About Place and Role of Information and Communication Technologies, Information Security at the Present Stage

Journal Issue:

Author Information: 
Doctor of Philosophy (Law), Head of the Department of Humanitarian, Social, Economic and Information-Legal Disciplines of the Stolypin International Institute of Informatization and Public Administration; Associate Professor at the Department of "Customs Law and Customs Organization" of the Moscow State University of Railway Engineering

In the present article author considers questions of importance of information and communication technologies in modern information society and about information security. In the course of the research the author analyzes opinions both known Russian, and famous foreign scientists and practicians from various countries of the world (Italy, the USA, Portugal, etc.). Author emphasizes importance of information and communication technologies at the present stage of development of society and state.


information, informatization, protection, society, ICT.

[1] Bachilo I.L. Gosudarstvo socialnoe ili servisnoe? (informacionno-pravovoj aspekt) // Pravo. Zhurnal vysshej shkoly ekonomiki. 2010. No. 1. 
[2] Bachilo I.L. O zakonodatelstve v informacionnoj sfere otnoshenij // Informacionnoe obshhestvo. 2001. No. 4. 
[3] Bachilo I.L. Pravovaya platforma postroeniya elektronnogo gosudarstva // Informacionnoe pravo. 2008. No. 4. 
[4] Informacionnye resursy razvitiya Rossijskoj Federacii. Pravovye problemy / [A.A. Antopolskij, I.L. Bachilo, G.V. Belov i dr. ; Otv. red. I.L. Bachilo] ; Ros. akad. nauk. In-t gosudarstva i prava. Moskva, 2003.
[5] Nedelko S.I., Murzina I.A., Egorov S.N. Ponyatie gosudarstvennoj uslugi kak kategorii gosudarstvennogo upravleniya // Izvestiya vysshix uchebnyx zavedenij. Povolzhskij region. Obshhestvennye nauki. 2008. No. 3.
[6] Tereshhenko L.K. Uslugi: gosudarstvennye, publichnye, socialnye // Zhurnal rossijskogo prava. 2004. No. 10. 
[7] Abel S. Uncertainty Modeling: The Computational Economists’ View on Cyberwarfare // Studies in Computational Intelligence. 2015. No. 563. 
[8] Aiello M., Papaleo G., Cambiaso E. SlowReq: A Weapon for Cyberwarfare Operations. Characteristics, Limits, Performance, Remediations // Advances in Intelligent Systems and Computing. 2014. No. 239. 
[9] Al-Shaer E., Ashiqur Rahman M. Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in Cyberwarfare // Advances in Information Security. 2015. No. 56. 
[10] Bellovin S.M. Military cybersomethings // IEEE Security and Privacy. 2013. No. 11/3. 
[11] Fernandes D.A.B., Soares L.F.B., Gomes J.V., Freire M.M., Inácio P.R.M. A Quick Perspective on the Current State in Cybersecurity. Emerging Trends in ICT Security. 2013. 
[12] Holsopple J., Yang S.J., Sudit M. Mission Impact Assessment for Cyber Warfare // Studies in Computational Intelligence. 2015. No. 563.