Information Security and Risk Control Model Based on Plan-Do-Check-Action for Digital Libraries

被引:0
|
作者
Yin Y. [1 ]
机构
[1] Library & Archives, North Sichuan Medical College, Nanchong
来源
Journal of Cyber Security and Mobility | 2024年 / 13卷 / 02期
关键词
digital library; information security; PDCA; PSO; risk control model; SVM;
D O I
10.13052/jcsm2245-1439.1326
中图分类号
学科分类号
摘要
To continuously and effectively control the potential risk factors of digital libraries, further improve the quality of digital library usage, ensure the smooth operation and information security of digital libraries, a security and risk factor control model for digital libraries based on the Plan-Do-Check-Action is constructed. A digital library security and risk identification model based on improved support vector machines is constructed. Based on the obtained risk identification results, a Plan-Do-Check-Action management model is implemented for information security in digital libraries. The R2L dataset in the network attack dataset is used for training and testing model performance. Then the proposed method is applied to two different digital libraries. The average accuracy of the risk identification model proposed in the research is 96.46%. The risk error of each level is maintained within 0.4%, which is within an acceptable range. The proposed method has a high recognition effect. It can be used to identify common security and risk issues encountered in digital libraries, and improve the information security performance. © 2024 River Publishers.
引用
收藏
页码:305 / 326
页数:21
相关论文
共 21 条
  • [1] Medical Quality Control in a General Hospital Based on Plan-Do-Check-Act Cycle
    Hu, Xinxin
    Shen, Leichai
    Wen, Jing
    Chen, Ren
    Wang, Heng
    Kan, Ming
    Shen, Mi
    JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2020, 10 (12) : 2795 - 2799
  • [2] Information security risk analysis model based on entropy
    Tang, Y. L.
    Xu, G. A.
    Niu, Y. X.
    Yang, Y. X.
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 4, 2008, : 1146 - 1150
  • [3] Internet security: A novel role/object-based access control for digital libraries
    Chen, Su-Shing
    Choo, Chee-Yoong
    Chow, Randy Y.
    JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE, 2006, 16 (02) : 87 - 103
  • [4] The Information Security Risk Assessment Model Based on GA - BP
    Song, Yongqiang
    Shen, Yongjun
    Zhang, Guidong
    Hu, Yuming
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 119 - 122
  • [5] Knowledge Based Model for Holistic Information Security Risk Analysis
    Huang, Jing-Wen
    Ding, Yong-Sheng
    Hu, Zhi-Hua
    Huang, Jing-Wen
    ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 88 - +
  • [6] Study on risk assessment of information security based on cloud computing model
    Wu, Guo-Hua
    Liu, Yu-Cheng
    Qi, Kai-Kai
    Wang, Peng
    Xu, Jian-Da
    Proceedings of the 2016 International Conference on Engineering and Advanced Technology, 2016, 82 : 91 - 95
  • [7] The model of information security risk assessment based on advanced evidence theory
    Qing H.
    Qingsheng X.
    Shaobo L.
    International Journal of System Assurance Engineering and Management, 2017, 8 (Suppl 3) : 2030 - 2035
  • [8] A design for information security risk evaluation and control platform based on audit Methodology
    Wei, Zhong
    Ye, Ming
    PROCEEDINGS OF THE 2007 CONFERENCE ON SYSTEMS SCIENCE, MANAGEMENT SCIENCE AND SYSTEM DYNAMICS: SUSTAINABLE DEVELOPMENT AND COMPLEX SYSTEMS, VOLS 1-10, 2007, : 2281 - 2285
  • [9] A VIKOR technique based on DEMATEL and ANP for information security risk control assessment
    Yang, Yu-Ping Ou
    Shieh, How-Ming
    Tzeng, Gwo-Hshiung
    INFORMATION SCIENCES, 2013, 232 : 482 - 500
  • [10] Detection of Information Security Breaches in a Digital Production System Based on the Component Interaction Model
    Pavlenko, E. Yu.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (08) : 1020 - 1022