Information policy of state corporations

2020 ◽  
pp. 83-87
Author(s):  
Alexander Krylov

This article discusses the general principles of the implementation of the information policy and the particular principles on the basis of which the information policy is implemented in PJSC FGC UES. The authors also studied corporate policy objectives and highlighted information security as a component of the information policy.

2020 ◽  
Vol 20 (2) ◽  
pp. 382-394
Author(s):  
Tatyana Ivanovna Ponka ◽  
Mirzet Safetovich Ramich ◽  
Yuyao Wu

The subject of the study is the new course of the PRC information policy, which was launched by the Fifth generation of the PRC leaders after the 18th Congress of the Chinese Communist Party in 2012. As a result, after the 18th Congress of the CPC was started the implementation of the Strong cyberpower strategy, which implies not only ensuring cyber security in the country, but also the usage of network resources to develop the national economy. Chinas new information policy was caused by the sharply increased role of information and communication technologies in international processes and the shift in the focus of international relations to the Asia-Pacific region. The PRCs information policy is based on the most advanced technologies in the IT sphere and the cooperation with private companies on regulating external and internal information security. The relevance of the research topic is due to the increasing role of ICT in international processes. In this context, the most important are the positions of the leading countries of the world to regulate this area, as well as the mechanisms and tools used by them. The Peoples Republic of China is one of the leaders in the field of scientific and technical developments and actively uses its achievements to accomplish tasks in the field of domestic and foreign policy. In this regard, the purpose of the study is to analyze and compare the development strategies of the PRC information policy and the resources that are necessary for their implementation. The unique network landscape, which was formed under the influence of government policy on control over published content and the sharing of digital services market among the three largest information corporations (Baidu, Tencent and Alibaba), has become an essential part of the countrys information security system and requires detailed study. The purpose of the article is to identify the evolution of Chinas information policy development strategy and resources for its implementation. This article also discusses the threats to the information security of the Peoples Republic of China and analyzes the approaches to ensuring it. The results of the study are the conclusions that show the role and place of information policy in the PRC foreign policy, the structure of the information security system and strategic approaches to the regulation of international relations in cyberspace.


Author(s):  
A.V. Pecheniuk

The necessity of formation of an effective information security system of the enterprise is substantiated. It is emphasized that when designing an information policy, the firm must comply with the requirements of the current legislation, take into account the level of technical support, especially the regulation of employees' access to confidential information, etc. It is stated that the costs of organizing information security measures should be appropriate to its value. The article identifies major threats that could be breached by confidential information. The list of the main normative legal acts aimed at bringing to civil, administrative and criminal responsibility for illegal collection, disclosure and use of information constituting a trade secret. The main stages of building an information security policy are summarized, the most common types of information threats related to the use of modern computer technologies are described. The necessity of developing a domestic original accounting (management) program that could be used in the long term by the vast majority of Ukrainian enterprises is pointed out. There are three groups of tools that are applied in the theory and practice of information security of the enterprise (active, passive and combined), emphasizing the need for planning and continuous monitoring in real time of all important processes and conditions that affect data security. It is noted that even if the information security system is built taking into account all modern methods and means of protection, it does not guarantee one hundred percent protection of the information resources of the enterprise, but a well-designed information security policy allows to minimize the corresponding risks. Key words: information security, information policy, information security, confidential information, information threats, information and communication technologies, software.


Author(s):  
O. Voitko ◽  
V. Onishchuk

The events analysis since the beginning of the aggravation of relations between Ukraine and Russia evidences about the inefficiency of information policy, incoordination of activity of different subjects of ensuring the information security of the state, the weak presence of Ukraine in the world information space etc. At the same time, the problems of ensuring the information security of the state and realization of effective set of counter-propaganda measures, realization of information policy, aimed at consolidating Ukrainian society and the international community for the purpose of suppression of armed aggression are identified by the higher military-political governance of Ukraine as the most priority. Various internal and external factors negatively affect at the ability of Ukraine to adequately respond to challenges and risks in the military sphere. The insufficient and unprofessional efforts of Ukraine’s state authorities in the field of counteraction to the Russian Federation’s propaganda and information-psychological operations are the most important ones. That’s why there’s necessity of development the system of opinions and determination of the plan of the higher military-political governance’s of Ukraine actions regarding the implementation of state information policy and providing of information security of Ukraine and legislative definition of a conceptual document. Besides the importance of this fact consist in that after the restoration of the territorial integrity of Ukraine the main aims of military policy will be prevention the emergence of new armed conflicts, systematic strengthen the state's defense capability and increasing the role and authority of Ukraine in the international area.


Author(s):  
Iryna Sopilko

The study gives definitions of information security and related terms, such as cybersecurity, national security, and others, indicates the goals, objects, subjects of the concepts under consideration. The author also considers the features of the foundation and development of the information society in Ukraine, the components of its state information policy for ensuring information security, and identifies the key operations of activity of state bodies in the information sphere. The approaches of scientists who studied certain aspects of national and information security were analyzed, based on their work valuable conclusions were drawn and the conceptual basis of the article was formed. Independently, the definition and characteristics of external and internal threats to the information security of the country are given, methods for solving the problems arising in this connection are introduced, ways of ensuring the information security of the state are indicated. Information security in this study is considered as the central element of the national security of Ukraine, as well as a problematic issue in the field of information protection and ensuring the high-quality functioning of the information space. The author made an in-depth analysis of the existing regulatory and legal instruments for ensuring information security, pointed out their shortcomings, and gave recommendations for their further advancement. Also, recommendations are given to improve the current situation with the regulation of information security in the country, the directions of the state information policy are suggested and ways to ensure the continuity of the functioning of the information security system of Ukraine are indicated.


