scholarly journals Information Security in E-Government: Legal Aspects

Author(s):  
Viacheslav Politanskyi ◽  
Dmytro Lukianov ◽  
Hanna Ponomarova ◽  
Oleh Gyliaka

The article examines the characteristics of the functioning of information security in the e-government system, a phenomenon that is only possible based on the development of the information security infrastructure. The authors analyze information security as a key element of the concept of e-government, as well as various interpretations and ways of explaining the concept of information security. The research team's approach to the definition of the concept of information security is formed from the deep understanding of this concept, in terms of general theoretical analysis. Topics, objects, functions, types, principles, forms, levels of provision and structural elements of information security are studied. It is concluded that the organization of modern computer security of the State is undoubtedly a complex, systemic and multilevel phenomenon, whose state, dynamics, and perspectives are directly influenced by many external and internal factors, the most important being the political situation. In the world the presence of possible external and internal threats; state and level of development of information and communication of the country and internal political situation, among other aspects.

2021 ◽  
pp. 60-66
Author(s):  
B. LEONOV

The article highlights the theoretical and legal aspects of information terrorism. The classification of types of information terrorism in the information space is given. The analysis of regulatory acts of Ukraine in the field of information security is provided. The definition of information terrorism is offered.


2019 ◽  
Vol 24 (1) ◽  
pp. 24-38 ◽  
Author(s):  
Davide Aloini ◽  
Valentina Lazzarotti ◽  
Luisa Pellegrini ◽  
Pierluigi Zerbino

Purpose The role of information and communication technologies (ICTs) and digital platforms in enabling connectivity and collaboration among actors is neglected when dealing with outbound open innovation (OI). Moreover, the outbound OI process is not currently defined in a univocal way. Thus, this paper aims to outline the outbound OI phases and to explore role and capabilities of ICTs in supporting it. Design/methodology/approach Through a literature review approach, the authors specified the outbound OI process. Hence, the authors leveraged the similarities between the knowledge management process phases and the outbound OI phases for developing a conceptual framework that could match the outbound OI phases with acknowledged categories of ICT tools. Findings Through a process-view, the authors outlined outbound OI as a three-phase process. The authors developed a matrix-shaped framework in which the columns represent the three outbound OI process phases, while the rows are three ICT categories that could be suitable for supporting the outbound OI process. Practical implications The framework is designed to guide a deep understanding of how ICTs could support specific phases of the outbound OI process. In so doing, it could be useful for software developers interested in the preliminary design of an ICT platform for outbound OI. Originality/value The conceptual framework proposal as follows: specifies a detailed, process-oriented definition of the outbound OI; allows to identify the main ICT categories supporting the phases of the outbound OI process; and provides guidance for further exploration about the role of ICT in outbound OI.


Author(s):  
Bart Wauters

Abstract In this article, my objective is to provide an understanding of Isidore of Seville’s enormously influential definition of ius gentium in its own right. Recent studies have primarily focused on the legal aspects of Isidore’s conception of ius gentium. However, while Isidore as a man of learning was familiar with the legal categories he used, it is by no means certain that his understanding of legal concepts would match that of a contemporary jurist. Isidore was a theologian, and there are strong indications that he was more than a mere transmitter of classical knowledge. In this article, I show that he was an original thinker whose conception of ius gentium contained several innovative features that could not be fully grasped without a deep understanding of his theological ideas based on Augustine and Gregory the Great.


