Essence and Conceptual Foundations of The Concept of Information Security
DOI:
https://doi.org/10.47134/academicia.v1i2.11Keywords:
Information Systems, Telecommunication Technologies, Informatization, Information Threats, Information Security, Information ResourcesAbstract
This article examines the essence and conceptual foundations of the concept of information security. The influence of information threats and attacks on the development and formation of youth
References
Anand, A., & Singh, A. K. (2020). An improved DWT-SVD domain watermarking for medical information security. Computer Communications. https://www.sciencedirect.com/science/article/pii/S0140366419317992 DOI: https://doi.org/10.1016/j.comcom.2020.01.038
Brazevich, D. S., Safronova, Z. S., Kosheleva, T. N., & ... (2020). Analysis of the Problems of Ensuring Information Security in the Terms of the Contemporary Society. Open Journal of Social …. https://www.scirp.org/journal/paperinformation?paperid=98599 DOI: https://doi.org/10.4236/jss.2020.82018
Cristea, L. M. (2020). Current security threats in the national and international context. Journal of Accounting and Management Information …. https://www.ceeol.com/search/article-detail?id=879221 DOI: https://doi.org/10.24818/jamis.2020.02007
Dahl, V. I. (2002). Explanatory dictionary of the Great Russian language. Moscow: [Publisher].
Decree of the President of the Republic of Uzbekistan. (2017). On the strategy of actions for further development of the Republic of Uzbekistan. Collection of legislative acts of the Republic of Uzbekistan.
Gafurov, U. (2013). Actual issues of effective use of the Internet in the protection of young people from ideological threats in the face of religion in the conditions of globalization. In Army - state support, guarantee of peace: Methodical manual for the bodies of educational work in the system of the Armed Forces, as well as for propagandists (pp. [page numbers if available]). Tashkent: Sano-Standart.
Grachev, G. V. (2000). Information-psychological safety of a personality: Theory and technology of psychological protection (Doctoral dissertation). Moscow: [Publisher].
Herath, T. C., Herath, H. S. B., & D’Arcy, J. (2020). Organizational adoption of information security solutions: An integrative lens based on innovation adoption and the technology-organization-environment framework. … for Advances in Information Systems. https://doi.org/10.1145/3400043.3400046 DOI: https://doi.org/10.1145/3400043.3400046
Khando, K., Gao, S., Islam, S. M., & Salman, A. (2021). Enhancing employees information security awareness in private and public organisations: A systematic literature review. Computers &security. https://www.sciencedirect.com/science/article/pii/S0167404821000912 DOI: https://doi.org/10.1016/j.cose.2021.102267
Khodjaev, B. H. (2016). Development of historical thinking of students of general education schools by means of modernized didactic support (Doctoral dissertation). Tashkent: [Publisher].
Kuranov, M. (2008). Reality that we realize. Tashkent: Dukhovnost.
Lopatin, V. N. (2000). Information security of Russia (Doctor of Law dissertation). St. Petersburg: [Publisher].
Meulemeester, P. De, Scheers, B., & ... (2020). Differential signaling compromises video information security through AM and FM leakage emissions. IEEE Transactions on …. https://ieeexplore.ieee.org/abstract/document/9130107/ DOI: https://doi.org/10.1109/TEMC.2020.3000830
Ozhegov, S. I. (1990). Dictionary of the Russian language. Moscow: [Publisher].
Pham, H. C., Brennan, L., & Furnell, S. (2019). Information security burnout: Identification of sources and mitigating factors from security demands and resources. Journal of Information Security and …. https://www.sciencedirect.com/science/article/pii/S2214212618302692 DOI: https://doi.org/10.1016/j.jisa.2019.03.012
Sharikov, A. B. (2000). If in doubt, exclude: Children and violence on the screen. [Journal Name], (46), [page numbers if available].
Smallwood, R. F. (2019). Information governance: Concepts, strategies and best practices. books.google.com. https://books.google.com/books?hl=en&lr=&id=z3nADwAAQBAJ&oi=fnd&pg=PT11&dq=the+concept+of+information+security&ots=71mDpwC8Qa&sig=ow7oCJgvXMVWGTbtwcLUww4Q_io
Streltsov, A. A. (2001). The content of the concept "ensuring information security". Information Society, (4), [page numbers if available].
Streltsov, A. A. (2004). Theoretical and methodological bases of the legal provision of the information security of Russia (Doctor of Juridical Sciences dissertation). Moscow: [Publisher].
Tanwar, S., Parekh, K., & Evans, R. (2020). Blockchain-based electronic healthcare record system for healthcare 4.0 applications. Journal of Information Security and …. https://www.sciencedirect.com/science/article/pii/S2214212619306155 DOI: https://doi.org/10.1016/j.jisa.2019.102407
Toth, A. (2022). Information Security Challenges and Solutions in Smart Nations. Security-Related Advanced Technologies in Critical …. https://doi.org/10.1007/978-94-024-2174-3_10 DOI: https://doi.org/10.1007/978-94-024-2174-3_10
Veiga, A. Da, Astakhova, L. V, Botha, A., & Herselman, M. (2020). Defining organisational information security culture—Perspectives from academia and industry. Computers &Security. https://www.sciencedirect.com/science/article/pii/S0167404820300018 DOI: https://doi.org/10.1016/j.cose.2020.101713
Veiga, A. Da. (2022). Achieving a security culture. Research Anthology on Business Aspects of …. https://www.igi-global.com/chapter/achieving-a-security-culture/288681 DOI: https://doi.org/10.4018/978-1-6684-3698-1.ch011
Wulf, F., Strahringer, S., & Westner, M. (2019). Information security risks, benefits, and mitigation measures in cloud sourcing. 2019 IEEE 21st Conference …. https://ieeexplore.ieee.org/abstract/document/8808060/ DOI: https://doi.org/10.1109/CBI.2019.00036
Zhang, H., Ji, Z., Wang, H., & Wu, W. (2019). Survey on quantum information security. China Communications. https://ieeexplore.ieee.org/abstract/document/9070131/ DOI: https://doi.org/10.23919/JCC.2019.10.001
Zhang, P., Schmidt, D. C., White, J., & Dubey, A. (2019). Consensus mechanisms and information security technologies. Advances in Computers. https://www.sciencedirect.com/science/article/pii/S0065245819300245 DOI: https://doi.org/10.1016/bs.adcom.2019.05.001
Zhang, Y. (2022). DBSCAN Clustering Algorithm Based on Big Data Is Applied in Network Information Security Detection. Security and Communication Networks. https://doi.org/10.1155/2022/9951609 DOI: https://doi.org/10.1155/2022/9951609
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Mamadjanov Alisher Muratovich

This work is licensed under a Creative Commons Attribution 4.0 International License.