Information Security of Russia in the Digital Economy: The Economic and Legal Aspects

  • Evgenia Evgenevna FROLOVA The Institute of State and Law of the Russian Academy of Sciences (RAS), Moscow, Russian Federation
  • Tatyana Anatolevna POLYAKOVA The Institute of State and Law of the Russian Academy of Sciences (RAS), Moscow, Russian Federation
  • Mihail Nikolaevich DUDIN Russian Presidential Academy of National Economy and Public Administration (RANEPA), Russian Federation, Moscow, Russian Federation
  • Ekaterina Petrovna RUSAKOVA Peoples’ Friendship University of Russia (RUDN University), Moscow, Russian Federation
  • Petr Aleksandrovich KUCHERENKO Peoples’ Friendship University of Russia (RUDN University), Moscow, Russian Federation


Contemporary realities dictate that technologization, digitalization (transition of the economy and the social sector to digital technologies of functioning and interaction) and the national intellectual capital are the basic competitive advantages of the country that require proper information security. An information security system is a set of corporate rules, standards of work and procedures for ensuring information security formed based on the audit of the company's information system, and the analysis of existing security risks in accordance with requirements of the regulatory documents of the Russian Federation and the provisions of the standards in the field of information security. It is especially important for Russian companies actively interacting with foreign partners. In addressing the problem of information security, the development of the company's unified information security policy occupies a leading place; therefore, this article will be devoted to consideration of these issues.

The authors of the present study proceed from the objective-subjective predetermination of any phenomena and processes of the external world. In this format, the study is based on general scientific methods: systematic analysis and generalization of normative and practical materials; formal and dialectical logic: analysis, synthesis, induction, deduction, hypotheses, analogies; and special methods of legal research: comparative-legal and historical-legal, system analysis and interpretation of legal norms.

Based on the analysis, the following conclusions have been made: currently, the most important direction of the national economy development is the protection of vital human and social interests, the key element of which is information security. This study represents the development of a scientific overview of the modern ways to ensure information security in both applied and legal contexts. This article underlines and examines the problems and economic legal features of ensuring information security in Russia. These materials can be used both in preparation of other scientific research and in the development of guidance documents by the power structures.


[1] Bell, D. 1976. The Coming of Post-industrial Society. A Venture in Social Forecasting. Basic Books Incorporated: 507.
[2] Castells, M., Himanen, P. 2002. The Information Society and the Welfare State: The Finnish Model. Oxford University Press: 200.
[3] Cavelty, M.D., Mauer, V. 2016. Power and Security in the Information Age: Investigating the Role of the State in Cyberspace. Routledge: 182.
[4] Disterer, G. ISO/IEC 27000, 27001 and 27002 for information security management. Journal of Information Security, 4(02), 92.
[5] Dudin, M.N.,Vysotskaya, N.V. Frolova, E.E, Pukhart, A.A., and Galkina, M.V. 2017. Improving Professional Competence of the Staff as a Strategic Factor for Sustainable Development of Companies. Journal of Business and Retail Management Research, 12(1), 132-142.
[6] Federal Agency for Technical Regulation and Metrology. 2017. Perechen natsionalnykh standartov i informatsionno-tekhnicheskikh spravochnikov [List of National Standards and Information and Technical Guides]. (accessed November 3, 2017).
[7] Galbraith, J.K. 1967. The New Industrial State. Princeton University Press: 576.
[8] Kumar, K. 2009. From Post-Industrial to Post-Modern Society: New Theories of the Contemporary World. John Wiley & Sons: 304.
[9] Miles, I. 1993. Services in the New Industrial Economy. Futures, 25(6), 653-672.
[10] Peltier, T.R. 2013. Information Security Fundamentals (2nd ed.). CRC Press: 438.
[11] Peltier, T.R. 2016. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management. CRC Press: 312.
[12] Petter, S., DeLone, W., and McLean, E.R. 2013. Information Systems Success: The Quest for the Independent Variables. Journal of Management Information Systems, 29(4), 7-62.
[13] Rhee, H.-S., Kim, C., Ryu, Y.U. 2009. Self-Efficacy in Information Security: Its Influence on End Users' Information Security Practice Behavior. Computers & Security, 28(8), 816-826.
[14] Safa, N.R., Solms, R. von, and Furnell, S. 2016. Information Security Policy Compliance Model in Organizations. Computers & Security, 56, 70-82.
[15] Shanguin, V. 2017. Zashchitainformatsii v kompyuternykhsistemakhisetyakh [Data Protection in Computer Systems and Networks]. Moscow: Litres: 585.
[16] Sobranie Zakonodatelstva Rossiiskoi Federatsii [SZ RF] [Collection of Legislation of the Russian Federation] 2017, No. 42. (accessed November 3, 2017).
[17] Solms, R. von, and Niekerk, J. 2013. From Information Security to Cyber Security. Computers & Security, 38, 97-102.
[18] Stalder, F. 2006. Manuel Castells: The Theory of the Network Society. Polity: 255.
[19] Teoh, C.S., Mahmood, A.K. 2017. National Cyber Security Strategies for Digital Economy. In 5th International Conference on Research and Innovation in Information Systems (ICRIIS), Langkawi, 16-17 July 2017 (pp. 1-6). IEEE.
[20] Toffler, A. 1981. Future Shock: The Third Wave. Bantam Book: 537.
How to Cite
FROLOVA, Evgenia Evgenevna et al. Information Security of Russia in the Digital Economy: The Economic and Legal Aspects. Journal of Advanced Research in Law and Economics, [S.l.], v. 9, n. 1, p. 89-95, sep. 2018. ISSN 2068-696X. Available at: <>. Date accessed: 02 oct. 2022. doi: