Information Security and Means of Its Legal Support

  • Evgen Kharytonov National University «Odesa Law Academy» Ukraine, Odesa.
  • Olena Kharytonova National University «Odesa Law Academy» Ukraine, Odesa
  • Yuliia Tolmachevska (National University «Odesa Law Academy») Ukraine, Odesa
  • Bondan Fasii National University «Odesa Law Academy». Ukraine, Odesa
  • Maxym Tkalych Zaporizhzhia National University (Ukraine, Zaporizhzhia)
Keywords: security, information security, IT sphere, legal regulation, information hygiene, civil society, legal norm

Abstract

The article is devoted to the consideration of the problem of legal regulation of relations on the provision of information security in the world. The author also raises questions of informational propaganda. The article introduces the author's concept of information hygiene. As a result of the research carried out, the author came to the conclusion that it is necessary to introduce legal regulation of information relations both at the international and national levels.

Downloads

Download data is not yet available.

Author Biographies

Evgen Kharytonov, National University «Odesa Law Academy» Ukraine, Odesa.

Doctor of Law Science - Professor of Civil Law Department National University «Odesa Law Academy»- Corresponding Member National Academy of Law Sciences of Ukraine - Honored Science and Technology Worker of Ukraine- Head of Civil Law Department National University «Odesa Law Academy» Ukraine, Odesa.

Olena Kharytonova, National University «Odesa Law Academy» Ukraine, Odesa

Doctor of Law Science - Professor of Intellectual Property and Corporate Law Department National University «Odesa Law Academy» - Corresponding Member National Academy of Law Sciences of Ukraine- Honored Science and Technology Worker of Ukraine- Head of Intellectual Property and Corporate Law Department National University «Odesa Law Academy» Ukraine, Odesa

Yuliia Tolmachevska, (National University «Odesa Law Academy») Ukraine, Odesa

Master of Law (National University «Odesa Law Academy») Ukraine, Odesa, Academicheskaya

Bondan Fasii, National University «Odesa Law Academy». Ukraine, Odesa

PhD. Аssistant professor of Civil Law Department National University «Odesa Law Academy». Ukraine, Odesa

Maxym Tkalych, Zaporizhzhia National University (Ukraine, Zaporizhzhia)

PhD. Аssistant professor of Civil Law Department Zaporizhzhia National University (Ukraine, Zaporizhzhia)

References

Belogorskiy, N. (2016). Silicon Mountains and Valleys. New country time, № 48, 56-58.

Bilenchuk P.D., Gvozdetskiy V.D., Slivka S.S. (1999). Philosophy of Law. Kiyv: AtIka.

Cai, Z., He, Z., Guan, X., & Li, Y. (2018). Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks. IEEE Transactions on Dependable and Secure Computing, 15(4), 577-590. Retrieved February 01, 2019, from https://ieeexplore.ieee.org/abstract/document/7576667.

Demonstration of power. Oleg Derevianko about the key goals of the latest cyber attack. (n.d.). Retrieved January 12, 2019 from http://vlasti.net/news/263539

E. Macarevich, (2017) Top 10 digital threats of the XXI century. Focus, № 27, 20-23.

Endsley, M. R. (2018). Combating Information Attacks in the Age of the Internet: New Challenges for Cognitive Engineering. PubMed, 60(8), 1081-1094. Retrieved January 12, 2019, from https://www.ncbi.nlm.nih.gov/pubmed/30376429.

Espionage for a new era. (2015). Ukrainian Week, № 31, 34-36.

Everything crashes in a relatively short period of time. Interview with IT expert Igor Novikov. (2017, June 15). Kraina, 20.

God is everywhere. A physicist from the United States put forward the theory that the universe has consciousness. (n.d.). Retrieved February 25, 2019, from http://nv.ua/techno/science/bog-povsjudu-amerikanskij-fizik-vydvinul-teoriju-o-tom-chto-vselennaja-obladaet-soznaniem-1546675.html

Gor, А. Vkontakte has been banned, threats have remained: how Ukrainians are deceived in the network (n.d.). Retrieved January 8, 2019 from https://apostrophe.ua/ua/article/society/2017-06-01/vkontakte-zapretili-ugrozyi-ostalis-kak-ukraintsev-obmanyivayut-i-verbuyut-v-seti/12599

Investigation of cyber attack. Police "disturbed" the company M.E.Doc. (n.d.). Retrieved December 15, 2018 from http://glavnoe.ua/news/n312705-rassledovanie_kiberataki._policija_potrevozhila_kompaniju_m.e.doc_

Kazanskyi, D. (2017). Non-virtual effect. Ukrainian Week, 23, 8-16.

Koen, D. L., Arato, E. (2003). Civil society and political theory. Moscow: Ves Mir.

Kormich B.A. (2011). .Information law. Kharkіv: BURUN i K.

Lopaiev Yu., Golub A., (2017) Another front, Ukrainian Week, № 3, 20-23.

Pasko, I.T., Pasko, Ya.I. (1999). Civil society and national idea. (Ukraine against the backdrop of European processes, comparative essays). Donetsk: TsGO NAN Ukrayni.

Pilipchuk, V.G., Dzoban, O.P. (2014). Information Society: Philosophical and Legal Dimension. Uzhgorod: TOV «IVA».

Pocheptsov, H. (2017, March 9). Interview Mariya Boyko. Vgolos. Retrieved January 1, 2019, from http://www.ji-magazine.lviv.ua/2017/Pocheptsov_Vijna_4_pokolinnya.htm Over 200,000 computers in 150 countries were hit by mass hacking attacks. (n.d.). Retrieved December 21, 2018, from https://www.rbc.ua/ukr/news/massovyh-hakerskih-atak-postradali-200-tysyach-1494761345.html

Popova. T.V., Lipkan, V.A. (2016). Strategic Communications. Kiyv: FOP O.S. Lipkan.

Pylypchuk, V., & Tsymbaliuk, V. (2016). GtHistorical and legal problems of formation and development of information sphere and information law in Ukraine (end of XX - beginning of XXI century). Bulletin of the National Academy of Legal Sciences of Ukraine, 4, 39-42.

Safa, N. S., Sookhaka, M., Solms, R., Furnell, S., Ghani, N.A., Herawan, T. (2015). Information security conscious care behaviour formation in organizations. Computers & Security, 53, 65-48. Retrieved January 15, 2019, from https://www.sciencedirect.com/science/article/pii/S0167404815000863.

Shmidt E., Rozenberg Dzh. (2016). How Google works. Kiyv: Vidavnicha grupa KM-BUKS.
The doctrine of the information security of Ukraine is only a declaration - experts (n.d.). Retrieved December 15, 2018 from https://www.radiosvoboda.org/a/28336852.html

The G7 countries will agree on joint measures to combat cyberattacks. (n.d.). Retrieved January 10, 2019 from http://www.eurointegration.com.ua/news/2017/05/13/7065662/

Zubok, M. (2015). Information security in entrepreneurial activity. Kiyv: HNOZIS.
Published
2019-04-29
How to Cite
Kharytonov, E., Kharytonova, O., Tolmachevska, Y., Fasii, B., & Tkalych, M. (2019). Information Security and Means of Its Legal Support. Amazonia Investiga, 8(19), 255-265. Retrieved from https://www.amazoniainvestiga.info/index.php/amazonia/article/view/227
Section
Articles
Bookmark and Share