This article describes Ukraine’s cybersecurity system, its place, and its role in a single configuration of national security. The methods used include formal-dogmatic, comparative-legal, sociological, and hermeneutics. The research revealed that effective cybersecurity must be addressed comprehensively, requiring coordinated action at the national, regional, and international levels to prevent, prepare, and respond to incidents by the government, the private sector, and civil society.
{"title":"The system of cybersecurity bodies in Ukraine","authors":"A. Svintsytskyi","doi":"10.21830/19006586.903","DOIUrl":"https://doi.org/10.21830/19006586.903","url":null,"abstract":"This article describes Ukraine’s cybersecurity system, its place, and its role in a single configuration of national security. The methods used include formal-dogmatic, comparative-legal, sociological, and hermeneutics. The research revealed that effective cybersecurity must be addressed comprehensively, requiring coordinated action at the national, regional, and international levels to prevent, prepare, and respond to incidents by the government, the private sector, and civil society.","PeriodicalId":52330,"journal":{"name":"Revista Cientifica General Jose Maria Cordova","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47572608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper aims to study the main stages of cyberattacks’ evolution in terms of the danger they pose, from the first hooligan cyberattacks to modern cyberwars. The authors use empirical qualitative and quantitative research methods to assess the stages of cyberattack development, considering their increasing numbers, diversity, and the creation of the malware employed. The paper provides a better understanding of the causes, conditions, and consequences of the emerging types of cyberattacks. The article concludes by pointing out the three stages in the evolution of cyberattacks and draws upon the main characteristic features of the current state of the cyber environment.
{"title":"From self-affirmation to national security threat","authors":"Y. Nizovtsev, A. Lyseiuk, M. Kelman","doi":"10.21830/19006586.905","DOIUrl":"https://doi.org/10.21830/19006586.905","url":null,"abstract":"This paper aims to study the main stages of cyberattacks’ evolution in terms of the danger they pose, from the first hooligan cyberattacks to modern cyberwars. The authors use empirical qualitative and quantitative research methods to assess the stages of cyberattack development, considering their increasing numbers, diversity, and the creation of the malware employed. The paper provides a better understanding of the causes, conditions, and consequences of the emerging types of cyberattacks. The article concludes by pointing out the three stages in the evolution of cyberattacks and draws upon the main characteristic features of the current state of the cyber environment.","PeriodicalId":52330,"journal":{"name":"Revista Cientifica General Jose Maria Cordova","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47230219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Oleksandr A. Lyubchik, Olha S. Yadlovska, S. Vavzhenchuk, O. Korolchuk, O. Stakhiv
This article explains the essence of the agent-based model method that simulates artificial societies to substantiate the thesis on its feasibility and scientific usefulness in lawmaking and law enforcement in Ukraine and research in the legal field. The primary research method used is synthesis, which allows combining components of a complex phenomenon and obtaining synthetic knowledge, which expands previous experience and constructs something new. Moreover, it allows going beyond the existing basis and drawing far-sighted conclusions, forecasting the directions of effective state formation and legal regulation in Ukraine.
{"title":"Agent-based models: an effective tool in Ukrainian state formation and legal regulation","authors":"Oleksandr A. Lyubchik, Olha S. Yadlovska, S. Vavzhenchuk, O. Korolchuk, O. Stakhiv","doi":"10.21830/19006586.896","DOIUrl":"https://doi.org/10.21830/19006586.896","url":null,"abstract":"This article explains the essence of the agent-based model method that simulates artificial societies to substantiate the thesis on its feasibility and scientific usefulness in lawmaking and law enforcement in Ukraine and research in the legal field. The primary research method used is synthesis, which allows combining components of a complex phenomenon and obtaining synthetic knowledge, which expands previous experience and constructs something new. Moreover, it allows going beyond the existing basis and drawing far-sighted conclusions, forecasting the directions of effective state formation and legal regulation in Ukraine.","PeriodicalId":52330,"journal":{"name":"Revista Cientifica General Jose Maria Cordova","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43657810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Oliinyk, R. Shestopalov, V. Zarosylo, Mykhaylo I. Stankovic, Sergii G. Golubitsky
The article aims to identify the factors that have the greatest impact on economic security. Based on the study of legislative acts of the countries of the European Union, the United States, and relevant scientific literature, an analysis is made of the current situation in the field of economic security, exploring its constituent elements and factors influencing the security of the economy. Among them are ecology, the fight against crime, the financial and taxation spheres, innovative development, and the element itself as a component of the considered social relations, and processes, among others. The article outlines the key areas of public relations and other factors that influence the situation’s state concerning the issue addressed.
