首页> 外文期刊>Computer Law Review and Technology Journal >Information Systems Security and Privacy Issues in the Armed Forces
【24h】

Information Systems Security and Privacy Issues in the Armed Forces

机译:武装部队中的信息系统安全和隐私问题

获取原文
获取原文并翻译 | 示例
           

摘要

The most effective method of ensuring that U.S. military systems are safeguarded while the rights of individual users are respected is to delineate clearly the functions and limitations of national security protection, system and network administration, and law enforcement. Although all military services separate these functions to a certain degree, the U.S. Army most clearly defines the boundaries among the three functions. This is especially evident upon examining the restrictions placed by regulation on Army system and network administrators, who are not authorized to conduct content monitoring of e-mail and Internet communications. The separation of administrative and content monitoring functions is not just a military issue. In the July 2000 issue of Business2.0, Jeffrey Seglin points out that private companies should beware of falling into the trap of assuming that system and network administrators—Information Technology ("IT") department personnel—are the most likely candidates for conducting content monitoring simply because they are already charged with administering the systems. Seglin argues that putting the IT department in charge of controlling e-mail and Internet monitoring is like "putting the fox in charge of the henhouse" because access without context forces IT personnel to determine what behavior is appropriate and what is unacceptable. These systems and network administrators are trained to administer equipment, not personnel. In short, content monitoring is simply not their job. The separation of content monitoring and systemetwork administration is even more important in the military environment where national security interests affect not only military members, but also all citizens. It is the opinion of these authors that a model resembling that used by the U.S. Army would be the most efficient and would protect the privacy of the users, national security, and the integrity of systems to the greatest degree.
机译:确保在尊重个人用户权利的同时保护美国军事系统的最有效方法是,明确划定国家安全保护,系统和网络管理以及执法的职能和局限性。尽管所有军事部门都在一定程度上分隔了这些职能,但美国陆军最清楚地定义了这三个职能之间的界限。在检查法规对陆军系统和网络管理员的限制时,这一点尤其明显,因为他们无权对电子邮件和Internet通信进行内容监视。行政和内容监视职能的分离不仅是军事问题。在2000年7月发行的Business2.0中,Jeffrey Seglin指出,私人公司应当心这一陷阱,即假定系统和网络管理员(信息技术(IT)部门人员)最有可能从事内容管理工作。仅仅因为他们已经负责管理系统而进行监视。 Seglin认为,让IT部门负责控制电子邮件和Internet监视就像“让狐狸负责鸡舍”,因为没有上下文的访问将迫使IT人员确定什么行为合适和什么不能接受。这些系统和网络管理员经过培训可以管理设备,而不是人员。简而言之,内容监视根本不是他们的工作。在国家安全利益不仅影响军事成员,而且影响所有公民的军事环境中,内容监视与系统/网络管理的分离显得尤为重要。这些作者认为,类似于美国陆军使用的模型将是最有效的模型,并且将最大程度地保护用户的隐私,国家安全和系统的完整性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号