Главная страница Контактные данные Карта проекта FAQ Форма заказа News

Статья «Особенности правового регулирования кибербезопасности в национальных законах Литвы, России и США: стратегии кибербезопасности»

Article "Peculiarities of the legal regulation of cybersecurity in the National Laws of Lithuania, Russia and the USA: cybersecurity strategies"

Наши услуги

Рецензируемые журналы

Архив

Оплата

Подписка

Методический раздел

Информация
Издание учебных пособий

Архивные данные статьи, Штитилис Д., Клишаускас В. / Archival data of the article written by Stitilis D., Klisauskas V.

Выходные данные научной статьи / Article output data

Страницы / Pages 80-100
Тип / Type [RAR] – Научная статья
Коды / Numbers [УДК] 004.056.1
Заглавие / Title
[RUS]
Особенности правового регулирования кибербезопасности в национальных законах Литвы, России и США: стратегии кибербезопасности
[ENG]
Peculiarities of the legal regulation of cybersecurity in the National Laws of Lithuania, Russia and the USA: cybersecurity strategies
Авторы / Authors
[RUS]
Штитилис Дарюс
Доктор юридических наук, профессор, заведующий комитетом программы «Право новых технологий»,
Университет Миколаса Ромериса
[ENG]
Stitilis Darius
Full Doctor of Law, professor, head of the committee of the "Right of new technologies" program,
Mykolas Romeris University
[RUS]
Клишаускас Валдас
Ассистент,
Университет Миколаса Ромериса
[ENG]
Klisauskas Valdas
Assistant,
Mykolas Romeris University
Аннотация / Abstract
[RUS]
В статье анализируется правовая база кибербезопасности Литовской Республики, Российской Федерации и Соединенных Штатов Америки относительно стратегий кибербезопасности. Результаты исследования могут быть применены при разработке нового законодательства или внесения изменений в существующие правовые акты по кибербезопасности.
[ENG]
Purpose – To analyse the legal/regulatory framework of cybersecurity in the Republic of Lithuania, the Russian Federation and the United States of America to the extent it is related to cybersecurity strategies.
Methodology – Several different methods were used to carry out the research: the authors used the method of comparison to research the legal framework of cybersecurity (cybersecurity strategies) of Lithuania, Russia and the United States of America (hereinafter – the USA). The method of empirical analysis of legal documents was used to determine the strategic legal regulation of cybersecurity in force in Lithuania, Russia and the USA. The research included the analysis of the legal regulatory acts – cybersecurity strategies – of the Republic of Lithuania, the Russian Federation and the USA. This method allows, after performing the analysis of the official documents, to accurately identify and describe the relevant relationship among the existing legal regulations. When using references to academic literature, the authors used the method of deduction, allowing to draw sufficiently reliable conclusions. For the analysis of concepts, the authors used the latest academic literature and dictionaries.
Findings – The research has revealed that information technologies are dynamic. In our opinion, the governments of the Republic of Lithuania, the Russian Federation and the USA cannot stand still and must go forward to align their legislative and technical framework with the changing information technologies by ensuring their protection at international level.
Research limitations – Although the analysis of the legal regulation of cybersecurity can be done by analysing and comparing the legal acts of different levels, the research was carried out by comparing only the key, strategic legal acts – national programs of Lithuania, Russia and the USA.
Practical implications – The results of the research can be applied to draw up new legislation or to make amendments to the existing legal acts with regard to cybersecurity.
Originality/Value – The article presents a research which is new in Lithuania. The analysis of the legal acts of the Republic of Lithuania, the Russian Federation and the USA regulating cybersecurity has not been conducted yet. The results of this research fill in this void.
