INFORMATION SECURITY OF THE STATE: MOTIVES, NECESSITY, AND SUFFICIENCY CRITERIA

被引:0
|
作者
Bortnikova, Olena [1 ]
Kashperska, Daria [2 ]
Leonov, Oleksandr [3 ]
Rubel, Karina [4 ]
Chumak, Oleksandr [5 ]
机构
[1] Diplomat Acad Ukraine, Kiev, Ukraine
[2] Taras Shevchenko Natl Univ Kyiv, Kiev, Ukraine
[3] Kyiv Natl Econ Univ, Kiev, Ukraine
[4] Mil Acad, Kiev, Ukraine
[5] Natl Tech Univ Ukraine Igor Sikorsky Kyiv Polytech, Kiev, Ukraine
关键词
Information security. Information threat. Motives for information protection. Criteria for protection. Information warfare. Information terrorism;
D O I
暂无
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
The scientific study of the motives, the degree of necessity, and the criteria of sufficiency of state information security included several research areas. First of all, the authors established that state information security is a component of the national security of any country. This part of the work of state bodies has a regulatory and normative basis, a developed professional apparatus, and institutions that collect and disseminate information. Since the beginning of the development of digital technologies in the late XX -early XXI century, the world has experienced an information revolution. This revolution was made possible by the invention of the Internet and the expansion of the sphere of influence of actors on society and its interests, as well as on the perception of reality. The study establishes the chronology of the formation of information threats to the country and society by creating a model of growing danger and, accordingly, the reaction of the state and law enforcement agencies to increasing problems in an information space. The article identifies the motives for the formation of events defined in space and time due to information noise, information chaos, information fake, information warfare, and information terrorism. The authors outline the criteria for responding to each level of information threat with appropriate actions. In addition, they identify the requirements for the sufficiency of the state's response to information threats of various kinds, taking into account the following principles: legality, the primacy of international law over national legislation, property rights in the process of ensuring information security, economic feasibility of database protection, impartiality, and continuity. The level, scope, and extent of the state's defense of its population and society is still controversial. This can violate the rights and freedoms of people and citizens established by the state. The study was conducted using general and special methods. The general methods used include the dialectical method, which is based on fairness, comprehensive research, and the use of the systematic nature of scientific knowledge; the logical method in presenting materials; the functional method in combining parts of the study with its main topic; the systemic and structural method in forming integral parts of hypothesis proof. Special methods of scientific knowledge include: historical method when studying the sequential development of information threats; the method of system analysis when comparing information threats and the state response to their elimination; generalization of regulatory and practical materials when conducting research.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Unraveling the existence of the necessity and sufficiency of accounting information
    Agbodjo, Serge
    Kan, Konan Anderson Seny
    Zori, Solomon George
    Hussainey, Khaled
    JOURNAL OF APPLIED ACCOUNTING RESEARCH, 2022, 23 (05) : 1095 - 1113
  • [2] EVALUATION OF EVIDENCE FOR SUFFICIENCY, FOR NECESSITY, AND FOR NECESSITY-AND-SUFFICIENCY
    OBRIEN, DP
    DAVIDSON, GM
    QUARTERLY JOURNAL OF EXPERIMENTAL PSYCHOLOGY SECTION A-HUMAN EXPERIMENTAL PSYCHOLOGY, 1989, 41 (03): : 531 - 551
  • [3] On the Impact of Neighbourhood Sampling to Satisfy Sufficiency and Necessity Criteria in Explainable AI
    Pawar, Urja
    Beder, Christian
    O'Reilly, Ruairi
    O'Shea, Donna
    CAUSAL LEARNING AND REASONING, VOL 236, 2024, 236 : 570 - 586
  • [4] MODAL, NECESSITY, SUFFICIENCY AND CO-SUFFICIENCY OPERATORS
    Kim, Yong Chan
    KOREAN JOURNAL OF MATHEMATICS, 2012, 20 (03): : 293 - 305
  • [5] Consciousness and attention: on sufficiency and necessity
    van Boxtel, Jeroen J. A.
    Tsuchiya, Naotsugu
    Koch, Christof
    FRONTIERS IN PSYCHOLOGY, 2010, 1
  • [6] NECESSITY AND SUFFICIENCY IN LANGUAGE LEARNING
    NEWMARK, L
    REIBEL, DA
    IRAL-INTERNATIONAL REVIEW OF APPLIED LINGUISTICS IN LANGUAGE TEACHING, 1968, 6 (02): : 145 - 164
  • [7] Manufacturing fundamentals: necessity and sufficiency
    Morita, Michiya
    Machuca, Jose A. D.
    Flynn, Barbara
    Matsuo, Hiro
    INTERNATIONAL JOURNAL OF OPERATIONS & PRODUCTION MANAGEMENT, 2012, 32 (08) : 908 - 910
  • [8] On the necessity and sufficiency of PLUS factorizations
    She, YY
    Hao, PW
    LINEAR ALGEBRA AND ITS APPLICATIONS, 2005, 400 : 193 - 202
  • [9] Relative use of necessity and sufficiency information in causal judgments about natural categories
    McGill, AL
    JOURNAL OF PERSONALITY AND SOCIAL PSYCHOLOGY, 1998, 75 (01) : 70 - 81
  • [10] MOTIVES AND OBJECTIVES OF CRIME COMMISSION AGAINST INFORMATION SECURITY
    Bokovnya, Alexandra Yuryevna
    Begishev, Ildar Rustamovich
    Shutova, Albina Aleksandrovna
    Bersei, Diana Davletovna
    Pershina, Elena Anatolievna
    Potudinsky, Valery Pavlovich
    AD ALTA-JOURNAL OF INTERDISCIPLINARY RESEARCH, 2020, 10 (02): : 7 - 9