v. 8 n. 19 (2019)
Articles

Information Security and Means of Its Legal Support

Evgen Kharytonov
National University «Odesa Law Academy» Ukraine, Odesa.
Biografia do Autor

Doctor of Law Science - Professor of Civil Law Department National University «Odesa Law Academy»- Corresponding Member National Academy of Law Sciences of Ukraine - Honored Science and Technology Worker of Ukraine- Head of Civil Law Department National University «Odesa Law Academy» Ukraine, Odesa.

Olena Kharytonova
National University «Odesa Law Academy» Ukraine, Odesa
Biografia do Autor

Doctor of Law Science - Professor of Intellectual Property and Corporate Law Department National University «Odesa Law Academy» - Corresponding Member National Academy of Law Sciences of Ukraine- Honored Science and Technology Worker of Ukraine- Head of Intellectual Property and Corporate Law Department National University «Odesa Law Academy» Ukraine, Odesa

Yuliia Tolmachevska
(National University «Odesa Law Academy») Ukraine, Odesa
Biografia do Autor

Master of Law (National University «Odesa Law Academy») Ukraine, Odesa, Academicheskaya

Bondan Fasii
National University «Odesa Law Academy». Ukraine, Odesa
Biografia do Autor

PhD. Аssistant professor of Civil Law Department National University «Odesa Law Academy». Ukraine, Odesa

Maxym Tkalych
Zaporizhzhia National University (Ukraine, Zaporizhzhia)
Biografia do Autor

PhD. Аssistant professor of Civil Law Department Zaporizhzhia National University (Ukraine, Zaporizhzhia)

Publicado 2019-04-29

Palavras-chave

  • segurança, segurança da informação, esfera de TI, regulação legal, higiene da informação, sociedade civil, norma jurídica

Como Citar

Kharytonov, E., Kharytonova, O., Tolmachevska, Y., Fasii, B., & Tkalych, M. (2019). Information Security and Means of Its Legal Support. Amazonia Investiga, 8(19), 255–265. Recuperado de https://www.amazoniainvestiga.info/index.php/amazonia/article/view/227

Resumo

O artigo é dedicado à consideração do problema da regulação legal das relações sobre a prestação de segurança da informação no mundo. O autor também levanta questões de propaganda informacional. O artigo introduz o conceito de higiene da informação do autor. Como resultado da pesquisa realizada, o autor chegou à conclusão de que é necessário introduzir uma regulação legal das relações de informação tanto no nível internacional quanto nacional.

Downloads

Não há dados estatísticos.

Referências

Belogorskiy, N. (2016). Silicon Mountains and Valleys. New country time, ? 48, 56-58.

Bilenchuk P.D., Gvozdetskiy V.D., Slivka S.S. (1999). Philosophy of Law. Kiyv: AtIka.

Cai, Z., He, Z., Guan, X., & Li, Y. (2018). Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks. IEEE Transactions on Dependable and Secure Computing, 15(4), 577-590. Retrieved February 01, 2019, from https://ieeexplore.ieee.org/abstract/document/7576667.

Demonstration of power. Oleg Derevianko about the key goals of the latest cyber attack. (n.d.). Retrieved January 12, 2019 from http://vlasti.net/news/263539

E. Macarevich, (2017) Top 10 digital threats of the XXI century. Focus, ? 27, 20-23.

Endsley, M. R. (2018). Combating Information Attacks in the Age of the Internet: New Challenges for Cognitive Engineering. PubMed, 60(8), 1081-1094. Retrieved January 12, 2019, from https://www.ncbi.nlm.nih.gov/pubmed/30376429.

Espionage for a new era. (2015). Ukrainian Week, ? 31, 34-36.

Everything crashes in a relatively short period of time. Interview with IT expert Igor Novikov. (2017, June 15). Kraina, 20.

God is everywhere. A physicist from the United States put forward the theory that the universe has consciousness. (n.d.). Retrieved February 25, 2019, from http://nv.ua/techno/science/bog-povsjudu-amerikanskij-fizik-vydvinul-teoriju-o-tom-chto-vselennaja-obladaet-soznaniem-1546675.html

Gor, ?. Vkontakte has been banned, threats have remained: how Ukrainians are deceived in the network (n.d.). Retrieved January 8, 2019 from https://apostrophe.ua/ua/article/society/2017-06-01/vkontakte-zapretili-ugrozyi-ostalis-kak-ukraintsev-obmanyivayut-i-verbuyut-v-seti/12599

Investigation of cyber attack. Police "disturbed" the company M.E.Doc. (n.d.). Retrieved December 15, 2018 from http://glavnoe.ua/news/n312705-rassledovanie_kiberataki._policija_potrevozhila_kompaniju_m.e.doc_

Kazanskyi, D. (2017). Non-virtual effect. Ukrainian Week, 23, 8-16.

Koen, D. L., Arato, E. (2003). Civil society and political theory. Moscow: Ves Mir.

Kormich B.A. (2011). .Information law. Khark?v: BURUN i K.

Lopaiev Yu., Golub A., (2017) Another front, Ukrainian Week, ? 3, 20-23.

Pasko, I.T., Pasko, Ya.I. (1999). Civil society and national idea. (Ukraine against the backdrop of European processes, comparative essays). Donetsk: TsGO NAN Ukrayni.

Pilipchuk, V.G., Dzoban, O.P. (2014). Information Society: Philosophical and Legal Dimension. Uzhgorod: TOV «IVA».

Pocheptsov, H. (2017, March 9). Interview Mariya Boyko. Vgolos. Retrieved January 1, 2019, from http://www.ji-magazine.lviv.ua/2017/Pocheptsov_Vijna_4_pokolinnya.htm Over 200,000 computers in 150 countries were hit by mass hacking attacks. (n.d.). Retrieved December 21, 2018, from https://www.rbc.ua/ukr/news/massovyh-hakerskih-atak-postradali-200-tysyach-1494761345.html

Popova. T.V., Lipkan, V.A. (2016). Strategic Communications. Kiyv: FOP O.S. Lipkan.

Pylypchuk, V., & Tsymbaliuk, V. (2016). GtHistorical and legal problems of formation and development of information sphere and information law in Ukraine (end of XX - beginning of XXI century). Bulletin of the National Academy of Legal Sciences of Ukraine, 4, 39-42.

Safa, N. S., Sookhaka, M., Solms, R., Furnell, S., Ghani, N.A., Herawan, T. (2015). Information security conscious care behaviour formation in organizations. Computers & Security, 53, 65-48. Retrieved January 15, 2019, from https://www.sciencedirect.com/science/article/pii/S0167404815000863.

Shmidt E., Rozenberg Dzh. (2016). How Google works. Kiyv: Vidavnicha grupa KM-BUKS.
The doctrine of the information security of Ukraine is only a declaration - experts (n.d.). Retrieved December 15, 2018 from https://www.radiosvoboda.org/a/28336852.html

The G7 countries will agree on joint measures to combat cyberattacks. (n.d.). Retrieved January 10, 2019 from http://www.eurointegration.com.ua/news/2017/05/13/7065662/

Zubok, M. (2015). Information security in entrepreneurial activity. Kiyv: HNOZIS.