scholarly journals FAIR Aspects of a Genomic Information Protection and Management System

2021 ◽  
Author(s):  
Jaime Delgado ◽  
Silvia Llorente

To handle genomic information while supporting FAIR principles, we present GIPAMS, a modular architecture. GIPAMS provides security and privacy to manage genomic information by means of several independent services and modules that interact among them in an orchestrated way. The paper analyzes how some security and privacy aspects of the FAIRification process are covered by the GIPAMS platform.

Author(s):  
Jaime Delgado ◽  
Silvia Llorente

Making data Findable, Accessible, Interoperable and Reusable (FAIR) is a good approach when data needs to be shared. However, security and privacy are still critical aspects. In the FAIRification process, there is a need both for de-identification of data and for license attribution. The paper analyses some of the issues related to this process when the objective is sharing genomic information. The main results are the identification of the already existing standards that could be used for this purpose and how to combine them. Nevertheless, the area is quickly evolving and more specific standards could be specified.


2020 ◽  
Vol 23 (6) ◽  
pp. 99-114
Author(s):  
B. S. Dongak ◽  
A. S. Shatohin ◽  
R. V. Meshcheryakov

Purpose of research. The purpose of this study is to assess the possibility of applying the methodology for centralized management of systems and information risks using the example of informatization of public departments of Republic of Tyva in order to optimize the cost of purchasing technical, software and hardware-software means of protecting information, as well as the payroll of maintenance technical personnel.Methods. One of the main research methods is the creation of an experimental model of the mechanism of a single information and computing network, combining various government departments located within the same administrative building, which allows working simultaneously with distributed or centralized applications, databases and other services, as well as centralized information risk management security. The next research method is the analysis and study of the principle of operation of information resources, information systems, databases, and the increase in the number of domain users if they are combined into a single data transfer network. The interaction and effectiveness of personnel, a specialized unit based on one government agency, ensuring the regular functioning of the network and the necessary level of information security for all government departments.Results. As a result, an economic effect is achieved by eliminating the acquisition of duplicate software and hardware information protection, increasing the efficiency of using unified information services, and creating a centralized structural unit that uses risk management tools and makes information security management decisions based on the principles of system analysis , structuring method and expert survey methods. The results of the study have been used in solving problems of improving the information security management system of the authorities of Republic of Tyva.Conclusion. We have developed the original information technology architecture of the information security management system and centralized use of information technologies for the government of Republic of Tyva. The distinctive features of the structure of software tools for the centralized approach are the multi-agent implementation of the control elements of the decision support system and the integration of various types of security management models into a single complex. 


MEST Journal ◽  
2019 ◽  
Vol 7 (2) ◽  
pp. 73-78
Author(s):  
Valeryi Sereda ◽  
Zinaida Zhyvko ◽  
Olga Balynska ◽  
Taras Rudyi

Author(s):  
Mutalap ABSATTAROV

Most of the activities in state bodies are carried out by the organization of control over the execution of documents and instructions. The issues of ensuring control activities and document management in the conditions of remote work of employees are included on the agenda of state bodies and organizations. The article describes the current and possible practical approaches to the organization of control of documents and orders, which covers all stages and processes of reviewing documents: reception, control of registration, registration, distribution, sending to recipients, consideration, execution, approval, examination, approval, decision-making, signing, sending to the author of the document. For each of the stages and processes, their readiness for digitalization and transition to online work is described. The idea of creating, developing and implementing special information systems for remote document management, which can be installed and operated in parallel with the current document management system and in the mode of secure information protection, is considered.


2016 ◽  
Vol 8 (3) ◽  
pp. 70-73
Author(s):  
Зиновьев ◽  
P. Zinovev ◽  
Обухова ◽  
L. Obukhova ◽  
Рогозин ◽  
...  

The article describes the structure and composition of typical confidential information resource and the main directions of ensuring information security in electronic document management system.


Sign in / Sign up

Export Citation Format

Share Document