INFORMATION SECURITY AND WAYS OF ITS SUPPORT AT THE STAGE OF INFORMATION AND TECHNOLOGICAL REVOLUTION

N. Fedorova, V. Smiesova
{"title":"INFORMATION SECURITY AND WAYS OF ITS SUPPORT AT THE STAGE OF INFORMATION AND TECHNOLOGICAL REVOLUTION","authors":"N. Fedorova, V. Smiesova","doi":"10.32843/bses.57-2","DOIUrl":null,"url":null,"abstract":"the characteristics of information and psychological security of the individual are studied and threats to information security and information sovereignty of the individual and society are identified. The main directions of ensuring the information security of the individual are clarified. It turns out that the most effective method of ensuring the information sovereignty of the individual is the formation of so-called “information immunity”. This means formation in the individual the ability to ignore information that he does not need and creates internal psychological barriers to messages with a manipulative component.","PeriodicalId":288313,"journal":{"name":"Black Sea Economic Studies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Black Sea Economic Studies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32843/bses.57-2","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

the characteristics of information and psychological security of the individual are studied and threats to information security and information sovereignty of the individual and society are identified. The main directions of ensuring the information security of the individual are clarified. It turns out that the most effective method of ensuring the information sovereignty of the individual is the formation of so-called “information immunity”. This means formation in the individual the ability to ignore information that he does not need and creates internal psychological barriers to messages with a manipulative component.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
信息技术革命阶段的信息安全及其保障方式
研究信息的特点和个人的心理安全,识别对个人和社会的信息安全和信息主权的威胁。明确了保障个人信息安全的主要方向。事实证明,保障个人信息主权最有效的方法是形成所谓的“信息豁免权”。这意味着在个体中形成忽略他不需要的信息的能力,并对带有操纵成分的信息产生内部心理障碍。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
ENSURING DIGITALIZATION OF BUSINESS PROCESSES OF ENTERPRISES IN THE SPHERE OF INTERNATIONAL BUSINESS ORGANIZATIONAL AND ECONOMIC MECHANISM OF REALIZATION OF THE MODEL OF ECOLOGICALLY BALANCED DEVELOPMENT OF THE RURAL REGION DIGITALIZATION OF BUSINESS IN THE CONTEXT OF INCLUSIVE DEVELOPMENT INNOVATIVE ADVANTAGES OF DIGITAL ECONOMY DEVELOPMENT IN ENTERPRISES INFORMATION SECURITY AND WAYS OF ITS SUPPORT AT THE STAGE OF INFORMATION AND TECHNOLOGICAL REVOLUTION
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1