CC..png   

Legal and postal addresses of the publisher: office 1336, 17 Naberezhnaya Severnoy Dviny, Arkhangelsk, 163002, Russian Federation, Northern (Arctic) Federal University named after M.V. Lomonosov

Phone: (818-2) 28-76-18
E-mail: vestnik_gum@narfu.ru
https://vestnikgum.ru/en/

ABOUT JOURNAL

Information Security as a Factor of International Relations in the Arctic Region. Pp. 63–70.

Версия для печати

Section: Philosophy, Sociology, Politology

UDC

[327+316.012+004] (985+100) (045)

Authors

Tamitsky Aleksandr Mikhailovich, Institute of Social, Humanitarian and Political Sciences, Northern (Arctic) Federal University named after M.V. Lomonosov (Arkhangelsk, Russia)

Abstract

The article dwells on the threats and risks in today’s information space and underlines the need for a system of information security both on the national and international levels. The paper analyzes the state of information security in circumpolar countries, including Russia, in the conditions of increasing international cooperation and competition in the Arctic region.

Keywords

Arctic region, information space, information security.

The full-text version of the article can be requested through the university’s library.

References

1. Alieva M.F. Informatsionnaya bezopasnost' kak element informatsionnoy kul'tury [Information Security as an Element of Information Culture]. Vestnik adygeyskogo gosudarstvennogo universiteta. Ser. 1. Regionovedenie: filosofiya, istoriya, sotsiologiya, yurisprudentsiya, politologiya, kul'turologiya, 2012, no. 4, pp. 97–102.
2. Blagoveshchenskiy A. V 2013 godu Rossii poyavyatsya svoi kibervoyska [In 2013 Russia Will Have Her Own Cyberarmy]. Rossiyskaya gazeta, 5 July 2013. Available at: http://www.rg.ru/2013/07/05/cyberwar-site-anons.html (accessed 17 September 2013).
3. Vladimirova T.V. Informatsionnaya bezopasnost': k metodologicheskim osnovaniyam analiza voprosa [Information Security: On the Methodological Elements of Analysing the Issue]. Informatsionnoe obshchestvo, 2012, no. 5, pp. 47–52.
4. The Information Security Doctrine of the Russian Federation: аpproved by President of the Russian Federation Vladimir Putin on 9 September 2000 no. Pr-1895. Rossiyskaya gazeta, 28 September 2000 no. 187 (in Russian).
5. Egorov I. FSB raskinet set' [FSB Will Spread Its Net]. Rossiyskaya gazeta, 20 February 2013 no. 6012.
6. Zhuravlev P.S. Arkticheskaya strategiya Rossii: otsenki, voprosy i problemy realizatsii [Russia’s Arctic Strategy: Estimates, Issues and Problems of Implementation]. Vestnik Severnogo (Arkticheskogo) federalnogo universiteta. Ser.: “Gumanitarnye i sotsial’nye nauki”, 2013, no. 3, pp. 154–160.
7. Fundamentals of the State Policy of the Russian Federation in the Arctic up to 2020 and Beyond: аpproved by President of the Russian Federation on 18 September 2008. Available at: http://base.consultant.ru/cons/cgi/online. cgi?req=doc;base=LAW;n=119442 (accessed 11 June 2013) (in Russian).
8. On the Development of a Statewide System for the Detection, Prevention and Response to Cyberattacks Against Information Resources of the Russian Federation: Decree of the President of the Russian Federation of 15 January 2013. no. 31s. Sobranie zakonodatel'stva Rossiyskoy Federatsii, 2013, no. 3, Art. 178 (in Russian).
9. National Security Strategy of the Russian Federation to 2020: Decree of the President of the Russian Federation of 12 May 2009. no. 537. Sobranie zakonodatel'stva Rossiyskoy Federatsii, 2009, no. 20, Art. 2444 (in Russian).
10. Regulations on Cooperation of the the CSTO Member States in the Field of Information Security (December 2010). Available at: http://www.busines-spravo.ru/Docum/DocumShow_DocumID_181116.html (accessed 11 September 2013) (in Russian).
11. The Program of Joint Actions to Create a System of Information Security of the CSTO Member States (September 2008). Available at: http://zakon4.rada.gov.ua/laws/show/997_l67 (accessed 11 September 2013) (in Russian).
