SSOAR Logo
    • Deutsch
    • English
  • English 
    • Deutsch
    • English
  • Login
SSOAR ▼
  • Home
  • About SSOAR
  • Guidelines
  • Publishing in SSOAR
  • Cooperating with SSOAR
    • Cooperation models
    • Delivery routes and formats
    • Projects
  • Cooperation partners
    • Information about cooperation partners
  • Information
    • Possibilities of taking the Green Road
    • Grant of Licences
    • Download additional information
  • Operational concept
Browse and search Add new document OAI-PMH interface
JavaScript is disabled for your browser. Some features of this site may not work without it.

Download PDF
Download full text

(341.7Kb)

Citation Suggestion

Please use the following Persistent Identifier (PID) to cite this document:
https://nbn-resolving.org/urn:nbn:de:0168-ssoar-93559-4

Exports for your reference manager

Bibtex export
Endnote export

Display Statistics
Share
  • Share via E-Mail E-Mail
  • Share via Facebook Facebook
  • Share via Bluesky Bluesky
  • Share via Reddit reddit
  • Share via Linkedin LinkedIn
  • Share via XING XING

Protecting critical information infrastructure of government, transportation, and tourist facilities under sanctions pressure

[journal article]

Belyaeva, Olga
Surpkelova, Amina
Khromov, Dmitry
Blokhin, Ivan

Abstract

The article analyzes political and legal measures to counter threats to critical information infrastructure (CII). The authors explain the concept of CII in Russia and abroad, examine how its objects are covered, and discuss the steps Russia has taken to safeguard CII considering the principal risks... view more

The article analyzes political and legal measures to counter threats to critical information infrastructure (CII). The authors explain the concept of CII in Russia and abroad, examine how its objects are covered, and discuss the steps Russia has taken to safeguard CII considering the principal risks to information security in 2017-2023. The sanctions regime places unique challenges in the area of CII protection. Sanctions pressure and other political challenges vastly facilitated the development of new security measures. The success of the protective policy is demonstrated by the increase in the proportion of domestically produced electronics purchased by state-owned businesses and government clients in 2023. The current risks related to foreign electronics being vulnerable to cyberattacks need to be addressed. In response to these challenges, new security systems are gradually being introduced for CII protection.... view less

Keywords
information technology; infrastructure; software; import substitution; Russia

Classification
Technology Assessment

Free Keywords
critical information infrastructure; public policy; tourism sector

Document language
English

Publication Year
2023

Page/Pages
p. 97-101

Journal
Public Administration, 25 (2023) 5

ISSN
2070-8378

Status
Published Version; peer reviewed

Licence
Creative Commons - Attribution-Noncommercial-No Derivative Works 4.0


GESIS LogoDFG LogoOpen Access Logo
Home  |  Legal notices  |  Operational concept  |  Privacy policy
© 2007 - 2025 Social Science Open Access Repository (SSOAR).
Based on DSpace, Copyright (c) 2002-2022, DuraSpace. All rights reserved.
 

 


GESIS LogoDFG LogoOpen Access Logo
Home  |  Legal notices  |  Operational concept  |  Privacy policy
© 2007 - 2025 Social Science Open Access Repository (SSOAR).
Based on DSpace, Copyright (c) 2002-2022, DuraSpace. All rights reserved.