info@biomedres.us   +1 (720) 414-3554
  One Westbrook Corporate Center, Suite 300, Westchester, IL 60154, USA

Biomedical Journal of Scientific & Technical Research

February, 2021, Volume 33, 3, pp 25902-25910

Review Article

Review Article

Informatization of the Society in the Digital Age

Radi Romansky*

Author Affiliations

Faculty of Applied Mathematics and Informatics, Technical University of Sofia, Sofia, Bulgaria

Received: January 09, 2021 | Published: February 01, 2021

Corresponding author:Radi Romansky, Faculty of Applied Mathematics and Informatics, Technical University of Sofia, Sofia, Bulgaria

DOI: 10.26717/BJSTR.2021.33.005418

Abstract

Informatization is not a new term, but it is at the basis of the information society, allowing through the continuous development of digital technologies to create new opportunities for its continuous improvement. New digital technologies of the 21st century have led to an update of the concept of informatization of society, but also revealed possible risks to privacy. In this reason, the goal of the article is to present a point of view for positive features of the informatization, its connection with globalization and relation to the basic components of the information society. A short discussion of access to information resources in the digital space with proposed formalization of the processes is made and possible risks for digital privacy which can be created by the technologies of the digital age are discussed.

Keywords: Information society, Digital technologies, Communication, Privacy, Data protection

Introduction

Informatization could be determined as a fundamental term for building the Information Society (ISoc) just as the world “industrialization” has been formed the name of the previous industrial society. The term was introduced in the late 1970s by two separate authors (Marc Port, 1977 and S. Nora & A. Minc, 1978) in order to explain the growing importance of the information in the society as a whole. The first official using of this term in a public document is made in the report “Informatization of the society”, which was been requested by Valeri Jiscar d’Esten - President of the Republic of France. In the following years at the end of the 20th century and the beginning of the 21st century a contribution to this term was made by Acad. A. E. Ershov, G. Wang (1994), Everett Rogers (2000), Kim (2004). The summary of all these discussions is related to the application of contemporary information and communication technologies (ICT) in different spheres of the society, as well as to the importance of information for achieving new knowledge - increasing the speed and quality of information services, improving all systems through the use of computer equipment, and manage all processes by using information technologies [1].
These aspects of the informatization set requirements for development of an adequate policy for the functionality capabilities of the network space, which is especially important for 5G networks. An approach in this respect is discussed in [2] where an Application Programming Interfaces (APIs) that enable mobile edge applications to monitor the subscriber spending limits regardless the way of measurement is defined. The proposed APIs permits to increase the effectiveness of the usage of network resources by subscribers. On the other hand, the geolocation of the resources and users is an important part of the effectiveness of interaction between objects in the global network. To solve this problem a set of procedures for multivariate analysis of spatial-temporal information and interaction in socio-economic systems is proposed in [3] with a goal to use of intellectualization in the practice of managing geographically related socio-economic systems.
The role of the global network in the modern stage of informatization has led to the launch of the concept of “internetalization” and introduction of the so-called “Internet Governance” - use of ICT and more specifically the global network in all processes supported by governments, the private sector, civil society, education, technical community. UNESCO (https:// en.unesco.org/themes/internet-governance) defines it as a central issue with the main goal to promote “sustainable human development and building inclusive knowledge societies, and also for enhancing the free flow of information and ideas throughout the world”. There are clear requirements for ensuring a transparent approach, free expression of opinions, protection of privacy and personal data, free access to public information resources and technical interoperability, as well as respect for linguistic and cultural diversity in cyberspace. In addition, the differences between globalization and informatization and how this will affect the necessary governance transformations is discussed in [4].
In this direction, the important issue of information security in maintaining e-governance processes is raised [5], as an analysis of the information security problems is made in the article [6]. The development of new ICT in the 21st century (Grid, cloud, mobile cloud, Internet of Things, Cyber-physical systems, Big data, etc.) has led to an update of the concept of informatization, according to various modifications, but always related to access to information resources and their application in different areas of public relations - administration, business, industry, education, culture, etc. This increased the requirements for understanding the modern information processes in the society and put the issue of information literacy on the agenda. The use of network services, access to information and participation in e-government processes requires a certain level of technological literacy. In the contemporary digital era users need to know their rights to privacy and to data protection (requirements of General Data Protection Regulation - GDPR). In this reason, article [7] indicates that “the process of acquiring technological literacy is costly and not trivial“ and a methodology to achieve optimality between the cost of processes and its benefits is proposed. In addition, the authors declare that this methodology” has a significant contribution to protecting users’ privacy and security in the digital world”.
The main goal of this paper is to present a point of view for the contemporary understanding of the concept of informatization as a basis of the information society and its relation to the digital privacy. An important task for users of information services is to correctly determine the relationship between the benefits and the possible negative aspects for the privacy. Indicative in this regard is the launch the term “information avalanche”, pointing out the advantages but also the disadvantages of this phenomenon. In this reason, the article discusses the main characteristics of the informatization of society and the possible problems of user’s privacy. The paper is organized as follows. Section 2 deals with the features of the informatization and it role in the development of the contemporary digital society. Section 3 discuses shortly the possibilities for access to information resources and proposes a formal description of communication in the digital space. Section 4 presents a point of view for possible problems for digital privacy which can be created by the technologies of the digital age.

