Abstract
This paper proposes to apply laws of systems theory to study the problems of information security and substantiates the importance of taking into account the social effects of cyberspace development.
Similar content being viewed by others
REFERENCES
Bertalanffy, L. von, General System Theory: Foundations, Development, Applications, George Braziller Incorporated, 2015.
Bertalanffy, L. von, Problem of Life. An Evolution of Modern Biological and Scientific Thought, New York: Harper, 1960.
Bogdanov, A.A., Vseobshchaya organizatsionnaya nauka: Tektologiya (General Organizational Science: Tectology), Moscow: Ekonomika, 1989.
Volkova, V.N. and Denisov, A.A., Teoriya sistem i sistemnyi analiz: Uchebnik (Theory of Systems and Systems Analysis: Textbook), Moscow: Yurait, 2014.
Volkova, V.N., Zaslavskii, M.M., and Chernyi, Yu.Yu., Information and entropic-negentropic processes in socio-economic systems, Nauka v sovremennom informatsionnom obshchestve. Materialy VI mezhdunarodnoi nauchno-prakticheskoi konferentsii (Science in the Modern Information Society. Proc. VI Int. Sci.-Pract. Conf.), 2015, pp. 193–195.
Volkova, V.N. and Chernyi, Yu.Yu., Institutes of social memory as the basis of negentropic tendencies in society, Obshchestvo, nauka i innovatsiya: Sbornik statei Mezhdunarodnoi nauchno-prakticheskoi konferentsii (Society, Science, and Innovation: Proc. Int. Sci.-Pract. Conf.), Ufa, 2015, part 2, pp. 101–106.
Grave, P.S. and Rastrigin, L.A., Kibernetika i psikhika (Cybernetics and Psyche), Riga: Zinatne, 1973.
Denisov, A.A., Sovremennye problemy sistemnogo analiza: Uchebnik (Contemporary Problems of System Analysis: Textbook), St. Petersburg: Izd. Politekh. Univ., 2008.
Denisov, A.A., Glazami narodnogo deputata SSSR (Through the Eyes of the People’s Deputy of the USSR), St. Petersburg: Politekh. Univ., 2005.
Zegzhda, D.P. and Pavlenko, E.Yu., Cyber-physical system homeostatic security management, Autom. Control Comput. Sci., 2018, vol. 51, no. 8, pp. 805–816.
Zegzhda, D.P. and Stepanova, T.V., Thermodynamic approach to modeling multi-agent systems in cyberspace, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 622–626.
Zegzhda, P.D. and Kalinin, M.O., Automatic security management of computer systems, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 665–672.
Zegzhda, P.D., Zegzhda, D.P., and Stepanova, T.V., Approach to the construction of the generalized functional- semantic cyber security model, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 627–633.
Kalinin, M.O., Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., Clarifying integrity control at the trusted information environment, Computer Network Security: International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS-2010), St. Petersburg, 2010, pp. 337–344.
Kalinin, M.O., Zegzhda, D.P., and Zegzhda, P.D., IT systems security monitoring and control via advanced concern with integrity property, International Conference on Information Security and Privacy (ISP-10): Proceedings of the Conference, Orlando, 2010, pp. 74–79.
Mesarovich, M.D., Macko, D., and Takahara, Y., Theory of Hierarchical, Multilevel, Systems, Elsevier, 1970.
Mikhailov, A.I., Chernyi, A.I., and Gilyarevskii, R.S., Nauchnye kommunikatsii i informatika (Scientific Communications and Informatics), Moscow: Nauka, 1976.
Pavlenko, A.N., The pastoral model of communication and Vim-technologies, Sbornik materialov XVI konferentsii “Nauka. Filosofiya. Religiya”: Chelovek pered vyzovom noveishikh informatsionnykh i kommunikativnykh tekhnologii (g. Dubna, 21–22 oktyabrya 2013 g.) (Proc. XVI Conf. Science. Philosophy. Religion: Humanity Facing the Challenge of the Latest Information and Communication Technologies (Dubna, October 21–22, 2013)), Moscow, 2014, pp. 120–147. http://www.inion.ru/files/File/Pavlenko_A_N_Dubna-2013_Presentation.ppt.
Stepanova, T.V. and Zegzhda, D.P., Large-scale systems security evolution: Control theory approach, 8th International Conference on Security of Information and Networks, Sochi, 2015.
Ursul, A.D., Problema informatsii v sovremennoi nauke (The Problem of Information in Modern Science), Moscow: Nauka, 1975.
Chernyi, Yu.Yu., Afterword to the 7th meeting of the seminar Methodological Problems of Information Sciences, in Teoriya i praktika obshchestvennoi nauchnoi informatsii: Sb. nauch. tr. (Theory and Practice of Public Scientific Information: Collection of Papers), Moscow: Inst. Nauchn. Inf. Obshchestv. Naukam, 2014, vol. 22, p. 234.
Schumpeter, J., Capitalism, Socialism and Democracy, Harper & Brothers, 1942.
Engel’gardt, V.A., On some attributes of life: Hierarchy, integration, and recognition, Vopr. Filos., 1976, no. 7, pp. 65–81.
Atkins, P.W., The Second Law, Scientific American Library, 1984.
https://en.wikipedia.org/wiki/Abram_de_Swaan.
Author information
Authors and Affiliations
Corresponding authors
Additional information
Translated by K. Lazarev
About this article
Cite this article
Volkova, V.N., Chernyi, Y.Y. Application of Systems Theory Laws for Investigating Information Security Problems. Aut. Control Comp. Sci. 52, 1164–1170 (2018). https://doi.org/10.3103/S0146411618080424
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411618080424