2021 ◽  
pp. 166-181
Author(s):  
R. Chernysh ◽  
L. Osichnyuk

The article examines the possibility of restricting the right to freedom of speech in order to protect the national interests of the state. An analysis of normative legal acts prohibiting the dissemination of destructive information, such as calls for a violent change in the constitutional order of Ukraine, the outbreak of aggressive war, incitement to national, racial or religious hatred, etc. The right to freedom of expression is not absolute and may be limited. The article substantiates the criteria for state intervention in the information sphere, which allow limiting the dissemination of destructive information and preserving democratic values. Such criteria include the legality of the procedure, the legality of the purpose and the minimum amount of intervention. The article considers the existing mechanisms in Ukraine to respond to harmful informational influences. The law provides for liability for disseminating false information at several levels: civil, administrative and criminal. At the same time, these mechanisms are insufficient, as the concepts of «misinformation», «fake», etc. are not normatively defined. The article describes the state policy to combat destructive information influence. The bases of activity of state bodies created for the purpose of counteraction to dissemination of misinformation and propaganda are considered, namely the Center of counteraction of misinformation at Council of National Security and Defense of Ukraine and the Center of Strategic Communications and Information Security at the Ministry of Culture and Information Policy. The strategies of the state on counteraction to harmful information influence are analyzed. The Doctrine of Information Security of Ukraine is considered, which clarifies the basics of the state information policy in the direction of counteracting the destructive information influence of the Russian Federation in the conditions of the hybrid war unleashed by it. The main provisions of the Information Security Strategy, which defines the general principles of information security, are also considered. The strategies of the state on counteraction to harmful information influence are analyzed. The Doctrine of Information Security of Ukraine is considered, which clarifies the basics of the state information policy in the direction of counteracting the destructive information influence of the Russian Federation in the conditions of the hybrid war unleashed by it. The main provisions of the Information Security Strategy, which defines the general principles of information security, are also considered.


2013 ◽  
Vol 4 (1) ◽  
pp. 399-411 ◽  
Author(s):  
Krzysztof LIDERMAN ◽  
Andrzej MALIK

W artykule została przedstawiona problematyka polityki informacyjnej, przede wszystkim w odniesieniu do polityki informacyjnej resortu Obrony Narodowej, ograniczonej specyficznie do treści zamieszczanych w Internecie. Wskazano na możliwości osiągania różnych celów propagandowych poprzez umiejętne manipulowanie atrybutami informacji (rozdz. 2 i 3) oraz na możliwości wykorzystania Internetu w zakresie kształtowania świadomości jego użytkowników (rozdz. 4).


Author(s):  
Sergei Morozov

Introduction. The article represents the author’s interpretation of the actor composition of implementing information policy in modern Russia. Special attention is paid to the analysis of the main conditions of interaction between state and non-state structures of the Russian Federation in the process of determining priorities and strategies for ensuring information security in Russia. The problem of this research is actualized by increasing dependence of the mass communication domestic system on modern global geopolitical threats and foreign policy challenges. Russia and Russian society need a set of effective tools and methods to ensure the security and stability of the mass communication system. Methodology and methods. The main methodology of this study is the principles of the communicative approach (N. Wiener, C. Deutsch). Besides, the ideas about the technological core of political communication find their scientific and practical application (S.V. Volodenkov, M. Castells, S.V. Schwarzenberg). The analysis of the combination of public political communication and the processes of administrative-state management is based on the conclusions, which are contained in the articles of G. Lassuela and O.F. Shabrov. The empirical basis of the research is the public opinion polls of “Levada Center”. Analysis. The modern world is increasingly differentiated by the degree of information richness: the more the country is informationally open, the faster the production of new ideas, their inclusion in political decisions. The modern process of political communication has shifted to greater interactivity. Information policy, political regulation of the mass communication system becomes the leading sphere of management activities of state and non-state structures. Discussion. The indicative model development of politicalcommunicative interaction of information policy actors in the Russian Federation is hampered by a number of problems. Some of them are associated with established practices of political administration by state institutions of information processes. Other problems come from the unwillingness of civil structures to carry out the functions of public political management in the field of information security. The result is a decline in public confidence in political information and the Russian media. Results. The author proposes the main forms of coordinated interaction of state and non-state actors in the field of information regulation, ensuring the information security of the Russian Federation. The researcher substantiates the idea of the relationship of the mass communication system development with the formation of information and communication competencies of the Russian Federation population.


Author(s):  
Oleksandr Malashko ◽  
◽  
Serhii Yesimov ◽  

In the article, in the theoretical and applied aspect, the content of state activities to ensure information security is considered. The analysis of the regulatory and legal framework of the information security system of Ukraine, the structure of public authorities involved in this activity in the context of the state information policy is carried out. On the basis of the Doctrine of Information Security of Ukraine, considered the main aspects of the activities of the Verkhovna Rada of Ukraine, the President of Ukraine, the Cabinet of Ministers of Ukraine, the Ministry of Digital Transformation of Ukraine, the Security Service of Ukraine, the State Special Service for Special Communications and Information Protection of Ukraine and other central executive bodies for the development and improvement of regulatory-legal base and practical implementation of measures aimed at ensuring information security. It is noted that in order to ensure the effective functioning of the information security system of Ukraine, it is necessary to increase the efficiency of the work of structural units for the protection of information in public authorities, organizations and enterprises, which will lead to the optimization of the work of departmental information security systems and increase the efficiency of the functioning of the information security system of Ukraine.


Sign in / Sign up

Export Citation Format

Share Document