Informatization as a Basis of the Information Society

Features of the Informatization

Informatization of the society is a technological, socialeconomic and cultural process leading to important changes of the individual’s life, requiring significant efforts of the government, business and all users of ICT to form adequate information culture. Two basic theoretical-methodical approaches to informatization could be defined:
a. Technological approach that is mainly associated with developing technical and technological means and tools to support labor activity in the field of manufacturing and management to increase efficiency and productivity.
b. Sociological approach, which considers informatization as an impact on all spheres of the human activity with reflection to the all persons in the society - their knowledge, skills, moral, economic and culture interests, personal development, etc.

The following basic technically & technological components of the informatization can be defined

Electronization: dissemination electronic technologies in different fields of the human activity: manufacturing, management, education, research, social and cultural spheres, etc. Often this component of informatization is associated with digitalization, as done in the article [8] where is stated that “… informatization, digitalization (electronization) of the economy and the widespread introduction of ICT creates the basis for the movement of all countries of the world to the information society…” and adds that the global information space provides free access to different information resources and electronic interaction between people. The article states that electronization is an important factor for improving the efficiency of the digital economy of each country. The essential role of electronization in the contemporary society is confirmed in [9], pointing out that the process of electronization is one of the milestones in the development of the society.

Mediatization: a process of improving the means for collecting, storing and disseminating information, for which electronic (digital) media are mainly used, in order to speed up the transmission of information and increase the possibilities for the ways of this transmission. Jan van Dijk defines the current communication revolution with network society and determines as its main part the digital media [10]. Four structural characteristics of the digital media are defined - integration, interaction, digital code, and hypertext. A critical review of the mediatization theory is made in [11] where two forms are discussed - a strong form in which “media logic” determines the actions of different social institutions and groups, and a weak form, which, despite the recognition of the role of the media in social life, denies the existence of such logic.

Computerization: process of improving the ways of searching and processing information through the use of computer means, in which the computer becomes the main means of communication of people and their release from routine operations. This component is typical for the information society and most important task of all spheres of human activities, as stated in [12]. The article makes a direct connection between computerization and individual professionalization in information society, defining the second term as “a process of professional growth and professional training, i.e. professional self-realization is a form of self-actualization”. On the other hand, the authors define computerization in the information society as informatization of all forms of professional development and wide introduction of information technologies in the individual professionalization.

