Volume 9, Issue 2 (9-2022)                   Human Information Interaction 2022, 9(2): 35-45 | Back to browse issues page

XML Persian Abstract Print


Abstract:   (1320 Views)
Background and Objective: Information security is of vital importance in most organizations. This is especially central in academic libraries due to the specific type of visitors, exchange and transfer of information to the users. Thus, the purpose   is to investigate the relationship of the development of library software and information security management in the libraries of Islamic Azad Universities.
Research Methodology: This is a correlational study. Sample includes 240 employees of central libraries of the Islamic Azad Universities Iran, who participated in the investigation by census. Data was collected thru Ashourizadeh Information Security Management Questionnaire (2012) and a researcher-made questionnaire on system dynamics. Validity of the tools were confirmed and the reliability for information security management and system dynamics was calculated using Cronbach's alpha coefficient of 0.85 and 0.83, respectively. Data was analyzed by descriptive and inferential statistics via SPSS and Lisrel software.
Results: Findings showed that system dynamics has five main factors: Information storage and retrieval; usability; security; standards and accessibility. From the employees' standpoint, the status of system dynamics, information security management and each of their components in the libraries of Islamic Azad Universities is favorable. Also, there is a positive and significant relationship between the development of library software and information security management
Conclusion: Findings will be useful in identifying the effects of developing the dynamics of library software system in information security management of libraries of Islamic Azad Universities in the country.
 
Full-Text [PDF 573 kb]   (282 Downloads)    
Type of Study: Research | Subject: Special

References
1. Ashurizadeh. S (2012). The relationship between organizational culture and information security management in Bank Melli. Master Thesis in Public Management. Allameh Tabatabai College. Faculty of Management and Account-ing.(Persian)
2. Boranbayev, A., Boranbayev, S., & Nurbekov, A. (2020).Evaluating and Applying Risk Remission Strategy Approaches to Prevent Prospective Fail-ures in Information Systems. In 17th Interna-tional Conference on Information Technology-New Generations (647-651). Springer, Cham. [DOI:10.1007/978-3-030-43020-7_87]
3. Cheng,K.(2005).Surviving hacker attacks proves that every cloud has a Silver Lining.Computers in Libraries.25(3). 6-8, 52-6.
4. Doroudi.F. Jamshidi ,Z.(2021). Assessing the Com-ponents of Information Security in Accessing & Use of Digital Libraries.Iranian Research Institute for Information Science and Technolo-gy(IranDoc). 37(1). 117-134. (Persian). [DOI:10.52547/jipm.37.1.117]
5. https://jipm.irandoc.ac.ir/article-1-4499-en.html
6. Dea Elias, J . Wazoel Lubua, E. (2021). The Im-pact of Usability, Functionality and Reliability on Users' Satisfaction During Library System Adop-tion .The Journal of Informatics, 1(1). 13-21.
7. https://www.researchgate.net/publication/350709661.
8. Ghazizadeh, H. (2008). Criteria for the capability of a library software to cover the needs of the lending sector with an emphasis on information management. Library and information. 12 (1). 118- 99. (Persian). http://lis.aqr-libjournal.ir/article_43635.html
9. Gloria Ogheneghatowho Oyovwe-Tinuoye, Satur-day U. Omeluzor, Ijiekhuamhen Osaze Patrick. (2021).influence of ICT skills on job perfor-mance of librarians in university libraries of South-South, Nigeria. First Published, . 37(3), 345-358. [DOI:10.1177/0266666920983393]
10. Ghasemi Shabankareh, K. Mokhtari, V. Amini La-ri, M (2006). Security and e-commerce. Fourth National Conference on Electronic Commerce. (Persian). https://www.sid.ir/Fa/Seminar/ViewPaper.aspx?ID=5257
11. Haji-Zeinolabedini, M; Pazouki, F; Davoodzadeh Salestani, D (2011). Library Software in Iran, Tehran: Publisher. (Persian)
12. Habibi, S. Haji-Zeinolabedini, M.Asnafi, AR Imra-ni, I .(2017). Study of the status of intra-organizational performance of library software in Iran. Library and information. 21 (4). 90-67. (Persian). http://ensani.ir/fa/article/446938 Doi: 10.30481 / lis.2019.74170.
13. Khaki Ardakani, M. Morvati Sharifabadi, A. Zan-jirchi, SM. (2013). Modeling an agile production system using a system dynamics approach. In-dustrial Management Studies. Issue 32. 201.(Persian)https://www.noormags.ir/view/fa/articlepage/1089991/ .
14. Kadivar,A.Nazari Nodooshan, K.(2015). Infor-mation systems security management with a dy-namic modeling approach. National Conference on Innovation in Systems Management and In-formation Technology with Business Intelligence Approach. (Per-sian).https://www.sid.ir/fa/seminar/ViewPaper.aspx?ID=38203
15. Malekalkalami, M. (2013). Evaluating the perfor-mance of information security management at the central libraries of public universities in Teh-ran: according to the international standard-ISO / IEC. Journal of Information Processing and Management, 28(4): 895-916. (Persian)
16. Mahmoudzadeh, I. Rad raJabi, M. (2005). Securi-ty management in information systems. Iranian Journal of Management Sciences.4 (1). 112-78. (Persian) http://ensani.ir/fa/article/76548/.
17. Mohammadnejad, M. Saboohi Laki, Be (2015). Investigate the importance of information securi-ty management system and its standards. The First World Conference on Management, Ac-counting Economics and Humanities at the be-ginning of the third millennium. (Per-sian)https://www.sid.ir/fa/seminar/ViewPaper.aspx?ID=38274
18. Nazareth ,D L.Cho,J.(2015). A system dynamics model for information security management. In-formation & Management.25(1).123-134.https://www.sciencedirect.com/science/article/abs/pii/S0378720614001335. [DOI:10.1016/j.im.2014.10.009]
19. Rezvani, S.(2017). Designing an information secu-rity management model in digital libraries. Jour-nal of Library and Information Science.8 (1). 356-337. (Persian). https://www.sid.ir/fa/journal/ViewPaper.aspx?id=514055
20. Shafiee Nikabadi, M. Hakaki, A Gholamshahi, S. (2020).A dynamic model for evaluating infor-mation systems security using the systems dy-namics approach. Quarterly Journal of Technol-ogy Development.16 (64). 61-52. (Persian). https://www.sid.ir/fa/Journal/ViewPaper.aspx?id=55233. [DOI:10.52547/jstpi.20820.16.64.52]
21. Tajfar, Amir H. Mahmoudi Meymand, Mo R Soltani, F. (2013). Ranking the obstacles to the implementation of information security man-agement system and examining the readiness of the exploration management of the National Iranian Oil Company in the implementation of this system. Master Thesis. Payame Noor Univer-sity of Tehran Province. (Persian).
22. Tajeddini, O. Sadat Moosavi, A.(2009). Books of the Central Library of Shahid Bahonar Universi-ty of Kerman: Thematic Dispersion and Usage Report. 21 (3). 163-152. (Per-sian).http://nastinfo.nlai.ir/?_action=article&au=10624&_au.
23. Tintamusik. yanarong (2010). Examining the rela-tionship between organization systems and in-formation security awareness. Dissertion for the degree of doctor of business administration. Northcentral universiry
24. Yousefi Zanouz, R. Sajjadi Khosraghi, F. (2016).Risk assessment in the implementation of hospital information system: a case study, health management. 20 (67). 23-7. (Per-sian).https://www.sid.ir/fa/journal/ViewPaper.aspx?id=470075

Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.