Abstract
Information security is one of the most important notions that characterizes modern society. It is an aspect that defines social interaction. Thus, it is possible to hypothesize that information security is the key function of the information infrastructure of contemporary society. The research design for this study was chosen to be qualitative to ensure that the gathered data will be comprehensive and in-depth. The theoretical analysis of scientific publications on the topic will be compiled with sociological methods. In particular, questionnaires and interviews will be developed to obtain the required feedback. In the course of the research, the hypothesis would be either proved or invalidated, as per the study results.
Introduction
It is worth noting that the issue of information security is one of the most critical in modern society, characterized by high technological development. The 21st century is the epoch of the formation of the information society in which interaction primarily is based on the information and communication (Al-Fedaghi 295). The investigation of such concepts as information and telecommunications attracts more researchers in connection with the problems that represent the underlying consequences of these domains. This area of study involves an appeal to aspects such as the protection of intellectual property, opposition to the promotion of propaganda and incitement of social hatred, and so on. The contemporary social relationships are unfolded in the new information reality; in this regard, it is necessary to determine what kind of information should fill the social environment. More precisely, information security should be perceived as an aspect that defines social interaction.
Hypothesis
Information security implies moral and ethical, organizational, and regulatory relations in society (Alwi and Fan 152). It should be aimed at ensuring the protection of the rights of individuals, organizations, and society as a whole. Moreover, poor security of peoples’ right to access to information or the manipulation of information can cause a negative reaction of the society, which can lead to destabilization of the socio-political situation (Meyer and Zhu 31). In this connection, it is possible to deduce the following hypothesis: information security is the key function of the information infrastructure of contemporary society.
Data Collection and Methods
The research design for this study will be qualitative to ensure that the gathered data will be comprehensive and in-depth. The data will be gathered in two different approaches, which are theoretical and practical. To be more precise, the research will include both the literature overview and data collection from the sample.
Theoretical analysis of scientific publications on the topic of the research will be conducted. It will allow understanding of the theoretical basis and serve as a starting point for the formation of the study population. In addition, the sociological methods will be used in the study. In particular, questionnaires and interviews will be developed to obtain the required feedback. Questionnaires and interviews will consist of closed and open-end questions in order to gain the deepest data for future analysis. Moreover, it will enable summarizing the experience of the sample group. One of the research problems is to implement a comprehensive study of the issue, which implies analysis, source study, comparative method, and social modeling.
The sampling group will be a population aged 18-70 years. Mostly, the sampling group will be residents of the city of various backgrounds and engaged in varied occupations. Overall, 40 respondents of this group will be interviewed in order to investigate the efficiency of information and communication in the context of ensuring information security and intellectual property protection. Apart from that, the 15 employees of PR-structures will be interviewed. Regarding the reliability of the collected data and information, the validity within a 3-7% error will be accepted. This measure is considered a commonly accepted error range.
Concepts and Measures
The chief concept considered and discussed in this study is the information sphere. It includes information interaction, the exchange of it (infrastructure), and social relations, which are formed as a result of the transfer and storage of information among people (Gupta and Dhami 51). In modern society, new forms of mass communication emerge; therefore, the appropriate paradigm for the regulation of information security should also appear timely (Talabis and Martin 201). In this context, the opinion polls are the most important because they are aimed at obtaining qualitative values and assessments. It is also essential to assess the nature of the information due to the fact that it requires a change in the communication settings.
In connection to that which is discussed above, it is crucial to emphasize that the results of sociological research lead to increasing information security because they are the main source of information (Bughin and Chui 5). The main advantages of this study approach in relation to the subject are the verifiable results, feasible resource consumption, and objectivity. In addition, it is important to mention the fact that, in modern society, the interaction of social groups is similar to the management of communicative processes. Appropriately, the research will provide an opportunity to identify and analyze the risks associated with these processes.
All of the collected data will be measured to provide a statistical association. However, it is essential to note that this type of measurement can impose possible limitations. For instance, there might be errors at different stages of information gathering, as well as weak or ineffective awareness of information consumers.
Discussion
The reliance on the provisions set forth in the writings of social scientists and psychologists will allow developing a set of conclusions in terms of the study methodology. Therefore, the basis of the research will be revealed in a systematic approach using the categorical and conceptual apparatus of information theory, sociology, and psychology. In general, the validity and reliability of the research results are not to be questioned. It is due to the fact that their reasonableness can be determined by consistent theoretical provisions. Moreover, the research logic and complex application of theoretical and empirical methods of the sociological study imply the validity and reliability of the obtained results. In addition, the nature of the sociological study does not imply any ethical issues to be considered or addressed.
Conclusion
Thus, the issue of information security requires a thorough approach to the study. In order to carry out the research, the theoretical foundations and concepts will be analyzed to form the basis for the polling of the sample group. The qualitative method will enable gathering the comprehensive data and analyzing them through the application of theoretical approaches promoted by the literature review. It should be stated that in the course of the research, the hypothesis would be either proved or invalidated per the study results. Overall, the theoretical and practical significance of the study lies in the fact that it will deepen the concept of information security and identify the current trends. The results will allow exploring the described problems further and improving the existing information policy.
Works Cited
Al-Fedaghi, Sabah. “A Conceptual Foundation for Data Loss Prevention.” International Journal of Digital Content Technology and its Applications, vol. 5, no. 3, 2011, pp. 293-303.
Alwi, Najwa, and Fan, Ip-Shing. “E-learning and Information Security Management.” International Journal of Digital Society (IJDS), vol. 1, no. 2, 2010, pp. 148-156.
Bughin, Jacques, and Chui, Michael. “The Rise of the Networked Enterprise: Web 2.0 Finds Its Payday.” McKinsey Quarterly, vol. 4, 2010, pp. 3-8.
Gupta, Ashish, and Dhami, Anil. “Measuring the Impact of Security, Trust and Privacy in Information Sharing: A Study on Social Networking Sites.” Journal of Direct, Data and Digital Marketing Practice, vol. 17, no. 1, 2015, pp. 43-53.
Meyer, Patrick, and Zhu, Shi. “Fair and Equitable Measurement of Student Learning in MOOCs: An Introduction to Item Response Theory, Scale Linking, and Score Equating.” Research & Practice in Assessment, vol. 8, no. 1, 2013, pp. 26-39.
Talabis, Mark, and Martin, Jason. Information Security Risk Assessment Toolkit. Newnes, 2012.