Information security in the post-Soviet space: a systematic historical analysis

Granì 19 (12) (2016)
  Copy   BIBTEX

Abstract

The history reveals powerful informational campaigns between the Republic of Armenia and the Azerbaijani Republic, the Republic of Moldova and the Transnistrian Moravskou Republic, the informational wars between Russia and Georgia during the Russian-Georgian war of 2008, and, finally, target-driven activities of the Russian Federation in the information space of independent Ukraine. In this regard, the urgent issue today is to ensure the security of information – security of state information resources, protection of vital interests of a citizen and society in the information sphere. Information security is also a component of the state national security. Analysis of scientific views on issues of information security in the post-Soviet space is the subject of scientific researches of local and foreign specialists. Available scientific works of Ukrainian, Russian, Armenian, Azerbaijani, and Moldovan scientists are divided into 5 semantic groups: a research synthesis of the social, philosophical, political and psychological aspects of information security; a study of the status of information security in the common information space of CIS member states; a study that deals with an impact of media and role of “public diplomacy” on the issue of information security; research relating to issues of information security of the Russian Federation in the modern geopolitical realities; research of Ukrainian researchers on information security and information warfare against Ukraine. The aim of the study is to analyze the main measures for ensuring information security in post-Soviet space, particularly, in the space of CIS member states. After the formation of CIS, a number of documents in the field of information security have been adopted, but the legal framework remains inadequate and requires revision. The documents did not include the issues of information and psychological impact on the population, as well as the preparation and conduction of information warfare. Thus, the most pressing issue in the field of information security has been outside the sphere of legal and regulatory framework for many years. In addition, the former Soviet Union created TLB, which also pays attention to the improvement of legislation in the sphere of information security. Each member country of CIS and CSTO has adopted a number of documents in this area.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 93,774

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Conceptual framework of information policy of the Russian Federation: origins and current status.O. Kondratenko - 2013 - Epistemological studies in Philosophy, Social and Political Sciences 3 (23):99-105.
Chapter 9. Information Security in the Structure of the Security Complex.Сергій СТАВЧЕНКО - 2024 - Epistemological studies in Philosophy, Social and Political Sciences 1 (1):259-280.
Administrative and legal status of the national security and defence council of Ukraine as a subject of information security of the state.Anastasiia Dashkovska - 2022 - Философия И Гуманитарные Науки В Информационном Обществе 12 (3):86-96.
Threats to Information Security of Ukrainian Society Under the Conditions of “Hybrid War”.Володимир Вікторович Чалапко - 2020 - Вісник Нюу Імені Ярослава Мудрого: Серія: Філософія, Філософія Права, Політологія, Соціологія 1 (44):168-179.
Категорія інформаційної безпеки у вітчизняному філософсько-політологічному дискурсі.К. В Захаренко - 2018 - Гуманітарний Вісник Запорізької Державної Інженерної Академії 72:44-52.
Родина і школа: Перспективи взаємодії у нових соціокультурних контекстах.В.В Сагуйченко - 2016 - Гуманітарний Вісник Запорізької Державної Інженерної Академії 72:91-98.

Analytics

Added to PP
2020-02-07

Downloads
0

6 months
0

Historical graph of downloads

Sorry, there are not enough data points to plot this chart.
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references