Information interventions as a new dimension of Ukraine's cyber-vulnerability
Keywords:
cyber security, cyberspace, cyberwar, hybrid warfare, information society of UkraineAbstract
In the article, the author analyzes information interventions as threats to the cybernetic security of Ukraine. The relevance of this study is due to the fact that large number of socially dangerous acts aimed at harming state interests can now be used both in the information space and in purely cyberspace. Since such actions are performed using computer systems and performed in cyberspace, we propose to define this type of intervention as “cybernetic intervention”, describing it as a separate group of socially dangerous acts aimed at damaging the information infrastructure of States, vital areas of society's existence. The main aim of this study is to analyze information intervention as a threat to cyber security of Ukraine. The interpretation of terms that make up the conceptual and categorical apparatus of the subject of research is carried out. A narrow definition of the concept of “information intervention” is proposed as the violent intervention of one or more subjects of information relations in the activities of another or others, and a broad definition – a certain set of aggressive actions that are aimed at influencing public opinion and decision-making within one or another country and achieving clearly defined results.
Downloads
References
Alhayani, B., Mohammed, H. J., Chaloob, I. Z., & Ahmed, J. S. (2021). Effectiveness of artificial intelligence techniques against cyber security risks apply of IT industry. Materials Today: Proceedings. https://doi.org/10.1016/j.matpr.2021.02.531
Aristova, I. V. (2000). Derzhavna informatsiyna polityka: organizatsiyno-pravovi aspekty: monografia.[State Information Policy: Organizational and Legal Aspects: Monograph] For Collegiate. Ed. OM Bandurka. Kharkiv: University of Internal Affairs.
Aristova, I. V. (2002). State information policy and its implementation in the activity of law-enforcement bodies of Ukraine: organizational and legal bases. Kharkiv: National University of Internal Affairs.
Baskakov, A. G., Derbushev, A. V., & Shcherbakov, A. O. (2011). The method of similar operators in the spectral analysis of non-self-adjoint Dirac operators with non-smooth potentials. Izvestiya: Mathematics, 75(3), 445.
Cohen, F. (1987). Computer viruses: theory and experiments. Computers & security, 6(1), 22-35.
Cohen, F. (2002). Terrorism and cyberspace. Network Security, 2002(5), 17-19. https://doi.org/10.1016/S1353-4858(02)05015-8
Coventry, L., & Branley, D. (2018). Cybersecurity in healthcare: a narrative review of trends, threats and ways forward. Maturitas, 113, 48-52. https://doi.org/10.1016/j.maturitas.2018.04.008
Diorditsa, I. V., Telestakova, A. A., Koval, O. M., Nazarenko, O. A., & Nastiuk, A. A. (2020). INFORMATION INTERVENTIONS AS A NEW DIMENSION OF UKRAINE'S CYBER-VULNERABILITY. Revista Gênero e Interdisciplinaridade, 1(01).
Elmaghraby, A. S., & Losavio, M. M. (2014). Cyber security challenges in Smart Cities: Safety, security and privacy. Journal of advanced research, 5(4), 491-497. https://doi.org/10.1016/j.jare.2014.02.006
Eroshenko, O. (2012). The great interpretive dictionary of modern Ukrainian. Donetsk: Gloria Trade.
Franch, B., Vermote, E. F., Becker-Reshef, I., Claverie, M., Huang, J., Zhang, J., ... & Sobrino, J. A. (2015). Improving the timeliness of winter wheat production forecast in the United States of America, Ukraine and China using MODIS data and NCAR Growing Degree Day information. Remote Sensing of Environment, 161, 131-148. https://doi.org/10.1016/j.rse.2015.02.014
Hepsiba, N., Subhashini, A., Raju, M., & Rao, Y. P. (2016). Changing role of teachers in the present society. International Research Journal of Engineering, IT and Scientific Research (IRJEIS), 2(9).
Hysa, O. A., Stepaniuk, I. V., Vaniuha, L. S., Zhorniak, B. Y., & Rehulich, I. V. (2021). Jagiellonianism in Poland and Ukraine as a factor of university education and a cultural and historical phenomenon. Linguistics and Culture Review, 5(S2), 68-79. https://doi.org/10.37028/lingcure.v5nS2.1331
Kshetri, N. (2005). Pattern of global cyber war and crime: A conceptual framework. Journal of International Management, 11(4), 541-562. https://doi.org/10.1016/j.intman.2005.09.009
Lipkan, V. A. (2010). White paper theoretical concept. Entrepreneurship, Economy and Law, 9, 80-83.
