Back to Search View Original Cite This Article

Abstract

<jats:p>In the current conditions of global digitalization and the growth of hybrid threats, information security issues are becoming critical for the functioning of the state and society. The intensification of information confrontation, cyber threats, and manipulative influence on public consciousness actualizes the need to improve public governance mechanisms in this area. The article provides a theoretical and legal analysis of public governance in the area of information security in the context of modern challenges. The essence and content of the concept of "information security" as an object of public governance are revealed, and key approaches to understanding the category of "public governance" in domestic and foreign scientific thought are identified. The regulatory and legal support for information security is analyzed, its structural elements are outlined, and the main problems of legal regulation in this area are identified. Particular attention is paid to the characteristics of modern challenges to information security, among which cybercrime, information wars, the spread of disinformation, and the vulnerability of critical information infrastructure are highlighted. The role of public authorities in the formation and implementation of state policy in the field of information security is determined, in particular in terms of ensuring coordination between institutions, implementing innovative management approaches and increasing the level of digital literacy of the population. The study substantiates the need to improve public governance mechanisms in the field of information security by harmonizing national legislation with international standards, developing the institutional capacity of authorities and implementing an integrated approach to countering modern threats. It is concluded that effective public governance in the field of information security is a key factor in ensuring national security, state stability and protecting information sovereignty.</jats:p>

Show More

Keywords

information security public governance threats

Related Articles