Font Size: a A A

The Study Of China Guiding Ideology Evolutionary Process Of The Electronic Documents Security Management

Posted on:2013-03-30Degree:MasterType:Thesis
Country:ChinaCandidate:L MaFull Text:PDF
GTID:2248330395951652Subject:Archival science
Abstract/Summary:PDF Full Text Request
With electronic documents security situation increasingly grim in the context of the times, this study follows the time as the main line, sorting the guiding ideology of the electronic documents safety management. It also summarizes the representative view of each stage, and comments on the more typical research achievements. Basing on the insufficiency in the analysis of practice, it studies the development trend of the guiding ideology of the electronic documents safety management. The Chinese guiding ideology of the electronic file security management develops from a single technology to the integration of technology, from the emphasis on technology more than the management to on both the technology and the management, and from a links-style segments management to the system management. It looks into the future of the development trends as well.This article is divided into four parts. The first part gives the brief introduction on the subject of the background, and the related research at home and abroad. It also gives a different view to understand the electronic document security. The second and the third parts classify the guiding ideology of the electronic documents security into the traditional management ideology and the new management ideology based the guidance of the physical security and supplemented by the information security. These two parts both study from three aspects, including the theoretical basis, practical approach, and the existing insufficiency. The fourth part focuses on the guidance of the "national thinking" to the electronic document management ideology of the national information security strategy, and analyze the background and the thought of this strategic ideology formulation. Lastly, this study gives some suggestions about the formulation of this strategy.
Keywords/Search Tags:Electronic documents, Physical security, Information security, Risk management
PDF Full Text Request
Related items