Abstract
Some problems of information security must to take into account the specific features of perception and information processing in a variety of social institutions. Such typology of institutions allows making a more complete management of information security. Existing typologies of social institutions are based mainly on the external characteristics to them. The formal and informal institutions, development and predatory institutions, social and economic, etc. are described. Such typologies of social institutions are mainly used for problems of economic, political, and social security. Known tools cannot directly to use these typologies to problems of information security. The typology is developed for coding of individuals for carrying out activities within the framework of a social institution, using the methods of their training in methods and standards of individual and collective activity, as well as infrastructures, which within the social institution responsible for their training. It is shown that there are three types of social institutions for the encoding of the individual in methods of activity: personality-nominal, professional-nominal and universal-conceptual. The developed typology can describe the important information security features of social institutions, such as institutions of corruption, mafia, terrorism, law, higher education, and information characteristics for interaction between social institutions, which are the different types. The developed typology uses only information characteristics, which describe the activities of man, society and the state.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.