•  
  •  
 

Scientific Information Research

Keywords

information security, Russian problem research, knowledge map, bibliometrics

Abstract

[Purpose/significance]In the new century,information security is recognized as the most prominent and core issue in national security in the information age.As Russia is a world power,they believe that information security will have an important impact on the national interests of the Russian Federation,so research on Russian information security has become even more important.[Method/process]This paper selects 850 documents in the field of information security from 2005 to 2019 in the rsci database of wos as the research object,takes bibliometrics and scientific knowledge map as the research methods,analyzes the research institutions,scientific fields,research hotspots and evolution trends.[Result/conclusion]And then outlines the Russian information security architecture through literature research.

First Page

34

Digital Object Identifier (DOI)

10.19809/j.cnki.kjqbyj.2020.03.004

Reference

[1] 王磊.俄罗斯信息安全政策及法律框架之解读[J].信息网络安全,2009(08):50-52,67.
[2] Концепция информационной безопасности Российской Федерации[EB/OL].[2020-3-24].https://www.mitht.rssi.ru.
[3] Национальная теория информационной безопасности[EB/OL].[2020-3-24].https://books.ifmo.ru/file/pdf/2372.pdf.
[4] Федеральный закон РФ № 152《О защите персональных данных》[EB/OL].[2020-3-24].http://school-10.edusite.ru/DswMedia/federal-nyiyzakonrf-152-ozashaitepersonal-nyixdannyix-.pdf.
[5] Указ Президента РФ«Об утверждении Доктрины информационной безопасности Российской Федерации》[EB/OL].[2020-3-24].https://www.garant.ru/products/ipo/prime/doc/71456224/.
[6] 张孙旭.2016年版《俄联邦信息安全学说》述评[J].情报杂志,2017,36(10):56-59,30.
[7] 孙健夫,陈兰杰.基于知识图谱的国际信息政策研究热点与前沿分析[J].情报科学,2010,28(03):389-394.
[8] 姜鑫.国际图书情报领域“科学数据”研究进展述评:基于SCI/SSCI期刊论文的内容分析[J].现代情报,2018,38(12):146-152.
[9] 李杰,陈超美.CiteSpace:科技文本挖掘及可视化[M].北京:首都经济贸易大学出版社,2019.
[10] 张涛,孙瑞英,李钟隽.中国舆情文献主题聚类及演化趋势研究(1998年-2019年)[J].农业图书情报学报,2020,32(02):14-21.
[11] NSA PRISM[EB/OL].[2020-3-34].https://nsa.gov1.info/dni/prism.html.
[12] 杨国辉.俄罗斯联邦信息安全学说[J].中国信息安全,2017(02):79-83.
[13] BARABANOV A.The standardization of the process of developing a security software[J].Voprosy kiberbezopasnosti cybersecurity issues,2013(01):37-41.
[14] GATCHIN Y,ZHARINOV I,KOROBEYNIKOV A.Mathematical estimation models of information security system infrastructure at the enterprise[J].Scientific and technical journal of information technologies mechanics and optics,2012(02):92-95.
[15] SHCHEGLOV K A,SHCHEGLOV A.Yu.Principle and access control methods to newly created file objects[J].Vestnik komp'yuternykh i informatsionnykh tekhnologii,2012(07):43-47.
[16] 张涛,蔡庆平,马海群.一种基于政策文本计算的政策内容分析方法实证研究:以互联网租赁自行车为例[J].信息资源管理学报,2019,9(01):66-76.
[17] 余厚强,曹嘉君,王曰芬.情报学视角下的国际人工智能研究前沿分析[J].情报杂志,2018,37(09):21-26.
[18] 裴雷,李向举,谢添轩,等.中国信息政策研究主题的历时演进特征(1986—2015)[J].数字图书馆论坛,2016(07):19-27.
[19] 郑乐丹.基于突变检测的学科领域新兴研究趋势探测分析[J].情报杂志,2012,31(09):50-53.
[20] 由鲜举,颉靖,田素梅.俄罗斯2018年信息安全建设综述[J].保密科学技术,2019(02):42-48.
[21] 李淑华,靳会新.中俄媒体合作的现状、问题与建议[J].俄罗斯东欧中亚研究,2019(02):139-154,158.
[22] 姜振军,齐冰.俄罗斯国家信息安全面临的威胁及其保障措施分析[J].俄罗斯东欧中亚研究,2014(03):9-15,95.

Share

COinS