scholarly journals PROBLEMS OF INTERPRETATION OF THE CATEGORY “INFORMATION SECURITY OF THE STATE” IN THE MODERN LEGAL DOCTRINE OF UKRAINE

Author(s):  
P.О. YAKOVLIEV
Author(s):  
Sergey Valerevich Belov ◽  
Irina Mikhalovna Kosmacheva ◽  
Irina Vyacheslavovna Sibikina

To solve the problem of information security management the method was proposed that allows determining the degree of importance of confidential documents of the organization. The urgency of the proposed algorithm was substantiated taking into account the requirements of the legislation of the Russian Federation in the sphere of information security. The stages prior to the formation of the list of confidential documents of the organization were described. A review of the main documents of the legal and regulatory framework was carried out including documents relating to the state regulation of relations in the sphere of information security. The classes of protected information for the accessing categories were considered. The criteria changes of the value of information in the process of time were represented. The algorithm of formation of the list of confidential documents of the organization based on the properties of information was offered. The algorithm is based on an expert method of pair comparison of alternatives. The result of the use of this method is a number of confidential documents, ranked in descending order of importance. For each document the weighting factor of importance can be calculated. The verification stage of the degree of expert consistency was included in the methodology to eliminate the use of erroneous expert data. The application of the methodology is illustrated by a calculated example.


2020 ◽  
Vol 15 (16) ◽  
pp. 128-132
Author(s):  
V. V. Shapovalov ◽  
◽  
A. A. Gudzenko ◽  
V. A. Shapovalova ◽  
V. V. Shapovalov ◽  
...  

Introduction. Modern turbulent state of society actualizes need for scientifically based methods and technological solutions to improve the information security system not only for the state, but also for society and the person in particular. Objective. To highlight the significant factors of information security of social development and to study the role of public admini-stration in the context of the actualization of information threats and risks. Study results. The article considers the essence of state management approaches to information security based on interpretation in terms of risk management. Information security is presented as a dynamic system that needs balance. Balance can be disturbed by external and internal factors. The 8 most significant factors that need to be taken into account to develop effective models of public administration in the field of information security are identified. 4 paradigms of information security management (systemic, synergetic, phenomenological and cognitive) which can be involved are considered. However, they are not universal and separate in any particular case, that is they are systemic in nature, and security management should be based on their integrated application depending on the situation and the specifics of the management process. Based on the analysis of the classical model of maintaining the state balance of a dynamic system, it is concluded that it can be used to ensure information security. A model is proposed to explain the reasons for the imbalance of the dynamic system of information security under the action of factors of influence and the risks that accompany them, and to determine the measures of public administration to ensure it. Conclusion. The model is proposed to explain the reasons for the imbalance of the dynamic system of information security under the action of factors of influence and the risks that accompany them, and to determine the measures of public administration to ensure it. Key words: Information security; Information security factors; Society; Public administration; Information security model.


2020 ◽  
Vol 15 (16) ◽  
pp. 121-128
Author(s):  
O. A. Panchenko ◽  

Introduction. Modern turbulent state of society actualizes need for scientifically based methods and technological solutions to improve the information security system not only for the state, but also for society and the person in particular. Objective. To highlight the significant factors of information security of social development and to study the role of public admini-stration in the context of the actualization of information threats and risks. Study results. The article considers the essence of state management approaches to information security based on interpretation in terms of risk management. Information security is presented as a dynamic system that needs balance. Balance can be disturbed by external and internal factors. The 8 most significant factors that need to be taken into account to develop effective models of public administration in the field of information security are identified. 4 paradigms of information security management (systemic, synergetic, phenomenological and cognitive) which can be involved are considered. However, they are not universal and separate in any particular case, that is they are systemic in nature, and security management should be based on their integrated application depending on the situation and the specifics of the management process. Based on the analysis of the classical model of maintaining the state balance of a dynamic system, it is concluded that it can be used to ensure information security. A model is proposed to explain the reasons for the imbalance of the dynamic system of information security under the action of factors of influence and the risks that accompany them, and to determine the measures of public administration to ensure it. Conclusion. The model is proposed to explain the reasons for the imbalance of the dynamic system of information security under the action of factors of influence and the risks that accompany them, and to determine the measures of public administration to ensure it. Key words: Information security; Information security factors; Society; Public administration; Information security model.


2021 ◽  
Vol 9 (1) ◽  
pp. 119-131
Author(s):  
Anthony Carty

Abstract Customary international law as a source of general law is given a primary place in Article 38 of the ICJ Statute. However, it is historically a concept created by legal doctrine. The very idea of custom supposes legal persons are natural persons living in a dynamic, evolving community. This was the assumption of the historical school of law in the 19th century when the concept of custom was developed. Now the dominant notion of legal personality is the State as an impersonal corporation and international legal theory (Brierly and D’Amato) can see well that the death of the historical school of law has to mean the death of the concept of custom. What should replace it? Two steps need to be taken in sequence. Firstly, following the Swedish realist philosopher Haegerstrom, we have to ascertain the precise constellations of the conflictual attitudes the populations of States have to the patterns of normativity which they project onto international society. Secondly, we should follow the virtue ethics jurisprudence of Paul Ricoeur and others, who develop a theory of critical legal doctrinal judgement, along the classical lines of Aristotle and Confucius, to challenge and sort out the prejudices of peoples into some reasonable shape, whereby these can be encouraged to understand and respect one another. Then one will not have to endure so many silly interpretations of international law such as the one declaring that there are only rocks in the South China Sea and not islands. Such interpretations have nothing to do with the supposedly ordinary legal language analysis of a convention and the State practice surrounding it. They have to do entirely with a continued lack of respect by Western jurists for non-Western societies and nations.


