首页 > 最新文献

Information Security of the Person, Society and State最新文献

英文 中文
Cybersecurity in the EU and Member States: Genesis and Issues of its Enhancing 欧盟及其成员国的网络安全:起源及其加强问题
Pub Date : 1900-01-01 DOI: 10.51369/2707-7276-2019-3-6
V. Boiko, M. Vasylenko, Serhii Kukharenko
The article deals with the issues of establishing cybersecurity in the EU and its member-states at the legislative level as viewed from the point of a systematic approach. The authors identified problematic aspects of improving cybersecurity quality and conditions. They analyzed the impact of the EU member states legislation on cy-bersecurity. The article as well considers the process of ICT development and pre-sents the ways of creating new challenges by means of new technologies. Key words: cybersecurity, cyber resilience, regulatory instruments, EU legislation, innovations.
本文从系统的角度探讨了欧盟及其成员国在立法层面建立网络安全的问题。作者指出了改善网络安全质量和条件的问题。他们分析了欧盟成员国对网络安全立法的影响。文章还对信息通信技术的发展过程进行了思考,提出了利用新技术创造新挑战的途径。关键词:网络安全,网络弹性,监管工具,欧盟立法,创新
{"title":"Cybersecurity in the EU and Member States: Genesis and Issues of its Enhancing","authors":"V. Boiko, M. Vasylenko, Serhii Kukharenko","doi":"10.51369/2707-7276-2019-3-6","DOIUrl":"https://doi.org/10.51369/2707-7276-2019-3-6","url":null,"abstract":"The article deals with the issues of establishing cybersecurity in the EU and its member-states at the legislative level as viewed from the point of a systematic approach. The authors identified problematic aspects of improving cybersecurity quality and conditions. They analyzed the impact of the EU member states legislation on cy-bersecurity. The article as well considers the process of ICT development and pre-sents the ways of creating new challenges by means of new technologies. \u0000Key words: cybersecurity, cyber resilience, regulatory instruments, EU legislation, innovations.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132960653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Gender Threats as an Element of the Destabilization of the Activities of the Verkhovna Rada of Ukraine 混合性别威胁是破坏乌克兰最高拉达活动稳定的一个因素
Pub Date : 1900-01-01 DOI: 10.51369/2707-7276-2019-2-13
Vladyslav Iierusalymov
Hybrid gender threats are used as an element to weaken the Ukrainian society in the country, to split it and to complicate its integration into NATO and the EU significantly. The toolkit for this type of threat is the destabilization of parliament activities, especially in terms of the implementation of its legislative function due to blocking the passage of bills, as well as the removal of «gender terminology» with a view to further manipulation in the field of equal rights and opportunities.Key words: gender, European integration, legislative activity, abortion right, domestic violence.
混合性别威胁被用作削弱乌克兰社会的一个因素,分裂它,并使其融入北约和欧盟变得更加复杂。这类威胁的手段是破坏议会活动的稳定,特别是阻挠法案的通过,破坏其立法职能的执行,以及取消“性别术语”,以便在平等权利和机会领域进一步操纵。关键词:性别,欧洲一体化,立法活动,堕胎权,家庭暴力
{"title":"Hybrid Gender Threats as an Element of the Destabilization of the Activities of the Verkhovna Rada of Ukraine","authors":"Vladyslav Iierusalymov","doi":"10.51369/2707-7276-2019-2-13","DOIUrl":"https://doi.org/10.51369/2707-7276-2019-2-13","url":null,"abstract":"Hybrid gender threats are used as an element to weaken the Ukrainian society in the country, to split it and to complicate its integration into NATO and the EU significantly. The toolkit for this type of threat is the destabilization of parliament activities, especially in terms of the implementation of its legislative function due to blocking the passage of bills, as well as the removal of «gender terminology» with a view to further manipulation in the field of equal rights and opportunities.\u0000Key words: gender, European integration, legislative activity, abortion right, domestic violence.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128817417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Problem Aspects of Legal Regulation of Public-Private Partnership in the Field of Critical Infrastructure Protection 关键基础设施保护领域公私伙伴关系法律规制的若干问题
Pub Date : 1900-01-01 DOI: 10.51369/2707-7276-2019-2-5
O. Yermenchuk, Maksym Palchyk
This article provides systematic international experience of legal regulation of critical infrastructure protection in foreign jurisdictions. Some aspects of national critical infrastructure security systems of such as countries Germany, Spain, USA, and Denmark are described. The article determines that at national levels in different countries critical infrastructure protection is mainly regulated by national security strategies, defense strategies and other basic regulatory acts related to the functioning of critical infrastructure and its protection. The article considers aspects of legal regulation of relations in the sphere of public-private partnership and critical infrastructure protection in modern Ukraine. According to the results of the research, it has been established that in Ukraine there are documents of strategic character that regulate the implementation of public-private partnership, which should become a mutually beneficial factor that will facilitate mutual integration processes. Main directions for developing public-private partnership in the field of critical infrastructure protection in Ukraine have been suggested.Key words: public-private partnership, legal regulation, critical infrastructure, critical infrastructure protection, international experience.