2010 ◽  
Vol 52 ◽  
pp. 38-54
Author(s):  
Rimvydas Laužikas

XX amžiuje prasidėjusi informacinės ir komunikacinės paradigmų plėtra ir besiformuojanti tinklaveikos visuomenė neišvengiamai turi įtakos įvairių veiklos sričių, taip pat paveldo sampratai, paveldosaugos, paveldotvarkos ir paveldo informacijos bei komunikacijos procesams. Šio straipsnio objektas – informacinės ir komunikacinės paradigmų raiška paveldo erdvėje. Straipsnio tikslas – suformuluoti paveldo informacijos ir komunikacijos sampratą, parodant sąsajas su komunikacijos ir informacijos mokslų teorijomis bei pademonstruojant informacinės paradigmos taikymo paveldo tyrimuose galimybes. Straipsnyje pateikiami teoriniai svarstymai iliustruojami konkretaus paveldo objekto – Dubingių piliavietės archeologinių tyrimų pavyzdžiais.Straipsnyje pristatomo tyrimo metu nustatyta, kad paveldo informacijos ir komunikacijos požiūriu pagrįstuose tyrimuose galima tarpdiscipliniškai pritaikyti svarbiausias informacijos ir komunikacijos mokslų teorijas ir metodus. Jų taikymas paveldo erdvėje gali būti kreipiamas dviem lygiavertėmis tyrimų kryptimis: tyrimuose akcentuojant išskirtinius paveldo objektus ir artefaktus bei tyrimuose orientuojantis į masinės medžiagos pažinimą. Abi tyrimų kryptys leidžia kiekybiškai įvertinti paveldo objektus, nustatant paveldo kompleksų ir jų dalių santykį, lyginant paveldo objektus ir kompleksus, siekiant identifikuoti kompleksą sukūrusių visuomenių ypatumus.Pagrindiniai žodžiai: Paveldas, paveldo informacija ir komunikacija, informacijos teorija, komunikacijos teorija, komunikacijos ir informacijos mokslai, Dubingiai, archeologija, entropija.Uniqueness and Entropy in the Information and Communication on Cultural HeritageRimvydas Laužikas SummaryThe technologies that have been developing in the 20th–21st century gradually permeate all fields of human life and activities. These technologies open new opportunities for communication, management, information processing as well as for the development of new, based on the information and communication paradigms research methods, models of practical activities, and interdisciplinary research. In this context, it is promising to use the basic theories of communication and information science (McLuhan’s, Shannon’s, Lotman’s, Prigogine’s) and the definition of the communication and information on cultural heritage.The purpose of the article is to formulate the concept of information and communication regarding cultural heritage, to show links between heritage and information and communication science theories and the examples of using the information paradigm for heritage studies. The theoretical considerations are illustrated by examples from a particular heritage site – the Dubingiai (Moletai reg., Lithuania) castle site archaeological excavations.The concept of information and communication on cultural heritage is based on the definition of cultural heritage. If “cultural heritage – the entire corpus of material signs – either artistic or symbolic – handed on by the past to each culture…” (HEREIN…., 2009), then a single heritage object should be regarded as a sign (a minimum, indivisible, atomic information transmission unit) and the heritage complex as a text (medium, message). The signs and texts point to mental ideas and are part of a system applied by members of specific (past) culture for intercommunication. If we accept this definition, then heritage research means the decoding, i.e. “reading”the primary (archaeological complexes from past cultures) texts and the encoding, i.e. creating a secondary (scientifically for scientists) and tertiary (for general public) text in contemporary culture. Research of cultural heritage is the foundation for the further communicative use of the cultural heritage in our times (as museum exhibits, cultural monuments, etc.).This position allows customizing the quantitative parameters of information theory to the heritage research and extending the “toolbox” of heritage quantitative analysis. In this approach, a heritage complex as a text is an evolved, open (for external influence) and dissipative system. Such systems have all features of evolving systems determined by Ilya Prigogine (Prigogine, 2006): they evolve; their evolution is based on an objective arrow of time which ensures irreversibility of processes; the variability of system components, going on for a long time, causes changes in the whole system; the evolution of a system is a process that can be forecasted only in part; sometimes an evolving system experiences disturbances that change it essentially (system mutations); both systems evolve at a different speed; two systems the evolution of which started in different points of space and time, more and more recede from each other; two systems are not inter-integrating.In this way, we find two approaches to “reading the past”: a research of exclusive (unique) artifacts and research of mass artifacts. Both approaches say that unique (or mass) artifacts are markers of social structure, of trading connections, of urbanization, of cultural influences, etc. However, to use this method, we need statistically significant samples, the methodology of triangulation by several benchmark examples, and a relative scale of references. From the first point of view, perspective methods of “reading” the cultural heritage information are the content analysis and summaries of a complex information. In archaeology, it is the coefficient of graves with findings, the average number of unique finds in a grave, the average number of semantically valuable finds, the complex (text) density index, the complex readability index and mapping the network of finds on the basis of binary oppositions theory. From the second point of view, promising methods are information entropy modeling and calculation. The main problem of calculating entropy for heritage complexes is that the original text (the primary state of complex) is only hypothetical; it cannotbe reconstructed and it is problematical to record the entropy change. In this context, a productive way is the visualization and relative calculation of the general object-level entropy in the three-dimensional space-time model (X and Y as the geographical coordinates of archaeological object and Z as the chronological parameter). Also, the entropy model can be calibrated by the heterogeneity of a cultural space (differences in the cultural dependence of creators (authors) and “readers” (researchers) of the archaeological complex as a text). When the creator and the “reader” belong to the same culture (the same macrosystem, the same cluster), entropy variation during the same period of time is less than when the creator and the “reader” come from related or different cultures. Another promising direction of research is calculation of entropy for specific complexes of heritage. By this method, we can calculate the entropy of an individual object (e.g. finding), of the whole heritage complex or a subcomplex (e.g. grave) and a complex (e.g. necropolis) relationship. The entropy is calculated using the entropy formula (Голдман, 1957). The resulting entropy is directly (inversely) proportional to the possibilities of the investigator’s ability to understand (“read”) the complex as a text.


