Article
Article name Information Security in the Regional Political Process
Authors
Bibliographic description
Category Politology
DOI 11.25.40
DOI 10.21209/2227-9245-2020-26-3-39-44
Article type
Annotation One of the most important scientific and practical problems of information security improvement of authorities’ political process is solved. Approaches to determining the regional political situation have been identified. By information security actors the authors mean, first of all, figures engaged in information security. The attention is focused that the information security is a component of political process focused on security of authorities from the view of information manipulation. The authors consider that the characteristics of universally recognized values and distribution of the roles of political actors determine the dynamics of political actors and their information interaction. It is noted that organizational and legal support of information security implies the implementation of a set of laws, regulations, management decisions regulating the information functioning and protection, uniform standards for information security. The main functional components of information security are identified: development of basic methods and principles of information classification as protected information of a confidential nature; regulation of the system of authorities and officials who are responsible for information protection implementation; formation of a system of various types of documents regulating mechanisms for implementation of the information protection system, etc. Regional peculiarities of the political process of the Transbaikal region have been highlighted
Key words information security; regional political process; authorities; political system of states; political actors; ensuring information security; Transbaikal region; information security; informatization; municipal safety
Article information Beydina Т., Kukharsky А., Novikova А. Information Security in the Regional Political Process // Transbaikal State University Journal, 2020, vol. 26, no. 3, pp. 39–44. DOI: 10.21209/2227-9245-2020-26-3-39-44.
References 1. Alekseeva E. V. Leningradskiy yuridicheskiy zhurnal (Leningrad Law Journal), 2016, no. 4, pp. 97–103. 2. Berezinskaya M. D., Azarov A. Yu. Informatsionnoye obshchestvo: sostoyaniye, problemy, perspektivy (Information Society: state, problems, prospects) / ed. D. R. Tutaeva. Moscow, 2017, pp. 45–52. 3. Kislyakov M. M. Izvestiya Tulskogo gosudarstvennogo universiteta. Gumanitarnyye nauki (Bulletin of the Tula State University. Humanitarian sciences), 2011, no. 1, pp. 306–313. 4. Kukharsky A. N. Postulat (Postulate), 2017, no. 2. URL: http://e-postulat.ru/index.php/Postulat/article/view/384/403 (Date of access: 13.01.2020). Text: electronic. 5. Novikova A. V. Vestnik Zabaykalskogo gosudarstvennogo universiteta (Transbaikal State University Journal), 2016, vol. 22, no. 7, pp. 74–80. 6. Polykhan K. O. Ustoychivoye razvitiye nauki i obrazovaniya (Sustainable development of science and education), 2019, no. 5, pp. 154–160. 7. Sizmin M. A. Izvestiya Irkutskoy gosudarstvennoy ekonomicheskoy akademii (Baykalskiy gosudarstvennyy universitet ekonomiki i prava) (Bulletin of the Irkutsk State Economic Academy (Baikal State University of Economics and Law)), 2014, no. 3. URL: https://www.elibrary.ru/download/elibrary_21574390_49134347.pdf (Date of access: 11.01.2020). Text: electronic. 8. Stepanov O. A. Gosudarstvo i pravo (State and Law), 2004, no. 4, pp. 70–72. 9. Chebotareva A. A. Vestnik Akademii prav i upravleniya (Bulletin of the Academy of Rights and Management), 2016, no. 1, pp. 48–51. 10. Andress J. The basics of information security: understanding the fundamentals of InfoSec in theory and practice (The basics of information security: understanding the fundamentals of InfoSec in theory and practice). Waltham: Syngress, 2014. 240 p. 11. Hughes J., Cybenko G. Technology Innovation Management Review (Technology Innovation Management Review). Ottawa: Talent First Network (Carleton University), 2013, pp. 15–24. 12. Samonas S., Coss D. Journal of Information System Security (Journal of Information System Security), 2010, vol. 10, no. 3, pp. 21–45. 13. Stickman J. F. Assessing United States information assurance policy response to computer-based threats to national security (Assessing United States information assurance policy response to computer-based threats to national security). URL: http://digitallibrary.usc.edu/cdm/ref/collection/p15799coll16/id/110780 (Date of access: 13.01.2020). Text: electronic.
Full articleInformation Security in the Regional Political Process