Information Industry Security: An Ecological Point of View

نویسندگان

  • Menggang Li
  • Xiaolan Guan
چکیده

There is great similarity between the information industry security and ecosystem of information industry. Therefore, using the theory and methods of ecology and system science, we studied the issue of information industry security in detail based on the theory of ecosystem from the level of individual, cluster, and so on, and take China’s information industry security as an example of empirical research, then provided a range of effective policy suggestions for relevant Chinese government departments to control and guide China's information industry security.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information Security Requirements for Implementing Electronic Health Records in Iran

Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...

متن کامل

Information Security Requirements for Implementing Electronic Health Records in Iran

Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...

متن کامل

Critical Success Factors in implementing information security governance (Case study: Iranian Central Oil Fields Company)

The oil industry, as one of the main industries of the country, has always faced cyber attacks and security threats. Therefore, the integration of information security in corporate governance is essential and a governance challenge. The integration of information security and corporate governance is called information security governance. In this research, we identified "critical success factor...

متن کامل

A Survey of Librarians' Perspectives on Marketing Library Services Using Social Media in Tehran, Iran, and Shahid Beheshti Universities of Medical Sciences

Background and Aim: The present study has examined librarians' views on the marketing of library services using social media as well as the applications, benefits, and challenges of their use in Tehran, Iran, and Shahid Beheshti Universities of Medical Sciences.  Materials and Methods: This research was a descriptive and applied survey and was conducted in 2019. The data collection tool was a ...

متن کامل

A Survey of Anomaly Detection Approaches in Internet of Things

Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015