The Constitutionalization of information security in Russian Law: improving the theoretical model

Cover Page

Cite item

Abstract

Research discusses one of the constitutional amendments of 2020. In accordance with the new version of paragraph “m” of Part 1 of Article 71 of the Constitution of the Russian Federation, the exclusive powers of the Russian Federation include issues of ensuring the security of the individual, society and the state when applying information technologies, and digital data turnover. The consolidation of the problem of information security at the constitutional level determines the need for a partial modernization of its theoretical model. Modification and revision of some of its components will lead to higher effectiveness of constitutional regulation and improve the quality of application of industry legislation in the field of information technology and information protection. The purpose of the research is to investigate the main directions of enhancing the theoretical model of information security in terms of constitutional changes. The employed research methods are formal-legal, logical, system, statistical, structural-functional, modeling, and forecasting. The outcome of the study can be outlined as follows. The research clarifies the concept of information security, proposes to generalize the range of basic subjects of public relations related to information security, expand their rights and obligations, highlight the constitutional and sectoral legal regimes of information protection, and strengthen responsibility for offenses in the information sphere. In conclusion the study argues that updating the theoretical model of information security of the Russian Federation should be carried out in the following key areas: firstly, developing information security targets expressed in strategic and program documents of the state; secondly, clarifying classification of information security threats; thirdly, expanding legal regulation density; fourth, strengthening the law-enforcement mechanisms of information security; fifth, establising and maintening optimal balance between legal, technical and ethical regulation of information technologies, primarily digital technologies; and finally, definiing acceptable and unacceptable boundaries of application of information technology and digital data in people's lives.

About the authors

Yulia A. Gavrilova

Volgograd State University

Author for correspondence.
Email: gavrilova_ua@volsu.ru
ORCID iD: 0000-0002-8055-4710

Candidate of Legal Sciences, Associate Professor of the Department of Philosophy and Theory of Law, Law Institute

