Information Security and Means of Its Legal Support

Autores

  • Evgen Kharytonov National University «Odesa Law Academy» Ukraine, Odesa.
  • Olena Kharytonova National University «Odesa Law Academy» Ukraine, Odesa
  • Yuliia Tolmachevska (National University «Odesa Law Academy») Ukraine, Odesa
  • Bondan Fasii National University «Odesa Law Academy». Ukraine, Odesa
  • Maxym Tkalych Zaporizhzhia National University (Ukraine, Zaporizhzhia)

Palavras-chave:

segurança, segurança da informação, esfera de TI, regulação legal, higiene da informação, sociedade civil, norma jurídica

Resumo

O artigo é dedicado à consideração do problema da regulação legal das relações sobre a prestação de segurança da informação no mundo. O autor também levanta questões de propaganda informacional. O artigo introduz o conceito de higiene da informação do autor. Como resultado da pesquisa realizada, o autor chegou à conclusão de que é necessário introduzir uma regulação legal das relações de informação tanto no nível internacional quanto nacional.

Downloads

Não há dados estatísticos.

Biografia do Autor

Evgen Kharytonov, National University «Odesa Law Academy» Ukraine, Odesa.

Doctor of Law Science - Professor of Civil Law Department National University «Odesa Law Academy»- Corresponding Member National Academy of Law Sciences of Ukraine - Honored Science and Technology Worker of Ukraine- Head of Civil Law Department National University «Odesa Law Academy» Ukraine, Odesa.

Olena Kharytonova, National University «Odesa Law Academy» Ukraine, Odesa

Doctor of Law Science - Professor of Intellectual Property and Corporate Law Department National University «Odesa Law Academy» - Corresponding Member National Academy of Law Sciences of Ukraine- Honored Science and Technology Worker of Ukraine- Head of Intellectual Property and Corporate Law Department National University «Odesa Law Academy» Ukraine, Odesa

Yuliia Tolmachevska, (National University «Odesa Law Academy») Ukraine, Odesa

Master of Law (National University «Odesa Law Academy») Ukraine, Odesa, Academicheskaya

Bondan Fasii, National University «Odesa Law Academy». Ukraine, Odesa

PhD. Аssistant professor of Civil Law Department National University «Odesa Law Academy». Ukraine, Odesa

Maxym Tkalych, Zaporizhzhia National University (Ukraine, Zaporizhzhia)

PhD. Аssistant professor of Civil Law Department Zaporizhzhia National University (Ukraine, Zaporizhzhia)

Referências

Belogorskiy, N. (2016). Silicon Mountains and Valleys. New country time, ? 48, 56-58.

Bilenchuk P.D., Gvozdetskiy V.D., Slivka S.S. (1999). Philosophy of Law. Kiyv: AtIka.

Cai, Z., He, Z., Guan, X., & Li, Y. (2018). Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks. IEEE Transactions on Dependable and Secure Computing, 15(4), 577-590. Retrieved February 01, 2019, from https://ieeexplore.ieee.org/abstract/document/7576667.

Demonstration of power. Oleg Derevianko about the key goals of the latest cyber attack. (n.d.). Retrieved January 12, 2019 from http://vlasti.net/news/263539

E. Macarevich, (2017) Top 10 digital threats of the XXI century. Focus, ? 27, 20-23.

Endsley, M. R. (2018). Combating Information Attacks in the Age of the Internet: New Challenges for Cognitive Engineering. PubMed, 60(8), 1081-1094. Retrieved January 12, 2019, from https://www.ncbi.nlm.nih.gov/pubmed/30376429.

Espionage for a new era. (2015). Ukrainian Week, ? 31, 34-36.

Everything crashes in a relatively short period of time. Interview with IT expert Igor Novikov. (2017, June 15). Kraina, 20.

God is everywhere. A physicist from the United States put forward the theory that the universe has consciousness. (n.d.). Retrieved February 25, 2019, from http://nv.ua/techno/science/bog-povsjudu-amerikanskij-fizik-vydvinul-teoriju-o-tom-chto-vselennaja-obladaet-soznaniem-1546675.html

Gor, ?. Vkontakte has been banned, threats have remained: how Ukrainians are deceived in the network (n.d.). Retrieved January 8, 2019 from https://apostrophe.ua/ua/article/society/2017-06-01/vkontakte-zapretili-ugrozyi-ostalis-kak-ukraintsev-obmanyivayut-i-verbuyut-v-seti/12599

Investigation of cyber attack. Police "disturbed" the company M.E.Doc. (n.d.). Retrieved December 15, 2018 from http://glavnoe.ua/news/n312705-rassledovanie_kiberataki._policija_potrevozhila_kompaniju_m.e.doc_

Kazanskyi, D. (2017). Non-virtual effect. Ukrainian Week, 23, 8-16.

Koen, D. L., Arato, E. (2003). Civil society and political theory. Moscow: Ves Mir.

Kormich B.A. (2011). .Information law. Khark?v: BURUN i K.

Lopaiev Yu., Golub A., (2017) Another front, Ukrainian Week, ? 3, 20-23.

Pasko, I.T., Pasko, Ya.I. (1999). Civil society and national idea. (Ukraine against the backdrop of European processes, comparative essays). Donetsk: TsGO NAN Ukrayni.

Pilipchuk, V.G., Dzoban, O.P. (2014). Information Society: Philosophical and Legal Dimension. Uzhgorod: TOV «IVA».

Pocheptsov, H. (2017, March 9). Interview Mariya Boyko. Vgolos. Retrieved January 1, 2019, from http://www.ji-magazine.lviv.ua/2017/Pocheptsov_Vijna_4_pokolinnya.htm Over 200,000 computers in 150 countries were hit by mass hacking attacks. (n.d.). Retrieved December 21, 2018, from https://www.rbc.ua/ukr/news/massovyh-hakerskih-atak-postradali-200-tysyach-1494761345.html

Popova. T.V., Lipkan, V.A. (2016). Strategic Communications. Kiyv: FOP O.S. Lipkan.

Pylypchuk, V., & Tsymbaliuk, V. (2016). GtHistorical and legal problems of formation and development of information sphere and information law in Ukraine (end of XX - beginning of XXI century). Bulletin of the National Academy of Legal Sciences of Ukraine, 4, 39-42.

Safa, N. S., Sookhaka, M., Solms, R., Furnell, S., Ghani, N.A., Herawan, T. (2015). Information security conscious care behaviour formation in organizations. Computers & Security, 53, 65-48. Retrieved January 15, 2019, from https://www.sciencedirect.com/science/article/pii/S0167404815000863.

Shmidt E., Rozenberg Dzh. (2016). How Google works. Kiyv: Vidavnicha grupa KM-BUKS.
The doctrine of the information security of Ukraine is only a declaration - experts (n.d.). Retrieved December 15, 2018 from https://www.radiosvoboda.org/a/28336852.html

The G7 countries will agree on joint measures to combat cyberattacks. (n.d.). Retrieved January 10, 2019 from http://www.eurointegration.com.ua/news/2017/05/13/7065662/

Zubok, M. (2015). Information security in entrepreneurial activity. Kiyv: HNOZIS.

Downloads

Publicado

2019-04-29

Como Citar

Kharytonov, E., Kharytonova, O., Tolmachevska, Y., Fasii, B., & Tkalych, M. (2019). Information Security and Means of Its Legal Support. Amazonia Investiga, 8(19), 255–265. Recuperado de https://amazoniainvestiga.info/index.php/amazonia/article/view/227

Edição

Seção

Articles