The progress of web security level related to European open access LIS repositories between 2016 and 2018 
Abstract
This article focuses on the development of European institutional repositories web security in the field of Library and Information Science (LIS). Since the first analysis in June 2016, we have been still using the same three independent online tools to measure the web security score of these repositories. In case of data transfer, the qualitative aspects of the secured HTTPS protocol are as important as implementing the protocol itself. Our analysis is directly related to the previously published article where we examined the selected group of LIS repositories. Now, we are focusing on the summarization of improvements made between 2016-2018. These are based on periodical annual measurements. These may contribute to increasing the security level of repositories not only in Europe, but also with respect to the GDPR (General Data Protection Regulation) regulation which came into force a few months ago. It is significant because the GDPR focuses, inter alia, on the ways of sensitive data transfer over the internet networks.
Keywords
Full Text:
TEXTDOI: http://dx.doi.org/10.4403/jlis.it-12545
NBN: http://nbn.depositolegale.it/urn%3Anbn%3Ait%3Aunifi-25825
References
Adnan, A. et al. 2017. “Compromised User Credentials Detection Using Temporal Features: A Prudent Based Approach”. Proceedings of the 9th International Conference on Computer and Automation Engineering. 104−110. ISBN: 978-1-4503-4809-6. Doi: 10.1145/3057039.3057051.
Duraspace. 2018. DSpace manual [online]. 2018-06-27. Accessed November 09, 2018. Available online: https://github.com/DSpace/DSpace/releases/download/dspace-6.3/DSpace-Manual.pdf.
Enterpreneur Europe. n.d. “HTTP vs. HTTPS: What’s the Difference and Why Should You Care?” [online]. Accessed September 06, 2018. Available online: https://www.entrepreneur.com/article/281633.
Formanek, M. and Zaborsky, M. 2017. “Web Interface Security Vulnerabilities of European Academic Repositories” [online]. Accessed November 15, 2018. Available online: https://www.liberquarterly.eu/articles/10.18352/lq.10178/.
Kalman, G. 2018. “10 Most Common Web Security Vulnerabilities” [online]. Accessed September 15, 2018. Available online: https://www.toptal.com/security/10-most-common-web-security-vulnerabilities.
Sugavanesh, B. et al. 2013. “SHS-HTTPS enforcer: enforcing HTTPS and preventing MITM attacks.” November 2013 ACM SIGSOFT Software Engineering Notes: Volume 38 Issue 6, November 2013, 1−4. Doi: 10.1145/2532780.2532802
Tennant, R. 2017. “Current Cities” [online]. 2017. Accessed September 21, 2018. Available online: http://currentcites.org/2017/cc17.28.2.html.
The Https-Only Standard. n.d. [online]. Accessed September 20, 2018. Available online: https://https.cio.gov/everything/.
Article Metrics
Metrics powered by PLOS ALM
Refbacks
- There are currently no refbacks.
Copyright (c) 2019 Matus Formanek, Erika Sustekova, Vladimir Filip

This work is licensed under a Creative Commons Attribution 4.0 International License.
JLIS.it is a journal of