{"title":"Economic security through criminal policies","authors":"O. Oliinyk, R. Shestopalov, V. Zarosylo, Mykhaylo I. Stankovic, Sergii G. Golubitsky","doi":"10.21830/19006586.899","DOIUrl":"https://doi.org/10.21830/19006586.899","url":null,"abstract":"The article aims to identify the factors that have the greatest impact on economic security. Based on the study of legislative acts of the countries of the European Union, the United States, and relevant scientific literature, an analysis is made of the current situation in the field of economic security, exploring its constituent elements and factors influencing the security of the economy. Among them are ecology, the fight against crime, the financial and taxation spheres, innovative development, and the element itself as a component of the considered social relations, and processes, among others. The article outlines the key areas of public relations and other factors that influence the situation’s state concerning the issue addressed.","PeriodicalId":52330,"journal":{"name":"Revista Cientifica General Jose Maria Cordova","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43021976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article analyzes the undermined importance of the International Court of Justice’s (ICJ) case law in interpreting international humanitarian law (IHL) and its relationship with public international law. It examines how the ICJ has elevated IHL to customary law, declaring it “intransgressible” and equating it with jus cogens, and identified particular obligations for the parties in conflict. The article studies how the Court has clarified the relationships between customary IHL with the law of treaties and has declared which elements of IHL constitute the most basic principles of humanity, applicable whether it is an international or non-international armed conflict. Finally, the text analyzes how the Court, has discouraged counterproductive separations between the application of IHL and international human rights law.
{"title":"The International Court of Justice and the international humanitarian law rules for armed conflicts","authors":"Walter Arévalo-Ramírez","doi":"10.21830/19006586.912","DOIUrl":"https://doi.org/10.21830/19006586.912","url":null,"abstract":"This article analyzes the undermined importance of the International Court of Justice’s (ICJ) case law in interpreting international humanitarian law (IHL) and its relationship with public international law. It examines how the ICJ has elevated IHL to customary law, declaring it “intransgressible” and equating it with jus cogens, and identified particular obligations for the parties in conflict. The article studies how the Court has clarified the relationships between customary IHL with the law of treaties and has declared which elements of IHL constitute the most basic principles of humanity, applicable whether it is an international or non-international armed conflict. Finally, the text analyzes how the Court, has discouraged counterproductive separations between the application of IHL and international human rights law.","PeriodicalId":52330,"journal":{"name":"Revista Cientifica General Jose Maria Cordova","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44041034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hryhorii V. Novytskyi, Leonid I. Shcherbyna, Volodymyr V. Pyvovarov, O. Kartamysheva, Oleksandr Lysodyed
This article aims to set the foundations for a comprehensive legal system ensuring national security through establishing the scientific principles and framework legislation and developing a constitutional Ukrainian national security doctrine. The empirical basis for this research consists of published documents and materials concerning national security in the USA, particularly the US National Security Strategy. The drafting of the mentioned doctrine as a main scientific result is of national significance for Ukraine. Furthermore, the scientific results presented in the article, including principles, general scientific, system-structural, and legislative models, can be used for the democratic development of constitutional models in Eastern European countries to ensure national and collective security in the world.
{"title":"Ukraine’s constitutional doctrine of national security","authors":"Hryhorii V. Novytskyi, Leonid I. Shcherbyna, Volodymyr V. Pyvovarov, O. Kartamysheva, Oleksandr Lysodyed","doi":"10.21830/19006586.902","DOIUrl":"https://doi.org/10.21830/19006586.902","url":null,"abstract":"This article aims to set the foundations for a comprehensive legal system ensuring national security through establishing the scientific principles and framework legislation and developing a constitutional Ukrainian national security doctrine. The empirical basis for this research consists of published documents and materials concerning national security in the USA, particularly the US National Security Strategy. The drafting of the mentioned doctrine as a main scientific result is of national significance for Ukraine. Furthermore, the scientific results presented in the article, including principles, general scientific, system-structural, and legislative models, can be used for the democratic development of constitutional models in Eastern European countries to ensure national and collective security in the world.","PeriodicalId":52330,"journal":{"name":"Revista Cientifica General Jose Maria Cordova","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44532812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Semchuk, Sofiia Lykhova, N. Udalova, A. Lyseiuk, O. Cheban
This article assesses the current state of criminal counteraction to the solicitation of children for sexual purposes using digital technologies in Ukraine and the foreign experience in this area. To this end, it uses the traditional legal research method as a basis for research, partially applying other methods such as comparative, historical, and international law. The article analyzes the composition of a criminal offense under Art. 156-1 of the Criminal Code of Ukraine and compares it to the texts of international acts and foreign legislation. The article concludes that the text of the adopted amendments is generally in line with Ukraine’s commitments and foreign experience.
