Search published articles


Showing 1 results for Unauthorized Access

Parichehr Agha Seyyedjavadi, Mehdi Alipour-Hafezi,
Volume 3, Issue 1 (6-2016)
Abstract

Background and Aim: Easing the probability of violation of intellectual property rights and unauthorized access of digital resources is one of the most important consequences of  information and communication technologies like Internet. The purpose of this research is to identify the state of Using Digital Right Management technology in IRANDOC ETD system.

Method: This research is an applied research and has done by case study research method. Data collection tool that is used in this research is a checklist that primarily prepared by NSA INFOSEC IAM.

Results: Findings of the research represented in three sections. Section one is related to needed information for security assessment of electronic theses and dissertation (ETD) system in IRANDOC. Data was collected by structured interview and observation. Section two covered data that collected by OICM matrix. In fact information categories in organization flowchart and value of each one in organization goals were identified. Section three is related to identify the threats and their effects that organization encountered with.

Conclusion: Results of the research demonstrate that, as a matter of security infrastructures, IRANDOC is located in an unfavorable condition. Consequently factors such as unauthorized access, forms of management, lack of prosecution and so on threaten their services. Therefore they eagerly need using techniques such as DRM for collecting, managing, maintenance and dissemination



Page 1 from 1     

© 2024 CC BY-NC 4.0 | Human Information Interaction

Designed & Developed by : Yektaweb