scholarly journals PROTECTION OF PERSONAL DATA BY MEANS OF ESTABLISHING THE MODE OF COMMERCIAL SECRET

Author(s):  
Светлана Казанцева ◽  
Svetlana Kazanceva ◽  
Юрий Самойленко ◽  
Yury Samoylenko

The article discusses the specifics and content of commercial secrets as an integral element of the organization’s management system. The authors summarized the main points affecting the quality and stable functioning of the organization, suggested ways of improvement and efficiency.

2020 ◽  
Vol 15 (3) ◽  
pp. 107-113
Author(s):  
Guzaliya Klychova ◽  
Alsu Zakirova ◽  
Angelina Dyatlova ◽  
Augul Klychova ◽  
Nailya Zalyalova

The economic security system is a set of structures or services, the continuous activity of which is aimed at increasing security from external and internal threats and ensuring effective enterprise management. Each enterprise should develop its own system that ensures economic security and takes into account the specifics, organizational structure and scale of financial and economic activities of an economic entity. The purpose of the study is to develop recommendations for improving the methodological tools for ensuring economic security in the personnel management system. The proposed tests for assessing the heads of structural divisions and assessing the personnel management system of the enterprise allow us to evaluate each individual employee and the effectiveness of the personnel management system as a whole. In particular, when selecting heads of structural divisions, it is advisable to take into account such factors as advanced training, the presence of chronic diseases, convictions and administrative offenses, arrears on rent and loans, knowledge of foreign languages, the level of use of a personal computer, etc. On the effectiveness of the personnel management system as a whole the readiness of employees for additional vocational training or advanced training affects; provision of reliable, timely, confidential and accurate information by the internal control system; availability of control of automated information systems and program control of financial and business operations; observance of the official instructions by the personnel; the presence of internal regulatory documents on the protection of personal data and the procedure for managing information activities, as well as a separate economic security service, etc. By analyzing the answers to the questions contained in the tests, it is possible to give a generalized assessment of economic security in the personnel management system, as well as to develop further measures on its increase, including the selection of potential applicants for a certain position


the security of users are questioned when security breaches occur in data when third parties are incorporated for collecting and controlling huge amount of personal data. A decentralized network of peers are accompanied by a public ledger and it has demonstrated bitcoin in the financial space that trusted and auditable computing. This paper describes a decentralized personal data management system for ensuring users control over their data. A protocol is implemented that is capable of turning a blockchain into an automated access-control manager that is not requiring trust in a third party. There are no strict financial transactions in our system. They are used for carrying instructions like querying, storing and sharing data. Finally, some possible blockchain extensions are discussed that are able to harness them into a well-rounded solution for faithful computing problems in society.


2021 ◽  
Vol 68 (1) ◽  
pp. 44-51
Author(s):  
S. Levitsky

The essence of electronic document management of the enterprise is investigated and the main components of this process organization are revealed in this paper. The place of the electronic document in the enterprise management system is investigated. The peculiarities of transition to the application of electronic documentation are revealed and this process is defined as the main direction of development and improvement of the accounting and financial service of the enterprise. It is proved that digital documents are becoming indispensable for everyone who appreciates comfort, efficiency and high level of security. From practice, it is evident that those companies where digital transformation is started, have gained competitive advantages and are able to process large amount of information. Therefore, working with documents in digital form can, among the other things, save time and space. It is defined that the information support of the management system depends on the quality of documentation, storage and use of previously created information, creates the foundation of the process. All types of documents can be converted to digital form: from simple accounting records, to personal files of various types and formats or multi-page commercial contracts. The most common of these are invoices and bank statements. Specialized equipment, which is available today in this process, makes it possible to scan 250 documents simultaneously in less than 5 minutes. The main barriers for remote operation under pandemic conditions, with the need of continuous computer use, are identified. This process is complicated by paperwork, which requires transportation to employees' homes and the introduction of additional procedures related to information security. This problem provokes a significant increase in interest in digitization among businesses, particularly regarding payroll documentation, due to the large share of paper documents in this process and restrictive measures related to the protection of personal data.


