{"title":"倡导信息技术和信息安全","authors":"V. Zaborovskyy","doi":"10.21779/2224-0241-2021-37-1-131-139","DOIUrl":null,"url":null,"abstract":"The article is devoted to the study of theoretical and practical problems that arise of the use of information technologies by a lawyer in the course of their professional activities, as well as issues related to ensuring information security of such activities. The purpose of this article is to reveal the complex relationship between the need to use the latest information technologies (analyzing the legal nature of the most common types of such technologies) and ensuring an appropriate level of information security for advocacy in general. To achieve this goal, the author used a set of methods that are characteristic of legal science. So, the use of the system-structural method made it possible to formulate a general structure, contributed to the complete solution of the tasks. The dialectical method made it possible to reveal the essence of information technologies in advocacy and analyze their main types. The method of systems analysis provided an opportunity to comprehensively investigate the legal nature of information security in advocacy and identify possible threats to such security, and the synthesis method was used when formulating conclusions and other theoretical provisions.","PeriodicalId":346018,"journal":{"name":"Law Нerald of Dagestan State University","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"INFORMATION TECHNOLOGY AND INFORMATION SECURITY OF ADVOCACY\",\"authors\":\"V. Zaborovskyy\",\"doi\":\"10.21779/2224-0241-2021-37-1-131-139\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article is devoted to the study of theoretical and practical problems that arise of the use of information technologies by a lawyer in the course of their professional activities, as well as issues related to ensuring information security of such activities. The purpose of this article is to reveal the complex relationship between the need to use the latest information technologies (analyzing the legal nature of the most common types of such technologies) and ensuring an appropriate level of information security for advocacy in general. To achieve this goal, the author used a set of methods that are characteristic of legal science. So, the use of the system-structural method made it possible to formulate a general structure, contributed to the complete solution of the tasks. The dialectical method made it possible to reveal the essence of information technologies in advocacy and analyze their main types. The method of systems analysis provided an opportunity to comprehensively investigate the legal nature of information security in advocacy and identify possible threats to such security, and the synthesis method was used when formulating conclusions and other theoretical provisions.\",\"PeriodicalId\":346018,\"journal\":{\"name\":\"Law Нerald of Dagestan State University\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Law Нerald of Dagestan State University\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.21779/2224-0241-2021-37-1-131-139\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Law Нerald of Dagestan State University","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21779/2224-0241-2021-37-1-131-139","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
INFORMATION TECHNOLOGY AND INFORMATION SECURITY OF ADVOCACY
The article is devoted to the study of theoretical and practical problems that arise of the use of information technologies by a lawyer in the course of their professional activities, as well as issues related to ensuring information security of such activities. The purpose of this article is to reveal the complex relationship between the need to use the latest information technologies (analyzing the legal nature of the most common types of such technologies) and ensuring an appropriate level of information security for advocacy in general. To achieve this goal, the author used a set of methods that are characteristic of legal science. So, the use of the system-structural method made it possible to formulate a general structure, contributed to the complete solution of the tasks. The dialectical method made it possible to reveal the essence of information technologies in advocacy and analyze their main types. The method of systems analysis provided an opportunity to comprehensively investigate the legal nature of information security in advocacy and identify possible threats to such security, and the synthesis method was used when formulating conclusions and other theoretical provisions.