{"title":"СONSIDERATION OF CLAIMES CANCELLATION OF DECISIONS BY NATIONAL COURTS THAT HAVE ENTERED INTO FORCE BY THE SUPREME COURT OF FINLAND","authors":"Vitolds Zahars, V. Jilkine","doi":"10.17770/acj.v4i73.4361","DOIUrl":"https://doi.org/10.17770/acj.v4i73.4361","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"4 1","pages":"3"},"PeriodicalIF":0.0,"publicationDate":"2015-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67926291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PROSPECTS OF DEVELOPMENT THE JUDICIARY AND PHASED EXPANSION OF THE SCOPE OF JUDICIAL CONTROL IN PRE-TRIAL PROCEEDINGS","authors":"M. Myrzakhanova, Yerlan Myrzakhanov, A. Dananova","doi":"10.17770/acj.v4i73.4353","DOIUrl":"https://doi.org/10.17770/acj.v4i73.4353","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"4 1","pages":"39"},"PeriodicalIF":0.0,"publicationDate":"2015-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67924540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-JUSTICE SYSTEM IN BULGARIA: ELECTRONIC TOOLS FOR DEVELOPMENT OF E-JUSTICE","authors":"M. Petrova","doi":"10.17770/acj.v4i73.4358","DOIUrl":"https://doi.org/10.17770/acj.v4i73.4358","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"4 1","pages":"48"},"PeriodicalIF":0.0,"publicationDate":"2015-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67925969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THEORETICAL PROBLEMS ASSOCIATED WITH THE LEGAL CONCEPT OF TERM “GENOCIDE”","authors":"Armens Gabrieljans","doi":"10.17770/acj.v4i73.4356","DOIUrl":"https://doi.org/10.17770/acj.v4i73.4356","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"4 1","pages":"27"},"PeriodicalIF":0.0,"publicationDate":"2015-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67924755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VALUE OF OBSERVANCE OF THE PROCEDURAL FORM OF INVESTIGATIVE ACTIONS IN CRIMINAL PROCEDURE","authors":"Marina Sumbarova","doi":"10.17770/acj.v4i73.4359","DOIUrl":"https://doi.org/10.17770/acj.v4i73.4359","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"4 1","pages":"14"},"PeriodicalIF":0.0,"publicationDate":"2015-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67926100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CRIMINAL LIABILITY FOR SOCIAL HATRED AND ENMITY INSTIGATION, DIFFICULTIES WITH THEIR THEORETICAL AND PRACTICAL APPLICATIONS","authors":"Ēriks Treļs","doi":"10.17770/acj.v4i73.4360","DOIUrl":"https://doi.org/10.17770/acj.v4i73.4360","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"4 1","pages":"19"},"PeriodicalIF":0.0,"publicationDate":"2015-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67926275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Searching for solutions to the problems related to cybersecurity which occurred in the early 1990s, with their steadily increasing negative effects, has long gone beyond the borders of a single science and hence requires a complex interdisciplinary approach. The new challenges facing the international community and the information and communication technologies cross the national borders and the individual countries fail to deal independently and effectively with the new threats against cybersecurity only by policies at national level aiming at ensuring a high level of protection of its citizens and the networks of state power. The need for collective efforts to protect cyberspace has increased significantly and at present the European Union is one of the most influential players in the field of international policies pertaining to cybersecurity. Most often cybersecurity refers to: Ø measures for protecting information techno logies; Ø the included within those measures information, ongoing processes and the related physical and virtual elements (which, taken together, comprise cyber space); Ø the level of protection resulting from the implementation of those measures. Virtually all elements in cyberspace are at risk as their interconnection renders it difficult to determine the scope and framework of cybersecurity. One of the necessary conditions for the creation and development of an EU policy on cybersecurity is an understanding of what the term “cybersecurity” denotes. Achieving this can be difficult for several reasons. Some the main challenges and difficulties include its wide range and multiple aspects that influence the different spheres of social relations between EU citizens and between the Member States of the European Union. The scientific research and analysis of the authors of this publication are focused in this direction.
{"title":"NATIONAL CYBERSECURITY STRATEGIES IN MEMBER STATES OF THE EUROPEAN UNION","authors":"S. Dimitrova, S. Stoykov, Yosif Kochev","doi":"10.17770/acj.v4i73.4355","DOIUrl":"https://doi.org/10.17770/acj.v4i73.4355","url":null,"abstract":"Searching for solutions to the problems related to cybersecurity which occurred in the early 1990s, with their steadily increasing negative effects, has long gone beyond the borders of a single science and hence requires a complex interdisciplinary approach. The new challenges facing the international community and the information and communication technologies cross the national borders and the individual countries fail to deal independently and effectively with the new threats against cybersecurity only by policies at national level aiming at ensuring a high level of protection of its citizens and the networks of state power. The need for collective efforts to protect cyberspace has increased significantly and at present the European Union is one of the most influential players in the field of international policies pertaining to cybersecurity. Most often cybersecurity refers to: Ø measures for protecting information techno logies; Ø the included within those measures information, ongoing processes and the related physical and virtual elements (which, taken together, comprise cyber space); Ø the level of protection resulting from the implementation of those measures. Virtually all elements in cyberspace are at risk as their interconnection renders it difficult to determine the scope and framework of cybersecurity. One of the necessary conditions for the creation and development of an EU policy on cybersecurity is an understanding of what the term “cybersecurity” denotes. Achieving this can be difficult for several reasons. Some the main challenges and difficulties include its wide range and multiple aspects that influence the different spheres of social relations between EU citizens and between the Member States of the European Union. The scientific research and analysis of the authors of this publication are focused in this direction.","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"4 1","pages":"54"},"PeriodicalIF":0.0,"publicationDate":"2015-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67924782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"INHERITANCE BY CONTRACT COMPLEX INSTITUTION: PROBLEMATIC ISSUES ACTUALIZATION","authors":"Edvards Pilipsons","doi":"10.17770/acj.v3i72.4338","DOIUrl":"https://doi.org/10.17770/acj.v3i72.4338","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"3 1","pages":"59"},"PeriodicalIF":0.0,"publicationDate":"2015-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67922578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THE QUALIFICATION OF RAPE","authors":"Dainis Mežulis","doi":"10.17770/acj.v3i72.4337","DOIUrl":"https://doi.org/10.17770/acj.v3i72.4337","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"3 1","pages":"28"},"PeriodicalIF":0.0,"publicationDate":"2015-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67922305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DETERMINATION VALUE OF SMUGGLING GOODS","authors":"Aleksejs Šaforostovs","doi":"10.17770/acj.v3i72.4339","DOIUrl":"https://doi.org/10.17770/acj.v3i72.4339","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"3 1","pages":"50"},"PeriodicalIF":0.0,"publicationDate":"2015-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67922467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}