INFORMATION POLICY AS AN ELEMENT OF ENFORCING THE STATE'S INFORMATION SECURITY

被引:0
|
作者
Britchenko, Igor [1 ]
Hladchenko, Svitlana [2 ]
Viktorova, Lesta [3 ]
Pronoza, Inna [4 ]
Ulianova, Kateryna [5 ]
机构
[1] Higher Sch Insurance & Finance, 1 Gusla Str, Sofia 1618, Bulgaria
[2] Odesa Mil Acad, 10 Fontan Way Str, UA-65009 Odesa, Ukraine
[3] Mil Diplomat Acad, 81 Yuri Ilyenko Str, UA-04050 Kiev, Ukraine
[4] Odesa South Ukrainian Natl Pedag Univ, 26 Staroportofranco Str, UA-65020 Odesa, Ukraine
[5] Luhansk Taras Shevchenko Natl Univ, 1 Gogolia Str, Starobilsk, Ukraine
来源
关键词
Information policy; Information security; Methods of information security; Modem information society; National security; Threats to information security; CURRENT ASSETS ANALYSIS; AGRICULTURAL SECTOR; VOLYN REGION; RURAL-POPULATION; ECONOMIC-EFFICIENCY; TERRITORIAL COMMUNITIES; FINANCIAL SECURITY; PEASANT FARMS; SYSTEM; MANAGEMENT;
D O I
暂无
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The article is devoted to the study of key aspects of the formation of the information policy of the state in terms of the need to ensure its information security. It was determined that information security is not only an organic component of national security but also an important area of its provision Information security is one of the most important concepts in science and various fields of human activity. The essence and complexity of this concept is the nature of the modern information society. The analysis of different approaches to determining the content of the concept of "information security" provides an opportunity to note the inexpediency of strict choice of a position
引用
收藏
页码:110 / 114
页数:5
相关论文
共 50 条
  • [1] Enforcing information security: architecture and responsibilities
    ISACA
    [J]. Netw. Secur., 2008, 2 (7-10):
  • [2] State of the art in information security policy development
    Paananen, Hanna
    Lapke, Michael
    Siponen, Mikko
    [J]. COMPUTERS & SECURITY, 2020, 88
  • [3] Information Policy: Does Information Policy lead to Information Security?
    Alhussain, Abdullah
    [J]. EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT THROUGH VISION 2020, 2019, : 6520 - 6523
  • [4] Entangling alliances: NATO's security of information policy and the entrenchment of state secrecy
    Roberts, A
    [J]. CORNELL INTERNATIONAL LAW JOURNAL, 2003, 36 (02) : 329 - 360
  • [5] State Information Security Policy (Comparative Legal Aspect)
    Dziundziuk, Viacheslav B.
    Kotukh, Yevgen, V
    Krutii, Olena M.
    Solovykh, Vitalii P.
    Kotukov, Oleksandr A.
    [J]. CUESTIONES POLITICAS, 2021, 39 (71): : 166 - 186
  • [6] Information security policy
    Mead, N
    Anderson, R
    McGraw, G
    Machanick, P
    Bollinger, T
    Shimeall, T
    Pyster, A
    Brown, D
    Draier, E
    Schmidt, H
    [J]. IEEE SOFTWARE, 2000, 17 (05) : 26 - 32
  • [7] Information security policy's impact on reporting security incidents
    Wiant, TL
    [J]. COMPUTERS & SECURITY, 2005, 24 (06) : 448 - 459
  • [8] Nurse Information Security Policy Compliance, Information Competence, and Information Security Attitudes Predict Information Security Behavior
    Kang, Purum
    Kang, Jiwon
    Monsen, Karen A.
    [J]. CIN-COMPUTERS INFORMATICS NURSING, 2023, 41 (08) : 595 - 602
  • [9] Information Security Policy Compliance: The Role of Information Security Awareness
    AL-Omari, Ahmad
    El-Gayar, Omar
    Deokar, Amit
    [J]. AMCIS 2012 PROCEEDINGS, 2012,
  • [10] The state of information security
    Potts, Mike
    [J]. Network Security, 2012, 2012 (07) : 9 - 11