Abstract

According to art. 8 the Act of Ukraine “On State secrets” includes information on defence, the economy, science and technology, foreign relations, state security and law enforcement. The inclusion of information in the above-mentioned are as realizes only the necessary conditions for classifying such information as secret. The final decision on restricting access to information shall be taken on the basis of an assessment of the level of damage that may be caused to the national security of Ukraine in the event of the disclosure of information, and the appropriateness of such a decision on the part of the State expert on secrecy. In accordance with the requirements of the laws and regulations, the conditions for classifying information as a State secret are complex and are determined on the basis of the criteria for possible damage to the national security of Ukraine as a result of the disclosure of such information, and the criteria for secrecy. When using the expert assessment method, the expert determines the criteria by which the information is evaluated to determine the level of damage to Ukraine’s national security. These criteria are based on the expert’s subjective judgement, that is, the determination of qualitative estimates of information. On the basis of the above, expert methods are based solely on the assessments made by experts on the object of assessment, which they have thoroughly examined. In such a case, the way information is evaluated remains clearly uncertain and not sufficiently quantified. Quantitative assessments of the information make it possible to objectively assess the level of harm to Ukraine’s national security and to minimize the level of subjectivity during this process. The results of this work can be implemented in the form of a specialized software module to determine the level of competence of the person participating in the information assessment procedure. So, efficient and high-quality processing of expert data to a large extent determines the correctness and correctness of the information analysis.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.