The Legal Mechanisms for Information Security in the context of Digitalization

سال انتشار: 1401
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 116

فایل این مقاله در 34 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_JITM-14-7_002

تاریخ نمایه سازی: 29 شهریور 1401

چکیده مقاله:

As a result of the introduction of digital technologies in all spheres of society, various latest technologically conditioned risks and threats have become various. It requires the formation and implementation of a legal mechanism for further development and operation of the system ensuring information security, taking into account the effects of digitalization and transformation of society. The purpose of this study is development of scientifically substantiated proposals and recommendations for implementation legal mechanisms for information security in the context of digitalization. The relevance of this study is due to the needlegal regulation of relations in the information sphere, formation of a system of protection and counteraction to cybercrime. To achieve the goal of the study, methodological principles and approaches of legal science were used. The results of the analysis showed that the most significant mutual influence is demonstrated by a group of indicators of the state's institutional capacity and a group of indicators of the digital capacity of the national economy and cybersecurity. This study substantiates the main directions of accelerating the optimization of the institutional system of cybersecurity in Ukraine, which provides for two key areas: legal and organizational. The legal mechanisms include further improvement and harmonization of the regulatory framework, the formation of relevant legal norms, state policy in the field of information security. The organizational measures are aimed at improving the efficiency of responsible institutional structures - the subjects of cybersecurity - by increasing their capabilities, eliminating duplication in the exercise of their powers, taking into account the best practices of international and European experience. The core of the integrated information security system is the National Cyber Security Coordination Center.

کلیدواژه ها:

Legal mechanisms ، Informational security ، Cybersecurity ، Digitization ، Institutional system for cybersecurity

نویسندگان

Bondarenko

Department of Journalism, National Aviation University, Kyiv, Ukraine.

Makeieva

Department of Theory and History of State and Law, National Aviation University, Kyiv, Ukraine.

Usachenko

Department of Public Administration, Interregional Academy of Personnel Management, Kyiv, Ukraine.

Veklych

Department of Theory of State and Law and Constitutional Law, Interregional Academy of Personnel Management, Kyiv, Ukraine.

Arifkhodzhaieva

Educational-Scientific Institute of Law named after Volodymyr the Great, Interregional Academy of Personnel Management, Kyiv, Ukraine.

Lernyk

Department of Economics and Business Administration, Interregional Academi of Personnel Management, Kyiv, Ukraine.

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Anderson, R., Moore, T. (۲۰۰۶). Economics of information security. Science, ۳۱۴ (۵۷۹۹), ۶۱۰-۶۱۳ ...
  • Babenko, V. (۲۰۲۰). Enterprise Innovation Management in Industry ۴.۰: Modeling ...
  • Bondarenko, S., Halachenko, O., Shmorgun, L., Volokhova, I., Khomutenko, A. ...
  • Bondarenko, S., Tkachuk, H., Klochan, I., Mokhnenko, A., Liganenko, I., ...
  • Digital Logistics in Flow Management in Tourism [مقاله ژورنالی]
  • Brožova, H., Šup, L., Rydval, J., Sadok, M., & Bednar, ...
  • D'elia, D. (۲۰۱۸).Industrial policy: the holy grail of French cybersecurity strategy? ...
  • Dincelli, E. (۲۰۱۸). The role of national culture in shaping ...
  • Global Cybersecurity Index (GCI, ۲۰۲۰). International Telecommunication Union : website. ...
  • Hrabovskyi, Y., Babenko, V., Al’boschiy, O., Gerasimenko, V. (۲۰۲۰). Development ...
  • Jazri H., Zakaria O. & Chikohora E. (۲۰۱۸). Measuring cybersecurity ...
  • Kirilenko, V. P., & Alexeyev, G. V. (۲۰۱۸). Political technologies ...
  • Krasnobaev, V., Kuznetsov, A., Babenko, V., Denysenko, M., Zub, M., ...
  • Li, J., Shen, S., Sun, X. & Xing, X. (۲۰۲۱). Identification and classification ...
  • Marhasova V., Kovalenko Yu., Bereslavska O., Muravskyi O., Fedyshyn M., ...
  • On approval of the Regulations on the definition of critical ...
  • On the basic principles of cybersecurity in Ukraine: the Law ...
  • Sagan, O., Yakovleva, S., Anisimova, E., Balokha, A., & Yeremenko, ...
  • Singh, A. N., & Gupta, M. P. (۲۰۱۹). Information Security ...
  • Some issues of critical information infrastructure [Deiaki pytannia shchodo obiektiv ...
  • Some issues of ensuring the functioning of the system for ...
  • State Special Communications Service of Ukraine (SSSCIP, ۲۰۲۱). SSSCIP : ...
  • THE NETWORK READINESS INDEX ۲۰۲۰ Accelerating Digital Transformation in a ...
  • Topa, I., & Karyda, M. (۲۰۱۹). From theory to practice: ...
  • Zavhorodnii, A., Ohiienko, M., Biletska, Y., Bondarenko, S., Duiunova, T. ...
  • Yarovenko, H. (۲۰۲۰). Evaluating the threat to national information security. ...
  • Yunis M.M. & Koong K.S. (۲۰۱۵). A conceptual model for ...
  • نمایش کامل مراجع