Page 229 - JOURNAL OF LIBRARY SCIENCE IN CHINA 2015 Vol. 41
P. 229

228   Journal of Library Science in China, Vol. 7, 2015



            research lifecycle, the research data management workflow and the rights management. According to
            the research data rights management workflow, this paper establishes a framework which includes 24
            items of the general research data, the relationships between rights and interests, forms and policies.
            The DLM is therefore an approach to confront the challenges in research data sharing.
              DLM can be used in many fields including Chinese academic journals, institutional repositories,
            academic evaluation, intelligence research and information services. Libraries can provide new
            services by making full use of existing data. The limitation of this study is that our results are
            only based on literature review and accordingly a theoretical framework is set up. Therefore,
            implementation schemes are to be explored in future practice.




            On information security, network security and cyberspace security

            Shiwei WANG 1 ∗

            In recent years, information security, network security and cyberspace security have become high
            frequency words in the non-traditional security field at home and abroad. In the security strategy
            and policy documents, in the names of appropriate national authorities and in the news reports
            and the terminology of the theoretical and academic researches, as well as in various related
            activities, these concepts appear at the same time, but the logic boundaries are not clear. As a
            result, it is necessary to make an in-depth study in order to reach a clear understanding on the
            logic starting point of information security research and practice, and form academic norms in the
            basic theoretical research of information security with the consensus of people inside and outside
            the concerned field. Based on the recent literature in the field of global information security, in
            particular relevant policies in various countries, and combined with related practical activities, this
            paper attempts to make certain preliminary discussions on such concepts as information security,
            network security, cyberspace security and their relationships with each other.
              Using comparative methodology, this paper lists the usages of“information security”in all
            kinds of literature in 2000-2014 and makes a comparison. It finds that since entering the 21st
            century,“information security”has become the focus of national security in all countries. There
            are both theoretical studies and explorations of state secrets, commercial secrets and personal
            privacy, both national strategic plans and the management of information security content, both
            the development of information security technology standards and the draft of international codes
            of conduct. Information security has become one of the most important non-traditional security
            field concerning the global overall security and integrated security. This paper also analyzes the
            rich connotation of“information security”and a series of related concepts, such as information
            warfare, information sovereignty, information territory and others.

            * Correspondence should be addressed to Shiwei WANG, Email: swwang@sass.org.cn
   224   225   226   227   228   229   230   231   232   233   234