Methodological foundations of information security research
-
Published:2023-02-28
Issue:1
Volume:6
Page:
-
ISSN:2617-4162
-
Container-title:Social Legal Studios
-
language:
-
Short-container-title:SLS
Author:
Yesimov Serhii,Borovikova Vitalina
Abstract
The lack of an established approach to methodological research in information security determines the further development of scientific knowledge and changes in paradigms and becomes especially relevant considering the aggression of the Russian Federation and the need to strengthen the information security of Ukraine. The purpose of this study was to identify the principles of information security research methodology. To fulfil this purpose, general philosophical methods of investigating legal phenomena were applied, namely the analysis of corresponding legislation and theoretical solutions. This paper, considering the latest theory of state and law and information law of Ukraine, considering the current legislation and regulatory requirements of the European Union, outlined abstract and logical aspects of the methodological foundations of information security research in the context of digital transformation and Russian information expansion. It was noted that addressing the topic of interdisciplinary research is closely related to a fundamentally new historical situation, which reveals the construction of information relations of a new type between social groups, covering philosophy, political science, sociology, economics, and law. This study considered the activity-based, system-structural, system-functional, informational, integration, predictive, methodological, and paradigmatic scientific approaches to the study of legal phenomena. It was indicated that information security is of particular importance for the design of innovative social systems in the context of digital transformation, which requires further scientific research on the methodology of scientific intelligence in information security. The study was aimed at improving the research methods of information security and protection of individuals, society, and the state from destructive informational influence covered by the object of information security.
Publisher
Scientific Journals Publishing House
Reference27 articles.
1. [1] Afonchenko, T.P., Brileva, V.A., Vorobeva, E.M., Gorypa, T.A., Deykalo, E.A., Zapadnyuk, E.A., Zlotnikov, A.G., Isaychikova, N.I., Konnova, E.V., Konovalova, Zh.Ch., Kopytkova, N.V., Mozhaeva, L.E., Nabatova, A.E., Pasovets, E.Yu., Senkova, T.V., Sinitsa, I.M., Tomashevskiy, K.L., Usova, E.I., Esmantovich, I.I., & Yaroshevich, E.A. (2020). Interdisciplinary research in the field of human rights (2nd ed.). Minsk: Ekoperspektiva. 2. [2] Althonavan, A., & Andronache, A. (2018). Shifting from information security towards a cybersecurity paradigm. In ICIME 2018: Proceedings of the 2018 10th International conference on information management and engineering (pp. 68-79). New York: Association for Computing Machinery. doi: 10.1145/3285957.3285971. 3. [3] Babina, V.O., & Kudlaі, I.V. (2022). Information policy and its role in the resolution of interstate conflicts. Politicus, 6, 53-58. doi: 10.24195/2414- 9616.2022-6.9. 4. [4] Balynska, O.M., & Yashchenko, V.A. (2018). Methodology of modern legal science. Lviv: Lviv State University of Internal Affairs. 5. [5] Baran, M. (2021). Information security as a subject of administrative and legal regulation. Social & Legal Studios, 3, 50-56. doi: 10.32518/2617-4162-2021-3-50-56.
|
|