INFORMATION SECURITY OF DIGITAL TRANSFORMATION

Authors

DOI:

https://doi.org/10.32782/2311-8040/2023-1-4

Keywords:

information security, digital transformation, information security, information legal relations, information technology, information rights, information culture

Abstract

The article defines the features of information security of digital transformation and its provision. The definition is formulated by digital transformation and it is found that it can be considered in two aspects: teleological (as the goal of public administration bodies), and in activity (as a set of actions aimed at implementing the functions, methods, measures of the management system of an enterprise, institution, organization or body of public authorities). Attention is focused on the fact that the activation of digital transformation processes requires a more active application of information security measures, which is due to the increase in the number and intensity of information threats in some areas of public relations. The conclusion is made that the information security of digital transformation is an ideal model of an environment devoid of information threats, in which information (digital) technologies are dynamically introduced into all spheres of functioning and life of individuals and legal entities in order to fully realize their information and other rights, freedoms and interests. Understanding the essence of this model is possible either through the subjective perception of the subjects of information legal relations, or through a system of quantitative criteria that characterize the achievement of the goals of digital transformation. Attention is focused on the fact that the provision of this phenomenon should be distinguished from the information security of digital transformation. Ensuring the information security of digital transformation is a set of actions of public administration bodies, law enforcement, human rights bodies and military formations, courts, enterprises, institutions, organizations of all forms of ownership, civil society institutions and individual citizens, aimed at optimizing the organization, management, functions and methods of activity , raising the level of information culture and information consciousness of the subjects of legal relations through the use of information (digital) technologies.

References

Довгань О.Д., Ткачук Т.Ю. Правове забезпечення інформаційної безпеки держави як підгалузь інформаційного права: теоретичний дискурс. Інформація і право. 2018. № 2(25). С. 73–85. URL: http://ippi.org.ua/sites/default/files/9_8.pdf.

Малашко О.Є., Ковалів М.В. Теоретична конструкція поняття «інформаційна безпека». Інтернаука. Серія: «Юридичні науки». 2020. № 10. С. 20–33. URL: https://doi.org/10.25313/2520-2308-2020-10-6350.

Мохнюк А.М., Скорук О.В. Організація та управління інформаційною безпекою на підприємстві: конспект лекцій. Луцьк : ПП «Поліграфія», 2017. 99 с.

Остапенко О., Баїк О. Адміністративно-правова природа інформаційної безпеки. Вісник Національного університету «Львівська політехніка». Серія: «Юридичні науки». 2021. № 3(31). С. 167 179. URL: http: //doi.org/10.23939/law2021.31.167.

Онопрієнко С. Класифікація видів інформаційної безпеки як правової категорії. Вісник Київського національного університету імені Тараса Шевченка. Серія: «Військово-спеціальні науки». 2022. № 1(49). С. 60–62. URL: https://miljournals.knu.ua/index.php/visnuk/article/view/898/841.

Золотар О.О. Правові основи інформаційної безпеки людини : дис. …докт. юрид. наук : 12.00.07. Київ, 2018. 479 с.

Proposal for a Decision of the European Parliament and of the Council Establishing the 2030 Policy Programme “Path to the Digital Decade” (Text with EEA relevance). URL: https://data.consilium.europa.eu/doc/document/ST-11900-2021-INIT/en/pdf.

Про Національну програму інформатизації: Закон України від 4 лютого 1998 року № 74/98-ВР. Відомості Верховної Ради України. 1998. № 27-28. Ст. 181.

Fouad N. S. Securing higher education against cyberthreats: from an institutional risk to a national policy challenge. Journal of Cyber Policy. 2021. № 6(2). Р. 137–154. URL: https://www.tandfonline.com/doi/pdf/10.1080/23738871.2021.1973526.

Education Technology. Ransomware Attacks on Education Sector More Than Doubled Since 2019. URL: https://edtechnology.co.uk/cybersecurity/ransomware-attackseducation-sector-doubled-since-2019 /. Цит. за: Fouad N. S. Securing higher education against cyberthreats: from an institutional risk to a national policy challenge. Journal of Cyber Policy. 2021. № 6(2). Р. 137–154. URL: https://www.tandfonline.com/doi/pdf/10.1080/23738871.2021.1973526.

Reuters. University of Maastricht Says It Paid Hackers 200,000-Euro Ransom (2020). URL: https://uk.reuters.com/article/us-cybercrime-netherlands-university-idUKKBN1ZZ2HH. Цит. за: Fouad N. S. Securing higher education against cyberthreats: from an institutional risk to a national policy challenge. Journal of Cyber Policy. 2021. № 6(2). Р. 137–154. URL: https://www.tandfonline.com/doi/pdf/10.1080/23738871.2021.1973526.

University of Utah Update on Data Security Incident (2020). URL: https://attheu.utah.edu/facultystaff/university-of-utah-update-on-data-security-incident /. Цит. за: Fouad N. S. Securing higher education against cyberthreats: from an institutional risk to a national policy challenge. Journal of Cyber Policy. 2021. № 6(2). Р. 137–154. URL: https://www.tandfonline.com/doi/pdf/10.1080/23738871.2021.1973526.

Published

2023-05-29

Issue

Section

ADMINISTRATIVE LAW AND PROCESS; FINANCE LAW; INFORMATION LAW