Information Security and Risk Control Model Based on Plan-Do-Check-Action for Digital Libraries
DOI:
https://doi.org/10.13052/jcsm2245-1439.1326Keywords:
PDCA, Digital library, Information security, Risk control model, SVM, PSOAbstract
To continuously and effectively control the potential risk factors of digital libraries, further improve the quality of digital library usage, ensure the smooth operation and information security of digital libraries, a security and risk factor control model for digital libraries based on the Plan-Do-Check-Action is constructed. A digital library security and risk identification model based on improved support vector machines is constructed. Based on the obtained risk identification results, a Plan-Do-Check-Action management model is implemented for information security in digital libraries. The R2L dataset in the network attack dataset is used for training and testing model performance. Then the proposed method is applied to two different digital libraries. The average accuracy of the risk identification model proposed in the research is 96.46%. The risk error of each level is maintained within 0.4%, which is within an acceptable range. The proposed method has a high recognition effect. It can be used to identify common security and risk issues encountered in digital libraries, and improve the information security performance.
Downloads
References
Shandilya S, Arora J, Vinayak K. PMDECS approach of red bin analysis – the art of problem solving in manufacturing industry. International Journal of Six Sigma and Competitive Advantage, 2023,14(3):300–329.
Wolverton Jr. E R, Karen D, Dorkhosh M. Digital library of University of Tehran: opportunities and challenges. Journal of Electronic Resources Librarianship, 2022,34(4):332–336.
Juan S, Wei C, Yang S, Yuan C M. Plan, Do, Check, Act (PDCA) Cycle Nursing Model Reduces the Risk of Hemangioma in Hemodialysis Patients. Iranian journal of public health, 2021,50(12):2560–2566.
Yanez P C A, Macias S G, Clavijo V M M, Patino R C E, Carazas F J G. Excellence model for the maintenance area in Heavy-Duty Truck Company. IFAC PapersOnLine, 2022,55(19):163–168.
Miriam M. Metadata in the digital library: building an integrated strategy with XML. Journal of the Australian Library and Information Association, 2023,72(1):110–111.
Xue B. Application of the PDCA Cycle for Nursing Safety Management in Radiology Department. Journal of Radiology Nursing, 2023,42(2):241–244.
Sally M, David C, Maria V. Using the PDCA cycle to uncover sources of mental health disparities for Hispanics. International Journal of Mental Health Nursing, 2022,32(2):556–566.
Jie C, Cai W H, Feng L, Chen X C, Chen R, Ruan Z W. Application of the PDCA Cycle for Managing Hyperglycemia in Critically Ill Patients. Diabetes therapy: research, treatment and education of diabetes and related disorders, 2022,14(2):293–301.
Amaral Vitória P A F, Bruna R. Internal Logistics Process Improvement using PDCA: A Case Study in the Automotive Sector. Business Systems Research Journal, 2022,13(3):100–115.
Antoaneta S, Velichka M, Daniel S, et al. Food Safety Management System (FSMS) Model with Application of the PDCA Cycle and Risk Assessment as Requirements of the ISO 22000:2018 Standard. Standards, 2022,2(3):329–351.
Elizarov A. M, Lipachev. E. K. Obachevskii Digital Library in the Scientific Space of Mathematical Knowledge. Scientific and Technical Information Processing, 2023,50(1):35–39.
Kaba A, Refae E A G, Eletter S, Yasmin T. Testing a proposed ROI for academic libraries. Library Hi Tech News, 2023,40(4):15–18.
Azam N. User experience and information architecture of the National Digital Library and archives of Iran: a usability investigation and card sorting. The Electronic Library, 2023,41(1):30–44.
Samaneh K, Saeed S R, Amir G. Services personalization in digital academic libraries: a Delphi study. Digital Library Perspectives, 2023,39(1):39–61.
Xie I, Babu R, Wang S, et al. Assessment of digital library design guidelines to support blind and visually impaired users: a study of key stakeholders’ perspectives. The Electronic Library, 2022,40(6): 646–661.
Sasmita P, Jyotshna S. A Literature Review on Digitization in Libraries and Digital Libraries. Preservation, Digital Technology & Culture, 2022,51(1):17–26.
Xu F, Du T J. Research on the drivers of undergraduates’ intention to use university digital libraries: affinity theory as an additional construct of information system success mode. Library Hi Tech, 2022,40(6): 1627–1641.
Peter H, Chris B, Caroline G. Turning the lean world upside down. International Journal of Lean Six Sigma, 2022,13(5):989–1024.
Wang X, Cheng M, Eaton J, et al. Fake node attacks on graph convolutional networks. Journal of Computational and Cognitive Engineering, 2022,1(4):165–173.
Andrea B, Stefano C. Leonardo’s Library: A Digital Library for Studying Leonardo da Vinci. International Information & Library Review, 2022,54(2):182–187.
Maria A T, Michele T, Monica M, et al. What Do Users Think of the Digital Library? Analyzing Community’s Sentiment during Covid-19. International Information & Library Review, 2023,55(1):66–76.
Harry A. Book Review: Law, Insecurity and Risk Control: Neo-Liberal Governance and the Populist Revolt. Social & Legal Studies, 2022,31(3):501–505.
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Journal of Cyber Security and Mobility
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.