Advertisement

Creating a Security Methods Taxonomy for Information Resource Management

  • Yejun WuEmail author
  • Fansong MengEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11853)

Abstract

People who are concerned with security are naturally interested in methods of achieving security. This paper proposes an approach to creating a security methods taxonomy which can be used for security management and the management of security-related information resources when security methods are the focus. The framework of the taxonomy is based on facet analysis and a tetra-facet model of security, which identifies four facets of security: subject/scope of security, object of protection, source of insecurity, and method of protection. A taxonomy of security methods can be created by combining two of the facets: source of insecurity and method of protection.

Keywords

Security methods Taxonomy Information resource management 

References

  1. 1.
    Kang, C., Sanger, D.: NYC: Huawei Is a Target as Trump Moves to Ban Foreign Telecom Gear. The New York Times. https://www.nytimes.com/2019/05/15/business/huawei-ban-trump.html. Accessed 15 May 2019
  2. 2.
    Horrigan, B., et al., Security studies. In: Kurtz, L. (ed.) Encyclopedia of Violence, Peace and Conflict. Elsevier, 2nd edn. (2008)Google Scholar
  3. 3.
    Wu, Y., Meng, F.: Categorizing security from security management and information resource management. J. Strateg. Secur. 11(4), 72–84 (2019)CrossRefGoogle Scholar
  4. 4.
    Library of Congress Classification Outline, https://www.loc.gov/catdir/cpso/lcco/; Library of Congress Subject Headings, https://www.loc.gov/aba/publications/FreeLCSH/freelcsh.html; The 2012 ACM Computing Classification System – Introduction, https://www.acm.org/publications/class-2012; The U.S. Social Security Administration, https://www.ssa.gov/site/menu/en/; The World Bank, http://www.worldbank.org/; The Department of Homeland Security, https://www.dhs.gov/topics
  5. 5.
    Chakrabarti, A., Manimaran, G.: Internet infrastructure security: a taxonomy. IEEE Netw. 16(6), 13–21 (2002)CrossRefGoogle Scholar
  6. 6.
    Douglas, J.F.: Facet analysis. In: Miriam, A.D. (ed.) Encyclopedia of Library and Information Science. Marcel Dekker Inc., New York (2003)Google Scholar
  7. 7.
    Elaine, S.: The Intellectual Foundation of Information Organization, p. 139. MIT Press, Cambridge (2000)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.School of Library and Information ScienceLouisiana State UniversityBaton RougeUSA
  2. 2.College of Information and CommunicationNational University of Defense TechnologyWuhanChina

Personalised recommendations