Problems of formation and practical application of certain definitions in the field of national security
Abstract
Purpose: Establishing the factors affecting the formation of the definitions of “information security”, “information resources”, determining the prerequisites for their unambiguous interpretation and application during the development (improvement) of normative legal acts in the field of national security.
Method: Philosophical (hermeneutic, phenomenological, synergistic); general scientific (inductive, deductive, comparison, analysis, synthesis, generalization); special (formal-legal), specific-scientific (bibliometric).
Findings: The lack of a clear, legally established concept of “information security” creates difficulties when formulating and implementing tasks in the field of national security. The reason for this is the multifactorial meaning of the specified definition and the constant change of socio-political conditions. To solve this problem, it is proposed to formulate and legislate the definition of “information security”, introducing fewer broad concepts to its formulation.
Theoretical implications: The factors that influence the formulation of the definitions of “information security” and “information resources” from the perspective of ensuring the national security of Ukraine have been established; the ways for their improvement are defined.
Practical implications: The foundations have been laid for scientific support of the process of development and improvement of definitions in the field of information security.
Value: The determination of uniform approaches to the formulation and interpretation of the definitions of “information security”, “information resources” will allow for an unambiguous formulation and understanding of the tasks of information security of Ukraine as a component of national security, will create a basis for their successful implementation.
Papertype: theoretical.
Downloads
References
Senyk, S. (2001) Administratyvno-pravove rehulyuvannya obihu informatsiyi z obmezhenym dostupom v informatsiyno-telekomunikatsiynykh systemakh Natsionalʹnoyi politsiyi : monohrafiya. Lʹviv: LʹvDUVS. 212 s.
Constitution of Ukraine (1996). Database «Legislation of Ukraine» / Verkhovna Rada of Ukraine. URL: https://zakon.rada.gov.ua/laws/show/en/254%D0%BA/96-%D0%B2%D1%80#Text
Pro zasady informatsiynoyi bezpeky Ukrayiny (2014). Proekt Zakonu Ukrayiny № 4949. Available from : https://ips.ligazakon.net/document/JG3TH00A
Stratehiya informatsiynoyi bezpeky (2021). Ukaz Prezydenta Ukrayiny № 685/2021. Database «Legislation of Ukraine» / Verkhovna Rada of Ukraine. Available from : https://zakon.rada.gov.ua/laws/show/685/2021#n5
Mazepa, S. (2024). Ensuring information security in Ukraine: prospects for administrative and legal regulation. Actual Problems of Law, 1, 92-97. https://doi.org/10.35774/app2024.01.092
Zalevsʹka, I. (2010). Informatsina bezpeka: novi pidkhody do vyznachennya ponyattya. Osvita rehionu: politolohiya, psykholohiya, komunikatsiyi. Available from : https://social-science.uu.edu.ua/contents/10
Panchenko, O. (2020). Informational Security in the Context of Challenges end Threats of National Security. Public Administration and Local Government, 2(45), 57–63. https://doi.org/ 10.33287/102019
Edelieva, M. (2017). Provision of the Informational Security in the Context of Realization of Governmental Informational Politics. Bulletin of Mariupol State University. Series: History. Political Science, 19, 133–141. Available from : https://visnyk-politologia.mdu.in.ua/uk/visnik-19.pdf
Dykyi, A., Naumchuk, K. & Trosteniuk, T. (2021). Analysis of Current Threats to the Information Security of the State. Economic space, 176, 155–158. https://doi.org/10.32782/2224-6282/176-28
Pro osnovni zasady informatsiynoyi bezpeky Ukrayiny (2017). Zakonu Ukrayiny № 2163-VIII. Database «Legislation of Ukraine» / Verkhovna Rada of Ukraine. Available from : https://zakon.rada.gov.ua/laws/show/2163-19#Text
Honcharov, M. (2024). Study of the concept of «information security». Uzhhorod National University Herald. Series: Law, 82(1), 34–37. https://doi.org/10.24144/2307-3322.2024.82.1.4
Kobko, Y. (2019). Information Security in the National Security System: Present State and Perspective. Jurnalul Juridic Național: Teorie Și Practică, 2(2), 46–50. Available from : http://www.jurnaluljuridic.in.ua/archive/2019/2/part_2/11.pdf
Podlevsʹkyy, B. & Rykalyuk, R. (2018) Teoriya informatsiyi : pidruchnyk. Lʹviv: LNU imeni Ivana Franka,. 342 s.
Koterlin, I. (2022) Informatsiyna bezpeka v umovakh voyennoho stanu u aspekti zabezpechennya informatsiynykh prav ta svobod. Aktualʹni problemy vitchyznyanoyi yurysprudentsiyi, 1, 150–155. https://doi.org/10.32782/392257
Senyk, S. & Senyk, V. (2023) Issues of Regulatory and Legal Formulation of Definitions in the Field of Information Technologies (on the Example of «Information Resources»). Visnyk of the Lviv University. Series Law, 76, 107–114. http://dx.doi.org/10.30970/vla.2023.76.107
Abstract views: 63 PDF Downloads: 57
Copyright (c) 2025 Vasyl Hulai, Volodymyr Senyk, Kseniia Bazyliuk

This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors agree with the following conditions:
1. Authors retain copyright and grant the journal right of first publication (Download agreement) with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors have the right to complete individual additional agreements for the non-exclusive spreading of the journal’s published version of the work (for example, to post work in the electronic repository of the institution or to publish it as part of a monograph), with the reference to the first publication of the work in this journal.
3. Journal’s politics allows and encourages the placement on the Internet (for example, in the repositories of institutions, personal websites, SSRN, ResearchGate, MPRA, SSOAR, etc.) manuscript of the work by the authors, before and during the process of viewing it by this journal, because it can lead to a productive research discussion and positively affect the efficiency and dynamics of citing the published work (see The Effect of Open Access).