Author
Listed:
- Hacer Tugba Eroglu
(SELCUK UNIVERSITY)
- Hayriye Sagir
(SELCUK UNIVERSITY)
Abstract
Today, the use of information is gradually increasing in private sector and public sector. Besides that the importance of information increases, keeping and storing it in a safe way also appeared as an important need. Also, transferring it from one place to another place became inevitable need. This dependency to information made a current issue the need of keeping information. The attacks to information, its destroying, its cleaning, and being damaging of its confidentiality causes informational infrastructure to fall into decay and this, together with it, also leads the things to go wrong. Thus, the safety of information system gradually becomes more important. However, in information age, taking information under control gradually becomes difficult. Making the information flow more safe, from now on, has become a policy of governments. On this purpose, Information Safety Management System was developed. Informational Safety Management System is a systematic approach adopted for being able to manage the sensitive information of institute. The main purpose of this system is to keep the sensitive information. The works on this system includes work systems and information technology (IT) processes. Lack of information flow actualizing thanks to various environments in internet threatens the future safety of information. Information is easily obtained without permission. Performing the information circulation through open networks increases the risk. Information Safety Management System includes what kind of actions should be taken toward keeping the easily obtained information and how a policy should be followed. In this study, in related to information management safety, SWOT Analysis toward what kind of strategy public institutes in Turkey follow will be carried out. Thus, emphasizing strengths and weaknesses on information safety, what the institutes will be able to do will be suggested so that they eliminate their weaknesses. In addition, how the institutes prevented the possible threats and evaluated the opportunities will be included in the study.
Suggested Citation
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:sek:iacpro:0801970. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Klara Cermakova (email available below). General contact details of provider: https://iises.net/ .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.