To see the other types of publications on this topic, follow the link: Information security legislations.

Journal articles on the topic 'Information security legislations'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Information security legislations.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Nte, Ngboawaji Daniel, Vigo Augustine Teru, and Arifin Ridwan. "Challenges of information security laws and legislations in Nigeria’s institutions of higher education: Views from Yola, Adamawa state." Research and Development in Education (RaDEn) 4, no. 2 (2024): 1498–519. https://doi.org/10.22219/raden.v4i2.35711.

Full text
Abstract:
The menace of threats against information security worldwide cannot be overemphasis. The whole gamut of statecraft, national security, public safety, international trade and indeed postmodernity revolves around information security. As a country, Nigeria is part of a global system facing this monumental threat and institutions of higher education are a subset of the vulnerability circle. This work therefore seeks to evaluate the challenges of implementation of information security laws and legislations in Nigerian institutions of higher education with special focus of higher education institut
APA, Harvard, Vancouver, ISO, and other styles
2

Tang, Chang Long. "Establish a Dynamic Business Driven Integrative Information Security Architecture." Applied Mechanics and Materials 513-517 (February 2014): 1309–15. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1309.

Full text
Abstract:
With Respect to the challenges most organizations are facing when considering information security management, especially how to demonstrate the value of security to senior leadership and how to meet all kinds of legislations in one place, this article describes a dynamic business driven integrative information security architecture to address those problems. By designing the architecture through three levels which are domain level, component level, and control level, the architecture is target to establish alignment and traceability between business and security, build customer service concep
APA, Harvard, Vancouver, ISO, and other styles
3

Parraguez Kobek, Luisa, and Erick Caldera. "Cyber Security and Habeas Data: The Latin American response to information security and data protection." OASIS, no. 24 (November 3, 2016): 109. http://dx.doi.org/10.18601/16577558.n24.07.

Full text
Abstract:
Habeas Data is not a commonly known concept, yet it is widely acknowledged in certain circles that deal with information security and data protection. Though it has been around for decades, it has recently gained momentum in Latin America. It is the legal notion that protects any and all information pertaining to the individual, from personal to financial, giving them the power to decide how and where such data can be used. At the same time, most Latin American countries have created laws that protect individuals if their information is misused. This article examines the concept of Habeas Data
APA, Harvard, Vancouver, ISO, and other styles
4

Al-Suqri, Mohammed Nasser, Salim Said Alkindi, Naifa Eid Saleem, and Marwa Suliman Al-Nabhani. "Libraries and National Security: A Review of the Evidence and a Proposed New Strategic Direction." Journal of Arts and Social Sciences [JASS] 11, no. 3 (2023): 17–27. http://dx.doi.org/10.53542/jass.v11i3.4479.

Full text
Abstract:
The article aims to identify and discuss the various roles that libraries hold with regard to national security and to use the findings to propose a more clearly delineated future role for the global and national communities which reconciles these diverse and sometimes conflicting roles. The review of literature revealed that the roles of libraries with regard to national security fall mainly into two categories. That which has received most attention, mainly in the U.S. context, involves co-operation with the provisions of national security legislation which relate to libraries and their user
APA, Harvard, Vancouver, ISO, and other styles
5

余梦凝. "国外个人信息保护理论及立法". 國際人文社科研究 2, № 3 (2023): 72–84. https://doi.org/10.63944/q3abbt37.

Full text
Abstract:
The importance of personal information protection has become more prominent in the era of digitization. Studying and sorting out foreign personal information protection theories, principles, legislative models, and studying foreign experiences has certain practical significance. There are differences in personal information appellation in different countries, and personal information protection theories also have their own characteristics. The emergence of personal privacy theory, code theory, self Cybernetics, etc. has an important impact on personal information protection legislation. The da
APA, Harvard, Vancouver, ISO, and other styles
6

Gupta, Manvi, and Ayush Gupta. "Cyber Security Legal Framework in India – Overlaps, Problems and Challenges." Journal of Business Management and Information Systems 12, no. 1 (2025): 11–20. https://doi.org/10.48001/jbmis.1201002.

Full text
Abstract:
Cybersecurity in India is governed by a complex legal framework designed to protect information infrastructure, secure data, and mitigate cyber threats. The increasing digitalization across sectors has amplified the need for robust cybersecurity laws. The legal framework is still evolving and continuous steps have been taken by the authorities to promulgate legislations as and when required as evidenced in the last decade. In this paper, we examine the evolving cybersecurity legal framework in India and highlight the major problems and challenges. We explore the major legislation that deals wi
APA, Harvard, Vancouver, ISO, and other styles
7

Tretiak, Maria. "Specific Features of Protection Against Computer-Aided Criminal Infringements on Cashless (Electronic) Funds in Contemporary Criminal Legislations of Belarus and Russia." Russian Journal of Criminology 15, no. 5 (2021): 592–604. http://dx.doi.org/10.17150/2500-4255.2021.15(5).592-604.

Full text
Abstract:
The dominance of a distance form of interactions in modern conditions resulted in an increase in operations with cashless (electronic) funds, which led to a growth of the number of acquisitive cybercrimes. The author examines criminal law measures of protecting cashless (electronic) funds against criminal infringements in the cybersphere and conducts legal analysis of regulations on acquisitive crimes against property and information security reflected in criminal legislations of Belarus and Russia. Special attention is paid to the characteristic features of protection measures against acquisi
APA, Harvard, Vancouver, ISO, and other styles
8

Vikhrova, Olga. "Harmonization of Media Legislation in the Eurasian Economic Union Countries as a Factor of Information Security." Theoretical and Practical Issues of Journalism 11, no. 3 (2022): 489–508. http://dx.doi.org/10.17150/2308-6203.2022.11(3).489-508.

Full text
Abstract:
The article substantiates the need to harmonize the national laws governing the activities of the media of the EAEU countries in order to ensure information security in the post-Soviet space in the context of exacerbation of international geopolitical conflicts and intensification of information confrontation. The authors identify some aspects of media space regulation that are not robust legislatively including the conceptual apparatus, regulation of social media and copyright on social media platforms. The study analyzed main legislative acts regulating the activities of mass media in the co
APA, Harvard, Vancouver, ISO, and other styles
9

YANG, Mu, and Wen Xin LIM. "Recent Development of Internet Finance in China." East Asian Policy 07, no. 03 (2015): 46–60. http://dx.doi.org/10.1142/s1793930515000276.

Full text
Abstract:
The internet finance sector in China, buoyed by the rise of online payment services, online person-to-person (P2P) lending platforms and online sales of financial products, is a revolutionary means of financing. New in China, relevant legislations are lagging behind product innovations. Internet finance risks are more in risk control and consumer information security. Despite the need to regulate China’s internet banking, the key is to strike a subtle balance between stability and financial market liberalisation.
APA, Harvard, Vancouver, ISO, and other styles
10

Weerasinghe, D., K. Elmufti, V. Rakocevic, and M. Rajarajan. "Patient Privacy Protection Using Anonymous Access Control Techniques." Methods of Information in Medicine 47, no. 03 (2008): 235–40. http://dx.doi.org/10.3414/me9116.

Full text
Abstract:
Summary Objective: The objective of this study is to develop a solution to preserve security and privacy in a healthcare environment where health-sensitive information will be accessed by many parties and stored in various distributed databases. The solution should maintain anonymous medical records and it should be able to link anonymous medical information in distributed databases into a single patient medical record with the patient identity. Methods: In this paper we present a protocol that can be used to authenticate and authorize patients to healthcare services without providing the pati
APA, Harvard, Vancouver, ISO, and other styles
11

Chauhan, Poonam, and Jaya Mathew. "Evolution and Regulation of Telecommunication and Internet in India." Law, State and Telecommunications Review 15, no. 1 (2023): 225–55. http://dx.doi.org/10.26512/lstr.v15i1.45322.

Full text
Abstract:
[Purpose] To examine the advancement of nation-wise internet access in the context of policy and regulations that facilitated the transformation of Indian telecommunication. It analyzes government policies on the development of internet infrastructure, technical standards, content, security and digital inclusion. [Methodology/Approach/Design] Review of Indian regulations and Policy measures governing the evolution of internet and telecommunication sector. Study of Telecom Regulatory Authority of India Act,1997 and subordinate legislations. The study of draft Indian Telecommunication Bill, 2022
APA, Harvard, Vancouver, ISO, and other styles
12

L.E. Asuelime, Legend, and Raquel A. Asuelime. "Media Jihad Conundrum in Nigeria: A Review of Military-Media Relations vis-à-vis Boko Haram." Journal of African Films & Diaspora Studies 4, no. 2 (2021): 7–22. http://dx.doi.org/10.31920/2516-2713/2021/4n2a1.

Full text
Abstract:
The purpose of this paper is to explore the conundrum in military-media relations in Nigeria with regards to access and dissemination of strategic and tactical information that impacts counterterrorism efforts. Is there a line between media responsibility to report and the gathering and dissemination of strategic and tactical military information not meant for public consumption but filters to terrorists who are also members of the 'public'? Most times, such publications potentially afford Boko Haram terrorists prior notice of military plans, giving them early warnings that compromise military
APA, Harvard, Vancouver, ISO, and other styles
13

Brevini, Benedetta. "Metadata Laws, Journalism and Resistance in Australia." Media and Communication 5, no. 1 (2017): 76–83. http://dx.doi.org/10.17645/mac.v5i1.810.

