Pub Date : 1900-01-01DOI: 10.51369/2707-7276-2019-3-6
V. Boiko, M. Vasylenko, Serhii Kukharenko
The article deals with the issues of establishing cybersecurity in the EU and its member-states at the legislative level as viewed from the point of a systematic approach. The authors identified problematic aspects of improving cybersecurity quality and conditions. They analyzed the impact of the EU member states legislation on cy-bersecurity. The article as well considers the process of ICT development and pre-sents the ways of creating new challenges by means of new technologies. Key words: cybersecurity, cyber resilience, regulatory instruments, EU legislation, innovations.
{"title":"Cybersecurity in the EU and Member States: Genesis and Issues of its Enhancing","authors":"V. Boiko, M. Vasylenko, Serhii Kukharenko","doi":"10.51369/2707-7276-2019-3-6","DOIUrl":"https://doi.org/10.51369/2707-7276-2019-3-6","url":null,"abstract":"The article deals with the issues of establishing cybersecurity in the EU and its member-states at the legislative level as viewed from the point of a systematic approach. The authors identified problematic aspects of improving cybersecurity quality and conditions. They analyzed the impact of the EU member states legislation on cy-bersecurity. The article as well considers the process of ICT development and pre-sents the ways of creating new challenges by means of new technologies. \u0000Key words: cybersecurity, cyber resilience, regulatory instruments, EU legislation, innovations.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132960653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.51369/2707-7276-2019-2-13
Vladyslav Iierusalymov
Hybrid gender threats are used as an element to weaken the Ukrainian society in the country, to split it and to complicate its integration into NATO and the EU significantly. The toolkit for this type of threat is the destabilization of parliament activities, especially in terms of the implementation of its legislative function due to blocking the passage of bills, as well as the removal of «gender terminology» with a view to further manipulation in the field of equal rights and opportunities. Key words: gender, European integration, legislative activity, abortion right, domestic violence.
{"title":"Hybrid Gender Threats as an Element of the Destabilization of the Activities of the Verkhovna Rada of Ukraine","authors":"Vladyslav Iierusalymov","doi":"10.51369/2707-7276-2019-2-13","DOIUrl":"https://doi.org/10.51369/2707-7276-2019-2-13","url":null,"abstract":"Hybrid gender threats are used as an element to weaken the Ukrainian society in the country, to split it and to complicate its integration into NATO and the EU significantly. The toolkit for this type of threat is the destabilization of parliament activities, especially in terms of the implementation of its legislative function due to blocking the passage of bills, as well as the removal of «gender terminology» with a view to further manipulation in the field of equal rights and opportunities.\u0000Key words: gender, European integration, legislative activity, abortion right, domestic violence.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128817417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.51369/2707-7276-2019-2-5
O. Yermenchuk, Maksym Palchyk
This article provides systematic international experience of legal regulation of critical infrastructure protection in foreign jurisdictions. Some aspects of national critical infrastructure security systems of such as countries Germany, Spain, USA, and Denmark are described. The article determines that at national levels in different countries critical infrastructure protection is mainly regulated by national security strategies, defense strategies and other basic regulatory acts related to the functioning of critical infrastructure and its protection. The article considers aspects of legal regulation of relations in the sphere of public-private partnership and critical infrastructure protection in modern Ukraine. According to the results of the research, it has been established that in Ukraine there are documents of strategic character that regulate the implementation of public-private partnership, which should become a mutually beneficial factor that will facilitate mutual integration processes. Main directions for developing public-private partnership in the field of critical infrastructure protection in Ukraine have been suggested. Key words: public-private partnership, legal regulation, critical infrastructure, critical infrastructure protection, international experience.
{"title":"Problem Aspects of Legal Regulation of Public-Private Partnership in the Field of Critical Infrastructure Protection","authors":"O. Yermenchuk, Maksym Palchyk","doi":"10.51369/2707-7276-2019-2-5","DOIUrl":"https://doi.org/10.51369/2707-7276-2019-2-5","url":null,"abstract":"This article provides systematic international experience of legal regulation of critical infrastructure protection in foreign jurisdictions. Some aspects of national critical infrastructure security systems of such as countries Germany, Spain, USA, and Denmark are described. The article determines that at national levels in different countries critical infrastructure protection is mainly regulated by national security strategies, defense strategies and other basic regulatory acts related to the functioning of critical infrastructure and its protection. \u0000The article considers aspects of legal regulation of relations in the sphere of public-private partnership and critical infrastructure protection in modern Ukraine. According to the results of the research, it has been established that in Ukraine there are documents of strategic character that regulate the implementation of public-private partnership, which should become a mutually beneficial factor that will facilitate mutual integration processes. Main directions for developing public-private partnership in the field of critical infrastructure protection in Ukraine have been suggested.\u0000Key words: public-private partnership, legal regulation, critical infrastructure, critical infrastructure protection, international experience.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134216328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.51369/2707-7276-2019-3-1
B. Leonov, Valerii Serohin
The article is devoted to the analysis of the problems of legal and expert support of law enforcement activities in the field of cybercrime counteraction. The article deals with the issues of criminal and legal protection of information security in the context of the implementation of inter-national treaties into the field of national legislation. The authors both analyzed legislation in the field of cybersecurity provision; the modern doctrine devoted to its interpretation and made some suggestions for its improvement. Key words: cybersecurity, cybercrime, computer crime, harmful software, special software for secretly obtaining information.
{"title":"Issues of Legal and Expert Support of Law Enforcement Activities in the Field of Cybercrime Counteraction","authors":"B. Leonov, Valerii Serohin","doi":"10.51369/2707-7276-2019-3-1","DOIUrl":"https://doi.org/10.51369/2707-7276-2019-3-1","url":null,"abstract":"The article is devoted to the analysis of the problems of legal and expert support of law enforcement activities in the field of cybercrime counteraction. The article deals with the issues of criminal and legal protection of information security in the context of the implementation of inter-national treaties into the field of national legislation. The authors both analyzed legislation in the field of cybersecurity provision; the modern doctrine devoted to its interpretation and made some suggestions for its improvement.\u0000Key words: cybersecurity, cybercrime, computer crime, harmful software, special software for secretly obtaining information.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115857367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.51369/2707-7276-2019-3-3
V. Ostroukhov, M. Prysiazhniuk, Mykola Prohoniuk
The article deals with social, economic and psychological sources of terrorism and the reasons of its existence. The authors disclose specific features of ter-ro¬rists’ behavior as a marginal form of terro¬rism. Key words: terrorism, extremism, fanati¬cism, characteristics of terrorists’ behavior.
{"title":"Social-Psychological Analysis of Terrorism as an Extreme Form of Extremism","authors":"V. Ostroukhov, M. Prysiazhniuk, Mykola Prohoniuk","doi":"10.51369/2707-7276-2019-3-3","DOIUrl":"https://doi.org/10.51369/2707-7276-2019-3-3","url":null,"abstract":"The article deals with social, economic and psychological sources of terrorism and the reasons of its existence. The authors disclose specific features of ter-ro¬rists’ behavior as a marginal form of terro¬rism.\u0000Key words: terrorism, extremism, fanati¬cism, characteristics of terrorists’ behavior.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132034542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.51369/2707-7276-2019-2-2
S. Petrov
The article deals with international practices of counteracting the unlawful interference with the state digital information resources. Conclusions are formulated on applying international practices for the development of cyber defense and cyber security systems in Ukraine, improvement of law enforcement agencies powers in investigating cases of the unlawful interference with the state digital information resources. Key words: information, resources, state information resources, state digital information resources.
