Creating a Security Methods Taxonomy for Information Resource Management
People who are concerned with security are naturally interested in methods of achieving security. This paper proposes an approach to creating a security methods taxonomy which can be used for security management and the management of security-related information resources when security methods are the focus. The framework of the taxonomy is based on facet analysis and a tetra-facet model of security, which identifies four facets of security: subject/scope of security, object of protection, source of insecurity, and method of protection. A taxonomy of security methods can be created by combining two of the facets: source of insecurity and method of protection.
KeywordsSecurity methods Taxonomy Information resource management
- 1.Kang, C., Sanger, D.: NYC: Huawei Is a Target as Trump Moves to Ban Foreign Telecom Gear. The New York Times. https://www.nytimes.com/2019/05/15/business/huawei-ban-trump.html. Accessed 15 May 2019
- 2.Horrigan, B., et al., Security studies. In: Kurtz, L. (ed.) Encyclopedia of Violence, Peace and Conflict. Elsevier, 2nd edn. (2008)Google Scholar
- 4.Library of Congress Classification Outline, https://www.loc.gov/catdir/cpso/lcco/; Library of Congress Subject Headings, https://www.loc.gov/aba/publications/FreeLCSH/freelcsh.html; The 2012 ACM Computing Classification System – Introduction, https://www.acm.org/publications/class-2012; The U.S. Social Security Administration, https://www.ssa.gov/site/menu/en/; The World Bank, http://www.worldbank.org/; The Department of Homeland Security, https://www.dhs.gov/topics
- 6.Douglas, J.F.: Facet analysis. In: Miriam, A.D. (ed.) Encyclopedia of Library and Information Science. Marcel Dekker Inc., New York (2003)Google Scholar
- 7.Elaine, S.: The Intellectual Foundation of Information Organization, p. 139. MIT Press, Cambridge (2000)Google Scholar