M, Lipachev. E. K. Obachevskii Digital Library in the Scientific Space of Mathematical Knowledge. Scientific and Technical Information Processing, 2023,50(1):35–39.

Kaba A, Refae E A G, Eletter S, Yasmin T. Testing a proposed ROI for academic libraries. Library Hi Tech News, 2023,40(4):15–18.

Azam N. User experience and information architecture of the National Digital Library and archives of Iran: a usability investigation and card sorting. The Electronic Library, 2023,41(1):30–44.

Samaneh K, Saeed S R, Amir G. Services personalization in digital academic libraries: a Delphi study. Digital Library Perspectives, 2023,39(1):39–61.

Xie I, Babu R, Wang S, et al. Assessment of digital library design guidelines to support blind and visually impaired users: a study of key stakeholders’ perspectives. The Electronic Library, 2022,40(6): 646–661.

Sasmita P, Jyotshna S. A Literature Review on Digitization in Libraries and Digital Libraries. Preservation, Digital Technology & Culture, 2022,51(1):17–26.

Xu F, Du T J. Research on the drivers of undergraduates’ intention to use university digital libraries: affinity theory as an additional construct of information system success mode. Library Hi Tech, 2022,40(6): 1627–1641.

Peter H, Chris B, Caroline G. Turning the lean world upside down. International Journal of Lean Six Sigma, 2022,13(5):989–1024.

Wang X, Cheng M, Eaton J, et al. Fake node attacks on graph convolutional networks. Journal of Computational and Cognitive Engineering, 2022,1(4):165–173.

Andrea B, Stefano C. Leonardo’s Library: A Digital Library for Studying Leonardo da Vinci. International Information & Library Review, 2022,54(2):182–187.

Maria A T, Michele T, Monica M, et al. What Do Users Think of the Digital Library? Analyzing Community’s Sentiment during Covid-19. International Information & Library Review, 2023,55(1):66–76.

Harry A. Book Review: Law, Insecurity and Risk Control: Neo-Liberal Governance and the Populist Revolt. Social & Legal Studies, 2022,31(3):501–505.

Downloads

Published

2024-02-12

How to Cite

1.
Yin Y. Information Security and Risk Control Model Based on Plan-Do-Check-Action for Digital Libraries. JCSANDM [Internet]. 2024 Feb. 12 [cited 2024 May 15];13(02):305-26. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/23931

Issue

Section

EIC Select