Abstract

The analysis of theoretical bases of development and functioning of the state policy in the field of information security has allowed to come to a conclusion that in domestic scientific circles the research of the given question and problems of perfection of mechanisms of maintenance of safety in information space was engaged by a considerable quantity of scientists, in particular: S. Gorova, N. Grabar, M Gutsalyuk, A. Turchak, J. Chmyr and others. At the same time, it is substantiated that in the science of public administration, today, there is no unified definition of "state policy in the field of security in the information space", because the disclosure of this category in modern scientific thought is not detailed enough. The opinion is substantiated that the state policy in the field of information space security can be defined as a specific complex phenomenon in society, which includes a large number of components of different directions (economic, foreign policy, military, technological and other). In this concept, the activities of public authorities should be aimed at creating favorable conditions for the implementation of state measures to ensure a high level of security in the information environment of the country. The opinion is proved that the state-legal mechanism of public administration in the field of ensuring the security of the information space of the state acts as a holistic system of public authorities and special institutions that outline the legal field in this area and effectively regulate economic, financial, economic and social relations. between subjects in the field of information space security and information data protection. It is noted that the organizational and legal mechanism of public administration in the field of information security of the state provides an opportunity to coordinate the development of regulatory framework in accordance with modern progress and development of information technology in the world, as well as creating an algorithm for public authorities to implement effective state policy in the field of information security of the state, taking into account the necessary resources and by exercising the function of control over their use.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call