scholarly journals Bezpieczeństwo informacyjne w jednostkach samorządu terytorialnego

2020 ◽  
pp. 89-106
Author(s):  
Jacek Gerwatowski

This article analyses issues in the feld of information and IT securityand attempts to explain what is meant by information security and presentspotential opportunities and threats in this feld. The article discusses various types of information security threats, from those with a “traditional” character, such as espionage, through to threats resulting from the developmentof new technologies, e.g. cyber-terrorism and threats resulting from the activities of natural forces. The article presents the tasks of public administration and local government units in the feld of information security resulting,inter alia, from the provisions of the Act on access to public information orregulations on the protection of personal data.

2018 ◽  
Vol 3 (2) ◽  
pp. 85
Author(s):  
Chicherov K.A. ◽  
Norkina A. N.

This article presents issues of protecting confidential data, ways to support information security, types of information security threats resulting in an authorized access to confidential data, countermeasures and security measures to ensure confidential data security. Keywords: confidential data, information security, information security threat(s), personal data, information systems, data security.


Author(s):  
Sergey E. Channov ◽  

Introduction. The article is devoted to the use of digital technologies in the field of public administration using the example of state and municipal information systems. Currently, two types of such systems can be distinguished in the Russian Federation: 1) allowing direct enforcement activities; 2) used to capture certain information. Theoretical analysis. Information systems of the first type acquire the properties of an object of complex legal relations, in which suppliers and consumers of information, government bodies, as well as other persons become participants. This entails the fact that in the implementation of public administration, the source of regulation of public relations to a certain extent becomes the program code of these information systems. Accordingly, any failures and errors in the public information system become facts of legal importance. Empirical analysis. The main risks of using information systems of the second type in public administration relate to the illegal access (or use) of information stored in their databases. The consolidation of databases containing different types of information is a serious threat. In this regard, the creation of the Unified Federal Information Register containing information about the population of the Russian Federation, provided for by the Federal Law No. 168-FZ of 08.06.2020, may lead to a large number of socially negative consequences and comes into obvious conflict with the legislation on personal data. Results. State and municipal information systems themselves can improve public administration, including reducing corruption in the country. At the same time, their reduced discretion in management decisions is not always appropriate. Accordingly, their implementation should be preceded by the analysis of the characteristics of a specific area of management, as well as the proposed use of digital technologies.


2011 ◽  
pp. 140-150 ◽  
Author(s):  
Richard G. Taylor

The introduction of new technologies to accumulate large amounts of data has resulted in the need for new methods to secure organizational information. Current information security strategies tend to focus on a technology-based approach to securing information. However, this technology-based approach can leave an organization vulnerable to information security threats. Organizations must realize that information security is not necessarily a technology issue, but rather a social issue. Humans operate, maintain, and use information systems. Their actions, whether intentional or accidental, are the real threat to organizations. Information security strategies must be developed to address the social issue.


Author(s):  
Chris C. Demchak ◽  
Kurt D. Fenstermacher

This chapter explores the roles of names and name equivalents in social tracking and control, reviews the amount of privacy-sensitive databases accumulating today in U.S. legacy federal systems, and proposes an alternative that reduces the likelihood of new security policies violating privacy. We focus on the continuing public-authority reliance on unique identifiers, for example, names or national identity numbers, for services and security instead of dissecting a better indicator of security threats found in behavior data. We conclude with a proposed conceptual change to focusing the social-order mission on the behavior of individuals rather than their identities (behavior-identity knowledge model, BIK). It is particularly urgent to consider a different path now as increased interest in biometrics offers an insidious expansion of unique identifiers of highly personal data. E-government can be wonderful for central government’s effectiveness and efficiency in delivering services while also being a disaster for both privacy and security if not regulated legally, institutionally, and technically (with validation and appeal processes) from the outset.


2016 ◽  
Vol 16 (2) ◽  
pp. 181-196
Author(s):  
Ambroży Mituś

Summary The aim of this article is to present the essence and significance of information and communication in public administration in the context of the management control. Broadly understood information in public administration allows both to control the activity of this administration and to make correct decisions and actions in order to perform public tasks effectively. Therefore, the existence of a proper system for sharing and exchanging information is an essential component of the management control, ensuring the execution of the tasks and objectives in a way that is consistent with the law, effective, efficient and timely. The article points to i.a. the types of information and means of communication that may be deemed effective or legally acceptable tools for conveying information and communicating in public information. In this context it should be emphasised that - in particular - sharing public information requires that a relevant form be retained and a proper sharing procedure be followed.


