Page 229 - JOURNAL OF LIBRARY SCIENCE IN CHINA 2015 Vol. 41
P. 229
228 Journal of Library Science in China, Vol. 7, 2015
research lifecycle, the research data management workflow and the rights management. According to
the research data rights management workflow, this paper establishes a framework which includes 24
items of the general research data, the relationships between rights and interests, forms and policies.
The DLM is therefore an approach to confront the challenges in research data sharing.
DLM can be used in many fields including Chinese academic journals, institutional repositories,
academic evaluation, intelligence research and information services. Libraries can provide new
services by making full use of existing data. The limitation of this study is that our results are
only based on literature review and accordingly a theoretical framework is set up. Therefore,
implementation schemes are to be explored in future practice.
On information security, network security and cyberspace security
Shiwei WANG 1 ∗
In recent years, information security, network security and cyberspace security have become high
frequency words in the non-traditional security field at home and abroad. In the security strategy
and policy documents, in the names of appropriate national authorities and in the news reports
and the terminology of the theoretical and academic researches, as well as in various related
activities, these concepts appear at the same time, but the logic boundaries are not clear. As a
result, it is necessary to make an in-depth study in order to reach a clear understanding on the
logic starting point of information security research and practice, and form academic norms in the
basic theoretical research of information security with the consensus of people inside and outside
the concerned field. Based on the recent literature in the field of global information security, in
particular relevant policies in various countries, and combined with related practical activities, this
paper attempts to make certain preliminary discussions on such concepts as information security,
network security, cyberspace security and their relationships with each other.
Using comparative methodology, this paper lists the usages of“information security”in all
kinds of literature in 2000-2014 and makes a comparison. It finds that since entering the 21st
century,“information security”has become the focus of national security in all countries. There
are both theoretical studies and explorations of state secrets, commercial secrets and personal
privacy, both national strategic plans and the management of information security content, both
the development of information security technology standards and the draft of international codes
of conduct. Information security has become one of the most important non-traditional security
field concerning the global overall security and integrated security. This paper also analyzes the
rich connotation of“information security”and a series of related concepts, such as information
warfare, information sovereignty, information territory and others.
* Correspondence should be addressed to Shiwei WANG, Email: swwang@sass.org.cn