Full text
Abstract:
The intelligence leaks from Edward Snowden in 2013 unveiled the sophistication and extent of data collection by the United States’ National Security Agency and major global digital firms prompting domestic and international debates about the balance between security and privacy, openness and enclosure, accountability and secrecy. It is difficult not to see a clear connection with the Snowden leaks in the sharp acceleration of new national security legislations in Australia, a long term member of the Five Eyes Alliance. In October 2015, the Australian federal government passed controversial law
APA, Harvard, Vancouver, ISO, and other styles
14

Danylevskyi, Andrii A., Mykhailo A. Akimov, Vladyslav I. Kutsenko, Oleksandr I. Savka, and Tetiana Ye Leonenko. "Criminal Liability for Providing Inaccurate Information about the Spread of the COVID-19 Epidemic." Cuestiones Políticas 39, no. 71 (2021): 245–66. http://dx.doi.org/10.46398/cuestpol.3971.12.

Full text
Abstract:
The aim of this study was to identify problems related to the establishment of criminal liability for providing inaccurate information about the spread of the Covid-19 epidemic, and propose the ways to solve them. To aim involved the following methods: systemic approach, descriptive statistics, comparative approach, descriptive analysis, pragmatic approach, and forecasting. The effectiveness of health authorities’ response to outbreaks of diseases depends on the completeness and accuracy of the information disseminated. In fact, national legislations do not provide criminal liability for provi
APA, Harvard, Vancouver, ISO, and other styles
15

Nasser A., Alharbi Nesreen, and Yanhui Li. "Impacts of Trust in Government and Privacy Risk Concern on Willingness to Provide Personal Information in Saudi Arabia." INTERNATIONAL JOURNAL OF MANAGEMENT SCIENCE AND BUSINESS ADMINISTRATION 6, no. 2 (2020): 7–18. http://dx.doi.org/10.18775/ijmsba.1849-5664-5419.2014.62.1001.

Full text
Abstract:
The current study followed a quantitative research design to determine the significance of the relationships presented in the research model. The relationships between Privacy risk concerns, benefit to disclose, trust, and willingness to provide personal information has been tested using SPSS. An online questionnaire in Arabic language was used collect data by distributing survey link via WhatsApp, Twitter, Snapchat, Facebook and Instagram. The sample consists out of 268 respondents. The results of the study indicate that trust has a positive impact on the privacy disclosure revenue whereas pr
APA, Harvard, Vancouver, ISO, and other styles
16

Pally, Agidi Ejime. "Restructuring, National Security and Nigeria’s Relationship with the External World." UJAH: Unizik Journal of Arts and Humanities 21, no. 4 (2021): 34–52. http://dx.doi.org/10.4314/ujah.v21i4.2.

Full text
Abstract:
Nigeria as a nation has been experiencing security challenges at alarming level in the last few years. This has taken various forms such as kidnapping from ransom, herders and farmers clashes, organized crimes, and cybercrimes, implosive movement of small and light arms. Trans border crimes, human trafficking, and slavery among others. This has affected Nigeria’s external relations with the outside world negatively in various ways, such as constriction of bilateral trade volume, cold diplomatic relations, low tourism attraction, low educational exchang e, reduction of military trainings abroad
APA, Harvard, Vancouver, ISO, and other styles
17

Makino, Tomohiko. "Japanese Regulatory Space on Biosecurity and Dual Use Research of Concern." Journal of Disaster Research 8, no. 4 (2013): 686–92. http://dx.doi.org/10.20965/jdr.2013.p0686.

Full text
Abstract:
Suspension of publishing A(H5N1) transmissibility study in 2011 revoked the dual use research of concern (DURC) in life science, which initially was triggered by the mousepox mutation research and anthrax letter event in 2001. Management in terms of biosecurity can be made in three entities: material, human, and information. Japanese legislations intensely provide material controls. The pathogen control by the infectious diseases control law categorizes pathogens and like substances of high concern into following four groups: Possession of Group 1 is prohibited, only exempted under the designa
APA, Harvard, Vancouver, ISO, and other styles
18

Yuvaraj, Mayank. "Perception of cloud computing in developing countries." Library Review 65, no. 1/2 (2016): 33–51. http://dx.doi.org/10.1108/lr-02-2015-0015.