Intellectualization: process of development of human knowledge and possibilities for creation of new information, which naturally increases the intellectual potential of the society, including opportunity to use artificial intelligence. A point of view for the role of intellectualization in the contemporary information society used for managing distributed socio-economic system is presented in [3]. Discussion of the intellectualization as one of the main challenges of modern ISoc is presented in [13] as a form for extracting knowledge from an increasing information flow and composition of algorithms as a means of intellectualizing of knowledge is proposed.

Informatization and Globalization: An interesting point of view on the nature and difference between the concepts “informatization” and “globalization” is presented in the article [4]. The advantages of modern cyberspace based on electronics, informatics and telecommunication technologies are recognized, which provides a completely new approach of society to the management and exchange of data, including the control of real systems. Against this background, the question arises about the difference between “informatization” and “digitalization”, considered as two different approaches for transformation of the social system. Preference is given to informatization as the basis for the development of the digital age.

It is emphasized that the replacement of the generation of terms such as “e-” / “electronic” or “digital” with “new” modern words starting with “smart-”, “intelligent”, “Cyber-physical”, “-4.0” (from “Industry 4.0”) does not lead to clear terminology in technological terms and is justified by the term digitalization. Particularly telling in this regard is the term “Industry 4.0”, which describes a future vision for the industry until 2025, based on modern digital technologies such as cloud / mobile cloud computing, Internet of Things (IoT), Cyber-physical systems (CPS), big data analysis (BDA). etc., with the basic idea that all this would lead to a fourth industrial revolution.

All this gives grounds to explain the difference between digitalization and informatization, considered as technologies for managing activities in the modern digital space. Based on technological development over the years computerization and digitalization are defined in the article as the third generation of social development, as the the informatization as determined the next fourth generation, justifying the new in it by “reliance on the digital (computer) file as the descriptor of a system’s (or digital object’s, respectively) characteristics and state”. And it is clarified that, unlike the long-known computer file, the new type allows embedding, sharing and editing in the network space.

Informatization and Information Society: The combination of the presented components of informatization allows to create an adequate basis for the development of the information society as a set of modern ICT, means and tools for information processing to obtain new knowledge to help people. Electronization and computerization, together with network technologies, help to create the necessary global infrastructure as a media for access, transmission and dissemination of information, which be used for intellectualization of all activities. The result is defining the global goal of IS in the following three directions:

i. in the public sphere - creating conditions for citizens for effective electronic information service (e-servicing) while ensuring their rights to knowledge, information and protection;

ii. in the sphere of industry - providing complex automation for all branches of material production;

iii. in the scientific field - ensuring the continuous development of science in order to ensure the scientific substantiation of the emerging problems in the informatization of society. The level of maturity of the IS could be evaluated on the base of the criteria presented in Table 1.

Table 1: Criteria for assessing the level of maturity of the Isoc.

The following basic elements of ISoc can be identified:

i. ICT (Information and Communication Technologies) - a set of computer equipment, software, computer networks for data transmission and the created local and distributed information systems with databases.
ii. Information resources - information and related technical equipment, software, description data and information objects that are designed, built, developed and managed to maintain information services.
iii. Information security - measures and procedures to ensure an acceptable level of protection of information resources from accidental or intentional actions such as disclosure, alteration or destruction.

The contemporary information society is presented with a large number of components, and in addition to the traditional and strongly embedded in public life, such as e-health, e-governance/egovernment, e-learning/e-education, e-business/e-commerce (with related e-pay and e-banking), can be defined others some of which are summarized in Table 2. To the listed components can be added other such as e-parliament, e-justice, e-legislation, e-referendum, e-campaigning, e-consultation, e-petitioning, e-polling, e-mediation, etc. The contemporary level of informatization in the digital age gives rise to various concepts starting with “e-”.

Table 2: Selected actual components of the digital age.