{"title":"International Practices of Countering the Unlawful Interference with the State Digital Information Resources","authors":"S. Petrov","doi":"10.51369/2707-7276-2019-2-2","DOIUrl":"https://doi.org/10.51369/2707-7276-2019-2-2","url":null,"abstract":"The article deals with international practices of counteracting the unlawful interference with the state digital information resources. Conclusions are formulated on applying international practices for the development of cyber defense and cyber security systems in Ukraine, improvement of law enforcement agencies powers in investigating cases of the unlawful interference with the state digital information resources.\u0000Key words: information, resources, state information resources, state digital information resources.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"16 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116645056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.51369/2707-7276-2019-2-14
Larysa Kompantseva
The article defines the conceptual apparatus of the metalanguage of gender studies in the field of information security and solves a number of problems, in particular: the history of gender studies examined through the prism of the society’s information organization; proposes the definition of a number of gender concepts relevant to information security; substantiates gender perception characteristic of security and defense sector institutions as an important condition for ensuring information security. Gender studies is considered as a broad scientific field, a research practice in which new opportunities are realized related to the use of a gender approach to the analysis of power interdependencies and hierarchies, power structures, their subordination and domination. The emphasis is placed upon the fact that gender paradigm mainstreaming responds to one of the most important trends of the 21st century – ensuring tolerant attitudes towards different styles of scientific thinking, providing for understanding of interdisciplinary relations as a trans paradigm phenomenon (the coexistence of several scientific paradigms that determine methodological pluralism in the course of research, the activities conducted at the intersection of sciences, involving the use of methods and comparison of the results of two or more branches of scientific knowledge) and methods of meta paradigm phenomenon (the creation of an all-encompassing, unifying doctrine capable of replacing the confrontation of scientific fields with their synthesis) The theory of gender studies has led to the emergence of a new philosophical and communicative paradigm of security and defense institutions focused on gender sensitivity, that is meeting specific needs of diverse groups of men and women, boys and girls in the field of security and justice, and promotes the full and equal participation of women and men in this activity. Key words: gender communication, gender sensitivity, gender studies, gender prospective.
{"title":"Gender Perspectives of the Information Security","authors":"Larysa Kompantseva","doi":"10.51369/2707-7276-2019-2-14","DOIUrl":"https://doi.org/10.51369/2707-7276-2019-2-14","url":null,"abstract":"The article defines the conceptual apparatus of the metalanguage of gender studies in the field of information security and solves a number of problems, in particular: the history of gender studies examined through the prism of the society’s information organization; proposes the definition of a number of gender concepts relevant to information security; substantiates gender perception characteristic of security and defense sector institutions as an important condition for ensuring information security. \u0000Gender studies is considered as\u0000a broad scientific field, a research practice in which new opportunities are realized related to the use of a gender approach to the analysis of power interdependencies and hierarchies, power structures, their subordination and domination. \u0000The emphasis is placed upon the fact that gender paradigm mainstreaming responds to one of the most important trends of the 21st century – ensuring tolerant attitudes towards different styles of scientific thinking, providing for understanding of interdisciplinary relations as a trans paradigm phenomenon (the coexistence of several scientific paradigms that determine methodological pluralism in the course of research, the activities conducted at the intersection of sciences, involving the use of methods and comparison of the results of two or more branches of scientific knowledge) and methods of meta paradigm phenomenon (the creation of an all-encompassing, unifying doctrine capable of replacing the confrontation of scientific fields with their synthesis)\u0000The theory of gender studies has led to the emergence of a new philosophical and communicative paradigm of security and defense institutions focused on gender sensitivity, that is meeting specific needs of diverse groups of men and women, boys and girls in the field of security and justice, and promotes the full and equal participation of women and men in this activity. \u0000Key words: gender communication, gender sensitivity, gender studies, gender prospective.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121857592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.51369/2707-7276-2019-2-8
V. Ostroukhov, M. Prysiazhniuk
The article the considers the roots of terrorism, as well as the evolution and nature of this phenomenon. The peculiar features of modern terrorism and its informational and psychological aspects in the context of security philosophy are studied. Key words: threats, terror, terrorism, information and psychological aspects of terrorism, security.
