Translate this page:
Please select your language to translate the article


You can just close the window to don't translate
Library
Your profile

Back to contents

International Law and International Organizations
Reference:

Experience of international cooperation in the field of information security: problems and prospects

Duben' Andrei Kirillovich

Scientific Associate, Institute of State and Law of the Russian Academy of Sciences; Assistant, Department of Civil and Administrative Proceedings, Russian State University of Justice

119019, Russia, Moscow region, Moscow, Znamenka str., 10

k.duben@mail.ru
Other publications by this author
 

 

DOI:

10.7256/2454-0633.2023.3.43422

EDN:

SLNHHW

Received:

24-06-2023


Published:

15-07-2023


Abstract: The article discusses the international experience of legal provision of information security. The relevance of the study is due to the fact that the totality of problems of legal provision of information security are of priority importance for the legal doctrine and legislation of each state having its own national interests and interested in maintaining peace, international and national information security. An overview of the existing international agreements that contribute to the development of legal regulation of international cooperation in the field of information security is given. Particular attention is paid to the processes of formation of international experience in the field of information security within the framework of the functioning of international organizations regulating these issues. The novelty of the research lies in the fact that, given the lack of a coherent system of international information security, the inconsistency of the models currently formed, it is advisable to develop international legal cooperation based on the convergence of the Eurasian and Euro-Atlantic systems of international information security with the active participation of Russia, taking into account the generally recognized principles and norms of international law, while a significant place should be given to issues of personal security in the information sphere, including countering undesirable information and psychological effects. The conclusion is made about increasing cooperation, strengthening allied and partnership relations with foreign countries, while a tendency should be formed to conclude agreements on mutual protection of classified information in the field of information security with a more detailed description of the list of such information, as well as a mechanism for resolving disputes related to violations of the provisions of these agreements.


Keywords:

international cooperation, international law, international security, information security, international organizations, national security, problems of cooperation, harmonization, national legislation, legal order

This article is automatically translated.

The legal provision of information security of the Russian Federation is a component of the national information security of the state, which is aimed at protecting the constitutional rights and freedoms of citizens, the security of society and the state when using digital technologies, as well as the socio-economic development of the country and domestic digital technologies to ensure technological sovereignty.

The totality of the problems of legal provision of information security is an urgent topic for the legal doctrine and legislation of each state. In the light of the interaction of various States, the issue of international and foreign experience in the legal provision of information security is important.

The purpose of this study is to develop theoretical provisions on the specifics of the legal regulation of information security in international law, as well as to develop specific proposals for improving Russian legislation in the field of information security.  The relevance of this topic is due to the following factors. Special attention is paid to the issues of legal support of information security today in the light of modern geopolitical processes and their impact on all spheres of life. Draws attention to the fact that one of the tasks of modern society is the search for universal solutions to information security issues. One of the key roles in this issue is played by Russia, which initiates international conventions on information protection and ensuring international information security.

The methodological basis of this scientific article is a set of both general scientific and special methods of cognition used. A significant role is assigned to the method of system analysis. Comparative legal, formal legal, the method of legal modeling and others were used as special legal methods of cognition. Issues of international cooperation in the field of information security were raised in special studies by V.A. Kopylov, E.S. Zinovieva, A.A. Tedeev, S.M. Boyko, G.M. Berdimuratova and others.

Today, Professor V.A. Kopylov's conclusion is still relevant that there are practically no geographical and geopolitical borders, time frames and time zones in the information sphere [1, p. 93]. This shows that information law should be based largely on the norms of international law, through which certain obligations of States in the field of information rights and freedoms should be introduced, as well as in regulating global issues such as cross-border transfer of personal data, use of network space, etc.

It is also impossible not to note today the continuing relevance of A.A. Tedeev's conclusions about "the actual absence of international legal regulation of information relations formed in the process of using global computer networks." According to the scientist, the legal regulation of information security is difficult due to unresolved political conflicts in the distribution of information flows formed in global information and communication networks, as well as issues of defining the boundaries of national jurisdictions of international treaties specifically devoted to the regulation of information relations [2, p. 20-21].

The issues of ensuring international information security, including effective counteraction to the use of information technologies, are among the most pressing today [3, p. 118]. This topic is relevant in the doctrine of international and information law. S.M. Boyko notes that today the challenges and threats associated with the use of information technologies in order to undermine and infringe sovereignty, violation of the territorial integrity of states, implementation of other actions in the global information space that hinder the maintenance of international peace, security and stability are increasing [4, c. 10]. It is necessary to support the conclusions of the foreign scientist G.M. Berdimuratova that information security is one of the problems faced by modern society in the process of mass use of automated means of its processing [5, p. 435].

It should be noted that in recent years, international information security issues have been of key importance among Western researchers. The research emphasizes the importance of the political and ideological component of threats to information security. In particular, M. Dann-Cavelty, an employee of the Center for Security Studies in Switzerland, believes that the problem of information security is irreducible exclusively to the infrastructure component, to cyber attacks or cyber incidents [6, p. 105]. Meanwhile, the editors of the foreign collection "International Relations and Security in the Digital Age" recognize the importance of political and ideological confrontation in interstate relations and ensuring security in the context of the information revolution [7, p. 52]. D. Nye also notes the importance of information influence in ensuring security in conflicts. He believes that in modern conflicts, physical destruction and informational impact are closely intertwined [8].

In this regard, E.S. Zinovieva notes the objectively prevailing situation that "currently there is no consensus on terminology at the international level and discussions are underway between States regarding the interpretation of the concept of "international information security" [9, p. 45]. Russia advocates a broad approach to the content of this concept, including both technical aspects (security of digital technologies, information systems and networks) and a significant range of political and ideological issues (manipulation of information, propaganda in global information networks, information impact). The countries of the collective West and the United States adhere to a narrow approach, limiting themselves to the technical side, using the term "cybersecurity". Taking into account the specifics of modern information relations, the multidimensional nature of risks and threats in the information space, Russia's position should be recognized as more justified and aimed at a systematic approach to regulating information security.

Currently, the processes of forming international experience in the field of information security are actively underway within the framework of the functioning of such international organizations as the United Nations; the Council of Europe; the European Union; the Shanghai Cooperation Organization; a group of five countries: Brazil, Russia, India, China, South Africa; the Eurasian Economic Union; the Commonwealth of Independent States; the Organization Collective Security Treaty. Thus, the development of the information society has been considered as a priority task by the Council of Europe since 1993, when the White Paper "Economic Growth, Competition, Employment – challenges and ways to solve them on the threshold of the XXI century" was published. Later, the Council of Europe adopted the action plan "Europe's Path to the Information Society", which provides for a number of conditions for free access to information [10, p. 548].

Due to the need to develop international legal mechanisms for ensuring information security within the United Nations, an active negotiation process initiated by Russia has been underway since 1998. The problems related to information security were discussed at all sessions of the United Nations General Assembly, including the problems of the formation of the conceptual apparatus and the development of an international legal regime of information security. In this regard, the Ministry of Foreign Affairs of the Russian Federation sent to the United Nations the document "Principles concerning international information security", which contains definitions of such basic concepts in the field of international information security as "international information security", "threat to information security", "information weapons" and others.

We believe that only the adoption of a system of interrelated norms regulating the subject area under consideration at the interstate, regional and international levels will adequately counteract modern challenges, risks and threats to security in the information sphere. A promising direction is the development of an international legal framework for interstate and international cooperation, the formation of a coordinated categorical and conceptual apparatus in the field of international information security.

It should be noted that Russia pays special attention to issues of international cooperation. Regarding the international cooperation of the States of the Asia-Pacific region, attention should be paid to the Agreement between the Governments of the member States of the Shanghai Cooperation Organization on Cooperation in the Field of information Security. Within the framework of this agreement, the participating States cooperate to develop joint measures to develop legal norms of cybersecurity, counter threats to information resources and assist in ensuring safe and stable functional management of the Internet. In order to develop interstate cooperation and in the interests of ensuring the information security of the member States of the Collective Security Treaty Organization, an agreement is in force in which information security is considered as a state of protection of legal entities and their interests from threats and destructive influences. Recognizing the importance of the effective use of information technologies to strengthen countering new challenges and threats to information security, it should be noted that in 2013 the participants of the Commonwealth of Independent States adopted an agreement in the field of information security. This agreement contains basic provisions for the formation of modern international programs in the field of cybersecurity. In addition, interdepartmental consultations of the participating States are held on an ongoing basis  For example, in December 2022, the Commonwealth of Independent States discussed the development of joint positions of the Commonwealth of Independent States and their promotion on international platforms, as well as legal approaches to regulating international information security, taking into account cross-border data exchange in response to threats and incidents in the face of new challenges and risks. [11]. Draws attention to the fact that special attention is paid to the issues of international information security in the Shanghai Cooperation Organization. Within the framework of the implementation of the Plan of Interaction of the member States of the Shanghai Cooperation Organization on International Information Security for 2022-2023, expert groups of the Shanghai Cooperation Organization are working to review and adopt joint decisions in the field of information security, including interaction on specialized multilateral platforms of international organizations [12].

In order to ensure information security and protect information from external threats, more than 20 bilateral agreements on cooperation in the field of international information security have been signed. For example, the Agreement between the Government of the Russian Federation and the Government of the Republic of Azerbaijan on Cooperation in the Field of International Information Security, the Agreement between the Government of the Russian Federation and the Government of the Republic of South Africa on Cooperation in the Field of International Information Security, the Agreement between the Government of the Russian Federation and the Government of the Federative Republic of Brazil on Cooperation in the Field of International Information and Communication Security security, etc. Analyzing these agreements, it should be noted that these normative legal acts attach importance to international information security as one of the key elements of the international security system aimed at countering threats to international information security, ensuring the interests of information security and contributing to the creation of an international information environment.

For example, in the Agreement between the Government of the Russian Federation and the Government of the Republic of Azerbaijan on cooperation in the field of international Information security, it is noted that the parties to this agreement seek to prevent threats to international information security and ensure national interests in the information sphere of states in order to secure the information environment, which is characterized by peace, security, openness and cooperation. According to Article 4 of the Agreement between the Government of the Russian Federation and the Government of the Republic of South Africa on Cooperation in the Field of International Information Security, the parties cooperate in order to ensure social and economic development that was compatible with the tasks of maintaining international peace, security and stability and consistent with generally recognized principles and norms of international law. In accordance with Article 3 of the Agreement between the Government of the Russian Federation and the Government of the Federal Republic of Brazil on Cooperation in the Field of International Information and Communication Security, the parties carry out cooperation aimed at developing and improving the international legal framework and practical mechanisms of cooperation between the parties in strengthening international information and communication security. Thus, these agreements are aimed at developing joint measures for the development of legal norms that ensure information security, the protection of critical information objects and the prevention of cybersecurity threats. In turn, the parties take part in the development of cybersecurity standards on the basis of domestic legislation, while bilateral agreements determine not only the legal provision of information security, but also the unification of legal norms in the creation, operation and development of an integrated information system, i.e. establish technical cooperation in order to ensure cybersecurity. It follows from this that international cooperation in the field of information security is based on the principle of social responsibility and their interaction is carried out in order to fill the identified gaps in the regulatory regulation of the cyber environment.

The analysis of the considered basic provisions of interstate agreements made it possible to determine that the common goal is to formulate rules of conduct in the information space aimed at ensuring information security in the face of new challenges and threats through international cooperation between all relevant stakeholders. Taking into account the absence of a coordinated system of international information security, the inconsistency of the models formed, it is advisable to develop international legal cooperation based on the convergence of the Eurasian and Euro-Atlantic systems of international information security with the active participation of Russia, taking into account the generally recognized principles and norms of international law. We believe that a significant place should be given to issues of personal security in the information sphere, including countering undesirable information and psychological effects.

Thus, the Russian legal order contains a fairly developed system of information interaction to improve the legal regulation of information security. At the same time, it is necessary to establish in detail the list of information that is the object of interstate cooperation with foreign states. We believe that for more effective cooperation, strengthening allied and partnership relations with foreign countries, a tendency should be formed to conclude agreements on mutual protection of classified information in the field of information security, as well as a mechanism for resolving disputes related to violations of the provisions of these agreements. Strengthening the integration cooperation of the Russian Federation with other countries in the field of information security is a strategically important area that contributes to strengthening international information security and national security of the state.

References
1. Kopylov, V.A. (2005). Information law: textbook. 2nd ed. reprint. and additional. Jurist, 2005, 510.
2. Tedeev, A.A. (2007) Theoretical foundations of legal regulation of information relations formed in the process of using global computer networks: abstract of the dis. ...doctors of law: 12.00.14. / Moscow State University. 58.
3. Nazarova, V.V. (2020) Actual international legal issues of ensuring information security against the background of the threat of international cybernetic terrorism. Law and State: theory and practice. 4 (184), 118-120.
4. Boyko, S.M. (2022) International information security: new challenges and threats. International life. 11, 10-13.
5. Berdimuratova, G.M. (2022) Issues of information security in international law. Bulletin of Science and Practice. 8 (12), 434-440.
6. Dunn, M.A. (2007) Securing the digital age: the challenges of complexity for critical infrastructure protection and IR theory. International Relations and Security in the Digital Age. Routledge, 105-125.
7. Eriksson, J., Giacomello, G. (2007) International relations and security in the digital age. London: Routledge, 256.
8. Nye J. S. The future of power. Public Affairs, 2011.
9. Zinovieva, E.S. (2014) International cooperation to ensure international information security. Law and management. XXI century. 4 (33), 44-52.
10. Tikhonov, V.N., Markova, A.Y. (2017) International legal regulation of information security. Alley of Science. 15 (2), 547-550.
11. CIS countries are stepping up cooperation in the field of information security. Official website of the Parliamentary Assembly of the Union of Belarus and Russia. Retrieved from: https://belrus.ru/info/strany-sng-aktiviziruyut-sotrudnichestvo-v-oblasti-informacionnoj-bezopasnosti
12. Media report on the results of the meeting of the SCO Expert Group on International Information Security (Tashkent, July 13, 2022). Official website of the Shanghai Cooperation Organization. Retrieved from: http://rus.sectsco.org/news/20220719/855125.html

First Peer Review

Peer reviewers' evaluations remain confidential and are not disclosed to the public. Only external reviews, authorized for publication by the article's author(s), are made public. Typically, these final reviews are conducted after the manuscript's revision. Adhering to our double-blind review policy, the reviewer's identity is kept confidential.
The list of publisher reviewers can be found here.