Lipkan, V. A. (Ed.). (2007). Management theory in law enforcement. Kyiv: CST.
Lipkan, V. A., & Cherepovsky, K. P. (2014). Incorporation of the information legislation of Ukraine. Kyiv: OS Lipkan.
Lipkan, V. A., Maksimenko, Yu.E., & Zhelikhovsky, V.M. (2006). Information security of Ukraine in the context of European integration. Kyiv: CST.
Loginov, O. V. (2005). Administrative and legal support of information security of executive authorities. Kyiv: National Academy of Internal Affairs of Ukraine.
Mikhodyuk, O. S., Zavarzin, G. A., & Ivanovsky, R. N. (2008). Transport systems for carbonate in the extremely natronophilic cyanobacterium Euhalothece sp. Microbiology, 77(4), 412-418.
Nadolski, M., & Fairbanks, J. (2019). Complex systems analysis of hybrid warfare. Procedia Computer Science, 153, 210-217. https://doi.org/10.1016/j.procs.2019.05.072
Nelson, M. (1997). Building trust in cyberspace. The International Information & Library Review, 29(2), 153-157. https://doi.org/10.1006/iilr.1997.0043
Paziura, N. V., Kodalashvili, O. B., Bozhok, O. S., Romaniuk, V. L., & Zlatnikov, V. H. (2021). English teaching in distant education policy development: Ukrainian aspect. Linguistics and Culture Review, 5(S2), 121-136. https://doi.org/10.37028/lingcure.v5nS2.1335
Petrunko, O. V. (2013). Socialization resources and risks of an aggressive media environment.
Pocheptsov, G. (2013b). Information wars in closed and open systems.
Pocheptsov, H. (2014). “Russia and Ukraine and their communicates of propagandistic possibilities are presented Russia and Ukraine in comparing their communicativepropaganda capabilities.
Pocheptsov, H. H. (2013). The meanings of the information are viiny. Information suspension. 18.21–27.
Rudnik, L. I. (2015). Right to access information. Kyiv: National University of Life and Environmental Sciences of Ukraine.
Rutkin, A. (2016). Cyberwar becomes official. https://doi.org/10.1016/S0262-4079(16)31139-3
Savinova, N. (2012). Cybernetic intervention: on issues of origin and need of criminalization in the conditions of formation and development of information society.
Singh, S. (2016). IP security. International Research Journal of Management, IT and Social Sciences, 3(3), 53-64.
Sopilko, I. M. (2015). Information threats and security of modern Ukrainian society. Legal Bulletin, 1(34), 75-80.
Sopilko, N. Y., & Navrotskaya, N. A. (2013). Russia and Ukraine in the Context of Development of Innovation and Investment Cooperation. Upravlenec, (3).
Tantsiura, V. I. (2008). Political history of Ukraine. Kyiv: Academic.
Tolubko, V., Berkman, L., Komarova, L., & Pokhabova, I. (2015, October). Miniminno and minimaksno optimum control systems of communication networks. In 2015 Second International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T) (pp. 63-64). IEEE.
Tsimbalyuk, V. S. (2010). Information law (fundamentals of theory and practice). Kyiv: Education of Ukraine.
Tsimbalyuk, V. S. (2011). Information law: conceptual provisions for the codification of information law. Kyiv: Education of Ukraine.
Tsimbalyuk, V. S. (Ed.). (2004). Fundamentals of information law of Ukraine. Kyiv: Znannya.
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. computers & security, 38, 97-102. https://doi.org/10.1016/j.cose.2013.04.004
Wang, W., & Lu, Z. (2013). Cyber security in the smart grid: Survey and challenges. Computer networks, 57(5), 1344-1371. https://doi.org/10.1016/j.comnet.2012.12.017
Zaliznyak, L. L. (2019). History of Indoeuropian Studies in Ukraine. Arheologia, (2), 5-18.
Zaporozhets, O. (2014). Becoming a Subway User: Managing Affects and Experiences. Higher School of Economics Research Paper No. WP BRP, 52.
Published
How to Cite
Issue
Section
Copyright (c) 2021 Linguistics and Culture Review

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.