In the study presented here, the author attempts to answer questions about the acquisition of information by prison staff that may have a bearing on their safety related to their service and work, the safety of isolated persons, and the general public. Internal regulations of the Prison Service (PS) related to the process of obtaining, processing, collecting and using information are indicated and discussed. Based on the research, the knowledge and action of PS officers in this area was analysed. The article aims to show information as an important factor directly affecting the security of penitentiary units.
The article presents the methodological components of the system of ensuring the economic security of business at the micro and macro levels. The components of the impact on the economic security of the business are identified. A corporate scorecard has been developed to form an economic security information mechanism using a system of balanced indicators. A process approach to information security of economic security using a system of balanced indicators is also formed. A methodological approach to the functional division of work in the project team is developed having the aim of developing the approaches to managing information security of business. A map of using information for economic security on the basis of a balanced scorecard has been developed. The expediency of the model of choice of alternatives of information management in the system of ensuring economic security of business is formed and calculated. The mechanism of adopting approaches to information management for the purpose of ensuring economic security of business is considered as a special kind and relatively independent, local subsystem.
The authors have conducted a retrospective analysis of the historical and logical stages of establishing the financial reporting system in the Russian Federation for determining the development direction of public reporting of economic entities and justifying the need to prepare integrated corporate reporting that meets the information needs of interested parties. The use of a paradigm approach made it possible to justify the regularities of the formative stages of accounting environment, to distinguish the key foundations of complex accounting information, to determine the current needs of business informatization and preparation of integrated corporate reporting.
The analysis of integrated corporate reporting relevance, the usefulness of disclosing financial and non-financial indicators, that are essential in the reporting to assess business performance and create a value chain, is the subject of study. The authors found that the leading indicators of economic activity of interest to external and internal users of the reporting information are related to the investment attractiveness of the company, its sustainable development, efficiency, and profitability. Therefore, to analyze value creation efficiency, it is necessary to expand the range of assessment with the following cost factors: organization, customers, society, natural environment, innovation, risks, and corporate management. should be classified into the following groups related to the company’s performance: income-generating (possibility of growth, competitiveness, cost of capital, risks) and expense-generating (labor costs, transaction losses, cost of capital, risk management). In this paper, the authors suggest a model for an objective assessment of the company’s ability to create added value, given the management segments (economic, environmental, social) and various forms of capital, which allows determining the company’s business advantages, directions for maximizing opportunities and minimizing risks for each capital used and reducing the information gap between financial and non-financial information, as well as improving business transparency.
The article is devoted to study of information security as a challenge of modern development of information and computer technologies. It was found that achievement of a satisfactory level of information security, which is a state of safety of balanced important interests of an individual, society and state against internal and external threats in the information sphere, is possible based on economic, organizational, technical, legal, psychological and other methods. Existing threats to the information security in Ukraine have been identified. The concept and essence of hybrid war as one of the threats to protection of information interests of an individual, society and the state are considered separately. A conclusion was made about the expediency of supplementing the Information Security Doctrine of Ukraine with such a threat as a hybrid war, which actually takes place in the east of the country. A system of information security components in Ukraine has been disclosed, among which a particular attention has been paid to the Ministry of Information Policy of Ukraine and the State Agency for Electronic Governance of Ukraine. In order to improve the mechanism of protection of the information space of Ukraine, it is proposed to differentiate at the legislative level the concepts of “information security” and “cybersecurity”, since their understanding is the basis for the formulation and implementation of the state information policy, improve international cooperation between states to exchange experience, as well as to involve general public to protect the information space.
The article is devoted to the study of cybersecurity as a component of the national security of the state. It has been established that the development of information and telecommunication technologies testifies to the progress of society but also determines the security risks of their use. In particular, this refers to a cyberattack and other cyberthreats. It has been determined that cybersecurity should be understood as the protection of the vital interests of a person and citizen, society and the state when using cyberspace. An important role in ensuring such a security is played by the cyberthreat protection mechanism, which provides for the development and adoption of a cybersecurity strategy, the creation of a national cybersecurity system, strengthening of the security and defense sector’s capabilities to effectively combat military cyberthreats, cyberterrorism, and ensuring cyberprotection of state electronic information resources and information infrastructure. The existence of the Cybersecurity Strategy of Ukraine and other acts as the legal basis for countering cyberthreats has been noted. In turn, the national cybersecurity system provides for the activities of the Ministry of Defense of Ukraine, the State Service for Special Communications and Information Protection of Ukraine, the Security Service of Ukraine, the National Police of Ukraine, the National Bank of Ukraine, and intelligence agencies. In turn, in France, Finland, Germany, the central place in the cybersecurity system belongs to the National Cybersecurity Agency, the National Cybersecurity Center, and the Cyberdefense Center, respectively. Despite Ukraine’s significant steps towards increasing cybersecurity in the state, there is no public-private cooperation in this area. Due to this, authorized entities should establish cooperation with the non-state sector and establish effective institutional and legal instruments for such cooperation. At the same time, the issue of public-private cooperation in the field of cybersecurity is relevant for all states of the world in view of the global nature of existing cyberthreats.
Information today is becoming increasingly important, especially in the era of progressive computerization and advancements in the area of computer technology. At the same time, there are also increasingly more threats to this category, of which the most important are criminal offenses against information protection. These are enforced by competent state authorities whose activity is necessary to maintain the proper level of security. The article deals mainly with the phenomenon of crime involving infringement of information, and its scale, using for this purpose the statistical data collected by the Polish National Police Headquarters.
The internet space is the most important and affluent source of climate change related information. Hoverer information content are not always satisfying and threat of fake news and disinformation are very realistic. The analysis included top10 search results of four phrases (Climate change, Global warming, Adaptation to climate change and Climate change policy) using Google search engine. The phrases were searched in 11 Baltic Sea Region (BSR) languages and in the Ukrainian and English languages. The results revealed that climate change disinformation and misinterpretation exists on the internet. Mostly it displayed in indirect forms such as old information, existence of junksites, advertisements, unequal share by main actors (government, mass media, etc.). Moreover, on Eastern BSR languages, internet search results of climate change information are less convenient comparing to western BSR languages. The usage of multilanguage approach in Wikipedia pages could be one of the freshest and most reliable sources of information about climate change.
In the article, on the basis of comparative-legal analysis, there is explored the content of concept “commercial secret”, considered the organisational, administrative (management), and legal measures of ensuring the safety of commercial secret, and criteria of referring information to commercial secret. The conditions of ensuring the confidentiality safety of commercial information, the methodology of selecting data constituting commercial secret, and information protection measures are sequentially analysed; the evaluation of the role of administrative information in competitive activity and authorization-based information access system is provided. In the article also the legal nature and kinds of agreements about confidentiality, as well as the content of some of them, measures of protection of commercial secret from disclosure, among which the main place is occupied by liability measures applied on law-breakers, and also basic questions on protection of commercial secret after termination of labour relationship with employee, are studied in details.
The world faces new challenges and threats to international security environment, among which a key role play different types of cyberthreats. This follows, primarily the global links in a cyberspace in terms of critical infrastructure of the state’s and intergovernment’s objects in the international security environment and the fact that the cyberaggressor’s tools are becoming cheaper, and their skills are more and more advanced. There is an urgent need for the analysis of present and future cyberthreats in the security environment, to understand their impact on everone, States, Nations and organizations and develop effective methods of response in this highly complex reality. The article presents the concept of defining of main types of cyberhreats (i.e. information warfare, cyberterrorism, cybercrime and cyberespionage) on the base of the new theoretical approach of modern security environment model.