Full text
Abstract:
Purpose – The purpose of this paper is to explore the perceptions of librarians engaged in Indian academic libraries towards cloud computing. Design/methodology/approach – A structured questionnaire was used to collect responses from the library professionals engaged in Indian academic libraries. Overall, 339 respondents participated in the survey. Descriptive survey method was used in the study. Findings – The findings of the study reveal that library professionals are using cloud-computing tools in their daily works. They want to adopt cloud computing in the libraries to improve library serv
APA, Harvard, Vancouver, ISO, and other styles
19

Basu, Anindansu, and Deb Kumar Majumder. "The Indian telemedicine challenge: in current evolving pandemic." International Journal Of Community Medicine And Public Health 8, no. 9 (2021): 4646. http://dx.doi.org/10.18203/2394-6040.ijcmph20213580.

Full text
Abstract:
The unparalleled Coronavirus disease 2019 (COVID-19) outburst has ushered a radical change in the conventional healthcare industry in India. The unprecedented lockdown and the ongoing COVID crisis has reincarnated telemedicine practice for the unforeseeable future. The Indian government was quick to realise it and laid guidelines for its practice across video, audio, or text. The teleconsultation is basically doctor-patient interaction bridged by information technology over an online platform to receive essential health-care services. All doctor-patient relationships thrive on mutual trust whi
APA, Harvard, Vancouver, ISO, and other styles
20

Ruchi, Lal. "Critique of Legal Framework Regulating E-Governance in India." RESEARCH REVIEW International Journal of Multidisciplinary 4, no. 2 (2019): 391–96. https://doi.org/10.5281/zenodo.2578071.

Full text
Abstract:
An imperative investment for economies across the world today, especially for developing countries like India, is e-governance with a vision of ensuring effectiveness and transparency in governance. At the outset, the focus of e-governance outlay was primarily on strengthening the hardware aspect of Information and Communication Technology hardware. However, the second generation expenditure now is more focused upon making e-governance a driving force for creating SMART governance wherein SMART stands for simple, moral, accountable, responsive and transparent governance. In India as well, the
APA, Harvard, Vancouver, ISO, and other styles
21

Kuleshova, Galina, Elena Kapitonova, and Georgy Romanovsky. "The Legal Basis of Countering Cyber-Terrorism in Russia and in Other Countries from the Standpoint of Its Social and Political Dimension." Russian Journal of Criminology 14, no. 1 (2020): 156–65. http://dx.doi.org/10.17150/2500-4255.2020.14(1).156-165.

Full text
Abstract:
The authors discuss the legal specifics of counteracting cyber-terrorism in Russian and in foreign law at the modern stage of the development of information space. They show that such principles of telecommunication technologies as transparency and accessibility are used by terrorist organizations for criminal purposes. The analysis of foreign legislation shows that legislations of most countries do not have a special crime of cyber-terrorism. At the same time, the use of IT in disseminating terrorist ideology is included in these legislations as an aggravating circumstance. The authors conclu
APA, Harvard, Vancouver, ISO, and other styles
22

Almaemoni, Mashal. "Disclosure of Classified Documents by The Public Officer and Its Effects In Iight of the Saudi Law." Journal of Human and Administrative Sciences, no. 28 (September 1, 2022): 207–28. http://dx.doi.org/10.56760/10.5676/vxyi6489.

Full text
Abstract:
This paper investigates the public employee’s disclosure of classified documents and the effects of such disclosure in the Saudi laws, given that classified documents are one of the most important methods of management in facilitating daily work. Besides, classified documents are of major importance with regard to state security and the interests of individuals and their personal lives. The research includes an introduction, a preface, two chapters and a conclusion. The preface demonstrates the concepts of disclosure, public employee, and classified documents. The first chapter of the research
APA, Harvard, Vancouver, ISO, and other styles
23

Srivastava, Aditi, and Dr Ritu Gautam. "Cybercrime And Senior Citizens In India – A Comparative Study Of Legal Frameworks Within Cyberspace Globally." Cyber Law Reporter 02, no. 01 (2023): 01–22. http://dx.doi.org/10.55662/cylr.2023.2102.

Full text
Abstract:
Cyber space regulation is that arena which is growing very rapidly, due to multidisciplinary approach in tackling innovation, technological updation, persistent cybercrimes emerging from interactions within cyberspace. This doctrinal paper is a critical study and analysis of challenges faced by stakeholders, jurisprudence of crimes committed within cyberspace, effect on vulnerable group ‘senior citizens’ as potential victims since emergence of Information Communication Technology. Aimed to study international treaties, national policies of QUAD members, statutes, community help programs, emerg
APA, Harvard, Vancouver, ISO, and other styles
24

Kurek, Justyna. "Safety of Electronic Communication — Problem of Anti-spam Regulations." Internal Security 9, no. 1 (2017): 21–37. http://dx.doi.org/10.5604/01.3001.0010.7421.