Author(s):  
Hemamali Tennakoon

Information security and privacy are multi-faceted concepts, and earlier definitions of information security and privacy seem inadequate in the context of emerging technologies such as social media. Hence, this chapter presents an analysis of the concept of information security followed by a discussion of computer security, information security, network security, personal privacy, informational privacy, etc. Then the discussion narrows down to information security and privacy on Social Networking Sites (SNS) followed by an analysis of the consequences of information security and privacy breaches from individualistic and organizational perspectives. The lack of understanding of the complex nature of security and privacy issues are preventing businesses from gaining the full economic benefit, especially on SNS. Therefore, some solutions and recommendations are suggested towards the end of the chapter, including the need for a common legal framework. Finally, the chapter ends with suggestions for future research.


Author(s):  
Z. A. Asadova

The article discusses the history of the creation and development of the overall concept of information security, the current state of the information security, as well as the appropriate legal and regulatory framework in the countries of Central Asia on the example of the Republic of Kazakhstan. Introductory part of the article analyzes and provides a brief overview of the development of information and communication technologies. Particular attention is given to information security concepts in the framework of international valuation standards. The author investigates and lists the main sources of global information security threats, as well as explaining the history of the creation of a geopolitical term - Central Asia. In the main part of the article on the example of Kazakhstan one of the leading Central Asian countries, highlights issues of formation and development of the concept of information security, provides a brief overview of the history of development of information and communication technologies in the country. In this part the author conducts a detailed analysis of the legislation and the concept of the state with respect to the issue of information security, in the investigation highlights the major key issues of information security in the Republic of Kazakhstan. It also analyzes the development strategy of the Republic of Kazakhstan till 2030 (the "Kazakhstan-2030" Strategy), provides a brief overview of the state of laws and programs in the field of information security in the Republic of Kazakhstan. In conclusion, the author comes to the conclusion that today Kazakhstan is just beginning to form their own information security protection mechanisms and leads appropriate recommendations to achieve the objectives of the state.


Author(s):  
Andrew PRAVDYUK

The article considers the priorities of improving information security of Ukraine on the basis of analysis of internal and external factors, European tendencies and the current situation in the country. It is grounded that information security is one of the key places in the system of maintenance of vital interests of all without exception of societies. This is primarily due to the urgent need to create a well -developed information environment for society. But precisely because of the nformation environment, threats to national security are most often carried out in various spheres of activity of the individual, society and the state. The problem of information security of Ukraine and protection of the national information space from negative propaganda-manipulative information-psychological influences is investigated. The theoretical approaches to the definition of the essence of the concept of information security are analyzed; The types of real and potential information threats, principles of information security of Ukraine, which are the starting points of the formation and functioning of the information security system as a system-forming factor of all components of national security, norms and rules of conduct of citizens, state and public institutes in this sphere, are thoroughly investigated. The following topical contemporary phenomena such as cybersecurity and cyberterrorism have been researched.


2015 ◽  
pp. 1868-1896
Author(s):  
Hemamali Tennakoon

Information security and privacy are multi-faceted concepts, and earlier definitions of information security and privacy seem inadequate in the context of emerging technologies such as social media. Hence, this chapter presents an analysis of the concept of information security followed by a discussion of computer security, information security, network security, personal privacy, informational privacy, etc. Then the discussion narrows down to information security and privacy on Social Networking Sites (SNS) followed by an analysis of the consequences of information security and privacy breaches from individualistic and organizational perspectives. The lack of understanding of the complex nature of security and privacy issues are preventing businesses from gaining the full economic benefit, especially on SNS. Therefore, some solutions and recommendations are suggested towards the end of the chapter, including the need for a common legal framework. Finally, the chapter ends with suggestions for future research.


Author(s):  
Alina Hlushko ◽  
Alina Yanko

The problem of increasing the level of information security of the national economy is actualized in the article. Scientific approaches to the concept of "information security of the national economy" are systematized. The dual impact of digitization on the emergence of opportunities and threats to the functioning of the national economy is substantiated, which necessitates the development of tools to improve the level of reliability of economic information. The state of information security in modern computer systems of economic data processing is analyzed; requirements and directions of development of highly reliable computer systems for processing of economic data are substantiated. New scientific and scientific and technical achievements in the field of developing an optimal data backup in the economic sphere were obtained with the use of the non-positioned numerical system in residual classes, which improves the security and reliability of information processing.


2020 ◽  
Vol 8 (2) ◽  
pp. 36-40
Author(s):  
Agamehti Ismailov ◽  
Alexey Kononov

The article describes the challenges and threats faced by the Russian Federation in the 21st century. The concept of "information security" is given, which has been developed in the works of scientific works of many scientists. It is suggested that the information security system should be formed taking into account the new balance of forces on the world stage, geostrategic changes, rational costs and efficient use of the country's economic opportunities.


Sign in / Sign up

Export Citation Format

Share Document