{"title":"Countering the sexual solicitation of children using computer technology","authors":"N. Semchuk, Sofiia Lykhova, N. Udalova, A. Lyseiuk, O. Cheban","doi":"10.21830/19006586.907","DOIUrl":"https://doi.org/10.21830/19006586.907","url":null,"abstract":"This article assesses the current state of criminal counteraction to the solicitation of children for sexual purposes using digital technologies in Ukraine and the foreign experience in this area. To this end, it uses the traditional legal research method as a basis for research, partially applying other methods such as comparative, historical, and international law. The article analyzes the composition of a criminal offense under Art. 156-1 of the Criminal Code of Ukraine and compares it to the texts of international acts and foreign legislation. The article concludes that the text of the adopted amendments is generally in line with Ukraine’s commitments and foreign experience.","PeriodicalId":52330,"journal":{"name":"Revista Cientifica General Jose Maria Cordova","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42437325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The issue of cyber security has become a key State objective in Ukraine. Cyber espionage and cyber-attacks by intelligence agencies (predominantly non-democratic countries) have become the most significant modern threat to automated systems, surpassing ordinary crimes seeking profit. Besides effective protection and immediate responses to counter cyber threats, cyber incident investigations are an important element that must be conducted by authorized law enforcement agencies and intelligence agencies when necessary. This article considers key aspects and issues to suggest practical recommendations to prepare and appoint forensic expertise in cybercrime investigations. Furthermore, it addresses the objects under examination, their removal’s particularities and the questions to ask telecommunications and technical computer experts
{"title":"Forensic and technical criminalistics support in cybercrime investigation","authors":"A. Padalka","doi":"10.21830/19006586.901","DOIUrl":"https://doi.org/10.21830/19006586.901","url":null,"abstract":"The issue of cyber security has become a key State objective in Ukraine. Cyber espionage and cyber-attacks by intelligence agencies (predominantly non-democratic countries) have become the most significant modern threat to automated systems, surpassing ordinary crimes seeking profit. Besides effective protection and immediate responses to counter cyber threats, cyber incident investigations are an important element that must be conducted by authorized law enforcement agencies and intelligence agencies when necessary. This article considers key aspects and issues to suggest practical recommendations to prepare and appoint forensic expertise in cybercrime investigations. Furthermore, it addresses the objects under examination, their removal’s particularities and the questions to ask telecommunications and technical computer experts","PeriodicalId":52330,"journal":{"name":"Revista Cientifica General Jose Maria Cordova","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41970245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sofiia Lykhova, Liudmyla Servatiuk, Oleksandr Shamsutdinov, V. Sysoieva, D. Hurina
This research focuses on information security as a social state, its aspects and characteristics, information security standards, and its impact on improving the information security process. It emphasizes the multidisciplinary nature of the issue of information security. Several methods are employed in this study, including formal-logical and system-structural methods, methods of generalization, and comparative law. Documentary analysis is used to examine the regulatory framework concerning information security and the main international and national information security standards. Three levels of information security are identified –personal, social, and state. It concludes that the levels differ depending on their degree within the information space.
{"title":"International and national standards on societal information security","authors":"Sofiia Lykhova, Liudmyla Servatiuk, Oleksandr Shamsutdinov, V. Sysoieva, D. Hurina","doi":"10.21830/19006586.898","DOIUrl":"https://doi.org/10.21830/19006586.898","url":null,"abstract":"This research focuses on information security as a social state, its aspects and characteristics, information security standards, and its impact on improving the information security process. It emphasizes the multidisciplinary nature of the issue of information security. Several methods are employed in this study, including formal-logical and system-structural methods, methods of generalization, and comparative law. Documentary analysis is used to examine the regulatory framework concerning information security and the main international and national information security standards. Three levels of information security are identified –personal, social, and state. It concludes that the levels differ depending on their degree within the information space.","PeriodicalId":52330,"journal":{"name":"Revista Cientifica General Jose Maria Cordova","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48768560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
El Desarrollo Alternativo ha sido un componente de la estrategia antidrogas en Colombia. Este artículo lo analiza en el periodo 2003 a 2021 en los departamentos de Nariño, Putumayo y Norte de Santander, con el fin de identificar aciertos y fallas en su diseño e implementación. Con un método cualitativo, se hicieron entrevistas a líderes sociales participantes de los programas que lo han constituido (Familias Guarda Bosques, PNIS y Col/K53). Como aporte para la evaluación de la política antidrogas y del Desarrollo Alternativo, se identificaron como factores positivos el fortalecimiento socioempresarial comunitario y el establecimiento de buenas relaciones con el personal técnico asistencial, y como factores negativos los retrasos en la ejecución de proyectos productivos y de seguridad alimentaria, y la ausencia de apoyo en la comercialización.
{"title":"El Desarrollo Alternativo (2003-2021)","authors":"Danny Miguel Rebolledo-Castillo","doi":"10.21830/19006586.1120","DOIUrl":"https://doi.org/10.21830/19006586.1120","url":null,"abstract":"El Desarrollo Alternativo ha sido un componente de la estrategia antidrogas en Colombia. Este artículo lo analiza en el periodo 2003 a 2021 en los departamentos de Nariño, Putumayo y Norte de Santander, con el fin de identificar aciertos y fallas en su diseño e implementación. Con un método cualitativo, se hicieron entrevistas a líderes sociales participantes de los programas que lo han constituido (Familias Guarda Bosques, PNIS y Col/K53). Como aporte para la evaluación de la política antidrogas y del Desarrollo Alternativo, se identificaron como factores positivos el fortalecimiento socioempresarial comunitario y el establecimiento de buenas relaciones con el personal técnico asistencial, y como factores negativos los retrasos en la ejecución de proyectos productivos y de seguridad alimentaria, y la ausencia de apoyo en la comercialización.","PeriodicalId":52330,"journal":{"name":"Revista Cientifica General Jose Maria Cordova","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42672661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}