z-logo
open-access-imgOpen Access
State Information Security Policy (Comparative Legal Aspect)
Author(s) -
Viacheslav Dziundziuk,
Yevgen Kotukh,
Оlenа Krutii,
Віталій Павлович Солових,
Oleksandr A. Kotukov
Publication year - 2021
Publication title -
cuestiones políticas/cuestiones políticas
Language(s) - English
Resource type - Journals
eISSN - 2542-3185
pISSN - 0798-1406
DOI - 10.46398/cuestpol.3971.08
Subject(s) - information security , information security management , state (computer science) , public administration , european union , national security , information security standards , security policy , political science , business , computer security , network security policy , security information and event management , cloud computing security , international trade , computer science , law , security service , cloud computing , algorithm
The rapid development of information technology and the problem of its rapid implementation in all spheres of public life, the growing importance of information in management decisions to be made by public authorities, a new format of media — these and other factors urge the problem of developing and implementing quality state information security policy. The aim of the article was to conduct a comparative analysis of the latest practices of improving public information security policies in the European Union, as well as European countries such as Poland, Germany, Great Britain, and Ukraine. The formal-logic, system-structural and problem-theoretical methods were the leading methodological tools. The analysis of regulatory legal acts showed that there is a single concept of international information security at the global and regional levels, which requires additional legal instruments for its implementation. It is stated that the reform of national information security policies has a direct impact on the formation of a single global information space. According to the results of the study, it is substantiated that the United Kingdom is characterized by the most promising information security policy.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here