Formlization of Processes in Digital Space

All information resources should be considered as integrated information (structured data) supported by technical and technological means (computer equipment, software, meta-data for description, tools for design, development and management, etc.). There are two main ways to store and process information in the network space (Figure 1) - centralized (concentrated in one main computer with remote access of users to it through a communication environment) and decentralized (resources distributed on different computers with communication between their management systems). In both cases, distributed access to information must be subject to an Information Security Policy and strict control for the protection of user personal data (Data Protection) and privacy. To assess the effectiveness of the digital age and their infrastructure in accessing and using information, basic parameters summarized in Table 3 are applied.

Figure 1: Organization of remote access to information.

Table 3: Parameters for evaluation of the digital age effectiveness.

Digital space can be considered as a set of independent territorially remote units with their own internal structure and functionality (Figure 2), which allows formalization through a directed graph with a discrete set of nodesV ={Vi; i = 1 ÷ n}, entering into relations with each other, represented by connecting edges of the set A = { aij: Vi → Vj }. Each relation between pairs of independent nodes is represented by a weighting coefficient dij, corresponding to the communication parameters between the individual localizations of the objects.

Figure 2: Abstract model of the digital space.

Formal, the nodes in the set V can be divided into two relatively independent subsets U (users area) and R (resources localization) supported by two additional sets to maintain and manage the transmission of the communication units - requests (req) and provided information (Inf). The formal definitions of all components is presented below (Figure 3).

Figure 3: Formal model of digital space.

a. R = { Ri/ j = 1....M}, T ≠ ∅ - Users providing multiple remote access to one or more units in the digital space by request req: Ui ∈V ;

b. D = { DIN, DOUT} R ≠ ∅- Resources, which are subject to remote access, providing digital content Inf:Ri → Ui;3a∀Ui∈Uℵ∀Rj ∈R ;

c.T = { Tq/q= 1....K } T ≠ ∅- Transmitters of communication medium for transfer of information objects;

d. D = { DIN, DOUT} - Distributors of information objects (protocols, means, tolls, etc.) for distributing communications between U and R.

The communication distance between the active participants - nodes of V with users Ui ∈ V and resources Rj ∈ V is represented by the communication parameters dij ( i ≠ j; i, j∈ {1 ÷ n}). In case a user Ui accesses an information resource Ri in the same node is accepted dii = 0. On this basis, a matrix of communication distances DM = {dij} with dimension n = ||V|| with zero parameters on the main diagonal is constructed, allowing determination of the minimum paths between independent nodes in the structure (Figure 4).

Figure 4: Formalization of the communications between users and resources.

The actual localization of the components in the individual physical nodes of V is important for the specification of the processes in information services. For the general situation, it is assumed that and one or more nodes of V can contain objects from both groups (the sets U and R). This allows the formation of two types of relations

To determine the affiliation of a node to a given type, two binary parameters {0,1} uik ∈ and {0,1} rjk ∈ are defined, corresponding to the actual localizations of user Ui∈ U and/or resource Rj∈R in a given node Vk∈V. Based on the actual localization of the active objects, two localization matrices UL = {ujk} and RL = {rjk} can be constructed, through which they could be defined a new vector VL by the procedure below according to which elements VL[κ ] =1 determine the existence of a relation of type 1, and in case VL[κ ] = 0 the relation is of type 2.

Formalization allows to conduct a deterministic study of processes in digital space by establishing binary relations between active nodes, and each transaction can be described by an ordered pair (u, r), where u∈U and r∈R .

Informatization and Digital Privacy

Various features and characteristics of the contemporary digital age can be defined. For example, the definition “Network society” is proposed in [10], which is based on the role of the global network in social and industrial life. In addition, some basic characteristics are defined to support it - social equality, quantity & quality of social relationships, democracy & freedom, riches of human mind. An exemplary summary of the functional characteristics of the digital age discussed in the information space can be made as follows.

a. Knowledge orientation (knowledge is the main production and main priority),
b. Digital form for presentation of objects (digitization of documents and document flow),
c. Virtual nature (virtualization of the real physical environment through the application of virtual data and systems for “virtual reality”),
d. Extensive functionality (components for multiple and multifunctional use are created),
e. Integration and interconnections (construction of a unified universal network infrastructure from separate independent modules for services and manufacturing),
f. Dynamic operation (implementation of activities in real time with access to all necessary components),
g. Global scale (globalization of knowledge and opportunity to implement activities from different places).

All this diversity of functionalities of the digital age generates massive information flows distributed between the global networks nodes. The dissemination of information in the digital age is significant and it is not in vain that there is talk of an “information avalanche”, but this abundance in the global space can have undesirable effects, such as:

a. Devaluation of information,
b. Obtaining poor quality knowledge,
c. Spending too much time and attention by users to “surf” the web,
d. Loss of productivity due to spam,
e. Additional costs related to data transfer, storage options, etc.
f. Security and privacy issues (last but not least).

In this context, it is necessary to be discussed the important question “How does informatization affects the privacy of users of digital services in the network space?”. This is essential for cloud technologies, IoT, smart technologies, big data, etc. It is not in vain that the latest legal documents in the field of personal data protection (for example GDPR) raise the issue of digital privacy of users and set specific requirements related to the right to privacy and the right to data protection. Contemporary technologies of the digital age generate their specific challenges to digital privacy [14], which requires adequate measures for secure access and legitimate use of information resources, including personal data sets [15]. The result of the rapid informatization of society is its growing dependence on the network space and the digital services provided in it, which increases the risk of violating information security and privacy.
Examples of research in this area related to the possible risk to information security in cloud infrastructure and the principles of its management are presented in [16,17]. There is also a risk of privacy with technological solutions using multiple points (sensors) for access to data (Internet of Things), “smart” technologies for home, city, transport, etc. (Cyber-physical systems), accumulation of big data and their processing [18]. A summary of the main risks for users in the digital age is presented below.

Digital Space

Any information published in the network space must be correct, reliable and the necessary measures must be taken to protect it. The risk of non-compliance with these requirements is the creation of opportunities for financial and psychological consequences, as well as consequences for reputation. The information disseminated in the global network must comply with the requirements for legal and correct processing of personal data, the information must be sufficient and relevant to the goal, to have the consent of the person. In case of incorrect information or at the end of the set goal it is necessary to observe the paradigm “the right to be forgotten” - the right of the subject of personal data incorrect data to be corrected, removed or blocked. When maintaining mobile communications and those in the global network, service providers must ensure the necessary level of confidentiality, caller identification, anonymization of traffic and location data, and ensure the security of the services offered.

Social Computing

Many social applications collect personal data outside the main purpose, which requires a serious risk analysis in their privacy policy. Examples of risk are the following:
a. The amount of information collected during registration or profile update (names, address, date of birth, telephone or fax number, e-mail address, publication of materials, other publicly available information, information from another social media),
b. Information about correspondence with the site administrator,
c. Details of visits (date and time of access, pages viewed, IP address, type of browser, hardware and software used, traffic data, location data, blog and other communication data and resources used),
d. Location data when accessed via a mobile device and information about these devices (identification number and type of device),
e. It is not clear who owns the data published on social media and whether complete deletion of profile data (and copies) is guaranteed at the end of the participation.

Cloud Computing

The main feature of cloud services is that the resources are outside the client’s security side, which imposes the requirement to know what security practices are applied and whether privacy regulations are followed. Some of the possible risks are the following:
a. Violation of the confidentiality of information when many users have access to the cloud space,
b. The share link approach is convenient for sharing data with business partners, but creates preconditions for a breach in system security and data leakage to an unauthorized domain,
c. Multiple hiring in the cloud can create a risk of breaching the integrity and availability of supported data (unauthorized deletion, modification, theft),
d. Presence of residual data (“forgotten” copies) when deleting or removing data in the cloud,
e. Confidentiality of the software to ensure reliable processing and counteraction against unauthorized (intentional or unintentional) integrity violation.