Research type – presentation of the research, presentation of the approach.
Текст / Text
[ENG]
Introduction As information technologies develop and advance forward, there arise limitless...
Ключевые слова / Keywords
[RUS]
Кибербезопасность
стратегии кибербезопасности
правовое регулирование
[ENG]
Cybersecurity
cybersecurity strategies
legal regulation
Ссылки / References
[RUS]
  1. Волчинская Е.К. Роль государства в обеспечении информационной безопасности. [Электронный ресурс]. – Режим доступа: http://elibrary.ru/item.asp?id=13609231
  2. Данюшина Ю.В. Коммуникативная безопасность в государственном и деловом управлении // Язык. Словесность. Культура. – 2011. – № 1. – С. 66-80.
  3. Доктрина информационной безопасности Российской Федерации. [Электронный ресурс]. – Режим доступа: www.rg.ru/oficial/doc/min_and_vedom/mim_bezop/doctr.shtm
  4. Концептуальные взгляды на деятельность Вооруженных Сил Российской Федерации в информационном пространстве. [Электронный ресурс]. – Режим доступа: http://ens.mil.ru/science/publications/more.htm? id=10845074@ cmsArticle
  5. Корсаков Г.Б. Роль информационного оружия в военно-политической стратегии США. [Электронный ресурс]. – Режим доступа: http://elibrary.ru/item.asp?id=17358664
  6. Agenda of the meeting on cybersecurity held between Barack Obama and Vladimir Putin, Presidents of the USA and Russia. 2013, Northern Ireland. Available at: http://en.rian.ru/russia/20130618/181726010/Cybersecurity-High-on-Agenda-of-Obama-Putin-Meeting.html
  7. Cybersecurity Strategy of the European Union, 2013, Brussels. Available at: http://ec.europa.eu/digital-agenda/en/news/eu-cybersecurity-plan-protect-open-internet-and-online-freedom-and-opportunity-cyber-security
  8. Department of Defense Strategy for Operating in Cyberspace. 2011, Washington. Available at: www. slideshare. net/ DepartmentofDefense/ department-of-defense-strategy-for-operating-in-cyberspace
  9. Government of the Republic of Lithuania Resolution No. 796 of 29 June 2011 «On the Approval of the Programme for the Development of Electronic Information Security (Cybersecurity) for 2011–2019» // Valstybės žinios (Official Gazette). – No. 83-4033. – 2011; No. 106 (correction).
  10. International Strategy for Cyberspace. 2011, Washington. Available at: www.whitehouse.gov/sites/default/files/rss_viewer/international_ strategy_ for_ cyberspace.pdf
  11. O'Connell M.E. Cyber Security without Cyber War. Available at: http://jcsl.oxfordjournals.org/content/17/2/187.full
  12. Press release of Dalia Grybauskaitė, President of the Republic of Lithuania. 2012, Munich. Available at: http://www. president. lt/lt/ spaudos_ centras_ 392/ pranesimai_ spaudai/ kibernetinis_ ir_ energetinis_ saugumas_ -_ lietuvos_ prioritetas.html
  13. Press Release of the Council of the Russian federation, 2013, Moscow. Available at: http://council.gov.ru/press-center/news/14575
  14. Resolution No. 189 of the Government of the Republic of Lithuania «Regarding the Approval of the Implementation Measures of the 2008–2012 Programme of the Government of the Republic of Lithuania» of 25 February 2009. – Official Gazette. – 2009. – No. 33–1268.
  15. Schjolberg S., Ghernaouti-Hele S. A Global Treaty on Cybersecurity and Cybercrime. Available at: http://www. cybercrimelaw. net/documents/ A_ Global_ Treaty_ on_ Cybersecurity_ and_ Cybercrime,_ Second_ edition_ 2011.pdf
  16. Štitilis D. Electronic Crimes: A Methodological Tool. – Vilnius: Mykolas Romeris University, 2011. – P. 83.
  17. Štitilis D., Pakutinskas P., Dauparaitė I., Laurinaitis M. Legal Environment in Order to Prevent Identity Theft: Comparative Analysis of the Legal Acts of the USA and Lithuania. – Social Technologies. – 2011. – No. 1(1). – P. 68.
  18. Štitilis D., Paškauskas, Ž. State's Electronics Information Security Strategy – One of Key Electronic Information Security Regulatory Instruments: Comparative Analysis // Jurisprudencija. – 2007. – No. 2(92). – Pp. 37-45.
[ENG]
