<?xml version='1.0' encoding='utf-8'?>
<article xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.2" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">kaspy</journal-id><journal-title-group><journal-title xml:lang="ru">THE CASPIAN REGION: politics, economics, culture</journal-title></journal-title-group><issn publication-format="electronic" /><issn publication-format="print">1818-510X</issn><publisher><publisher-name xml:lang="ru">Астраханский государственный университет им. В. Н. Татищева</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">1281</article-id><title-group xml:lang="ru"><article-title>Foreign experience of development of information sovereignty</article-title></title-group><title-group xml:lang="en"><article-title>Foreign experience of development of information sovereignty</article-title></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Penkina</surname><given-names>Valentina A.</given-names></name><name xml:lang="en"><surname>Penkina</surname><given-names>Valentina A.</given-names></name></name-alternatives><email>vapenkina@mail.ru</email><xref ref-type="aff" rid="aff2215" /></contrib></contrib-group><aff-alternatives id="aff2215"><aff><institution xml:lang="ru">Russian Presidential Academy of National Economy and Public Administration</institution></aff><aff><institution xml:lang="en">Russian Presidential Academy of National Economy and Public Administration</institution></aff></aff-alternatives><pub-date date-type="pub"><year>2015</year></pub-date><issue>3</issue><fpage>124</fpage><lpage>128</lpage><history /><self-uri xlink:href="https://kaspy.asu-edu.ru/en/archive/2015/issue/3/article/1281">https://kaspy.asu-edu.ru/en/archive/2015/issue/3/article/1281</self-uri><self-uri xlink:href="https://kaspy.asu-edu.ru/storage/kaspy/archive/3(44)/124-128.pdf" content-type="pdf">https://kaspy.asu-edu.ru/storage/kaspy/archive/3(44)/124-128.pdf</self-uri><abstract xml:lang="ru"><p>The practice of protection of information of sovereignty in the USA, China and some Muslim countries, as a form of combating destructive influence on political and religious grounds, the characteristics and priorities of the information security aspects allocated two strategies of protection of information of sovereignty, which can be called as В«offensiveВ» and В«defensiveВ». Offensive strategy is used for information warfare to achieve and consolidate their political dominance (primarily the United States and the instruments of U.S. information policy - the current leadership of Ukraine, the Baltic States), offensive tactics also adhere to a terrorist organization (the ISIS, al-Qaeda). В«DefensiveВ» tactic is to reform the legislation in the sphere of protection of information sovereignty. The conclusion is made about the optimal combination of the first and second methods, based not on confrontation but to use soft power to stop information warfare, stabilization and structural information globalization.</p></abstract><abstract xml:lang="en"><p>The practice of protection of information of sovereignty in the USA, China and some Muslim countries, as a form of combating destructive influence on political and religious grounds, the characteristics and priorities of the information security aspects allocated two strategies of protection of information of sovereignty, which can be called as В«offensiveВ» and В«defensiveВ». Offensive strategy is used for information warfare to achieve and consolidate their political dominance (primarily the United States and the instruments of U.S. information policy - the current leadership of Ukraine, the Baltic States), offensive tactics also adhere to a terrorist organization (the ISIS, al-Qaeda). В«DefensiveВ» tactic is to reform the legislation in the sphere of protection of information sovereignty. The conclusion is made about the optimal combination of the first and second methods, based not on confrontation but to use soft power to stop information warfare, stabilization and structural information globalization.</p></abstract><kwd-group xml:lang="ru"><kwd>информационный суверенитет</kwd><kwd>глобализация</kwd><kwd>информационная безопасность</kwd><kwd>information sovereignty</kwd><kwd>globalization</kwd><kwd>information security</kwd></kwd-group><kwd-group xml:lang="en"><kwd>информационный суверенитет</kwd><kwd>глобализация</kwd><kwd>информационная безопасность</kwd><kwd>information sovereignty</kwd><kwd>globalization</kwd><kwd>information security</kwd></kwd-group><funding-group xml:lang="ru"><funding-statement /></funding-group><funding-group xml:lang="en"><funding-statement /></funding-group></article-meta></front><body /><back><ref-list /></back></article>