本文提供了国外司法管辖区关键基础设施保护法律规制的系统国际经验。介绍了德国、西班牙、美国和丹麦等国家关键基础设施安全系统的一些方面。文章确定,在不同国家的国家层面上,关键基础设施的保护主要由国家安全战略、国防战略和其他与关键基础设施的运行及其保护相关的基本监管法案来规范。本文考虑了现代乌克兰公私伙伴关系和关键基础设施保护领域关系的法律规制方面。根据研究结果,已经确定,在乌克兰有一些具有战略性质的文件,这些文件规定了公私伙伴关系的实施,这应该成为促进相互一体化进程的互利因素。提出了在乌克兰关键基础设施保护领域发展公私伙伴关系的主要方向。关键词:公私合作,法律规制,关键基础设施,关键基础设施保护,国际经验
{"title":"Problem Aspects of Legal Regulation of Public-Private Partnership in the Field of Critical Infrastructure Protection","authors":"O. Yermenchuk, Maksym Palchyk","doi":"10.51369/2707-7276-2019-2-5","DOIUrl":"https://doi.org/10.51369/2707-7276-2019-2-5","url":null,"abstract":"This article provides systematic international experience of legal regulation of critical infrastructure protection in foreign jurisdictions. Some aspects of national critical infrastructure security systems of such as countries Germany, Spain, USA, and Denmark are described. The article determines that at national levels in different countries critical infrastructure protection is mainly regulated by national security strategies, defense strategies and other basic regulatory acts related to the functioning of critical infrastructure and its protection. \u0000The article considers aspects of legal regulation of relations in the sphere of public-private partnership and critical infrastructure protection in modern Ukraine. According to the results of the research, it has been established that in Ukraine there are documents of strategic character that regulate the implementation of public-private partnership, which should become a mutually beneficial factor that will facilitate mutual integration processes. Main directions for developing public-private partnership in the field of critical infrastructure protection in Ukraine have been suggested.\u0000Key words: public-private partnership, legal regulation, critical infrastructure, critical infrastructure protection, international experience.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134216328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Issues of Legal and Expert Support of Law Enforcement Activities in the Field of Cybercrime Counteraction 反网络犯罪领域执法活动的法律和专家支持问题
Pub Date : 1900-01-01 DOI: 10.51369/2707-7276-2019-3-1
B. Leonov, Valerii Serohin
The article is devoted to the analysis of the problems of legal and expert support of law enforcement activities in the field of cybercrime counteraction. The article deals with the issues of criminal and legal protection of information security in the context of the implementation of inter-national treaties into the field of national legislation. The authors both analyzed legislation in the field of cybersecurity provision; the modern doctrine devoted to its interpretation and made some suggestions for its improvement.Key words: cybersecurity, cybercrime, computer crime, harmful software, special software for secretly obtaining information.
本文致力于分析网络犯罪领域执法活动的法律和专家支持问题。该条款涉及在国家立法领域实施国际条约的背景下对信息安全的刑事和法律保护问题。作者分析了网络安全规定领域的立法;现代学说对其进行了解释,并提出了一些改进建议。关键词:网络安全,网络犯罪,计算机犯罪,有害软件,秘密获取信息专用软件
{"title":"Issues of Legal and Expert Support of Law Enforcement Activities in the Field of Cybercrime Counteraction","authors":"B. Leonov, Valerii Serohin","doi":"10.51369/2707-7276-2019-3-1","DOIUrl":"https://doi.org/10.51369/2707-7276-2019-3-1","url":null,"abstract":"The article is devoted to the analysis of the problems of legal and expert support of law enforcement activities in the field of cybercrime counteraction. The article deals with the issues of criminal and legal protection of information security in the context of the implementation of inter-national treaties into the field of national legislation. The authors both analyzed legislation in the field of cybersecurity provision; the modern doctrine devoted to its interpretation and made some suggestions for its improvement.\u0000Key words: cybersecurity, cybercrime, computer crime, harmful software, special software for secretly obtaining information.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115857367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social-Psychological Analysis of Terrorism as an Extreme Form of Extremism 恐怖主义作为极端主义的一种极端形式的社会心理分析
Pub Date : 1900-01-01 DOI: 10.51369/2707-7276-2019-3-3
V. Ostroukhov, M. Prysiazhniuk, Mykola Prohoniuk
The article deals with social, economic and psychological sources of terrorism and the reasons of its existence. The authors disclose specific features of ter-ro¬rists’ behavior as a marginal form of terro¬rism.Key words: terrorism, extremism, fanati¬cism, characteristics of terrorists’ behavior.
