Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 3

first rewind previous Page / 1 next fast forward last

Search results

help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
EN
In computer-based information systems there is a danger or improper use or loss of information. The significance of this, problem grows in the case of issues concerning the population since apart from dangers ensuing from it for institutions there exists a possibility of infringing the "privacy" sphere being ensured for the population. Data files concerning tho population of a given region include very numerous and diversified pieces of information. They of appear in all organizational units subordinated to the local administration organs. Big quantity of information, its diverse sources, complicated procedures of obtaining output data pose additional requirements in the field of information systems protection. An ideal state (hardly attainable - at least due to high costs of such solution) would be full protection of all information. In the operating information systems the management staff of organizations should define the degree to which particular information should be safequarded. There should be analyzed the problem of providing measures and procedures for determination of requirements concerning information protection. These requirements are detormined by the following factors: - level of losses incurred as result of drawbacks in the system, - period оf time in which wo can counteract improper use of intercepted information or in which it can be made unavailable - frequency of irregularities. While discussing problems belonging to the area of information protection, they should not be reduced to data protection sphere alone since without legal provisions, organizational protection, and building proper awareness in this respect protection measures will never be fully effective.
EN
The article contains a short review of the methods of the control of information systems such as: analysis of tests results, interviews, questionnaires, block diagrams and decision tables. The authoress points out advantages and shortcomings of these methods used in an area of applications not typical for them.
EN
The article deals with the control of input data in information systems. There are described in it the mode of procedure in case of detecting an error and the information which should be included in the report of errors. The authoress point at the advantages of collecting statistical data about errors occurring in a system.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.