Staff performance Competencies and Information Security: An Analysis of the Role of Library Software System Development
Subject Areas : Information SystemsHojjatallah abadtalab 1 , Safiyeh Tahmasebi Limooni 2 , Mitra Ghiasi 3
1 - Department of Information Knowledge and Science,
Babul Branch, Islamic Azad University, Babol, Iran
2 - Department of Information Knowledge and Science, Babol Branch, Islamic Azad University, Babol, Iran
3 - Department of Information Knowledge and Science, Babol Branch, Islamic Azad University, Babol, Iran
Keywords:
Abstract :
Abbasi, Z. (2006). Integrated open source library systems. . Library and information Sciences, 8(3), 108-101
Abdullahi, A. (2009). The role of managers and organizations in creativity and innovation. Hesoon, 16, 70-85.
Aebi, D., & Largo, R. (1996). Reengineering Library Data. In: Cheung T., Fong J., Siu B. (eds) Database Reengineering and Interoperability. . Springer. https://doi.org/https://doi.org/10.1007/978-1-4615-1803-7_6
Ahmad, Z., Ong, T. S., Liew, T. H., & Norhashim, M. (2019). Security monitoring and information security assurance behaviour among employees: An empirical analysis. Information & Computer Security, 27(2), 165-188. https://doi.org/https://doi.org/10.1108/ICS-10-2017-0073
Akhavan, F., & Radfar, R. (2020). Information Security Maturity Assessment Model in the IT Departments of the Oil Industry Subsidiaries in Iran. Roshd-E-Fanavari, 16(64), 41-51 https://www.sid.ir/en/Journal/ViewPaper.aspx?ID=811585
Ani, O. E., Esin, J. E., & Edem, N. (2005). Adoption of information and communication technology (ICT) in academic libraries: A strategy for library networking in Nigeria. The Electronic Library, 23(6), 701-708. https://doi.org/ https://doi.org/10.1108/02640470510635782
Bharwani, S., & Talib, P. (2017). Competencies of hotel general managers: A conceptual framework. International Journal of Contemporary Hospitality Management, 29(1), 393-418. . https://doi.org/https://doi.org/10.1108/IJCHM-09-2015-0448
Cheng, K. (2005). Surviving Hacker Attacks Proves That Every Cloud Has a Silver Lining. Computers in libraries, 25(3), 6-8.
Chu, A. M. Y., & Chau, P. Y. K. (2014). Development and validation of instruments of information security deviant behavior. Decision Support Systems, 66, 93-101. https://doi.org/10.1016/j.dss.2014.06.008
Da Veiga, A., & Martins, N. (2015). Information security culture and information protection culture: A validated assessment instrument. Computer Law & Security Review, 31(2), 243-256. https://doi.org/10.1016/j.clsr.2015.01.005
Dianati, M., & Erfani, M. (2010). Competency; Concepts and applications. Tadbir( 208), 14-19
Doroudi, F., & Jamshidi, Z. (2021). Assessing the Components of Information Security in Accessing & Use of Digital Libraries. Iranian Journal of Information Processing and Management, 37(1), 117-134.
Ehtesham, A., Jahangiri, A., Agha-Mohammad-Ali Shirazi, M., & Zahedi, S. M. (2019). Developing a Model to Assess Managers’ General Competencies in the Iranian State-Owned Banks [Research]. Journal of Management and Development Process, 32(2), 63-90 https://doi.org/10.29252/jmdp.32.2.63
Elias, J. D., & Lubua, E. W. (2021). The Impact of Usability, Functionality and Reliability on Users’ Satisfaction During Library System Adoption. The Journal of Informatics, 1(1).
Ghanadinezhad, F. (2019). Evaluating the Competencies of University Library Managers: Case Study: University Libraries Managers of Ahvaz. Knowledge Retrieval and Semantic Systems, 6(21), 91-112. https://doi.org/https://jks.atu.ac.ir/article_10808.html?lang=en#:~:text=10.22054/JKS.2020.50197.1279
Ghazizadeh, H. (2008). Criteria for the capability of a library software to cover the needs of the lending sector with an emphasis on information management. . Library and information., 12 (1), 118- 199. . http://lis.aqr-libjournal.ir/article_43635.html
Graves KJ, & Martin ER. (1998). Re-engineering the library for improved access to electronic health information: One research library's experience. INSPEL, 32(3), 182-188.
Habibi, S., Zeinolabedini, M., Asnafi, A. R., & Emrani, E. (2019). An Exploration of Viewpoints of Librarians and Assessments of Data Entry Management in Intra-Organizational Library Software. Sciences and Techniques of Information Management, 5(1), 81-104. https://doi.org/10.22091/stim.2019.1378
Haji Zain Al-Abedini, M., Pazouki, F., & Davoodzadeh Salestani, D. (2012). Library Software in Iran Nashr-e Ketabdar.
Hariri, N., & Nazari, Z. (2012). Information security in Iran's digital libraries. Library and information Sciences, 16(2), 61-89.
Hatami Ghoushchi, A., Daneshfard, K., Toloui Ashlaghi, A., & Rahnamay Roodposhti, F. J. J. o. S. M. (2021). Prioritizing the Dimensions, Components and Indicators of the Intellectual Capital Model in State Banks with the Competency Approach of Managers. Journal of System Management, 7(3), 53-65. https://doi.org/https://dx.doi.org/10.30495/jsm.2021.1942510.1536
Honan, B. (2006). IT security–commoditized, badly. Infosecurity Today, 3(5), 41. https://doi.org/https://dx.doi.org/10.22059/jitm.2015.52454
Hosseini, N., Pourkiyani, M., & Sheikhi, A. (2019). Analysis on Relationship Among Competency and Succession Planning in Telecommunication Infrastructure Company of Iran (TICIR). Journal of System Management, 5(2), 147-166.
