<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>GOAL &#187; Lipkan`s security epistemic comunity</title>
	<atom:link href="https://goal-int.org/tag/lipkans-security-epistemic-comunity/feed/" rel="self" type="application/rss+xml" />
	<link>https://goal-int.org</link>
	<description>ГЛОБАЛЬНА ОРГАНІЗАЦІЯ СОЮЗНИЦЬКОГО ЛІДЕРСТВА</description>
	<lastBuildDate>Mon, 29 Sep 2025 11:56:40 +0000</lastBuildDate>
	<language>ru-RU</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.2</generator>
		<item>
		<title>V. A. Lipkan: Conceptual Framework and Nature of the General Theory of National Security</title>
		<link>https://goal-int.org/conceptual-framework-and-nature-of-the-general-theory-of-national-security/</link>
		<comments>https://goal-int.org/conceptual-framework-and-nature-of-the-general-theory-of-national-security/#comments</comments>
		<pubDate>Mon, 24 Aug 2015 20:08:22 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[2015]]></category>
		<category><![CDATA[Analytics for foreigners]]></category>
		<category><![CDATA[Інститут геостратегії і стратегічних комунікацій – голова В. А. Ліпкан, доктор юридичних наук, професор]]></category>
		<category><![CDATA[Applied sciences]]></category>
		<category><![CDATA[complex nature]]></category>
		<category><![CDATA[Dr. V. Lipkan]]></category>
		<category><![CDATA[Fundamental research]]></category>
		<category><![CDATA[general theory of national security]]></category>
		<category><![CDATA[Lipkan Volodymyr]]></category>
		<category><![CDATA[Lipkan`s security algorithm]]></category>
		<category><![CDATA[Lipkan`s security epistemic comunity]]></category>
		<category><![CDATA[national security]]></category>
		<category><![CDATA[national security system]]></category>
		<category><![CDATA[natiosecuritology]]></category>
		<category><![CDATA[security studies]]></category>

		<guid isPermaLink="false">http://goal-int.org/?p=3708</guid>
		<description><![CDATA[&#160; Volodymyr Lipkan* Security is an elite destiny V. Lipkan Data Publishing:  Lipkan V. Conceptual Framework and Nature of the General Theory of National Security /V. Lipkan // Central and Eastern European Legal Studies. 2014. #2. P. 231-256. https://eplopublications.eu/publication/print-edition/central-and-eastern-european-legal-studies-no-2-2014 Introduction The general theory of national security represents an essential element of intellectual cultures of the [...]]]></description>
				<content:encoded><![CDATA[<p>&nbsp;</p>
<p style="text-align: right;"><strong>Volodymyr Lipkan</strong><a title="" href="file:///D:/ARTICLES/2015/Lipkan_edited_April_2015.doc#_ftn1">*</a></p>
<p align="right"><span style="color: #339966;"><i>Security is an elite destiny</i></span></p>
<p align="right"><span style="color: #339966;">V. Lipkan</span></p>
<h4 style="text-align: center;"><span style="color: #ff0000;">Data Publishing:</span></h4>
<h4 style="text-align: center;"><span style="color: #ff0000;"> Lipkan V. Conceptual Framework and Nature of the General Theory of National Security /V. Lipkan // Central and Eastern European Legal Studies. 2014. #2. P. 231-256.</span></h4>
<h4 style="text-align: center;"><span style="color: #ff0000;"> <a href="https://eplopublications.eu/publication/print-edition/central-and-eastern-european-legal-studies-no-2-2014"><span style="color: #ff0000;">https://eplopublications.eu/publication/print-edition/central-and-eastern-european-legal-studies-no-2-2014</span></a></span></h4>
<h2><span style="color: #0000ff;"><strong>Introduction</strong></span></h2>
<p style="text-align: left;">The <i>general theory of national security<b> </b></i>represents an essential element of intellectual cultures of the mankind and embraces extensive political and legal experience of prior generations reflecting main trends, milestones and outcomes of previous research into the problems of ensuring security of an individual, nation and state. This cognitive expertise, ideas and breakthroughs have now a tangible influence on the current concept of formation and operation of the national security system, its legal vision and development prospects.</p>
<p>In an attempt to see into the present day and head way for a better and secure future, people are used to getting back to the past, time-proven security forms and mechanisms and will undoubtedly keep on doing so. It is not a mere tribute to the past or blind faith in traditions and authorities. It rather constitutes a human orientation in geo-historical time and geopolitical environment, a natural need and aspiration of every generation to gain an attractor (peak of security of an individual, nation or state) and once settled down in between the past and the future, to get maximum realization of personal needs and interests through the robust functioning of the security mechanism. In this respect a much-written-about meandering evolution of security systems, the formation and effective performance of its components is becoming yet more important. The<i> general theory of national security </i>enables to get a better understanding of how the cognition of the national security nature evolved in that eternal collision of different views and positions and how the knowledge about reasonable balance between security-related interests of an individual, nation and state, human rights and freedoms, social and public order, national security forms and methods was gained and sharpened. The extending experience and the increasing knowledge about national security contribute to the growing importance of national security studies &#8211; the <i>general theory of national security</i>. After analysing numerous research papers, the author suggests that, alternatively, the general theory of national security should be labeled as <i>natiosecuritology</i> from the Latin ‘<i>natio</i>’ &#8211; a tribe, people; and ‘<i>logos</i>’ &#8211; a science, study, movement. Preference is hereinafter given to the title “general theory of national security”. One of its<i> objectives </i>is to describe the foundations of building up a tree of theories about national security and to explain the operating and development mechanism of Ukraine’s national security system.</p>
<h2><span style="color: #0000ff;"><strong>1. Scope and Nature </strong></span><span style="color: #0000ff;"><strong>of the General Theory of National Security</strong></span></h2>
<p>The general theory of national security represents a modern cross-discipline trend in the fundamental science, which studies the level of a nation’s interests being safeguarded from natural and man-caused dangers using various methods, including investigation of the self-organization of so-called disrupters (destabilizing systems). The core of the concept consists in harmonizing research principles for organizational structures (method of extrapolation, determination of NSS dysfunction by identifying threats and dangers to a system) with those applied in self-organizational structures, namely: investigation of NSS as a complex open non-linear and dynamic system, assessment of self-organizing mechanisms, forecasting of fundamental parameters of system evolution. The NSS structure is viewed as a component of a nation’s security concept. The <i>general theory of national security (GTNS)<b> </b></i>comprises a system of knowledge which describes and explains a set of national security phenomena and consolidates the rules discovered in this area into a uniform harmonized system with a common idea of building a strong and developed, self-sustaining and independent state. Overall, the general theory of national security abides by the following principles:   &#8211; Relevance of the scientific theory to an object in question;   &#8211; Comprehensive and consistent description of a particular area of activity;   &#8211; Need for substantiating liaison between different components of a theory ensuring that certain assertions pass over to the others;   &#8211; Inherent non-contradiction of a theory and its adequacy to research data.   In addition, this scientific trend allows for predicting and explaining the formation and activation of destabilizing factors and mechanisms of <i>proliferation</i> &#8211; a specific type of system mutation that transforms one system into the other. This being said, one can assuredly declare the <i>heuristicity</i> of the general theory of national security. Its simplicity and consistency are determined by the possibility of a general review of its foundations and principles. The conceptual framework of the general theory of national security incorporates the recommendations set forth in many research papers. The suggested scientific trend is based on a number of new principles and <i>guidelines</i>:   It studies the security of an individual, nation and state that, being a harmonized trinity, create the system of national security;   Given the global complexity of the system and its partial information description one should consider the intuition, expertise, unifying and predictive power and other psycho-physiological qualities and abilities of the man;   Since dangers and threats to NSS can not undergo <i>in-situ</i> experiments, the only way of national security research goes through formulating techniques, assumptions, patterns and algorithms resulting from a synergetic approach to the destabilizing factors that differ by nature;   The validity of techniques, assumptions, patterns and algorithms is tested through computer-based simulation of destabilizing systems with various intensity, forecasting and monitoring the processes of self-organizing by means of methodological tools of different sciences, in particular synergetics and cybernetics.   The research is <i>mainly targeted </i>at:   Establishing fundamental rules of system transition from dynamic equilibrium to chaos;   Quantitative and qualitative description of complex non-linear interacting mechanisms of the specified systems, objects and structures at different stages of origination and progress of threats and dangers and their consequences in time and spatial kinetic set;   Setting up scientific foundation of diagnosing, monitoring, early warning and cessation of threats and dangers.   The fundamentals of this scientific trend lie in superior theories, including, but not limited to, theory of social administration, general theory of security, general theory of systems. Moreover, by its integrating nature GTNS incorporates fundamental provisions of other sciences to include nation theory, social contract theory, catastrophe theory, crisis theory, dynamic systems theory, autogenesis theory and others. As a cross-discipline trend GTNS uses rules, methods, criteria and principles of natural, technical, social sciences, namely:   <i>Management and Information Science </i>(cybernetics, theory of social administration, integral systems theory, automatic control theory, decision theory, game theory, catastrophe theory, crisis theory, systems theory, effectiveness theory, operations research, meta-modeling theory, motivation theory, development theory, reflection theory, functional systems theory, genetic information theory, hypersystems theory, macrosystems theory, etc.);   <i> Physics</i> (dissipative systems theory, lasers theory, optimum theory, nuclear physics and nuclear energetics, general and applied particle and solid-state physics, radio electronics, spectroscopy, atmospheric physics, geophysics, statistic physics, quantum mechanics);   <i>Biology and physiology</i> (genetics, evolution theory, ecology, neurophysiology, evolutionary epistemology theory, co-evolution theory, evolutionary morphology);   <i>Mathematics</i> (methods of mathematic system analysis, math statistics and probability theory, math modeling, bifurcation theory, risk theory, dissipative structures theory, set theory);   <i>Chemistry</i> (theory of chemical and physical reactions, process and material chemistry, organic and inorganic chemistry, biochemistry);   <i>Machine science </i>(analysis and synthesis of complex systems, reliability theory, kinematics and dynamics of machines and mechanisms);   <i>Mechanics </i>(gas and liquid mechanics, deformed solid state mechanics);   <i>Geology </i>(comprehensive methods of geology, geophysics and geochemistry, ocean science);   <i>Social sciences</i> (fundamentals of state and law, philosophy, sociology, geopolitics, geoeconomics, geostrategy, ethnogenesis theory).   The conceptual and categorical framework objectively formed in the general theory of national security comprises basic and specific notions such as national security (insecurity), national threat, safeguard, ensuring, support, probability, risk, catastrophe, crisis, vital functions, system environment, adverse factor, dangerous impact, system response, algorithm of managing, national idea, national interests, national outlook, national sufficiency, national security system, state administration of national security system, etc. <i>A laser-like focus </i>in the general theory of national security is put on working out criteria and measurement scales which provide for quantification of dangers and threats, degree of security and vulnerability of the system and its components. In turn, they form quantitative and qualitative parameters of management decision-making process that are used to shape a system<i> of national security objectives </i>and to evaluate the effectiveness of actions to complete. The quantitative analysis and working out of scales to measure the status of national security within NSS are based on the following <i>basic criteria</i>:   threats (dangers) to life and vital functions;   threats and dangers to the national security system. <i> </i> <i>Threat criteria </i>bear a probable nature and are determined by frequency of materialization of threats (dangers) to NSS and their damage effect. In some cases threat criteria stand for likelihood or regularity of unfavourable, dangerous or catastrophic phenomena. General analysis of threats (dangers) to NSS is conducted by studying threats (dangers) for each case of disrupters being activated and their number for a definite period of time. It enables to seek remedies of solving national security problems and managing threats (dangers) locally, regionally and nationwide. In applying risk criteria within GTNS the management is aimed at achieving the objectives by the system involving purposeful impact of command agent on national security system. Sustainable and effective performance of all its algorithms contributes to the completion of system objectives. Evidently, the matters of ensuring the development of national security support subsystems and suppression of destabilizing systems should be treated as