100, Universitetsky ave., Volgograd, 400062, Russian Federation

References

  1. Bertovsky, L.V. (2021) High-tech law: concept, genesis and prospects. RUDN Journal of Law. 25 (4), 735-749. (in Russian). https://doi.org/10.22363/2313-2337-2021-25-4-735-749
  2. Bieger, J., Thórisson, K.R. & Wang, P. (2015) Safe Baby AGI. In: Bieger, J., Goertzel, B., Potapov, A. (eds.). Artificial General Intelligence. AGI 2015. Lecture Notes in Computer Science. Vol. 9205. Springer, Cham. pp. 46-49. https://doi.org/10.1007/978-3-319-21365-1_5
  3. Cao N., Jiang, D., Liu Y., Zhou Y., Du, H., Qiao, X., Xia, Y. & Zhu, D. (2021) Revisit Raft Consistency Protocol on Private Blockchain System in High Network Latency. In: Sun X., Zhang X., Xia Z., Bertino E. (eds). Advances in Artificial Intelligence and Security. ICAIS 2021. Communications in Computer and Information Science. Vol. 1423. Springer, Cham. pp. 571-579. https://doi.org/10.1007/978-3-030-78618-2_47
  4. Chen, J., Liu, X., Han, W. & Cheng, J. (2021) A Model Design of Blockchain-Based Data Storage for E-Government Application. In: Sun X., Zhang X., Xia Z., Bertino E. (eds). Advances in Artificial Intelligence and Security. ICAIS 2021. Communications in Computer and Information Science. Vol. 1423. Springer, Cham. pp. 666-676. https://doi.org/10.1007/978-3-030-78618-2_55
  5. Chen, Z., Jia, X., Zhang, L. & Yin, G. (2021) Intelligent Security Image Classification on Small Sample Learning. In: Sun X., Zhang X., Xia Z., Bertino E. (eds). Artificial Intelligence and Security. ICAIS 2021. Lecture Notes in Computer Science. Vol. 12736. Springer, Cham. pp. 726-737. https://doi.org/10.1007/978-3-030-78609-0_61
  6. Dobryakov, D.A., Kasa, I. & Sukhostavskaya, Yu.V. (2021) Application of digital technologies in litigation and dispute resolution. RUDN Journal of Law. 25 (2), 461-481. https://doi.org/10.22363/2313-2337-2021-25-2-461-481 (in Russian).
  7. Gaivoronskaya, Ya.V., Miroshnichenko, O.I. & Shakirov, S.Sh. (2021) Trends and lessons of anti-crisis legal regulationin in the period of the COVID-19 pandemic. RUDN Journal of Law. 25(2), 634-662. https://doi.org/10.22363/2313-2337-2021-25-2-634-662 (in Russian).
  8. He, M., Jin, L. & Song, M. (2021) Interpretability Framework of Network Security Traffic Classification Based on Machine Learning. In: Sun X., Zhang X., Xia Z., Bertino E. (eds). Artificial Intelligence and Security. ICAIS 2021. Lecture Notes in Computer Science. Vol. 12737. Springer, Cham. pp. 305-320. https://doi.org/10.1007/978-3-030-78612-0_25
  9. Ionova, E.A. (2018) Information security of communications in the digital economy. Communicology: electronic scientific journal. 3 (4), 39-47. (in Russian).
  10. Koniakou, V. (2021) Governing Artificial Intelligence and Algorithmic Decision Making: Human Rights and Beyond. In: Dennehy D., Griva A., Pouloudi N., Dwivedi Y.K., Pappas I., Mäntymäki M. (eds). Responsible AI and Analytics for an Ethical and Inclusive Digitized Society. I3E 2021. Lecture Notes in Computer Science. Vol. 12896. Springer, Cham. pp. 173-184. https://doi.org/10.1007/978-3-030-85447-8_16
  11. Krönke, C. (2020) Artificial Intelligence and Social Media. In: Wischmeyer T., Rademacher T. (eds). Regulating Artificial Intelligence. Springer, Cham. pp. 145-173. https://doi.org/10.1007/978-3-030-32361-5_7
  12. Lyutova, O.I. & Fialkovskaya, I.D. (2021) Blockchain technology in tax law theory and tax administration. RUDN Journal of Law. 25 (3), 693-710. https://doi.org/10.22363/2313-2337-2021-25-3-693-710
  13. Ovchinnikov, A.I. (2020) Security of the individual and the state in the digital age: political and legal aspects. Journal of Russian Law. (6), 5-21. https://doi.org/10.12737/jrl.2020.064 (in Russian).
  14. Petrova, I.A. & Lobachev, I.A. (2020) Crimes in the field of computer (digital) information: controversial issues of definition of the concept, the object of criminal law protection and the subject of encroachments. Journal of Applied Research. (1), 52-62. (in Russian).
  15. Polyakova, T.A., Minbaleev, A.V. & Boychenko, I.S. (2018) Problems of legal provision of information security in the process of using digital technologies in the global digital environment. Bulletin of the Academy of Law and Management. 3 (52), 32-36. (in Russian).
  16. Poongodi, T., Gopal, R. & Saini, A. (2021) IoT Architecture, Communication Technologies, and Its Applications. In: Kumar R., Wang Y., Poongodi T., Imoize A.L. (eds). Internet of Things, Artificial Intelligence and Blockchain Technology. Springer, Cham. pp. 1-24. https://doi.org/10.1007/978-3-030-74150-1_1
  17. Ruan, Z., Huang, L. & Luo, H. (2021) Securing Satellite Internet of Things by Perceiving Content Semantics. In: Sun X., Zhang X., Xia Z., Bertino E. (eds). Advances in Artificial Intelligence and Security. ICAIS 2021. Communications in Computer and Information Science. Vol. 1424. Springer, Cham. pp. 414-425. https://doi.org/10.1007/978-3-030-78621-2_34
  18. Rusakova, E.P. (2021) Integration of “smart” technologies in the civil proceedings of the People’s Republic of China. RUDN Journal of Law. 25 (3), 622-633. https://doi.org/10.22363/2313-2337- 2021-25-3-622-633
  19. Sharma, S., Parihar, A. & Gahlot, K. (2022) Blockchain-Based IoT Architecture. In: Raj P., Dubey A.K., Kumar A., Rathore P.S. (eds). Blockchain, Artificial Intelligence, and the Internet of Things. EAI/Springer Innovations in Communication and Computing. Springer, Cham. pp. 187-205. https://doi.org/10.1007/978-3-030-77637-4_10
  20. Stefanova, N.A. (2020) Multifactor authentication as an information security tool in the digital economy. Topical issues of modern economics. (4), 246-252. https://doi.org/10.34755/IROK.2020.85.79.036 (in Russian).
  21. Vlasenko, N.A. (2018) The problem of sufficiency and aggressiveness of legal regulation. Legal science and practice: Bulletin of the Nizhny Novgorod Academy of the Ministry of Internal Affairs of Russia. 41 (1), 41-47. https://doi.org/10.24411/2078-5356-2018-00005 (in Russian).
  22. Xie, L., Hang, F., Lv, Y. & Guo, W. (2021) Research on Data Security Protection System of Monitoring and Acquisition System Based on Block Chain Technology. In: Sun X., Zhang X., Xia Z., Bertino E. (eds). Advances in Artificial Intelligence and Security. ICAIS 2021. Communications in Computer and Information Science. Vol. 1424. Springer, Cham. pp. 502-513. https://doi.org/10.1007/978-3-030-78621-2_42
  23. Xu, Z-X., Chen, X-B., Xu, G., Yuan, K-G., Cui, J. & Yang, Y-X. (2021) Research on Feature Words for IoT Device Recognition Based on Word2vec. In: Sun X., Zhang X., Xia Z., Bertino E. (eds). Advances in Artificial Intelligence and Security. ICAIS 2021. Communications in Computer and Information Science. Vol. 1423. Springer, Cham. pp. 287-298. https://doi.org/10.1007/978-3-030-78618-2_23
  24. Zharova, A.K. (2020) Issues of ensuring the security of a person's digital profile. Lawyer. (3), 55-61. https://doi.org/10.18572/1812-3929-2020-3-55-61 (in Russian).
  25. Zheng, Z., Dai, H-N. & Wu, J. (2021) Overview of Blockchain Intelligence. In: Zheng Z., Dai H-N., Wu J. (eds). Blockchain Intelligence. Springer, Singapore. pp. 1-14. https://doi.org/10.1007/978-981-16-0127-9_1

Copyright (c) 2023 Gavrilova Y.A.

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies