scholarly journals The Digital Society in the 21st Century: Security Issue

2021 ◽  
Author(s):  
D.M. Kovba ◽  
Y.Y. Moiseenko

Digitalization is thought to be a key driver of recent economic, cultural, political, and society transformations, with these changes entailing both positive and negative consequences. The negative ones include various risks and threats for information security of both society and state. As a result, there has been growing impetus to rethink the concept of security in the digital age. In this paper the discourse of security is discussed in terms of dichotomy between soft and hard power in a digitalized society. This discussion involves the following issues to be considered: 1) how this soft/hard range of power can be applied to the security problem; 2) how different information threats could be countered within the discourse of the state security; 3) how the soft security could be implemented in a digitalized society. Structured analysis, discourse analysis and conceptual approach are mainly involved to provide research methodology for the discussion. It should be noted that our research is conducted within theoretical framework established by B. Buzan, J. Nye, with the acknowledgment of the results obtained from the previous studies of the authors of this paper. The concept of security was productively discussed in terms of soft and hard power vocabulary. As a result of this discussion, soft security was interpreted as the measure of protecting something from harm in invisible, unobtrusive ways, whether hard security was designed to oppose challenges and threats and it is traditionally associated with methods of force. It was particularly established that hard security measures are likely to be applied in the military sector, while soft security measures are commonly used in a non-military context. Due to the concept of soft security has not yet been clearly defined and has not received recognition as a scientific term, it is argued that further investigation is demanded. Within this investigation, information security is interpreted as a special category of soft security. The relevant distinction between information security and cybersecurity is made, with the different frequency of using these terms in official discourses of different states being explained. It is also considered that the problems of soft security insurance cannot be solved at the level of individual states due to the transnational nature of digital technology, so it requires international responses. Therefore, establishing the normative force (i.e. elaboration of international rules and institutions) can be an effective measure, while an international exchange of experience in countering information threats seems to be very useful. Educational programs aimed both at creating qualified personnel in the field of digital technologies, as well as at the general public (improving information literacy), also contribute to ensuring the safety of society and the state. Keywords: information security, digital society, soft security, international relationships, cybersecurity

Author(s):  
Tamar Makasarashvili ◽  
Tea Khorguashvili ◽  
Giuli Giguashvili ◽  
Aleksandre Sadagashvili

With the development of Internet technologies, cybercrime has also evolved and diversified. Much of the world's economic and business information comes from electronic information, and the need for remote work caused by the coronavirus (COVID-19) pandemic has further increased demand for e-services, which in turn has contributed to increased technology risks, threats, and incidents. The main task of the states is to actively fight against the negative socio-economic, financial, and political consequences caused by the growth of cybercrime. The main purpose of the study is to assess the negative consequences of cybercrime in Georgia, the main threats to information security, to develop recommendations for the prevention of cybercrime, to improve its legal regulation mechanisms. The fight against cybercrime in Georgia is carried out using criminal norms. The law "On Information Security" is in force in the country, Georgia's cyber security strategy has been developed, but this process needs constant development. The main task of the state is to gradually improve the legislation and bring it in line with modern technologies, to ensure close cooperation between the state and society, to raise the awareness of civil society. It is essential to constantly inform the public and companies about cyber threats, as effective prevention is the best form of crime prevention policy.


Author(s):  
H. Yarovenko

Over the past decade, there has been an increase in the volume of cybercrime in various spheres of life at the level of the state, economic agents, and individuals. Therefore, the issues of studying the processes of forming information security and identifying the impact on its effectiveness are becoming topical. The aim of this study is to prove the hypothesis that the behaviour of the population associated with the use of personal security measures and the formation of the corresponding consequences of incidents occurs under the influence of the level of economic development of the country. This was done using k-means cluster analysis via the Deductor Academic analytical platform and based on data from a survey conducted among respondents from EU countries. Analysis of the responses showed that there is a growing trend in the use of online banking and e-commerce services; there is an increase in the number of respondents who have become victims of cybercrimes, especially social engineering; the trend towards the use of reliable personal security equipment is declining. The results of the cluster analysis, for which data on the number of respondents who are victims of cybercrimes and the number of respondents using various personal security tools were used, made it possible to form 7 clusters of countries. Analysis of GDP per capita for the obtained clusters and visualization of the map of countries allowed us to confirm the hypothesis, but it was also determined that the dependence of the use of personal security measures and the consequences of cybercrimes is also influenced by the mental characteristics of countries formed due to the close territorial location of neighboring countries. The results obtained will be of practical importance for the development of the concept of information security and economic development of the state. They can be used to determine which sets of protection are appropriate for the income level of the population. Priority areas for further research are to determine the influence of other factors on the formation of the country's information security and the formation of a barycentric model of their measurements to ensure sustainable economic development of the state.


2020 ◽  
Vol 2 (3) ◽  
pp. 25-32
Author(s):  
M. V. Kibakin

A holistic expert method of social diagnostics of information security of the Russian society, which in its methodological and regulatory framework is based on the concept of national security, as the ability of state and public institutions to resist threats to the interests of the individual, society and the state has been presented. The essence of digital society as an object of protection from adverse effects at the technological level (computer, software and hardware base of digital communications), as well as at the level of content distributed in the information and communication network “Internet” has been stated. The subjects of virtual communication in terms of their capabilities and practice of protection from adverse information impact have been described. The characteristic of various situations of social interaction, which may be threatened by unauthorized access to personal information – in financial, economic and official relations, – has been given.A separate analysis has been made of the status of officials-subjects of the implementation of state powers in the authorities, which may be particularly vulnerable in the weak regulation © The Author(s), 2019. This is an open access article under the CC BY 4.0 license (http://creativecommons.org/licenses/by/4.0/). of malicious dissemination of false information in the information and communication network “Internet”. Special attention has been paid to the substantiation of the possibilities of early detection of information threats to the functioning of basic social institutions – social trust and stability of social relations, solidarity, civilizational identity, interfaith peace and tolerance in a complex society.The author’s methodology has been presented in the article as a sociological research technology that includes the interpretation and operationalization of groups of information threats enshrined in the state concept of national security, the correct application of expert procedures to assess security against these threats, as well as the subsequent mathematical-statistical and logical interpretation of the data obtained. The proposals for the use of methods of social diagnostics of information security in the practice of social management in the process of transformation of modern society on the basis of digital technologies have been explained.


Author(s):  
S. A. Zaporozhets

The article is devoted to the study of information security of Ukraine in the conditions of hybrid war, confrontation of hybrid threats from the Russian Federation, as well as priority directions for the effective provision of information security in our country. The analysis of this problem shows that the current state of Ukraine's information security system is characterized by an increase in existing threats, and on the other hand by the emergence of new challenges. Technological innovation processes, information breakthroughs, globalization of the world and tendencies of regional integration, along with providing enormous opportunities for the country's progressive development, have many negative consequences. One of the consequences has been the intensification of hybrid warfare between world countries, including against Ukraine. States' capacity to conduct information and information-psychological operations, to increase the sensitivity of society to the death of civilians and to the loss of military personnel in military conflicts are increasing. In the current conditions of globalization, the technological basis of which is the global information and telecommunication networks and a single information space, there is a tendency to change the principles and methods of management, including in military affairs. The ability of information to influence people's worldview and moods gives them the opportunity to gain an advantage over an adversary without engaging in a forceful confrontation with him. In fact, the correct method of working with information has become a new way of conducting an armed struggle, namely a hybrid war. In this regard, the leading countries of the world are undergoing a gradual transformation of approaches to the formulation of military policy of the state, which are practically embodied in ensuring the information security of the state in the conditions of hybrid war. The full-scale information war of Russia against our state has demonstrated the importance of ensuring information security as one of the main components of national security. In view of the above, the state and military authorities of the country were tasked with developing effective measures to neutralize the negative information impact of the Russian Federation and counteract its further deployment. The article also analyzes well-known approaches to improving the effectiveness of state response to national security threats in the information sphere in the context of the current armed conflict in eastern Ukraine. It is established that in order to achieve the appropriate level of information security it is necessary to create a single state mechanism for ensuring information security. A method for solving problems arising in this field is proposed.


Author(s):  
O. R. Stefurak ◽  
◽  
Yu. O. Tykhonov ◽  
O. A. Laptyev ◽  
S. A. Zozulya

The key role in building security systems of information resources as components of national information resources of the state is played by theory and practice, in which the scientific and methodological base is the basis for making sound and effective management decisions by information security of the state at all levels. The article identifies critical components of information space security based on an analytical analysis of threats of damage or unauthorized leakage of information at the objects of information activity. Based on the obtained analytical data, the stochastic model of threats of damage or unauthorized leakage of information at the objects of information activity has been improved. Based on the results of the proposed model, modeling was performed in order to confirm the analytical data and identified priorities for information security. The most critical areas and threats to information security are identified. The obtained results allow to plan the information security system taking into account the most probable threats. Plan and implement priority information security measures. Focus on protecting more likely areas of threat.


2019 ◽  
Vol 62 ◽  
pp. 10004 ◽  
Author(s):  
E.Yu. Latypova ◽  
E.V. Nechaeva ◽  
E.M. Gilmanov ◽  
N.V. Aleksandrova

Continuous expansion of the scope of network information technologies application permanently create the background for the appearance of new threats to the security of individuals, society and the state, including information security. Especially dangerous are terrorist acts potential threats by using information resources in the appropriate infrastructure of society and the state individual institutions. The current state of the problem of criminal liability for trespass to digital information, their dynamics and impact on Russia's technological and industrial potential, as well as the negative consequences of committing crimes in the sphere of digital information are considered in the article. A wide use of information and communication technologies (ICT) is an integral requirement of time representing an indicator of the development of a modern economy, both private and national, i.e. state. However, an increase in the share of information crime interferes with the progressive development of ICT. When using the methodological approach in science, measures of general prevention, as well as measures of special prevention aimed at digital crime countering are singled out. The most effective of them are special preventive measures, such as the current criminal, criminal procedure and information legislation improvement; the judicial practice improvement; the creation of new and improvement of existing methods of investigation and prevention of digital security crimes; the qualified personnel training in the field of information security (including specialized research institutes and government agencies of the relevant areas); as well as the need to keep within the necessary information security limits by the users themselves, both in the workplace and in everyday communication. This article is devoted to discussing some of these special preventive measures.


Author(s):  
Dominika Lisiak-Felicka ◽  
Paweł A. Nowak ◽  
Maciej Szmit ◽  
Radosław Zajdel

All healthcare organizations process “sensitive data” that needs special protection. To ensure an appropriate level of security for this data, it is necessary to allocate adequate financial resources for security measures. The exploratory aim of the research here is the recognition of the current state of information security management systems in selected entities performing medical activities. An analysis and evaluation of these systems and the financing of information security were conducted. The methods and techniques used in the research are Computer Assisted Telephone Interviews, literature studies, and a questionnaire survey with applications for access to public information. The subjects of the research were medical entities subordinate to the local governments of three Polish voivodeships (Łódź, Świętokrzyskie and Pomeranian). The research was conducted between 2017 and 2018. Research findings show that the surveyed entities did not properly manage information security and did not allocate adequate financial resources to ensure information security. The lack of efficient information security management in medical entities may entail negative consequences in the future.


The research paper is devoted to the digitalization process in the consumer market participants’ activity at the present stage, as well as the state and development of digital transformation. It is proved that digitalization implementation expands the possibilities of new formats of consumer market entities activity organization and management, as well as effects on the level of their economic growth, competitiveness in terms of digital and IT-decision-making competencies. The digitalization characteristic features (economic essence, purpose, goals, principles, elements, trend digital products) for successful use of modern information products in all spheres of activity are determined and generalized. The digitalization process should be considered from the standpoint of state (national level), enterprises and institutions (business sector) and the population (public sector). Digitalization opportunities wide range is identified; it allows building transparent digital state under the conditions of development and IT-opportunities activation; increasing GDP in all areas of activity; creating new types of products; increasing the technological process productivity under robotics and sensors use; strengthening the enterprise’s communication relations with stakeholders; intensifying targeting; using remote forms of work; finding new markets for products and goods promotion; creating comfortable conditions for the population during online orders, services and financial payments making, etc. The transactional operations realization, information storage in the digital space causes the intensification and spreading of illegal actions, creates threats for enterprises economic security. The possible negative consequences of the information and communication technologies widespread use by the state, enterprises, society are considered; it allows developing the threats model of market participants economic and information security and filters for their neutralization in terms of the digital transformation. In the digitalization process, consumer market participants are recommended to use organizational, legal and technical filters of threats neutralization that will ensure economic and information security of enterprises and society.


Author(s):  
Sergey Valerevich Belov ◽  
Irina Mikhalovna Kosmacheva ◽  
Irina Vyacheslavovna Sibikina

To solve the problem of information security management the method was proposed that allows determining the degree of importance of confidential documents of the organization. The urgency of the proposed algorithm was substantiated taking into account the requirements of the legislation of the Russian Federation in the sphere of information security. The stages prior to the formation of the list of confidential documents of the organization were described. A review of the main documents of the legal and regulatory framework was carried out including documents relating to the state regulation of relations in the sphere of information security. The classes of protected information for the accessing categories were considered. The criteria changes of the value of information in the process of time were represented. The algorithm of formation of the list of confidential documents of the organization based on the properties of information was offered. The algorithm is based on an expert method of pair comparison of alternatives. The result of the use of this method is a number of confidential documents, ranked in descending order of importance. For each document the weighting factor of importance can be calculated. The verification stage of the degree of expert consistency was included in the methodology to eliminate the use of erroneous expert data. The application of the methodology is illustrated by a calculated example.


Sign in / Sign up

Export Citation Format

Share Document