EXISTENCE-NETWORK DIMENSION OF INFORMATION SECURITY IN MODERN SOCIETY
Keywords:information, information society, information processes, network, cyber space
At the present stage, knowledge and information have become the most important resources that permit to achieve the desired goals, minimizing the resources of power, to turn opponents into allies. In addition, the problem of information security is especially relevant, which occupies one of the key places in the system of ensuring the vital interests of all countries without exception. This is primarily due to the urgent need to create a developed information environment of society. But it is through the information environment that threats to national security are most often made in various spheres of activity of the individual, society and the state. Information security is one of the acute socio-cultural problems of modern society, which has a systemic nature and affects the activities of major institutions and subsystems; the context of its influence includes key socio-cultural processes taking place in society. As the development of the information sphere, a person on his way encounters certain difficulties, some of which he has to solve on their own. This leads to the problem of forming in the subject of information culture, the level of which depends on a person's ability to adequately respond to changes in the environment. Network information security practices are determined by their functional significance, not by the location of the entities. Decisions are made online, but are implemented locally and territorially. The Internet is a space of the highest density and intensity of communication. Different types of social structures, determined by the direction, density and intensity of information flows, determine different forms of coordination in society. The ramifications of ways to ensure information security in terms of network communications of the information society are set by such a criterion as the level of communication intensity. Ensuring information security, especially on the Internet, is a practical step to bridge the gaps in information security and information security. Bridging the gaps is carried out in order to orient in the general information space for the control of information. The key risk factor for the information subsystem of society are large-scale socio-communicative and socio-cultural transformations, which carry a number of negative social, especially existential, consequences. In recent years, disorganization and dysfunctional trends directly related to high rates of information change have become clear. Information security is both information protection and protection from information.
Belanger, F., Collignon, St., Enget, K., Negangard, E. (2017). Determinants of early conformance with information security policies. Information and Management, 54, 887-901. https://doi.org/10.1016/j.im.2017.01.003
Bytiak, Y., Danilyan, O., Dzeban, A., Kalinovsky, Y., Chalapko, V. (2020). Information society: the interaction of tradition and innovation in communicative processes. Amazonia Investiga, 9, 27, 217-226. http://dspace.nlu.edu.ua/handle/123456789/-18265?locale=en
Bytiak, Y.P., Danilyan, O.G., Dzeban, A.P., Kalynovskyi, Y.Yu., Finin, H.I. (2021). Cyberspace and virtual reality as character-istics of the information society. Revista Inclusiones, 8, 332-349. http://revistainclusiones.org/pdf1/27%20Bytiak%20et%20al%20VOL%208%20NUM%201%20ENEMAR2021INCL.pdf
Castells, M. (2000). Informaczionnaya epokha: ekonomika, obshhestvo i kultura (Translat. from Esp.). Moscow: Gos. un-t VSCE.(In Russian).
Chebotareva, N.D. (2006). Internet-forum kak virtualnyj analog psihodinamicheskoj gruppy. http://ezotera.ariom.ru/2006/05/24/chebotariova.html (In Rus-sian).
Crabtree, C., Nelson, M.J. (2017). New Evidence for a Positive Relationship between De Facto Judicial Independence and State Respect for Empowerment Rights, International stud-ies quarterly, 61, 1, 210-224. https://doi.org/10.1093/isq/sqw056
Danilyan, O.G., Dzeban, A.P., Kalinovsky, Y.Y., Zhdanenko, S.B., Kalnytskyi, E.A. (2019). Problems of adaptation of a man to the conditions of information society. Media, Culture and Public Relations, 10, 1, 30-41. https://doi.org/-10.32914/mcpr.10.1.3
Ewurah, S.K. (2017). The Concept of Government: ICT Policy Guidelines for the Policy Makers of Ghana, Journal of In-formation Security, 8, 106-124. https://m.scirp.org/-papers/75812
Islama, M., Watson J., Iannella, R., Geva, S. (2017). A greater understanding of social networks privacy requirements: The user perspective. Journal of information security and appli-cation, 33. 30-44. https://doi.org/10.1016/j.jisa.2017.01.004
Ivanov, D.V. (2010). Aktualnaya socziologiya, veselaya nauka v poiskakh zlykh istin. Journal of Sociology and Social An-thropology, 2, 21-51 (In Russian).
