Information Security and Risk Control Model Based on Plan-Do-Check-Action for Digital Libraries

被引:0
|
作者
Yin Y. [1 ]
机构
[1] Library & Archives, North Sichuan Medical College, Nanchong
来源
关键词
digital library; information security; PDCA; PSO; risk control model; SVM;
D O I
10.13052/jcsm2245-1439.1326
中图分类号
学科分类号
摘要
To continuously and effectively control the potential risk factors of digital libraries, further improve the quality of digital library usage, ensure the smooth operation and information security of digital libraries, a security and risk factor control model for digital libraries based on the Plan-Do-Check-Action is constructed. A digital library security and risk identification model based on improved support vector machines is constructed. Based on the obtained risk identification results, a Plan-Do-Check-Action management model is implemented for information security in digital libraries. The R2L dataset in the network attack dataset is used for training and testing model performance. Then the proposed method is applied to two different digital libraries. The average accuracy of the risk identification model proposed in the research is 96.46%. The risk error of each level is maintained within 0.4%, which is within an acceptable range. The proposed method has a high recognition effect. It can be used to identify common security and risk issues encountered in digital libraries, and improve the information security performance. © 2024 River Publishers.
引用
收藏
页码:305 / 326
页数:21
相关论文
共 50 条
  • [31] Information Security Governance: A model based on the Direct-Control Cycle
    von Solms, Rossouw
    Solms, S. H. Basie von
    COMPUTERS & SECURITY, 2006, 25 (06) : 408 - 412
  • [32] Network security situation assessment model based on information quality control
    Ren J.
    Ren, Junjun (renjunjun9855@163.com), 1600, Totem Publishers Ltd (16): : 673 - 680
  • [33] Information security defense method of electric power control system based on digital watermark
    Zhou, Chao
    Guo, Yajuan
    Huang, Wei
    Jiang, Haitao
    Li, Bin
    Chen, Jinming
    PROCEEDINGS OF THE 2016 3RD INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING, MANUFACTURING TECHNOLOGY AND CONTROL, 2016, 67 : 174 - 179
  • [34] A design for information security risk evaluation and control platform based on audit Methodology
    Wei, Zhong
    Ye, Ming
    PROCEEDINGS OF THE 2007 CONFERENCE ON SYSTEMS SCIENCE, MANAGEMENT SCIENCE AND SYSTEM DYNAMICS: SUSTAINABLE DEVELOPMENT AND COMPLEX SYSTEMS, VOLS 1-10, 2007, : 2281 - 2285
  • [35] A VIKOR technique based on DEMATEL and ANP for information security risk control assessment
    Yang, Yu-Ping Ou
    Shieh, How-Ming
    Tzeng, Gwo-Hshiung
    INFORMATION SCIENCES, 2013, 232 : 482 - 500
  • [36] Detection of Information Security Breaches in a Digital Production System Based on the Component Interaction Model
    Pavlenko, E. Yu.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (08) : 1020 - 1022
  • [37] Detection of Information Security Breaches in a Digital Production System Based on the Component Interaction Model
    E. Yu. Pavlenko
    Automatic Control and Computer Sciences, 2019, 53 : 1020 - 1022
  • [38] Risk model development for information security in organization environment based on business perspectives
    Prajna Deshanta Ibnugraha
    Lukito Edi Nugroho
    Paulus Insap Santosa
    International Journal of Information Security, 2021, 20 : 113 - 126
  • [39] Reliability analysis of risk model metrics based on business approach in information security
    Ibnugraha P.D.
    Nugroho L.E.
    Santosa P.I.
    Ingenierie des Systemes d'Information, 2020, 25 (04): : 475 - 480
  • [40] A Markov-Based Model for Information Security Risk Assessment in Healthcare MANETs
    Saini Das
    Arunabha Mukhopadhyay
    Debashis Saha
    Samir Sadhukhan
    Information Systems Frontiers, 2019, 21 : 959 - 977