本文论述了恐怖主义的社会、经济和心理根源及其存在的原因。作者揭示了作为一种边缘恐怖主义形式的恐怖主义行为的具体特征。关键词:恐怖主义、极端主义、狂热主义、恐怖分子行为特征
{"title":"Social-Psychological Analysis of Terrorism as an Extreme Form of Extremism","authors":"V. Ostroukhov, M. Prysiazhniuk, Mykola Prohoniuk","doi":"10.51369/2707-7276-2019-3-3","DOIUrl":"https://doi.org/10.51369/2707-7276-2019-3-3","url":null,"abstract":"The article deals with social, economic and psychological sources of terrorism and the reasons of its existence. The authors disclose specific features of ter-ro¬rists’ behavior as a marginal form of terro¬rism.\u0000Key words: terrorism, extremism, fanati¬cism, characteristics of terrorists’ behavior.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132034542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
International Practices of Countering the Unlawful Interference with the State Digital Information Resources 打击非法干扰国家数字信息资源的国际实践
Pub Date : 1900-01-01 DOI: 10.51369/2707-7276-2019-2-2
S. Petrov
The article deals with international practices of counteracting the unlawful interference with the state digital information resources. Conclusions are formulated on applying international practices for the development of cyber defense and cyber security systems in Ukraine, improvement of law enforcement agencies powers in investigating cases of the unlawful interference with the state digital information resources.Key words: information, resources, state information resources, state digital information resources.
本文论述了国际上打击非法干扰国家数字信息资源的做法。就应用国际惯例在乌克兰发展网络防御和网络安全系统、加强执法机构调查非法干扰国家数字信息资源案件的权力等问题制定了结论。关键词:信息,资源,国家信息资源,国家数字信息资源。
{"title":"International Practices of Countering the Unlawful Interference with the State Digital Information Resources","authors":"S. Petrov","doi":"10.51369/2707-7276-2019-2-2","DOIUrl":"https://doi.org/10.51369/2707-7276-2019-2-2","url":null,"abstract":"The article deals with international practices of counteracting the unlawful interference with the state digital information resources. Conclusions are formulated on applying international practices for the development of cyber defense and cyber security systems in Ukraine, improvement of law enforcement agencies powers in investigating cases of the unlawful interference with the state digital information resources.\u0000Key words: information, resources, state information resources, state digital information resources.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"16 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116645056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gender Perspectives of the Information Security 信息安全的性别视角
Pub Date : 1900-01-01 DOI: 10.51369/2707-7276-2019-2-14
Larysa Kompantseva
The article defines the conceptual apparatus of the metalanguage of gender studies in the field of information security and solves a number of problems, in particular: the history of gender studies examined through the prism of the society’s information organization; proposes the definition of a number of gender concepts relevant to information security; substantiates gender perception characteristic of security and defense sector institutions as an important condition for ensuring information security. Gender studies is considered asa broad scientific field, a research practice in which new opportunities are realized related to the use of a gender approach to the analysis of power interdependencies and hierarchies, power structures, their subordination and domination. The emphasis is placed upon the fact that gender paradigm mainstreaming responds to one of the most important trends of the 21st century – ensuring tolerant attitudes towards different styles of scientific thinking, providing for understanding of interdisciplinary relations as a trans paradigm phenomenon (the coexistence of several scientific paradigms that determine methodological pluralism in the course of research, the activities conducted at the intersection of sciences, involving the use of methods and comparison of the results of two or more branches of scientific knowledge) and methods of meta paradigm phenomenon (the creation of an all-encompassing, unifying doctrine capable of replacing the confrontation of scientific fields with their synthesis)The theory of gender studies has led to the emergence of a new philosophical and communicative paradigm of security and defense institutions focused on gender sensitivity, that is meeting specific needs of diverse groups of men and women, boys and girls in the field of security and justice, and promotes the full and equal participation of women and men in this activity. Key words: gender communication, gender sensitivity, gender studies, gender prospective.
本文定义了信息安全领域性别研究元语言的概念结构,并解决了一些问题,特别是:通过社会信息组织的棱镜来审视性别研究的历史;建议界定若干与资讯保安有关的性别概念;证实了安全和国防部门机构的性别感知特征是确保信息安全的重要条件。性别研究被认为是一个广泛的科学领域,它是一种研究实践,在这种研究实践中,利用性别方法来分析权力的相互依赖和等级、权力结构、权力结构的从属和支配,从而实现了新的机会。重点在于,性别范式主流化回应了21世纪最重要的趋势之一——确保对不同科学思维风格的宽容态度,提供对跨学科关系作为跨范式现象的理解(在研究过程中决定方法论多元化的几种科学范式的共存,在科学交叉领域进行的活动,(涉及使用方法和比较两种或两种以上科学知识分支的结果)和元范式现象的方法(创造一种包罗万象的、统一的学说,能够用它们的综合取代科学领域的对抗)。性别研究理论导致安全和国防机构出现了一种新的哲学和交流范式,侧重于性别敏感性,这就是满足男女、男童和女童等不同群体在安全和司法领域的具体需要,并促进妇女和男子充分和平等地参与这一活动。关键词:性别交流;性别敏感;性别研究;
{"title":"Gender Perspectives of the Information Security","authors":"Larysa Kompantseva","doi":"10.51369/2707-7276-2019-2-14","DOIUrl":"https://doi.org/10.51369/2707-7276-2019-2-14","url":null,"abstract":"The article defines the conceptual apparatus of the metalanguage of gender studies in the field of information security and solves a number of problems, in particular: the history of gender studies examined through the prism of the society’s information organization; proposes the definition of a number of gender concepts relevant to information security; substantiates gender perception characteristic of security and defense sector institutions as an important condition for ensuring information security. \u0000Gender studies is considered as\u0000a broad scientific field, a research practice in which new opportunities are realized related to the use of a gender approach to the analysis of power interdependencies and hierarchies, power structures, their subordination and domination. \u0000The emphasis is placed upon the fact that gender paradigm mainstreaming responds to one of the most important trends of the 21st century – ensuring tolerant attitudes towards different styles of scientific thinking, providing for understanding of interdisciplinary relations as a trans paradigm phenomenon (the coexistence of several scientific paradigms that determine methodological pluralism in the course of research, the activities conducted at the intersection of sciences, involving the use of methods and comparison of the results of two or more branches of scientific knowledge) and methods of meta paradigm phenomenon (the creation of an all-encompassing, unifying doctrine capable of replacing the confrontation of scientific fields with their synthesis)\u0000The theory of gender studies has led to the emergence of a new philosophical and communicative paradigm of security and defense institutions focused on gender sensitivity, that is meeting specific needs of diverse groups of men and women, boys and girls in the field of security and justice, and promotes the full and equal participation of women and men in this activity. \u0000Key words: gender communication, gender sensitivity, gender studies, gender prospective.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121857592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information and Psychological Aspects of Terrorism in the Context of the Security Philosophy 安全哲学背景下恐怖主义的信息和心理方面
Pub Date : 1900-01-01 DOI: 10.51369/2707-7276-2019-2-8
V. Ostroukhov, M. Prysiazhniuk
The article the considers the roots of terrorism, as well as the evolution and nature of this phenomenon. The peculiar features of modern terrorism and its informational and psychological aspects in the context of security philosophy are studied.Key words: threats, terror, terrorism, information and psychological aspects of terrorism, security.
本文探讨了恐怖主义的根源,以及这一现象的演变和本质。在安全哲学的背景下,研究了现代恐怖主义的特点及其信息和心理方面。关键词:威胁、恐怖、恐怖主义、信息与恐怖心理、安全。
{"title":"Information and Psychological Aspects of Terrorism in the Context of the Security Philosophy","authors":"V. Ostroukhov, M. Prysiazhniuk","doi":"10.51369/2707-7276-2019-2-8","DOIUrl":"https://doi.org/10.51369/2707-7276-2019-2-8","url":null,"abstract":"The article the considers the roots of terrorism, as well as the evolution and nature of this phenomenon. The peculiar features of modern terrorism and its informational and psychological aspects in the context of security philosophy are studied.\u0000Key words: threats, terror, terrorism, information and psychological aspects of terrorism, security.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123764639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correlation between Ensuring Information Security in the Banking System of Ukraine and National Critical Infrastructure Security 确保乌克兰银行系统信息安全与国家关键基础设施安全的关系
Pub Date : 1900-01-01 DOI: 10.51369/2707-7276-2019-2-6
Yurii Ivanov
The article studies modern aspects of information security in the banking system in relation to the security of the critical infrastructure of the state. It is noted that in the conditions of hybrid war, when various means are used against our state that can harm the vital economic objects or the economy of the state as a whole. Banking system of Ukraine, in particular its information resources, is the first to be under the attack. That is why information security of the banking system should be in the focus of attention while developing the steps to critical infrastructure security.Key words: banking system of Ukraine, information security, critical infrastructure security.
