1 Yaroslav Mudryi National Law University (Kharkiv, Ukraine)
2 National Pedagogical Dragomanov University (Kyiv, Ukraine)
Received: 13 February 2018 / Accepted: 12 April 2018 / Published: 10 October 2018
View Full-Text Review Reports Cite This Paper
The question of informational culture as a semiotic space of functioning and interaction with the information and ethics and communication complex regulating this activity is an urgent need in modern humanities and other related branches of knowledge and socioculture. The study of information security at the psycho-motivational, functional and value level gives a relatively complete spectrum of the mentioned problem in view of its cultural influence. Without such an integrated approach to understanding the essence of information culture, mankind faces a catastrophe in the form of loss of democracy, sociality and humanity. The proposed research actualizes the need for a socio-philosophical reflection of the problems of the boundary between information freedom and information security as one of the key issues of the civilization progress of modern civilization.
Keywords: informational culture, information security, operability, functionality, humanity
Abawajy, Jemal (2014) User preference of cyber security awareness delivery methods. Behaviour & Information Technology, 33(3), 237-248. https://doi.org/10.1080/0144929X.2012.708787
Anderson, Chad, Richard L. Baskerville, and Kaul Mala (2017) Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information. Journal of Management Information Systems, 34(4), 1082-1112. https://doi.org/10.1080/07421222.2017.1394063
Bazaluk, Oleg and Denys Svyrydenko (2017) Philosophy of War and Peace: In Search of New European Security Strategy. Anthropological Measurements of Philosophical Research, 12, 89-99.
Bojanc, Rok and Borka Jerman-Blažic (2013) A Quantitative Model for Information-Security Risk Management. Engineering Management Journal, 25(2), 25-37. https://doi.org/10.1080/10429247.2013.11431972
Braband, Jens and Hendrik Schäbe (2016) Probability and security — pitfalls and chances. Safety and Reliability, 36 (1), 3-12. https://doi.org/10.1080/09617353.2016.1148920
Cheng, Yuan-Dong, Ji-Dong He, and Fa-Gang Hu (2017) Quantitative risk analysis method of information security-Combining fuzzy comprehensive analysis with information entropy. Journal of Discrete Mathematical Sciences and Cryptography, 20(1), 149-165. https://doi.org/10.1080/09720529.2016.1178913
Curiac, Daniel-Ioan and Mihai Pachia (2015) Controlled information destruction: the final frontier in preserving information security for every organisation. Enterprise Information Systems, 9(4), 384-400. https://doi.org/10.1080/17517575.2013.792397
Fatkhutdinov, Vasyl H. and Oleg Bazaluk (2018) The Importance of the Brain Neuro-Programming Technologies in National and Regional Security Strategies. Philosophy and Cosmology, Vol. 20, 74-82. https://doi.org/10.29202/phil-cosm/20/6
Holmberg, Robert and Mikael Sundström (2012) Leadership and the Psychology of Awareness: Three Theoretical Approaches to Information Security Management. Organization Management Journal, 9 (1), 64-77. https://doi.org/10.1080/15416518.2012.666952
Huang, Ding-Long, Patrick Rau Pei-Luen, and Gavriel Salvendy (2010) Perception of information security. Behaviour & Information Technology, 29 (3), 221-232. https://doi.org/10.1080/01449290701679361
Li, David C. (2015) Online Security Performances and Information Security Disclosures. Journal of Computer Information Systems, 55(2), 20-28. https://doi.org/10.1080/08874417.2015.11645753
Menard, Philip, Gregory J. Bott, and Robert E.Crossler (2017) User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory. Journal of Management Information Systems, 34(1), 1203-1230. https://doi.org/https://doi.org/10.1080/07421222.2017.1394083
Myyry, Liisa, Siponen, Mikko, Pahnila, Seppo, Vartiainen, Tero and Anthony Vance (2009) What levels of moral reasoning and values explain adherence to information security rules? An empirical study. European Journal of Information Systems, 18(2), 126-139. https://doi.org/10.1057/ejis.2009.10
Pieters, Wolter (2011) The (Social) Construction of Information Security. The Information Society, 27(5), 326-325. https://doi.org/10.1080/01972243.2011.607038
Rozin, Vadim M. (2017) Technology as a Time Challenge: Study, Concept and Types of Technology. Philosophy and Cosmology, Vol. 19, 133-142.
Sumner, Mary (2009) Information Security Threats: A Comparative Analysis of Impact, Probability, and Preparedness. Information Systems Management, 26 (1), 2-12. https://doi.org/10.1080/10580530802384639
Svyrydenko, Denys (2015) Globalization as a Factor of Academic Mobility Processes Expanding. Philosophy and Cosmology, Vol. 14, 221-234.
Svyrydenko, Denys (2016) Plagiarism Challenges at Ukrainian Science and Education. Studia Warminskie, Vol. 53, 67-75.
Vidalis, Stilianos and Zafar Kazmi (2007) Security Through Deception. Information Systems Security, 16(1), 34-41. https://doi.org/10.1080/10658980601051458
Voronkova, Valentina and Olga Kyvliuk (2017) Philosophical Reflection Smart-Society as a New Model of the Information Society and its Impact on the Education of the 21st Century. Future Human Image, Vol. 7, 154-162.