Khorshidi, A., & Ekrami, M. (2012). Identification of factors forming managers’ competencies. Police Management Studies Quarterly, 6(4), 580-592 https://doi.org/https://dx.doi.org/https://doi.org/10.34785/J010.2020.359
Lo, C.-C., & Chen, W.-J. (2012). A hybrid information security risk assessment procedure considering interdependences between controls. Expert Systems with Applications, 39(1), 247-257. https://doi.org/https://doi.org/10.1016/j.eswa.2011.07.015
Malekolkalami, M. (2014). Evaluation of the central libraries information security management at governmental universities located in Tehran, according to the international standard ISO/IEC 27002. Iranian Journal of Information Processing & Management (JIPM), 28(4), 895-916. https://doi.org/https://doi.org/10.1016/j.eswa.2011.07.015
Mohaghegh, N., Alibeyk, M., & Soltani, S. (2017). Determination of Criteria for Selection of Web-based Library Software. J Manage Med Inform Sch, 3(2), 219-228.
Mohammadnejad, M., & Saboohi Laki, B. (2015). Investigate the importance of information security management system and its standards. The First World Conference on Management, Accounting Economics and Humanities at the beginning of the Third Millennium.,
Morady Khalil, A., Safari, E., & Krimayy, A. A. (2019). Dimensions, components and productivity indicators in protective organizations. Police Protection and Security Studies Quarterly, 13(49), 1-32
Mousavi, P., Yousefizenouz, R., & Hasanpoor, A. (2015). Identifying Organizational Information Security Risks Using Fuzzy Delphi. Journal of Information Technology Management, 7(1(1)), 163-184. https://doi.org/https://dx.doi.org/10.22059/jitm.2015.53555
Nazareth, D. L., & Choi, J. (2015). A system dynamics model for information security management. Information & Management, 52(1), 123-134. https://doi.org/https://doi.org/10.1016/j.im.2014.10.009
Nemati Maryam, Khodabakhshi Mohammad, & Heidari, A. (2020). The relationship between knowledge management and human resource management and its impact on the competitive advantage of organizations Sixth National Conference on Management Research and Humanities in Iran, Tehran. https://civilica.com/doc/913996
Oyovwe-Tinuoye, G. O., Omeluzor, S. U., & Patrick, I. O. (2021). Influence of ICT skills on job performance of librarians in university libraries of South-South, Nigeria. Information Development, 37(3), 345-358. https://doi.org/https://doi.org/10.1177%2F0266666920983393
Parirnala, N. (2003). Graphical user interface to multiple biological databases. . 14th International Workshop on Database and Expert Systems Applications (DEXA'03), September 1-5, 2003, Prague, Czech Republic.
Taghva, M. R., Jafarian, A., & Shafiei Nikabadi, M. (2012). The Role of Information Security Management Systems in Supply Chain Performance Improvement [Research]. Iranian Journal of Information Processing and Management, 27(1), 463-482 http://jipm.irandoc.ac.ir/article-1-1764-en.html
Tahmasebi Limooni, S., Emami, M., & Ghiasi, M. (2017). Viewpoint of Librarians in Babol, Ahvaz, and Shahid Beheshti Universities of Medical Sciences towards Pars Azarakhsh Digital Software: A Comparative Study. J Mazandaran Univ Med Sci, 27(152), 175-184. http://jmums.mazums.ac.ir/article-1-8748-en.html
Tahmasebi Limooni, S., & Tabibian, F. (2020). Exlaipning and comparing university library competency assessment patterns and it effect on improving performances. Journal of Studies in Library and Information Science, 12(3 (33)), -. https://doi.org/https://dx.doi.org/10.22055/slis.2019.27678.1544
Tajeddini, O., & Sadat Moosavi, A. (2010). Books of the Central Library of Shahid Bahonar University of Kerman: Subject Dispersion and Usage Report. National Studies on Librarianship and Information Organization, 21(3), 152-163. http://nastinfo.nlai.ir/article_201_50658ab7ef0bc4384a5565f44fd1a7ab.pdf?lang=en
TamjidYamcholo, A., & Toloie Eshlaghy, A. (2022). Subjectivity Reduction of Qualitative Approach in Information Security Risk Analysis. Journal of System Management, 8(1), 145-166. https://doi.org/https://dx.doi.org/10.30495/jsm.2022.1945866.1578
Tsohou, A., & Holtkamp, P. (2018). Are users competent to comply with information security policies? An analysis of professional competence models. Inf. Technol. People, 31(4). https://doi.org/10.1108/ITP-02-2017-0052
Tu, C. Z., Yuan, Y., Archer, N., & Connelly, C. E. (2018). Strategic value alignment for information security management: A critical success factor analysis. Information & Computer Security, 26(2), 150-170. https://doi.org/https://doi.org/10.1108/ICS-06-2017-0042
Vermeulen, C., & Von Solms, R. (2002). The information security management toolbox–taking the pain out of security management. Information management & computer security, 10(3), 119-125. https://doi.org/https://doi.org/10.1108/09685220210431872