Click here to download

Formation of axiological system of information security of the state: Ukrainian Experience
Journal Title: RIVISTA DI STUDI SULLA SOSTENIBILITA' 
Author/s: Taras Yu. Tkachuk, Leontii G. Chystokletov, Dmytro M.Pavlov, Valerii V. Shyshko, Leonid O. Ostapenko 
Year:  2020 Issue: 2 suppl. Language: English 
Pages:  14 Pg. 49-62 FullText PDF:  203 KB
DOI:  10.3280/RISS2020-002-S1005
(DOI is like a bar code for intellectual property: to have more infomation:  clicca qui   and here 


The relevance of the study is conditioned by the emergence of information risks and violations of information security, which relate, in particular, to the negative effects of certain information resources of a manipulative nature, intrusion into personal information space, cybercrime, and other violations of information hu-man rights. This state of affairs negatively affects the well-being of society. In this regard, it is advisable to develop criteria for the negative impact on information security and their legislative consolidation, which so far have not been defined not only in legislation, but also at the level of scientific discourse. This issue has be-come relevant primarily due to vulnerability of the current national security sys-tem. The paper is aimed at the formation and consideration of the axiological sys-tem of information security of Ukraine. The paper describes the main national goals in the information sphere; national values in the information sphere were identified considering the current condition of state formation in Ukraine. The practical significance of the study is determined by the fact that the developed system of interrelation of national values, interests, goals and achievements can be applied in combating the vulnerability of the existing system of national securi-ty.
Keywords: National interests, information risks, pluralism, interpersonal social connections, cybernetic