2018 ◽  
Vol 11 (2) ◽  
pp. 205979911879601 ◽  
Author(s):  
Carlos Ochoa ◽  
Melanie Revilla

Recently, the idea of ‘data fusion’, that is, of combining different types of data, became quite popular because of the advances of new technologies. In particular, several studies started investigating the possibility of combining survey data with other data types in order to get a more complete or accurate picture of the reality and/or to reduce survey burden. One key element, then, is the willingness of people to share different types of data, beyond survey answers. In this article, we investigate to what extent members from an opt-in online panel in Spain are willing to share different types of information that have in general not been studied before in the literature: records of their surrounding sound (audiotracking), information from their email inbox (in different ways, sharing the email credentials, using an email plug-in or redirecting emails, partially or totally), sensorial reactions measured by a wearable device (neuroscience) and public information about them available online. We use a choice-based conjoint analysis in order to study the level of willingness depending on the incentives offered in exchange, and we present the level of willingness by gender and age groups. Overall, we find huge differences in the level of willingness across data types. Increasing the incentives, on the contrary, does not improve the willingness so much, even if there is a positive trend. Some differences are observed across gender and age groups but most of them are not statistically significant.


2020 ◽  
pp. 014473942097824
Author(s):  
James McQuiston ◽  
Aroon P Manoharan

New technologies such as artificial intelligence (AI), the Internet of Things (IoT), and blockchain are changing how the public sector serves constituents. Academic programs in public administration and public policy must adapt their coursework to best serve students in an increasingly technology-based world. This qualitative research analyzed 84 Asian public administration graduate programs to determine the degree to which information technology was taught throughout the region. Our findings indicate that considerable variation existed between the number of information technology classes offered and the types of information discussed in the classes. A majority of public administration programs throughout Asia offered coursework in information technology; but, core classes and IT-specific specializations in public administration programs were observed at a much lower rate. Discussions of the tactics taken by programs to educate students in information technologies provide actionable suggestions for practitioners, educators, researchers, and administrators alike.


Author(s):  
Tero Erkkilä

Transparency is one of the keywords of contemporary governance. It is often associated with democratic accountability, but it also carries connotations of market efficiency. Though transparency is a key concept for economics and politics, its ideational roots lie in access to government information. Transparency holds promises for increased democratization and economic performance, but these may also stand in contradiction. Coinciding with the rise of transparency as a token of responsible governance, we have witnessed rapid global diffusion of information access laws. In debates on public accountability, transparency appears as an element of both deliberation and performance, which is peculiar as these are often seen as complementary types of accountability. Moreover, increased transparency is often assumed to lead to increased citizen trust in government, but the relation of trust and transparency is more complex. Transparency also implies access to public information, which can consist of various types of documents and registries. Through digitalization, public information has become a pressing topic of interest, including as raw material for a knowledge-based economy. Public administration also manages significant amounts of personal data of citizens, raising additional concerns for privacy. While transparency and privacy are not antonyms, there is a trade-off between them. Nevertheless, transparency also appears as a means for holding government accountable for its use of registry data. Finally, transparency has become a measured element of governance indicators that are themselves an instance of transparency. As a key concept of public administration, transparency is relevant for both democracy and efficiency of governance, but it is ambiguous and even paradoxical by nature.


2021 ◽  
pp. 74-79
Author(s):  
V. A. Maystrenko ◽  
◽  
O. A. Bezrodnykh ◽  
R. A. Dorokhin ◽  
◽  
...  

In this article based on the processing of statistical data from various electronic resources the most frequent types of threats to information security (UBI) for medical information systems (MIS) are identified and their classification is carried out. The issues of determining the actual UBI when creating MIS that process personal data using a specific technology of expert assessment are considered. The proposed methodology for determining actual threats to information security for MIS, in comparison with those used, eliminates subjective assessments that are a characteristic feature of traditional expert assessments. Its use also makes it possible to assess the relevance of information security threats for MIS that do not have qualified specialists in the field of information security in the staff of a medical institution, which is relevant for a large number of medical institutions. The authors investigate the practical possibilities of using the theory of fuzzy sets and fuzzy logic in determining the actual UBI for MIS for various purposes.


Sign in / Sign up

Export Citation Format

Share Document