The Influence of Patent Indices on Technology Levels in the Developed and the Developing Countries: Focusing on Information Security Technologies

2018 ◽  
Vol 13 (3) ◽  
pp. 75-93
Author(s):  
Jong-Hak Oh ◽  
◽  
Kwan-Sik Na ◽  
Author(s):  
O. Semenenko ◽  
Y. Dobrovolsky ◽  
V. Koverga ◽  
O. Sechenev

Evolution of security technologies shows that only the concept of an integrated approach to information security can provide modern information security requirements. A comprehensive approach means the complex development of all the necessary methods and means of information protection. Today, the information exchange and information systems in the Ministry of Defense of Ukraine have certain means and approaches to the destruction of information, but each of them has different estimates of the effectiveness of their use, as well as different cost of their purchase and use. Therefore, the main purpose of the article is to carry out a comprehensive analysis of means of destroying confidential information of methods of its destruction in order to formulate practical recommendations for choosing the most effective and economically feasible for the Ministry of Defense of Ukraine. The perfection of methods and means of destroying information from magnetic media is an important element of modern information security. The results of the analysis carried out in the article are the disclosure of the main features of modern devices for the elimination of magnetic records, as well as the ability to formulate a list of basic requirements for modern devices for the destruction of information from magnetic media. Today, technical means of information security, in particular, the elimination of information on magnetic media, are constantly being improved, absorbing the latest advances in modern security technologies. Their model range, which takes into account the diversity of customer requirements, such as the type of energy supply, the level of mobility, reliability and operating conditions, expands. All this determines the relevance of research topics in this direction in the future.


2005 ◽  
Vol 34 (1) ◽  
pp. 13-18 ◽  
Author(s):  
Khin Than Win

The objective of this study is to answer the research question, ‘Are current information security technologies adequate for electronic health records (EHRs)?’ In order to achieve this, the following matters have been addressed in this article: (i) What is information security in the context of EHRs? (ii) Why is information security important for EHRs? and (iii) What are the current technologies for information security available to EHRs? It is concluded that current EHR security technologies are inadequate and urgently require improvement. Further study regarding information security of EHRs is indicated.


Author(s):  
Felix Nti Koranteng

Users are considered the weakest link in ensuring information security (InfoSec). As a result, users' security behaviour remains crucial in many organizations. In response, InfoSec research has produced many behavioural theories targeted at explaining information security policy (ISP) compliance. Meanwhile, these theories mostly draw samples from employees often in developing countries. Such theories are not applicable to students in educational institutions since their psychological orientation with regards to InfoSec is different when compared with employees. Based on this premise, the chapter presents arguments founded on synthesis from existing literature. It proposes a students' security compliance model (SSCM) that attempts to explain predictive factors of students' ISP compliance intentions. The study encourages further research to confirm the proposed relationships using qualitative and quantitative techniques.


Author(s):  
Jawed Siddiqi ◽  
Ja’far Alqatawna ◽  
Mohammad Hjouj Btoush

This chapter surveys the issues concerning the digital divide facing developing nations. The authors assert that “insecurity” and the “digital divide” are highly dependent on each other and as insecurity increases so does the digital divide. Therefore, the authors propose to extend the concept of the digital divide to include information security features by putting forward a new model or paradigm of security that is multi-faceted and is able to assist in bridging the digital divide gap. They argue that a lack of attention to security reduces the access to and use of resources with which to attack the digital divide. In particular, for e-business, the authors conclude that in developing countries having security issues at the forefront would encourage engagement with e-initiatives, or restrain it if there is an absence of security.


Author(s):  
Е.А. Исаев ◽  
E.A. Isaev

The rapid development of information technology in today's society dictates new requirements for information security technologies of data, methods of remote access and data processing, integrated reduction of financial expenses on working with information. In recent years, the ideal solution to all these problems that is widely suggested is the concept of cloud computing. This technique really makes a number of clear advantages when working with information and is already widely used in a number of areas of scientific and business activities, but many aspects of information security, characteristic of cloud computing is still far from a satisfactory solution. The article discusses the main challenges of information security of cloud computing. A review of methods to ensure data security, the choice of the most secure cloud computing is discussed, and models to provide the method of increasing the security of cloud computing are looked at.


Sign in / Sign up

Export Citation Format

Share Document