Information Security of a Modern Democratic State: Axiological Context
The authors of the research focus on the role and significance of values in forming the basis for the information security of a modern democratic state. In the course of the research, the authors applied general scientific methods (analysis, synthesis, analogy, etc.), philosophical methods (dialectical, hermeneutic), and special legal methods (normative-analytical). Information security includes not only the protection of information resources of the society, state and people, but also ensures the preservation of value aspects, historical memory, cultural traditions, and a particular people’s specific national way of life. The most important objective of information society institutions is the protection of the country’s information sovereignty. Information wars are the continuation of economic, political, as well as cultural and religious conflicts on our planet. In this research, the authors come to the conclusion that one of the aspects of information wars is value confrontation. That is why it is necessary to consider information security not only in the legal, communication-technical and political aspects but also in the axiological context.
Alqahtani, A. (2014). Awareness of the Potential Threat of Cyberterrorism to the National Security. Journal of Information Security, 5: 137-146.
Belanger, F., Collignon, St., Enget, K., Negangard, E. (2017). Determinants of early conformance with information security policies. Information and Management, 54: 887-901.
Cheminod, M., Durante, L., Seno, L., Valenzano, A. (2017). Detection of attacks based on known vulnerabilities in industrial networked systems. Journal of information security and application, 34: 153-165.
Ewurah, S. K. (2017). The Concept of Government: ICT Policy Guidelines for the Policy Makers of Ghana. Journal of Information Security, 8: 106-124.
Gusmão, A., Silva, L., Silva, M., Poleto, T., Costa, A. (2016). Information security risk analysis model using fuzzy decision theory. International Journal of Information Management, 36: 25-34.
Hickman, M. (2017). The threat from inside. Network Security, 4: 18-19.
Islama, M., Watsonb, J., Iannella, R., Geva, S. (2017). A greater understanding of social networks privacy requirements: The user perspective. Journal of information security and application, 33: 30-44.
Ki-Aries, D., Failyє, S. (2017). Persona-Centred Information Security Awareness. Computers & Security, 70: 663-674.
Pernebekova, A., Beisenkulov, A. (2015). Information Security and the Theory of Unfaithful Information. Journal of Information Security, 6: 265-272.
Qadir, S., Quadri, S. (2016). Information Availability: An Insight into the Most Important Attribute of Information Security. Journal of Information Security, 7: 185-194.
Rajasooriya, S., Tsokos, C., Kaluarachchi, P. (2017). Cyber Security: Nonlinear Stochastic Models for Predicting the Exploitability. Journal of Information Security, 8: 125-140.
Safa, N., Maple, C. (2016). Human errors in the information security realm − and how to fix them. Computer fraud and security, 9: 17-20.
Safa, N., Solms, R. (2016). An information security knowledge sharing model in organizations. Computers in Human Behavior, 57: 442-451.
Safa, N., Solms, R., Furnell, St. (2016). Information security policy compliance model in organizations. Computers & Security, 56: 70-82.
Safa, N., Solms, R., Futcher, L. (2016). Human aspects of information security in organisations. Computer fraud and security, 2: 15-18.
Thompson, N., McGill, T., Wang, X. (2017). “Security begins at home”: Determinants of home computer and mobile device security behavior. Computers & Security, 70: 376-391.
Veiga, A., Martins, N. (2017). Defining and identifying dominant information security cultures and subcultures. Computers & Security, 70: 72-94.