INFORMATION SECURITY OF THE STATE: MOTIVES, NECESSITY, AND SUFFICIENCY CRITERIA

被引:0
|
作者
Bortnikova, Olena [1 ]
Kashperska, Daria [2 ]
Leonov, Oleksandr [3 ]
Rubel, Karina [4 ]
Chumak, Oleksandr [5 ]
机构
[1] Diplomat Acad Ukraine, Kiev, Ukraine
[2] Taras Shevchenko Natl Univ Kyiv, Kiev, Ukraine
[3] Kyiv Natl Econ Univ, Kiev, Ukraine
[4] Mil Acad, Kiev, Ukraine
[5] Natl Tech Univ Ukraine Igor Sikorsky Kyiv Polytech, Kiev, Ukraine
关键词
Information security. Information threat. Motives for information protection. Criteria for protection. Information warfare. Information terrorism;
D O I
暂无
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
The scientific study of the motives, the degree of necessity, and the criteria of sufficiency of state information security included several research areas. First of all, the authors established that state information security is a component of the national security of any country. This part of the work of state bodies has a regulatory and normative basis, a developed professional apparatus, and institutions that collect and disseminate information. Since the beginning of the development of digital technologies in the late XX -early XXI century, the world has experienced an information revolution. This revolution was made possible by the invention of the Internet and the expansion of the sphere of influence of actors on society and its interests, as well as on the perception of reality. The study establishes the chronology of the formation of information threats to the country and society by creating a model of growing danger and, accordingly, the reaction of the state and law enforcement agencies to increasing problems in an information space. The article identifies the motives for the formation of events defined in space and time due to information noise, information chaos, information fake, information warfare, and information terrorism. The authors outline the criteria for responding to each level of information threat with appropriate actions. In addition, they identify the requirements for the sufficiency of the state's response to information threats of various kinds, taking into account the following principles: legality, the primacy of international law over national legislation, property rights in the process of ensuring information security, economic feasibility of database protection, impartiality, and continuity. The level, scope, and extent of the state's defense of its population and society is still controversial. This can violate the rights and freedoms of people and citizens established by the state. The study was conducted using general and special methods. The general methods used include the dialectical method, which is based on fairness, comprehensive research, and the use of the systematic nature of scientific knowledge; the logical method in presenting materials; the functional method in combining parts of the study with its main topic; the systemic and structural method in forming integral parts of hypothesis proof. Special methods of scientific knowledge include: historical method when studying the sequential development of information threats; the method of system analysis when comparing information threats and the state response to their elimination; generalization of regulatory and practical materials when conducting research.
引用
收藏
页数:19
相关论文
共 50 条
  • [41] INFORMATION IN EXPERIMENTS AND SUFFICIENCY
    FERENTINOS, K
    PAPAIOANNOU, T
    JOURNAL OF STATISTICAL PLANNING AND INFERENCE, 1982, 6 (04) : 309 - 317
  • [42] Information Sovereignty as the Basis of Modern State Information Security
    Zozulia, Oleksandr
    Zozuha, Ihor
    Brusakova, Oksana
    Kholod, Yurii
    Berezhna, Yevheniia
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (12): : 264 - 268
  • [43] Countering fake information as a guarantee of state information security
    Andrii V. Svintsytskyi
    Oleksandr H. Semeniuk
    Olena S. Ufimtseva
    Yurii B. Irkha
    Serhii V. Suslin
    Security Journal, 2023, 36 : 427 - 442
  • [44] Countering fake information as a guarantee of state information security
    Svintsytskyi, Andrii, V
    Semeniuk, Oleksandr H.
    Ufimtseva, Olena S.
    Irkha, Yurii B.
    Suslin, Serhii, V
    SECURITY JOURNAL, 2023, 36 (03) : 427 - 442
  • [45] Current state of information security research in IS
    Zafar, Humayun
    Clark, Jan Guynes
    Communications of the Association for Information Systems, 2009, 24 (01): : 557 - 596
  • [46] Ensuring Information Security of The State and Society
    Varenia, Nataliia
    Ryzhov, Igor
    Khodanovych, Vitalii
    Avdoshyn, Ihor
    Davydova, Tetiana
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (06): : 312 - 318
  • [47] Current State of Information Security Research In IS
    Zafar, Humayun
    Clark, Jan Guynes
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2009, 24 : 571 - 596
  • [48] Necessity, sufficiency, and perspective effects in causal conditional reasoning
    Fairley, N
    Manktelow, K
    Over, D
    QUARTERLY JOURNAL OF EXPERIMENTAL PSYCHOLOGY SECTION A-HUMAN EXPERIMENTAL PSYCHOLOGY, 1999, 52 (03): : 771 - 790
  • [49] X-ray diffraction analysis: Sufficiency and necessity
    Pisarevskii, AP
    KOORDINATSIONNAYA KHIMIYA, 1995, 21 (10-11): : 757 - 759
  • [50] INFORMATION AND E - SUFFICIENCY
    PEREZ, A
    BULLETIN OF THE INTERNATIONAL STATISTICAL INSTITUTE, 1965, 41 (02): : 627 - 628