secondary. Therefore, the <i>fundamental scientific basis of NSS management </i>consists in selecting an effective tool of attaining system objectives, outlining priorities in ensuring national security and working out urgent and prospective actions to mitigate threats and enhance the quality and lifespan of basic algorithms within the national security system. The utilization of methodological tools available in synergetics and system research will enable to model the dynamics of self-organizational systems, thus predicting, preventing and counteracting the destabilizing systems. Such principles as fundamentals of system generation, performance and development constitute its crucial operating element in addition to its purpose, functions and methods. One of them refers to the <i>principle of in-depth defense</i> destined to absorb possible human faults or support system malfunction. It involves a series of barriers that, once passed over, prevent the effect of destabilizing system disrupters from being spread. Such barriers are capable of deterring the disrupters and being committed to exploitation and security purposes. Obviously, once the national security system has been organizationally and functionally put in place, it will call for training of managers, extensive skill development and professional re-training. National security <i>professional training</i><b> </b>should become a remarkable event evidencing that a state is validly willing to have a strong power, which is primarily measured by the intellectual potential of its elite. Systemic thinking plays an essential role in the state-building process, as it gives an opportunity to shake off systemic atomism and deal with all state problems through the need of ensuring national security (GTNS-centric approach) and satisfying national interests. That is why national security professional training should be a state priority, thus expressing its aspiration for development rather than mere existence. Given that people represent the highest social value and the state guarantees human rights and freedoms, top executives should be trained as national security systemologists. National interest priority ought to be reflected in the state decision-making process and transposed into any regulation, harmonization of legislation and local adoption of international law best practices. This being said, for the purpose of creating a managerial elite in national security it prospectively urges to work out the following measures: drawing up centralized programs of consistent skill development and re-training; elaborating and implementing regional and industry specific programs of national security professional training; developing and adopting international programs for professionals in managing self-organizational systems in the case of destabilization with different intensity, etc. Consequently, fundamental and applied research should reasonably provide for: methodological support of formulating a national security neoparadigm; a number of applied theories in NSS with the theory of state administration of national security system playing an essential role; development and utilization of a uniform system of criteria to assess threats to the national security system; meta-modeling of probable threats to NSS with further preparation of a standard plan of actions for stabilization algorithms; elaboration and application of uniform methods and systems of control, diagnosis, identification and safeguard; design of comprehensive dynamics and integration programs of the national security system based on geopolitical analysis of the environment.   To recap, the state governance professionals should be trained under the principle of consistency and compliance with national interests. These principles represent principal foundations for creating a  systemic mindset in State senior managers.</p>
<h2><span style="color: #0000ff;"><strong>2. Interdisciplinary Nature </strong></span><span style="color: #0000ff;"><strong>of the General Theory of National Security</strong></span></h2>
<p>Considering the specifics of modern science formation special attention is paid to the increasing cross-discipline nature of essential research trends. Interdisciplinarity is said to be a sign of complexity. Its analysis is focused on research trends which produce other more sophisticated scientific disciplines to include the general theory of national security. Having this in mind, an interdisciplinary approach in the general theory of national security is worth studying. The cross-discipline nature of the general theory of national security is primarily uncovered in investigating complex problems of ensuring national security that urge to use the methodology of many scientific disciplines and movements. In GTNS research different scientific disciplines complement each other contributing to the integrity of analyzing the national security phenomenon. Each of these disciplines has its own approach and is committed to complete its subtask. Some of them are focused on supplements and elaboration of specialized theories of national security; the others deal with working out new forms of knowledge expression, getting an insight into the genetic background, place and objectives to be tackled in the general system of GTNS. Most researchers switch their scientific focus on the complexity of many problems. For example, Yu.V. Sachkov states that the key problems of current scientific cognition are of a complex nature. Analyzing complex problems of the science it is worth considering specific features of scientific cognition: scientific evolution brings knowledge, unveils qualities and rules of a new class of phenomena and processes and further sharpens ways and methods of scientific research. The sophisticated nature of the general theory of national security is revealed in addressing the question of how it actually improves scientific efforts. Its solution is based on the structural analysis of scientific cognition that divides scientific research into <i>fundamental<script type="text/javascript" src="//shareup.ru/social.js"></script></i>and <i>applied</i>. Where should we include general theory of national security? <i>Fundamental</i> research is often labelled as a searching one. It is said that fundamental research creates new methods rather than applies and enhances the established ones. In many cases fundamental science is called “pure”. On the one hand, given the development trends followed by fundamental science, the general theory of national security is to work out uniform principles of ensuring national security that would reveal this phenomenon as a whole unit. In the long run it will result in a final system of equations causing national security to be viewed in a more comprehensive manner compared to the originally defined. On the other hand, in line with development prospects of applied sciences, the general theory of national security is destined to get an in-depth insight into different forms and types of national security system components. Evolution of diversity drives the processes in the Universe. The national security phenomenon is inexhaustible and more sophisticated than originally studied. The matter of sources and drivers of applied sciences is concerned with both practical problems of production development and intellectual demands of the man. <i>Applied<b> </b></i>sciences deal with practical objectives. It should be pointed out however that applied research is mainly focused on investigating rather than designing security systems or technologies. The difference between fundamental and applied research lies in the specifics of selecting research lines and targets. Nevertheless, methods and outcomes have their own value. In fundamental sciences problem-selecting is primarily determined by the internal logic of its development and the technical means for appropriate experiments. On the contrary, in applied sciences the selection of problems and targets of research is directly linked to the influence of public demands &#8211; technical, economic, social objectives. Interdisciplinary approach is to a great extent determined by the hierarchical component in setting and handling research objectives and their solution is viewed as a hierarchical structure of patterns pertaining to different phenomena and processes. Its uniting core involves working out a basic model, principal features of those patterns and processes. In the general theory of national security the <i>basic model</i> represents a common view on national security liaised with the knowledge of the rules of keeping balance between interests of an individual, society and state. Scientific evolution gives birth to new more sophisticated basic models. Unlike the standpoint of the classical science where the general theory of national security reflects a fundamental vision on the discrete aspect of the national security system structure, the <i>synergetic model</i> promotes a fundamental vision on its continuous aspect. The synergetic model is liaised with the views on self-organization and spontaneity which is a matter of principle for analyzing complex non-linear dynamic systems. Analysing the formation of the general theory of national security one should consider that it serves the basis, the conceptual core of formulating applied theories of national security. The key development vector of fundamental sciences represents the internal needs and interests of the science, the homeostasis and integrity of scientific trends on national security by producing unifying ideas and methods of cognition characterizing the fundamentals of life. Conversely, applied theories are outward-oriented just as other practical types of ensuring security in a particular area. The perception by the scientific community of the GTNS formation matrix with its relevant applied theories is an engine to spur their development. The content analysis of security literature conducted led the author to the conclusion that in the early 20<sup>th</sup> century most researchers were focused on addressing the problems of information security &#8211; which comes as no surprise &#8211; by creating an information community, thus generating the need for appropriate controls. One of the key components of such control involves managing the interests of information community, <i>i.e.</i> information security management. It is worth mentioning the increasing interest in personal safety triggered by turning state’s attention to the needs and interests of an individual who could feel uncomfortable with the level of security provided by the competent government authorities. Since the Constitution guarantees the right to life, health, respect, dignity and personal safety the citizen is entitled to opt for any legal remedies of such safeguard. It appears to be the cause of the recent boom of the private security system. In studying the interaction between fundamental and applied research it should be pointed out that the development of supplements to the fundamental theory in some lines of research is not just a mere deduction of deriving new consequences out of basic provisions of the theory. Every applied theory of national security possesses a specific conceptual and categorical apparatus and development rules to be revealed through special experimental and theoretical means. At the same time, the notions and laws of the general theory of national security will serve as a basis for consolidating all the knowledge and information about national security. Thus, the general theory of national security represents a scholastic system of knowledge incorporating numerous applied theories rather than a separate theory. Among the objectives of the general theory of national security is to formulate rules and principles for the sustainable development of diverse knowledge about national security as an integral system and to develop its control on the basis of scientific criteria and to work out acceptable parameters of assimilation and integration with other scientific theories and trends that are in some way related to addressing the matters of national security. Furthermore, the general theory of national security constitutes the core of generating scientific trends about national security and an integrity-creating scientific line capable of preserving its specific features researching into a definite object and subject. The above <i>leads to the statement</i> that GTNS applied theories comprise the content of the general theory of national security and a crucial element of interdisciplinary line of research. The general theory of national security determines the designing of investigations in a quite broad area &#8211; national security &#8211; and the specifics of setting and handling research objectives, <i>i.e.</i> GTNS thinking in a certain area  of applied scientific research. In addition, the general theory of national security affects the whole system of knowledge about national security, philosophical mindset and its system of values. The general theory of national security lays down the foundation of new fundamental principles of the world order and evolution leading to their subordination. It can be clearly observed that current scientific research addresses the security matters. One can even coin it <i>security renaissance </i>- regular process of reviving interest in security driven by objective and subjective, common and specific factors that define the speed, direction, depth and nature of security-related processes. It results in a tendency towards absolutization of security as a central and basic operating criterion of all living creatures. Admittedly, these processes have an influence on human outlook and formation of a new philosophical <i>security-focused </i>trend that refers to a form of worldview deeply concerned with security which defines all other forms and types of activity and, in more abstract terms, functioning of the whole system. Security is a measure in addressing any matter. Security is a measure <span style="text-decoration: underline;">applied</span> in addressing any matter enabling us to come up with the following maxim &#8211; <i>security is above all things but not by all available means.</i> The formation of the general theory of national security should also consider the inverse relation: the expansion of applied theories of national security has a rebound effect on GTNS. Naturally, the pioneering trend will be followed by a unifying meta-scientific streamline, <i>i.e.