Informational Security, Risks and Consequences of Digitalisation Among Mongolian Youth
Автор: Khatanbold Oidov, Tsetsenbileg Tseveen
Журнал: Евразийство и мир @eurasia-world
Рубрика: Социология
Статья в выпуске: 2, 2024 года.
Бесплатный доступ
It is impossible to imagine the shape of the future of human society without the full functioning of communication, information exchange, daily financial transactions and the use of e-social services. However, rapid technological development brings threats and risks. Our aim is to identify measures for information security and to reveal the inherent risk of causing harm to young people through digitalization, their awareness, and their knowledge levels. In a 2022-2023 social study conducted by 800 young people in five provinces and the capital, Ulaanbaatar, it was found that young people did not sufficiently understand and understand the social risks of digitalization.
Youth, Mongolia, digitalization, informational security, social risks, prevention
Короткий адрес: https://sciup.org/148329418
IDR: 148329418 | DOI: 10.18101/2949-1657-2024-2-3-12
Список литературы Informational Security, Risks and Consequences of Digitalisation Among Mongolian Youth
- Institute, S. (2016). Sans.org. Retrieved from https://www.sans.org/information-security/
- Security, D. (2023, October 24). What are the 3 Components of Information Security? (CIA Triad). Retrieved from https://dotsecurity.com/insights/blog-what-are-the-componentsinformation-security
- Oshi Chanchala, Singh Umesh Kumar. (2017). Information security risks management framework — A step towards mitigating security risks in university network . Journal of Information Security and Applications, 35 (doi:10.1016/j.jisa.2017.0), 128-137.
- Curry Michael, Marshall Byron, Crossler Robert E, & other. (2018, April 2015). InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior. 49-66.
- Retrieved from doi:10.1145/3210530.3210535; 49 (SI): 49–66.
- Stoneburner G, Hayden C, Feringa A. (2004). Engineering Principles for Information Technology Security (PDF). Retrieved August 2011, from csrc.nist.gov. doi:10.6028/NIST.SP.800-27rA.
- K.Beckers. (2015). Pattern and Security Requirements: Engineering-Based Establishment of Security Standards. Springer. ISBN 9783319166643.
- I.Hryshko. (2020). Unauthorized Occupation of Land and Unauthorized Construction: Concepts and Types of Tactical Means of Investigation I(43): 180–184. nternational Humanitarian University Herald. Jurisprudence(43), 180-184.
- Video from SPIE. (2021, May 29). the International Society for Optics and Photonics. Retrieved from doi:10.1117/12.2266326.5459349132001.
- Global risks report. (2024). Retrieved from World Economic Forum: https://www.weforum.org/publications/global-risks-report-2024/