The Legal Mechanisms for Information Security in the context of Digitalization

Publish Year: 1401
نوع سند: مقاله ژورنالی
زبان: English
View: 117

This Paper With 34 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_JITM-14-7_002

تاریخ نمایه سازی: 29 شهریور 1401

Abstract:

As a result of the introduction of digital technologies in all spheres of society, various latest technologically conditioned risks and threats have become various. It requires the formation and implementation of a legal mechanism for further development and operation of the system ensuring information security, taking into account the effects of digitalization and transformation of society. The purpose of this study is development of scientifically substantiated proposals and recommendations for implementation legal mechanisms for information security in the context of digitalization. The relevance of this study is due to the needlegal regulation of relations in the information sphere, formation of a system of protection and counteraction to cybercrime. To achieve the goal of the study, methodological principles and approaches of legal science were used. The results of the analysis showed that the most significant mutual influence is demonstrated by a group of indicators of the state's institutional capacity and a group of indicators of the digital capacity of the national economy and cybersecurity. This study substantiates the main directions of accelerating the optimization of the institutional system of cybersecurity in Ukraine, which provides for two key areas: legal and organizational. The legal mechanisms include further improvement and harmonization of the regulatory framework, the formation of relevant legal norms, state policy in the field of information security. The organizational measures are aimed at improving the efficiency of responsible institutional structures - the subjects of cybersecurity - by increasing their capabilities, eliminating duplication in the exercise of their powers, taking into account the best practices of international and European experience. The core of the integrated information security system is the National Cyber Security Coordination Center.

Keywords:

Legal mechanisms , Informational security , Cybersecurity , Digitization , Institutional system for cybersecurity

Authors

Bondarenko

Department of Journalism, National Aviation University, Kyiv, Ukraine.

Makeieva

Department of Theory and History of State and Law, National Aviation University, Kyiv, Ukraine.

Usachenko

Department of Public Administration, Interregional Academy of Personnel Management, Kyiv, Ukraine.

Veklych

Department of Theory of State and Law and Constitutional Law, Interregional Academy of Personnel Management, Kyiv, Ukraine.

Arifkhodzhaieva

Educational-Scientific Institute of Law named after Volodymyr the Great, Interregional Academy of Personnel Management, Kyiv, Ukraine.

Lernyk

Department of Economics and Business Administration, Interregional Academi of Personnel Management, Kyiv, Ukraine.

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Anderson, R., Moore, T. (۲۰۰۶). Economics of information security. Science, ۳۱۴ (۵۷۹۹), ۶۱۰-۶۱۳ ...
  • Babenko, V. (۲۰۲۰). Enterprise Innovation Management in Industry ۴.۰: Modeling ...
  • Bondarenko, S., Halachenko, O., Shmorgun, L., Volokhova, I., Khomutenko, A. ...
  • Bondarenko, S., Tkachuk, H., Klochan, I., Mokhnenko, A., Liganenko, I., ...
  • Digital Logistics in Flow Management in Tourism [مقاله ژورنالی]
  • Brožova, H., Šup, L., Rydval, J., Sadok, M., & Bednar, ...
  • D'elia, D. (۲۰۱۸).Industrial policy: the holy grail of French cybersecurity strategy? ...
  • Dincelli, E. (۲۰۱۸). The role of national culture in shaping ...
  • Global Cybersecurity Index (GCI, ۲۰۲۰). International Telecommunication Union : website. ...
  • Hrabovskyi, Y., Babenko, V., Al’boschiy, O., Gerasimenko, V. (۲۰۲۰). Development ...
  • Jazri H., Zakaria O. & Chikohora E. (۲۰۱۸). Measuring cybersecurity ...
  • Kirilenko, V. P., & Alexeyev, G. V. (۲۰۱۸). Political technologies ...
  • Krasnobaev, V., Kuznetsov, A., Babenko, V., Denysenko, M., Zub, M., ...
  • Li, J., Shen, S., Sun, X. & Xing, X. (۲۰۲۱). Identification and classification ...
  • Marhasova V., Kovalenko Yu., Bereslavska O., Muravskyi O., Fedyshyn M., ...
  • On approval of the Regulations on the definition of critical ...
  • On the basic principles of cybersecurity in Ukraine: the Law ...
  • Sagan, O., Yakovleva, S., Anisimova, E., Balokha, A., & Yeremenko, ...
  • Singh, A. N., & Gupta, M. P. (۲۰۱۹). Information Security ...
  • Some issues of critical information infrastructure [Deiaki pytannia shchodo obiektiv ...
  • Some issues of ensuring the functioning of the system for ...
  • State Special Communications Service of Ukraine (SSSCIP, ۲۰۲۱). SSSCIP : ...
  • THE NETWORK READINESS INDEX ۲۰۲۰ Accelerating Digital Transformation in a ...
  • Topa, I., & Karyda, M. (۲۰۱۹). From theory to practice: ...
  • Zavhorodnii, A., Ohiienko, M., Biletska, Y., Bondarenko, S., Duiunova, T. ...
  • Yarovenko, H. (۲۰۲۰). Evaluating the threat to national information security. ...
  • Yunis M.M. & Koong K.S. (۲۰۱۵). A conceptual model for ...
  • نمایش کامل مراجع