{"thcode":2,"term":{"code":2019,"name":"information system security","parent":2003,"scope":"Methods for ensuring that information systems are used for their intended purpose by those entitled to use them and that the information they contain retains its integrity and, where appropriate, confidentiality."},"uf":[],"bt":[{"code":2003,"name":"information system administration","parent":584,"scope":"Design, deployment, and maintenance of computing systems that support creation, maintenance, and use of scientific information."},{"code":584,"name":"information technology methods","parent":689,"scope":"Information-related concerns on which people focus their work in support of scientific investigations and research."},{"code":689,"name":"management methods","parent":734,"scope":"Techniques of judiciously controlling or directing resources for a predetermined goal."},{"code":734,"name":"methods","parent":1,"scope":"Techniques, methods, procedures, or strategies for research, management, collection, or analysis of scientific information in USGS."},{"code":1,"name":"Categories","parent":null,"scope":"Thematic terms for categorizing information resources.  This thesaurus is intended to support finding and understanding scientific information."}],"nt":[],"rt":[]}
