Resumo
The analysis of the current political and legal foundations of information security and comparison of its different historical stages have proved that many factors directly affect this process. They include inter-state historical relations and the world order, the struggle of various countries and regions for resources, the development of information and communication technologies, as well as the self-awareness of people. The authors of the article have concluded that information security lays the basis for state security in general and increases its power. The level and nature of communication between countries and their blocs are determined by the ability to influence each other through a system of propaganda and communication routes, including goods, services, the education system, scientific studies and social networks. Cybercrime can be combatted not only through toughening political and legal restrictions but also through forming a global humanitarian approach to human values, which is ensured by the education system, the exchange of universal cultural values and the formation of new human qualities. The political and legal foundations of modern information security are as follows: historical relations between various states and regions; the current world order as the leading factor in forming the concept of information security; the power of each state and its role in the international security system as a political actor; the nature and development of information society in each region of the world; a set of international laws and treaties regarding the use of information, its preservation and disposition; the legal framework of each state; general trends in the formation of the global information space and its features associated with information and communication technologies. Information can work to the benefit only if different countries and regions cooperate since their interdependence grows each year, including in the sphere of information support. To obtain these results, system analysis of the legal framework of economic security, both in individual countries and internationally, as well as an abstract logical analysis of the practice of making political decisions to ensure information security were used. The rules and guidelines of information security, described in the scientific literature, as well as applied in practice in individual countries, have been studied.
Referências
Chan, L.M. (1972). The Burning of the Books in China, 213 B.C. The Journal of Library History, 7(2), 101-108.
Cold War History. A&E Television Networks. (2019). Retrieved from https://www.history.com/topics/cold-war/cold-war-history
Convention on Cybercrime. ETS No.185. (2001). Budapest. Retrieved from https://www.coe.int/en/web/conventions
Cybersecurity Legislation (2018). Retrieved from https://www.ncsl.org/research/telecommunications-and-information-technology
Darrell, M. (2017). How to combat fake news and disinformation. West Monday. Retrieved from https://www.brookings.edu/research/
Developing National Information Security Strategy for the Kingdom of Saudi Arabia (2016). Retrieved from https://www.itu.int/en/ITU-D/Cybersecurity/Documents/National_Strategies_Repository
Dugin, A.G. (2011). Geopolitika [Geopolitics]. Moscow: Gaudeamus. Akademicheskii proekt.
Fjäder, C. (2014). The nation-state, national security and resilience in the age of globalization. International Policies, Practices and Discourses, 2(2), 114-129.
Isaev, A.P. & Vasilyeva, T.V. (2019). The genesis of the modern information society and the main world characteristics. Upravlencheskoe konsultirovanie, 8, 19-27.
Kornblum, A.N. (1985). Defense Intelligence College (U.S.). Intelligence and the Law: Protecting intelligence sources and methods. Unauthorized disclosures. International terrorism. Technology transfer. Intelligence and the Law: Cases and Materials (Volume 2), Defense Intelligence College.
Mammadov, F. (2012). The Gorbachev factor in the Karabakh conflict. Retrieved from http://www.visions.az/en/news/359/bc242690/
Martínez, A. A. (2018). Was Giordano Bruno Burned at the Stake for Believing in Exoplanets? Most historians say no, but new evidence suggests otherwise. Retrieved from https://blogs.scientificamerican.com/observations
Paul, T.V., Wirtz, J.J. & Fortmann, M. (2004). The enduring axioms o9f balance of power theory. Balance of power: Theory and practice in the twenty-first century. Stanford, CA: Stanford University Press.
Persson, G. (2017). The War of the Future: A Conceptual Framework and Practical Conclusions: Essays on Strategic Thought, August 11, 2017. By Gudrun Persson for NATO Defense College (NDC).
Pompon, R. (2020). Information security Trends and Solutions for the New Decade New Year, New Risks: What Can We Expect From the World of Cybersecurity in 2020? Retrieved from https://www.informationsecuritybuzz.com/articles
Redhead, S. & Virilio, P. (2004). Theorist for an Accelerated Culture. University of Toronto Press.
Schweller, R.L. & Pu, X. (2011). After Unipolarity: China's Visions of International Order in an Era of U.S. Decline (2011). International Security, 36(1), 41-72.
Sloss, D. (2009). The Role of Domestic Courts in Treaty Enforcement: A Comparative Study. Cambridge University Press.
Soifer, H.D. (2013). State Power and the Economic Origins of Democracy. Studies in Comparative International Development March, 48(1), 1-22.
Sussex, M., Clarke, M. & Medcalf, R. (2017). National security: between theory and practice. Australian Journal of International Affairs, 71(5), 474-478.
Talimonchik, V.P. (2019). Legal Aspects of International Information Security. Retrieved from https://www.intechopen.com/online-first
The Global Principles on National Security and the Right to Information (Tshwane Principles). (2013). Retrieved from https://www.justiceinitiative.org/uploads/
Wall, L.S. (1972). Alberta. Commission on Educational Planning. A Future of Choices: A Choice of Futures.
Watts, E.J. (2017). Hypatia: The Life and Legend of an Ancient Philosopher. England: Oxford, Oxford University Press.
What are the 10 biggest global challenges? (2016). Retrieved from https://www.weforum.org/agenda/20162016/01