Бусол О. - Тенденції нормативно-правового забезпечення інформаційної безпеки США (2017)

  ARCHIVE (All issues) /     Content (2017, Issue 46)Ukrainian English

Busol Olena

Trends of Regulatory Legal Support of Information Security in the United States

Abstract: Currently, within the context of globalization, intellectualization of crime, comprehensive cover other social relations by information relations, the international community comes to understanding the need to improve existing, and to develop unified normative-legal acts on international information security regulation. The article, based on analysis of USА laws, defines the main trends of normative-legal ensuring information security of the state. The USA has wide experience of applying information technologies in all spheres of society activity. In conditions of Ukraine’s actions in response to aggression of a foreign state, the American experience of applying information technologies for creation of communication systems and military management, and also high-precision arms is especially important. Information security without exaggeration could be considered as one of the perspective directions of mutually beneficial cooperation between Ukraine and the USA.

Keywords: copyright, academic plagiarism, intellectual property, legal act, higher education, the subjects of scientific and technical activity.



Author(s) citation:
  • Busol Olena (V. I. Vernadsky National Library of Ukraine, Ukraine, Kyiv)

Cite:
Busol Olena (2017). Trends of Regulatory Legal Support of Information Security in the United States. Academic Papers of The Vernadsky National Library of Ukraine, (46) 92-106. (In Ukrainan). doi: https://doi.org/10.15407/np.46.092


References:

  1. Bryzhko, V. (2009). Do pytannia suchasnoi informatsiinoi polityky [To the question of modern information policy]. Visnyk Akademii upravlinnia MVS – Bulletin of the Academy of the Interior Ministry, no. 2, pp. 32–36 [in Ukrainian].
  2. Role of science and technology in the context of international security and disarmament. Report of the First Committee General Assembly. 1998. N 53/579. [in English].
  3. Developments in the field of information and telecommunications in the context of international security. Resolution adopted by the General Assembly. 1999. N 54/49. [in English].
  4. Developments in the field of information and telecommunications in the context of international security. Resolution adopted by the General Assembly. 2000. N 55/28. [in English].
  5. Developments in the field of information and telecommunications in the context of international security. Resolution adopted by the General Assembly on 8 December 2005. N 60/45. [in English].
  6. National Security Strategy of the United States of America. (2010). White House. [in English].
  7. Shamrai, V. O. Informatsiina bezpeka yak skladova natsionalnoi bezpeky Ukrainy [Information security as a component of national security of Ukraine]. [in Ukrainian].
  8. Baranov, A. (2001). Informacionnyj suverenitet ili informacionnaja bezopasnost [Information sovereignty or information security]. Natsionalna bezpeka i oborona – National Security and Defense, no. 1, pp. 70–76 [in Ukrainian].
  9. The Cybcrsecurity Aci of 2009. [in English].
  10. Remarks by (he President on securing our nation’s cyber infrastructure). White House. [in English].
  11. Statement by the President on the White House Organization for Homeland Security. [in English].
  12. Privacy Impact Assessment EINSTEIN Program. (2004). [in English].
  13. National Strategy to Secure Cyberspace. (2003). [in English].
  14. Updating U. S. Federal Cybersecurity Policy and Guidance. (2012). [in English].
  15. Assuring a Trusted and Resilient Information and Communications Infrastructure. White House. [in English].
  16. The Administration’s Priorities on Cybersecurity. White House. [in English].
  17. Cyber Security Strategy Documents. [in English].
  18. The Department of Defense Cyber Strategy. [in English].
  19. International Strategy for Cyberspace. White House. [in English].
  20. Carter, W. A. Zheng, D. E. (2015). The Evolution of Cybersecurity Requirements for the U. S. Financial Industry. [in English].
  21. US Enacts Cybersecurity Information Legislature. [in English].
  22. US cybersecurity: Progress stalled Key findings from the 2015 US State of Cybercrime Survey. (2015). [in English].
  23. US–CERT: Understanding Hidden Threats: Rootkits and Botnets. [in English].