scholarly journals Role of Information Security in Terms of Digital Economy

2020 ◽  
Vol 11 (1) ◽  
Author(s):  
Aleksey Bushuyev ◽  
Irina Derevtsova ◽  
Yulia Maltseva ◽  
Viktoriya Terentyeva

The current level of economic development implies an active use of the Internet, satellite communications, and new technologies of processing, storing, and transmitting information, which, in its turn, makes the problem of protecting personal data and ensuring information security of the state and enterprises urgent. Unauthorized access to information resources of organizations, destruction, blocking, copying and use of companies information for the deceptive purposes of third parties cause significant damage to both individuals and businesses and the state. The article examines the correlation of the concepts of information security and economic security, specifies todays existing challenges and threats to economic security in the context of digital transformation, analyzes the statistical data of economic crimes using digital technologies; it identifies possible causes and factors of weakening the security of the digital economy. The authors present an analysis of statistical data that characterize the number and structure of crimes related to violation of information security of the country and territories. In particular, they examine the following types of crimes: cyber attacks on the websites of public authorities; creation, use and distribution of malicious computer programs; fraud using electronic means of payment.

2019 ◽  
pp. 27-37
Author(s):  
Lev Zaks

The paper explores the subject of Russian authorities’ reaction to realities and effects of the current technological revolution. The content of this response is outlined, yielding a fundamentally new level of mastery over substance, energy and information. The technological revolution is considered as a challenge to public authorities, i.e. a problem – the most important one by its essence, scale, impact on the present and the future of all society’s areas and the public life in general. In Russia, this challenge is particularly relevant due to the country’s growing technology gap. Statistical data and facts confirming this widening gap are provided. It is emphasized that an adequate response to this emerging challenge cannot be partial or local; it needs to have systemic nature and connection with all key aspects of the state policy. A misalignment of current Russian authorities’ aspirations, imperatives and practice with the technological revolution’s logic and needs is demonstrated. The state policy does not match the interests of innovative development, does not create the necessary conditions for this development or its subjects. As a result, the main potential subjects of technological innovations (the paper identifies the main groups of such subjects) objectively cannot create or implement new technologies and have no subjective interest (incentives / motivation) for that.


2018 ◽  
Vol 7 (4.38) ◽  
pp. 1227
Author(s):  
T. L. Shugunov ◽  
T. Yu. Khashirova ◽  
A. S. Ksenofontov ◽  
M. A. Georgieva ◽  
S. M. Arvanova

This article discusses the burning issues of ensuring information security in modern economic conditions. The purpose of this study is to analyze the current state of the effectiveness of information security in the conditions of the emerging digital economy in the Russian Federation. According to the research conducted, the number of cybercrimes in the economic sphere increases every year. The largest percentage of cybercrime is committed in the banking sector of the economy. Banks of the Russian Federation have developed information security systems and services that deal with issues of ensuring the security of economic operations. One of the key security tools is the use of cryptography. The Russian Federation is actively developing software products in the field of encryption, but these programs do not have recognition in the global information security market. The obtained results allow us to make a conclusion about the development of the market of information products in the field of protection of economic security, but it is necessary to develop software products that will meet international standards in the field of information security. The results obtained are of theoretical and practical importance for specialists in the field of security and economics. The results obtained can serve as a foundation for conducting more extensive research on the state of the information security system of the digital economy in the Russian Federation.  


Author(s):  
O. V. Samchyshyn ◽  
D. V. Perevizna

Emergence of new technologies and modernization of existing information technologies, development of information and telecommunication processing and storage systems have increase the level of information security, necessitating an increase of information security’s effectiveness with the complexity of data storage architecture. Security of information from unauthorized access is an essential measure to prevent material and non-material damage to its owner. So it is very important to take into account the efficiency of the subsystem of access control and data security in order to ensure security of some information system. Accordingly the threat of information leakage has made the means of information security and cyber security one of the mandatory characteristics of information and telecommunication systems and information security has become an integral part of professional function. Under conditions of the hybrid war of the Russian Federation against Ukraine? the number of cyber attacks on military information and telecommunication systems has increased. At the same time their technological complexity has increased too. This process necessitates the improvement of information security systems and the process of providing access to them by using modern types of users identification. Access control is an effective method of information security. It regulates the use of information system resources. User’s identification is an important and integral element of access control system. An analysis of modern types of users identification is presented in the paper. The technology of QR-code is considered: the principle of formation, the types of coding, the structure of elements, the advantages of its usage. The interconnection between its components was established. Prospects for further research are the development of an algorithm and software application for user identification to provide access by QR-code to information and telecommunication systems for military purposes.


