Essence and Conceptual Foundations of The Concept of Information Security

Authors

  • Mamadjanov Alisher Muratovich Methodological Training Cycle of the Faculty of Military Education, Uzbekistan

DOI:

https://doi.org/10.47134/academicia.v1i2.11

Keywords:

Information Systems, Telecommunication Technologies, Informatization, Information Threats, Information Security, Information Resources

Abstract

This article examines the essence and conceptual foundations of the concept of information security. The influence of information threats and attacks on the development and formation of youth

References

Anand, A., & Singh, A. K. (2020). An improved DWT-SVD domain watermarking for medical information security. Computer Communications. https://www.sciencedirect.com/science/article/pii/S0140366419317992 DOI: https://doi.org/10.1016/j.comcom.2020.01.038

Brazevich, D. S., Safronova, Z. S., Kosheleva, T. N., & ... (2020). Analysis of the Problems of Ensuring Information Security in the Terms of the Contemporary Society. Open Journal of Social …. https://www.scirp.org/journal/paperinformation?paperid=98599 DOI: https://doi.org/10.4236/jss.2020.82018

Cristea, L. M. (2020). Current security threats in the national and international context. Journal of Accounting and Management Information …. https://www.ceeol.com/search/article-detail?id=879221 DOI: https://doi.org/10.24818/jamis.2020.02007

Dahl, V. I. (2002). Explanatory dictionary of the Great Russian language. Moscow: [Publisher].

Decree of the President of the Republic of Uzbekistan. (2017). On the strategy of actions for further development of the Republic of Uzbekistan. Collection of legislative acts of the Republic of Uzbekistan.

Gafurov, U. (2013). Actual issues of effective use of the Internet in the protection of young people from ideological threats in the face of religion in the conditions of globalization. In Army - state support, guarantee of peace: Methodical manual for the bodies of educational work in the system of the Armed Forces, as well as for propagandists (pp. [page numbers if available]). Tashkent: Sano-Standart.

Grachev, G. V. (2000). Information-psychological safety of a personality: Theory and technology of psychological protection (Doctoral dissertation). Moscow: [Publisher].

Herath, T. C., Herath, H. S. B., & D’Arcy, J. (2020). Organizational adoption of information security solutions: An integrative lens based on innovation adoption and the technology-organization-environment framework. … for Advances in Information Systems. https://doi.org/10.1145/3400043.3400046 DOI: https://doi.org/10.1145/3400043.3400046

Khando, K., Gao, S., Islam, S. M., & Salman, A. (2021). Enhancing employees information security awareness in private and public organisations: A systematic literature review. Computers &security. https://www.sciencedirect.com/science/article/pii/S0167404821000912 DOI: https://doi.org/10.1016/j.cose.2021.102267

Khodjaev, B. H. (2016). Development of historical thinking of students of general education schools by means of modernized didactic support (Doctoral dissertation). Tashkent: [Publisher].

Kuranov, M. (2008). Reality that we realize. Tashkent: Dukhovnost.

Lopatin, V. N. (2000). Information security of Russia (Doctor of Law dissertation). St. Petersburg: [Publisher].

Meulemeester, P. De, Scheers, B., & ... (2020). Differential signaling compromises video information security through AM and FM leakage emissions. IEEE Transactions on …. https://ieeexplore.ieee.org/abstract/document/9130107/ DOI: https://doi.org/10.1109/TEMC.2020.3000830

Ozhegov, S. I. (1990). Dictionary of the Russian language. Moscow: [Publisher].

Pham, H. C., Brennan, L., & Furnell, S. (2019). Information security burnout: Identification of sources and mitigating factors from security demands and resources. Journal of Information Security and …. https://www.sciencedirect.com/science/article/pii/S2214212618302692 DOI: https://doi.org/10.1016/j.jisa.2019.03.012

Sharikov, A. B. (2000). If in doubt, exclude: Children and violence on the screen. [Journal Name], (46), [page numbers if available].

Smallwood, R. F. (2019). Information governance: Concepts, strategies and best practices. books.google.com. https://books.google.com/books?hl=en&lr=&id=z3nADwAAQBAJ&oi=fnd&pg=PT11&dq=the+concept+of+information+security&ots=71mDpwC8Qa&sig=ow7oCJgvXMVWGTbtwcLUww4Q_io

Streltsov, A. A. (2001). The content of the concept "ensuring information security". Information Society, (4), [page numbers if available].

Streltsov, A. A. (2004). Theoretical and methodological bases of the legal provision of the information security of Russia (Doctor of Juridical Sciences dissertation). Moscow: [Publisher].

Tanwar, S., Parekh, K., & Evans, R. (2020). Blockchain-based electronic healthcare record system for healthcare 4.0 applications. Journal of Information Security and …. https://www.sciencedirect.com/science/article/pii/S2214212619306155 DOI: https://doi.org/10.1016/j.jisa.2019.102407

Toth, A. (2022). Information Security Challenges and Solutions in Smart Nations. Security-Related Advanced Technologies in Critical …. https://doi.org/10.1007/978-94-024-2174-3_10 DOI: https://doi.org/10.1007/978-94-024-2174-3_10

Veiga, A. Da, Astakhova, L. V, Botha, A., & Herselman, M. (2020). Defining organisational information security culture—Perspectives from academia and industry. Computers &Security. https://www.sciencedirect.com/science/article/pii/S0167404820300018 DOI: https://doi.org/10.1016/j.cose.2020.101713

Veiga, A. Da. (2022). Achieving a security culture. Research Anthology on Business Aspects of …. https://www.igi-global.com/chapter/achieving-a-security-culture/288681 DOI: https://doi.org/10.4018/978-1-6684-3698-1.ch011

Wulf, F., Strahringer, S., & Westner, M. (2019). Information security risks, benefits, and mitigation measures in cloud sourcing. 2019 IEEE 21st Conference …. https://ieeexplore.ieee.org/abstract/document/8808060/ DOI: https://doi.org/10.1109/CBI.2019.00036

Zhang, H., Ji, Z., Wang, H., & Wu, W. (2019). Survey on quantum information security. China Communications. https://ieeexplore.ieee.org/abstract/document/9070131/ DOI: https://doi.org/10.23919/JCC.2019.10.001

Zhang, P., Schmidt, D. C., White, J., & Dubey, A. (2019). Consensus mechanisms and information security technologies. Advances in Computers. https://www.sciencedirect.com/science/article/pii/S0065245819300245 DOI: https://doi.org/10.1016/bs.adcom.2019.05.001

Zhang, Y. (2022). DBSCAN Clustering Algorithm Based on Big Data Is Applied in Network Information Security Detection. Security and Communication Networks. https://doi.org/10.1155/2022/9951609 DOI: https://doi.org/10.1155/2022/9951609

Downloads

Published

2024-07-28

How to Cite

Muratovich, M. A. . (2024). Essence and Conceptual Foundations of The Concept of Information Security. Academicia Globe: Inderscience Research, 1(2), 8. https://doi.org/10.47134/academicia.v1i2.11

Issue

Section

Articles