Implementation of the ISO 27001:2013 standard in an academic library: case of Meru University of Science and Technology/ (Record no. 88061)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01560nam a22002177a 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | KE-MeUCS |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20220908154915.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 220908b xxu||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | |
| 022 ## - INTERNATIONAL STANDARD SERIAL NUMBER | |
| Source | |
| 040 ## - CATALOGING SOURCE | |
| Transcribing agency | KE-MeUCS |
| Modifying agency | KE-MeUCS |
| 050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
| Classification number | |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Gibendi, Ruth |
| 245 ## - TITLE STATEMENT | |
| Title | Implementation of the ISO 27001:2013 standard in an academic library: case of Meru University of Science and Technology/ |
| Statement of responsibility, etc | Ruth Gibendi, Elijah Walubuka and |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication, distribution, etc | Meru: |
| Name of publisher, distributor, etc | Meru University of Science and Technology, |
| Date of publication, distribution, etc | 2022. |
| 490 ## - SERIES STATEMENT | |
| Series statement | MUSTIC2022 |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | Academic libraries are often considered the ‘heart’ of academic institutions. They are charged with provision of a range of resources, services, tools and software that are increasingly made available online. With information as the key resource under its responsibility, information security is a pertinent component to assure its confidentiality, integrity and availability. This paper describes the process of implementing the ISO 27001:2013 Information Security Standard for the library system of Meru University of Science and Technology. Theoretical models in information security in the library are examined. Next, details of the approach undertaken in meeting the requirements of the standard are discussed. The benefits gained and challenges that were faced are presented The lessons gained herein will assist similar institutions seeking to get certified using this standard. |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Walubuka, Elijah |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Diki, Paul Mutethia |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Library of Congress Classification |
| Koha item type | Article |
| Cataloguer | Mercy Musungu |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Cataloger | Shelving control number | Total Checkouts | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Library of Congress Classification | Meru University | Meru University | Open Shelves | 08/09/2022 | Mercy Musungu | 08/09/2022 | 08/09/2022 | Article |