国外保障信息保密,为文件运行创造安全条件的经验与实践

Maryna Tsilyna
{"title":"国外保障信息保密,为文件运行创造安全条件的经验与实践","authors":"Maryna Tsilyna","doi":"10.31866/2616-7654.9.2022.259142","DOIUrl":null,"url":null,"abstract":"The aim of the article is to find out the safest conditions for the functioning of documents, as well as to find the most effective ways to avoid potential risks and dangers in the domestic information space.\nThe research methodology consisted of a set of general scientific and special methods of studying the issue. The review and analytical method was used to work on the professional and specialised literature and to determine the theoretical basis of the research, the systematic method proved to be effective in studying certain foreign practices of ensuring the confidentiality of information. The application of the induction method made it possible to generalise and draw a conclusion about the possibility of using the experience of other countries within the Ukrainian information space. Special methods, namely the method of researching document flows and the method of determining the information content of the document, were useful in considering the process of moving documents in the information field, the possibility/impossibility of damage or loss of information, and ways to prevent such undesirable situations.\nThe scientific research was based on the principles of objectivity and integrity. The use of a set of scientific methods made it possible to study the special features of confidential document information that is processed abroad, and to identify the main threats to the violation of the integrity and accessibility of information.\nScientific novelty. The latest practices of England, the European Union, and the United States in the field of document confidentiality are studied. The main recommendations for the protection of confidential information, and confidential agreements implemented abroad are considered. Features of secure use of document information are established. The article proposes a number of systematic measures against threats that arise in the process of working with confidential documents. \nConclusions. The study allows us to conclude that the Ukrainian legislative and regulatory framework should be formed taking into account global legislative initiatives and implementations. Сompanies, organisations, institutions, as well as individuals, need to ensure the protection of confidentiality of information, and given the threats, appropriate steps should be taken to ensure safe operation. The rules of identification and authentication should not be neglected, and a strict password policy should be used. The issue of information protection could be solved only in a comprehensive way.","PeriodicalId":33414,"journal":{"name":"Ukrayins''kii zhurnal z bibliotekoznavstva ta informatsiinikh nauk","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Foreign Experience and Practice of Ensuring the Confidentiality of Information and Creating Secure Conditions for the Functioning of Documents\",\"authors\":\"Maryna Tsilyna\",\"doi\":\"10.31866/2616-7654.9.2022.259142\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The aim of the article is to find out the safest conditions for the functioning of documents, as well as to find the most effective ways to avoid potential risks and dangers in the domestic information space.\\nThe research methodology consisted of a set of general scientific and special methods of studying the issue. The review and analytical method was used to work on the professional and specialised literature and to determine the theoretical basis of the research, the systematic method proved to be effective in studying certain foreign practices of ensuring the confidentiality of information. The application of the induction method made it possible to generalise and draw a conclusion about the possibility of using the experience of other countries within the Ukrainian information space. Special methods, namely the method of researching document flows and the method of determining the information content of the document, were useful in considering the process of moving documents in the information field, the possibility/impossibility of damage or loss of information, and ways to prevent such undesirable situations.\\nThe scientific research was based on the principles of objectivity and integrity. The use of a set of scientific methods made it possible to study the special features of confidential document information that is processed abroad, and to identify the main threats to the violation of the integrity and accessibility of information.