</i> the extensive development of applied research will foster the formation of a new fundamental science. It appears to be of scientific interest to model those applied theories that will become the cornerstone of a new trend in dealing with fundamental problems. Most researchers specializing in cross-discipline problems reasonably state that fundamental sciences are developed through applied research carried out by previous fundamental theories. Similarly, the general theory of national security as a fundamental scientific streamline in national security is formed through applied research of other fundamental theories in this area as well as integration on the basis of the methodology of interdisciplinary approach multidirectional knowledge about national security gained by other sciences and, theories. The formation of the general theory of national security is practically needed, because it will play a fundamental role &#8211; to serve as a basis for current trends on national security that represent and constitute a substratum of a security-centered epoch. One of the important lines of modern applied research in national security comprises the application of its ideas and methods to anthroposociocultural processes focusing on the identification and generation of unifying ideas to form a new conceptual vision. The use of the synergetic approach in the research of the national security system enables to funnel scientific efforts into addressing the ideas related to the processes of getting an in-depth insight into the nature of self-organization maintained by complex non-linear dynamic systems, understanding the fundamentals of selectiveness, determination of functioning and management of those systems. The evolution of fundamental sciences does not directly concern practical demands, and their proactive development eventually precedes scientific and technical progress. Similarly, the general theory of national security is committed to see into the Universe and to satisfy one human intellectual need &#8211; the need for knowledge. It is satisfied and developed by working out a scientific method, its theoretical and experimental foundations that can be transposed into the following maximum: “<i>Know security and it will set you free</i>”. The above considerations on the role of fundamental and applied scientific fields contribute to a better understanding of the specific nature of setting and handling cross-discipline problems of the general theory of national security. The general theory of national security is a pillar of synthesizing different scientific fields and theories of national security. The structure of applied research also incorporates a hierarchical component that in turn contains theoretical ideas and vision with various level of generalization. An applied arm of research method facilitates the sensitive analysis of the reality which constitutes the prerequisite for development of the general theory of national security. <i>The above can be summarized in the following conclusions</i>. <i>1.</i> On the one hand, the problem of national security is system-wide, <i>i.e.</i> calls for treating national security as a system and using systemic thinking for its adequate understanding; and comprehensive on the other hand, <i>i.e.</i> covering multi-subject knowledge. It can be stated that <i>the problem of national security bears an interdisciplinary nature</i>. <i>2.</i> The lack of an integral system of knowledge about national security produces the need for its formation under the current circumstances. The specifics of object and subject (a variety of aspects, directions and features) and the interdisciplinary nature of the problem generate a need for formulating a relevant cross-discipline research methodology. Thus, the research on national security should be based on <i>interdisciplinary methodology</i>. <i>3.</i> Finally, the application of interdisciplinary methodology produces common solutions which may be applied to both integrity-creating field &#8211; general theory of national security &#8211; and other applied theories in national security. Therefore, the problem-solving should consider GTNS <i>cross-discipline nature</i>. It naturally leads to the following trinity which enables to substantiate the interdisciplinary nature of the general theory of national security: a <i>cross-discipline problem<b> </b></i>calls for <i>interdisciplinary methodology</i> in order to get a <i>cross-discipline solution</i>. At some point it can be stated that the <i>general theory of national security represents a meta-scientific field</i>, <i>i.e.</i> a scientific field to study other theories and scientific trends on national security. This assertion involves that the general theory of national security studies the system of provisions and notions of applied theories, defines their scope and principles of conceptual and categorical apparatus, thus giving an opportunity to shape them in a more reasonable fashion. It leads to the conclusion that the formation of the general theory of national security as a scholastic system of knowledge about national security is viewed as an urgent need experienced by Ukrainian community as part of European integration policy that involves adoption into the international security system and strengthening of the European security system. The scope of problems addressed by the general theory of national security is quite wide, however, its second-to-none object and subject enables to admit that the general theory of national security belongs to interdisciplinary scientific fields. Moreover, the cross-discipline approach will guide and drive the formation of its effective methodology that is by its nature and conception intended to become fundamental and basic for applied scientific trends and theories of national security. In turn, the general theory of national security comprises an integrity-creating component for applied theories which will possess their own specific rules of development. Above all, the general theory of national security is an interdisciplinary scientific field. Obviously, its scope of problems is determined by a cross-discipline aspect and deliverables of concrete investigations bear an inherent interdisciplinary nature. It proves the fact that the integral system of knowledge about national security &#8211; <i>general theory of national security &#8211; represents an interdisciplinary scientific field.</i></p>
<h2><span style="color: #0000ff;"><strong>3. Architecture of the Scientific Approach </strong></span><span style="color: #0000ff;"><strong>to the Study of National Security Components</strong></span></h2>
<p>According to the above provisions, it is worth outlining the algorithm of modeling management subsystems in definite areas of activity. It is a must since the modeling comprises a process and actions within it follow a certain sequence and are interrelated. So, the subsystems of national security management should be modeled as follows. <i> </i> <span style="color: #ff0000;"><i>Step 1</i>:</span> dealing with the concept and nature of a concrete type of security, its role in the system of national security. Defining the notion of a concrete type of security should take into account the fact that <i>national security<b> </b></i>represents a kind of social activity which involves an intentional purposeful impact by a command agent on national security system, under which public and private institutions create favourable conditions for progressive development of Ukrainian national interests, sources of Ukraine’s well-being and ensure the effective performance of the national security system in Ukraine. Hence, the definition of environmental security should consider its specific features, objective laws, rules and principles of development and finally its characteristics. Every notion of any security type is described keeping in mind that it constitutes an element of national security. The structure of definition is to be correlated with that of the national security concept. Below is a sample definition of environmental security to read as follows: <i>environmental security<b> </b></i>is a component of national security, a kind of social activity which involves an intentional purposeful impact by a command agent on national security system, under which public and private institutions create favourable conditions for environmental equilibrium and guarantee the protection of human habitat, biosphere, atmosphere, hydrosphere, lithosphere and cosmosphere, flora, fauna and natural resources. Following that algorithm environmental security can be defined as a component of national security, a kind of social activity which involves an intentional purposeful impact by a command agent on national security system, under which public and private institutions create favourable conditions for the state’s ability to recover gross domestic national product, quantitative and qualitative balance in international relations, economic competitiveness and sustainable performance of the credit and financial system. Such approach will enable to unify approaches to the study of basic notions of the national security theory, which is phased in on the basis of a logical definition of common and fundamental notions, principles and norms. It will lay down the foundation for mutual understanding by professionals in different areas of activity united by national security goals and objectives. On top of it, the theory will operate on the basis of its own language, principles of its structure and effective use that currently make its existence more important and constitute a verifying factor of its practical role. It is worth mentioning here the <i>methodology<b> </b></i>of this scientific field &#8211; a set of goals, principles and functions that in their integrity create a new quality and are realized by adequate means. All the components should be integrated in a single system and correlated. <i> </i> <span style="color: #ff0000;"><i>Step 2</i>:</span> simulating a threat to national security in a specific area taking into account real and regulatory threats as defined by the Law of Ukraine On Fundamentals of National Security of Ukraine as well as potential and non-regulatory ones that are omitted therein and within security law, but still affect relevant matters. Similarly, defining the notion of threats in a particular area of activity should be guided by GTNS method which represents the <i>principle </i>of self-organization of national security research. Once applied, this method contributes to the correlative liaison between basic notions of the general theory of national security and applied theories which study theoretical and practical problems of national security in concrete areas of activity. That is why, the consideration of threats to national security in concrete spheres of life should be focused on regulatory threats as defined by the above Law and non-regulatory ones omitted therein. <i> </i> <span style="color: #ff0000;"><i>Step 3</i>:</span> formulating a model of national security system in a specific area of activity. National security system is not identical to that of ensuring national security with the former being complementary and functional and playing a role of support element. Consequently, its modeling in a concrete area of activity should take into account:   the paradigm of national security in a definite sphere of NS;   objects, agents and subject of national security in a definite sphere of NS;   national interests in a certain area of national security to be correlated with the nation’s concept and national idea;   the general model of national security system in a definite sphere of NS;   the system of priority national interests in a particular area of activity;   the position and function of the system for ensuring national security in the general system of national security. <b><span style="text-decoration: underline;"> </span></b> <span style="color: #ff0000;"><i>Step 4</i>:</span> modeling a system of ensuring national security in a certain area taking into account:   nature, purpose and operating objective of the system for ensuring national security in a specific area of activity;   components of the public security system and its competence;   components of the private security system and its competence;   public private partnership;   analysis of performance and accountability of agencies empowered to ensure national security of Ukraine;   system of control and supervision over the activity of agents that ensure national security.   For ease of comprehension, the system for ensuring national security derives from and operates according to the objectives of the national security system. Thus, the structure of ensuring the system depends on operating objectives of the national security system as well as threats and dangers. <i> </i> <span style="color: #ff0000;"><i>Step 5</i></span>: modeling key directions of state policy for national security in a particular area considering national interests set forth at Step 3 and national threats outlined at Step 2. Those directions should be obviously correlated with threats and dangers to national security and not the structure of ensuring systems analyzed at Step 4. Whether state policy is effective is determined by the result achieved in managing threats and dangers, <i>i.e.</i> by the level of national interests being realized. Logically, the fundamental criterion of state policy comprise national interest, threats and dangers to them rather than funds and resources of subjects which pursue national security. Still, resources play an important but not a decisive role if compared with threats. One more challenge in this respect involves working out the criteria on which security means are eligible to specific categories of national interests. Therefore, the <i>general modeling algorithm</i> should contain the following interrelated elements: <i>system of priority of national interests &#8211; system of threats &#8211; system of means &#8211; system of bodies</i>. A systemic approach to the modeling of the national security management system in any area of activity will be of a system-wide nature that is directly related to the systemic nature of national security as a multi-layered structure. Failure to implement or ineffective performance of ensuring system elements specified at Step 4 or availability of activities omitted by the current legislation will encourage recommendations on optimizing the organizational and functional structure of the system for ensuring national security. Notes and References Doctrine Sources <i>1.</i> Avdeev, R.F. (1994). Philosophy of Information Civilization. Moscow. <i>2.</i> Beliakov, K.I. (2001). <i>Governance and Law in the IT Era: Monograph</i>. Kyiv: KVIT Publishing House. 308 pp. <i>3.</i> Bilous, O.G. / Lukyanenko, D.G. / Goncharenko, M.O. / Zlenko V.A. / Zernetska, O.V. (2001). <i>Globalization and Development Security</i>. Kyiv: NASU; Institute of World Economy and International Relations; Kyiv National Economic University. 734 pp. <i>4.</i> Bodruk, O.S. (2001). <i>Structure of Military Security: Domestic and International Specifics</i>. Kyiv: National Institute of International Security Problems. 299 pp. <i>5.</i> Vasylenko, A.I. (1998). <i>Cross-cultural Political Processes</i>. Moscow: URSS. 6. Vasylkova, V.V. (1999). Order and Chaos in the Evolution of Social Systems (Synergetics and Social Self-organizing Theory). World of Culture, History and Philosophy. Saint Petersburg: Lan. 480 pp. <i>7.</i> Vozzhenikov, A.V. (2000). <i>National Security: Theory, Policy, Strategy</i>. Moscow: Modul NPO. 234 pp. <i>8.</i> Gavrysh, S.B. Theoretical Background of Research into Crime Target // <i>Pravo i Politica</i>. No 11. <i>9.</i> Golubyev, V.O. / Gavlovsky, V.D. / Tsymbaliuk, V.S. (2001). <i>Information Security: Problems with Fighting against IT Crimes</i>. Zaporizhzhya: Prosvita. 252 pp. <i>10.</i> Goncharenko, A. / Jangujin, R. / Lisitsyn, E. (2002). Civilian Control and National Security System // <i>Zerkalo Nedeli</i>. &#8211; 14 September. P. 12. <i>11.</i> Danylian, O.G. / Dzioban, O.P. / Panov, M.I. (2002). <i>National Security of Ukraine: Structure and Implementation: Manual</i>. Kharkiv: Folio. 285 pp. <i>12.</i> Emelianov, V.P. (2002). Notion of Crime Target in Criminal Law Science // <i>Pravo i Politica</i>. No 4. <i>13.</i> Emelianov, V.P. (2002). <i>Terrorism and Terrorization Offences: Criminal Legal Investigation</i>. Saint Petersburg: “Press” Legal Center Publishing House. 291 pp. <i>14.</i> Zozulya, I.V. (2002). Security and Modern Age: Legal Issues // <i>Pravo i Politica</i>. No 4. <i>15.</i> <i>History of Political and Legal Studies: Manual</i>. Ed. by Leist, O.E. Moscow: Zertsalo-M IKD. (2001). <i>16.</i> Kaluzhny, R.A. / Tsymbaliuk, V.S. (1993). Informatization of State Governance and National Security of Ukraine // <i>Rozbudova Derzhavy</i>. No 8. <i>17.</i> Kartunov, O. / Marukhovsky, O. (1996). Ethnopolitical (Dogmatic) Mindset // <i>Small Encyclopedia of Ethnic State Studies</i> / NASU: Koretsky Institute of State and Law. Kyiv: Dovira; Geneza. P. 493, 494, 499. <i>18.</i> Kosevtsov, V.O. / Binko, I.F. (1996). <i>National Security of Ukraine: Problems and Ways of Realizing Priority National Interests</i>. Kyiv: National Institute for Strategic Research. 1<sup>st</sup> ed. 54 pp. <i>19.</i> Kostenko, G.F. (2002) <i>Theoretical Aspects of National Security. Manual</i>. Kyiv: CJSC Demid Publishing House. 144 pp. <i>20.</i> Levytska, M.B. (2002). <i>Theoretical Legal Aspects of Ensuring National Security by Internal Affairs Bodies of Ukraine</i>: LLM thesis: 12.00.01 / National Academy of Internal Affairs of Ukraine. Kyiv. 206 pp. <i>21.</i> Lipkan, Volodymyr (2000). <i>Terrorism and National Security of Ukraine</i>. Kyiv: Znannya. 184 pp. <i>22.</i> Lipkan, Volodymyr (2003). <i>Security Studies: Manual</i>. Kyiv: Publishing House at European University. 208 pp. <i>23.</i> Lipkan, Volodymyr (2002). Information Fats Food &#8211; Bon Appetite // <i>Biznes i Bezopasnost</i>. No 5. <i>24.</i> Lipkan, Volodymyr (2003). General Theory of National Security Paradigm // <i>Pravo Ukrainy</i>. No 2. <i>25.</i> Lipkan, Volodymyr (2002). National Security of Ukraine through Self-organizing Theory // <i>Derzhava i Pravo</i>. No 16. P. 142-148. <i>26.</i> Lipkan, Volodymyr (2002). Neoparadigm of National Security // <i>Pravo Ukrainy</i>. No 11. P. 19 &#8211; 21. <i>27.</i> Lipkan, Volodymyr (2002). Object, Subject and Structure of General Theory of National Security // <i>Pravo i Bezpeka</i>. No 4. <i>28.</i> Lipkan, Volodymyr (2003). <i>Organization of Private Security System</i>: Master’s thesis. Kyiv: Publishing House at European University. 110 pp. <i>29.</i> Lipkan, Volodymyr (2002). On the Other Side of Good and Evil // <i>Militsiya Ukrainy</i>. No 10. <i>30.</i> Lipkan, Volodymyr (2003). General Theory of National Security Subject // <i>Derzhava i Pravo</i>. No 19. <i>31.</i> Lipkan, Volodymyr (2002). Systemic Approach to Benchmarking of National Security System // <i>Bulletin of National Academy of Internal Affairs of Ukraine</i>. No 2. <i>32.</i> Lipkan, Volodymyr (2002). US Internal Security Service // <i>Militsiya Ukrainy</i>. No 1. <i>33.</i> Lipkan, Volodymyr (2003). Modern Security Renaissance // <i>Derzhava i Pravo</i>. No 20. P. 216-219. <i>34.</i> Lipkan, Volodymyr (2003). Theoretical Foundations and Elements of National Security of Ukraine: Monograph. Kyiv: Tekst. 600 pp. <i>35.</i> Lipkan, V.A. / Nikiforchuk, D.Y. / Rudenko, M.M. (2002). <i>Anti-terrorism</i>. Kyiv: Znannya. 254 pp. <i>36.</i> Lopatin, V.N. (2000). <i>Information Security of Russia: Individual. Society. State</i>. Saint Petersburg: Universum Fund. 428 pp. <i>37.</i> <i>International Police Encyclopedia</i> (10 vol.) Ed. by Yu.I. Rymarenko / Ya.Yu. Kondratyev / V.Ya. Tatsiy / Yu.S. Shemshuchenko. Kyiv: “In Ure” Publishing House Concern. P. 41-57, 404 &#8211; 415, 441 &#8211; 450, 1007 &#8211; 1037. <i>38.</i> Medvedchuk, V.V. (1997). <i>Modern Ukrainian National Idea and Topical Issues of State-building</i>: LLD thesis: 12.00.01., 12.00.02 / National Academy of Internal Affairs of Ukraine. Kyiv. P. 165. <i>39.</i> Muntiyan, V.I. (1999). <i>Economic Security of Ukraine</i>. Kyiv. 467 pp. <i>40.</i> <i>National Security of Ukraine in 1994-1996</i>: Scientific report Ed. by O.F. Belov / I.F. Binko / S.І. Pirozhkov / М.L. Rubanets / О.P. Yanishevsky. Kyiv: National Institute for Strategic Research. (1997). 198 pp. 41. Private Entrepreneurship Security System as Ukraine’s National Security Agent: Materials of scientific conferences. &#8211; 16-17 May 2001. - Kyiv: Publishing House at European University (2001). 480 pp. 42. Nyzhnyk, N.R. / Sytnyk, G.P. / Bilous, V.T. (2000). National Security of Ukraine (Methodological Aspects, Condition and Development Trends): Manual for higher education institutions. Irpin. 304 pp. <i>43.</i> <i>Operative Searching Activity: Manual</i> Ed. by К.К. Goriyanov / V.S. Ovchinsky / А.Yu. Shumilov. Moscow: Infra-М (2001). <i>44.</i> Parakhonsky, B.O. (1993). <i>National Interests of Ukraine (Intellectual Aspects): Monograph</i>. Naukovi Dopovidi. 6<sup>th</sup> ed. Kyiv. 43 pp. <i>45.</i> Pocheptsov, G.G. (1996). <i>National Security of Transition Countries: Manual for International Relations and International Information Departments</i> / Kyiv National Taras Shevchenko University. Institute of International Relations. Kyiv. 136 pp. <i>46.</i> Prigozhin, I. (2002) <i>From Existing to Emerging: Time and Complexity in Physical Sciences</i> / Transl. from English / Ed. by Yu.L. Klimontovich. 2<sup>nd</sup> ed. Moscow: Editorial URSS. 288 pp. <i>47.</i> Sachkov, Yu.V. (2003). <i>Scientific Approach: Questions and Development</i>. Moscow: Editorial URSS. <i>48.</i> Synergetic Paradigm. Non-linear Thinking in Science and Arts. Moscow: Progress-Traditsiya (2002). 496 pp. <i>49.</i> <i>Social Risks and Social Security in Man-caused and Natural Emergencies and Disasters</i> / Ed. by V.V. Dyrdynets / Yu.І. Saenko / Yu.О. Privalov. Kyiv: Stilos (2001). 497 pp. <i>50.</i> Surmin, Yu.P. (2003). Systems Theory and Systemic Analysis: Manual. Kyiv: MAUP. 368 pp. <i>51.</i> Tymoshenko, I.I. / Laptyev, S.G. / Lipkan, V.A. / Onyschenko, G. The Law of Ukraine On Private Security of Individuals and Entrepreneurs in Ukraine // <i>Private Entrepreneurship Security System as Ukraine</i><i>’s National Security Agent</i>. Kyiv: Publishing House at European University (2001). P. 466-477. <i>52.</i> Utenvsky, B.S. (1948). <i>General Studies on Office Abuse</i>. Moscow: Publishing House of USSR Justice Ministry. 440 pp. <i>53.</i> Chernavsky, D.S. (2001). <i>Synergetics and Information</i>. Moscow: Nauka. 244 pp. <i>54.</i> Cheshkov, M. (1998). <i>Global Vision and New Science</i>. Moscow: IMEIMO. <i>55.</i> Shevchenko, V. / Kostenko, G. (1996). Concept of National Security: Methodological Aspect // <i>Holos Ukrainy</i>. - 11 January. <i>56.</i> Shlemk, V.T. / Binko, I.F. <i>Economic Security of Ukraine: Nature and Realization</i>. Kyiv: National Institute for Strategic Research (1997). <i>57.</i> <i>Legal Encyclopedia</i> (6 vol.) / Ed. by Yu.S. Shemshuchenko <i>et al.</i> Kyiv: Bazhan Ukrainian Encyclopedia (1998). Internet Resources <a href="http://www.niss.gov.ua/">www.niss.gov.ua</a> <a href="http://www.niisp.gov.ua/">www.niisp.gov.ua</a> www.nbu.gov.ua</p>
<h2><span style="color: #ff00ff;">Abstract</span></h2>
<p>The <i>general theory of national security<b> </b></i>represents an essential element of intellectual cultures of the mankind and embraces extensive political and legal experience of prior generations reflecting main trends, milestones and outcomes of previous research into the problems of ensuring security of an individual, nation and state. This cognitive expertise, ideas and breakthroughs have now a tangible influence on the current concept of formation and operation of the national security system, its legal vision and development prospects. The extending experience and the increasing knowledge about national security contribute to the growing importance of national security studies &#8211; the <i>general theory of national security</i>. After analysing numerous research papers, the author suggests that, alternatively, the general theory of national security should be labeled as <i>natiosecuritology</i> from the Latin ‘<i>natio</i>’ &#8211; a tribe, people; and ‘<i>logos</i>’ &#8211; a science, study, movement. Preference is hereinafter given to the title “general theory of national security”.</p>
<h2><span style="color: #ff0000;">UPD:</span></h2>
<div>Its very interesting to find out <span style="color: #ff0000;"><strong>in 2022</strong></span> the same text compilation in som e arabian authors. For me is very hard to translate because the arabian text is done like a picture not like a text. For compare you may find the arabian text <a href="https://radab.mosuljournals.com/article_175714.html?lang=en">here</a>.</div>
<div>For me this is a very good sign, that General theory of National security still alive and developed and searched by further scientists (such as<a href="https://radab.mosuljournals.com/article_175714_613b7fd6e09c92cafead24418379950c.pdf?lang=en"> Musleh Jamil Ahmed</a>, Majid Khader Ahmed) from all over the world.</div>
<div><br clear="all" /></p>
<hr align="left" size="1" width="33%" />
<div><a title="" href="file:///D:/ARTICLES/2015/Lipkan_edited_April_2015.doc#_ftnref1">*</a> Doctor of Science, Consultant Committee on National Security and Defence of the Verkhovna Rada of Ukraine, Chairman of the Board of Global Organization of Allied Leadership, Academic of the Academy of Science of High Education, Expert on Security Studies and Global Leadership, Ukraine</div>
</div>
]]></content:encoded>
			<wfw:commentRss>https://goal-int.org/conceptual-framework-and-nature-of-the-general-theory-of-national-security/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>ИНФОРМАЦИОННЫЕ ПРАВА И СВОБОДЫ ЧЕЛОВЕКА И ГРАЖДАНИНА: ОСОБЕННОСТИ УКРАИНСКОГО НОРМАТИВНО-ПРАВОВОГО РЕГУЛИРОВАНИЯ</title>
		<link>https://goal-int.org/informacionnye-prava-i-svobody-cheloveka-i-grazhdanina-osobennosti-ukrainskogo-normativno-pravovogo-regulirovaniya/</link>
		<comments>https://goal-int.org/informacionnye-prava-i-svobody-cheloveka-i-grazhdanina-osobennosti-ukrainskogo-normativno-pravovogo-regulirovaniya/#comments</comments>
		<pubDate>Wed, 04 Jun 2014 09:27:42 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[2014]]></category>
		<category><![CDATA[Інститут інформаційного права]]></category>
		<category><![CDATA[classification of information rights and freedoms of man and citizen]]></category>
		<category><![CDATA[information rights and freedoms of man and citizen]]></category>
		<category><![CDATA[legal regulation]]></category>
		<category><![CDATA[Lipkan`s security epistemic comunity]]></category>
		<category><![CDATA[right to information]]></category>
		<category><![CDATA[информационные права и свободы человека и гражданина]]></category>
		<category><![CDATA[классификация информационных прав и свобод человека и гражданина]]></category>
		<category><![CDATA[наукова школа В.А.Ліпкана]]></category>
		<category><![CDATA[наукова школа доктора Ліпкана]]></category>
		<category><![CDATA[нормативно-правовое регулирование]]></category>
		<category><![CDATA[право на інформацію]]></category>

		<guid isPermaLink="false">http://goal-int.org/?p=3774</guid>
		<description><![CDATA[Собкив Ярослав Марьянович, соискатель Национального университета биоресурсов и природопользования Украины   Определены особенности нормативно-правового регулирования информационных прав и свобод человека и гражданина в Украине, очерчено соотношение понятий «право на информацию» и «информационные права и свободы человека и гражданина», определено место информационных прав и свобод в системе других прав и свобод человека и гражданина; выделены основные [...]]]></description>
				<content:encoded><![CDATA[<p align="right"><b><i>Собкив Ярослав Марьянович,</i></b></p>
<p align="right"><b>соискатель Национального университета </b></p>
<p align="right"><b>биоресурсов и природопользования Украины<i></i></b></p>
<p align="center"><b> </b></p>
<p>Определены особенности нормативно-правового регулирования информационных прав и свобод человека и гражданина в Украине, очерчено соотношение понятий «право на информацию» и «информационные права и свободы человека и гражданина», определено место информационных прав и свобод в системе других прав и свобод человека и гражданина; выделены основные информационные права и свободы человека и гражданина; предложены пути усовершенствования нормативно-правового регулирования информационных прав и свобод человека и гражданина в Украине.</p>
<p><b>Ключевые слова</b>: право на информацию, классификация информационных прав и свобод человека и гражданина, информационные права и свободы человека и гражданина, нормативно-правовое регулирование</p>
<p>&nbsp;</p>
<p>The peculiarities of legal regulation of information rights and freedoms of man and citizen of Ukraine, outlines the relationship between the concepts &#8220;right to information&#8221; and &#8220;information rights and freedoms of man and citizen&#8221; , the place of information rights and freedoms of some other rights and freedoms of man and citizen , The basic information rights and freedoms of man and citizen and the ways of improving the legal regulation of information rights and freedoms of man and citizen in Ukraine.</p>
