Developing a taxonomic framework of security methods for security management and information resource management
Journal of Strategic Security, ISSN: 1944-0472, Vol: 13, Issue: 2, Page: 64-77
2020
- 4Citations
- 1,301Usage
- 21Captures
Metric Options: CountsSelecting the 1-year or 3-year option will change the metrics count to percentiles, illustrating how an article or review compares to other articles or reviews within the selected time period in the same journal. Selecting the 1-year option compares the metrics against other articles/reviews that were also published in the same calendar year. Selecting the 3-year option compares the metrics against other articles/reviews that were also published in the same calendar year plus the two years prior.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Metrics Details
- Citations4
- Citation Indexes4
- Usage1,301
- Downloads868
- Abstract Views433
- Captures21
- Readers21
- 21
Article Description
People who are concerned with security (such as security professionals) are naturally interested in methods of achieving security. This paper proposes an approach to creating a taxonomic framework of security methods. The taxonomic framework is developed using facet analysis based on a tetra-facet model of security, which identifies four facets of security: subject/scope of security, object of protection, source of insecurity, and method of protection. The taxonomic framework of security methods is created by combining two of the facets: source of insecurity and method of protection. The taxonomic framework of security methods can be integrated with the taxonomic framework of security (which was developed in a previous study), and can be used for security management and the management of information resources related to security and security methods.
Bibliographic Details
http://www.scopus.com/inward/record.url?partnerID=HzOxMe3b&scp=85087659703&origin=inward; http://dx.doi.org/10.5038/1944-0472.13.2.1787; https://scholarcommons.usf.edu/jss/vol13/iss2/4; https://digitalcommons.usf.edu/jss/vol13/iss2/4; https://digitalcommons.usf.edu/cgi/viewcontent.cgi?article=1787&context=jss; https://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1787&context=jss; https://dx.doi.org/10.5038/1944-0472.13.2.1787; https://digitalcommons.usf.edu/jss/vol13/iss2/4/
University of South Florida Libraries
Provide Feedback
Have ideas for a new metric? Would you like to see something else here?Let us know