Organizational and legal principles of information security of enterprises in the conditions of martial law in Ukraine
- Details
- Category: Content №1 2024
- Last Updated on 29 February 2024
- Published on 30 November -0001
- Hits: 2088
Authors:
B.Melnychenko*, orcid.org/0000-0003-1514-8131, Lviv Polytechnic National University, Lviv, Ukraine, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
I.Khomyshyn, orcid.org/0000-0002-6180-3478, Lviv Polytechnic National University, Lviv, Ukraine, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
M.Sirant, orcid.org/0000-0002-9393-2397, Lviv Polytechnic National University, Lviv, Ukraine, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
S.Tsebenko, orcid.org/0000-0002-9247-1867, Lviv Polytechnic National University, Lviv, Ukraine, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
S.Yesimov, orcid.org/0000-0002-9327-0071, Lviv State University of Internal Affairs, Lviv, Ukraine, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
* Corresponding author e-mail: bohdana.b.melnychenko@ lpnu.ua
Naukovyi Visnyk Natsionalnoho Hirnychoho Universytetu. 2024, (1): 167 - 174
https://doi.org/10.33271/nvngu/2024-1/167
Abstract:
Purpose. To investigate the peculiarities of organizational and legal provision of information security (IS) in the conditions of martial law (ML). To propose changes to legislative provisions to improve legal regulation in this area. To develop systematic measures to balance the rights and obligations of individuals and legal entities in the field of IS in the conditions of ML.
Methodology. The general scientific and special legal methods of cognition are used: hermeneutic method allowed us to substantiate expansion of IS field; content analysis – to determine organizational principles of IS of enterprises in conditions of ML; structural and legal – to propose indicator conditions for legal norms; special-legal – to propose system of local regulatory acts for the legal provision of IS; comparative legal – to propose special legal regime for IS of enterprises.
Findings. It is indicated that during the state of war, the IS field of enterprise expands significantly and becomes an element of the national security system. The peculiarities of organizational and legal support and the basic organizational principles of IS of enterprises in the conditions of ML are determined. It is proposed to introduce a special legal regime for implementation of IS of enterprises in conditions of ML and use of the state’s capabilities in this area under specified legal regime. Amendments to the articles of Special Part of Code of Ukraine on administrative offenses are proposed for effective regulatory support of the special legal regime for implementation of IS of enterprises
Originality. A legal tool is proposed to limit dissemination of information about a company’s activities – the introduction of local law documents to classify information about the company’s activities during ML into category “with limited access”. Indicator conditions and additions to legislative norms are proposed.
Practical value. The developed proposals, indicator conditions and additions to legislative norms will contribute to strengthening the IS of enterprises.
Keywords: information security of enterprises, martial law, legal principles, special legal regime, local regulations
References.
1. Yepifanova, I., Dzhedzhula, V., & Shevchuk, Y. (2023). Factors influencing the process of managing economic security of enterprises in conditions of military condition. Innovation and Sustainability, 2, 120-125. https://doi.org/10.31649/ins.2023.2.120.125.
2. Perun, T. S. (2020). Information security of business entities: new threats and prospects of development. Academic notes of TNU named after V. I. Vernadskyi. Series: legal sciences, 31(70/3), 138-143. https://doi.org/10.32838/TNU-2707-0581/2020.3/24.
3. Bodunova, O. M. (2023). Prevention of crime in the field of information technologies in the conditions of martial law in Ukraine. Scientific Bulletin of the Uzhhorod National University, 75(2), 83-87. https://doi.org/10.24144/2307-3322.2022.75.2.13.
4. Kovaliv, M., Skrynkovskyy, R., Nazar, Y., Yesimov, S., Krasnytskyi, I., Khrystyna, K., Kniaz, S., & Kemska, Y. (2021). Legal Support of Cybersecurity of Critical Information Infrastructure of Ukraine. Path of Science, 7(4), 2011-2018. https://doi.org/10.22178/pos.69-12.
5. Borsukovskyi, Y. V. (2019). Defining requirements to develop information security concept in hybrid threats conditions. Cyber security: education, science, technology, 1, 61-72. https://doi.org/10.28925/2663-4023.2019.5.6172.
6. Lutsenko, Yu. V., & Denysenko, M. M. (2022). Combating crime under martial law: theoretical and legal problems. Carpathian Legal Bulletin, 3(44), 70-75. https://doi.org/10.32782/pyuv.v3.2022.16.
7. Skochylias-Pavliv, O. V. (2023). Current threats to the information security of Ukraine in the conditions of the legal regime of the martial state. Legal scientific electronic journal, 9(65), 263-266. https://doi.org/10.32782/2524-0374/2023-9/65.
8. Lehominova, S. V., Shchavinskyy, Y. V., Muzhanova, T. M., Dzyuba, T. M., & Rabchun, D. I. (2023). Legal mechanisms for ensuring information security in Ukraine in the conditions of hybrid war. Telecommunications and information technologies, 1(78), 101-110. https://doi.org/10.31673/2412-4338.2023.0101111.
9. Moroz, V. (2021). Features of information security in martial law. Legal Bulletin, 2(59), 94-101. https://doi.org/10.18372/2307-9061.59.15600.
10. Nashynets-Naumova, A. (2019). Global experience of legislative regulation of regimes confidential information. Entrepreneurship, economy and law, 4, 166-170. Retrieved from https://elibrary.kubg.edu.ua/id/eprint/27354/1/A_Nashynets_Naumova_PGP_4_2019_FPMV.pdf.
