{"title":"信息技术革命阶段的信息安全及其保障方式","authors":"N. Fedorova, V. Smiesova","doi":"10.32843/bses.57-2","DOIUrl":null,"url":null,"abstract":"the characteristics of information and psychological security of the individual are studied and threats to information security and information sovereignty of the individual and society are identified. The main directions of ensuring the information security of the individual are clarified. It turns out that the most effective method of ensuring the information sovereignty of the individual is the formation of so-called “information immunity”. This means formation in the individual the ability to ignore information that he does not need and creates internal psychological barriers to messages with a manipulative component.","PeriodicalId":288313,"journal":{"name":"Black Sea Economic Studies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"INFORMATION SECURITY AND WAYS OF ITS SUPPORT AT THE STAGE OF INFORMATION AND TECHNOLOGICAL REVOLUTION\",\"authors\":\"N. Fedorova, V. Smiesova\",\"doi\":\"10.32843/bses.57-2\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"the characteristics of information and psychological security of the individual are studied and threats to information security and information sovereignty of the individual and society are identified. The main directions of ensuring the information security of the individual are clarified. It turns out that the most effective method of ensuring the information sovereignty of the individual is the formation of so-called “information immunity”. This means formation in the individual the ability to ignore information that he does not need and creates internal psychological barriers to messages with a manipulative component.\",\"PeriodicalId\":288313,\"journal\":{\"name\":\"Black Sea Economic Studies\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Black Sea Economic Studies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.32843/bses.57-2\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Black Sea Economic Studies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32843/bses.57-2","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
INFORMATION SECURITY AND WAYS OF ITS SUPPORT AT THE STAGE OF INFORMATION AND TECHNOLOGICAL REVOLUTION
the characteristics of information and psychological security of the individual are studied and threats to information security and information sovereignty of the individual and society are identified. The main directions of ensuring the information security of the individual are clarified. It turns out that the most effective method of ensuring the information sovereignty of the individual is the formation of so-called “information immunity”. This means formation in the individual the ability to ignore information that he does not need and creates internal psychological barriers to messages with a manipulative component.