Mladonova A. Information warfare and security policy: information-legal dimension

Українська версія

Thesis for the degree of Doctor of Philosophy (PhD)

State registration number

0822U100203

Applicant for

Specialization

  • 052 - Соціальні та поведінкові науки. Політологія

28-12-2021

Specialized Academic Board

ДФ 64.051.048

V.N. Karazin Kharkiv National University

Essay

The research is devoted to analyzing information wars and means of information security from the point of modern theoretical and conceptual trends. The significance of this article is due to the fact that, Today the problems of the emergence and development of information wars and the formation of effective mechanisms by states to prevent their deleterious effect on the mass awareness and mental state of the people are not sufficiently developed in modern political science. The author has made a critical analysis of scientific works on the issues of information security, the use of the term information warfare, based on which the level of readiness of the modern Ukrainian society to protect itself to be able to oppose any attempts to manipulate its information. The disertant has found out that in the modern society the term "information warfare" has gradually moved from the position of sign and symbolic unit of the publicistic and political vocabulary to a self-sustaining category of scientific discourse, and information warfare is a complex and complex phenomenon of the modern world and has social and communicative, psychological and geopolitical approaches to its definition. The work describes two groups of information wars that exist in the modern society: the group that is associated with the contentious nature of information warfare and the group that is focused on the non-violation of the influence of information and information control systems of the enemy. The following types of information warfare have been identified: psychological warfare; measure warfare; cybernetic warfare; ideological sabotage; radio-electronic warfare. The author analyzes the technologies of information warfare and divides them into software and computer technologies and algorithms, the action of which is focused on how to identify computer systems of military and state control of the enemy. The term "information security" is defined, which means, first and foremost, protection of constitutional order, sovereignty and territorial integrity of the state through the use of information resources. The author has submitted a classification of information security systems, which she conditionally divides into four types: European; American; Russian and Chinese. The process of evolution of the Ukrainian information security system during the period of independence was analyzed and the main types of information threats to present-day Ukraine were identified: information wars; cybernetic attacks aimed at damaging the information and material infrastructure of the opposite side; cybernetic espionage aimed at stealing information that is not publicly available. The analysis of normative documents related to the legal regulation of information security policy in Ukraine allowed the researcher to conclude that during the years of independence significant work has been done at the state level, concerning information security, namely the adoption of the Law of Ukraine "On the Basic Principles of Ukraine's Information Security" that allowed for the implementation of the modern European practices in the system of information security: information security management and audit, application of industry standardized requirements for cybernetic protection of critical infrastructure objects. The research is aimed at the feasibility and timeliness of the ordering of information legislation, its systematization, in particular through the adoption of the Information Code. The work presents the author's vision of the ways to improve information security in Ukraine, which consists in competition of the information space and legal regulation, namely the formation of the legislative framework of the state through the creation of the following laws: The law on foreign agents and strict control over the activities of foreign agents on the part of law enforcement agencies; the law on defamation, which would protect the information field from untruthful and fake information; the law on the prohibition of intrusion into the activities of mass media by any authorities, except the courts; the law on the moratorium on the forced closure of mass media, etc.

Files

Similar theses