The subject of the research in the article submitted for review is, as its name implies, the experience of international cooperation in the field of information security. The author paid special attention to the relevant problems and prospects. The declared boundaries of the study have been observed by the scientist. The methodology of the research is not disclosed in the text of the article, but it is obvious that the author used universal dialectical, logical, formal and legal research methods. The relevance of the research topic chosen by the scientist is justified as follows: "The set of problems of legal provision of information security is relevant to the legal doctrine and legislation of each state having its own national interests and interested in maintaining peace, international and national information security. In the light of the interaction of various states, the issue of international and foreign experience in the legal provision of information security is important." Additionally, the author needs to list the names of the leading experts involved in the study of the problems raised in the article, as well as reveal the degree of their study. It is not explicitly stated what the scientific novelty of the study is. In fact, it manifests itself in a number of conclusions and suggestions of the author: "The study showed that only the adoption of a system of interrelated norms regulating the subject area under consideration at the interstate, regional and international levels will adequately counteract modern challenges, risks and threats to security in the information sphere. At the same time, a promising direction is the development of an international legal framework for interstate and international cooperation and the formation of a coordinated categorical and conceptual apparatus in the field of international information security"; "Analysis of the basic provisions of interstate agreements under consideration made it possible to determine that the common goal is to formulate rules of conduct in the information space in order to ensure information security in the face of new challenges and threats through international cooperation between all relevant stakeholders. At the same time, taking into account the lack of a coordinated system of international information security, the inconsistency of the models currently formed, it is advisable to develop international legal cooperation based on the convergence of the Eurasian and Euro-Atlantic systems of international information security with the active participation of Russia, taking into account generally recognized principles and norms of international law, while a significant place should be given to issues of personal security in in the information sphere, including countering undesirable information and psychological effects." The article certainly deserves the attention of the readership and has a certain contribution to the development of domestic legal science. The scientific style of the research is fully sustained by the author. The structure of the work is quite logical. In the introductory part of the article, the scientist substantiates the relevance of the chosen research topic. In the main part of the article, the author analyzes the main international documents in this field, paying attention to all levels of international cooperation in the field of information security. The final part of the article contains conclusions and suggestions based on the results of the study. The content of the article corresponds to its title and does not cause any particular complaints, however, there are some shortcomings of a formal nature. So, the following sentence from the dissertation work - "The basic principles of legislative regulation of relations in the field of international information security, as discussed above, are formulated in fundamental international documents and are a priority in the development of information legislation for Russia" - needs to be removed or adjusted ("above" no principles of legislative regulation of relations in the field of information security security was not considered). The articles based on the dissertation need additional revision and increased attention to the design. All abbreviations should be deciphered when they are first used in the text. The bibliography of the study is presented by 10 sources (international acts, dissertation, scientific articles, textbook). From a formal and factual point of view, this is quite enough. The nature and number of sources used in writing the article allowed the author to reveal the research topic with the necessary depth and completeness. The appeal to the opponents is of a general nature. Basically, the author refers to a number of sources used in writing the article solely to confirm his judgments or to illustrate certain provisions of the work (V. A. Kopylov, A. A. Tedeev, E. S. Zinoviev). The scientific discussion is conducted by the scientist correctly. The provisions of the work are justified to the necessary extent. There are conclusions based on the results of the study ("Thus, the Russian legal order as a whole contains a fairly developed system of information interaction to improve the legal regulation of information security. At the same time, it is necessary to establish in detail the list of information that is the object of interstate cooperation with foreign states. We believe that for more effective cooperation, strengthening allied and partnership relations with foreign countries, a tendency should be formed to conclude agreements on the mutual protection of classified information in the field of information security with a more detailed description of the list of such information, as well as a mechanism for resolving disputes related to violations of the provisions of these agreements. Strengthening the integration cooperation of the Russian Federation with other countries in the field of information security, today, is a strategically important area contributing to strengthening international information security and national security of the Russian Federation") and deserve the attention of the readership. The article has not been proofread by the author. It contains typos, punctuation, syntactic and stylistic errors. The interest of the readership in the article submitted for review can be shown primarily by specialists in the field of international law, administrative law, information law, provided that it is finalized: disclosure of the research methodology, additional justification of the relevance of its topic, elimination of violations in the design of the work.

Second Peer Review

Peer reviewers' evaluations remain confidential and are not disclosed to the public. Only external reviews, authorized for publication by the article's author(s), are made public. Typically, these final reviews are conducted after the manuscript's revision. Adhering to our double-blind review policy, the reviewer's identity is kept confidential.
The list of publisher reviewers can be found here.

