The problem of information security in the development of the information society
Abstract
In modern conditions, information is without exaggeration one of the decisive resources for the development of civilization. Information security in the modern world actively influences all spheres of life of both individual societies and states, and the entire world community.
The purpose of the article. Based on the foregoing, the purpose of our research is the need for a state management analysis of the role of information security in the development of the information society in the context of the globalization challenges of our time.
The presentation of the main material. Speaking about the content and structure of information security, it should be borne in mind that the category «information security» at this stage may have different content when used in different contexts. Thus, two trends emerged in government bodies in defining the concept and structure of information security. Humanitarian representatives associate information security only with the institution of secrecy. Representatives of law enforcement agencies offer to extend the scope of information security to almost all issues and relations in the information sphere, in fact, identifying information security with the information sphere. In our opinion, both points of view represent extreme positions.
In the modern world there is an intensive build-up of information and communication potential, information globalization contributes to integration processes in all other spheres. The means for this are the development of communications, the use of outer space for the transmission of information, the growth of global information networks, the computerization of many processes of human activity.
Findings. Thus, it can be said that the point of view that information security is a state of society that provides reliable and comprehensive protection of an individual, society and the state from the impact of a special type of threats, acting in the form of organized or spontaneous information flows carried out in the interests of regressive, reactionary or extremist-minded political and social forces and aimed at the conscious deformation of the public individual and individual consciousness. It is obvious that an effective state policy in the information sphere, including in the aspect of information security, largely depends on the correct choice of priorities in scientific research of these problems, on the development of adequate scientific models and approaches to their solution.
Downloads
References
Viner, N. (1968). Kibernetika. ili upravleniye i svyaz v zhivotnom i mashine ili upravleniye i svyaz v zhivotnom i mashine. Moscow: Sov. Radio [in Russian].
Kastels, M. (2000). Informatsionnaya epokha: ekonomika. obshchestvo i kultura. Moscow [in Russian].
Tapskott, D. (1999). Elektronno-tsifrovoye obshchestvo: Plyusy i minusy epokhi setevogo intellekta. Kiyev: ITN Press; Moscow: Refl-buk [in Russian].
Bell, D. (1980). The Social Famework of the Information Society. Oxford.
Khaken, G. (2001). Informatsiya i samoorganizatsiya. Moscow: Nauka [in Russian].
Manoylo, A.V. (2003). Gosudarstvennaya informatsionnaya politika v osobykh usloviyakh. Moscow: MIFI [in Russian].
Ivashchenko, G.V. (2000). O ponyatii “bezopasnost”. Credo, 6. 52 [in Russian].
Toffler, E. (2003). Metamorfozy vlasti. Moscow: ACT [in Russian].
Castells, M. (1998). The Information Age: Economy. Society and Culture: End of Milenium. Maiden (Ma.). Oxford: Blackwell Publ.
Zubkov, S.A. (2006). Vzaimosvyaz politiki. nauki i tekhniki v usloviyakh tekhnogennoy tsivilizatsii (sotsialno-filosofskiye aspekty). Extended abstract of candidate’s thesis. Moscow [in Russian].
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).