Khyzhniak, L.M. (2017). Mify pro sotsialnu statystyku, profesiina pidhotovka sotsiolohiv ta informatsiina bezpeka derzhavy. Bulletin of VN Karazin Kharkiv National University. Series: Sociological research of modern society: methodology, theory, methods, 38. 92-95 (In Ukrainian).
Kravchenko, S.A. (2009). Riski v nelinejnom globolokalnom socziume. Moscow: Ankil. (In Russian).
Kuznetsova, Yu.M., Chudova, N.V. (2008). Psikhologiya zhitelej interneta. Moscow: Izd-vo LKI (In Russian).
Lesh, S., Gubman, B., Teslenko, O. (2013). Proekt drugoj mo-bilnosti. Vestnik Tverskogo gosudarstvennogo uni¬versiteta. Seriya: Filosofiya, 3, 111-123 (In Russian).
Markozova, O.O. (2016). Dosiahnennia zhyttievoho uspikhu liudyny v umovakh informatsiinoho perevantazhennia. Bulle-tin of the National University "Yaroslav the Wise Law Acad-emy of Ukraine". Series: Philosophy. 4 (31), 175-182 (In Ukrainian).
Nazarchuk, A.V. (2012). Socialnoe vremya i socialnoe prostran-stvo v koncepcii setevogo obshchestva. Voprosy filosofii, 9. URL: http://vphil.ru/index.php?option=com_content&task=view&id=598&Itemid=52 (In Russian).
Nesterov, V.Yu. (2003). Chto vyplavlyayut iz «tonn slovesnoj rudy», ili popytka reabilitacii chatov. http://banderus2.narod.ru/93117.html (In Russian).
Qadir, S., Quadri, S. (2016). Information Availability: An Insight into the Most Important Attribute of Information Security. Journal of Information Security, 7, 185-194. https://doi.org/10.4236/jis.2016.73014
Safa, N., Solms, R., Furnell, St. (2016). Information security policy compliance model in organizations. Computers & Se-curity, 56, 70-82. https://doi.org/10.1016/j.cose.2015.10.006
Safa, S. N., Maple, C. (2016). Human errors in the information security realm − and how to fix them. Computer fraud and security, 9, 17-20. http://dx.doi.org/10.1016/S1361-3723(16)30073-2
Svendsen, L.Fr.H. (2016). Filosofiia svobody. Lviv: Vydavny-tstvo Anetty Antonenko; Kyiv: Nika-Tsentr (In Ukrainian).
Veiga, A., Martins, N. (2017). Defining and identifying dominant information security cultures and subcultures. Computers & Security, 70, 72-94. http://dx.doi.org/10.1016/j.¬cose.-2017.05.002
How to Cite
Copyright (c) 2021 Oleg Danilyan, Alexander Dzоban
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
1. Authors bear responsibility for the accuracy of facts, quotations, numbers and names used.
2. Manuscripts are not sent back.
3. The publisher does not always agree with the authors' opinion.
4. The authors reserve the right to authorship of the work and pass the first publication right of this work to the journal under the terms of a Creative Commons Attribution Non-Commercial License, which allows others to freely distribute the published research with the obligatory reference to the authors of the original work and the first publication of the work in this journal.
5. The authors have the right to conclude separate supplement agreements that relate to non-exclusive work distribution in the form in which it has been published by the journal (for example, to upload the work to the online storage of the journal or publish it as part of a monograph), provided that the reference to the first publication of the work in this journal is included.