Information influence of the russian federation on the network environment of Ukraine
DOI:
https://doi.org/10.5281/zenodo.4395143Keywords:
information, technologies, security, network environment, hybrid warAbstract
The informational influence of the Russian Federation on the network environment of Ukraine and other countries of the world has been analyzed. Emphasis has been placed on the use of non-military means as a powerful tool for destabilization of society and the information component of Ukraineʼs opposition to the Russian Federation has been considered.
Downloads
References
Derkachenko Y.A. (2016). Social networks as an environment for technologies of manipulative influence. Modern information protection, 1, 51‒59. Retrieved from: http://nbuv.gov.ua/UJRN/szi_2016_1_8.
Diordica IV (2017). The concept and content of cyber espionage. Retrieved from: http://goal-int.org/ponyattya-ta-zmist-kibershpigun stva/.
Dubov D.V., Koretska I.O. (2018). “In the interests of another state ...”: problems of identifying and counteracting agents of influence. Retrieved from: http://old2.niss.gov.ua/content/articles/ files/Dopovid_Dubov_2018_26_12_18-(2)-44b86.pdf.
Gorbulin V. Hybrid warfare as a key tool of n geostrategy of revenge. Retrieved from: https://dt.ua/internal/gibridna-viyna-yak-klyuchoviy-instrument-rosiyskoyi-geostra tegiyi-revanshu-_.html (date of application: 15.11.2020).
Kotsurba K.O. (2014). The influence of modern information and communication technologies on the development of civil protest activity. Problems of International Relations, 8, 82‒95. Retrieved from: http://nbuv.gov.ua/UJRN/Pmv_2014_8_8.
Manuilov Y. M., Prudnikova O. V. (2017). Information and cultural security of Ukraine in the conditions of hybrid war. Bulletin of the National University “Yaroslav the Wise Law Academy of Ukraine”, 1 (32), 26-36. Retrieved from: http://nbuv.gov.ua/UJRN/ Vnyua_2017_1_5.
Nesteryak Y.V. (2013). International criteria of information security of the state: theoretical and methodological analysis. Bulletin of the National Academy of Public Administration under the President of Ukraine, 3, 40‒45. Retrieved from: http://nbuv.gov.ua/UJRN/ Vnadu_2013_3_8.
On the basic principles of cybersecurity: the Law of Ukraine from 26.01.2018 № 2469 ‒ VIII Retrieved from: https://zakon.rada.gov.ua/ laws/term/ru/39985:64033/sp:max15 (date of application: 26.02.2020).
Radkovets Y. I. (2014). Signs of hybrid warfare technologies in Russia's aggressive actions against Ukraine. Science and Defense, 3, 36‒42. Retrieved from: http://nbuv.gov.ua/j-pdf/nauio_2014_3_8.pdf.
Rozumnyi M.M. (Ed.). (2018). Putinʼs regime: reboot – 2018. Retrieved from: https://niss.gov.ua/sites/default/files/2018-06/New_txt-c7997.pdf.
Senchenko OM (2017). Network tools of new wars. Bulletin of the Book Chamber, 1, 37‒41. Retrieved from : http://nbuv.gov.ua/UJRN/ vkp_2017_1_13.
Tkachuk T.Y. (2018). Information factor in hybrid warfare. Cybersecurity in the system of national security of Ukraine: priority directions of development, 1, 39‒42. Retrieved from http://repository.mdu.in.ua/ jspui/bitstream/123456789/658/1/kiberbezpeka_2018.pdf.
Published
How to Cite
Issue
Section
License
The authors agree with the following conditions:
1. Authors retain copyright and grant the journal right of first publication (Download agreement) with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors have the right to complete individual additional agreements for the non-exclusive spreading of the journal’s published version of the work (for example, to post work in the electronic repository of the institution or to publish it as part of a monograph), with the reference to the first publication of the work in this journal.
3. Journal’s politics allows and encourages the placement on the Internet (for example, in the repositories of institutions, personal websites, SSRN, ResearchGate, MPRA, SSOAR, etc.) manuscript of the work by the authors, before and during the process of viewing it by this journal, because it can lead to a productive research discussion and positively affect the efficiency and dynamics of citing the published work (see The Effect of Open Access).