Professional Documents
Culture Documents
Portia Mngqibisa - 14443919 - 0
Portia Mngqibisa - 14443919 - 0
Portia Mngqibisa - 14443919 - 0
Surname: Mngqibisa
Assignment 1
1
Question 1
Smart Shelves: These shelves equipped with sensors monitor book usage and
organize materials based on popularity or categorization. Libraries can utilize smart
shelves to optimize space utilization, improve collection management, and provide
personalized recommendations to patrons based on their browsing habits.
2
Environmental Monitoring Systems: IoT sensors measure environmental factors like
temperature, humidity, and air quality to ensure optimal conditions for preserving
library materials and providing a comfortable environment for patrons. By monitoring
environmental parameters in real-time, libraries can prevent damage to sensitive
materials and maintain a conducive study atmosphere.
Smart Lighting Solutions: IoT-enabled lighting systems adjust brightness levels and
energy consumption based on occupancy and natural light conditions. Libraries can
implement smart lighting solutions to enhance energy efficiency, reduce operational
costs, and create a welcoming ambiance for users.
Occupancy Sensors: These sensors track the utilization of library spaces and
seating arrangements, allowing libraries to optimize resource allocation and improve
user experience. By analyzing occupancy data, libraries can identify peak hours,
allocate staff resources effectively, and implement social distancing measures during
crowded periods.
1. Facebook: Libraries can create Facebook events for upcoming workshops, author
talks, or book clubs, and invite users to attend. They can also share photos, videos,
and testimonials to showcase library resources and services.
2. Twitter: Libraries can use Twitter to share quick updates, links to relevant articles
or research, and engage in conversations with users using trending hashtags related
to library topics or academic interests.
4.LinkedIn: Libraries can utilize LinkedIn to connect with faculty, researchers, and
3
professionals in the academic community, share research guides or scholarly
articles, and highlight library services tailored to academic needs.
5. YouTube: Libraries can create instructional videos, virtual tours, or book trailers to
engage users and provide valuable content. They can also collaborate with faculty
or student groups to produce educational content related to research and information
literacy skills.
4
Question 2
(a) According to Narayanan et al., (2018: 354) claims that cybersecurity threat refers
to any potential danger or malicious activity that targets computer systems,
networks, or data, aiming to compromise their integrity, confidentiality, or availability.
Cybersecurity threats encompass various forms of attacks, including malware
infections, phishing scams, data breaches, and denial-of-service (DoS) attacks,
which pose significant risks to the security and functionality of library systems and
networks.
(b) Firewall Implementation: Deploying robust firewalls helps control incoming and
outgoing network traffic, filtering out malicious connections and unauthorized access
attempts. By configuring firewall rules and regularly updating firewall software,
libraries can mitigate the risk of intrusion and protect sensitive data from
unauthorized access (Farid, Warraich & Iftikhar, 2023).
Employee Training and Awareness: Educating library staff about cybersecurity best
practices, such as identifying phishing emails, creating strong passwords, and
adhering to data security protocols, is essential for preventing human errors and
insider threats. By conducting cybersecurity awareness training sessions and
simulated phishing exercises, libraries can enhance staff vigilance and
responsiveness to potential threats.
6
Zero-Day Exploits: Vulnerabilities in software or hardware that are unknown to
vendors or developers can be exploited by cybercriminals to launch targeted attacks
against library systems, bypassing existing security controls.
These examples highlight the diverse nature of cybersecurity threats facing libraries
and underscore the importance of implementing proactive measures to safeguard
against potential risks and vulnerabilities.
7
References:
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015).
Internet of Things: A survey on enabling technologies, protocols, and applications.
IEEE Communications Surveys & Tutorials, 17(4), 2347-2376.
McKinsey Global Institute. (2015). The Internet of Things: Mapping the value beyond
the hype. Retrieved
from https://www.mckinsey.com/~/media/McKinsey/Business%20Functions/McKinse
y%20Digital/Our%20Insights/The%20Internet%20of%20Things%20The%20value%2
0of%20digitizing%20the%20physical%20world/MGI-The-Internet-of-things-Mapping-
the-value-beyond-the-hype.ashx
Guillemin, P., & Friess, P. (2013). Internet of things strategic research roadmap. In
Internet of Things—Global Technological and Societal Trends (pp. 9-52). Springer,
Berlin, Heidelberg.
Farid, G., Warraich, N. F., & Iftikhar, S. (2023). Digital information security
management policy in academic libraries: A systematic review (2010–2022).
published in the Journal of Information Science.
Narayanan, S. N., Ganesan, A., Joshi, K., Oates, T., Joshi, A., & Finin, T. (2018).
Early detection of cybersecurity threats using collaborative cognition. presented at
the 2018 IEEE 4th International Conference on Collaboration and Internet
Computing (CIC).
Razzaq, A., Hur, A., Ahmad, H. F., & Masood, M. (2013). Cyber security: Threats,
reasons, challenges, methodologies and state of the art solutions for industrial
applications. presented at the 2013 IEEE Eleventh International Symposium on
Autonomous Decentralized Systems (ISADS).
Zadeh, A. H., Jeyaraj, A., & Biros, D. (2020). Characterizing cybersecurity threats to
organizations in support of risk mitigation decisions. e-Service Journal.
8
Annexure B: DECLARATION
Assignment 01 2024
I declare that this is my own, original work prepared specifically for module AIS2604
and that all the sources I have used or quoted have been indicated and
acknowledged by means of complete reference.
(Signature)
P. MNGQIBISA
(Name)
Portia Mngqibisa
(Date)
29/03/2024