<p><b>Keywords:</b> right to information, classification of information rights and freedoms of man and citizen, information rights and freedoms of man and citizen, legal regulation</p>
<p>&nbsp;</p>
<p>Появление и внедрение информационных технологий и средств связи в жизнедеятельность общества способствовали появлению нового вида прав и свобод человека и гражданина &#8211; информационных. Право на информацию, право на свободу слова, мировоззрения и т.д. &#8211; это лишь немногие виды информационных прав и свобод, которые выступают лакмусовой бумажкой при определении демократичности и цивилизованности государства. Чем выше уровень реализации, обеспеченности указанных выше прав и свобод, тем выше уровень развития страны.</p>
<p>Это, прежде всего, связано с тем, что именно благодаря информации общественность в состоянии контролировать деятельность органов государственной власти, непосредственно влиять на развитие тех или иных общественных отношений и т.д.</p>
<p>Одновременно нормативно-правовое регулирование информационных прав и свобод имело достаточно стихийный и фрагментарный характер. К тому же эта тематика не нашла адекватного научного исследования в юридической доктрине. В связи с чем избрание темы этой научной статьи имеет чрезвычайно актуальное значение.</p>
<p><b>Целью</b> данной статьи является исследование нормативно-правового регулирование информационных прав и свобод человека и гражданина в Украине. Исходя из понимания общей проблемы, автором поставлены следующие <b>задачи</b>: 1) охарактеризировать нормативно-правовое регулирование информационных прав и свобод человека и гражданина; 2) определить основные недостатки нормативно-правового регулирования информационных прав и свобод человека и гражданина; 3) определить пути совершенствование нормативно-правового регулирования информационных прав и свобод человека и гражданина и т.д.</p>
<p>Научно-теоретические исследования в этой сфере представлены работами отечественных и зарубежных специалистов информационного, конституционного, административного, международного, уголовного и т.д. права, а именно: В. Ю. Баскаков, В. Д. Гавловский, М. В. Гуцалюк, М. И. Димчогло, В. А. Зализняк, Р. А. Калюжный, Б. А. Кормич, В. А. Липкан, А. В. Логинов, Ю. Е. Максименко, П. Е. Матвиенко, А. В. Туник, А. В. Стоєцкий, В. С. Цымбалюк, Л. С. Харченко, К. П. Череповский, М. Я. Швець, Т. А. Шевцова, О. В. Шепета, Е. В. Чупрына, В. И. Ярочкин.</p>
<p>Становление информационных прав и свобод непосредственно связано с генезисом института прав человека. В основном в научных кругах выделяют пять этапов развития идеи прав человека. «Первый этап &#8211; зарождение идеи (со второй половины V вв. до н.э.) и формирования учения о правах человека (Нового времени), второй этап &#8211; позитивное закрепление прав человека как системного формирования (со второй половины XVIII в.), третий этап &#8211; социализация прав человека (в нач. XX в.), четвертый этап &#8211; интернационализация прав (с середины XX в.) пятый этап &#8211; глобализация прав человека (XX- XXI вв.) [1, с. 128]. Именно на пятом этапе выделяется информационное поколение прав человека.</p>
<p>Более того ряд прав и свобод приобретают ярко выраженный информационный характер. «Право на производство одного типа информации и запрет другой, право на информационную безопасность, право на поиск, доступ, получение, передачу обмен, сбор, хранение, накопление, распространение и копирование информации, право на формирование, развитие и использование и защиту информационных ресурсов, коммуникационных технологий и сетей, право на эксплуатацию информации и использование глобальных информационно-коммуникационных систем в инфраструктуре экономики, политике, образовании, здравоохранении, культуре, предпринимательстве, финансах, экологии и в других сферах требуют не только широкого и приоритетного развития в информационном обществе, они изменяют и придают специфический, информационный оттенок всем другим правам, даже естественному праву на жизнь, личную свободу, честь и достоинство» [1, с . 166].</p>
<p>Сейчас информационные права и свободы однозначно признаются одними из важнейших в системе других прав и свобод. Так, в Резолюции 59 Генеральной Ассамблеи ООН закреплено, что свобода информации является основным правом человека и критерием всех остальных свобод [2]. Сейчас большинство конституций развитых стран обязательно содержат норму, закрепляющую это право, а также другие права и свободы информационного характера.</p>
<p>Как верно замечает А. Марценюк, «проблемы развития законодательства об информации в демократических странах несколько похожи. На первом этапе формирования национального законодательства решаются проблемы, связанные с разработкой и принятием нормативных актов, декларирующих и легитимирующих право человека на информацию в целом. На законодательном уровне устанавливается терминология, определяются виды режимов доступа к информации, определяются границы деятельности средств массовой информации» [3, с. 124].</p>
<p>Нормативно-правовую базу в сфере информационных прав и свобод составляют нормативно-правовые акты различной юрисдикции &#8211; Конституция, законы, постановления, указы, распоряжения и т.п. Частью внутреннего законодательства являются международные договоры и соглашения, ратифицированные Украиной, принципы и нормы международного права.</p>
<p>Кроме Закона Украины «Об информации», нормативно-правовое регулирование информационных прав и свобод осуществляется посредством Конституции Украины и таких базовых законов Украины, как: Закон Украины «О научно-технической информации», «О научной и научно- технической деятельности», «О Национальной программе информатизации», «О Концепции Национальной программы информатизации», «О защите информации в информационно-телекоммуникационных системах», «О печатных средствах массовой информации (прессе) в Украине», «О государственной поддержке средств массовой информации и социальной защите журналистов», «О порядке освещения деятельности органов государственной власти и органов местного самоуправления в Украине средствами массовой информации», «О телевидения и радиовещании», «Об информационных агентствах» и др.</p>
<p>Впервые в законодательстве Украины информационные права и свободы были определены в Законе Украины «Об информации» от 2 октября 1992 года. Согласно ст. 2 главной его целью было установление общих правовых основ получения, использования, распространения и хранения информации, закрепления права личности на информацию во всех сферах общественной и государственной жизни Украины, а также системы информации, ее источники, определения статуса участников информационных отношений, регулирования доступа к информации и обеспечения ее охраны, защита личности и общества от ложной информации [4].</p>
<p>В ст. 9 этого правового документа закреплялось: «Все граждане Украины, юридические лица и государственные органы имеют право на информацию, предусматривающее возможность свободного получения, использования, распространения и хранения сведений, необходимых им для реализации ими своих прав, свобод и законных интересов, осуществления задач и функций» [4].</p>
<p>В ст. 45 отмечалось, что право на информацию охраняется законом. Государство гарантирует всем участникам информационных отношений равные права и возможности доступа к информации. Никто не может ограничивать право лица в выборе форм и источников получения информации, за исключением случаев, предусмотренных законом [4]. Дальнейшую конкретизацию указана норма нашла свое отражение в Законе Украины «О научно-технической информации» от 25 июня 1993 года [5], в частности указывается, что «все граждане Украины, юридические лица, государственные органы, органы местного и регионального самоуправления имеют право на открытую научно-техническую информацию, т.е. возможность свободного ее получения, хранения, использования и распространения при осуществлении научной, научно-исследовательской, производственной, общественной и иной деятельности, не запрещенной законодательством (ст. 5)».</p>
<p>Одно из исключений доступа граждан к информации является случай, когда информация признана информацией с ограниченным доступом. Однако на законодательном уровне не определяются условия, принципы отнесения информации к информации с ограниченным доступом. Только правовые основы отнесения сведений к государственной тайне, и ее защита определены в отдельном законе, а именно в Законе Украины «О государственной тайне» от 21 января 1994 года.</p>
<p>На данное обстоятельство также обращает внимание Е. Макаренко, отмечая при этом: если положение об ограничении доступа к секретной информации, как и сам его механизм, установлен на законодательном уровне, то проблема законодательного закрепления ограничения доступа к конфиденциальной информации остается открытой, как и проблема отнесения информации к такой категории и снятия соответствующих ограничений на доступ к ней [6, с. 135].</p>
<p>В 1996 году в законодательстве Украины состоялось эпохальное событие &#8211; принятие Конституции Украины, где выделен раздел «Права, свободы и обязанности человека и гражданина» и в отличие от международно-правовых документов, четко разграничено право на свободу мысли и право на информацию.</p>
<p>Так, в ч. 1 ст. 34 Конституции Украины закреплено: «каждому гарантируется право на свободу мысли и слова, на свободное выражение своих взглядов и убеждений» [7]. Ч. 2 ст. 34 Основного Закона четко указывает, что «каждый имеет право свободно собирать, хранить, использовать и распространять информацию устно, письменно или иным способом &#8211; по своему выбору» [7].</p>
<p>В Конституции Украины также определено ограничение этого права, а именно: а) интересы национальной безопасности, территориальная целостность Украины; б) обеспечение общественного порядка с целью предотвращения беспорядков или преступлений; в) для охраны здоровья населения; г) для защиты репутации или прав других людей; д) для предотвращения разглашения информации, полученной конфиденциально; е) для поддержания авторитета и непредвзятости правосудия [7].</p>
<p>Анализ указанных выше ограничений права на информацию позволяет констатировать, что конституционные нормы Украины соответствуют общепризнанным международным нормам, в частности нормам Международного пакта о гражданских и политических правах, Европейской конвенции о защите прав и основных свобод человека и т.д. Но в перечне ограничений, закрепленных в Конституции и международно-правовых актах, используются понятия, имеющие неоднозначную трактовку. А потому требуют дополнительного разъяснения.</p>
<p>Например, ограничение этого права в связи с необходимостью защиты интересов национальной безопасности. Обращаясь к концептуальному отечественному нормативно-правовому акту, который регулирует общественные отношения в сфере национальной безопасности Украины и определяет основные принципы государственной политики, направленной на защиту национальных интересов и гарантирование в Украине безопасности личности, общества и государства от внешних и внутренних угроз во всех сферах жизнедеятельности, &#8211; Закону Украины «Об основах национальной безопасности Украины» &#8211; такое понятие как «интересы национальной безопасности» не только не закрепляется, но даже не употребляется. Зато есть понятие «национальные интересы». В других нормативно-правовых актах используются другие понятия: «жизненно важные интересы», «приоритеты национальных интересов».</p>
<p>Что касается понятия «национальной безопасности», а также перечня основных направлений государственной политики по вопросам национальной безопасности, то это понятие настолько всеобъемлющее, что почти любой случай, ситуация потенциально охватывается этим понятием.</p>
<p>Как верно утверждают В. А. Липкан и Ю. Е. Максименко: «если проанализировать дефиницию национальных интересов, национальной безопасности, а также перечень приоритетов национальных интересов, угроз национальным интересам и национальной безопасности Украины, то можно сделать вывод, что исключение из правила, закрепленного п. 2 ст. 32 Конституции Украины, преобладают над самим правилом» [8, с. 99].</p>
<p>Итак, в отечественном законодательстве необходимо четко определить случаи ограничения информационных прав и свобод человека и гражданина. Иначе конституционные нормы, закрепляющие права и свободы человека и гражданина, носить исключительно декларативный характер.</p>
<p>Тем более, что в других нормативно-правовых актах такой перечень ограничений отличный от конституционно закрепленного. В частности, в Гражданском кодексе Украины, закреплено, что сбор, хранение, использование и распространение информации о личной жизни физического лица без его согласия возможен из-за интересов национальной безопасности, экономического благосостояния и прав человека [9]. Что касается сбора информации, то это не допускается, если такая информация является государственной тайной или конфиденциальной информацией юридического лица.</p>
<p>Другие информационные права и свободы также нашли соответствующее закрепление в статьях Основного закона Украины, в частности в ст. ст. 15, 31, 32, 34, 35, 41 и т.д.:</p>
<p>- «общественная жизнь в Украине основывается на принципах политического, экономического и идеологического многообразия. Никакая идеология не может признаваться государством как обязательная. Цензура запрещена» (ст. 15 Конституции Украины);</p>
<p>- «каждому гарантируется тайна переписки, телефонных разговоров, телеграфной и другой корреспонденции» (ст. 31 Конституции Украины);</p>
<p>- «никто не может подвергаться вмешательству в его личную и семейную жизнь» (ст. 32 Конституции Украины);</p>
<p>- «каждому гарантируется право на свободу мысли и слова, на свободное выражение своих взглядов и убеждений. Каждый имеет право свободно собирать, хранить, использовать и распространять информацию устно, письменно или иным способом &#8211; по своему выбору» (ст. 34 Конституции Украины»;</p>
<p>- «каждый имеет право на свободу мировоззрения и вероисповедания» (ст. 35 Конституции Украины);</p>
<p>- «каждый имеет право владеть, пользоваться и распоряжаться своей собственностью, результатами своей интеллектуальной, творческой деятельности» (ст. 41 Конституции Украины) и другие.</p>
<p>Другие конституционные права и свободы человека и гражданина также имеют ярко информационный характер, в частности:</p>
<p>- право на свободное развитие своей личности (ст. 23 Конституции Украины);</p>
<p>- право на уважение достоинства (ст. 28 Конституции Украины);</p>
<p>- право на свободу объединения (ст. 36 Конституции Украины);</p>
<p>- право участвовать в управлении государственными делами, избирательные права (ст. 38 Конституции Украины);</p>
<p>- право на собрания, демонстрации, митинги (ст. 39 Конституции Украины);</p>
<p>- право на обращение в органы власти, местного самоуправления (ст. 40 Конституции Украины);</p>