Author(s):  
Yurii I. Khlaponin ◽  
Svitlana V. Kondakova ◽  
Yevheniia Ye. Shabala ◽  
Liliia P. Yurchuk ◽  
Pavlo S. Demianchuk

The article is devoted to the study of trends in cybercrime, which is a threat to the country's information security. The place and role of cybersecurity in the system of national security are determined. The state of the system of protection against cyber attacks in the developed countries of the world, such as France, Japan, China, South Korea and the United Kingdom, was analyzed. The main shortcomings and perspectives of protection of cyberspace are revealed. The use of modern information technologies in state structures, as well as in society in general, proposes solving information security problems as one of the main ones. The economy, logistics and security of the country increasingly depend on the technical infrastructure and its security. To improve the effectiveness of the fight against cybercrime, developed countries have long started the appropriate work needed to create their own cyber security strategy. Incidents in the field of cybersecurity affect the lives of consumers information and many other services and cyber attacks aimed at various objects of infrastructure of electronic communications systems or technological processes management. Modern world trends in the development of cybercrime and the strengthening of cyber attacks indicate an increase in the value of combating it for the further development of society, which in turn predetermines the assignment of certain groups of social relations of the cybersphere to the competence of legal regulation. The current situation with cybercrime requires constant improvement of methods the fight against cybercrime, the development of information systems and methods aimed at ensuring the cyber security of the country. Necessary tasks are the development of a national strategy on cybersecurity, which will include tactical and strategic priorities and tasks in this area for state bodies. So, the issue of cyberspace security, the fight against cybercrime is relevant both at the international level and at the level of the individual country, and therefore needs further consideration.


2020 ◽  
Vol 32 (4) ◽  
pp. 73-82
Author(s):  
Olga M. Lizina ◽  

Introduction. The level of the shadow economy is important for the development of any state, identifying the goals and priorities of its development. The shadow economy in Russia is the leading one among the problems that destroy the state system and pose a serious threat to national economic security. Materials and Methods. To identify the state of the shadow economy in the Russian Federation in the context of its regions, the tax approach was used, on the basis of which the GRP indicators and components were analyzed. Results. A comparison of statistical data with those provided by the Federal Tax Service made it possible to identify the scale of the shadow economy in Russian regions over the period from 2007 to 2018. An analysis of the data showed that from 2007 to 2009. there was a decrease in the level of the shadow economy, and, since 2009, its growth has been noted in most regions. Conclusion. The presence of unaccounted economic activity in all Russian regions poses a threat not only to the economic security of individual regions but also to the safe and sustainable development of the entire state. Analysis of the state of the shadow economy in Russian regions showed the unevenness of its development in different regions. To conduct an effective policy of countering shadow economic processes, it is important to identify their scale and take regional characteristics into account.


Author(s):  
Yao Yao ◽  
◽  
A.V. Vasilieva ◽  

Today, the problem of the digital economy and economic security is becoming one of the most urgent, because an important aspect of the digital economy is to ensure the economic security of the state and business. The main purpose of this article is to study the relationship and interaction of the digital economy and economic security


Author(s):  
Svitlana Paliy ◽  

The analysis of theoretical bases of development and functioning of the state policy in the field of information security has allowed to come to a conclusion that in domestic scientific circles the research of the given question and problems of perfection of mechanisms of maintenance of safety in information space was engaged by a considerable quantity of scientists, in particular: S. Gorova, N. Grabar, M Gutsalyuk, A. Turchak, J. Chmyr and others. At the same time, it is substantiated that in the science of public administration, today, there is no unified definition of "state policy in the field of security in the information space", because the disclosure of this category in modern scientific thought is not detailed enough. The opinion is substantiated that the state policy in the field of information space security can be defined as a specific complex phenomenon in society, which includes a large number of components of different directions (economic, foreign policy, military, technological and other). In this concept, the activities of public authorities should be aimed at creating favorable conditions for the implementation of state measures to ensure a high level of security in the information environment of the country. The opinion is proved that the state-legal mechanism of public administration in the field of ensuring the security of the information space of the state acts as a holistic system of public authorities and special institutions that outline the legal field in this area and effectively regulate economic, financial, economic and social relations. between subjects in the field of information space security and information data protection. It is noted that the organizational and legal mechanism of public administration in the field of information security of the state provides an opportunity to coordinate the development of regulatory framework in accordance with modern progress and development of information technology in the world, as well as creating an algorithm for public authorities to implement effective state policy in the field of information security of the state, taking into account the necessary resources and by exercising the function of control over their use.