  1. Adygezalova G. E., Allalyev R. M., Kiseleva A. V. and Grigorieva N. A. (2018). Copyright violation and distribution of prohibited content on the internet: Analysis of legal arrangements in the legislation of the Russian Federation. Journal of Advanced Research in Law and Economics, 9(1): 6-14.
  2. Bondarenko S., Liliya B., Oksana K. and Inna G. (2019). Modelling instruments in risk management. International Journal of Civil Engineering and Technology, 10(1): 1561-1568.
  3. Common Criteria for Information Technology Security Evaluation (2019). -- Available from: https://www.commoncriteriaportal.org/.
  4. Dovhan O. D. and Tkachuk T. Yu. (2018). Legal support of information security of the state as a sub-branch of information law: Theoretical discourse. Information and Law, 2(25): 73-85.
  5. Draft Law No. 5732 “On Information Security of Ukraine” (2004). -- Available from: http://w1.c1.rada.gov.ua/pls/zweb2/webproc4_2?id=&pf3516=5732&skl=5.
  6. Fedotov A. M., Murzakhmetov A. N. and Dyusembaev A. E. (2018). Expansion of ideas and processes in social and biological communities. Eurasian Journal of Mathematical and Computer Applications, 6(4): 17-28.
  7. Goodby J., Buwalda P. and Trenin D. (2003). A strategy for stable peace: Toward a euroatlantic security community. Мoscow: Mezhdunarodnyye Otnosheniya.
  8. Hartley R. V. L. (1928). Transmission of information. Bell System Technical Journal, 7: 335-363.
  9. Hogwood B. and Gunn L. A. (2004). Policy analysis for the real world. Kyiv: Vydavnytstvo Solomii Pavlychko “Osnovy”.
  10. Horbulin V. P. (1995). In defence of national interests. Politics and Time, 2: 3-8.
  11. Horbulin V. P. and Kachynskyi A. B. (2009). Principles of national security of Ukraine. Кyiv: Intertekhnolohiia.
  12. Zhilavskaya I. V., Ivanova T. V., Gayazov A. S. and Vladimirova T. N. (2018). Media education and democracy. Espacios, 39(20): 1-11.
  13. Information Technology Security Evaluation Criteria (ITSEC): Preliminary Harmonised Criteria. Commission of the European Communities (1991). -- Available from: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/ITSicherheitskriterien/itsec-en_pdf.pdf?__blob=publicationFile&v=1.
  14. Khadzhyradieva S., Hrechko T. and Smalskys V. (2019). Institutionalisation of behavioural insights in public policy. Public Policy and Administration, 18(3): 95-113.
  15. Larin S. V. (2016). The essence and meaning of “national values” in the context of current research. Bulletin of the NAPA under the President of Ukraine, 2: 44-49.
  16. Lerche Ch. and Said A. (1979). Concepts of international politics in global perspective. New Jersey: Prentice-Hall.
  17. Manuilov E. M. and Kalynovskyi Yu. Yu. (2017). Axiological dimension of Ukrainian information security. The Bulletin of Yaroslav Mudryi National Law University, 3(34): 13-30.
  18. Marushchak А. (2008). Information security: Legal analysis. -- Available from: https://detector.media/infospace/article/38472/2008-05-20-informatsiina-bezpeka-pravovii-analiz/.
  19. Nesteriak Yu. V. (2013). International criteria of information security of the state: Theoretical and methodological analysis. Bulletin of the National Academy of Public Administration under the President of Ukraine, 3: 40-45.
  20. Nurbasari A., Lukiyanova M. N., Nguyen P. T., Shichiyakh R. A. and Shankar K. (2019). Role of social media in the successful implementation of business user data management. Opcion, 35(88): 2899-2921.
  21. Parakhonskyi B. O. (1993). National interests of Ukraine (spiritual and intellectual aspect). Kyiv: NISD.
  22. Romanenko Y. O. and Chaplay I. V. (2016). Marketing communication system within public administration mechanisms. Actual Problems of Economics, 178(4): 69-78.
  23. Rudenko M. N. (2019). Economic security of the region (Perm krai). Astra Salvensis, 7: 385-410.
  24. Security of Ukraine: How American Politicians See It (2017). -- Available from: https://mind.ua/publications/20179511-bezpeka-ukrayini-yakoyu-yiyi-bachat-amerikanski-politichni-diyachi.
  25. Shannon C. E. (1948). A mathematical theory of communication. Bell System Technical Journal, 27: 379-423.
  26. Stonier T. (1991). Towards a new theory of information. Journal of Information Science, 17: 257-263.
  27. They Said: A Global Perspective on Access to Assistive Technology (2020). -- Available from: https://scholarworks.wmich.edu/ojot/?utm_source=scholarworks.wmich.edu%2Fojot%2Fvol6%2Fiss3%2F2&utm_medium=PDF&utm_campaign=PDFCoverPages.
  28. United States Department of Defense (1985). The Trusted Computer System Evaluation Criteria, CSC-STD-001-83. -- Available from: https://csrc.nist.gov/csrc/media/publications/conference-paper/1998/10/08/proceedings-of-the-21st-nissc-1998/documents/early-cs-papers/dod85.pdf.
  29. Vasylieva O. I., Slukhai S. V., Khadzhyradieva S. K., Klochko A. A. and Pashkova A. G. (2020). Ukrainian civil service: implementation of the public administration reform strategy in Ukraine. Journal of Advanced Research in Law and Economics, 11(4): 1439-1445.
  30. Weber M. (1994). Selected works. Image of society. Мoscow: Yurist Publ.
  31. Yarger R. H. and Barber G. F. (1997). The U.S. army war college methodology for determining interests and levels of intensity. Carlisle: Army War College.
  32. Yereskova T. V., Mazuryk O. V., Aleksandrova O. S., Tymofieieva H. V. and Zavadskyi V. N. (2020). Uncertainty as a regular feature of modern Ukrainian society. Teorija in Praksa, 57(3): 928-946.

Taras Yu. Tkachuk, Leontii G. Chystokletov, Dmytro M.Pavlov, Valerii V. Shyshko, Leonid O. Ostapenko, in "RIVISTA DI STUDI SULLA SOSTENIBILITA'" 2 suppl./2020, pp. 49-62, DOI:10.3280/RISS2020-002-S1005

   

FrancoAngeli is a member of Publishers International Linking Association a not for profit orgasnization wich runs the CrossRef service, enabing links to and from online scholarly content