Skip to main content

Formation of a Justified Strategy of Education in the Sphere of Information Security in the Digital Economy

  • Chapter
  • First Online:
Socio-economic Systems: Paradigms for the Future

Abstract

Formation of a modern information space leads to emergence of serious risks and new threats for information security of person, government, and society on the whole—which leads to increased responsibility of each member of the society and its protection. Thus, the issues of training of specialists in the sphere of information security become very important. The purpose of this paper is to substantiate a strategy of education in the sphere of information security in the conditions of the digital economy. The research results include determining the target groups of the educational system in the sphere of information security, justifying the system of support for interested parties, forming a model of education in the sphere of information security, organizing training in the sphere of information security, and creating a system of informing the society on the issues of information security. The research proves the conclusion that formation of a justified strategy of education in the sphere of information security could reduce the influence of risk of cyber security and stimulate the acceleration of economic development and increase of the level of comfortable interaction in the information infrastructure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Theis, T.N., Wong, H.S.P.: The end of Moore’s law: a new beginning for information technology. Comput. Sci. Eng. 19(2), 41–50 (2017)

    Article  Google Scholar 

  2. Lloyd, I.: Information Technology Law. Oxford University Press (2017)

    Google Scholar 

  3. Peltier, T.R.: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management. CRC Press (2016)

    Google Scholar 

  4. Dhillon, G., et al.: Information security concerns in IT outsourcing: identifying (in) congruence between clients and vendors. Inf. Manage. 54(4), 452–464 (2017)

    Article  Google Scholar 

  5. Safa, N.S., Von Solms, R.: An information security knowledge sharing model in organizations. Comput. Hum. Behav. 57, 442–451 (2016)

    Article  Google Scholar 

  6. Wang, S., et al.: Exploration of information security education of university students. In: International Conference on Intelligent and Interactive Systems and Applications, pp. 476–480. Springer, Cham (2017)

    Google Scholar 

  7. Bishop, M., et al. (eds.): Information security education for a global digital society. In: 10th IFIP WG 11.8 World Conference Proceedings, Rome, Italy, 29–31 May. Springer (2017)

    Google Scholar 

  8. Margarov, G., et al.: Designing effective online surveys for engineering study programs development based on feedback from stakeholders. In: Proceedings of IEEE Global Engineering Education Conference (EDUCON), Athens, Greece, pp. 239–247 (2017)

    Google Scholar 

  9. Ainsworth, H.L., Eaton, S.E.: Formal, Non-Formal and Informal Learning in the Sciences. ERIC, 48 p. (2010)

    Google Scholar 

  10. Day, C.: Competence-based education and teacher professional development. In: Competence-Based Vocational and Professional Education, pp. 165–182. Springer, Cham (2017)

    Google Scholar 

  11. Huda, M., et al.: Empowering learning culture as student identity construction in higher education. In: Student Culture and Identity in Higher Education, pp. 160–179. IGI Global (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gevorg I. Margarov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Margarov, G.I., Mitrofanova, E.A., Anikeeva, L.V. (2021). Formation of a Justified Strategy of Education in the Sphere of Information Security in the Digital Economy. In: Popkova, E.G., Ostrovskaya, V.N., Bogoviz, A.V. (eds) Socio-economic Systems: Paradigms for the Future. Studies in Systems, Decision and Control, vol 314. Springer, Cham. https://doi.org/10.1007/978-3-030-56433-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-56433-9_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-56432-2

  • Online ISBN: 978-3-030-56433-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics