=Paper=
{{Paper
|id=Vol-2861/paper_1
|storemode=property
|title=Aspects of Ensuring Information Security in the Educational and Pedagogical Sphere
|pdfUrl=https://ceur-ws.org/Vol-2861/paper_1.pdf
|volume=Vol-2861
|authors=Magomed Abdurazakov,Elena Burdukovskaya,Ziyaudin Batygov,Lyubov Shilova
}}
==Aspects of Ensuring Information Security in the Educational and Pedagogical Sphere==
Aspects of Ensuring Information Security in the Educational and
Pedagogical Sphere
Magomed Abdurazakov a, Elena Burdukovskaya b, Ziyaudin Batygov c and Lyubov Shilova d
a
Russian Academy of Education, Salaryevskaya, 14-3-8, Moscow, 108811, Russia
b
Amur State University, 21, Ignatyevskoye shosse, Blagoveshchensk, 675029 Russia
c
Ingush State University, Magas, I.B. Zyazikova, 7, Magas, 386001, Russia
d
V. I .Vernadsky Crimean Federal University, Academician Vernadsky Avenue, 4, Simferopol, 295007, Russia
Abstract
The article examines the concept of information security of society and man, the requirements and
problems of its provision in the context of global telecommunications and the Internet;
manifestation of information security in education, in the educational and cognitive process and in
the content of training. It is noted that the information security of educational subjects is a specific
part of the general security of education, as its qualitative development in the developing
information society in accordance with its properties and requirements. The concept of
information security in the field of education is formulated in the context of a general concept and
in the aspect of its specificity in education, its educational and educational processes, as well as in
the aspect of personal, psychological, age and other properties of subjects of education.
The manifestation of information security in education is expressed both as the implementation of
general information security in it in terms of learning goals and public order, personal, socio-
cultural and information-psychological development of educational subjects, and as a subject of
education through the implementation of subject-based educational training in the context of the
formation of relevant knowledge, competencies and personal qualities. This presupposes the
presence of a corresponding purposefulness of general education, which also acquires the quality
of informational education, and its expression in the content of education and subject-based
educational training. In particular, this applies to the subject ”Informatics and ICT” as the main
resource of information education, in the process of forming relevant knowledge, competencies
and personal qualities.
The formation of personal competencies presupposes the reflection in the content of teaching
informatics of the content line or topic ”Information security”, which is related to the information
security of society, the environment, a person, and also reveals the conditions and requirements
for its provision. In terms of content, for example, topics such as protection of information and
information copyright, protection from disinformation and negative information impact,
communication culture, network ethics, etc. Moreover, competencies related to information
security should be classified as general cultural and should become mandatory for study.
The formation of the personal qualities of the subject of education, necessary for him to
effectively and safely interact with the modern information environment, provides for the
formation and development of personal information culture and culture of the information society.
This is a culture of communication and information interaction in the Internet, cyberspace. Special
attention is paid to the issues of the formation of critical thinking and critical attitude to
information; development of the ability to differentiate information and resistance to negative
information and psychological influences.
Keywords 1
Information, security, Internet, society, person, subject of education, socioculture, information
culture, critical thinking.
SLET-2020: International Scientific Conference on Innovative Approaches to the Application of Digital Technologies in Education,
November 12-13, 2020, Stavropol, Russia
EMAIL: abdurazakov@inbox.ru (Magomed Abdurazakov); bulena@mail.ru (Elena Burdukovskaya); bat-zo@yandex.ru (Ziyaudin
Batygov); kabprakt@gmail.com (Lyubov Shilova)
ORCID: 0000-0002-7979-0847 (Magomed Abdurazakov); 0000-0002-3928-8588 (Elena Burdukovskaya); 0000-0001-7368-9417 (Ziyaudin
Batygov); 0000-0003-4817-132X (Lyubov Shilova)
©️ 2020 Copyright for this paper by its authors.
Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
CEUR Workshop Proceedings (CEUR-WS.org)
16
1. Introduction
With the development of global informatization and social and information aspects in the scientific
and educational sphere, the driving force behind the change in the form and content of education is
not the production of goods, but the information industry and the corresponding IT-technology for its
processing, which is characterized by the task of providing educational subjects with the necessary
knowledge in the required form in real time. Almost unlimited access to knowledge through global
networks, the possibility of intensive communications between people at a distance, the growing
intensity of the ”virtual” or ”augmented” life of users in cyberspace makes one think about the future
of education, about the ways of its development. The development of methods and means of
informatics and the process of informatization of education require a radical rethinking of the goals,
content, forms and methods of teaching any academic discipline at a new modern level, including at
the system level. The system-informational approach is increasingly beginning to be perceived as a
general scientific method of cognizing nature and society.
It is quite obvious that the consequences of the information revolution affect the very foundation
of civilization. Back in June 2000, the Okinawa Charter of the Global Information Society was
adopted, as well as a special Manifesto on the Information Revolution in Economics and Finance. The
Charter has repeatedly emphasized that the information revolution is carried out within the framework
of the concept of a Knowledge based Society.
According to the Doctrine of Information Security of the Russian Federation, ”information
security” is understood as ”the state of protection of the individual, society and the state from internal
and external information threats, which ensures the implementation of constitutional rights and
freedoms of man and citizen, a decent quality and standard of living of citizens, sovereignty,
territorial integrity and sustainable socio-economic development of the Russian Federation, defense
and security of the state” [30].
A further impetus in the state-building of the post-industrial (information) society in our country
was given by the adoption of the Strategy for the Development of the Information Society in the
Russian Federation for 2017-2030. This document defines ”... goals, objectives and measures for the
implementation of the domestic and foreign policy of the Russian Federation in the field of
application of information and communication technologies, aimed at the development of the
information society, the formation of a national digital economy, ensuring national interests and
implementing strategic national priorities” [29].
The main principles of the Strategy are:
a) ensuring the rights of citizens to access information;
b) ensuring freedom of choice of means of obtaining knowledge when working with information;
c) preservation of traditional and customary for citizens (other than digital) forms of receiving goods
and services;
d) the priority of traditional Russian spiritual and moral values and adherence to the norms of
behavior based on these values when using information and communication technologies;
e) ensuring the legality and reasonable sufficiency in the collection, accumulation and dissemination
of information about citizens and organizations;
f) ensuring state protection of the interests of Russian citizens in the information sphere.
In the modern division of labor, the subjects of training are not the IT-technologies and
information systems themselves, but the ways of interacting with them and the technology of their
consumption. The UNESCO report emphasizes that ”it is not the technology itself that is important,
but its interaction with learning and its role in the context of the education system as a whole” [32].
The thesis received practical confirmation in the context of COVID-19 with the transition to distance
learning and the use of mobile devices.
In the course of the digitalization of society and education, a very specific social context of
informatics and ICT began to crystallize. The following aspects of this context are definitely of
fundamental importance for our study:
The first aspect is related to the influence of the information factor on social processes. In the
scientific literature, this direction is called ”Social Informatics”, the priority task of which is a
comprehensive study of the information society. The leading experts in this field, both in our country
17
and abroad are: D. Bell, A. P. Ershov, K. K. Colin, N. N. Moiseev, A. I. Rakitov, A. Toffler,
A. Touraine and others.
The second aspect covers the problems of modernization of general information education and is
due to the incomplete correspondence of its level and the requirements of the information society; the
absence of a systemically conditioned formation of information culture of educational subjects in the
information education system, as indicated in the documents ”Strategy for the Development of the
Information Society”, ”Doctrine of Information Security”, etc. This discrepancy can be traced, in
particular, in relation to the above-mentioned characteristic properties of the information society
(socio-culture, information culture, information security, etc.).
The third aspect of the social context of information education is associated with the development
of informatics and ICT, including the need to comprehend the social aspects of informatization of
education, legal regulation of the processes and relations that are implemented in them. The fact is
that information processes are studied like all natural and social phenomena based, first of all, on the
modeling methodology. On the other hand, an information product is created by a person for a very
specific purpose and, as a rule, according to a specific technology, which assumes the presence of
mass consumption and a certain order of this consumption. This clearly shows its social aspect.
Fourth aspect. The quality of education and the effectiveness of educational and cognitive
activities of educational subjects largely depend on the efficiency and quality of consumption,
generation and reproduction of information and knowledge.
The work [6] substantiates the need to integrate the information security system into the activities
of educational institutions, since "one of the most active consumers and generators of information is
the education sector, where the intellectual and moral potential of future generations is formed."
Thus, the integration of a security and information security system in the information and
educational sphere becomes a necessity. This problem is the focus of our research.
Safety means the security of the human society, expresses a guarantee of the safety of the state,
their resources, wealth, knowledge; conditions, environments in which they live, operate and develop,
which correspond to their level and development goals. Since all phenomena and processes of the
world are informational in nature, any activity and any interaction in society is implemented as
informational, then any security is realized through information security ”... information security is
becoming one of the most important conditions for ensuring national and international security, as
well as personal security of every person” [18].
Therefore, information security is as follows:
security of the human information sphere, information, information processes and relations, the
infrastructure of this sphere;
informational expression of general safety and security of any particular type.
Information security in the educational and pedagogical sphere must be considered in the
following aspects:
as a socio-cultural phenomenon of the world, society, environment, human sphere and the
corresponding social, general cognitive, scientific concept, expressed in research and
knowledge;
as their manifestation in the educational environment, in educational interaction and
pedagogical research, in the personal systems of subjects of education, in their development
and self-development;
as the content of education and subject teaching, including information education and computer
science teaching.
Thus, the aspect of the social context of informatics and ICT is associated with the development of
informatization, including informatization of education, with the need to comprehend the social and
socio-legal aspects of informatization, legal regulation of the processes and relations that are
implemented in them. In the work [21], the authors emphasize that the national policy of
informatization of society and education ”develops as a part of global (world) informatization”,
”harmonization of national information law with laws, laws, standards of the general information
environment" is carried out. As rightly noted, ”the modern educational space is a participant in the
emergence of a new global community” [13].
18
The informatization of society is developing in the system of subject and object relations, in the
aspect of information interaction, which requires a legal subsystem of informatization. The legal
system of informatization, in turn, presupposes the presence of an appropriate theory - legal
informatics, a component of the scientific system of informatics, which constitutes a complex unity
with social informatics.
The purpose of the study is to substantiate the importance and prospects of the system of
pedagogical support and support for information security of educational subjects in a secondary
school as the foundation of their information culture in accordance with the requirements of Federal
State Educational Standards; directions in pedagogical science, which is in a state of formation.
2. Literature review
The modernization of the existing information education is due to the need to form a culture of
knowledge and, accordingly, a culture of educational knowledge, which will become the basis for the
development of skills, competencies of subjects of education and a forming part of the content of
education and self-study. This thesis is supported by a number of trends taking place in society and
education in the context of digitalization.
(1) The task of the subject of education is to develop, increase the level of their competencies
(information and communication, sociocultural, socio-legal, etc.) with active interaction with the
information and educational environment (IEE), including self-immersion in this Wednesday. ”Learn
to learn” and ”teach to learn” are the fundamental principles of modern education (lifelong learning),
which are mutually determining components of a single educational setting. At the same time, this is
only a pragmatic, cognitive expression of the culture of knowledge and the culture of knowledge, the
upbringing of the personality of the subject of education, the formation of his motivation to develop
personal knowledge, to self-development [1]. However, information should be differentiated in
accordance with the measure of their significance, value, necessity, and the criteria for the advisability
of including knowledge and other information in the content of training or self-study is their
compliance with the goals of education and personal development, efficiency, productivity and
continuity.
(2) The social culture of society exists and develops today in the context of digital technologies,
the so-called ”social media” [15], which manifests itself in the active presence of people in social
networks, in other virtual forums or forms of communities.
(3) Technological culture develops under the powerful influence of the new scientific paradigm
”Data Intensive Science”, the main ideology of which is the priority of communication and
communication in the process of scientific research over the generally accepted methodologies -
theoretical and empirical.
All three trends are shaping a new ”networked information reality” [15], which largely determine
the current trends in the development of education and they are related to fundamental issues of
pedagogy and digital didactics: how to ensure a balance between individual and collective in the
learning process, new content and methods education; the role and place of subjects of education in
the ITS, methods and procedure for the systematic organization of training, ensuring the effectiveness,
legitimacy, information security and safety of educational and cognitive activities of students.
Fundamental is ”a balanced correspondence of the information competence of the subject and his
information culture, the intellectual and spiritual levels of development of subjects of computer
science training, between their formation and development in this training with a corresponding
reflection of this in its content and forms” [2].
We agree with the opinion of V. P. Polyakov that with the development of IT technology, new
forms of illegal activity appear, in particular, with the use of information and communication
technologies [12]. Therefore, the education system is given a special role - the formation of
knowledge and competencies in the field of information security, necessary for a successful life,
adaptation in society and professional activity in the digital era. One of the strategic goals of ensuring
information security in the field of science and the educational and pedagogical sphere is the
formation of a culture of personal information security among citizens.
19
The issues of studying the problems of information security and information protection in the
Russian Federation are reflected in seven areas of the profile in the curricula and basic educational
programs for training specialists in applied informatics (by area) and other categories of IT specialists.
For example, the Federal State Educational Standard of Higher Education was approved in the area of
training 10.03.01 ”Information security” (Link to file: http://fgosvo.ru/100301); approved by the
Federal State Educational Standard of Higher Education in the area of training 10.02.01
”Organization and technology of ensuring information security” (as amended by the Order of the
Ministry of Education and Science of Russia dated 09.04.2015 N 391. The file with the text of the
standard is posted in the Federal State Educational Standard of Higher Education section of the
website www.fgosvo.ru)
The OECD Guidelines for the Security of Information Systems and Networks: Towards a Culture
of Security were the starting point for the formation of a culture of information security in developed
countries. The recommendations of the Organization for Economic Cooperation and Development
(OECD Guidelines for the Security of Information Systems and Networks: Towards a Culture of
Security) [31], adopted in 2002. These recommendations formed the basis of the UN General
Assembly Resolution “Building a Global Culture of Cybersecurity”, adopted in December 2002.
In May 2011, the French Government decided to increase the number of areas for training
specialists in the field of information systems security in higher educational institutions [36]. It was
announced that the goals of training specialists are the formation of the necessary competencies that
meet the requirements and needs of employers; developing a strategic vision of information security
problems in a dynamic market environment.
An analysis of the Master's degree programs of higher educational institutions in Germany shows
that the preparation of masters (Master of Science [M.Sc.] and Master of Laws [LL.M.]) [34], [35],
[40], [41], for example, at the Leibniz University of Hannover, the following programs are being
implemented: ”Computing and Law”, ”Cyber Law Research Group”, ”Corporate and IT Security”,
”Security Management”, ”Information Law and Intellectual Property Rights”, etc.
The information security strategy in the UK is based on increasing information literacy and media
competence of citizens as the ability of children and youth ”to make informed choices, understand the
nature of content and services and take advantage of the full range of opportunities offered by new
communications technologies. They are better able to protect themselves and their families from
harmful or offensive material”. This strategy is based on the understanding that media literacy is just
as important in modern society as traditional literacy [33].
The process of formation of socialization of schoolchildren, their motives of behavior, value
orientations, behavioral skills are largely formed today at the junction of the virtual world with reality,
a ”digital generation of children” has appeared, which are characterized by such qualities as creativity,
innovation, awareness, thanks to the constant involvement in search and research activities etc.
However, according to the researchers, the problem area of the ”digital generation” is the departure of
children to virtual reality, their information overload, as a result of which motivation, the ability to
learn, form knowledge and operate with them decreases [10], [24], [34], [39].
Thus, the report of the results of the global research ”EU kids online” notes that the use of the
Internet by children and adolescents from 9 to 16 years old from 25 European countries spend 88
minutes daily online; at the age of 15-16, the duration of Internet use reaches 118 minutes: 87% of
respondents have online access at home, 63% at school; 49% of the study participants admitted that
they use the Internet with friends and their parents (about 25142 respondents). This indicates the need
to strengthen control over the use of the Internet by children as part of the consumption of resources
in order to reduce the impact on the psyche and physical development of the younger generation of
dangerous, traumatic, immoral, or inappropriate content for their age [7], [9], [25], [35], [36], [37],
[38].
EU Kids Online, one of the collaboration partners of the Global Kids Online initiative, is an
international research network that currently spans 33 countries. Data for the report was collected
from research in Albania, Argentina, Brazil, Bulgaria, Ghana, Italy, Uruguay, Montenegro, Chile,
Philippines, South Africa and members of the Global Kids Online network. The report notes that
Internet use carries risks for children:
• More than half of children and young people surveyed in South Africa said they had
encountered sexual content on the Internet.
20
• 22 percent of respondents in Italy and Uruguay said they had been shown self-harm material.
• 35 percent of children surveyed in Italy and Uruguay said they had experienced incitement to
hatred.
• Only 2 out of 5 Facebook users aged 10 to 14 in Bulgaria open their accounts.
• In 11 countries surveyed, 30 to 75 percent of children said they may not be able to verify the
accuracy of online information [37].
Commenting on the Global Kids Online report, LSE social psychology professor and report co-
author Sonia Livingston notes, that ”Rather than worrying about how much time kids spend online,
the Global Kids Online study encourages parents to positively interact with and discuss with their
children's digital world the specific content and contact risks they may face so that children can
become resilient and thrive” [37].
However, there is a view and opposite view that the Internet as entertainment is critical to the
development of digital skills in schoolchildren: ”We often hear so much about the risks of using
children online, but less about how we can improve their resilience. on the Internet and digital skills ”,
underlines Priscilla Idele (Deputy Director of the UNICEF's Office of Research-Innocenti in Florence,
Italy). ”We need to help children navigate the Internet in the same way that we teach children to cross
the road. We cannot - and do not want - to prevent children from crossing the road just because it is
dangerous; our task is to teach them how to cross the road safely and responsibly in all situations and
apply security measures that allow them to do so” [37].
There is a deep understanding of the issues of information security, information security, ensuring
the security of the younger generation and the need to form the information culture of a person's
personality in the digital era. But in school education there is no clear position on how to ensure the
information security of students, what mechanisms (other than blocking sites or content) can be
effectively used in this process. We see that the problem is further aggravated by the lack of teaching
staff - specialists who are purposefully trained to implement and support just such a project.
3. Problem statement
Graduates of universities with special training in support of information security of students in the
conditions of the information and educational environment of a general education school can now
fully prepare only outside the sphere of humanitarian and pedagogical education. For pedagogical
support, in addition to studying subjects of the natural science and professional cycle (mathematics,
computer science, information technology, computer communication networks), a methodological
training system is needed that ensures the formation of the level of information culture of a teacher or
specialist with an obligatory component - competence in the field of information security and
information security in education. This problem is of an interdisciplinary nature and requires
pedagogical understanding in the development of the student's personality in the aspect of ensuring
information security in a modern digital society. Unfortunately, pedagogical science does not fully
pay attention to various issues related to training university graduates to ensure information security
of schoolchildren.
The formation of information culture is a multifaceted step-by-step process of continuous
information training of students. It is the level of information culture that is an indicator of the
subject's readiness for learning and self-learning, development and self-development and
characterizes the efficiency of using information and information resources in educational and
professional activities in the information space, with the mandatory provision of information security
requirements.
4. Research problem
At the same time, the development of the information society has given rise to significant and only
inherent problems in this society. There is a virtualization of public life as a process of creating a
”virtual world” or ”augmented reality”, that is, the replacement of real things and values with their
information models, virtual values becomes a universal phenomenon in the information society.
21
It is with these features of modern society that a graduate of a secondary school and a university
has to face, therefore, the process of their information education should be an adequate ”response” to
the ”challenges” (in A. Toynbee's terminology) of modern society.
The information security problems considered in the study are:
protection of information in the context of information law, protection of information,
including copyright;
protection of the information environment and the person, including the subject of education,
from negative information and disinformation, negative information impact on them;
the formation of personal qualities of a person, including the subject of education as resources
of his personal information security.
Information security problems of education, considered in the study, are:
pedagogical development of the topic of information security and its implementation in the
field of education;
adequate reflection of topics and problems of information security in the content of education
and subject teaching, including in the content of teaching computer science;
formation of personal information culture and critical thinking of educational subjects.
5. Research objectives
The objectives of the study are:
‒ Pedagogical identification of the concepts of information security of society and man, information
security of education and the subject of education.
‒ Pedagogical description of the content of topics of information security of society and education,
their subjects, reflection of topics in the content of subject training, in the subject of informatics
and ICT.
‒ Pedagogical description of the means and methods for the formation of knowledge and personal
competencies of educational subjects on the topics of teaching information security and its
provision.
‒ Pedagogical description of the means and methods of developing information culture, including
the culture of information security of educational entities.
6. Methodology
The methodological basis that implements the fundamental system-activity approach in the field of
education, primarily in information education and teaching computer science and ICT, are:
‒ systemic and informational, as a basic approach to the implementation of an informational
approach to understanding the world and a person through the prism of social relations and
sociocultural orientation of informational-cognitive and educational-cognitive processes.
‒ a meaningful approach aimed at an adequate expression of the content of education in the context
of digitalization of education;
‒ a formal approach aimed at determining the optimal formal and logical means of resources and
technologies for ensuring information security in the educational and pedagogical sphere;
‒ a socio-cultural approach aimed at the development of socio-culture, personal information culture
by means and resources of electronic-digital learning, and a culture of interaction in IEE in the
context of protecting information and educational resources of IEE and educational subjects.
7. Research methods
The research used theoretical research methods:
‒ analysis of philosophical, psychological, pedagogical, scientific, technical and methodological
literature, analysis of educational literature, analysis of school and university basic educational
programs and fulfillment of the requirements of the Federal State Educational Standard;
22
‒ general scientific methods of cognition: analysis, synthesis, comparison and collation,
generalization, systematization, etc.;
‒ system-structural and system-functional analysis of the methodological training system, in
particular, computer science and ICT.
8. Results
The expediency of training a teacher in the field of information and ensuring information security
of students in the context of higher pedagogical education is confirmed.
The methodological prerequisites for studying the foundations of information protection and
ensuring information security as the foundation of information culture of educational subjects have
been determined.
The goals and directions of pedagogical support and information security support of
schoolchildren in the information and educational environment in order to protect them from negative
manifestations, threats and risks in open cyberspace are formulated.
It is noted that the results of educational and cognitive activities of students without taking into
account the problems of ensuring information security in the context of digitalization can become the
most unpredictable in terms of reducing motivation, interest in learning, research activities, etc.
9. Discussion
An important sign of the information and digital age is the growing role and value of knowledge.
At the same time, the understanding and value of education as a channel for the transmission and
environment of ”personal appropriation” of the experience, knowledge, skills, culture of previous
generations to a new one for subsequent use and expansion in accordance with the goals of society
and the requirements of its development is growing. In this regard, the goal of education is to ensure
the historical security of society as a condition for the continuity of existence and development - the
resources and knowledge of society lose value without acquiring them by the new generation. The
question is how and how to make this transmission channel secure!
Creation and cognition provide for the preservation of results and ensuring continuity - the transfer
of the heritage of society to future generations. In addition, creation involves ensuring its
implementation, continuity, completion. Therefore, an equally important task is to ensure security,
information security - the security of processes, relations, objects and subjects, security of the state;
development security and historical perspective.
In these conditions, the education system is assigned a special role - the formation of knowledge
and competencies in the field of information security, necessary for a successful life and professional
activity in the information society, and ”these competencies should be classified as general
cultural” [4]. The process of forming personal competencies in the field of information security
should cover all levels of the education system: secondary (complete, incomplete) education, primary,
secondary and higher professional education, which imposes new requirements on the system of
higher pedagogical and vocational education.
The progress of mankind is unthinkable without effective processes of creation, cognition,
production and reproduction. But even without information security, without its effective organization
and provision, progress is also impossible, and even more so there is no historical perspective for it.
That is, information security is a logical extension of the system of building society, and all the
problems of mankind, all its processes of cognition and construction should be linked to security
problems and solved with them in a complex, in accordance with information balance.
Consequently, ensuring information security, solving its problems should be carried out in a
complex, parallel and interconnected with the solution of problems of the development of society.
Ensuring security is the creation of necessary and sufficient conditions for the state of security,
assurance, safety. Since any security is implemented through information security, then ensuring any
type of security (social, technological, energy, food) requires appropriate information security. And
vice versa, information security presupposes consideration of any security problem in a complex of
23
interrelated and interdependent problems, in the interconnection of all its information characteristics
and forms of implementation.
At the same time, information security, as well as its provision, are not self-sufficient and cannot
either exist separately from other problems of development and ensure the security of society, or be
implemented exclusively by information means, without the use of material and energy resources.
Thus, information security (IS) is an objective factor in the life and development of modern
society, its state and quality characteristics. Functionally, information security is provided by many
social, technological and production systems, but this is another research topic.
Information security and its provision are of particular importance in the information society, in
which all cognitive and socio-cultural phenomena have informational expression and presentation and
are implemented at the informational level.
As social and socio-cultural concepts ”security” and ”information security” and its provision are
general scientific and are studied in a variety of fundamental sciences and applied science systems:
philosophy, sociology, cultural studies, natural science, pedagogy, etc. Since this security is
informational, then its theoretical research and systematized description presupposes the use of
information methods, and its provision - of information means, that is, methods, knowledge and
means of informatics and social informatics are required.
Consequently, informatics and social informatics occupy a central place in the theoretical
substantiation of information security theory and in its practical implementation on the basis of their
universal means.
Protection of information and information sphere is as follows:
1. In the physical protection of materialized information, information resources and information
infrastructure by methods and forms of their preservation, the use of various software and
technological tools, means of cryptography, etc. This is the most widespread and time-
consuming form of information protection. It is necessary, but clearly insufficient, due only to
the relative reliability and efficiency.
2. Legal protection of information and the information sphere generated by it was formed along with
the corresponding legislative base of information law, as a result of informatization, its processes
and relations, requiring effective regulation and regulation. The presence of a legal system
generated by information law and its implementation is one of the main qualitative
characteristics of the modern information society. The legal system of informatization and,
accordingly, the information society is aimed at protecting copyright and intellectual property
and expresses other qualitative characteristics of the information society and develops along with
it. This means that all information resources must be documented and, as such, are subject to
legal protection.
In the information society, information is not only an intermediary in commodity-market relations,
but also is an independent commodity represented by information products.
3. The actual problem of modern society is the protection of information from its opposite - from
disinformation, which has a political science, commercial or anti-sociocultural orientation. Such
”information” can be a means of information warfare or a targeted negative informational and
psychological impact on its addressees. It is also protection from ”informational garbage” -
information of dubious quality, unreliable, expressing personal conceit, often openly harmful and
destructive. The clogging of the information environment is, on the one hand, a consequence of
the low level of culture, information culture of the authors of such ”information”, on the other
hand, it entails a decrease in the level of culture of the information environment and the personal
information culture of its direct consumers. Protection of information from misinformation, and
from ”information garbage” is also the protection of society, the environment, a person from
their negative impact. In general, this is exactly what it is focused on.
Protection from negative information and ”information waste” is difficult: it is not easy to
”separate the wheat from the chaff”. But it is necessary, since the information of the environment
must be analyzed, systematized, take the form of knowledge: ”any knowledge is information, but not
all information is knowledge" (emphasis added by the authors).
4. The most reliable form of information and information sphere protection is socioculture,
information culture corresponding to the information society, its development and reflection in
the personal information culture (information subculture) of the subjects of the considered sphere
24
”... information as an element of culture prevents dehumanization and replacement of spiritual
values” [19].
According to the authors, ”information culture characterizes the level of development of modern
society in its transformation into information. It should be manifested in every informational cognitive
process, in every informational interaction and relations expressing them. That is, it should be
reflected in every manifestation in education of the sociocultural and, therefore, sociocultural
systemic and informational approach” [23].
The culture of information and communication relations, first of all, respect for copyright and
other information rights, intellectual property rights, that is, compliance with the fundamental norms
of copyright protection, etc. It is also a rejection of hacking, spamming, viruses, software piracy. At
the same time, reciprocal steps of copyright holders and owners of information products are
necessary, expressed in the following:
taking into account the psychology and material capabilities of potential consumers of their
products;
a system of discounts and incentives for conscientious owners and consumers of information
products;
providing an opportunity for all real and potential violators of information security (hackers,
virus creators) to realize their creative abilities in the creative sphere, in informatization.
In the information and computer sphere, normal, mutually beneficial commodity-market relations
are needed. Mutual respect of owners and consumers of information products, as elements of
information culture, must be instilled in students starting from school.
An indispensable attribute of the modern information environment is the Internet. Based on the
technocratic approach of the definition of the ”World Wide Web”, this is no longer a computer and
communication network, and not a sphere of information and communication interaction, but a virtual
image of the entire life of society socio-economic, sociocultural, scientific and educational and other
spheres. The Internet sphere contains not only a variety of information resources. In a computer-
communication environment, implemented through the WWW, you can find out all the news of
interest and get any information about all aspects of public life - from political to everyday life. By its
scale and multifaceted structure, the Internet sphere, expressed by electronic and communication
technologies, is an electronic virtual space, or cyberspace.
Cyberspace is an abstract representation of an electronic virtual world, with a variable but always
ordered set of dimensions, which allows modeling and algorithmic paths in any possible direction.
Educational cyberspace is a specific part of the general cyberspace that has an educational purpose
and is characterized by purposeful educational relations with it. Consequently, internal relations, the
structure of educational cyberspace are derived: they are determined by the relations with it of
subjects of education in terms of their effectiveness, rationality, security [22].
In formal abstract terms, cyberspace is a relational model of the media environment, the features of
which are considered here as dimensions with open and expanding sets of values. Since each feature
of this model can be represented as an ordered sequence of other features, cyberspace is hierarchical,
and each of its dimensions can be deployed into cyberspace.
The conventionality of the relational representation of cyberspace lies in the fact that any of its
ordering is not a single, ”continuous” one that applies to all its objects. Therefore, in fact, cyberspace
in each of its states can be represented in many different relational models with finite sets of
conceptual features and their values, taken as spatial ”dimensions” and ”metrics” defined on them,
that is, the ordering of cyberspace is always local and therefore relative.
Chinese scientist Liu Gang [11] points out that the choice of any path and structure of any
subspace in cyberspace is based on a variety of logical assessments, taking into account such
modalities as ”necessary”, ”accidentally”, ”possible”, ”impossible”, their combination. That is,
interaction with cyberspace presupposes a qualitatively different logic that goes beyond the binary -
modal logic [2].
Due to its comprehensiveness, the Internet sphere contains information of varying quality: reliable
information presented in knowledge and information resources, and not very reliable, low-quality in
form and content. That is, the Internet sphere contains a lot of ”information waste”, from which it
must be freed. All positive, cognitive and sociocultural information and knowledge can drown in this
25
”garbage”, get lost. Users (consumers of goods, services, etc.) consent to the processing of personal
data. A certain regulation is required, the rules of relations in the sphere of the Internet, based on
ethical and moral norms of society, the implementation of which must be undertaken by each subject
entering this sphere. Therefore, the order of inclusion in it of the information of any of its active
systems must be determined.
Due to the rapid development of the Internet, there is a virtualization of the economy [16], which
consists ”in the revolutionary transition of society from traditional forms of business to electronic
business, ie. to conduct all economic transactions only through information telecommunication
networks” [20].
Among other things, the Internet sphere is a market, a network of Internet stores of various types
of commercial products. This type of trade is more convenient and cheaper for the buyer: he does not
need to go shopping, and the seller does not need to spend money on retail space and warehouses.
However, this type of trade is also less reliable: the relationship between the seller and the buyer is
only indirect, virtual. Therefore, various overlays are possible: there is no guarantee that the goods
ordered by the buyer meet his requirements, that the goods ordered by him will be delivered, there is
no guarantee for the guarantee (warranty period). This is an example of not entirely secure
information relations, virtually expressed in the Internet, not always successful implementations in the
real environment of virtual relations in the Internet sphere.
Banking and other financial transactions are not entirely safe in the Internet. It is necessary to use
secure payment systems, software implemented on the Internet. These examples are a consequence of
insufficiently high professional competence, as well as a manifestation of low socioculture and/or
information culture of a certain set of subjects of virtual relations, the moral foundations of which
allow outright deception and money-grubbing. In the virtual economy, ”we need completely different
forms of economic operations, a different style of thinking ..., a different form of interaction ..., a
radical retraining of personnel” [20].
However, as many sources and researchers point out, the main threat to information security in the
Internet is different. This is a ”leak” of personal data. By entering into any social, commercial and
other relations via the Internet, subjects register, indicating their personal data, which automatically
become part of the content of its sphere. In the event of bad faith of any link in the network or
malicious interference in its functioning (hacking), they become publicly available or are
”appropriated” by certain groups of people, which contradicts their confidentiality. It is necessary to
fight this by all means and forms of information protection to ensure the information security of the
individual. We share the opinion of I. V. Robert that the implementation of measures to ensure the
information security of an individual should ensure:
‒ human protection from unethical, illegal, aggressive information (propaganda of violence,
terrorism, suicide, violation of the norms and rules of human behavior in society; ”denigrating” a
person; involvement in prohibited Internet communities; extortion; intimidation);
- protection of a person from providing him with unreliable, illegitimate information, as well as
information that is ethically incorrect;
‒ the security of personal information, personal data, which determines the status of non-
interference in a person's private life;
‒ the protection of the individual from ”information violence” from the source of information
addressed to the ”dark side” of his personality [26]].
In pedagogy and, in particular, in teaching computer science and ICT, information security is
represented as follows:
‒ safety of information and educational space, educational process, interaction, relations;
‒ protection of subjects of education from negative information and psychological impact;
‒ safety of subjects of education in relation to technologization and virtualization of their thinking.
‒ formation of information culture of educational subjects, including their personal culture of
information security.
It is necessary to develop in each subject of education a critical attitude to information, which means
the following:
‒ the subject's invariant ability to assess and analyze information new to him for its objectivity and
reliability, ethical correctness, compliance with reality, socio-cultural and moral values;
26
‒ the ability to differentiate information from the environment for its value for their socially
determined personal development.
A personal information culture is needed that provides the subject with resistance to possible
negative information and psychological influences, counteraction to their implementation and
implementation in a personal and public environment.
The subject's critical attitude to information is an important component of personal information
culture, including his media culture and media security culture [28]. It is necessary to develop the
ability of the learning subject to assess information for its quality and reliability, which will allow him
to distinguish between positive and negative, meaningful and meaningless information.
The subject's critical attitude to information entails his ability for critical thinking, which is
understood as his intellectual and imaginative thinking in the process of acquiring his own
knowledge, including the search for ways to effectively and efficiently solve problems, analysis and
synthesis, assessment of network, media and own information, and its identification positive and
negative aspects, factors.
The formation and development of critical thinking of the subject of education provides for ”the
creation of a basic attitude towards oneself and the world, implying a variable, independent,
meaningful position. This position significantly increases the reliability of education - because it
becomes conscious and reflective and increases the communicative potential of the individual” [27].
That is, critical thinking is a synthesis of conscious and reflexive thinking of the subject of
education, which creates his ability to efficiently, efficiently and safely use the information coming to
him in the information environment, media environment, cyberspace in terms of his personal
development and self-development. At the same time, the ability to be critical of information and the
presence of critical thinking are derivatives. A level of information culture of the subject is needed,
which does not allow him to go beyond the ethical norms of relations in the environment. The internal
potential of the subject is required to ensure the elimination of the possible negative influence of
information from the external environment. It is necessary to develop the spiritual and intellectual
culture of the student, the formation of the corresponding qualitative characteristics of the personality.
An important aspect of computer culture is also the development of a culture of information and
computer security not on the basis of information and legal culture, subculture, ethics of relations in
the computer sphere. Much attention is paid to this issue in the section ”Computer Ethics” [17].
Among the topical problems of information and computer security, the following stand out in
particular:
‒ aspect of technization (technologization) of a person. Robot Syndrome;
‒ aspect of formalization of thinking;
‒ the consequences of the development of intelligent systems;
‒ aspect of virtualization of personal information environment;
‒ aspect of virtual values (in the perception of information);
‒ aspect of physical security of subjects.
In the 21st century, electronic intellectual means increasingly prevail over other means of
perception and knowledge of the world. However, cognition of the diversity of the world, culture,
knowledge presupposes the presence of the same variety of means of perception, sources of
information, participants in the information dialogue ”... virtual space becomes not only a form of
technology existence, but also a place of human social existence, which is represented by distributed,
multiple I” [14]. At the same time, the limitation of the activity-cognitive environment entails the
limitation of the cognizing personality itself. The withdrawal into the virtual world of reflected
(abstract) information entails the closure of a person in a limited space of illusions and
representations.
The study of the remote consequences of the introduction and development of intelligent systems
borders on fantasy. However, the following becomes clear: a spiritless robot that does not have a
direct connection with wildlife is potentially dangerous to humans. The man himself is no less
dangerous to be separated from nature. Problems of development and security of mankind should be
solved jointly and in parallel. Otherwise, instead of ”discerning the essence of technology”, present it
only as a tool and tool [5], thus moving away from the ”realization of the truth”, we risk falling into
the error that M. Heidegger warns about.
27
The technologization of the activity and cognition of the subject of education should in no case
lead to the technologization of his consciousness and thinking. The well-known Russian thinker
N. A. Berdyaev drew attention to the danger of the technization of society, speaking about the
increasing separation of man from nature, about the technization of the human world, manifested in
its dehumanization, in the loss of the moral and spiritual in the technical civilization created by
mankind [3]. Fetishization of information and computer technologies, the Internet is also harmful, as
is insufficient attention to the technologies of the IT industry. Formalization of thinking entails the
manifestation of the ”robot syndrome", which is no less dangerous than the invasion of real robots. In
the absence of ”live" communication with the world, a person's feelings are dulled; the spiritual world
is impoverished. Virtual values may become more important for him.
The physical expression of the subject's information security is, first of all, compliance with the
rules of work with information and computer technologies (ICT). Passion for working on a computer
should not be expressed in maximalism and fanaticism.
10. Conclusion
The results considered in the study lead to the following conclusions:
1. It has been established that the introduction of information technologies in educational
activities, the integration of pedagogical and computer technologies in education without linking with
information security significantly increases the risk of information threats, data protection,
information, etc.
2. The essence of the concepts ”information culture”, ”information security as a component of the
information culture of subjects of education” has been clarified, their content has been disclosed. For
example, the main goals of teaching information security to the general education system are
highlighted, which include the issues of ensuring the basics of information security, which is a
mandatory component of the information culture of the subject of learning.
3. Generalization of the research results allow us to draw the following conclusions:
‒ it is advisable to have a unified interpretation of key concepts and terms that are used in the field
of ensuring information security of an individual in general, and of subjects of education, in
particular;
‒ the formation of a person's personal qualities, ensuring his information security and comfortable
interaction with the information, educational and social environment, should take place in the
context of information law and the restriction of an individual's access to information that poses a
threat to his life;
‒ in order to ensure the information security of the subject of education, it is necessary: an
adequate reflection of the topics and problems of information security in the content of education
and subject training, including in the content of informatics and ICT teaching; it is necessary to
form a personal information culture and critical thinking of educational subjects as components
of the general information culture of an individual.Use a first level heading for the references.
References follow the acknowledgements.
Threats affecting the information security of educational subjects in the context of cyberspace and
e-learning are analyzed. The use of modern information and pedagogical technologies as a means of
ensuring information security of education in the network is substantiated.
It is shown that knowledge and culture are not only decisive for all other features of the information
society, but also mutually determining:
‒ the development and use of knowledge presupposes a culture of knowledge and a culture of
knowledge;
‒ information culture is systemic and has a representation as a high-level knowledge, develops and
is realized through knowledge.
The necessity of mandatory inclusion of topics in the content of information education in the
context of information security and information protection has been substantiated:
‒ he state and problems of information security, personal security;
‒ goals, objectives and means of ensuring information security;
‒ legal and other aspects of information protection, means of protecting electronic data;
28
‒ computer crimes and the fight against them.
11. Acknowledgements
The authors are grateful to the anonymous reviewers who read the article and made valuable
comments that allowed us to improve its quality.
The authors consider it necessary to give some comments on the remark of the reviewer that
”specific information technologies or the main components of information security, which were
practically applied by the authors in practice, are not presented”.
From the existing information security software and hardware, the authors use all technical means
and methods of information protection and information security that are freely available to the user, or
are presented for official use by educational institutions on the basis of a license agreement. The
authors also use the data and information protection services built into the OS of computers, tablets
and smartphones.
An example is open access software or software available under a license agreement:
‒ Norton Antivirus (protection, security, OS privacy program);
‒ ESETNOD32 (anti-virus program for protection against various cyber threats, blocks
unauthorized access);
‒ Panda Security (a service for protecting against malicious software and Internet threats, runs on
the Android OS);
‒ Kaspersky Anti-Virus (software against Internet threats);
‒ RoboForm (cross-platform password generator and manager for Windows, Mac, iOS);
‒ SefelnCloud (a password manager with cloud sync support and AES 256), etc.
Since the article also deals with personal information culture, the need to respect copyright and
intellectual property protection, we have no right to mark licensed software without legal regulation
of the mechanisms of their presentation, and even more so for practical use.
12. References
[1] M. M. Abdurazakov Interaction of subjects of education in the information and educational
environment: culture of knowledge, knowledge and information communication. Pedagogy.
2018. № 9. pp. 39-46.
[2] M. M. Abdurazakov, R. A-S. Aziyev, M. G. Muhidinov. The principles of constructing a
methodical system for teaching computer science in general educational school. Espacios. 2017,
V. 38, № 40. p. 2.
[3] N. A. Berdyaev Man and machine / N. A. Berdyaev // Questions of Philosophy. 1989. № 2.
[4] N. A. Bushmeleva, E. V. Razova Formation of competencies in the field of information security
in the system of higher pedagogical education // Scientific-methodical electronic journal
”Concept”. 2017, V. 2. pp. 537–544. URL: http://e-koncept.ru/2017/570106.htm.
[5] M. Heidegger The question of technology. Time and being (articles and speeches). Moscow :
Respublika, 1993. pp. 221–238
[6] O. A. Kozlov, L. A. Guzikova Information security as a condition for the activities of educational
organizations // Questions of teaching methods at the university. 2017. Vol. 6. № 22, pp. 43–50.
DOI: 10.18720/HUM/ISSN2227-8591.22.6
[7] Kopecky K. et al. The risks of Internet communication / K. Kopecky, R. Szotkowski, V. Krejci //
Procedia - Social and Behavioral Sciences. 2012. Vol. 69. B.1348-1357.
[8] Kwan G. C. E. et al. Facebook bullying: An extension of battles in school / G. C. E. Kwan,
M. M. Skoric // Computers in human behavior. 2013. Vol. 29. P. 16-25.
[9] Livingstone S. et al. Risky experience for children online: charting European research on
children and the Internet / S. Livingstone, L. Haddon // Children and society. 2008. Vol. 22. P.
314-323.
[10] Livingstone S. et al. Annual research review: harms experienced by child users of online and
mobile technologies: the nature, prevalence and management of sexual and aggressive risks in
29
the digital age / S. Livingstone, P. Smith // Journal of child psychology and psychiatry. 2014.
Vol.55. № 6. Р. 635-654.
[11] Liu Gan. Philosophy of information and the foundations of the future Chinese philosophy of
science and technology. Questions of Philosophy. 2007, № 5, pp. 45-57.
[12] V. P. Polyakov Aspects of information security of information training in the system of higher
professional education. Global scientific potential. № 4 (13), 2012. pp. 39 - 44
[13] E. V. Volkova Space of knowledge and the modern educational space. // World of Psychology.
2012. № 4, pp. 179-185. URL: http://elibrary.ru/item.asp?id=18484629
[14] D. A. Ustyuzhanina. The dual nature of new media in the online space // Bulletin of Perm
University. Philosophy. Psychology. Sociology. 2019. Issue 2. pp. 204-218. DOI:
https://doi.org/10.17072/2078-7898/2019-2-204-218
[15] Y. Benkler The Wealth of Networks: How Social Production Transforms Markets and Freedom.
New Haven, London: Yale University Press, 2006. 515 p.
[16] B. Gates Business at the Speed of Thought. Moscow : Eksmo-Press, 2001, 408 p.
[17] D. Johnson. Computer Ethics. Prentice-Hall Series Occupational Ethics. Prentice-Hall, Inc.
Engleword Clifs, N. J., 1995.
[18] K. K. Kolin Social Informatics Today and Tomorrow. Institute of Informatics Problems RAS.
Moscow. 2006.
[19] K. K. Kolin Culture as an object of information security / Synergetics, philosophy, culture:
collection of scientific papers. Moscow : Publishing house of RAGS, 2001, pp. 146- 167.
[20] K. K. Kolin, A. D. Ursul Information and culture. Introduction to Information Cultural Studies.
Moscow : Publishing house ”Strategic priorities”, 2015, 300 p.
[21] Yu. G. Korotenkov, A. Yu. Lazebnikova Informatization of education as a social process:
monograph. Moscow : ISMO RAO, 2010. 60 p.
[22] M. M. Abdurazakov, Yu. G. Korotenkov, M. G. Muhidinov. Educational space representation in
cyberspace. // SHS Web of Conferences. 2016. Т. 29. С. 01001. DOI:
http://dx.doi.org/10.1051/shsconf/20162901001
[23] H. Dzamyhov, M. M. Nimatulaev, P. Yu. Romanov. Aspects of methodology of pedagogics in an
informational society. // SHS Web of Conferences. 2016. Т. 29. С. 01001. DOI:
10.1051/shsconf/20162901020
[24] Livingstone S. et al. Theoretical framework for children's internet use / S. Livingstone, L.
Haddon // Children, risk and safety on the Internet: research and policy challenges in
comparative perspective / Eds. by S. Livingstone, L. Haddon, and A. Görzig. Bristol: The Policy
Press, 2012. pp. 1-12.
[25] Livingstone S. et al. With members of the EU kids online network. EU kids online
/ S. Livingstone, L. Haddon, A. Görzing, K. Olafsson. London, Final report, September, 2011.
54 p.
[26] I. V. Robert Personal information security. // Proceedings of the International Symposium
”Reliability and Quality”, 2018. V. 1. pp. 68-71.
[27] O. Zagashev New pedagogical technologies in the school library: educational technology for the
development of critical thinking by means of reading and writing. Electronic resource:
https://lib.1sept.ru/2004/17/15.htm. Access 10.09.2020
[28] V. Zhilavskaya Media education as a factor contributing to the self-actualization of an individual
in an information society. Text of the report at the 24th meeting of the seminar ”Methodological
problems of information sciences” (Moscow, INION RAS, January 28, 2016).
http://inion.ru/files/File/MPNI_24_Zhilavskaya_I_V_Doklad.pdf.
[29] Decree of the President of the Russian Federation dated 09.05.2017 No. 203 ”On the Strategy for
the Development of the Information Society in the Russian Federation for 2017 – 2030” //
Collected legislation Russian Federations. 2017. № 20, Art. 290.
[30] The doctrine of information security of the Russian Federation, approved by the Decree of the
President of the Russian Federation of December 5, 2016 № 646.
[31] OECD Guidelines for the Security of Information Systems and Networks: Towards a Culture of
Security. http://www.ftc.gov/bcp/conline/edcams/infosecurity/popups/OECD_guidelines.pdf.
[32] UNESCO Policy Recommendations for Mobile Learning. (2019).
https://iite.unesco.org/pics/publications/ru/files/3214738.pdf
30
[33] Commission Communication of 20 December 2007 entitled ”A European approach to media
literacy in the digital environment” (COM(2007)0833). [Electronic resource]. https://eur-
lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A52007DC0833
[34] Computing and Law. [Electronic resource]. URL: http://www.herts.ac.uk/courses/law-and-
computing (date of the application: 05.10.2020).
[35] Cyber Law Research Unit. [Electronic resource]. URL :
http://www.law.leeds.ac.uk/research/inter-national-governance/cyber-law-research-unit/ (date of
the application: 05.10.2020).
[36] Défense et sécurité des systèmes d’information: le Gouvernement annonce un renforcement du
dispositif français. [Electronic resource]. URL:
http://www.ssi.gouv.fr/fr/anssi/publications/communiques-de-presse/defense-et-securite-des-
systemes-d-information-le-gouvernement-annonce-un.html. (date of the application: 05.10.2020).
[37] Done right, internet use can increase learning and skills. 18th February 2020. [Electronic
resource]. http://globalkidsonline.net/synthesis-report-2019/ (date of the application:
05.10.2020).
[38] European Parliament resolution of 16 December 2008 on media literacy in a digital world
(2008/2129(INI)). [Electronic resource].
http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//TEXT+TA+P6-TA-2008-
0598+0+DOC+XML+V0//EN
[39] La perception par les parents des risques encourus par leurs enfants sur Internet: [Электронный
ресурс] // IPSOS. URL: http://www.social-sante.gouv.fr/espaces,770/famille,774/publications-
et-textes-officiels,893/sondages-etenquetes-sur-la,740/la-perception-par-les-parents-
des,7411.html (date of the application: 05.10.2020).
[40] Master SecMan - Security Management. [Electronic resource]. URL: http://fbwcms.fh-branden-
burg.de/de/5185 (data obrascheniya: 22.07.2014).
[41] Sorporate and IT Security. [Electronic resource]. URL: http://mi.hs-
offenburg.de/studium/bachelor-studiengaenge/unternehmens-und-it-sicherheit/ (date of the
application: 05.10.2020)
31