INFORMATION SECURITY IN THE PUBLIC ADMINISTRATION SYSTEM: CHALLENGES AND PROSPECTS

Authors

DOI:

https://doi.org/10.51547/ppp.dp.ua/2024.1.10

Keywords:

public administration, public administration mechanisms, information security, information security management, public information security management

Abstract

In recent decades, information security in the system of public administration has become critically important in the conditions of constant technological development and the increase in the number of cyber threats. Breaches of information security in government and administration lead to serious consequences, including the possibility of loss of confidential information, manipulation of public opinion and threats to national security. The main problem is how to effectively protect information resources in the public administration system in the conditions of constantly growing technological challenges and cyber threats. The purpose of this research is a systematic analysis of the challenges and prospects of information security in the field of public administration, development of protection strategies and identification of ways to improve information security systems in state structures. The object of research is the system of public management, and the subject is the problems related to the protection of information resources of this system in the conditions of modern technological and cybernetic challenges. The work used the analysis of scientific literature, the practical approbation of various methods of information protection, as well as participation in scientific conferences and dialogue with leading specialists in the field. A special emphasis was placed on the analysis of cases of cyber attacks and the study of the experience of countries that have achieved success in the field of information security in public administration. The author successfully revealed known and new challenges facing the information security system in public administration. Conducted a comparative analysis of various approaches to information protection, identified the most effective protection strategies and methods. The conclusions of the study emphasize the need to implement complex measures, in particular, strengthening the role of open data, improving the qualifications of personnel, and improving the system of monitoring and responding to potential cyber threats. The recommendations are aimed at practical implementation in public administration bodies to ensure sustainable and effective information security.

References

Usyk, S. (2021). DOSLIDZhENNIA PRAVOVOHO MEKHANIZMU ZABEZPEChENNIA INFORMATSIINOI BEZPEKY V UMOVAKH NADZVYCHAINYKH SYTUATSII [STUDY OF THE LEGAL MECHANISM FOR PROVIDING SECURITY INFORMATION IN EMERGENCIES]. Naukovyi visnyk: Derzhavne upravlinnia / Scientific Bulletin: State Administration, (4(6), 266–280. https://doi.org/10.32689/2618-0065-2020-4(6)-266-280 [in Ukrainian]

(2024), "Exploring the critical success factors of information security management: a mixed-method approach", Information and Computer Security, Vol. ahead-of-print No. ahead-of-print. https://doi.org/10.1108/ICS-03-2023-0034 [in English]

Citation Tuna, A.A. and Türkmendağ, Z. (2022), "Cyber Business Management", Özsungur, F. (Ed.) Conflict Management in Digital Business, Emerald Publishing Limited, Leeds, pp. 281-301. https://doi.org/10.1108/978-1-80262-773-220221026 [in English]

Sun, Y., Zhang, Y.-F., Wang, Y. and Zhang, S. (2023), "Cooperative governance mechanisms for personal information security: an evolutionary game approach", Kybernetes, Vol. ahead-of-print No. ahead-of-print. https://doi.org/10.1108/K-04-2023-0717 [in English]

Dykyi, A. P., Dyka, O. S., Naumchuk, K. M., & Trosteniuk, T. M. (2022). PONIATIINO-KATEHIORIALNYI APARAT INFORMATSIINOI BEZPEKY UKRAINY V ZABEZPECHENNI NATSIONALNOI BEZPEKY [CONCEPTUAL AND CATEGORICAL APPARATUS OF INFORMATION SECURITY OF UKRAINE IN ENSURING NATIONAL SECURITY]. Tavriiskyi naukovyi visnyk. Seriia: Publichne upravlinnia ta administruvannia / Taurian Scientific Herald. Series: Public management and administration, (4), 23-31. https://doi.org/10.32851/tnv-pub.2022.4.3 [in Ukrainian]

Alhogail, A. (2021), "Enhancing information security best practices sharing in virtual knowledge communities", VINE Journal of Information and Knowledge Management Systems, Vol. 51 No. 4, pp. 550-572. https://doi.org/10.1108/VJIKMS-01-2020-0009 [in English]

Kumar, S., Biswas, B., Bhatia, M.S. and Dora, M. (2021), "Antecedents for enhanced level of cyber-security in organisations", Journal of Enterprise Information Management, Vol. 34 No. 6, pp. 1597-1629. https://doi.org/10.1108/JEIM-06-2020-0240 [in English]

Owusu Kwateng, K., Amanor, C. and Tetteh, F.K. (2022), "Enterprise risk management and information technology security in the financial sector", Information and Computer Security, Vol. 30 No. 3, pp. 422-451. https://doi.org/10.1108/ICS-11-2020-0185 [in English]

Pandey, S., Singh, R.K., Gunasekaran, A. and Kaushik, A. (2020), "Cyber security risks in globalized supply chains: conceptual framework", Journal of Global Operations and Strategic Sourcing, Vol. 13 No. 1, pp. 103-128. https://doi.org/10.1108/JGOSS-05-2019-0042 [in English]

Vasylieva, N. V. (2022). PROPAHANDA YAK SKLADOVA INFORMATSIINOKOMUNIKATYVNOI POLITYKY I ZAHROZA NATSIONALNII BEZPETSI [PROPAGANDA AS A COMPONENT OF INFORMATION AND COMMUNICATION POLICY AND A THREAT TO NATIONAL SECURITY]. Tavriiskyi naukovyi visnyk. Seriia: Publichne upravlinnia ta administruvannia / Taurian Scientific Herald. Series: Public management and administration, (2), 34-41. https://doi.org/10.32851/tnvpub.2022.2.5 [in Ukrainian]

Amankwa, E., Loock, M. and Kritzinger, E. (2022), "The determinants of an information security policy compliance culture in organisations: the combined effects of organisational and behavioural factors", Information and Computer Security, Vol. 30 No. 4, pp. 583-614. https://doi.org/10.1108/ICS-10-2021-0169 [in English]

Published

2024-06-11

Issue

Section

SECTION 2 MECHANISMS OF PUBLIC ADMINISTRATION