Role of Cyber Security in Library Information Centers in India
Main Article Content
Abstract
Information and Communication Technology (ICT) has helped libraries make all their electronic resources accessible to their users. Securing library-subscribed resources from scammers or unauthorized users is a big challenge in the present era. Cyber security is an area that needs to be studied in the present scenario, and the library is no exception. Institutions, including libraries, are one of the targeted areas of ransomware attacks. Library computers, library patrons’ data, and library-subscribed resources are the target of cybercriminals. To overcome this, there is a need for cyber security in academic libraries. With the advance of Information Technology, new threats and unauthorized actions arise each day. To be able to protect information assets against these threats and actions is one of the most important issues nowadays. But sometimes technical and technological measures are not enough to protect an information asset. Additional measures must be employed because there are a lot of parameters when it comes to information security. One of these parameters is people. These people can be system administrators, security professionals, employees, and users. These are the people that interact with the information system. In order to secure the people parameter in an information system, a measure that employs moral judgment must be introduced. Information is power. Nowadays, the main concern of the cyber community is to protect this valuable asset. Technical and technological security measures are sometimes insufficient to protect an information system. Because there is a human factor in an information system. Ethics are a set of moral rules that guide people. With the help of ethics, better and more robust security can be achieved. In this paper, the role of ethics in information security is discussed. First of all, law, ethics, and information security concepts are briefly introduced. Later, some ethical concerns and perspectives in information security are given.
Article Details
Section

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
How to Cite
References
Ngwum, N., Raina, S., Aguon, S., Taylor, B., & Kaza, S. (2020). A model for security evaluation of digital libraries. Journal of The Colloquium for Information Systems Security Education, 7(1)
Aregbesola, A., & Nwaolise, E. L. (2023). Securing digital collections: Cyber security best practices for academic libraries in developing countries.
Mishra, A., Alzoubi, Y. I., Gill, A. Q., & Anwar, M. J. (2022). Cybersecurity enterprises policies: A comparative study. Sensors, 22(2), 1–35. https://doi.org/10.3390/s22020538
Bendiek, A. (2012). European cyber-security policy (SWP Research Paper No. RP 13/2012). Stiftung Wissenschaft und Politik (SWP). https://www.aura.com/learn/how-to-find-out-if-my-information-is-on-the-dark-web
Osho, O., & Onoja, A. D. (2015). National cyber-security policy and strategy of Nigeria: A qualitative analysis. International Journal of Cyber Criminology, 9(1), 120
Brito, J., & Watkins, T. (2011). Loving the cyber bomb: The dangers of threat inflation in cybersecurity policy. Harvard National Security Journal, 3, 39