Skip to main content
Log in

Application of Systems Theory Laws for Investigating Information Security Problems

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

This paper proposes to apply laws of systems theory to study the problems of information security and substantiates the importance of taking into account the social effects of cyberspace development.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

REFERENCES

  1. Bertalanffy, L. von, General System Theory: Foundations, Development, Applications, George Braziller Incorporated, 2015.

    Google Scholar 

  2. Bertalanffy, L. von, Problem of Life. An Evolution of Modern Biological and Scientific Thought, New York: Harper, 1960.

    Google Scholar 

  3. Bogdanov, A.A., Vseobshchaya organizatsionnaya nauka: Tektologiya (General Organizational Science: Tectology), Moscow: Ekonomika, 1989.

  4. Volkova, V.N. and Denisov, A.A., Teoriya sistem i sistemnyi analiz: Uchebnik (Theory of Systems and Systems Analysis: Textbook), Moscow: Yurait, 2014.

  5. Volkova, V.N., Zaslavskii, M.M., and Chernyi, Yu.Yu., Information and entropic-negentropic processes in socio-economic systems, Nauka v sovremennom informatsionnom obshchestve. Materialy VI mezhdunarodnoi nauchno-prakticheskoi konferentsii (Science in the Modern Information Society. Proc. VI Int. Sci.-Pract. Conf.), 2015, pp. 193–195.

  6. Volkova, V.N. and Chernyi, Yu.Yu., Institutes of social memory as the basis of negentropic tendencies in society, Obshchestvo, nauka i innovatsiya: Sbornik statei Mezhdunarodnoi nauchno-prakticheskoi konferentsii (Society, Science, and Innovation: Proc. Int. Sci.-Pract. Conf.), Ufa, 2015, part 2, pp. 101–106.

  7. Grave, P.S. and Rastrigin, L.A., Kibernetika i psikhika (Cybernetics and Psyche), Riga: Zinatne, 1973.

  8. Denisov, A.A., Sovremennye problemy sistemnogo analiza: Uchebnik (Contemporary Problems of System Analysis: Textbook), St. Petersburg: Izd. Politekh. Univ., 2008.

  9. Denisov, A.A., Glazami narodnogo deputata SSSR (Through the Eyes of the People’s Deputy of the USSR), St. Petersburg: Politekh. Univ., 2005.

  10. Zegzhda, D.P. and Pavlenko, E.Yu., Cyber-physical system homeostatic security management, Autom. Control Comput. Sci., 2018, vol. 51, no. 8, pp. 805–816.

    Article  Google Scholar 

  11. Zegzhda, D.P. and Stepanova, T.V., Thermodynamic approach to modeling multi-agent systems in cyberspace, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 622–626.

    Article  Google Scholar 

  12. Zegzhda, P.D. and Kalinin, M.O., Automatic security management of computer systems, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 665–672.

    Article  Google Scholar 

  13. Zegzhda, P.D., Zegzhda, D.P., and Stepanova, T.V., Approach to the construction of the generalized functional- semantic cyber security model, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 627–633.

    Article  Google Scholar 

  14. Kalinin, M.O., Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., Clarifying integrity control at the trusted information environment, Computer Network Security: International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS-2010), St. Petersburg, 2010, pp. 337–344.

  15. Kalinin, M.O., Zegzhda, D.P., and Zegzhda, P.D., IT systems security monitoring and control via advanced concern with integrity property, International Conference on Information Security and Privacy (ISP-10): Proceedings of the Conference, Orlando, 2010, pp. 74–79.

  16. Mesarovich, M.D., Macko, D., and Takahara, Y., Theory of Hierarchical, Multilevel, Systems, Elsevier, 1970.

    MATH  Google Scholar 

  17. Mikhailov, A.I., Chernyi, A.I., and Gilyarevskii, R.S., Nauchnye kommunikatsii i informatika (Scientific Communications and Informatics), Moscow: Nauka, 1976.

  18. Pavlenko, A.N., The pastoral model of communication and Vim-technologies, Sbornik materialov XVI konferentsii “Nauka. Filosofiya. Religiya”: Chelovek pered vyzovom noveishikh informatsionnykh i kommunikativnykh tekhnologii (g. Dubna, 21–22 oktyabrya 2013 g.) (Proc. XVI Conf. Science. Philosophy. Religion: Humanity Facing the Challenge of the Latest Information and Communication Technologies (Dubna, October 21–22, 2013)), Moscow, 2014, pp. 120–147. http://www.inion.ru/files/File/Pavlenko_A_N_Dubna-2013_Presentation.ppt.

  19. Stepanova, T.V. and Zegzhda, D.P., Large-scale systems security evolution: Control theory approach, 8th International Conference on Security of Information and Networks, Sochi, 2015.

  20. Ursul, A.D., Problema informatsii v sovremennoi nauke (The Problem of Information in Modern Science), Moscow: Nauka, 1975.

  21. Chernyi, Yu.Yu., Afterword to the 7th meeting of the seminar Methodological Problems of Information Sciences, in Teoriya i praktika obshchestvennoi nauchnoi informatsii: Sb. nauch. tr. (Theory and Practice of Public Scientific Information: Collection of Papers), Moscow: Inst. Nauchn. Inf. Obshchestv. Naukam, 2014, vol. 22, p. 234.

  22. Schumpeter, J., Capitalism, Socialism and Democracy, Harper & Brothers, 1942.

  23. Engel’gardt, V.A., On some attributes of life: Hierarchy, integration, and recognition, Vopr. Filos., 1976, no. 7, pp. 65–81.

  24. Atkins, P.W., The Second Law, Scientific American Library, 1984.

    Google Scholar 

  25. https://en.wikipedia.org/wiki/Abram_de_Swaan.

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to V. N. Volkova or Yu. Yu. Chernyi.

Additional information

Translated by K. Lazarev

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Volkova, V.N., Chernyi, Y.Y. Application of Systems Theory Laws for Investigating Information Security Problems. Aut. Control Comp. Sci. 52, 1164–1170 (2018). https://doi.org/10.3103/S0146411618080424

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411618080424

Keywords:

Navigation