<p>- свобода литературного, художественного, научного творчества (ст. 54 Конституции Украины);</p>
<p>- право знать свои права и обязанности (ст. 57 Конституции Украины) и другие.</p>
<p>Знаковым событием в нормативно-правовом регулировании информационных прав и свобод человека и гражданина в Украине стало принятие Закона Украины «О доступе к публичной информации» 13 января 2011 года. Настоящий Закон определяет порядок осуществления и обеспечения права каждого на доступ к информации, находящейся во владении субъектов властных полномочий, других распорядителей публичной информации, и информации, представляющей общественный интерес [10]. Впервые на законодательном уровне четко определено какая информация является служебной информацией, порядок отнесения к этой и другой информации с ограниченным доступом, особенности реализации права на доступ к информации по информационному запросу.</p>
<p>Итак, анализ нормативно-правового регулирования информационных прав и свобод человека и гражданина позволяет сделать следующие выводы.</p>
<ol>
<li>«Право на информацию» и «информационные права» понятия не тождественные. Понятие «информационные права и свободы человека и гражданина» является понятием более широким, поскольку охватывает не только возможность «свободно собирать, хранить, использовать и распространять информацию любым способом, по своему выбору» или даже «возможность свободного получения, использования, распространения, хранения и защиты информации, необходимой для реализации своих прав, свобод и законных интересов», а это все права и свободы человека и гражданина, имеющие информационный характер.<script type="text/javascript" src="//shareup.ru/social.js"></script></li>
<li>Информационные права и свободы человека и гражданина составляют целостный экзистенциальный феномен, который можно узнать исключительно сквозь призму его системных свойств, и находит свое проявление в наличии прав и свобод информационного характера в различных сферах жизнедеятельности общества. Поэтому целесообразно говорить об информационных правах и свободах человека и гражданина в экологической сфере, экономической сфере, политической сфере, управленческой сфере и т.д., которые коррелятивно соединены и в своей интегративной совокупности составляют систему информационных прав и свобод. Ведь появление иных сфер жизнедеятельности общества не меняет сущности этого феномена. Сейчас любые общественные отношения находят свое проявление через информацию, информационную сферу. Можно утверждать, что информационные права и свободы присущи любой сфере жизнедеятельности общества.</li>
<li>Правовые нормы, определяя конкретное содержание информационных прав и свобод человека и гражданина, не дают их исчерпывающего перечня. Развитие международного и национального законодательства, юридической доктрины способствует перманентному расширению спектра этого вида прав и свобод человека и гражданина.</li>
<li>Характерной чертой национального информационного законодательства является декларативность значительного массива норм без указаний на пути их реализации, в результате чего наблюдается низкий уровень правореализации этих норм права. К тому же нормативно-правовое регулирование в этой сфере довольно коллизионное, поэтому нуждается в усовершенствовании путем кодификации [11-].</li>
</ol>
<p>&nbsp;</p>
<p align="center"><b>Литература:</b></p>
<ol>
<li>Глухарева Л. И. Права человека в современном мире (социально-философские основы и государственно-правовое регулирование). — М. : Юристъ, 2003. — 304 с.</li>
<li>Резолюція 59 Генеральної Асамблеї ООН // http://zakon4.rada.gov.ua</li>
<li>Марценюк О. Етапи розвитку інформаційного законодавства: міжнародний та національний аспект / О. Марценюк // Право України. — 2007. — № 7. — С. 120—124.</li>
<li>Про інформацію : Закон України від 2 жовтня 1992 року// Відомості Верховної Ради (ВВР). — 1992. — № 48. — Ст. 650.</li>
<li>Про науково-технічну інформацію: Закон України // Відомості Верховної Ради України (ВВР). — 1993. — № 33. — Ст. 345.</li>
<li>Макаренко В. правове регулювання захисту конфіденційної інформації, що є власністю держави: становлення, розвиток, проблемні питання / В. Макаренко // Право України. – 2006. – № 1. – С. 132- 135.</li>
<li>Конституція України // Відомості Верховної Ради. — 1996. — № 30. — Ст. 14.</li>
<li>Ліпкан В. А. Права і свободи людини та громадянина в інформаційній сфері в умовах проведення конституційної реформи в Україні / В. А. Ліпкан, Ю. Є. Максименко // Конституція України: зміни чи нова редакція : матеріали круглого столу, присвяченого 15-й річниці прийняття Конституції України : спец. вип., 24 черв. 2011 р. / редкол. В.В. Коваленко (голов. ред.) та ін. — К. : Юрінком Інтер, 2011. — 196 с.</li>
<li>Цивільний кодекс України // Відомості Верховної Ради України. — 2003. — № 40—44. — Ст. 356.</li>
<li>Про доступ до публічної інформації : Закон України // Офіційний вісник України. — 2011. — № 10. — Ст. 446.</li>
<li>Ліпкан В. А. Систематизація інформаційного законодавства України : [монографія] /  В. А. Ліпкан, В. А. Залізняк / за заг. ред. В. А. Ліпкана. — К. : ФОП О. С. Ліпкан, 2012. — 304 с.</li>
<li>Ліпкан В. А. Адміністративно-правовий режим інформації з обмеженим доступом : [монографія] /  В. А. Ліпкан, В. Ю. Баскаков / за заг. ред. В. А. Ліпкана. — К. : ФОП О. С. Ліпкан, 2013. — 344 с.</li>
<li>Ліпкан В. А. Консолідація інформаційного законодавства України : [монографія] /  В. А. Ліпкан, М. І. Дімчогло / за заг. ред. В. А. Ліпкана. — К. : ФОП О. С. Ліпкан, 2014. — 408 с.</li>
</ol>
]]></content:encoded>
			<wfw:commentRss>https://goal-int.org/informacionnye-prava-i-svobody-cheloveka-i-grazhdanina-osobennosti-ukrainskogo-normativno-pravovogo-regulirovaniya/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>V. A. Lipkan: Administrative and legal regime of information with limited access in Ukraine</title>
		<link>https://goal-int.org/v-a-lipkan-administrative-and-legal-regime-of-information-with-limited-access-in-ukraine/</link>
		<comments>https://goal-int.org/v-a-lipkan-administrative-and-legal-regime-of-information-with-limited-access-in-ukraine/#comments</comments>
		<pubDate>Sun, 05 May 2013 01:05:02 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Analytics for foreigners]]></category>
		<category><![CDATA[Інститут геостратегії і стратегічних комунікацій – голова В. А. Ліпкан, доктор юридичних наук, професор]]></category>
		<category><![CDATA[Монографії серії "ORDO ORDINANS"]]></category>
		<category><![CDATA[Lipkan Volodymyr]]></category>
		<category><![CDATA[Lipkan`s science school]]></category>
		<category><![CDATA[Lipkan`s security epistemic comunity]]></category>
		<category><![CDATA[wissenschaftliche Schule Lipkan]]></category>

		<guid isPermaLink="false">http://goal-int.org/?p=6081</guid>
		<description><![CDATA[Lipkan V. A. Administrative and legal regime of information with limited access in Ukraine : [monograph] / V. А. Lipkan, V. J. Baskakov / Edited by V. A. Lipkan. — К. : О. S. Lipkan, 2013. — 344 p. ISBN 978-966-2439-45-8 &#160; The monograph is devoted to theoretical and administrative and legal problems of protection [...]]]></description>
				<content:encoded><![CDATA[<p>Lipkan V. A.<br />
Administrative and legal regime of information with limited access in Ukraine : [monograph] / V. А. Lipkan, V. J. Baskakov / Edited by V. A. Lipkan. — К. : О. S. Lipkan, 2013. — 344 p.<br />
ISBN 978-966-2439-45-8</p>
<p>&nbsp;</p>
<p>The monograph is devoted to theoretical and administrative and legal problems of protection of information with limited access in Ukraine. The paper defines the concepts of information with limited access, administrative and legal regime of such information, confidential information, secret information.<br />
The main features of information with limited access in the administrative and legal context, highlighted the main types of such information, described the administrative and legal regime of information with limited access in Ukraine, and also outlines specific administrative and legal regimes of protection of state secrets and personal data (information about a person ) as the most important types of information with limited access.<br />
To further improve the administrative and legal regulation and practice of national legislation on protection of information with limited access has been requested a number of measures.<br />
Monograph will benefit graduate students, researchers and practitioners, and all those interested in gaining information society.</p>
<h1 style="text-align: center;"><span style="color: #ff00ff;">CONCLUSIONS</span></h1>
<p>&nbsp;</p>
<p>The current state of administrative and legal regulation of social relations in the field of information with limited access in Ukraine needs improvement and harmonization with international standards. It is primarily about improving the administrative and legal status of entities ensuring the protection of information with limited access and making relevant changes and amendments to the current Code of Ukraine on Administrative Offences. However, a holistic, systematic consideration of the problem of administrative and legal regime of information with limited access does not exist in Ukraine, despite the presence of sufficient attention to certain types of information with limited access in the administrative and legal researches.</p>
<p>By the results of the research we consider necessary to formulate the most important, practically meaningful and scientifically valid conclusions.</p>
<ol>
<li>The historiography of research information with limited access in national administrative doctrine has been outlined. information with limited access is quite new and barely developed legal phenomenon in the national administrative doctrine. Have been identified three main stages of development scientific thought, which is devoted to information with limited access in national administrative doctrine. The first phase (1991 &#8211; 2005 years) is characterized by superficial consideration information with limited access in the context of the study of various aspects of information security and information law, the protection and preservation of where information with limited access is defined as the important area of information security or institute of information law and topical direction of research activities also. The second phase (2006 &#8211; 2007 years) characterized by the appearance of monographic researches, subject of which is directly information with limited access, features access to the above information and allocation of the main kinds of secrets. The third phase (2008 – till present) is characterized by intense conducting scientific researches and publication of papers with different specializations, squarely focused on the specific kinds of secrets (banking, commercial, personal secret, etc.).</li>
<li>A new solution of concept of «information with limited access » and allocated its constitutive features of the administrative and legal context has been provides. Information with limited access is defined as information and/or data, that may be stored on material carriers or displayed electronically, access to which is limited by the laws of Ukraine by its owner or bona fide user (the entity of authority, person etc.) due to its special value for them on a legal basis. Among the constitutive features information with limited access in the administrative and legal context are the following: 1) the information with limited access &#8211; is primarily information, data that can be stored on physical media or displayed electronically, and 2) information, which can be applied to a limited access mode is such that complies with the legislation of Ukraine, 3) a certain number of Members gained access to it solely on legal grounds (bona fide users) 4) information with limited access is of particular value for the above categories of subjects (moral, financial, personal, etc.) because of uncertainty of other entities, 5) bona fide owners and users of information with limited access realize adequate legal measures to prevent access by unauthorized entities, 6) for violation of the above measures established legal responsibility.</li>
<li>The concept of «administrative and legal regime of information with limited access» and singled out its main features has been determined. Administrative and legal regime of information with limited access – is regulated by the national legislation operational procedure of the authorized entities by imperative method of legal enforcement and system of special facilities for the protection and conservation of public relations in the information with limited access field. Features of administrative and legal regime of information with limited access: it is the order of the authorized state bodies and other competent state institutions, local governments, and individuals regarding to information with limited access, this activity is regulated in the national legislation by determining the operational rules under which indicated rights and duties of man and citizen, authority of suitable institutions, administrative liability for violations, etc. in the field of information with limited access, the presence of imperative method of legal impact between the participants of relations in the field of information with limited access, is carried out by an appropriate system of various special facilities, the purpose of this activity is to provide protection and conservation of public relations in the area of information with limited access, i.e. the respective rights and freedoms of man and citizen interests of the state and society.</li>
<li>Information with limited access on the kinds has been classified. The criteria, by which to unambiguously classify certain information (data) as information with limited access or identify its main kinds in the legislation does not identified. The Law of Ukraine «An Access to Public Information» contains only the norm, according to which the information with limited access is: 1) confidential information, 2) secret information, and 3) service information. In some articles of the above Law is given legal definition of confidential and secret information, and detailed understanding of service information. Have been classified information to such, that is generally forbidden for distribution in particular country and such, spread of which is limited due to certain circumstances, such as damage to certain categories of people. In turn, confidential information, in our opinion, should be recognized any information with limited access, that has no features of state secrets and the secret information &#8211; is any information with limited access, which has features of state secrets.</li>