A REVIEW of an article on the topic "Experience of international cooperation in the field of information security: problems and prospects". The subject of the study. The article proposed for review is devoted to topical issues of international cooperation in the field of information security. The author of the article attempts to point out the problems and prospects in this area. The opinions of scientists, as well as legal acts, were used as a specific subject of research. At the same time, it is surprising that despite the research topic ("experience"), the article does not provide specific examples of the implementation of agreements in the field of international cooperation. In fact, the empirical research method was not used, which is worth noting as a comment on the article. Research methodology. The purpose of the study is not stated directly in the article. At the same time, it can be clearly understood from the title and content of the work. The goal can be designated as the consideration and resolution of certain problematic aspects of the issue of problems and prospects of international cooperation in the field of information security. Based on the set goals and objectives, the author has chosen the methodological basis of the study. As the author of the article himself points out, "The methodological basis of this scientific article is a set of both general scientific and special methods of cognition used. A significant role is assigned to the method of system analysis. Comparative law, formal law, the method of legal modeling and others were used as special legal methods of cognition." The most important role was played by special legal methods. In particular, the author actively applied the formal legal method, which made it possible to analyze and interpret the norms of current legislation (primarily the provisions of international agreements). For example, the following conclusion of the author: "Regarding the international cooperation of the states of the Asia-Pacific region, attention should be paid to the Agreement between the governments of the member states of the Shanghai Cooperation Organization on cooperation in the field of information security. Within the framework of this agreement, the participating States cooperate to develop joint measures to develop legal norms of cybersecurity, counter threats to information resources and assist in ensuring safe and stable functional management of the Internet [7]. In order to develop interstate cooperation and in the interests of ensuring the information security of the member states of the Collective Security Treaty Organization, an agreement is in force in which information security is considered as a state of protection of subjects of law and their interests from threats and destructive influences [8]. Recognizing the importance of effective use of information technologies to strengthen counteraction to new challenges and threats to information security, it should be noted that in 2013 the participants of the Commonwealth of Independent States adopted an agreement in the field of information security." At the same time, the reviewer believes that the experience of international cooperation is by no means limited only to agreements. Therefore, to achieve the purpose of the study, it is not enough just to disclose agreements in the field under consideration when using the formal legal method. To achieve the purpose of the article, it is also necessary to apply empirical research methods, which in this context could, for example, be reduced to generalizing the practice of implementing these agreements and/or considering specific actions by States to implement international cooperation in the field of information security. Thus, the methodology chosen by the author is not fully adequate to the purpose of the study, does not allow to study all aspects of the topic in its entirety. Relevance. The relevance of the stated issues is beyond doubt. There are both theoretical and practical aspects of the significance of the proposed topic. From the point of view of theory, the topic of international cooperation in the field of information security is complex and ambiguous. In order to achieve the goal of providing adequate guarantees in the field of information to citizens, legal entities, and public legal entities, it is necessary that in the era of globalization, States take joint actions in the stated directions. It is difficult to argue with the author that "Special attention is paid to the issues of legal provision of information security today in the light of modern geopolitical processes and their impact on all spheres of life. He draws attention to the fact that one of the tasks of modern society is the search for universal solutions to information security issues. One of the key roles in this issue is played by Russia, which initiates international conventions on information protection and ensuring international information security." Thus, scientific research in the proposed field should only be welcomed. Scientific novelty. The scientific novelty of the proposed article is beyond doubt. Firstly, it is expressed in the author's specific conclusions. Among them, for example, is the following conclusion: "the Russian legal order contains a fairly developed system of information interaction to improve the legal regulation of information security. At the same time, it is necessary to establish in detail the list of information that is the object of interstate cooperation with foreign states. We believe that for more effective cooperation, strengthening allied and partnership relations with foreign countries, a tendency should be formed to conclude agreements on mutual protection of classified information in the field of information security, as well as a mechanism for resolving disputes related to violations of the provisions of these agreements. Strengthening the integration cooperation of the Russian Federation with other countries in the field of information security is a strategically important area that contributes to strengthening international information security and national security of the state." These and other theoretical conclusions can be used in further scientific research. Secondly, the author offers comments and generalizations of the provisions of a number of international agreements in the field of information security. The above conclusions may be useful to specialists in this field. Thus, the materials of the article may be of particular interest to the scientific community in terms of contributing to the development of science. Style, structure, content. The subject of the article corresponds to the specialization of the journal "International Law and International Organizations", as it is devoted to legal problems related to ensuring information security under international law. The content of the article fully corresponds to the title, since the author considered the stated problems and achieved the research goal. The quality of the presentation of the study and its results should be recognized as fully positive. The subject, objectives, methodology and main results of the study follow directly from the text of the article. The design of the work generally meets the requirements for this kind of work. No significant violations of these requirements were found. Bibliography. The quality of the literature used should be assessed on an average basis. The author uses literature presented by authors from Russia (Kopylov V.A., Tedeev A.A., Zinovieva E.S., Tikhonov V.N., Markova A.Yu.). At the same time, all literature was published more than five years ago. At the same time, as the author of the article himself notes and with which the reviewer fully agrees, the topic of information security is very relevant today. Many authors write on this topic. In addition, taking into account the subject of the study, the works of foreign authors should be added. Thus, the works of the above authors correspond to the research topic, but do not have a sign of sufficiency, do not contribute to the disclosure of various aspects of the topic. Appeal to opponents.
The author conducted a certain analysis of the current state of the problem under study. At the same time, taking into account the comments from the previous paragraph, only after expanding the theoretical base of the study will it be possible to say that such an analysis is full of Conclusions and the interest of the readership. The conclusions are fully logical, as they are obtained using a generally accepted methodology. The article may be of interest to the readership in terms of the systematic positions of the author in relation to the issues of improving international law and the experience of its application in the field of information security. In conclusion, the following comments and suggestions should be given on the article: - the empirical base of the study should be expanded by disclosing specific examples of the implementation of agreements on international cooperation in the field of information security; - it is necessary to expand the theoretical base of the study by adding modern and most relevant (no older than five years) sources on the research topic; - consider 2-3 foreign-language sources on the topic of the study. Based on the above, summarizing all the positive and negative sides of the article, "I recommend sending it for revision"