  1. "Agenda of the meeting on cybersecurity held between Barack Obama and Vladimir Putin, Presidents of the USA and Russia. 2013, Northern Ireland", available at: http://en.rian.ru/russia/20130618/181726010/Cybersecurity-High-on-Agenda-of-Obama-Putin-Meeting.html
  2. "Cybersecurity Strategy of the European Union, 2013, Brussels", available at: http://ec.europa.eu/digital-agenda/en/news/eu-cybersecurity-plan-protect-open-internet-and-online-freedom-and-opportunity-cyber-security
  3. Danyushina, Yu.V. (2011), "Kommunikativnaya bezopasnost' v gosudarstvennom i delovom upravlenii" ["Communicative safety in the state and business management"], Language. Philology. Culture, No 1, pp. 66-80.
  4. "Department of Defense Strategy for Operating in Cyberspace. 2011, Washington", available at: www. slideshare. net/ DepartmentofDefense/ department-of-defense-strategy-for-operating-in-cyberspace
  5. "Doctrine of the Information Security of the Russian Federation" ["Doktrina informatsionnoi bezopasnosti Rossiiskoi Federatsii"], available at: http://www.rg.ru/oficial/doc/min_and_vedom/mim_bezop/doctr.shtm
  6. "Government of the Republic of Lithuania Resolution No. 796 of 29 June 2011 "On the Approval of the Programme for the Development of Electronic Information Security (Cybersecurity) for 2011-2019", Valstybės žinios, No. 83-4033, 2011; No. 106 (correction).
  7. "International Strategy for Cyberspace", available at: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_ strategy_ for_ cyberspace.pdf
  8. Korsakov, G.B., "The role of information weapons in military and political strategy of the USA" ["Rol' informatsionnogo oruzhiya v voenno-politicheskoi strategii SShA"], available at: http://elibrary.ru/item.asp?id=17358664
  9. O'Connell, M.E., "Cyber Security without Cyber War. 2012, Oxford", available at: http://jcsl.oxfordjournals.org/content/17/2/187.full
  10. "Press release of Dalia Grybauskaitė, President of the Republic of Lithuania. 2012, Munich", available at: www. president. lt/lt/ spaudos_ centras_ 392/ pranesimai_ spaudai/ kibernetinis_ ir_ energetinis_ saugumas_ -_ lietuvos_ prioritetas.html
  11. "Press Release of the Council of the Russian federation", available at: http://council.gov.ru/press-center/news/14575/
  12. "Resolution No. 189 of the Government of the Republic of Lithuania "Regarding the Approval of the Implementation Measures of the 2008–2012 Programme of the Government of the Republic of Lithuania" of 25 February 2009", Official Gazette, 2009, No. 33-1268.
  13. Schjolberg, S., Ghernaouti-Hele, S. (2011), "A Global Treaty on Cybersecurity and Cybercrime. Geneva", available at: www. cybercrimelaw. net/documents/ A_ Global_ Treaty_ on_ Cybersecurity_ and_ Cybercrime,_ Second_ edition_ 2011.pdf
  14. Štitilis, D. (2011), Electronic Crimes: A Methodological Tool, Mykolas Romeris University, Vilnius, p. 83.
  15. Štitilis, D., Pakutinskas, P., Dauparaitė, I., Laurinaitis, M. (2011), "Legal Environment in Order to Prevent Identity Theft: Comparative Analysis of the Legal Acts of the USA and Lithuania", Social Technologies, No. 1(1), p. 68.
  16. Štitilis, D., Paškauskas, Ž. (2007), "State's Electronics Information Security Strategy – One of Key Electronic Information Security Regulatory Instruments: Comparative Analysis", Jurisprudencija, No. 2(92), pp. 37-45.
  17. "The conceptual views on the activities of the Armed Forces of the Russian Federation in the information space" ["Kontseptual'nye vzglyady na deyatel'nost' Vooruzhennykh Sil Rossiiskoi Federatsii v informatsionnom prostranstve"], available at: http://ens.mil.ru/science/publications/more.htm? id=10845074@ cmsArticle
  18. Volchinskaya, E.K. (2008), "The Role of the State in Ensuring Information Security" ["Rol' gosudarstva v obespechenii informatsionnoi bezopasnosti"], http://elibrary.ru/item.asp?id=13609231
Файлы / Files 5-stitilis-darius.pdf

Выходные данные журнала «Вопросы российского и международного права», в котором размещена статья / Publisher's imprint of the journal "Matters of Russian and International Law", which includes the article