IREK – AESM: Institutional Repository of Economic Knowledge

Information Security Challenges in the Use of Digital Tools for Data Processing and Management

Show simple item record

dc.contributor.author Ceban, Svetlana
dc.date.accessioned 2025-11-17T11:18:47Z
dc.date.available 2025-11-17T11:18:47Z
dc.date.issued 2025-05
dc.identifier.uri https://irek.ase.md:443/xmlui/handle/123456789/4690
dc.description CEBAN, Svetlana. Information Security Challenges in the Use of Digital Tools for Data Processing and Management. Online. In: Technological Innovations in Digital Security: Proceedings of the First Edition of the International Conference, Chişinău, May 15-16, 2025. Chişinău: SEP ASEM, 2025, pp. 250-256. ISBN 978-9975-168-48-9 (PDF). Disponibil: https://doi.org/10.53486/tids2025.30 en_US
dc.description.abstract The accelerated pace of digitalization has fundamentally transformed the way information is collected, processed, and used. This process brings significant benefits but also major vulnerabilities in the field of information security. Digital technologies – ranging from common applications and online platforms to cloud-based solutions – have become indispensable for the efficiency of educational, economic, and administrative activities. However, the increasing reliance on technology exposes organizations to increasingly complex cyber threats. This article examines the main information security risks associated with the use of digital tools in data processing and management, drawing on theoretical approaches as well as recent practical examples. Three major categories of challenges are highlighted: technical (ransomware, phishing, software vulnerabilities, and dependence on cloud infrastructures), legal and regulatory (arising from GDPR, NIS2, and other European frameworks), and organizational and human (limited resources and the human factor as the weakest link). The conclusions emphasize that information security is not solely a technological issue but requires an integrated approach, combining advanced technical solutions with effective organizational policies and legal compliance. Practices such as data encryption, multi-factor authentication, continuous user training, and the principle of “privacy by design” are essential for strengthening organizational resilience against present and future digital threats. UDC: 004.056:[005.334+005.53]; JEL: M15, O33 en_US
dc.language.iso en en_US
dc.publisher SEP ASEM en_US
dc.subject information security en_US
dc.subject cyber threats en_US
dc.subject ransomware en_US
dc.subject phishing en_US
dc.subject cloud computing en_US
dc.subject organizational resilience en_US
dc.title Information Security Challenges in the Use of Digital Tools for Data Processing and Management en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account