本文从国家关键基础设施安全的角度研究了银行系统信息安全的现代方面。值得注意的是,在混合战争的条件下,当各种手段被用来对付我们的国家时,可能会损害重要的经济目标或整个国家的经济。乌克兰的银行系统,特别是其信息资源,是第一个受到攻击的。这就是为什么在制定关键基础设施安全措施的同时,银行系统的信息安全应该成为关注的焦点。关键词:乌克兰银行系统,信息安全,关键基础设施安全。
{"title":"Correlation between Ensuring Information Security in the Banking System of Ukraine and National Critical Infrastructure Security","authors":"Yurii Ivanov","doi":"10.51369/2707-7276-2019-2-6","DOIUrl":"https://doi.org/10.51369/2707-7276-2019-2-6","url":null,"abstract":"The article studies modern aspects of information security in the banking system in relation to the security of the critical infrastructure of the state. It is noted that in the conditions of hybrid war, when various means are used against our state that can harm the vital economic objects or the economy of the state as a whole. Banking system of Ukraine, in particular its information resources, is the first to be under the attack. That is why information security of the banking system should be in the focus of attention while developing the steps to critical infrastructure security.\u0000Key words: banking system of Ukraine, information security, critical infrastructure security.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123999752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
System of Anti-terrorism Actors, their Legal-Administrative Status 反恐怖行为主体制度及其法律行政地位
Pub Date : 1900-01-01 DOI: 10.51369/2707-7276-2019-2-7
V. Krutov, Valentyna Fornolyak
The article states that one of the most important problems in Ukraine in current conditions is the fight against terrorism. Counterterrorism actors are involved in countering this extremely dangerous phenomenon. The system of counterterrorism actors is a set of entities defined at the level of legislation that interact with each other in order to prevent, detect, suppress and minimize the consequences of terrorist activities.The author points out that improving the activities of these actors involves not only improving their organizational structure in order to increase mobility and flexibility in responding to changes in the dynamics of terrorism, but also strengthening the ties and interaction of relevant departments involved in anti-terrorism activities. Along with this, it is noted that civil society institutions should be involved in countering terrorism. The paper also suggests directions for improving the antiterrorist system of Ukraine.Key words: anti-terrorism actors, system of anti-terrorism actors, the President of Ukraine, Verkhovna Rada of Ukraine, Cabinet of Ministers of Ukraine, Anti-terror Center of the Security Service of Ukraine.
文章指出,在当前情况下,乌克兰最重要的问题之一是打击恐怖主义。反恐人员参与了打击这一极其危险的现象。反恐怖主义行为体系统是一组在立法层面界定的实体,它们相互作用,以防止、发现、压制和尽量减少恐怖主义活动的后果。作者指出,改善这些行动者的活动不仅涉及改善其组织结构,以增加应对恐怖主义动态变化的机动性和灵活性,而且还涉及加强参与反恐活动的有关部门之间的联系和互动。与此同时,还指出民间社会机构应参与打击恐怖主义。文章还提出了完善乌克兰反恐体系的方向。关键词:反恐行动者,反恐行动者制度,乌克兰总统,乌克兰最高拉达,乌克兰内阁部长,乌克兰安全局反恐中心
{"title":"System of Anti-terrorism Actors, their Legal-Administrative Status","authors":"V. Krutov, Valentyna Fornolyak","doi":"10.51369/2707-7276-2019-2-7","DOIUrl":"https://doi.org/10.51369/2707-7276-2019-2-7","url":null,"abstract":"The article states that one of the most important problems in Ukraine in current conditions is the fight against terrorism. Counterterrorism actors are involved in countering this extremely dangerous phenomenon. The system of counterterrorism actors is a set of entities defined at the level of legislation that interact with each other in order to prevent, detect, suppress and minimize the consequences of terrorist activities.\u0000The author points out that improving the activities of these actors involves not only improving their organizational structure in order to increase mobility and flexibility in responding to changes in the dynamics of terrorism, but also strengthening the ties and interaction of relevant departments involved in anti-terrorism activities. Along with this, it is noted that civil society institutions should be involved in countering terrorism. The paper also suggests directions for improving the antiterrorist system of Ukraine.\u0000Key words: anti-terrorism actors, system of anti-terrorism actors, the President of Ukraine, Verkhovna Rada of Ukraine, Cabinet of Ministers of Ukraine, Anti-terror Center of the Security Service of Ukraine.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133734687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Information Security of the Person, Society and State
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1