Bases of information security management in the editorial and publishing business processes

Author(s) Collection number Pages Download abstract Download full text
Kozak R. O., Senkivskyi V. M., Zahorodna N. V. № 2 (74) 84-91 Image Image

The problem of information security in the editorial and publishing processes has been actualized. The methodological foundations of the construction and implementation of the information security management system for publishing activities have been con­sidered. Based on international standards and practices, key steps in the development of information security management system for publishing business processes have been suggested.

Keywords: multimedia publication, information security, information security ma­na­gement system, data protection, security of editorial and publishing processes.


  • 1. ISO/IEC 27000 family — Information security management systems. Retrieved from https://www.iso.org/isoiec-27001-information-security.html (in English).
  • 2. DSTU ISO/IEC 27000:2015 (ISO/IEC 27000:2014, IDT) Informatsiini tekhnolohii. Metody zakhystu. Systema upravlinnia informatsiinoiu bezpekoiu. Ohliad i slovnyk. Retrieved from http://document.ua/informaciini-tehnologiyi_-metodi-zahistu_-sistema-upravlinnj-std32008.html. (in Ukrainian).
  • 3. Domarev, V. V. (2004). Bezopasnost informatcionnykh tekhnologii. Sistemnyi podkhod. Kiev: Izdatelstvo «Diasoft» (in Russian).
  • 4. Shakhalov, I. Iu., & Dorofeev, A. V. Osnovy upravleniia informatcionnoi bezopasnostiu sov­re­mennoi organizatcii. Retrieved from https://cyberleninka.ru/article/n/osnovy-uprav­le­niya-in­formatsionnoy-bezopasnostyu-sovremennoy-organizatsii (in Russian).
  • 5. Cheol Soon Park. A Study of Effect of Information Security Management System [ISMS] Certification on Organization Performance. Retrieved from http://paper.ijcsns.org/07_book/ 201003/20100303.pdf (in English).
  • 6. Calder, A. (2011). Implementing Information Security based on ISO 27001/ISO 27002. A Management Guide. Van Haren (in English).
  • 7. Zhaopin, Su, Guofu, Zhang, & Jianguo, Jiang. Multimedia Security: A Survey of Chaos-Based Encryption Technology. Retrieved from https://www.intechopen.com/ books/multimedia-a-multidisciplinary-approach-to-complex-issues/multimedia-security-a-survey-of-chaos-based-encryption-technology (in English).
  • 8. Furht, B., & Kirovski, D. (2004). Multimedia Security Handbook. CRC Press (in English).
  • 9. Voloshynovskiy, S., Koval, O., & Deguillaume, F., Pun, T. Multimedia Security: Open Prob­lems and Solutions. Retrieved from http://citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.71.1389&rep=rep1&type=pdf. (in English).
  • 10. Belousova, N. M. Biznes-protcessy v izdatelskoi deiatelnosti i ikh klassifikatciia. Retrieved from https://cyberleninka.ru/search?q=% D0%91%D0%B5%D0%BB%D0%BE%D1%83%D1%81%D0%BE%D0%B2%D0%B0%20%D0%9D.%D0%9C. (in Russian).
  • 11. M. Gheorghe de Studii, Boldeanu, A., & Bucureti, D. (2017). Economice. Information security management system (in English).