The article discusses the key trends shaping the international regime on information security. International cooperation in this area at the global level encounters contradictions of state interest. The main actors of the information security are the United States, Russia, China and the EU countries (Britain, France and Germany). The main contradiction is developing between the US on one side and Russia and China on the other. EU countries occupy the middle position, gravitating to that of US. The article proves that international cooperation on information security will re ect the overall logic of the development of international cooperation, which is characterized by a new model of cooperation, with the participa- tion of state and non-state actors, known as multi-stakeholder partnerships and multi-level cooperation. The logic of the formation of an international regime on information security is closest to the logic of the formation of the international non-proliferation regime. It is in the interest of Russia to support the trend towards regionalization of information security regime. Russia can form a regional information security regime in the former Soviet Union on the basis of the CSTO and SCO and potentially on a wider Eurasian space. Such regional regime would give Russia an opportunity to shape the international regime and closely monitor emerging information security issues in the former Soviet Union, and remove the potential threat of "color revolutions".
Key words: information security, trends, international regime regionalization.
References
1. Bedritskiy A.V. Mezhdunarodnye dogovorennosti po kiberprostranstvu: vozmozhen li konsensus? [Inter- national agreement on cyberspace: Is consensus possible?] Problems of National Strategy. 2012. No4. Pp 119-136. URL: http://www.riss.ru/images/pdf/journal/2012/4/10_.pdf (accessed 22.08.2016) (In Russian).
2. Bolgov R.V. Informatsionnye tekhnologii v sovremennykh vooruzhennykh kon iktakh i voennykh strate- giiakh [Information technology in contemporary armed con icts and military strategies]. Diss. ... A scienti c degree of candidate of political sciences. St. Petersburg: St. Petersburg State University, 2011. (In Russian).
3. Demidov O.V. Obespechenie mezhdunarodnoi informatsionnoi bezopasnosti i rossiiskie natsional'nye in- teresy [Ensuring international information security and national interests of Russia]. Security Index. 2013. No 1. Pp. 129-168. URL: http://www.pircenter.org/media/content/ les/10/13559089230.pdf (accessed 22.08.2016) (In Russian).
4. Korotkov A.V., Zinovieva E.S. Bezopasnost kriticheskih informatsionnih infrastruktur v megdunarodnom gumanitarnom praven [Security of Сritical Information Infrastructures in the International Humanitarian Law] Vesnik MGIMO-Universitets, 2011. No 4.
5. Ibragimov G. Strategiia KNR v oblasti upravleniia Internetom i informatsionnoi bezopasnosti [China Strategy for Internet governance and information security] Security Index. 2013. No 1. 169-184. URL: http://www. pircenter.org/media/content/ les/10/13559074100.pdf (tested 22.08.2016 city) (In Russian).
6. Kurbalia J. Upravlenie Internetom [Internet governance]. Moscow: Coordination Center for TLD RU, 2010. (In Russian).
7. Fedorov A.V. Informatsionnaia bezopasnost' v mirovom politicheskom protsesse [Information security in global political process]. Moscow: MGIMO 2006. (In Russian).
8. Busch M.L. Overlapping institutions, forum shopping, and dispute settlement in international trade. Inter- national Organization. 2007. Vol. 61. No. 04. P. 735-76. DOI: http://dx.doi.org/10.1017/S0020818307070257
9. Giles K., Hagestad W. Divided by a common language: cyber de nitions in Chinese, Russian and English. Cyber Con ict (CyCon), 2013 5th International Conference on IEEE, 2013. Pp. 1-17.
10. Haas P. Epistemic Communities and International-Policy Coordination – Introduction. International Organization. 1992. Vol. 46, no. 1. Pp. 1-35.
11. Lessig L. Code and other laws of cyberspace. NY: Basic books, 1999.
12. Lieberthal K., Singer P. Cybersecurity and U.S. - China Relations. Jonh L. Torton China Institute in Brookings, 2012. URL: https://www.brookings.edu/wp-content/uploads/2016/06/0223_cybersecurity_china_us_li-
eberthal_singer_pdf_english.pdf (accessed 22.08.2016)
13. Rauscher K., Korotkov A. Working towards rules for governing cyber con ict. Rendering Geneva and Hague conventions in cyberspace. East-West institute. 2011. URL: https: //www.eastwest.ngo/idea/towards-rules-
governing-cyber-con ict-0 (accessed 22.08.2016)
14. Tallinn Manual on the International Law Applicable to Cyber Warfare. ed. by M .Schmitt. N.Y .: Cambridge University Press, 2013.