Information interventions as a new dimension of Ukraine's cyber-vulnerability

https://doi.org/10.21744/lingcure.v5nS2.1337

Authors

  • Ihor V. Diorditsa Kyiv National University of Technologies and Design, Kyiv, Ukraine
  • Armenui A. Telestakova Kyiv National University of Technologies and Design, Kyiv, Ukraine
  • Olga M. Koval Kyiv National University of Technologies and Design, Kyiv, Ukraine
  • Olha A. Nazarenko National Academy of Internal Affairs, Kyiv, Ukraine
  • Andrii A. Nastiuk Academy of Labour, Social Relations and Tourism, Kyiv, Ukraine

Keywords:

cyber security, cyberspace, cyberwar, hybrid warfare, information society of Ukraine

Abstract

In the article, the author analyzes information interventions as threats to the cybernetic security of Ukraine. The relevance of this study is due to the fact that large number of socially dangerous acts aimed at harming state interests can now be used both in the information space and in purely cyberspace. Since such actions are performed using computer systems and performed in cyberspace, we propose to define this type of intervention as “cybernetic intervention”, describing it as a separate group of socially dangerous acts aimed at damaging the information infrastructure of States, vital areas of society's existence. The main aim of this study is to analyze information intervention as a threat to cyber security of Ukraine. The interpretation of terms that make up the conceptual and categorical apparatus of the subject of research is carried out. A narrow definition of the concept of “information intervention” is proposed as the violent intervention of one or more subjects of information relations in the activities of another or others, and a broad definition – a certain set of aggressive actions that are aimed at influencing public opinion and decision-making within one or another country and achieving clearly defined results.

Downloads

Download data is not yet available.

References

Alhayani, B., Mohammed, H. J., Chaloob, I. Z., & Ahmed, J. S. (2021). Effectiveness of artificial intelligence techniques against cyber security risks apply of IT industry. Materials Today: Proceedings. https://doi.org/10.1016/j.matpr.2021.02.531

Aristova, I. V. (2000). Derzhavna informatsiyna polityka: organizatsiyno-pravovi aspekty: monografia.[State Information Policy: Organizational and Legal Aspects: Monograph] For Collegiate. Ed. OM Bandurka. Kharkiv: University of Internal Affairs.

Aristova, I. V. (2002). State information policy and its implementation in the activity of law-enforcement bodies of Ukraine: organizational and legal bases. Kharkiv: National University of Internal Affairs.

Baskakov, A. G., Derbushev, A. V., & Shcherbakov, A. O. (2011). The method of similar operators in the spectral analysis of non-self-adjoint Dirac operators with non-smooth potentials. Izvestiya: Mathematics, 75(3), 445.

Cohen, F. (1987). Computer viruses: theory and experiments. Computers & security, 6(1), 22-35.

Cohen, F. (2002). Terrorism and cyberspace. Network Security, 2002(5), 17-19. https://doi.org/10.1016/S1353-4858(02)05015-8

Coventry, L., & Branley, D. (2018). Cybersecurity in healthcare: a narrative review of trends, threats and ways forward. Maturitas, 113, 48-52. https://doi.org/10.1016/j.maturitas.2018.04.008

Diorditsa, I. V., Telestakova, A. A., Koval, O. M., Nazarenko, O. A., & Nastiuk, A. A. (2020). INFORMATION INTERVENTIONS AS A NEW DIMENSION OF UKRAINE'S CYBER-VULNERABILITY. Revista Gênero e Interdisciplinaridade, 1(01).

Elmaghraby, A. S., & Losavio, M. M. (2014). Cyber security challenges in Smart Cities: Safety, security and privacy. Journal of advanced research, 5(4), 491-497. https://doi.org/10.1016/j.jare.2014.02.006

Eroshenko, O. (2012). The great interpretive dictionary of modern Ukrainian. Donetsk: Gloria Trade.

Franch, B., Vermote, E. F., Becker-Reshef, I., Claverie, M., Huang, J., Zhang, J., ... & Sobrino, J. A. (2015). Improving the timeliness of winter wheat production forecast in the United States of America, Ukraine and China using MODIS data and NCAR Growing Degree Day information. Remote Sensing of Environment, 161, 131-148. https://doi.org/10.1016/j.rse.2015.02.014

Hepsiba, N., Subhashini, A., Raju, M., & Rao, Y. P. (2016). Changing role of teachers in the present society. International Research Journal of Engineering, IT and Scientific Research (IRJEIS), 2(9).

