Abstract

In order to resolve the issue of acceptability of the states’ appeal to existing mechanisms for ensuring safe and systematic development of international relations in the ICT environment, the author determines the main approaches appearing in joint communiqués and agreements issued following the results of conferences and high-level meetings of representatives of the Russian Federation and its partners and the allied bloc of the USA, the countries of the European Union and other states. By interpreting such terms as “information weapons”, “cyber weapons”, “cyber espionage”, the difficulties associated with the process of creating a secure ICT environment are identified. The result of the study is the identification of security tools that are relevant and optimal from the point of view of the current state of international security law in relation to the ICT environment and that can be recommended to be used by states in order to form a secure mode of interaction in the framework of the exercise by states of their functions in the foreign policy arena amid the global information space.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call