Author(s):  
Aurelija Pūraitė ◽  
Neringa Šilinskė ◽  
Kristina Mikalauskaitė – Šostakienė

The world has been changing rapidly and with surprise we keep watching how the new technologies develop. If fifty years ago to an ordinary user having a video recorder was something inconceivable, now probably anybody could have it in a pocket. Even flying cars, that could a few years back be only dreamed of, now are becoming a reality and it will not take ages until they fill up our space. Along with the modern technologies we notice how it is becoming easy to gather information: with the help of drones we can capture images, record, conduct search; video recording, surveillance cameras mounted on buildings, in cars can capture visual information about everything that is on the way. However, herewith there is a great concern about whether it is possible to tackle threats caused by these technologies and especially threat to people’s privacy. Thus, it could be said that filming devices are the best tool to collect the most accurate information. However, along with the development of image capturing devices and other technologies, people’s concern about their privacy grows. And this could be confirmed by the General Data Protection Regulation  which came into force just recently.  The fact that the necessity of such regulation was noticed by the European Union proves that people’s private information as a part of their right to private life, had been in danger. The same, confirming the novelty and actuality of the topic, is stated in the preamble of the GDPR: “Rapid technological developments and globalisation have brought new challenges for the protection of personal data. The scale of the collection and sharing of personal data has increased significantly. Technology allows both private companies and public authorities to make use of personal data on an unprecedented scale in order to pursue their activities.” Adding to the latter, the GDPR does not apply to the processing of personal data by a natural person in the course of a purely personal or household activity and thus with no connection to a professional or commercial activity, but technologies serve not only private companies and public authorities, but also natural persons in collecting of personal data for various purposes, including illegal ones. On the other hand, the image capturing devices give people immense opportunities (including not only economical, but security and other aspects as well; therefore hereinafter called as “societal security”) and to be able  to enjoy them it is worth working on the adjustment of current legislation in order to find the right balance between the value given by the technologies in-topic (security) and the other value that is so much in-danger nowadays (privacy). The latter forms the research problem. So in this research the answer on how the current legal regulation could be adjusted in order to find that balance, is given. By comparing and indicating the problematic aspects of current national Latvian and Lithuanian regulation on the usage of technologies in-topic and privacy protection, the authors aim to prove that even though the regulation on protection of particular values could differ in different jurisdictions,  the image capturing devices still make a great contribution to societal security therefore their use cannot be denied. In order to adjust their impact on privacy, it is necessary to clearly categorize different subjects of the usage of image capturing devices and suggest legal rules for the prevention of privacy breaches.


Author(s):  
Oksana Orlyk

The article studies the current trends in the use of information and communication technologies by Ukrainian enterprises in their practical activities during 2017–2019 years based on the generalization of statistical data. The object of the research is the information and communication technologies of the Internet as a key factor to ensure business informatization and to increase the competitiveness and economic security of enterprises. The purpose of the article is to analyze and identify the nature of changes in the dynamics and directions of the use of computer technology, information and communication technologies by Ukrainian enterprises in recent years. The work uses the methods of analytical-monographic – in the study of literary sources on the topic of research; analysis and synthesis – to summarize statistical data on trends in the use of information and communication technologies by enterprises; system analysis, abstraction, logical generalizations – in determining the characteristic features of the process that is being investigated; abstract-logical – to form conclusions. The data relative to the process of implementation and use in enterprises of modern information and communication technologies are summarized and analyzed. The areas of use of the Internet, which enterprises are mainly used to transmit or receive email messages, banking operations, obtaining information about goods and services, obtaining information from public authorities. The dynamics and directions of use by enterprises of websites, which are used mainly to serve customers and create electronic links to business social media profiles. The tendencies of the use of cloud computing services are analyzed, among which enterprises are preferred by the use of financial or accounting applications, Email and office software. The advantages, opportunities and threats from the use of modern information and communication technologies by enterprises are identified. It is proposed the information technologies that should be recommended for enterprises in practice in the context of accelerating business informatization.


Sign in / Sign up

Export Citation Format

Share Document