ANALYSIS OF CRITERIA FOR ENSURINGINFORMATION SECURITY OF SCIENTIFIC AND EDUCATIONAL RESOURCES
DOI:
https://doi.org/10.17770/sie2018vol1.3264Keywords:
information security, information assets, value of information scientific and educational information, digital library, corporate networkAbstract
At present, information and knowledge in the field of science and education are strategic resources. From their formation, renewal, distribution depends not only the scientific and educational spheres, but also the socio-economic development of the country. Therefore, the confidentiality, integrity and accessibility of databases of a scientific and educational nature are an important subject of research. The purpose of this article is to conduct an analysis of methods, criteria for assessing units of scientific information in terms of ensuring information security. Classification of criteria for the evaluation of scientific and educational information (SEI), their systematization, analysis of problem of ensuring the security of information resources are given. Also, the information infrastructure development indicators and projects implemented in the field of information security are outlined. Evaluation of SEI units is carried out by experts who themselves have a weighting factor and are dependent on their qualifications. The results of the research are the basis for the creation of an automated system for ensuring information security in the corporate library system of academic libraries. The corporate network forms an electronic public library, distributes the SEI between resource users. The information security system will ensure the regulation of access to resources.Downloads
References
Alex, W. (2016). How Do You Value Information. Datanami Whitepaper. Retrieved from https://www.datanami.com/2016/09/15/how-do-you-value-information/
Antonio, L., Francesca, I., & Giovanni S. (2012). Knowledge assets assessment strategies: organizational value, processes, approaches and evaluation architectures. Journal of Knowledge Management, Vol. 16 Issue: 4, 563-575.
Chris, H., & Dave W. (2009). Valuing Information as an Asset. EURIM Value of Information Subgroup. Retrieved from
http://www.eurim.org.uk/activities/ig/InformationAsset.pdf
Daniel, M., & Peter W. (1999). Measuring the Value of Information - An Asset Valuation Approach. European Conference on Information Systems (ECIS’99). Retrieved from http://si.deis.unical.it/zumpano/2004-2005/PSI/lezione2/ValueOfInformation.pdf
Maliy, Y., & Alexandrov, V. (2015). Rekomendatsii po provedeniyu analiza i otsenki riskov narusheniya bezopasnosti informatsii v bankovskoy sfere. International scientific and theoretical journal “Herald of the Belgorod University of Cooperation, Economics and Law”, 2015(1), 395-399. Retrieved from http://vestnik.bukep.ru/en_index.html
Mashkin, I. (2009). Upravleniye zashchitoy informatsii v segmente korporativnoy informatsionnoy sistemy na osnove intellektual'nykh tekhnologiy. (0520.0 901095)
Nicole, L. (2014). Six ways to measure the value of your information assets. Retrieved from http://searchcio.techtarget.com/feature/Six-ways-to-measure-the-value-of-your-information-assets
Turkhanovskaya, K., & Orlova, Y. (2016). Fuzzy model for inference in determining the class
of security of information systems management now. Journal Volgograd State Technical University, 2016(7). Retrieved from https://elibrary.ru/item.asp?id=26322491
Wilco, E. (2007). Information Assets and their Value. 6th Twente Student Conference on IT, Enschede, 2nd February, 2007, University of Twente.