2006 ◽  
Vol 36 (1) ◽  
pp. 73
Author(s):  
Freddy Harris ◽  
Bono Budi Priambodo

The authors here explain regarding the role of regulation to anticipating information security By sociological approaches it has reflected on the Indonesian conditions which had not adequate organized. Existing arranged is limited on certain sectors. social group. and corporations group either domestic and multinational levels. Most efforts to reach to better level have been initiated by many parties such as public sector. education. information technology industrial. professional community and civil. Here also recommended needs for clear policy and the whole implementation which be coordinated integrally under government chief's. Government leads under the authority to accomplishing the state under effective law and regulations


Author(s):  
Dmitry Dvoretsky ◽  
Natalia Kolesnikova ◽  
Oksana Makarkina ◽  
Kira Lagvilava

The mass introduction of information technologies in the activities of state structures has made it possible to transfer the efficiency of their functioning to a qualitatively new level. Unfortunately, as a means of action, they have characteristic vulnerabilities and can be used not only for good, but also for harm. For the state, as a guarantor of the stability of a civilized society, the issue of ensuring the security of information processing is particularly important. Despite the automation of many information processes, the most vulnerable link in the work of information systems remains a person. A person acts as an operator of information systems and a consumer of information. The entire service process depends on the competence of the operator and the quality of his perception. There are areas of government activity where the cost of error is particularly high. These include ensuring the life and health of citizens, protecting public order and the state system, and ensuring territorial integrity. The specifics of the spheres must be taken into account when ensuring the security of information. This study concerns official activities that are provided by paramilitary groups. Currently, there is a discrepancy in the level of competence of new personnel in the first months of service. The author traces the shortcomings of general and special professional qualities in the field of information security. The purpose of the study is to substantiate certain pedagogical means of forming cadets ' readiness to ensure information security. As forms of theoretical knowledge, we will use the traditional hypothesis and model, as well as functionally distinguishable judgments – problem, assumption, idea and principle. Empirical forms of knowledge will be observation (experimental method) and fixation of facts. To evaluate the effectiveness of the developed pedagogical tools, we use statistical methods: observation (documented and interrogated) and calculation of generalizing indicators. To formulate conclusions, we will use logical methods: building conclusions and argumentation. The approbation of certain pedagogical tools described in this article showed a significant positive trend in terms of competence in information security issues.


Author(s):  
Tamar Makasarashvili ◽  
Tea Khorguashvili ◽  
Giuli Giguashvili ◽  
Aleksandre Sadagashvili

With the development of Internet technologies, cybercrime has also evolved and diversified. Much of the world's economic and business information comes from electronic information, and the need for remote work caused by the coronavirus (COVID-19) pandemic has further increased demand for e-services, which in turn has contributed to increased technology risks, threats, and incidents. The main task of the states is to actively fight against the negative socio-economic, financial, and political consequences caused by the growth of cybercrime. The main purpose of the study is to assess the negative consequences of cybercrime in Georgia, the main threats to information security, to develop recommendations for the prevention of cybercrime, to improve its legal regulation mechanisms. The fight against cybercrime in Georgia is carried out using criminal norms. The law "On Information Security" is in force in the country, Georgia's cyber security strategy has been developed, but this process needs constant development. The main task of the state is to gradually improve the legislation and bring it in line with modern technologies, to ensure close cooperation between the state and society, to raise the awareness of civil society. It is essential to constantly inform the public and companies about cyber threats, as effective prevention is the best form of crime prevention policy.


Author(s):  
А.А. Борзов

Учение представителя раннего итальянского гуманизма, выдающегося философа и правоведа, Марсилия Падуанского [1270(80) – 1342(43)] о государстве актуализирует платоновские политико-правовые идеалы. Мысль Платона о сущностном единстве человека и государства, формируемом общим источником их добродетели – идеей справедливости, составляет теоретическое основание гуманизма падуанца, его философско-правового учения о совокупной воле людей как источнике государственного суверенитета. The teaching of the representative of early Italian humanism, an outstanding philosopher and lawyer, Marsil of Padua [1270 (80) - 1342 (43)] about the state actualizes Plato's political and legal ideals. Plato's thought about the essential unity of man and the state, formed by the common source of their virtue - the idea of ​​justice, constitutes the theoretical basis of Padua's humanism, his philosophical and legal doctrine of the collective will of people as a source of state sovereignty.


2021 ◽  
Vol 2032 (1) ◽  
pp. 012051
Author(s):  
M E Sukhoparov ◽  
I A Sikarev ◽  
T M Tatarnikova ◽  
I S Lebedev ◽  
A A Butsanets

Sign in / Sign up

Export Citation Format

Share Document