\\nScientific novelty. The latest practices of England, the European Union, and the United States in the field of document confidentiality are studied. The main recommendations for the protection of confidential information, and confidential agreements implemented abroad are considered. Features of secure use of document information are established. The article proposes a number of systematic measures against threats that arise in the process of working with confidential documents. \\nConclusions. The study allows us to conclude that the Ukrainian legislative and regulatory framework should be formed taking into account global legislative initiatives and implementations. Сompanies, organisations, institutions, as well as individuals, need to ensure the protection of confidentiality of information, and given the threats, appropriate steps should be taken to ensure safe operation. The rules of identification and authentication should not be neglected, and a strict password policy should be used. The issue of information protection could be solved only in a comprehensive way.\",\"PeriodicalId\":33414,\"journal\":{\"name\":\"Ukrayins''kii zhurnal z bibliotekoznavstva ta informatsiinikh nauk\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Ukrayins''kii zhurnal z bibliotekoznavstva ta informatsiinikh nauk\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31866/2616-7654.9.2022.259142\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ukrayins''kii zhurnal z bibliotekoznavstva ta informatsiinikh nauk","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31866/2616-7654.9.2022.259142","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

本文的目的是为了找出文件功能最安全的条件,以及找到避免国内信息空间潜在风险和危险的最有效方法。研究方法包括一套研究该问题的一般科学方法和特殊方法。采用回顾分析的方法对专业文献和专门文献进行梳理,确定研究的理论基础,系统的方法在研究国外某些保障信息保密的实践中被证明是有效的。归纳法的应用使人们能够概括和得出结论,是否有可能在乌克兰的信息空间内利用其他国家的经验。研究文件流动的方法和确定文件信息内容的方法等特殊方法在考虑信息领域中文件移动的过程、信息损坏或丢失的可能性/不可能性以及防止此类不良情况的方法方面是有用的。科学研究是建立在客观和诚实的原则基础上的。由于使用了一套科学方法,因此有可能研究在国外处理的机密文件资料的特点,并确定侵犯资料完整性和获取的主要威胁。科学的新奇。研究了英国、欧盟和美国在文件保密领域的最新做法。讨论了保密信息保护的主要建议和国外实施的保密协议。建立了文件信息安全使用的特点。本文提出了若干系统措施,以对付处理机密文件过程中出现的威胁。结论。这项研究使我们得出结论,乌克兰立法和监管框架的形成应考虑到全球立法倡议和实施情况。Сompanies,组织、机构以及个人都需要确保信息的机密性,并且鉴于威胁,应采取适当措施确保安全操作。不应忽视识别和认证规则,并应使用严格的密码策略。只有全面解决信息保护问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Foreign Experience and Practice of Ensuring the Confidentiality of Information and Creating Secure Conditions for the Functioning of Documents
The aim of the article is to find out the safest conditions for the functioning of documents, as well as to find the most effective ways to avoid potential risks and dangers in the domestic information space. The research methodology consisted of a set of general scientific and special methods of studying the issue. The review and analytical method was used to work on the professional and specialised literature and to determine the theoretical basis of the research, the systematic method proved to be effective in studying certain foreign practices of ensuring the confidentiality of information. The application of the induction method made it possible to generalise and draw a conclusion about the possibility of using the experience of other countries within the Ukrainian information space. Special methods, namely the method of researching document flows and the method of determining the information content of the document, were useful in considering the process of moving documents in the information field, the possibility/impossibility of damage or loss of information, and ways to prevent such undesirable situations. The scientific research was based on the principles of objectivity and integrity. The use of a set of scientific methods made it possible to study the special features of confidential document information that is processed abroad, and to identify the main threats to the violation of the integrity and accessibility of information. Scientific novelty. The latest practices of England, the European Union, and the United States in the field of document confidentiality are studied. The main recommendations for the protection of confidential information, and confidential agreements implemented abroad are considered. Features of secure use of document information are established. The article proposes a number of systematic measures against threats that arise in the process of working with confidential documents. Conclusions. The study allows us to conclude that the Ukrainian legislative and regulatory framework should be formed taking into account global legislative initiatives and implementations. Сompanies, organisations, institutions, as well as individuals, need to ensure the protection of confidentiality of information, and given the threats, appropriate steps should be taken to ensure safe operation. The rules of identification and authentication should not be neglected, and a strict password policy should be used. The issue of information protection could be solved only in a comprehensive way.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
15
审稿时长
4 weeks
期刊最新文献
The Conceptual Model Establishment of the SSTL of Ukraine Electronic Library Soft Skills and Competences Formation of Higher Education Recipients as an Adaptation Basis to Professional Activity of Future Specialists Deposit of Intellectual Activity Results: Challenges and Opportunities of Open Access and Open Science for Ukraine Gamification Mechanics Usage for UGC Promotion in Online Library Marketing Features of the Teaching of the Educational Component “Conceptual Basis of Information Search” for Master’s Training
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1