Author:
Okhrimenko Igor,Stepenko Valery,Chernova Olga,Zatsarinnaya Elena
Abstract
AbstractNovel information technologies have facilitated not only the development of new industries, but also brought new opportunities and challenges. The range of challenges includes threats related to the information security of not only the commercial, but also the public sector of the national economy, which can adversely affect its stability and competitiveness. In view of this, the problem of ensuring information security (IS) in the economic sphere is of particular relevance. Despite the abundance of studies on IS, the impact of the information sphere on the country’s economic security has not yet been sufficiently studied. The purpose of this article was to identify and systematize threats posed to economic security by the information environment and determine a set of measures to protect the areas at risk. Within the framework of the study, two interrelated models were built. The first systematized the IS threats and challenges, whereas the second demonstrated those IS threats that are directly connected with the state’s economic security. At the same time, the models developed allowed focusing on the protection of objects potentially under threat. The research quintessence was represented by the development of recommendations directed at preventing and minimizing the negative impact of information sphere threats to economic security. Hence, a diversified ecosystem of information and economic security of the state was created. The study findings and recommendations can be used by officials of government bodies and other organizations to develop regulatory documents related to the strategy of ensuring information and economic security at various levels (state, regional, corporate).
Publisher
Springer Science and Business Media LLC
Subject
Management of Technology and Innovation,Economics and Econometrics,Sociology and Political Science,Information Systems,Management Information Systems
Reference58 articles.
1. Alavi, R., Islam, S., & Mouratidis, H. (2016). An information security risk-driven investment model for analysing human factors. Information & Computer Security, 24(2), 205–227. https://doi.org/10.1108/ICS-01-2016-0006
2. Albeshri, A., & Thayananthan, V. (2018). Analytical techniques for decision making on information security for big data breaches. International Journal of Information Technology & Decision Making, 17(2), 527–545. https://doi.org/10.1142/S0219622017500432
3. Amirov, A., Kozhukhova, M., Koshebaeva, G., Biryukov, V., & Zhiyenbayev, M. (2018). Economic and Energy Security of the Republic of Kazakhstan. International Journal of Energy Economics and Policy, 8(6), 16–21. https://doi.org/10.32479/ijeep.6935
4. Arutyunov, V. V. (2017). Clustering of information-security standards of the Russian Federation. Scientific and Technical Information Processing, 44(2), 125–133. https://doi.org/10.32479/ijeep.6935
5. Azmi, R., Tibben, W., & Win, K. T. (2016). Motives behind cyber security strategy development: a literature review of national cyber security strategy. In Australasian Conference on Information Systems (pp. 1–12). University of Wollongong.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献