Information Security of Russia in the Digital Economy: The Economic and Legal Aspects
Abstract
Contemporary realities dictate that technologization, digitalization (transition of the economy and the social sector to digital technologies of functioning and interaction) and the national intellectual capital are the basic competitive advantages of the country that require proper information security. An information security system is a set of corporate rules, standards of work and procedures for ensuring information security formed based on the audit of the company's information system, and the analysis of existing security risks in accordance with requirements of the regulatory documents of the Russian Federation and the provisions of the standards in the field of information security. It is especially important for Russian companies actively interacting with foreign partners. In addressing the problem of information security, the development of the company's unified information security policy occupies a leading place; therefore, this article will be devoted to consideration of these issues.
The authors of the present study proceed from the objective-subjective predetermination of any phenomena and processes of the external world. In this format, the study is based on general scientific methods: systematic analysis and generalization of normative and practical materials; formal and dialectical logic: analysis, synthesis, induction, deduction, hypotheses, analogies; and special methods of legal research: comparative-legal and historical-legal, system analysis and interpretation of legal norms.
Based on the analysis, the following conclusions have been made: currently, the most important direction of the national economy development is the protection of vital human and social interests, the key element of which is information security. This study represents the development of a scientific overview of the modern ways to ensure information security in both applied and legal contexts. This article underlines and examines the problems and economic legal features of ensuring information security in Russia. These materials can be used both in preparation of other scientific research and in the development of guidance documents by the power structures.
References
[2] Castells, M., Himanen, P. 2002. The Information Society and the Welfare State: The Finnish Model. Oxford University Press: 200.
[3] Cavelty, M.D., Mauer, V. 2016. Power and Security in the Information Age: Investigating the Role of the State in Cyberspace. Routledge: 182.
[4] Disterer, G. ISO/IEC 27000, 27001 and 27002 for information security management. Journal of Information Security, 4(02), 92.
[5] Dudin, M.N.,Vysotskaya, N.V. Frolova, E.E, Pukhart, A.A., and Galkina, M.V. 2017. Improving Professional Competence of the Staff as a Strategic Factor for Sustainable Development of Companies. Journal of Business and Retail Management Research, 12(1), 132-142.
[6] Federal Agency for Technical Regulation and Metrology. 2017. Perechen natsionalnykh standartov i informatsionno-tekhnicheskikh spravochnikov [List of National Standards and Information and Technical Guides]. http://www.gost.ru/wps/portal/pages/directions?WCM_GLOBAL_CONTEXT=/gost/GOSTRU/directions/Standardization/standards/Perechen+natcionalnykh+standartov+i+informatcionno-tekhnicheskikh+spravochnikov (accessed November 3, 2017).
[7] Galbraith, J.K. 1967. The New Industrial State. Princeton University Press: 576.
[8] Kumar, K. 2009. From Post-Industrial to Post-Modern Society: New Theories of the Contemporary World. John Wiley & Sons: 304.
[9] Miles, I. 1993. Services in the New Industrial Economy. Futures, 25(6), 653-672.
[10] Peltier, T.R. 2013. Information Security Fundamentals (2nd ed.). CRC Press: 438.
[11] Peltier, T.R. 2016. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management. CRC Press: 312.
[12] Petter, S., DeLone, W., and McLean, E.R. 2013. Information Systems Success: The Quest for the Independent Variables. Journal of Management Information Systems, 29(4), 7-62.
[13] Rhee, H.-S., Kim, C., Ryu, Y.U. 2009. Self-Efficacy in Information Security: Its Influence on End Users' Information Security Practice Behavior. Computers & Security, 28(8), 816-826.
[14] Safa, N.R., Solms, R. von, and Furnell, S. 2016. Information Security Policy Compliance Model in Organizations. Computers & Security, 56, 70-82.
[15] Shanguin, V. 2017. Zashchitainformatsii v kompyuternykhsistemakhisetyakh [Data Protection in Computer Systems and Networks]. Moscow: Litres: 585.
[16] Sobranie Zakonodatelstva Rossiiskoi Federatsii [SZ RF] [Collection of Legislation of the Russian Federation] 2017, No. 42. http://www.szrf.ru/szrf/oglavlenie.phtml?nb=100&issid=1002017042000 (accessed November 3, 2017).
[17] Solms, R. von, and Niekerk, J. 2013. From Information Security to Cyber Security. Computers & Security, 38, 97-102.
[18] Stalder, F. 2006. Manuel Castells: The Theory of the Network Society. Polity: 255.
[19] Teoh, C.S., Mahmood, A.K. 2017. National Cyber Security Strategies for Digital Economy. In 5th International Conference on Research and Innovation in Information Systems (ICRIIS), Langkawi, 16-17 July 2017 (pp. 1-6). IEEE.
[20] Toffler, A. 1981. Future Shock: The Third Wave. Bantam Book: 537.
The Copyright Transfer Form to ASERS Publishing (The Publisher)
This form refers to the manuscript, which an author(s) was accepted for publication and was signed by all the authors.
The undersigned Author(s) of the above-mentioned Paper here transfer any and all copyright-rights in and to The Paper to The Publisher. The Author(s) warrants that The Paper is based on their original work and that the undersigned has the power and authority to make and execute this assignment. It is the author's responsibility to obtain written permission to quote material that has been previously published in any form. The Publisher recognizes the retained rights noted below and grants to the above authors and employers for whom the work performed royalty-free permission to reuse their materials below. Authors may reuse all or portions of the above Paper in other works, excepting the publication of the paper in the same form. Authors may reproduce or authorize others to reproduce the above Paper for the Author's personal use or for internal company use, provided that the source and The Publisher copyright notice are mentioned, that the copies are not used in any way that implies The Publisher endorsement of a product or service of an employer, and that the copies are not offered for sale as such. Authors are permitted to grant third party requests for reprinting, republishing or other types of reuse. The Authors may make limited distribution of all or portions of the above Paper prior to publication if they inform The Publisher of the nature and extent of such limited distribution prior there to. Authors retain all proprietary rights in any process, procedure, or article of manufacture described in The Paper. This agreement becomes null and void if and only if the above paper is not accepted and published by The Publisher, or is with drawn by the author(s) before acceptance by the Publisher.