<li>Have been characterized the elements of administrative and legal regime of information with limited access, including the purpose of establishing the legal regime, legal principles, the object of administrative regulation, the method of regulation, «regime rules», special public bodies, responsibility for the violations of the «regime norms», definition of the spatial and temporal boundaries of this administrative and legal regime.</li>
<li>Has been determined the deficiencies and provided the suggestions for improving the administrative and legal regime of state secrets. The main factors that negatively affect the condition of administrative and legal regime of state secrets are: socio-economic, human, organizational, etc., namely employee turnover at regime-secret bodies, lack of necessary special knowledge in IT and in the legal field, and also lack of awareness with the specifics activities of law enforcement bodies and content of tasks, are aimed at addressing the activities of such bodies, lack of knowledge about the current legislation on state secrets by some persons, who have admission and access to state secrets; improper equipment of premises regime-secret bodies and significant obsolescence of forms and methods of protection of state secrets etc. In order to improve administrative and legal regime of state secrets we propose to provide the audit of knowledge of the legislation on state secrets and rules of the secret case management, by persons, who not only have also admission &amp; access to state secrets. The mechanism verification knowledges of legislative norms on state secret is proposed to predict at the level of some instruction or Rules, which has to develop Security Service of Ukraine as the main body, which protects state secrets. Among the ways of improving the administrative and delictual legislation in this field, we have supported the opinion of some authors about the need to supplement the current Administrative Code (or fix it in the new Code of Ukraine on administrative offenses) by norm, that would provide the administrative responsibility of legal persons for the violation of legislation on state secrets and also increasing amounts of penalties as a warning of administrative offenses, liability for which is set in Art. 212-2 of Administrative Code. Also we propose to extend the range of administrative penalties. For example, along with a fine collection to foresee such as: community service, correctional work, administrative arrest. According to the authors, there is need to strengthen penalties for offense under Art. 212-2 of Administrative Code, in wartime.  It is necessary to improve the administrative and delictual legislation in this field in: amendments to Art. 212-2, in particular, to unite claim 1 (according to which liability for failure to comply with established by law order of convey of state secrets to another state or international organization is provided), with claim 8 (which provides the responsibility for noncompliance with legal requirements on ensuring the protection of national secrets, during the international cooperation, receiving foreign delegations, groups and individual foreigners or stateless person and carrying out the work with them). According to the authors, claim 8 covers claim 1. For example, violation of the order state secrets convey to another state or international organization just also is one of the violations of legislation concerning ensuring the protection of national secrets, during the international cooperation, receiving foreign delegations, groups and individual foreigners or stateless person and carrying out the work with them. Additionally, this article contains a number of evaluating notions that require legislative determination, among which «real danger», «destroying the integrity», «unreasonable information security classification» and so on. Therefore, we proposed to clearly define reasons for information security classification at the legislative level.</li>
<li>The state and development prospects of administrative and legal regime of personal data have described. To the main shortcomings of the administrative and legal regime of personal data we include: collision of legal acts norms that regulate public relations at personal data protection and the presence of numerous gaps, ambiguity, inconsistency and fixed definitions contradiction, either lack even a basic of them sometimes; the presence of considerable massifs of declarative provisions without the mechanism of law realization; the presence of numerous blanket law norms, that complicates its legal implementation, the presence of abstract, subjective concepts, which need an official interpretation or clear definition etc. To improve administrative and legal regime of personal data we offer the following ways: to define the concept of «public necessity» as a prerequisite for dissemination of personal data without the consent of the subject of personal data; to settle the legal regime of personal data contained in the databases after the death of the person and a violation of person rights to confidentiality of personal data and the prohibition of processing of data without its consent, except in cases determined by law and only in the interests of national security, economic prosperity and human rights; to expand the number of people who are not covered by the Law of Ukraine «On Personal Data Protection», namely: online media journalists (if the media has no status news agency or journalist is not in professional association of journalists); legally to define verification occasions by competent authorities of personal data protection, in particular if person sends a complaint about the illegal use its personal data, as well as intervention boundaries, procedure of conducting inspections and making the relevant acts for violations the legislation on protection of personal data, etc. by the State Service of Ukraine on protection of personal data.</li>
<li>Administrative and legal regime for service information has been characterized. Institute of professional secrecy is directly connected with the institution of state secrets. In Art. 10 Law of Ukraine «On State Secrets» the ability of public authorities on the basis and within the law and in order to specify and systematize data information classified as state secrets to create detailed lists of information that constitute a state secret has provided. Publication of detailed lists is not provided. However, the right of interested persons to appeal to President of Ukraine or the Verkhovna Rada of Ukraine, inclusion in detailed lists information that cannot be recognized as state secret in content, has been established. Retrospective analysis of the relationship between the concepts of «state secrecy» and «official secret» made possible to conclude that for a long time in legislation has been used another concept – «state secrets», which are understood all information that has to be protected by the state and its divulge could harm the public interest. State secrets covering state, military and service (industrial) secrets. Lack of legal definition of these terms was compensated by the fact that their legal regime was enshrined in the various instructions, regulations, lists of information, which identifies that: State secrets are information divulgation of which (transfer, leakage, etc.) may adversely affect the quality status of military and economic potential of the country or cause other serious consequences for national defense, national security, economic and political interests of the USSR; official secrets are information that is protected by the state in any field of science, engineering, production and administration, disclosure of which (transfer, leakage, etc.) may harm the interests of the state. The information was a state secret depending on the degree of secrecy: «special importance» and «top secret» and information that constituted official secrets, classified «secret». It should be noted that along with the above information, there is also information that was forbidden to publish in the media and was «for official use only». The latter was called unclassified information with limited dissemination. In this regard, some scholars believed that the official secret includes information that classified as «secret» and «OU». The difference between them lay in their importance for the public interest, the form and degree of responsibility for their disclosure and related harm from publicizing of such information. Only part of information which was professional secrecy, the disclosure of which could harm the public interests to state secrets belonged. The following information may belong to service information according to the Law of Ukraine «On Access to Public Information»: 1) the information, contained in the documents of government entities, that make up the interdepartmental correspondence, memorandums, recommendations, if they are related to the entity activities or realization of control &amp; supervisory functions bodies of state power, decision-making and are preceded public discussion and/or decision-making; 2) the information, gathered during operational and investigative, counterintelligence activities in the field of defense of the country, which is not classified as state secrets. This information is information with limited access, so access to it is limited, subject to the following set of requirements: 1) only in the interests of national security, territorial integrity or public order, the prevention of disorder or crime, for the protection of health, protection of the reputation or rights of others, for preventing the disclosure of received confidentially information or for maintaining the authority and impartiality of the judiciary; 2) disclosure of the information would cause substantial harm to those interests, and 3) the harm from disclosure of the information outweighs the public interest in getting it. The state authorities, local authorities, other government entities are obliged to create lists of data that is service information. The following basic principles of creating these lists have distinguished: 1) the decision to grant (withdrawal) for official use only information are accepted by direct implementers of documents according to the list and according to the conclusions of expert commissions, and 2) a document that contains information that is service information, is assigned a security classification «for official use only» (further – OU); 3) «OU» information is the property of the state and contains limited distribution information; 4) for correct «OU» assignment to wares and information, have responsibility the officials who have provided classification, signed or approved these documents; 5) In case of cancellation of security classification of information, about removal restricting access, all of the organizations to whom it was sent, should be reported; 6) copying of «OU» documents by outside organizations should be done by agreement with the organization – the author of these documents; 7) use of information, telecommunication and information-telecommunication systems for printing of «OU» documents, carried out only after creation therein a comprehensive system of information protection and obtain the appropriate certificate; 8) transfer of «OU» information from one system to another is carried out by secure communication channel or in encrypted form. Using the Internet or unprotected channels for the transfer «OU» information is prohibited; 9) guilty persons will be brought to administrative liability in accordance with current legislation for disclosure of «OU» information. List of approximate criteria for classification service information has been identified: 1) should be established by the state budget or be in the possession, use or disposal of the organization; 2) be used in order to ensure the state national interests, 3) do not belong to a state secret, and 4) as a result of disclosure of such information is possible: 4.1 The violation of constitutional rights and freedoms of man and citizen; 4.2 occurrence of negative consequences in domestic political, foreign, economic, military, social, humanitarian, scientific, technological, environmental, and information spheres, also in the areas of national security and the state border security; 4.3 creation of obstacles in the activities of public authorities.</li>
</ol>
<div>
<div>
<p><a title="" href="file:///D:/1_ISBN/ORDO_ORDINANS/%234_%D0%91%D0%B0%D1%81%D0%BA%D0%B0%D0%BA%D0%BE%D0%B2/%D0%BC%D0%BE%D0%BD%D0%BE%D0%B3%D1%80%D0%B0%D1%84%D1%96%D1%8F%20%D0%B1%D0%B0%D1%81%D0%BA%D0%B0%D0%BA%D0%BE%D0%B2%20%D0%93%D0%9E%D0%9B%D0%9E%D0%92%D0%9D%D0%98%D0%99_10.06.2013.doc#_ftnref1"><sup><sup> </sup></sup></a></p>
</div>
</div>
<h1>BRIEF CONTENTS</h1>
<p align="center"><b> </b></p>
<p><span style="text-decoration: underline;">PART 1 THE LEVEL OF SCIENCE RESEARCH AND ITS CORE METHODOLOGY ………………………………………………………………..</span></p>
<p><span style="text-decoration: underline;">Chapter </span>1 Bibliography of research..</p>
<p><span style="text-decoration: underline;">Chapter 2 </span> Methodological basis of research..</p>
<p><span style="text-decoration: underline;">Chapter </span>3 Key definitions of research..</p>
<p><span style="text-decoration: underline;">PART 2 Classification of information with limited access. </span></p>
<p><span style="text-decoration: underline;">Chapter 1 </span>Classification of information with limited access in Ukrainian legislation</p>
<p><span style="text-decoration: underline;">Chapter 2</span> Classification of information with limited access in doctrinal sources.</p>
<p><span style="text-decoration: underline;">PART 3 THE DEFINITION AND STRUCTURE OF ADMINISTRATIVE AND LEGAL REGIME OF information </span><span style="text-decoration: underline;">with limited access</span><span style="text-decoration: underline;">in UKRAINE </span></p>
<p><span style="text-decoration: underline;">Chapter </span>1 The essence of administrative and legal regime of  information with limited access in Ukraine.</p>
<p><span style="text-decoration: underline;">Chapter </span>2 Characteristics of the elements of administrative and legal regime of information with limited access in Ukraine</p>
<p><span style="text-decoration: underline;">Chapter </span>3 Improvement of administrative and legal regime of  information with limited access in Ukraine.</p>
<p><span style="text-decoration: underline;">PART 4 </span><span style="text-decoration: underline;">FEATURES</span><span style="text-decoration: underline;">OF ADMINISTRATIVE AND LEGAL REGIMES of </span><span style="text-decoration: underline;">CERTAIN TYPES OF</span><span style="text-decoration: underline;"> information </span><span style="text-decoration: underline;">with limited access</span></p>
<p><span style="text-decoration: underline;">Chapter </span>1 Administrative and legal regime of state secrets.</p>
<p><span style="text-decoration: underline;">Chapter </span>2 Administrative and legal regime of personal data (information about a person )</p>
<p><span style="text-decoration: underline;">Chapter </span>3 administrative and legal regime of  service information..</p>
<p><span style="text-decoration: underline;"> </span></p>
<p><span style="text-decoration: underline;">coNclusion </span></p>
<p><span style="text-decoration: underline;">tezaurus </span></p>
<p><span style="text-decoration: underline;">used litErature </span></p>
<p><span style="text-decoration: underline;">useful bibliography.. </span></p>
<p><span style="text-decoration: underline;">gratitude. </span><b></b></p>
<p>&nbsp;</p>
<h1 align="left"></h1>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h1> CONTENTS</h1>
<p><span style="text-decoration: underline;">BRIEF CONTENTS. </span><b></b></p>
<p><span style="text-decoration: underline;">CONTENTS. </span><b></b></p>
<p><span style="text-decoration: underline;">PREFACE. </span><b></b></p>
<p><span style="text-decoration: underline;">THE LIST OF Abbreviations</span></p>
<p><span style="text-decoration: underline;">INTRODUCTION.. </span><b></b></p>
<p>&nbsp;</p>
<p><span style="text-decoration: underline;">part 1 THE LEVEL OF SCIENCE RESEARCH AND ITS CORE METHODOLOGY.. </span></p>
<p><span style="text-decoration: underline;">Chapter </span>1 Bibliography of research..</p>
<p><span style="text-decoration: underline;">R</span><span style="text-decoration: underline;">esearches on information </span><span style="text-decoration: underline;">security</span></p>
<p><span style="text-decoration: underline;">Researches on information law</span><span style="text-decoration: underline;">  </span></p>
<p><span style="text-decoration: underline;">Researches, directly devoted to various aspects of information with limited access (specialized scientific papers)</span></p>
<p>&nbsp;</p>
<p><span style="text-decoration: underline;">Chapter 2 </span> Methodological basis of research..</p>
<p><span style="text-decoration: underline;">Chapter </span>3 Key definitions of research..</p>
<p><span style="text-decoration: underline;">Classification of information</span> <span style="text-decoration: underline;">with limited access</span><span style="text-decoration: underline;"> in doctrinal sources</span>.</p>
<p><span style="text-decoration: underline;">Classification of information </span><span style="text-decoration: underline;">with limited access</span><span style="text-decoration: underline;">in regulatory legal acts </span></p>
<p><span style="text-decoration: underline;">PART 2 Classification of information WITH LIMITED ACCESS. </span></p>
<p><span style="text-decoration: underline;">Chapter 1 </span>Classification of information with limited access in Ukrainian legislation</p>
<p><span style="text-decoration: underline;">Chapter 2 </span>Classification of information with limited access in doctrinal sources.</p>
<p><span style="text-decoration: underline;">PART 3 THE DEFINITION AND STRUCTURE OF ADMINISTRATIVE AND LEGAL REGIME OF information </span><span style="text-decoration: underline;">with limited access</span><span style="text-decoration: underline;">in UKRAINE </span></p>
<p><span style="text-decoration: underline;">Chapter </span>1 The essence of administrative and legal regime of  information with limited access in Ukraine.</p>
<p><span style="text-decoration: underline;">The concept of &#8220;regime&#8221; </span></p>
<p><span style="text-decoration: underline;">The concept of &#8221; legal regime&#8221; </span></p>
<p><span style="text-decoration: underline;">The stages of teachings about administrative and legal regime forming</span></p>
<p><span style="text-decoration: underline;">The concept of &#8220;</span><span style="text-decoration: underline;">administrative and</span><span style="text-decoration: underline;"> legal regime&#8221;</span></p>
<p><span style="text-decoration: underline;">Features of administrative and legal regime</span></p>
<p><span style="text-decoration: underline;">The concept of &#8220;</span><span style="text-decoration: underline;">administrative and legal regime of information</span> <span style="text-decoration: underline;">with limited access &#8220;</span></p>
<p><span style="text-decoration: underline;">Features of administrative and legal regime of information with limited access</span></p>
<p><span style="text-decoration: underline;">Classification of administrative and legal regimes</span></p>
<p><span style="text-decoration: underline;">Classification of administrative and legal regime of information with limited access</span></p>
<p><span style="text-decoration: underline;"> </span></p>
<p><span style="text-decoration: underline;">Chapter </span>2 Characteristics of the elements of administrative and legal regime of information with limited access in Ukraine</p>
<p><span style="text-decoration: underline;">Approaches to the structure of the administrative regime understanding</span></p>
<p><span style="text-decoration: underline;">Purpose of administrative and legal regime of information with limited access</span></p>
<p><span style="text-decoration: underline;">Legal principles of administrative and legal regime of</span> <span style="text-decoration: underline;">information with limited access</span></p>
<p><span style="text-decoration: underline;">The object of administrative and legal regime of information with limited access</span></p>
<p><span style="text-decoration: underline;">The method of administrative and legal regime of information</span> <span style="text-decoration: underline;">with limited access</span></p>
<p><span style="text-decoration: underline;">&#8220;Regime rules&#8221; of administrative and legal regime of information</span> <span style="text-decoration: underline;">with limited access</span></p>
<p><span style="text-decoration: underline;">Special public authorities as an element of administrative and legal regime of information</span><span style="text-decoration: underline;">with limited access</span></p>
<p><span style="text-decoration: underline;">Verkhovna Rada of Ukraine as entity of protection of information</span><span style="text-decoration: underline;">with limited access</span></p>
<p><span style="text-decoration: underline;">President of Ukraine as entity of protection of</span> <span style="text-decoration: underline;">information</span><span style="text-decoration: underline;">with limited access</span></p>
<p><span style="text-decoration: underline;">National Security and Defense Council of Ukraine (NSDC of Ukraine) and the Cabinet of Ministers of Ukraine as entities of protection of information</span><span style="text-decoration: underline;">with limited access</span></p>
<p><span style="text-decoration: underline;">The executive bodies as entities of protection of information</span><span style="text-decoration: underline;">with limited access</span></p>
<p><span style="text-decoration: underline;">Responsibility for violation of regime norms</span></p>
<p><span style="text-decoration: underline;">Spatially-temporal boundaries into force of administrative and legal regime of information</span><span style="text-decoration: underline;">with limited access</span></p>
<p>&nbsp;</p>
<p><span style="text-decoration: underline;">Chapter </span>3 Improvement of administrative and legal regime of  information with limited access in Ukraine.</p>
<p><span style="text-decoration: underline;">The stages of systematization of information legislation</span></p>
<p><span style="text-decoration: underline;">Directions of incorporation</span></p>
<p><span style="text-decoration: underline;">Directions of consolidation</span></p>
<p><span style="text-decoration: underline;">Directions of </span><span style="text-decoration: underline;">codification</span></p>
<p><span style="text-decoration: underline;">Approaches to Information Code forming</span></p>
<p><span style="text-decoration: underline;">M. Shwetz</span><span style="text-decoration: underline;">ʼ</span><span style="text-decoration: underline;">s Project</span></p>
<p><span style="text-decoration: underline;">V.Tsymbalyuk</span><span style="text-decoration: underline;">ʼ</span><span style="text-decoration: underline;">s Project</span></p>
<p><span style="text-decoration: underline;">Project of the State Committee on Television and Radio Broadcasting</span></p>
<p><span style="text-decoration: underline;">V.Lipkan</span><span style="text-decoration: underline;">ʼ</span><span style="text-decoration: underline;">s and V.Zaluzniak</span><span style="text-decoration: underline;">ʼ</span><span style="text-decoration: underline;">s  Project</span></p>
<p>&nbsp;</p>
<p><span style="text-decoration: underline;">PART 4 </span><span style="text-decoration: underline;">FEATURES</span><span style="text-decoration: underline;"> OF ADMINISTRATIVE AND LEGAL REGIMES of </span><span style="text-decoration: underline;">CERTAIN TYPES OF</span><span style="text-decoration: underline;">information with limited access </span></p>
<p><span style="text-decoration: underline;">Chapter </span>1 Administrative and legal regime of state secrets.</p>
<p><span style="text-decoration: underline;">Normative and legal regulation of social relations in the state secrets field</span></p>
<p><span style="text-decoration: underline;">The concept of &#8220;state secrets&#8221;</span></p>
<p><span style="text-decoration: underline;">The system of of state authorities, that are designed to protect state secrets</span></p>
<p><span style="text-decoration: underline;">Stages of classification information as state secrets</span></p>
<p><span style="text-decoration: underline;">The list of data, that constitutes state secrets</span></p>
<p><span style="text-decoration: underline;">The term within the decision on referring of information to state secret is valid</span></p>
<p><span style="text-decoration: underline;">The list of information, that can not be classified as state secrets</span></p>
<p><span style="text-decoration: underline;">Responsibility for violation of legislation on state secrets</span></p>
<p><span style="text-decoration: underline;">The main causes of committing administrative violations of legislation on state secrets</span></p>
<p><span style="text-decoration: underline;">Prospects for the development of administrative and delictual legislation in the state secrets protection</span></p>
<p><span style="text-decoration: underline;"> </span></p>
<p><span style="text-decoration: underline;">Chapter </span>2 Administrative and legal regime of personal data (information about a person )</p>
<p><span style="text-decoration: underline;">The history of the adoption of the Law of Ukraine &#8220;On Personal Data Protection&#8221;</span></p>
<p><span style="text-decoration: underline;">Basic Principles of the Law of Ukraine &#8220;On Personal Data Protection&#8221;</span></p>
<p><span style="text-decoration: underline;">The definition of &#8220;personal data&#8221;</span></p>
<p><span style="text-decoration: underline;">The information belonging to personal data</span></p>
<p><span style="text-decoration: underline;">Entities of personal data protection</span></p>
<p><span style="text-decoration: underline;">The procedure for processing subject&#8217;s consent to use his personal data</span></p>
<p><span style="text-decoration: underline;">Legal liability for violations of </span><span style="text-decoration: underline;">legislation in the sphere of </span><span style="text-decoration: underline;">personal data</span><span style="text-decoration: underline;">protection</span></p>
<p><span style="text-decoration: underline;"> </span></p>
<p><span style="text-decoration: underline;">Chapter </span>3 Administrative and legal regime of  service information..</p>
<p><span style="text-decoration: underline;">History of the Institute of service information foundation</span></p>
<p><span style="text-decoration: underline;">The current state of normative and legal regulation of public relations in the service information field</span></p>
<p><span style="text-decoration: underline;">The list of information, which is service information</span></p>
<p><span style="text-decoration: underline;">The concept of </span><span style="text-decoration: underline;">&#8220;service information&#8221; in doctrinal sources</span></p>
<p><span style="text-decoration: underline;">The concept of </span><span style="text-decoration: underline;">&#8220;service information&#8221; in </span><span style="text-decoration: underline;">regulatory legal acts </span></p>
<p><span style="text-decoration: underline;">Features of service information</span></p>
<p><span style="text-decoration: underline;">Correlation of concepts &#8220;service secret&#8221; and &#8220;state secrets&#8221;</span></p>
<p><span style="text-decoration: underline;">Correlation of concepts &#8220;service secret&#8221; and &#8220;professional  secret&#8221;</span></p>
<p><span style="text-decoration: underline;">Protection of documents &#8220;For Official Use Only&#8221; have marked</span></p>
<p><span style="text-decoration: underline;"> </span></p>
<p><span style="text-decoration: underline;"> </span></p>
<p><span style="text-decoration: underline;">coNclusionS </span></p>
<p><span style="text-decoration: underline;">tezaurus </span></p>
<p><span style="text-decoration: underline;">used litErature </span></p>
<p><span style="text-decoration: underline;">useful bibliography.. </span></p>
<p><span style="text-decoration: underline;"> </span></p>
<p><span style="text-decoration: underline;">Lipkans` science school researches</span></p>
<p><span style="text-decoration: underline;">Information with limited access </span></p>
<p><span style="text-decoration: underline;">Administrative and legal regimes</span>.</p>
<p><span style="text-decoration: underline;">Criminal lwa and criminalistics researshes to information sprhere</span></p>
<p><span style="text-decoration: underline;">Information treaties</span></p>
<p><span style="text-decoration: underline;">Information Law and Information Security </span></p>
<p>&nbsp;</p>
<p><span style="text-decoration: underline;">gratitude</span></p>
]]></content:encoded>
			<wfw:commentRss>https://goal-int.org/v-a-lipkan-administrative-and-legal-regime-of-information-with-limited-access-in-ukraine/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