Third Peer Review

Peer reviewers' evaluations remain confidential and are not disclosed to the public. Only external reviews, authorized for publication by the article's author(s), are made public. Typically, these final reviews are conducted after the manuscript's revision. Adhering to our double-blind review policy, the reviewer's identity is kept confidential.
The list of publisher reviewers can be found here.

The subject of the peer-reviewed study is the specifics of the legal regulation of information security in international law. The author rightly associates the high degree of relevance of his research with the complexity of the geopolitical processes that we have witnessed, as well as with the obvious fact that information security is one of the most important components of state and public security. Thus, it must be admitted that the reviewed article has not only theoretical relevance, but also practical significance. It should also be noted that the author duly reflected on the theoretical and methodological basis of his research, pointing out that in addition to traditional general scientific analytical methods, special methods of legal science were used in the work: comparative law, formal law, the method of legal modeling, etc. Indeed, the results of the application of these methods can be found in the peer-reviewed article. The same cannot be said about the method of system analysis declared by the author. Of course, it is difficult to deny the fact that the object of research itself (problems of information security) and its subject (legal regulation of this security) have systemic properties and are elements of higher-level systems, but the actual system analysis is not found in the peer-reviewed work. To point out the systemic nature of regulatory regulation does not mean to conduct a systematic analysis, which involves the identification and description of systemic effects, emergence, etc. Nevertheless, the quite correct application of other methods declared by the author allowed us to obtain results that have signs of scientific novelty. First of all, we are talking about the identified specifics of international cooperation in the field of regulatory regulation of information security, as well as the factors and principles of this cooperation – social responsibility, openness, stability, etc. In addition, the results of the analysis of the specifics of the Russian law and order in ensuring information security are of scientific interest. Finally, the proposals formulated by the author on improving Russian legislation in the field of information security are of practical interest. Structurally, the article also makes a positive impression: despite the lack of rubrication, its logic is consistent and reflects the main aspects of the research. The following sections can be distinguished in the text: - the introductory part, which sets a scientific task, argues its relevance, formulates the purpose and objectives of the study, as well as the theoretical and methodological basis of this study; - a critical analysis of the main research on the problems of the article, which allowed conceptualizing the problem and formulating its author's vision; - analysis of international legal mechanisms information security, which made it possible to explicate the basic principles and factors of regulatory regulation of the field under study; - analysis of the Russian regulatory framework for information security, which resulted in specific recommendations for improving this framework; - the final part, which summarizes the results of the study and draws conclusions. From the point of view of style, the reviewed article should be qualified as a scientific work that follows the stylistic requirements for works of this kind. There are a small number of grammatical errors in the text (for example, the inconsistent sentence "The purpose of this study is to develop ...", etc.), but in general it is written quite competently, in good Russian, with the correct use of scientific terminology. The bibliography includes 12 titles, including sources in foreign languages, and sufficiently represents the state of research on the subject of the article. An appeal to opponents takes place when discussing various aspects of the conceptualization of information security problems in modern science. GENERAL CONCLUSION: the article proposed for review should be qualified as a scientific work that meets the basic requirements for works of this kind. The results obtained by the author correspond to the subject of the journal "International Law and International Organizations" and will be of interest to political scientists, lawyers, specialists in the fields of public administration, information security, world politics and international relations, as well as to students of these specialties. According to the results of the review, the article is recommended for publication.