information, information society, information processes, network, cyber space


At the present stage, knowledge and information have become the most important resources that permit to achieve the desired goals, minimizing the resources of power, to turn opponents into allies. In addition, the problem of information security is especially relevant, which occupies one of the key places in the system of ensuring the vital interests of all countries without exception. This is primarily due to the urgent need to create a developed information environment of society. But it is through the information environment that threats to national security are most often made in various spheres of activity of the individual, society and the state. Information security is one of the acute socio-cultural problems of modern society, which has a systemic nature and affects the activities of major institutions and subsystems; the context of its influence includes key socio-cultural processes taking place in society. As the development of the information sphere, a person on his way encounters certain difficulties, some of which he has to solve on their own. This leads to the problem of forming in the subject of information culture, the level of which depends on a person's ability to adequately respond to changes in the environment. Network information security practices are determined by their functional significance, not by the location of the entities. Decisions are made online, but are implemented locally and territorially. The Internet is a space of the highest density and intensity of communication. Different types of social structures, determined by the direction, density and intensity of information flows, determine different forms of coordination in society. The ramifications of ways to ensure information security in terms of network communications of the information society are set by such a criterion as the level of communication intensity. Ensuring information security, especially on the Internet, is a practical step to bridge the gaps in information security and information security. Bridging the gaps is carried out in order to orient in the general information space for the control of information. The key risk factor for the information subsystem of society are large-scale socio-communicative and socio-cultural transformations, which carry a number of negative social, especially existential, consequences. In recent years, disorganization and dysfunctional trends directly related to high rates of information change have become clear. Information security is both information protection and protection from information.


Belanger, F., Collignon, St., Enget, K., Negangard, E. (2017). Determinants of early conformance with information security policies. Information and Management, 54, 887-901. https://doi.org/10.1016/j.im.2017.01.003

Bytiak, Y., Danilyan, O., Dzeban, A., Kalinovsky, Y., Chalapko, V. (2020). Information society: the interaction of tradition and innovation in communicative processes. Amazonia Investiga, 9, 27, 217-226. http://dspace.nlu.edu.ua/handle/123456789/-18265?locale=en

Bytiak, Y.P., Danilyan, O.G., Dzeban, A.P., Kalynovskyi, Y.Yu., Finin, H.I. (2021). Cyberspace and virtual reality as character-istics of the information society. Revista Inclusiones, 8, 332-349. http://revistainclusiones.org/pdf1/27%20Bytiak%20et%20al%20VOL%208%20NUM%201%20ENEMAR2021INCL.pdf

Castells, M. (2000). Informaczionnaya epokha: ekonomika, obshhestvo i kultura (Translat. from Esp.). Moscow: Gos. un-t VSCE.(In Russian).

Chebotareva, N.D. (2006). Internet-forum kak virtualnyj analog psihodinamicheskoj gruppy. http://ezotera.ariom.ru/2006/05/24/chebotariova.html (In Rus-sian).

Crabtree, C., Nelson, M.J. (2017). New Evidence for a Positive Relationship between De Facto Judicial Independence and State Respect for Empowerment Rights, International stud-ies quarterly, 61, 1, 210-224. https://doi.org/10.1093/isq/sqw056

Danilyan, O.G., Dzeban, A.P., Kalinovsky, Y.Y., Zhdanenko, S.B., Kalnytskyi, E.A. (2019). Problems of adaptation of a man to the conditions of information society. Media, Culture and Public Relations, 10, 1, 30-41. https://doi.org/-10.32914/mcpr.10.1.3

Ewurah, S.K. (2017). The Concept of Government: ICT Policy Guidelines for the Policy Makers of Ghana, Journal of In-formation Security, 8, 106-124. https://m.scirp.org/-papers/75812

Islama, M., Watson J., Iannella, R., Geva, S. (2017). A greater understanding of social networks privacy requirements: The user perspective. Journal of information security and appli-cation, 33. 30-44. https://doi.org/10.1016/j.jisa.2017.01.004

Ivanov, D.V. (2010). Aktualnaya socziologiya, veselaya nauka v poiskakh zlykh istin. Journal of Sociology and Social An-thropology, 2, 21-51 (In Russian).

Khyzhniak, L.M. (2017). Mify pro sotsialnu statystyku, profesiina pidhotovka sotsiolohiv ta informatsiina bezpeka derzhavy. Bulletin of VN Karazin Kharkiv National University. Series: Sociological research of modern society: methodology, theory, methods, 38. 92-95 (In Ukrainian).

Kravchenko, S.A. (2009). Riski v nelinejnom globolokalnom socziume. Moscow: Ankil. (In Russian).

Kuznetsova, Yu.M., Chudova, N.V. (2008). Psikhologiya zhitelej interneta. Moscow: Izd-vo LKI (In Russian).

Lesh, S., Gubman, B., Teslenko, O. (2013). Proekt drugoj mo-bilnosti. Vestnik Tverskogo gosudarstvennogo uni¬versiteta. Seriya: Filosofiya, 3, 111-123 (In Russian).

Markozova, O.O. (2016). Dosiahnennia zhyttievoho uspikhu liudyny v umovakh informatsiinoho perevantazhennia. Bulle-tin of the National University "Yaroslav the Wise Law Acad-emy of Ukraine". Series: Philosophy. 4 (31), 175-182 (In Ukrainian).

Nazarchuk, A.V. (2012). Socialnoe vremya i socialnoe prostran-stvo v koncepcii setevogo obshchestva. Voprosy filosofii, 9. URL: http://vphil.ru/index.php?option=com_content&task=view&id=598&Itemid=52 (In Russian).

Nesterov, V.Yu. (2003). Chto vyplavlyayut iz «tonn slovesnoj rudy», ili popytka reabilitacii chatov. http://banderus2.narod.ru/93117.html (In Russian).

Qadir, S., Quadri, S. (2016). Information Availability: An Insight into the Most Important Attribute of Information Security. Journal of Information Security, 7, 185-194. https://doi.org/10.4236/jis.2016.73014

Safa, N., Solms, R., Furnell, St. (2016). Information security policy compliance model in organizations. Computers & Se-curity, 56, 70-82. https://doi.org/10.1016/j.cose.2015.10.006

Safa, S. N., Maple, C. (2016). Human errors in the information security realm − and how to fix them. Computer fraud and security, 9, 17-20. http://dx.doi.org/10.1016/S1361-3723(16)30073-2

Svendsen, L.Fr.H. (2016). Filosofiia svobody. Lviv: Vydavny-tstvo Anetty Antonenko; Kyiv: Nika-Tsentr (In Ukrainian).

Veiga, A., Martins, N. (2017). Defining and identifying dominant information security cultures and subcultures. Computers & Security, 70, 72-94. http://dx.doi.org/10.1016/j.¬cose.-2017.05.002




How to Cite

Danilyan, O., & Dzoban, A. (2021). EXISTENCE-NETWORK DIMENSION OF INFORMATION SECURITY IN MODERN SOCIETY. Skhid, 1(1), 11–17. https://doi.org/10.21847/1728-9343.2021.1(1).225250



Social Philosophy