Information Security of a Modern Democratic State: Axiological Context

  • Oleg Gennadievich Danilyan Yaroslav the Wise National Law University - Russia
  • Aleksander Petrovich Dzeban Yaroslav the Wise National Law University - Russia
  • Yury Yurievich Kalinovsky Yaroslav the Wise National Law University - Russia
  • Kovalenko Inna Igorevna Yaroslav the Wise National Law University - Russia
  • Julia Vasilyevna Melyakova Yaroslav the Wise National Law University - Russia
  • Vadim Olegovich Danilyan Yaroslav the Wise National Law University - Russia
Keywords: national security; information security; values; information sovereignty; information war.

Abstract

The authors of the research focus on the role and significance of values in forming the basis for the information security of a modern democratic state. In the course of the research, the authors applied general scientific methods (analysis, synthesis, analogy, etc.), philosophical methods (dialectical, hermeneutic), and special legal methods (normative-analytical). Information security includes not only the protection of information resources of the society, state and people, but also ensures the preservation of value aspects, historical memory, cultural traditions, and a particular people’s specific national way of life. The most important objective of information society institutions is the protection of the country’s information sovereignty. Information wars are the continuation of economic, political, as well as cultural and religious conflicts on our planet. In this research, the authors come to the conclusion that one of the aspects of information wars is value confrontation. That is why it is necessary to consider information security not only in the legal, communication-technical and political aspects but also in the axiological context.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Author Biographies

Oleg Gennadievich Danilyan, Yaroslav the Wise National Law University - Russia

Corresponding author. Dr. habil. in Philosophy, Professor Head of the Chair of Philosophy, Yaroslav the Wise National Law University

Aleksander Petrovich Dzeban, Yaroslav the Wise National Law University - Russia

Dr. habil. in Philosophy, Professor Chair of Philosophy, Yaroslav the Wise National Law University

Yury Yurievich Kalinovsky, Yaroslav the Wise National Law University - Russia

Dr. habil. in Philosophy, Professor Chair of Philosophy, Yaroslav the Wise National Law University

Kovalenko Inna Igorevna, Yaroslav the Wise National Law University - Russia

Dr. habil. in Philosophy, Associate Professor Chair of Philosophy, Yaroslav the Wise National Law University

Julia Vasilyevna Melyakova, Yaroslav the Wise National Law University - Russia

Dr. habil. in Philosophy, Associate Professor Chair of Philosophy, Yaroslav the Wise National Law University

Vadim Olegovich Danilyan, Yaroslav the Wise National Law University - Russia

Dr. habil. in Philosophy, Associate Professor Chair of Philosophy and Sociology, Yaroslav the Wise National Law University

References

Alqahtani, A. (2014). Awareness of the Potential Threat of Cyberterrorism to the National Security. Journal of Information Security, 5: 137-146.

Belanger, F., Collignon, St., Enget, K., Negangard, E. (2017). Determinants of early conformance with information security policies. Information and Management, 54: 887-901.

Cheminod, M., Durante, L., Seno, L., Valenzano, A. (2017). Detection of attacks based on known vulnerabilities in industrial networked systems. Journal of information security and application, 34: 153-165.

Ewurah, S. K. (2017). The Concept of Government: ICT Policy Guidelines for the Policy Makers of Ghana. Journal of Information Security, 8: 106-124.

Gusmão, A., Silva, L., Silva, M., Poleto, T., Costa, A. (2016). Information security risk analysis model using fuzzy decision theory. International Journal of Information Management, 36: 25-34.

Hickman, M. (2017). The threat from inside. Network Security, 4: 18-19.

Islama, M., Watsonb, J., Iannella, R., Geva, S. (2017). A greater understanding of social networks privacy requirements: The user perspective. Journal of information security and application, 33: 30-44.

Ki-Aries, D., Failyє, S. (2017). Persona-Centred Information Security Awareness. Computers & Security, 70: 663-674.

Pernebekova, A., Beisenkulov, A. (2015). Information Security and the Theory of Unfaithful Information. Journal of Information Security, 6: 265-272.

Qadir, S., Quadri, S. (2016). Information Availability: An Insight into the Most Important Attribute of Information Security. Journal of Information Security, 7: 185-194.

Rajasooriya, S., Tsokos, C., Kaluarachchi, P. (2017). Cyber Security: Nonlinear Stochastic Models for Predicting the Exploitability. Journal of Information Security, 8: 125-140.

Safa, N., Maple, C. (2016). Human errors in the information security realm − and how to fix them. Computer fraud and security, 9: 17-20.

Safa, N., Solms, R. (2016). An information security knowledge sharing model in organizations. Computers in Human Behavior, 57: 442-451.

Safa, N., Solms, R., Furnell, St. (2016). Information security policy compliance model in organizations. Computers & Security, 56: 70-82.

Safa, N., Solms, R., Futcher, L. (2016). Human aspects of information security in organisations. Computer fraud and security, 2: 15-18.

Thompson, N., McGill, T., Wang, X. (2017). “Security begins at home”: Determinants of home computer and mobile device security behavior. Computers & Security, 70: 376-391.

Veiga, A., Martins, N. (2017). Defining and identifying dominant information security cultures and subcultures. Computers & Security, 70: 72-94.

Published
2019-11-30
How to Cite
Danilyan, O. G., Dzeban, A. P., Kalinovsky, Y. Y., Inna Igorevna, K., Melyakova, J. V., & Danilyan, V. O. (2019). Information Security of a Modern Democratic State: Axiological Context. Religación, 4(21), 137-144. Retrieved from https://revista.religacion.com/index.php/religacion/article/view/522