independence and on the information and
psychological security of the population of
Ukraine (Nevelska-Hordieieva & Nechytailo,
2022).
The Russian Federation's full-scale attack on
Ukraine has increased the urgency of protecting
the information security of the state and society
(Shopina, 2022, p. 134). The role of information
as a military-strategic resource is increasing and
has been compared to the role of military
equipment and weapons. Information, its security
refers to the defense potential of the country
(Toffler, 1993, p. 45). Information technology is
widely used for military purposes for the defense
of Ukraine and is in the protection of Ukraine
from armed aggression, as ammunition,
transport, weapons (Zalievska & Udrenas, 2022).
Manipulative influence on society has been used
to achieve certain political or economic
influences and outcomes. Russia's military
invasion of Ukraine was preceded by a public
information campaign, both within and outside of
Ukraine. In a full-scale war, such influences are
used for other purposes. The fake news technique
is one of the most popular; it is the distribution of
false information in social media, to mislead the
public. The use of these types of manipulative
techniques requires the state to constantly
monitor and respond (Nevelska-Hordieieva &
Nechytailo, 2022).
The state has a direct influence on the formation
of information awareness in society; it regulates,
at the legislative level, the flows of information
that circulate in society. It depends on its internal
policies.
For example, in China, because of restrictions
and controls on people's access to foreign sites
and other resources, officials have restricted
access to information contrary to their views. To
maintain social harmony and stability. This
information policy allows coverage of events in
Ukraine from a different perspective than the
Western media (Cheng & Bao, 2022) and shapes
public sentiment to support the aggressor state of
Russia.
In contrast to China, European countries direct
their information policy toward the formation of
a culture of information security and legal
consciousness. Thus, communication ties are
developing between Ukraine and Latvia,
covering different spheres of activity of the
states, their common historical ties, and common
tasks in overcoming the totalitarian Soviet past
(Krasnozhon, 2021). “The Russian attack was
widely condemned in the West, including by
almost all European governments, and was met
with military, humanitarian, and financial
support for the Ukrainian government, as well as
economic and social sanctions against Russia and
many of its elites” (Steffen & Patt, 2022).
Duan, Xu, Hu & Luo (2022) have concluded that
the weakest links in information security are
individuals in organizations, as direct users of the
organization's information resources, with access
to closed databases that they use in their daily
work. Pliekhova & Kostikova (2022) rightly
pointed out that the most critical and important
decisions must be made by humans, so the
protection mechanisms must be hidden from
users whose work is under control. All this forms
a culture of information security. Its development
will further lead to a secure organization.
Through surveys, scholars have found that
information security culture is influenced by
group cohesion, professional code, information
security awareness, and informal work practices
(Tejay & Mohammed, 2022). Therefore, the
information security culture of the state is the
information security culture of the individual and
society.
The European Union General Data Protection
Regulation requires that data be processed in a
lawful, fair, and transparent manner and that it be
protected from unauthorized and unlawful
processing and from accidental loss, destruction,
or damage (European Parliament and Council of
the European Union, 2016). This is due to the
large amount of electronic data, including
personal data, requiring confidentiality, integrity,
and availability of the generated data. And a
breach of personal databases can have dire
consequences for both the state and the citizen.
Therefore, states must investigate information
security vulnerabilities and be sure to conduct
research to strengthen information security
(van Daalen, 2022). With the rapid development
of information technology, states, organizations,
and people are becoming dependent on the use of
information systems, and the role of information
security is increasing. The negative
consequences of information security breaches
have included decreased consumer confidence,
impact on international and national politics
(Duan, Xu, Hu & Luo, 2022). In Ukraine,
programs are used to enable remote access to
various databases, signing documents, indicating
the rapid development of information
technology. security in these areas.
Cybersecurity, which provides information
security in cyberspace, in computer systems
against attacks or unauthorized access, occupies