GRAMOTA Publishers suggests publishing your scientific articles in periodicals
Pan-ArtPedagogy. Theory & PracticePhilology. Theory & PracticeManuscript

Archive of Scientific Articles

SOURCE:    Historical, Philosophical, Political and Law Sciences, Culturology and Study of Art.
Issues of Theory and Practice
. Tambov: Gramota, 2014. № 5. Part 2. P. 131-134.
SCIENTIFIC AREA:    Law Sciences
Procedure of Scientific Articles Publication | To Show Issue Content | To Show All Articles in Section | Subject Index

License Agreement on scientific materials use.

ETHICAL-LEGAL ASPECTS OF INFORMATION SECURITY

Manzhueva Oksana Mikhailovna
East-Siberian State Academy of Culture and Arts


Abstract. The article determines the value of ethical-legal norms in the process of information technologies application. The problem of computer crime is highlighted as a burning topic of modern society, the role of unified standards in solving information security problems is emphasized. The topic of copyright protection and ensuring the confidentiality of information in the broad use of information technologies is touched upon. The necessity of increasing the common level of awareness in society is emphasized for the purpose of preventing computer crimes in advance.
Key words and phrases: законодательство, интеллектуальная собственность, информационная безопасность, конфиденциальность информации, стандарты и спецификации, legislation, intellectual property, information security, confidentiality of information, standards and specifications
Open the whole article in PDF format. Free PDF-files viewer can be downloaded here.
References:
  1. Gostekhkomissiya Rossii: rukovodyashchie dokumenty Gostekhkomissii Rossii [Elektronnyi resurs]. URL: http://www.ivtechno.ru/files/rd_filter.pdf (data obrashcheniya: 05.02.2013).
  2. Gromov E. V. Razvitie ugolovnogo zakonodatel'stva o prestupleniyakh v sfere komp'yuternoi informatsii v zarubezhnykh stranakh (SShA, Velikobritanii, FRG, Niderlandakh, Pol'she) // Vestnik Tomskogo gosudarstvennogo pedagogicheskogo universiteta. 2006. № 11. S. 30-35.
  3. Upravlenie gosudarstvennymi informatsionnymi sistemami: elementy strategii i politiki // Informatsionnaya revolyutsiya: nauka, ekonomika, tekhnologiya. M.: INION RAN, 2009. S. 202-235.
  4. Khuzhin A. M. Filosofskie ponyatiya viny i nevinovnosti // Istoricheskie, filosofskie, politicheskie i yuridicheskie nauki, kul'turologiya i iskusstvovedenie. Voprosy teorii i praktiki: v 3-kh ch. Tambov: Gramota, 2011. № 2 (8). Ch. II. S. 196-200.
  5. Common Criteria for Information Technology Security Evaluation Security [Elektronnyi resurs]. URL: http://www.ipa.go.jp/security/jisec/cc/documents/CCPART1V3.1R4.pdf (data obrashcheniya: 05.02.2013).
  6. Department of Defense Trusted Computer System Evaliation Criteria, TCSEC, DoD 5200.28-STD, December 26, 1985 [Elektronnyi resurs]. URL: http://csrc.nist.gov/publications/history/dod85.pdf (data obrashcheniya: 05.02.2013 g.).
  7. Electronic Frontier Foundation [Elektronnyi resurs]. URL: https://www.eff.org/ (data obrashcheniya: 10.01.2012).
  8. Federal Information Technology Security Assessment Framework [Elektronnyi resurs]. URL: http://csrc.nist.gov/drivers/documents/Federal-IT-Security-Assessment-Framework.pdf (data obrashcheniya: 05.02.2013).
  9. Federal Office for Information Security [Elektronnyi resurs]. URL: http://www.bsi.bund.de/EN/Home/home_node.html (data obrashcheniya: 05.02.2013).
  10. Management of Government Information Systems, Elements of Strategies and Policies. N. Y., 2009. 192 p.

Procedure of Scientific Articles Publication | To Show Issue Content | To Show All Articles in Section | Subject Index

© 2006-2024 GRAMOTA Publishers

site development and search engine optimization (seo): krav.ru