{"title":"Information and Psychological Aspects of Terrorism in the Context of the Security Philosophy","authors":"V. Ostroukhov, M. Prysiazhniuk","doi":"10.51369/2707-7276-2019-2-8","DOIUrl":"https://doi.org/10.51369/2707-7276-2019-2-8","url":null,"abstract":"The article the considers the roots of terrorism, as well as the evolution and nature of this phenomenon. The peculiar features of modern terrorism and its informational and psychological aspects in the context of security philosophy are studied.\u0000Key words: threats, terror, terrorism, information and psychological aspects of terrorism, security.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123764639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.51369/2707-7276-2019-2-6
Yurii Ivanov
The article studies modern aspects of information security in the banking system in relation to the security of the critical infrastructure of the state. It is noted that in the conditions of hybrid war, when various means are used against our state that can harm the vital economic objects or the economy of the state as a whole. Banking system of Ukraine, in particular its information resources, is the first to be under the attack. That is why information security of the banking system should be in the focus of attention while developing the steps to critical infrastructure security. Key words: banking system of Ukraine, information security, critical infrastructure security.
{"title":"Correlation between Ensuring Information Security in the Banking System of Ukraine and National Critical Infrastructure Security","authors":"Yurii Ivanov","doi":"10.51369/2707-7276-2019-2-6","DOIUrl":"https://doi.org/10.51369/2707-7276-2019-2-6","url":null,"abstract":"The article studies modern aspects of information security in the banking system in relation to the security of the critical infrastructure of the state. It is noted that in the conditions of hybrid war, when various means are used against our state that can harm the vital economic objects or the economy of the state as a whole. Banking system of Ukraine, in particular its information resources, is the first to be under the attack. That is why information security of the banking system should be in the focus of attention while developing the steps to critical infrastructure security.\u0000Key words: banking system of Ukraine, information security, critical infrastructure security.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123999752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.51369/2707-7276-2019-2-7
V. Krutov, Valentyna Fornolyak
The article states that one of the most important problems in Ukraine in current conditions is the fight against terrorism. Counterterrorism actors are involved in countering this extremely dangerous phenomenon. The system of counterterrorism actors is a set of entities defined at the level of legislation that interact with each other in order to prevent, detect, suppress and minimize the consequences of terrorist activities. The author points out that improving the activities of these actors involves not only improving their organizational structure in order to increase mobility and flexibility in responding to changes in the dynamics of terrorism, but also strengthening the ties and interaction of relevant departments involved in anti-terrorism activities. Along with this, it is noted that civil society institutions should be involved in countering terrorism. The paper also suggests directions for improving the antiterrorist system of Ukraine. Key words: anti-terrorism actors, system of anti-terrorism actors, the President of Ukraine, Verkhovna Rada of Ukraine, Cabinet of Ministers of Ukraine, Anti-terror Center of the Security Service of Ukraine.
{"title":"System of Anti-terrorism Actors, their Legal-Administrative Status","authors":"V. Krutov, Valentyna Fornolyak","doi":"10.51369/2707-7276-2019-2-7","DOIUrl":"https://doi.org/10.51369/2707-7276-2019-2-7","url":null,"abstract":"The article states that one of the most important problems in Ukraine in current conditions is the fight against terrorism. Counterterrorism actors are involved in countering this extremely dangerous phenomenon. The system of counterterrorism actors is a set of entities defined at the level of legislation that interact with each other in order to prevent, detect, suppress and minimize the consequences of terrorist activities.\u0000The author points out that improving the activities of these actors involves not only improving their organizational structure in order to increase mobility and flexibility in responding to changes in the dynamics of terrorism, but also strengthening the ties and interaction of relevant departments involved in anti-terrorism activities. Along with this, it is noted that civil society institutions should be involved in countering terrorism. The paper also suggests directions for improving the antiterrorist system of Ukraine.\u0000Key words: anti-terrorism actors, system of anti-terrorism actors, the President of Ukraine, Verkhovna Rada of Ukraine, Cabinet of Ministers of Ukraine, Anti-terror Center of the Security Service of Ukraine.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133734687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}