Abstract

Today the sumof technologies embodies the universal principle, which destroys the world of traditional representation sofhuman consciousness about the bound ariesof the necessary and possible assymbolic linesof division between good and evil, security and threat, anonymity and publicity. The relevance of the subject determines logosphere technologization of growing human existence that produces the negation of things existing and new information capabilities makes most people very vulnerable and dependent on them. Especially it is realized when technologies are resource policies and government to achieve common interests and the common good. The article is an attempt to analyze the key problems of latent practices of leading countries — the US, Russia and China’s control over «information man» life within national jurisdiction information space through information technology. It emphasizes that with increasing information leading power in world politics security becomes subject of plane rotations both in open and closed day agenda. It is a national information space monitoring and control screening function of the state to neutralize the negative factors of the internal opposition and the pressure of circumstances, which dictates a new global information reality. The main trend that reality consists of challenges and threats related to the use of information resources, which classified information and psychological operations, information aggression, cyber terrorism and cybercrime. It attempts to look at information technology and thinking that they formed as a tool which «transforms man into the system functions», cog of information society and the all-powerful state machine. Developing the idea of human space automation, the system gradually developed a habit of living «seamlessly», «comfortable» and «separately». However, entering into every house as «good» human rationality, technology has become a hostile force that has to control everything and everyone. Man is helpless, and his life is completely transparent. Separately it analyzes control policy of information space and Internet space of USA, Russia and China, which is within national strategies for information security. It underlines the common features and distinguishes features of this policy which are dictated by the level of the national sector of the information economy and the level of implementation of security projects of national and global level. Asitisconcluded in the condition sofin creasing the risks and challenges of the informationenvironmentandinorderto preservesocio-political stability of society, state sthatactas historically veri fiedguardians of social peace will seekto use information technologiesas a latent toolkit for monitoring private life of citizens. As a resource of information security policy, this toolkit all owstotrack negative social trends and respondin a timely way to the irmani festations from the point of view of national interests. First of all, it concerns the risks of making decisionsre latedto terrorist and extremist threats that have become a dangero usside of the life of a modern person.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call