11. Pravdiuk, A. (2023). Information security of Ukraine: information influence and information wars. European Political and Law Discourse, 10(1), 111-121. https://doi.org/10.46340/eppd. 2023.10. 1.6.
12. Sopilko, I. (2021). Peculiarities of countering cyber threats by legal methods and means. Legal Bulletin, 4(61), 106-110. https://doi.org/10.18372/2307-9061.61.16356.
13. Zakharenko, K. (2019). The category of information security in the national philosophical and political discourse. Bulletin of Lviv University, 23, 158-165. https://doi.org/10.30839/2072-7941.2018.130531.
14. Koterlin, I. B. (2022). Information security in martial law in terms of ensuring information rights and freedoms. Actual problems of domestic jurisprudence, 1, 150-155. https://doi.org/10.32782/392257.
15. Zaporozhets, S. A. (2019). Information security of Ukraine in the conditions of the hybrid war. Problems of creation, testing, application and operation of complex information systems, 17, 52-63. https://doi.org/10.46972/2076-1546.2019.17.05.
16. Barabash, O., & Hryshchuk, A. (2022). Provision of information security in the context of protection against destructive informational influence. Law journal of Donbass, 4(81/1), 55-60. https://doi.org/10.32782/2523-4269-2022-81-4-1-55-60.
17. Arkhypov, O., & Teplytska, T. (2019). Adaptive approach to information security management. Young scientist, 11(75), 668-672. https://doi.org/10.32839/2304-5809/2019-11-75-142.
18. Fedchenko, O. (2022). Analysis of factors and modern threats to the information security of the state in the context of ensuring the national security of Ukraine. Journal of Scientific Papers “Social Development and Security”, 12(3), 128-134. https://doi.org/10.33445/sds.2022.12.3.11.
19. Kaplia, O. M. (2023). Legal regulation of citizen’s information security during martial law. Expert: paradigms of legal sciences and public administration, 6(24), 16-20. https://doi.org/10.32689/2617-9660-2022-6(24)-16-20.
20. Smotrych, D., & Brailko, L. (2023). Information security under martial law. Scientific Bulletin of the Uzhhorod National University, 77(2), 121-127. https://doi.org/10.24144/2307-3322.2023.77.2.20.
21. Melnyk, D. S., Parfylo, O. A., Butenko, O. V., Tykhonova, O. V., & Zarosylo, V. O. (2022). Practice of the member states of the European Union in the field of anti-corruption regulation. Journal of Financial Crime, 29(3), 853-863. https://doi.org/10.1108/JFC-03-2021-0050.
22. Kalina, I., Khurdei, V., Shevchuk, V., Vlasiuk, T., & Leonidov, I. (2022). Introduction of a corporate security risk management system: The experience of Poland. Journal of Risk and Financial Management, 15(8). https://doi.org/10.3390/jrfm15080335.
23. Semenets-Orlova, I., Rodchenko, L., Chernenko, I., Druz, O., Rudenko, M., & Poliuliakh, R. (2022). Requests for Public Information in the State Administration in Situations of Military Operations. Anuario De La Facultad De Derecho.Universidad De Extremadura, 38, 249-270. https://doi.org/10.17398/2695-7728.38.249.
24. Nitsenko, V., Mardani, A., Streimikis, J., Ishchenko, M., Chaikovsky, M., Stoyanova-Koval, S., & Arutiunian, R. (2019). Automatic Information System of Risk Assessment for Agricultural Enterprises of Ukraine. Montenegrin Journal of Economics, 15(2), 139-152. https://doi.org/10.14254/1800-5845/2019.15-2.11.
25. Semenets-Orlova, I., Shevchuk, R., Plish, B., Moshnin, A., Chmyr, Y., & Poliuliakh, R. (2022). Human-centered approach in new development tendencies of value-oriented public administration: Potential of education. Economic Affairs, 67(5), 899-906. https://doi.org/10.46852/0424-2513.5.2022.25.
Newer news items:
- Ecological and economic assessment of the effectiveness of implementing bioenergy technologies in the conditions of post-war recovery of Ukraine - 29/02/2024 15:00
- Investment policy of construction enterprises under the conditions of marital state - 29/02/2024 15:00
- Modeling the return on investment in human capital in the IT industry of Ukraine - 29/02/2024 15:00
- Regional features of Ukrainian higher education in wartime conditions - 29/02/2024 15:00
- Gross regional product in Ukraine: two-dimensional analysis of regularities and territorial features - 29/02/2024 15:00
Older news items:
- Modeling arithmetic systems of elliptic curve cryptography using Microsoft Excel VBA - 29/02/2024 15:00
- Implementation of corporate social responsibility in the context of integration with the enterprise management information system - 29/02/2024 15:00
- Improvement of the method of time rationing for assembling car groups on one track - 29/02/2024 15:00
- Digital economy: opportunities for transformation of entepreneurial structures - 29/02/2024 15:00
- Two-stage problems of optimal location and distribution of the humanitarian logistics system’s structural subdivisions - 29/02/2024 15:00
- Modeling pH changes and electrical conductivity in surface water as a result of mining activities - 29/02/2024 15:00
- Stochastic models of work and rest schedules - 29/02/2024 15:00
- Enhancement of sorption of the azoic dye (Azucryl Red) by natural and calcined hyper-aluminous kaolins - 29/02/2024 15:00
- Method of controlling the volume of combustion products at different boiler loads - 29/02/2024 15:00
- An overview of hydrogen production via reforming from natural gas - 29/02/2024 15:00