{"id":1921,"date":"2023-05-18T17:43:42","date_gmt":"2023-05-18T15:43:42","guid":{"rendered":"http:\/\/jcee.wsgk.com.pl\/?page_id=1921"},"modified":"2023-05-18T17:45:52","modified_gmt":"2023-05-18T15:45:52","slug":"present-day-security-threats-to-ukraine-in-the-informational-sphere","status":"publish","type":"page","link":"https:\/\/jcee.wsgk.com.pl\/?page_id=1921","title":{"rendered":"Present-day security threats to Ukraine in the informational sphere."},"content":{"rendered":"\n<p><strong>AUTHOR:<\/strong><br><em>Vira Burdiak<\/em><\/p>\n\n\n\n<p><strong>ABSTRACT:<\/strong><br>The author argues that informational security is an inevitable part of building an information society. Its development is proceeding by means of expending technological possibilities while carrying out information exchange, deep understanding of the necessity to implement all measures concerning information resources and provision of information security in the country by all subjects of information relations (owners of information, consumers, producers of information technology and means, information suppliers, state). The number of threats to the Ukrainian information security is rather high. These problems of information security have received their coverage in the regulatory acts and scientists\u2019 research. To organize counteractions to information war it is necessary to be aware of the factors, which facilitate the risks, threats and insecurities in the ideological-informational sphere, their essence, to be able to evaluate and determine probability and level of negative effect on the state and society.<\/p>\n\n\n\n<p><strong>DOWNLOAD FULL ARTICLE:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-thumbnail\"><a href=\"https:\/\/jcee.wsgk.com.pl\/wp-content\/uploads\/archive_2017\/Burdiak V. 8-2017.pdf\"><img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/jcee.wsgk.com.pl\/wp-content\/uploads\/2023\/04\/vector-pdf-icon-symbol-sign-150x150.webp\" alt=\"\" class=\"wp-image-788\" srcset=\"https:\/\/jcee.wsgk.com.pl\/wp-content\/uploads\/2023\/04\/vector-pdf-icon-symbol-sign-150x150.webp 150w, https:\/\/jcee.wsgk.com.pl\/wp-content\/uploads\/2023\/04\/vector-pdf-icon-symbol-sign-300x300.webp 300w, https:\/\/jcee.wsgk.com.pl\/wp-content\/uploads\/2023\/04\/vector-pdf-icon-symbol-sign-1024x1024.webp 1024w, https:\/\/jcee.wsgk.com.pl\/wp-content\/uploads\/2023\/04\/vector-pdf-icon-symbol-sign-768x768.webp 768w, https:\/\/jcee.wsgk.com.pl\/wp-content\/uploads\/2023\/04\/vector-pdf-icon-symbol-sign-1536x1536.webp 1536w, https:\/\/jcee.wsgk.com.pl\/wp-content\/uploads\/2023\/04\/vector-pdf-icon-symbol-sign-2048x2048.webp 2048w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>AUTHOR:Vira Burdiak ABSTRACT:The author argues that informational security is an inevitable part of building an information society. Its development is proceeding by means of expending technological possibilities while carrying out information exchange, deep understanding of the necessity to implement all measures concerning<\/p>\n<p class=\"link-more\"><a class=\"myButt \" href=\"https:\/\/jcee.wsgk.com.pl\/?page_id=1921\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1921","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/jcee.wsgk.com.pl\/index.php?rest_route=\/wp\/v2\/pages\/1921"}],"collection":[{"href":"https:\/\/jcee.wsgk.com.pl\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/jcee.wsgk.com.pl\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/jcee.wsgk.com.pl\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jcee.wsgk.com.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1921"}],"version-history":[{"count":3,"href":"https:\/\/jcee.wsgk.com.pl\/index.php?rest_route=\/wp\/v2\/pages\/1921\/revisions"}],"predecessor-version":[{"id":1926,"href":"https:\/\/jcee.wsgk.com.pl\/index.php?rest_route=\/wp\/v2\/pages\/1921\/revisions\/1926"}],"wp:attachment":[{"href":"https:\/\/jcee.wsgk.com.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}