Information Security and Cybersecurity Policy

12
DOI: 10.20542/0131-2227-2024-68-4-121-130
EDN: UOKUIA
A. Bocharova, apbocharova@hse.ru
National Research University Higher School of Economics (NRU HSE), 11, Pokrovskii Blvd., Moscow, 109028, Russian Federation.
 

Received 11.02.2023. Revised 08.10.2023. Accepted 05.02.2024.

Acknowledgements. The study was supported by MGIMO-University, project no. 2025-04-03.


Abstract. Information security is a critical issue in today’s world, as the constant threat of cyber-attacks and breaches continues to pose a serious threat to individuals, businesses and governments. To address this issue, it is necessary to evaluate the existing security measures and their effectiveness in protecting against cyber threats, as well as the decisionmaking processes that drive information security policy at the national and international levels. The classification of existing security measures and decision-making actors is an essential step in identifying areas of weakness and improving security policies. By taking a comprehensive approach to the subject, this research has provided insight into different levels of policy development and implementation, as well as the key actors involved at each stage. The review, classification and analysis of existing cybersecurity ratings have also contributed to the identification of areas for improvement. Despite the lack of transparency in the methodology and robustness issues of most ratings, this work has provided some important insights into the overall effectiveness of different cybersecurity and information security policies. Finally, the finding that gaps and theoretical-methodological inconsistencies in the field of national information and cybersecurity research can be explained by the opaque and non-objective methodology used to evaluate the effectiveness of policies is crucial. It shows that there is a need for more transparent and objective methodologies that can accurately evaluate cybersecurity policies at the national and international levels, taking into account the unique challenges and contexts within which they operate.

Keywords: information security, national cybersecurity policy, cybersecurity indices, cyberspace, information policy, classification of cybersecurity measures


REFERENCES

1. Kuehl D.T. From cyberspace to cyberpower: Defining the problem. Kramer F. D., Starr S. H., Wentz L. K., eds. Cyberpower and national security. Washignton, D.C., Potomac Books, 2009, pp. 24-42. Available at: https://doi.org/10.2307/j.ctt1djmhj1 

2. Papakonstantinou V. Cybersecurity as praxis and as a state: The EU law path towards acknowledgement of a new right to cybersecurity? Computer Law & Security Review, 2022, vol. 44, pp. 1-15. Available at: https://doi.org/10.1016/j.clsr.2022.105653 

3. Kulesza J. Defining Cybersecurity. Kulesza J., Balleste R., eds. Cybersecurity and Human Rights in the Age of Cyberveillance. Maryland, Rowman & Littlefield, 2016, pp. 1-17.

4. Streltsov A.A. Main problems of application of international law to ICT environment. Digital.Report, 28.10.2016. (In Russ.) Available at: https://digital.report/osnovnyie-problemyi-primeneniya-mezhdunarodnogo-prava-k-ikt-srede/ (accessed 18.09.2023).

5. Polyakova T.A., Minbaleev A.V., Krotkova N.V. New vectors of development of information law in the conditions of civilizational crisis and digital transformation. State and Law, 2020, no. 5, pp. 75-87. (In Russ.) Available at: https://doi.org/10.31857/S013207690009678-7 

6. Pfleeger C.P., Pfleeger S.L., Marguliez J. Security in computing. Boston-MA, USA, Prentice Hall, 1988. 944 p.

7. Deibert R. The geopolitics of Internet control: censorship, sovereignty and cyberspace. Chadwick A., Howard P., eds. Routledge handbook of internet politics. London, Routledge, 2009, pp. 323-336. Available at: https://doi.org/10.4324/9780203962541-30 

8. Chadwick A., Howard P. Routledge handbook of internet politics. London, Routledge, 2009. 487 p. Available at: https://doi.org/10.4324/9780203962541-30

9. Kramer F., Starr S., Wentz L. Cyberpower and national security. Washignton, D.C., Potomac Books, Inc., 2009. 665 p. Available at: https://doi.org/10.2307/j.ctt1djmhj1.6 

10. Tabansky L. Basic concepts in cyber warfare. Military and Strategic Affairs, 2011, vol. 3, no. 1, pp. 75-92. Available at: https://www.inss.org.il/wp-content/uploads/2017/02/FILE1308129610-1.pdf (accessed 18.09.2023).

11. Litvinenko Yu., Korolev N. Russian sites are changing the lock: The authorities will oblige browsers to switch to national encryption certificates. Kommersant, 04.03.2022. (In Russ.) Available at: https://www.kommersant.ru/doc/5240945 (accessed 18.09.2023).

12. Gisselquist R.M. Developing and evaluating governance indexes: 10 questions. Policy Studies, 2014, vol. 35 (5), pp. 513-531. Available at: https://doi.org/10.1080/01442872.2014.946484 

13. Robinson N., Hardy A. Estonia: From the “Bronze Night” to cybersecurity Pioneers. Romaniuk S.N., Manjikian M., eds. Routledge Companion to Global Cybersecurity Strategy. London, Milton Park, Routledge, 2021, pp. 211-225. Available at: https://doi.org/10.4324/9780429399718 

14. Bruton F.B. Saudi Cleric Salman al-Awda Called for Reform. Now He’s in Solitary Confinement. NBC News, 27.01.2018. Available at: www.nbcnews.com/news/mideast/saudi-cleric-salman-Al-awda-calledreform-now-he-s-n840916 (accessed 18.09.2023).