Full text
Abstract:
Unsolicited correspondence — so called ‘spam’ — is inextricably linked to electronic communications. It is widely considered to be the scourge of the information age and a crucial problem in respect of internet security. The phenomenon is closely associated with the development of electronic communications services. Taking into account the intense legal regulation, and not only that in EU countries, it is important to put the question — what is the reasons that current regulations seems to be insufficient. Is their ineffectiveness a result of objective factors such as the evolution of the phen
APA, Harvard, Vancouver, ISO, and other styles
25

Sogo, Angel Olofinbiyi. "A reassessment of public awareness and legislative framework on cybersecurity in South Africa." ScienceRise: Juridical Science, no. 2(20) (June 30, 2022): 34–42. https://doi.org/10.15587/2523-4153.2022.259764.

Full text
Abstract:
Cybersecurity has become a growing concern globally, following this era of unparalleled resources, power relations and technological evolution. Technological vulnerabilities have led to massive data breaches in recent years and research has highlighted potential uses of artificial intelligence to engineer more powerful cyber-attacks thus revealing new hardware weaknesses. Cyber-attacks pose a threat to critical infrastructure thereby compelling countries to intensify their national security testing for cross-border partnerships. South Africa, however, is lagging in terms of readiness and capac
APA, Harvard, Vancouver, ISO, and other styles
26

Clutterbuck, Jennifer. "The role of platforms in diffracting education professionalities." Tertium Comparationis 29, no. 1 (2023): 73–92. http://dx.doi.org/10.31244/tc.2023.01.04.

Full text
Abstract:
This paper examines the effect of data management platforms on professional educators. The ways in which platforms re-shape new professional patterns of school leaders and education bureaucrats is presented through the data management platform, OneSchool. OneSchool is used across 1,258 public schools in Queensland, Australia. Empirical data were gathered from interviews with senior bureaucrats, policy officers, and school leaders from Queensland’s public schooling system. Thematic analysis identified shifts in educational practitioners’ professional roles as they performed their tasks through
APA, Harvard, Vancouver, ISO, and other styles
27

London, Wendy. "EC information security legislation: Where now?" Computer Law & Security Review 10, no. 5 (1994): 226–33. http://dx.doi.org/10.1016/0267-3649(94)90003-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Shevchuk, M. O. "ANALYSIS OF NATIONAL INFORMATION SECURITY LEGISLATION." Juridical scientific and electronic journal, no. 1 (2025): 383–86. https://doi.org/10.32782/2524-0374/2025-1/87.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Nocera, Francesco, Salvatore Giuffrida, Maria Rosa Trovato, and Antonio Gagliano. "Energy and New Economic Approach for Nearly Zero Energy Hotels." Entropy 21, no. 7 (2019): 639. http://dx.doi.org/10.3390/e21070639.

Full text
Abstract:
The paper addresses an important long-standing question in regards to the energy efficiency renovation of existing buildings, in this case hotels, towards nearly zero-energy (nZEBs) status. The renovation of existing hotels to achieve a nearly zero-energy (nZEBs) performance is one of the forefront goals of EU’s energy policy for 2050. The achievement of nZEBs target for hotels is necessary not only to comply with changing regulations and legislations, but also to foster competitiveness to secure new funding. Indeed, the nZEB hotel status allows for the reduction of operating costs and the inc
APA, Harvard, Vancouver, ISO, and other styles
30

Negara, Dharma Setiawan, Nunu Burhanuddin, Abu Sahman Nasim, Juni Irianti Sitinjak, and Johannes Johny Koynja. "The Legal Implications of Data Protection Laws, AI Regulation, and Cybersecurity Measures on Privacy Rights in 2024." Global International Journal of Innovative Research 2, no. 7 (2024): 1644–56. http://dx.doi.org/10.59613/global.v2i7.234.

Full text
Abstract:
This study explores the legal implications of data protection laws, artificial intelligence (AI) regulation, and cybersecurity measures on privacy rights in 2024. The primary objective is to qualitatively analyze how recent advancements and legislative changes in these areas impact individual privacy rights and shape the legal landscape for data protection. The research employs a qualitative literature review methodology, synthesizing findings from academic articles, legal texts, policy papers, and case studies to provide a comprehensive understanding of the evolving legal challenges and impli
APA, Harvard, Vancouver, ISO, and other styles
31

Maluleke, Witness. "An Evaluation of Legislative Frameworks and Structures for Policing Stock Theft in South Africa." International Journal of Social Science Research and Review 6, no. 6 (2023): 315–30. http://dx.doi.org/10.47814/ijssrr.v6i6.1366.