Internet of Things (IoT)

Confidentiality in IoT is one of the specific considerations for ensuring reliable protection of personal data, because almost every physical or logical object or object can receive a unique identifier and ability to communicate freely over the Internet or other network. Endpoint data cannot in itself lead to privacy issues. The problem is that when even fragmented data from multiple endpoints is collected, compared, and analyzed, they can provide sensitive information. IoT security is also an issue because the plurality of Internet devices and various computers involved are often configured with standard or weak passwords, are not securely protected, and objects (things) can be used as separate objects of attack. The main security risks with IoT are the following:

a. Insecure web interface,
b. Inappropriate authentication and authorization,
c. Insecure network services,
d. Lack of encryption during transfer,
e. Secure cloud and mobile interface,
f. Unreliable security system configuration and unreliable firmware,
g. Poor physical security

Big Data

Big Data is collected and stored information in very large volumes, received from various sources, intended for further processing for some purpose. The idea of “the more data, the better” is a major problem for information security and privacy, because data is collected from many different sources, as well as from different forms of existence.

Big Data Analytics: Big Data Analysis is a method for analyzing big data to reveal the causes of events, study trends and form forecasts. The results can lead to privacy issues:

a. It is possible that multiple pieces of data may contain assets that are subject to security breaches,
b. Technology makes the principle of “data minimization” meaningless,
c. The data may have been initially collected for another purpose,
d. Violation of anonymity in collecting so much data and use of powerful analyzes, as well as violation of the requirement for transparency of the applied methods of personal data processing.

Conclusion

Informatization creates the necessary basis for the development of the information society and the application of modern technologies for the benefit of the people. Their important role in the development of industry, public life and all accompanying practices related to access and processing of information to generate new knowledge cannot be denied. Informatization inevitably leads to the intellectualization of society and increase personal confidence in the performed activities. In today’s digital age, personal data is becoming an important resource for organizations, institutions and service providers, including the analysis of consumer behavior. Quite often users themselves share their personal data and details of their personal life in the network space, especially on social media.
This creates an opportunity for incorrect speculation with accessed personal data and their use for commercial purposes. It is no secret that business organizations collect preliminary information about job applicants, the behavior of their employees, their financial and behavioral ratings. Data collection is also a task of supported websites for self-presentation, for contact with potential customers, for research of consumer interests, etc. On the other hand, when using digital communications and services in the network space is not always monitored to provide personal information in the minimum required amounts.

Users need to be aware not only of the opportunities and strengths of global informatization, but also of the potential risks to their privacy and their personal data. Defining specific legal requirements for the digital space only will not lead to a positive effect if the digital literacy of the society for the special features of the modern digital age in the field of informatization, technologies, security and privacy is not constantly increased.

References

Review Article

Informatization of the Society in the Digital Age

Radi Romansky*

Author Affiliations

Faculty of Applied Mathematics and Informatics, Technical University of Sofia, Sofia, Bulgaria

Received: January 09, 2021| Published: February 01, 2021

Corresponding author:Radi Romansky, Faculty of Applied Mathematics and Informatics, Technical University of Sofia, Sofia, Bulgaria

DOI: 10.26717/BJSTR.2021.33.005418

Abstract

Informatization is not a new term, but it is at the basis of the information society, allowing through the continuous development of digital technologies to create new opportunities for its continuous improvement. New digital technologies of the 21st century have led to an update of the concept of informatization of society, but also revealed possible risks to privacy. In this reason, the goal of the article is to present a point of view for positive features of the informatization, its connection with globalization and relation to the basic components of the information society. A short discussion of access to information resources in the digital space with proposed formalization of the processes is made and possible risks for digital privacy which can be created by the technologies of the digital age are discussed.

Keywords: Information society, Digital technologies, Communication, Privacy, Data protection