15. Stevens T. United Kingdom: pragmatism and adaptability in the cyber realm. Romaniuk S. N., Manjikian M., eds. Routledge Companion to Global Cybersecurity Strategy. London, Milton Park, Routledge, 2021, pp. 191-200. Available at: https://doi.org/10.4324/9780429399718 

16. Carr M. Public-private partnerships in national cyber-security strategies. International Affairs, 2016, vol. 92 (1), pp. 43-62. Available at: https://doi.org/10.1111/1468-2346.12504 


SOURCES

1. Decree of the President of the Russian Federation dated 05.12.2016. “On Approval of the Doctrine of Information Security of the Russian Federation”. (In Russ.) Available at: http://www.kremlin.ru/acts/bank/41460 (accessed 18.09.2023).

2. Cybersecurity policy making at a turning point. Organization for Economic Cooperation and Development, 2012. Available at: https://www.oecd-ilibrary.org/content/paper/5k8zq92vdgtl-en (accessed 18.09.2023).

3. Agreement on the creation of the infrastructure of innovation activity of the CIS member states in the form of a distributed information system and CIS portal “Information for innovation activity of the CIS member states”. Art. 1. Minsk, 19.05.2011. (In Russ.) Available at: https://docs.cntd.ru/document/499003928 (accessed 18.09.2023).

4. The Cybersecurity Strategy. European Comission, 2020. Available at: https://digital-strategy.ec.europa.eu/en/policies/cybersecurity-strategy (accessed 18.09.2023).

5. Shares of gun makers rise amid protests in the U.S. RBC. Investments, 02.06.2020. (In Russ.). Available at: https://quote.rbc.ru/news/article/5ed5f3fc9a7947b9e6de31ee (accessed 18.09.2023).

6. INTERPOL report identifies top cyberthreats in Africa. INTERPOL, 21.10.2021. Available at: https://www.interpol.int/en/News-and-Events/News/2021/INTERPOL-report-identifies-top-cyberthreats-in-Africa (accessed 18.09.2023).

7. Operations and Analysis Center under the President of the Republic of Belarus. Available at: https://president.gov.by/en/statebodies/the-operational-and-analysis-center-under-the-president (accessed 18.09.2023).

8. Resolution of the Security Council of the Republic of Belarus No. 1 “On the Concept of Information Security of the Republic of Belarus” of March 18, 2019. (In Russ.) Available at: https://pravo.by/document/?guid=12551&p0=P219s0001&p1=1 (accessed 18.09.2023).

9. Cybersecurity Decree No. 40 of 14 February 2023. (In Russ.) Available at: https://president.gov.by/ru/documents/ukaz-no-40-ot-14-fevralya-2023-g (accessed 18.09.2023).

10. Kyrgyz Republic: Cybersecurity Capacity Review. Global Cybersecurity Capacity Center, September 2017. Available at: https://gcscc.ox.ac.uk/files/cmmkyrgyzstanreportfinalexecsummary1701030pdf (accessed 18.09.2023).

11. Decree 577/2017 Cybersecurity Committee, 28.07.2017. (In Span.) Available at: http://servicios.infoleg.gob.ar/infolegInternet/anexos/275000-279999/277518/norma.htm (accessed 18.09.2023). 


For citation:
Bocharova A. Information Security and Cybersecurity Policy. World Eonomy and International Relations, 2024, vol. 68, no. 4, pp. 121-130. https://doi.org/10.20542/0131-2227-2024-68-4-121-130 EDN: UOKUIA



Comments (0)

No comments

Add comment







Indexed

 

 

 

 

Dear authors! Please note that in the VAK List of peer-reviewed scientific journals, in which the main scientific results of dissertations for the degree of candidate and doctor of sciences should be published for the “MEMO Journal” the following specialties are recorded:
economic sciences:
5.2.5. World Economy.
5.2.1. Economic Theory
5.2.3. Regional and Branch Economics
political sciences:
5.5.4. International Relations
5.5.1. History and Theory of Politics
5.5.2. Political Institutions, Processes, Technologies

 

Current Issue
2024, vol. 68, No. 5
Topical Themes of the Issue:
  • Are There Any Ways to Break Through the Korean Nuclear Impasse?
  • Contemporary U.S. Taiwan Policy: Balancing on the Edge
  • The Gulf Monarchies’ Vision of the Global Order Transformations and the Russian Place in It
  • At Post-Soviet Space
Submit an Article
INVITATION FOR PUBLICATION
The Editorial Board invites authors to write analytical articles on the following topics:
  • changes in the processes of globalization in modern conditions
  • formation of the new world order
  • shifts in civilization at the stage of transition to a digital society

The editors are also interested in publishing synthesis articles / scientific reviews revealing the main trends in the development of certain regions of the world - Latin America, Africa, South Asia, etc.