At its June 2016 Meeting 139, the DDC Editorial Policy Committee (EPC) approved new and modified subdivisions for 005.8 Computer security:
005.82 Countermeasures to threats
005.824 Data encryption
005.83 Access control
005.87 Threats
005.88 Malware
[Note: 005.86 Data backup and recovery is unchanged.]
The new provisions were published in WebDewey in November 2016; you can find details by going to Updates to DDC 23 and looking for 005-005.88_20161117_DDC23. You can track changes in WebDewey by looking at the history notes displayed in the History box. For example, the History box for 005.83 Access control has an expansion note:
The History box for 005.88 Malware has a relocation note:
The relocation of malware allows countermeasures to be grouped together in 005.82-005.86, while threats are grouped together in 005.87-005.88. If there are no instructions to the contrary, a work that focuses on countermeasures applied to a specific threat will be classed with the threat, following the rule of application.
Here are examples of works that can be classed in the new numbers. [Note: some of the works have been classed in the new number, while others were classed in the old number before the new number became available.]
005.824 Data encryption
Simple steps to data encryption: A practical guide to secure computing
Practical cryptography: Algorithms and implementations using C++
005.83 Access control
Firewalls: Jumpstart for network and systems administrators
005.87 Threats
Advanced persistent threat hacking: The art and science of hacking any organization
Distributed denial of service attack and defense
005.88 Malware
Ransomware: Defending against digital extortion
Windows virus and malware troubleshooting
That last example reflects the class-with-the-last preference order specified at 004-006 Computer science; computer programming, programs, data; special computer methods:
Unless other instructions are given, class a subject with aspects in two or more subdivisions of 004-006 in the number coming last, e.g., external storage for personal computers 004.56 (not 004.16), data security in client-server computing 005.8 (not 004.36), natural language processing in full-text database management systems 006.35 (not 005.759)
Works on malware in personal computers with the operating system Microsoft Windows are classed in 005.88 Malware, not in 005.446 Personal computers--operating systems.
A new number for Internet governance was approved in June 2016 and published in WebDewey in November 2016: 384.334 Internet governance. To track the change, see the History box in the WebDewey record for 384.334:
The new number is a subdivision of 384.33 Activities and services, which is a subdivision of 384.3 Computer communication. The Manual note at 004.678 vs. 006.7, 025.042, 384.33 Internet and World Wide Web says:
Use 384.33 for works on Internet access providers and works on economic and public policy issues concerning the Internet.
Works classed in 384.334 Internet governance deal with economic and public policy issues concerning governance of the Internet. Here are examples of works that can be classed in the new number.
384.334 Internet governance
Networks and states: The global politics of Internet governance
Comments