12. Tsygichko V.N., Smolyan G.L., Chereshkin D.S. Informatsionnoe oruzhie kak geopoliticheskiy faktor i instrument silovoy politiki [Information Weapons as a Geopolitical Factor and a Tool of Power Politics]. Moscow, 1997. 31 p.
13. Chugunov A. Indeks OON gotovnosti stran k elektronnomu pravitel'stvu: sootnesenie s pravitel'stvennymi dannymi [United Nations Index of Readiness to the Electronic Government: Correlation with the Russian Data]. Informatsionnye resursy Rossii, 2009, no. 1, pp. 22–24.
14. Canada’s Cyber Security Strategy: For a Stronger and More Prosperous Canada, 2010. Available at: http://publications. gc.ca/collections/collection_2010/sp-ps/PS4-102-2010-eng.pdf (accessed 15 August 2013).
15. Danish Defence Agreement 2010–2014. Available at: http://www.fmn.dk/nyheder/Documents/ (accessed 15 August 2013).
16. Finland’s Cyber Security Strategy, 2013. Available at: http://www.yhteiskunnanturvallisuus.fi/ (accessed 15 August 2013).
17. Global Security Map. Available at: http://globalsecuritymap.com (accessed 1 October 2013).
18. International Strategy for Cyberspace. Prosperity, Security, and Openness in a Networked World, 2011. Available at: http://www.whitehouse.gov/sites/default/files/rss_vie-wer/international_strategy_for_cyberspace.pdf (accessed 15 August 2013).
19. Life Is for Sharing. Available at: http://www.sicherheitstacho.eu (accessed 1 October 2013).
20. MacAskill E., Borger J., Hopkins N., Davies N., Ball J. GCHQ Taps Fibre-Optic Cables for Secret Access to World's Communications. The Guardian, 21 June 2013.
21. Nasjonal strategi for informasjonssikkerhet, 2012. Available at: http://www.regjerin-gen.no/pages/38169727/ handplannasstratinfosikk2012.pdf (accessed 15 August 2013).
22. National Strategy for Information Sharing and Safeguarding, 2012. Available at: http://www.whitehouse.gov/sites/default/files/docs/2012sharingstrategy_1.pdf (accessed 15 August 2013).
23. Norton Cybercrime Report 2012. Available at: http://www.norton.com/2012cybercrimereport (accessed 15 August 2013).
24. Qiang X. How China’s Internet Police Control Speech on the Internet. Available at: http://www.rfa.org/english/commentaries/china_internet-11242008134108.html (accessed 10 September 2013).
25. Strategy for Information Security in Sweden 2010–2015. Available at: https://www.msb.se/RibData/Filer/ pdf/25940.PDF (accessed 15 August 2013).
26. Strategy to Improve Internet Security in Sweden, 2006. Available at: http://www.pts.se/upload/Documents/EN/ Strategy_Internet_security_2006_12_July_2006.pdf (accessed 15 August 2013).
27. The Cyber Index. International Security Trends and Realities. New York, Geneva, 2013. 140 p.
28. The Economic Impact of Cybercrime and Cyber Espionage. Report. July 2013. Available at: http://csis.org/files/publication/60396rpt_cybercrime-cost_0713_ph4.pdf (accessed 15 August 2013).
29. The Global Information Technology Report 2013. Available at: http://www3.wefo-rum.org/docs/WEF_GITR_ Report_2013.pdf (accessed 10 April 2013).
30. The National Strategy to Secure Cyberspace, 2003. Available at: http://www.fas.org/irp/threat/cyber/strategy.pdf (accessed 15 August 2013).
31. U.S. Department of Defense, Cyber Command Fact Sheet, 21 May. Available at: http://www.stratcom.mil/factsheets/ Cyber_Command (accessed 17 August 2013).
32. United Nations E-Government Survey 2012: E-Government for the People. New York, 2012.
33. Valtioneuvoston periaatepäätös kansalliseksi tietoturvastrategiaksi (Government Resolution on National Information Security Strategy), 2008. Available at: http://www.lvm.fi/c/document_library (accessed 15 August 2013).

Make a Submission


знак_анг.png

INDEXED IN:      

Elibrary.ru

infobaseindex

logotype.png


Логотип.png


Лань

OTHER NArFU JOURNALS: 

Journal of Medical and Biological
Research

Forest Journal 
Лесной журнал 

Arctic and North