Information Security and Means of Its Legal Support

Evgen Kharytonov, Olena Kharytonova, Yuliia Tolmachevska, Bondan Fasii, Maxym Tkalych

Resumen


The article is devoted to the consideration of the problem of legal regulation of relations on the provision of information security in the world. The author also raises questions of informational propaganda. The article introduces the author's concept of information hygiene. As a result of the research carried out, the author came to the conclusion that it is necessary to introduce legal regulation of information relations both at the international and national levels.

Palabras clave


security, information security, IT sphere, legal regulation, information hygiene, civil society, legal norm.

Texto completo:

PDF

Referencias


Belogorskiy, N. (2016). Silicon Mountains and Valleys. New country time, № 48, 56-58.

Bilenchuk P.D., Gvozdetskiy V.D., Slivka S.S. (1999). Philosophy of Law. Kiyv: AtIka.

Cai, Z., He, Z., Guan, X., & Li, Y. (2018). Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks. IEEE Transactions on Dependable and Secure Computing, 15(4), 577-590. Retrieved February 01, 2019, from https://ieeexplore.ieee.org/abstract/document/7576667.

Demonstration of power. Oleg Derevianko about the key goals of the latest cyber attack. (n.d.). Retrieved January 12, 2019 from http://vlasti.net/news/263539

E. Macarevich, (2017) Top 10 digital threats of the XXI century. Focus, № 27, 20-23.

Endsley, M. R. (2018). Combating Information Attacks in the Age of the Internet: New Challenges for Cognitive Engineering. PubMed, 60(8), 1081-1094. Retrieved January 12, 2019, from https://www.ncbi.nlm.nih.gov/pubmed/30376429.

Espionage for a new era. (2015). Ukrainian Week, № 31, 34-36.

Everything crashes in a relatively short period of time. Interview with IT expert Igor Novikov. (2017, June 15). Kraina, 20.

God is everywhere. A physicist from the United States put forward the theory that the universe has consciousness. (n.d.). Retrieved February 25, 2019, from http://nv.ua/techno/science/bog-povsjudu-amerikanskij-fizik-vydvinul-teoriju-o-tom-chto-vselennaja-obladaet-soznaniem-1546675.html

Gor, А. Vkontakte has been banned, threats have remained: how Ukrainians are deceived in the network (n.d.). Retrieved January 8, 2019 from https://apostrophe.ua/ua/article/society/2017-06-01/vkontakte-zapretili-ugrozyi-ostalis-kak-ukraintsev-obmanyivayut-i-verbuyut-v-seti/12599

Investigation of cyber attack. Police "disturbed" the company M.E.Doc. (n.d.). Retrieved December 15, 2018 from http://glavnoe.ua/news/n312705-rassledovanie_kiberataki._policija_potrevozhila_kompaniju_m.e.doc_

Kazanskyi, D. (2017). Non-virtual effect. Ukrainian Week, 23, 8-16.

Koen, D. L., Arato, E. (2003). Civil society and political theory. Moscow: Ves Mir.

Kormich B.A. (2011). .Information law. Kharkіv: BURUN i K.

Lopaiev Yu., Golub A., (2017) Another front, Ukrainian Week, № 3, 20-23.

Pasko, I.T., Pasko, Ya.I. (1999). Civil society and national idea. (Ukraine against the backdrop of European processes, comparative essays). Donetsk: TsGO NAN Ukrayni.

Pilipchuk, V.G., Dzoban, O.P. (2014). Information Society: Philosophical and Legal Dimension. Uzhgorod: TOV «IVA».

Pocheptsov, H. (2017, March 9). Interview Mariya Boyko. Vgolos. Retrieved January 1, 2019, from http://www.ji-magazine.lviv.ua/2017/Pocheptsov_Vijna_4_pokolinnya.htm Over 200,000 computers in 150 countries were hit by mass hacking attacks. (n.d.). Retrieved December 21, 2018, from https://www.rbc.ua/ukr/news/massovyh-hakerskih-atak-postradali-200-tysyach-1494761345.html

Popova. T.V., Lipkan, V.A. (2016). Strategic Communications. Kiyv: FOP O.S. Lipkan.

Pylypchuk, V., & Tsymbaliuk, V. (2016). GtHistorical and legal problems of formation and development of information sphere and information law in Ukraine (end of XX - beginning of XXI century). Bulletin of the National Academy of Legal Sciences of Ukraine, 4, 39-42.

Safa, N. S., Sookhaka, M., Solms, R., Furnell, S., Ghani, N.A., Herawan, T. (2015). Information security conscious care behaviour formation in organizations. Computers & Security, 53, 65-48. Retrieved January 15, 2019, from https://www.sciencedirect.com/science/article/pii/S0167404815000863.

Shmidt E., Rozenberg Dzh. (2016). How Google works. Kiyv: Vidavnicha grupa KM-BUKS.

The doctrine of the information security of Ukraine is only a declaration - experts (n.d.). Retrieved December 15, 2018 from https://www.radiosvoboda.org/a/28336852.html

The G7 countries will agree on joint measures to combat cyberattacks. (n.d.). Retrieved January 10, 2019 from http://www.eurointegration.com.ua/news/2017/05/13/7065662/

Zubok, M. (2015). Information security in entrepreneurial activity. Kiyv: HNOZIS.


Enlaces refback

  • No hay ningún enlace refback.


Revista Amazonia Investiga
Contáctenos: amazoniainvestiga@gmail.com
Esta revista científica y sus artículos están registrados bajo la licencia https://creativecommons.org/licenses/by/4.0/