Article |
---|
Article name |
Information Security in the Regional Political Process |
Authors |
Beidina T.. doctor of political sciences, professor, beydina@inbox.ruKukharsky A.. candidate of political sciences, kukharskijjartjom@yandex.ruNovikova A.. candidate of political sciences, associate professor, assistant professor, anna_novikova2010@mail.ru |
Bibliographic description |
|
Category |
Politology |
DOI |
11.25.40 |
DOI |
10.21209/2227-9245-2020-26-3-39-44 |
Article type |
|
Annotation |
One of the most important scientific and practical problems of information security improvement of authorities’ political process is solved. Approaches to determining the regional political situation have been identified.
By information security actors the authors mean, first of all, figures engaged in information security. The attention is focused that the information security is a component of political process focused on security of authorities from the view of information manipulation. The authors consider that the characteristics of universally recognized values and distribution of the roles of political actors determine the dynamics of political actors and their information interaction.
It is noted that organizational and legal support of information security implies the implementation of a set of laws, regulations, management decisions regulating the information functioning and protection, uniform standards for information security.
The main functional components of information security are identified: development of basic methods and principles of information classification as protected information of a confidential nature; regulation of the system of authorities and officials who are responsible for information protection implementation; formation of a system of various types of documents regulating mechanisms for implementation of the information protection system, etc.
Regional peculiarities of the political process of the Transbaikal region have been highlighted
|
Key words |
information security; regional political process; authorities; political system of states; political actors; ensuring information security; Transbaikal region; information security; informatization; municipal safety |
Article information |
Beydina Т., Kukharsky А., Novikova А. Information Security in the Regional Political Process // Transbaikal State University Journal, 2020, vol. 26, no. 3, pp. 39–44. DOI: 10.21209/2227-9245-2020-26-3-39-44. |
References |
1. Alekseeva E. V. Leningradskiy yuridicheskiy zhurnal (Leningrad Law Journal), 2016, no. 4, pp. 97–103.
2. Berezinskaya M. D., Azarov A. Yu. Informatsionnoye obshchestvo: sostoyaniye, problemy, perspektivy (Information Society: state, problems, prospects) / ed. D. R. Tutaeva. Moscow, 2017, pp. 45–52.
3. Kislyakov M. M. Izvestiya Tulskogo gosudarstvennogo universiteta. Gumanitarnyye nauki (Bulletin of the Tula State University. Humanitarian sciences), 2011, no. 1, pp. 306–313.
4. Kukharsky A. N. Postulat (Postulate), 2017, no. 2. URL: http://e-postulat.ru/index.php/Postulat/article/view/384/403 (Date of access: 13.01.2020). Text: electronic.
5. Novikova A. V. Vestnik Zabaykalskogo gosudarstvennogo universiteta (Transbaikal State University Journal), 2016, vol. 22, no. 7, pp. 74–80.
6. Polykhan K. O. Ustoychivoye razvitiye nauki i obrazovaniya (Sustainable development of science and education), 2019, no. 5, pp. 154–160.
7. Sizmin M. A. Izvestiya Irkutskoy gosudarstvennoy ekonomicheskoy akademii (Baykalskiy gosudarstvennyy universitet ekonomiki i prava) (Bulletin of the Irkutsk State Economic Academy (Baikal State University of Economics and Law)), 2014, no. 3. URL: https://www.elibrary.ru/download/elibrary_21574390_49134347.pdf (Date of access: 11.01.2020). Text: electronic.
8. Stepanov O. A. Gosudarstvo i pravo (State and Law), 2004, no. 4, pp. 70–72.
9. Chebotareva A. A. Vestnik Akademii prav i upravleniya (Bulletin of the Academy of Rights and Management), 2016, no. 1, pp. 48–51.
10. Andress J. The basics of information security: understanding the fundamentals of InfoSec in theory and practice (The basics of information security: understanding the fundamentals of InfoSec in theory and practice). Waltham: Syngress, 2014. 240 p.
11. Hughes J., Cybenko G. Technology Innovation Management Review (Technology Innovation Management Review). Ottawa: Talent First Network (Carleton University), 2013, pp. 15–24.
12. Samonas S., Coss D. Journal of Information System Security (Journal of Information System Security), 2010, vol. 10, no. 3, pp. 21–45.
13. Stickman J. F. Assessing United States information assurance policy response to computer-based threats to national security (Assessing United States information assurance policy response to computer-based threats to national security). URL: http://digitallibrary.usc.edu/cdm/ref/collection/p15799coll16/id/110780 (Date of access: 13.01.2020). Text: electronic.
|
Full article | Information Security in the Regional Political Process |