Full text
Abstract:
South Africa has been plagued by rising incidences of stock theft for decades. However, it is now evolving and perpetrated by organised syndicates rather than only petty thieves, the continuous demands for livestock aid to the manifestation of this crime. Therefore, the objective of this study was to evaluate current legislative frameworks and available structures for policing stock theft in South African rural communities. This qualitative study adopted the non-empirical research design: Systematic review, supported by the evaluative research objective, while closely looking at recent South A
APA, Harvard, Vancouver, ISO, and other styles
32

Lobree, Bruce A. "Impact of Legislation on Information Security Management." Information Systems Security 11, no. 5 (2002): 41–48. http://dx.doi.org/10.1201/1086/43323.11.5.20021101/39851.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Schou, Corey. "The Role of Legislation in Information Security." EDPACS 20, no. 10 (1993): 1–8. http://dx.doi.org/10.1080/07366989309451622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Pooja, Rani, and Vivek Kumar Gupta Dr. "Information security legislation and regulations in India." International Journal of Trends in Emerging Research and Development 2, no. 4 (2024): 161–65. https://doi.org/10.5281/zenodo.14947963.

Full text
Abstract:
In addition to meeting their material and spiritual requirements, human people were empowered to fully cultivate and make use of their inherent humanity, intelligence, capacity, and moral compass, all because of the guarantee of human rights. Recognizing the intrinsic dignity and basic rights of every individual, they laid the groundwork for all fundamental freedoms, justice, and peace in the world. In 1994, Baseu Everyone, no matter their situation, has an inherent right to be safe from the state or other forms of public power; these rights are known as human rights. They sprang from people's
APA, Harvard, Vancouver, ISO, and other styles
35

Liu, Bang Fan, Tao Tao, and Bei Zhang. "How to Design the E-Government Information Security Legislation." Applied Mechanics and Materials 556-562 (May 2014): 5367–70. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5367.

Full text
Abstract:
With the further development of e-government construction and application, it becomes more and more urgent to strengthen the information security of e-government legislation. Information security is the guarantee of e-government construction and operation. In our country the information security problem needs the guarantee of laws and regulations urgently. It is important to legislate as soon as possible .Establishing and improving relevant legal system can promote the e-government construction and application effectively and quickly in our country. In order to ensure the information security
APA, Harvard, Vancouver, ISO, and other styles
36

MYKHALCHUK, Oksana. "Мовно-інформаційний простір у контексті українського законодавства: соціолінгвістичні аспекти". MOVOZNAVSTVO 334, № 1 (2024): 18–29. http://dx.doi.org/10.33190/0027-2833-334-2024-1-002.

Full text
Abstract:
The article focuses on the functioning of the language and information space as a marker of the state and on the choice of the language of information. The relationship between language and information is taking on new forms in the context of globalization and the intensive development of information dissemination. The information society is formed in the system of legislative, quantitative and qualitative dimensions of the language and information environment. The author outlines the prognostic prospects of the impact of the language and information space on the dynamics of the language situa
APA, Harvard, Vancouver, ISO, and other styles
37

Yas, Nadia, Wided Dafri, and Zeynab Rezaei Gashti. "An Account of Civil Liability for Violating Private Life in Social Media." Education Research International 2022 (February 22, 2022): 1–11. http://dx.doi.org/10.1155/2022/3620543.

Full text
Abstract:
The incredible utilization of online media brought about significant advantages for mankind in their everyday life. In any case, its utilization was never intended for antagonistic maltreatment by an enormous number of individuals to hurt others, especially spying on their private life. As such, this has seen the issue of identity and social dangers skyrocketing in the recent past. The numerous calls for outright freedom of opinion and the privilege of the individual to talk about everything, away from legitimate punishments, just as obliviousness of numerous individuals of their privacy right
APA, Harvard, Vancouver, ISO, and other styles
38

Ijoma, S. I., E. R. Agusi, V. I. Ifende, O. H. Osemeke, and V. T. Columba. "Biosecurity challenges in the control of avian influenza in Nigeria." Sokoto Journal of Veterinary Sciences 18, no. 3 (2020): 150–57. http://dx.doi.org/10.4314/sokjvs.v18i3.5.

Full text
Abstract:
Highly Pathogenic Avian Influenza (HPAI) has a devastating impact on the economy especially the poultry industry and it jeopardizes food security and public health. The disease which was first reported in Nigeria in 2006, re-occurred in 2015, 2016, 2018 and 2019. Inspite of the efforts the federal government has put into eradicating Avian Influenza in the country, the re-occurrence of the disease points to challenges of control efforts by stakeholders. Biosecurity challenges confronting poultry farmers and live bird market operators were implicated in new outbreaks and spread of HPAI. A cross-
APA, Harvard, Vancouver, ISO, and other styles
39

Ebert, Andreas W., Johannes M. M. Engels, Roland Schafleitner, Theo van Hintum, and Godfrey Mwila. "Critical Review of the Increasing Complexity of Access and Benefit-Sharing Policies of Genetic Resources for Genebank Curators and Plant Breeders–A Public and Private Sector Perspective." Plants 12, no. 16 (2023): 2992. http://dx.doi.org/10.3390/plants12162992.

Full text
Abstract:
Plant breeders develop competitive, high-yielding, resistant crop varieties that can cope with the challenges of biotic stresses and tolerate abiotic stresses, resulting in nutritious food for consumers worldwide. To achieve this, plant breeders need continuous and easy access to plant genetic resources (PGR) for trait screening, to generate new diversity that can be built into newly improved varieties. International agreements such as the Convention on Biological Diversity (CBD), the International Treaty on Plant Genetic Resources for Food and Agriculture (ITPGRFA) and the Nagoya Protocol rec
APA, Harvard, Vancouver, ISO, and other styles
40

Tereschenko, Ludmila Konstantinovna, Olesya Evgenievna Starodubova, and Nikita Alekseevich Nazarov. "New Information Technologies and Data Security." Legal Issues in the Digital Age 4, no. 2 (2023): 158–75. http://dx.doi.org/10.17323/2713-2749.2023.2.158.175.

Full text
Abstract:
The paper provides a review of the research workshop “New Information Technologies and Data Security” took place on 23 May 2023 at the Institute of Foreign Legislation and Comparative Law (ILCL). The authors reflect the keynotes of the reports made by representatives of the Institute of Legislation and Comparative Law, Kutafin Moscow State Law University, National Research University–Higher School of Economics (NRU-HSE), Moscow State Lomonosov University (MGU), Plekhanov State University of Economics, Moscow State City Pedagogical University, etc. The paper provides an insight into the legal i
APA, Harvard, Vancouver, ISO, and other styles
41

Amirkhanov, K. G., O. V. Tolstykh, and O. V. Isaev. "Analysis of legislation in the field of information security." Закон и право, no. 11 (2022): 27–29. http://dx.doi.org/10.56539/20733313_2022_11_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

SHEVCHUK, Oksana. "Constitutional and legal basis of ensuring information security in Ukraine." Scientific Bulletin of Flight Academy. Section: Economics, Management and Law 5 (December 21, 2021): 209–15. http://dx.doi.org/10.33251/2707-8620-2021-5-209-215.

Full text
Abstract:
Abstract. It is substantiated that information security is considered on the same level with such integral features of statehood as sovereignty and territorial integrity. The information sphere is referred to in other articles of the Basic Law, in particular, Art. Art. 31 32, 34, 50 in the context of providing constitutional guarantees of the right to secrecy of correspondence, telephone conversations, telegraph and other correspondence; protection from invasion of privacy; protection against illegal dissemination of confidential information, judicial protection of the right to refute inaccura
APA, Harvard, Vancouver, ISO, and other styles
43

Teymur oğlu Məmmədov, Emin. "INFORMATION, INFORMATION SYSTEMS AND LEGAL PROBLEMS OF INFORMATION SECURITY." SCIENTIFIC WORK 65, no. 04 (2021): 408–11. http://dx.doi.org/10.36719/2663-4619/65/408-411.

Full text
Abstract:
According to the legal literature, information and information systems are objects of information-legal relations. Information is facts, opinions, information, news or other information created or obtained as a result of any activity, regardless of the date of its creation, form of presentation and classification. An information system is a regulated set of information technologies and documents. Information security means the protection of information and the infrastructure that serves it from unacceptable, harmful or accidental or intentional threats to the participants of the information re
APA, Harvard, Vancouver, ISO, and other styles
44

SHELMENKOV, VALENTIN N. SHELMENKOV. "Information security in remote banking." Proceedings of the Institute of State and Law of the RAS 15, no. 3 (2020): 188–204. http://dx.doi.org/10.35427/2073-4522-2020-15-3-shelmenkov.

Full text
Abstract:
Improving the technology for providing banking services via the Internet opens up a promising market for remote banking systems, which, in turn, leads to an increase in the number of frauds in this area, in this paper considered the main threats to information security in the banking system, protection and combating fraud in the provision of remote banking services, which are lacking for the appropriate protection of bank funds, as well as to identify ways to solve existing problems in the legislation to achieve security in a financial institution.
APA, Harvard, Vancouver, ISO, and other styles
45

Chatterji, Dr Souvik. "Critical Examining the New Labour Codes of India in Respect to the Existing Provisions." International Journal for Research in Applied Science and Engineering Technology 13, no. 6 (2025): 2166–74. https://doi.org/10.22214/ijraset.2025.72583.