Author(s):  
Priyadharshini S. ◽  
R.Catherine Joy

The aim of an automated hotel management system is to handle all aspects of the hotel's information and booking system. This application attempted to cover all operations that occur in residential hotels. It is all identified, from employee management to booking, floors, offices, and room type management, among other things. We sought to demonstrate how data/information is processed in hotels in our project, automated Hotel Management System. The hotel management overview was achieved by splitting the project into different modules. Customers are offered various facilities such as check-in, checkout, and entry editing, as well as advance payments. Customer has the option to cancel his or her reservation if he or she so desires. Customer Id or customer name may be used to search for any customer or employee. It is also possible to inquire about available spaces. It will produce reports for customers, employees (who work in the hotel), and a bill for the customer when the customer checks out. We've only included a few modules because our aim is to get an idea or learn more about how hotels are managed. With the addition of several more components, this type of project may be used in a variety of hotels. The efficiency of any hotel is determined by the method used to obtain and prevent information from customers' personal data for use in the hotel's various services. It has been a complex and difficult operation to manage their outcome revealed, particularly when information flow is consistent. This project focuses on creating a client-side and user interface in Java Script, as well as a backend in Java Spring to support panorama data and images.


Author(s):  
Ning Wang ◽  
Tian Tian

A personal dataspace management system (PDSMS) is a platform to manage personal data with various data types. Facing huge volume of heterogeneous personal data and complex relationships between them, it is better for users to start with a simplified, easy-to-read schema and then explore in depth only the relevant schema elements during formulating queries. Existing approaches of database schema summarization neglect user interests, which is very important in a personal dataspace. We propose a framework for building a concise resource summary based on user interests automatically in PDSMS. Our method builds the initial summary by partitioning schema graph according to its linkage information and selecting representative elements based on a novel measure on schema element typicality. Then, user interested degree for schema node is introduced to measure user interests and the initial summary is refined according to user interests. Finally, we evaluate the quality of our resource summary through a comprehensive set of experiments, and results indicate that summaries generated by our system are more effective on reducing user efforts required in formulating queries.


2019 ◽  
Vol 9 (15) ◽  
pp. 2953 ◽  
Author(s):  
Jamila Alsayed Kassem ◽  
Sarwar Sayeed ◽  
Hector Marco-Gisbert ◽  
Zeeshan Pervez ◽  
Keshav Dahal

Identity management (IdM) is a method used to determine user identities. The centralized aspect of IdM introduces a serious concern with the growing value of personal information, as well as with the General Data Protection Regulation (GDPR). The problem with currently-deployed systems and their dominating approach, with identity providers (IdP) and single-point services, is that a third party is in charge of maintaining and controlling the personal data. The main challenge to manage data securely lies in trusting humans and institutes who are responsible for controlling the entire activity. Identities are not owned by the rightful owners or the user him/herself, but by the mentioned providers. With the rise of blockchain technology, self-sovereign identities are in place utilizing decentralization; unfortunately, the flaws still exist. In this research, we propose DNS-IdM, a smart contract-based identity management system that enables users to maintain their identities associated with certain attributes, accomplishing the self-sovereign concept. DNS-IdM has promising outcomes in terms of security and privacy. Due to the decentralized nature, DNS-IdM is able to avoid not only the conventional security threats, but also the limitations of the current decentralized identity management systems.


2019 ◽  
Vol 9 (1) ◽  
pp. 80-91 ◽  
Author(s):  
Md Mehedi Hassan Onik ◽  
Chul-Soo Kim ◽  
Nam-Yong Lee ◽  
Jinhong Yang

AbstractSecure data distribution is critical for data accountability. Surveillance caused privacy breaching incidents have already questioned existing personal data collection techniques. Organizations assemble a huge amount of personally identifiable information (PII) for data-driven market analysis and prediction. However, the limitation of data tracking tools restricts the detection of exact data breaching points. Blockchain technology, an ‘immutable’ distributed ledger, can be leveraged to establish a transparent data auditing platform. However, Art. 42 and Art. 25 of general data protection regulation (GDPR) demands ‘right to forget’ and ‘right to erase’ of personal information, which goes against the immutability of blockchain technology. This paper proposes a GDPR complied decentralized and trusted PII sharing and tracking scheme. Proposed blockchain based personally identifiable information management system (BcPIIMS) demonstrates data movement among GDPR entities (user, controller and processor). Considering GDPR limitations, BcPIIMS used off-the-chain data storing architecture. A prototype was created to validate the proposed architecture using multichain. The use of off-the-chain storage reduces individual block size. Additionally, private blockchain also limits personal data leaking by collecting fast approval from restricted peers. This study presents personal data sharing, deleting, modifying and tracking features to verify the privacy of proposed blockchain based personally identifiable information management system.


Sign in / Sign up

Export Citation Format

Share Document