Page 38 - ISCI’2017
P. 38

7 Conclusion


            A high social danger of the Internet-crimes mainly results from the increasing role of the system of
            social relations  bearing the  transnational and organized character  (Chimiris, 2013).  Not a single

            country can actively oppose this malice alone. Because of this, the intensification of international
            cooperation becomes a high necessity.

                   Under the new realities of fast  country  entry to  the single  information space, it becomes

            necessary to systematically and successively counteract the cybercrime overall and the most popular
            types, and to minimize the harm to the economy. It is important to develop effective measures of the

            Internet-crimes combat and prevention, improve the legal system of information security, including
            the cyber safety.

                   Furthermore, it should be noted that the concept of the information and analytical supporting
            has been formed and shown. This concept can be used in the theory of security (TS) as a fundamental

            for the OSS, a description and structure of which have been presented in the appropriate international

            standards. It is confirming a possibility for creating or building the systematic and generalized concept of
            the information and analytical support of OSS. In addition, it is confirming a further improvement as

            one of main factors for calculating of the market value of any hospital or any other medical organization

            and forming their high level of competitiveness.
                   To conclude the  paper, we would also like to emphasize that  the developed conceptual

            software can be adapted and applied not only in the medical security area but also to the majority of
            other fields enlightened in the edited volume. Namely, the time-frequency analysis explicated in the

            chapter is quite easy to apply to the topics of privacy, security in general, cryptography, Internet of
            things, body sensor networks,  operations research,  modeling and simulation, cloud computing,

            database from hospitals and other similar organizations on the healthcare area, data encryption, data

            masking and obfuscation, data quality, decision support systems, etc.






















            38
   33   34   35   36   37   38   39   40   41   42   43