Hysa, O. A., Stepaniuk, I. V., Vaniuha, L. S., Zhorniak, B. Y., & Rehulich, I. V. (2021). Jagiellonianism in Poland and Ukraine as a factor of university education and a cultural and historical phenomenon. Linguistics and Culture Review, 5(S2), 68-79. https://doi.org/10.37028/lingcure.v5nS2.1331

Kshetri, N. (2005). Pattern of global cyber war and crime: A conceptual framework. Journal of International Management, 11(4), 541-562. https://doi.org/10.1016/j.intman.2005.09.009

Lipkan, V. A. (2010). White paper theoretical concept. Entrepreneurship, Economy and Law, 9, 80-83.

Lipkan, V. A. (Ed.). (2007). Management theory in law enforcement. Kyiv: CST.

Lipkan, V. A., & Cherepovsky, K. P. (2014). Incorporation of the information legislation of Ukraine. Kyiv: OS Lipkan.

Lipkan, V. A., Maksimenko, Yu.E., & Zhelikhovsky, V.M. (2006). Information security of Ukraine in the context of European integration. Kyiv: CST.

Loginov, O. V. (2005). Administrative and legal support of information security of executive authorities. Kyiv: National Academy of Internal Affairs of Ukraine.

Mikhodyuk, O. S., Zavarzin, G. A., & Ivanovsky, R. N. (2008). Transport systems for carbonate in the extremely natronophilic cyanobacterium Euhalothece sp. Microbiology, 77(4), 412-418.

Nadolski, M., & Fairbanks, J. (2019). Complex systems analysis of hybrid warfare. Procedia Computer Science, 153, 210-217. https://doi.org/10.1016/j.procs.2019.05.072

Nelson, M. (1997). Building trust in cyberspace. The International Information & Library Review, 29(2), 153-157. https://doi.org/10.1006/iilr.1997.0043

Paziura, N. V., Kodalashvili, O. B., Bozhok, O. S., Romaniuk, V. L., & Zlatnikov, V. H. (2021). English teaching in distant education policy development: Ukrainian aspect. Linguistics and Culture Review, 5(S2), 121-136. https://doi.org/10.37028/lingcure.v5nS2.1335

Petrunko, O. V. (2013). Socialization resources and risks of an aggressive media environment.

Pocheptsov, G. (2013b). Information wars in closed and open systems.

Pocheptsov, H. (2014). “Russia and Ukraine and their communicates of propagandistic possibilities are presented Russia and Ukraine in comparing their communicativepropaganda capabilities.

Pocheptsov, H. H. (2013). The meanings of the information are viiny. Information suspension. 18.21–27.

Rudnik, L. I. (2015). Right to access information. Kyiv: National University of Life and Environmental Sciences of Ukraine.

Rutkin, A. (2016). Cyberwar becomes official. https://doi.org/10.1016/S0262-4079(16)31139-3

Savinova, N. (2012). Cybernetic intervention: on issues of origin and need of criminalization in the conditions of formation and development of information society.

Singh, S. (2016). IP security. International Research Journal of Management, IT and Social Sciences, 3(3), 53-64.

Sopilko, I. M. (2015). Information threats and security of modern Ukrainian society. Legal Bulletin, 1(34), 75-80.

Sopilko, N. Y., & Navrotskaya, N. A. (2013). Russia and Ukraine in the Context of Development of Innovation and Investment Cooperation. Upravlenec, (3).

Tantsiura, V. I. (2008). Political history of Ukraine. Kyiv: Academic.

Tolubko, V., Berkman, L., Komarova, L., & Pokhabova, I. (2015, October). Miniminno and minimaksno optimum control systems of communication networks. In 2015 Second International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T) (pp. 63-64). IEEE.

Tsimbalyuk, V. S. (2010). Information law (fundamentals of theory and practice). Kyiv: Education of Ukraine.

Tsimbalyuk, V. S. (2011). Information law: conceptual provisions for the codification of information law. Kyiv: Education of Ukraine.

Tsimbalyuk, V. S. (Ed.). (2004). Fundamentals of information law of Ukraine. Kyiv: Znannya.

Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. computers & security, 38, 97-102. https://doi.org/10.1016/j.cose.2013.04.004

Wang, W., & Lu, Z. (2013). Cyber security in the smart grid: Survey and challenges. Computer networks, 57(5), 1344-1371. https://doi.org/10.1016/j.comnet.2012.12.017

Zaliznyak, L. L. (2019). History of Indoeuropian Studies in Ukraine. Arheologia, (2), 5-18.

Zaporozhets, O. (2014). Becoming a Subway User: Managing Affects and Experiences. Higher School of Economics Research Paper No. WP BRP, 52.

Published

2021-07-18

How to Cite

Diorditsa, I. V., Telestakova, A. A., Koval, O. M., Nazarenko, O. A., & Nastiuk, A. A. (2021). Information interventions as a new dimension of Ukraine’s cyber-vulnerability. Linguistics and Culture Review, 5(S2), 152-166. https://doi.org/10.21744/lingcure.v5nS2.1337