Font Size: a A A

Research On The Information Security During The Opening And Using Of Archives

Posted on:2013-01-24Degree:MasterType:Thesis
Country:ChinaCandidate:J L LiuFull Text:PDF
GTID:2248330371499304Subject:Archival science
Abstract/Summary:PDF Full Text Request
Archives, as the product of human history and civilization, as the valuable asset of the world, which is being opened and used safely, is the cornerstone and mission of archives work, is the heritage and development of the history and culture. However, the information security during the process will be facing many threats. Nowadays, the frequent natural disaster and the imperfect of management processes result in the dangers of Archives information are increasing. In addition, the rising of electronic archives also need to strengthen the information security technology, regulations, management measures, and so on. To deal with these problems, trying to secure archives safety during the opening’and using, the archives departments and agencies must strengthen all aspects of capacity building to build a multi-faceted, strong and effective archives information security system. The system must cover all aspects of macro and micro, as far as possible to protect the "security of archival information without leaving any blank. To establish a scientific and valid archives information security system, that should include the environment, regulations, technology, management, standards and human resources.This article mainly including the below six parts:the first part is an introduction, mainly introduced the research purpose and significance, the domestic and foreign research present situation, the research mentality and the innovation. The second part provides an overview of the connotation and characteristics, the forms and means of the opening and using of archives, as well as the information security connotation and meaning in this process. The third part indicates that the main problem which is faced by the security information in the process of opening and using of archives. In this part, a detailed analysis of the lack of hardware and software environment, laws and regulations, security technology, management methods, standards construction and personnel training is presented. For the issues raised in the third part, the fourth part focuses on the capacity building of information security. To start from the physical archives and electronic archives, the part describes the supporting capacity building by hardware and software environment, the instructing capacity building by blameless policies and regulations, the protection capacity building by tight security technology, the basal capacity building by scientific and orderly management, the executing capacity building by uniform industry standard, the developmental capacity building by personnel training. The fifth part attempts to establish the security mechanism and the regulatory system in the process of opening and using for archives. This part explains the need to establish emergency safeguard mechanism. In addition, the detailed description of the establish processes, connotations, and the theory of vision are obtained. The sixth part is the conclusion part, summarizes this article’s innovation and insufficient. Strengthening the research on the information security during the opening and using of archives, the one hand, which is to meet the needs of archival information resources security, the other hand, which is the needs of the rational use of archival information resources, and which is the inevitable choice to promote the steady development of the archives cause. From the view of the process of the archives to open and use, the task to protect the archives information security is arduous extremely, because of the multiple safety hazards must be faced with. So, must be from many dimensions of the environment, system, technology, management, regulations, personnel to consider and plan. All aspects of information security capacity building should be as an organic system works to promote the process is carried out smoothly.
Keywords/Search Tags:Archives, Opening and Using, Information SecurityIndemnification
PDF Full Text Request
Related items