Full text
Abstract:
The ongoing discussion regarding Indian labor laws impeding the flexibility of the labor market has become a prominent issue over the past two decades, following the economic liberalization period. In an effort to streamline and simplify labor laws to promote a more business-friendly environment, the Indian government has introduced new labor codes, marking a significant milestone in labor law reform over the last thirty years. Conversely, labor unions strongly argue that the Indian labor market remains 'flexible' to the benefit of employers, despite the existence of what they perceive as 'res
APA, Harvard, Vancouver, ISO, and other styles
46

Frolovskaya, Yulia I., and Tatiana A. Bondarenko. "Problem Issues of Collecting Personal Data in the Era of Global Digitalization." Sociopolitical Sciences 15, no. 3 (2025): 182–88. https://doi.org/10.33693/2223-0092-2025-15-3-182-188.

Full text
Abstract:
In the era of rapid development of information technologies, we are faced with a fundamental imbalance between the technical improvement of monitoring systems and the legal mechanisms for their regulation. The central problem of today’s digital landscape is the critical discrepancy between the technological potential of monitoring systems and the insufficient legal framework regulating their functioning. This gap is especially noticeable in the international legal field, where national legislations often fail to adapt to the global nature of technologies. The mass collection of users’ digital
APA, Harvard, Vancouver, ISO, and other styles
47

Dadasheva, Aminat S., Zara D. Makazieva, and Lalita R. Isipova. "CRIMINAL LAW PROTECTION OF PERSONAL INFORMATION SECURITY OF CITIZENS." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 5/6, no. 146 (2024): 6–11. http://dx.doi.org/10.36871/ek.up.p.r.2024.05.06.001.

Full text
Abstract:
The security of personal information of citizens is a common concern of all sectors of society. The criminal legislation of our country has long included encroachment on personal information as a crime. However, various obstacles affect the effective implementation of the protection of the safety of citizens. Therefore, this article will provide a specific analysis of the implementation of criminal legislation to protect the security of personal information of citizens, as well as put forward proposals based on obtaining a correct understanding in order to improve the feasibility of criminal l
APA, Harvard, Vancouver, ISO, and other styles
48

Makwae, Evans Nyanyu. "Legal frameworks for personnel records management in support of accountability in devolved governments: a case of Garissa County Government." Records Management Journal 31, no. 2 (2021): 109–33. http://dx.doi.org/10.1108/rmj-05-2019-0024.

Full text
Abstract:
Purpose Accountability in personnel records management is to a large extent, dependent on the availability of personnel records, there has been very little recognition of the need to address the management of personnel records as evidence for accountability either in relation to Freedom of Information (FOI) or Open Data. It is in this regard, therefore, the purpose of this study is to investigate the legal frameworks for personnel records management in support of accountability. The study used a descriptive design which combined both qualitative and quantitative approaches where both qualitati
APA, Harvard, Vancouver, ISO, and other styles
49

Polotnianko, Oksana, Tetiana Madryha, Vira Pyrohovska, Spartak Pozniakov, and Olena Berezovska-Chmil. "Regulatory frameworks for securing electoral processes in Ukraine: managing information security challenges." Multidisciplinary Science Journal 6 (May 7, 2024): 2024ss0702. http://dx.doi.org/10.31893/multiscience.2024ss0702.

Full text
Abstract:
The administrative and legal framework for managing the information security of electoral processes in Ukraine includes regulations, various measures and procedures that are primarily aimed at ensuring the reliability and security of the electoral process due to the negative impact of external information, manipulation and illegal interference. Cyberattacks, media manipulations, and imperfect legal frameworks in the electoral sphere can lead to the invalidation of election results and the loss of confidential information. The main purpose of the domestic legislation is to strengthen the releva
APA, Harvard, Vancouver, ISO, and other styles
50

Churilin, German. "Biometrics in Information Security." NBI Technologies, no. 4 (February 2020): 30–36. http://dx.doi.org/10.15688/nbit.jvolsu.2019.4.4.

Full text
Abstract:
To control the access to information systems (IS), user identification and authentication processes play an important role, which allows to identify the user by the identifier and verify its authenticity. In the most common case, these systems are based on a combination of a username and a password, i.e. the user must remember this combination. However, in recent years, the popularity of systems that use human biometric data, which is always with us and can not be forgotten or lost, has increased, which provides certain convenience for users, since they do not need to remember anything or pres
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!