Perm University Herald. Juridical Sciences. 2017. Issue 2 (36)

Title: USE OF INFORMATION TECHNOLOGY TO ENSURE SECURITY OF THE INDIVIDUAL, SOCIETY AND STATE
Authors:

Pastukhov P.S.,
Perm State University

This email address is being protected from spambots. You need JavaScript enabled to view it.
ORCID: 0000-0003-0391-5540 ResearcherID: B-5451-2017
Статьи автора в БД «Scopus» и «Web of Science»:      

---

Losavio M.
University of Louisville

michael.losavio
@louisville.edu
ORCID: 0000-0003-0391-5540 ResearcherID: B-5451-2017
Статьи автора в БД «Scopus» и «Web of Science»:      

---

Requisites: Pastukhov P. S., Losavio M. Ispol’zovanie informatsionnykh tekhnologiy dlya obespecheniya bezopasnosti lichnosti, obshchestva i gosudarstva [Use of Information Technology to Ensure Security of the Individual, Society and State]. Vestnik Permskogo Universiteta. Juridicheskie Nauki – Perm University Herald. Juridical Sciences. 2017. Issue 36. Pp. 231–236. (In Russ.). DOI: 10.17072/1995-4190-2017-36-231-236
DOI: 10.17072/1995-4190-2017-36-231-236
Annotation:

Introduction: the article analyzes threats to the individual, society and state present in the modern society, and considers the principal directions in the use of modern information technology for ensuring security and increasing efficiency of the state activities and law enforcement. Purpose: based on the study of technical characteristics of computer technologies and software, to identify spheres of the information technology application, to determine the legal regulation of the technology application for providing the efficiency of the state and administrative activities in law enforcement with the aim of creating a safe living environment. Methods: the methodological framework of the research is based on a set of methods of scientific cognition, including general scientific and specific scientific ones, in particular the formal-legal, comparative law, technical-legal methods. Results: the authors state that technical, organizational, administrative and legal aspects of the information technology implementation optimize the activities on ensuring security, but the conditions of the global computerization create new risks for privacy. The article explores the guarantees against the total control to prevent the invasion of privacy. Some specific aspects are analyzed necessary to reach a reasonable balance between the information technology implementation and observance of the constitutional guarantees of privacy. Conclusions: in the modern information society, with the widespread use of the artificial intellect and the increasing number of cybercrimes, the application of information technology in all the spheres of law enforcement, economic and regulatory activities is a necessary, inevitable and the most promising way of development to ensure security of the individual, society and state.

Keywords: information threats; information technology; geo-information technology; law enforcement; crime investigation; security of the individual; society and state
  download the full-version article
References:

1. Pastukhov P. S. Modernizatsiya ugolovno-protsessual'nogo dokazyvaniya v usloviyakh informatsionnogo obshchestva: dis. ... d-ra. yurid. nauk [Modernization of Criminal Procedure Evidence in the Information Society: Dr. jurid. sci. diss.]. Moscow, 2015. 454 p. (In Russ.).
2. Pastukhov P. S. Doktrinal'naya model' sover¬shenstvovaniya ugolovno-protsessual'nogo do¬kazyvaniya v usloviyakh informatsionnogo obshchestva: monografiya [Doctrinal Model of Improvement of Criminal Procedure Evidence in the Information Society: monograph; ed.
by P. S. Pastukhov]. Moscow, 2015. 352 p. (In Russ.).
3. Losavio M., Pastukov P. and Polyakova S. Cyber Black Box/Event Data Recorder: Legal and Ethical Perspectives and Challenges with Digital Forensics. Journal of Digital Forensics, Security and Law. 2016. Vol. 10. No. 4. Pp. 43–57. (In Eng.).
4. Losavio M., Pastukhov P., Polyakova S. Regulatory Aspects of Cloud Computing in Business Environments. In book: Cloud Technology: Concepts, Methodologies, Tools, and Applications. 2014. No. 1. Pp. 1373–1386. (In Eng.).
 

Financing: ---

 


      

      

 
The Perm State University
614990, Perm, street Bukireva, 15
+7 (342) 2 396 275, +7 963 012 6422
vesturn@yandex.ru
ISSN 1995-4190
(с) Editorial board, 2010
Publishing 4 times a year
The magazine is registered in Federal Agency of supervision in sphere of communication and mass communications.
The certificate on registration of mass media ПИ № ФС77-33087 from September, 5th, 2008
The certificate on reregistration of mass media ПИ № ФС77-53189 from Marth, 14th, 2013

The magazine is included in List ВАК and in РИНЦ (the Russian index of scientific citing)

The founder: the State educational institution of the higher vocational training
“The Perm State University”.