Національний юридичний університет імені Ярослава Мудрого ⚖ Головна ⓘ Довiдка
Авторизацiя
Прiзвище (укр.)
N Читацького квитка
 

Бази даних


Е-картотека "Публікації вчених НЮУ ім. Ярослава Мудрого в Scopus" - результати пошуку

Вид пошуку

  • Власна база даних
  • Більше 728 000 документів: книги, статті, збірники наукових праць, рідкісні видання, дисертації, автореферати
  • Створюється з 1999 року
  • Легкий, зручний, багатоаспектний інформаційний пошук
  • Можливість цілодобово працювати з інформаційним контентом
  • Електронне замовлення книг дистанційно
Область поиска
в найденном
 Найдено в других БД:Eлектронний каталог (2306)Зведений електронний каталог «Правова освіта. Правова культура» (25)
Формат представлення знайдених документів :
полный информационныйкраткий
Отсортировать найденные документы по:
авторузаглавиюгоду изданиятипу документа
Пошуковий запит: 

(<.>K=КІБЕР$<.>)

Загальна кількість знайденихдокументів : 23
Показані документи с 1 по 20
 1-20    21-23 
1.

Вид документа : Статья из журнала
Шифр издания : 347.97/.99:004/P51
Автор(ы) : Petrovich, Valentina, Moskvych, Lidiia, Shcherbakova, Nataliia, Doroshenko, Lina, Aloshyn, Oleksandr
Заглавие : Regulatory framework for e-documentation and cyber protection amidst society’s digital shift
Параллельн. заглавия :Marco normativo para la documentación electrónica y la ciberprotección en medio del cambio digital de la sociedad
Место публикации : Salud, Ciencia y Tecnologia - Serie de Conferencias. - 2025. - Vol. 4. - Ст.1336. - P.[1-13]. - ISSN 2953-4860
Примечания : DOI: https://doi.org/10.56294/sctconf20251336
УДК : 347.97/.99:004
Ключевые слова (''Своб.индексиров.''): cybersecurity--digital transformation--electronic document management--e-government--information and communication technologies--legal support--кібербезпека--цифрова трансформація--електронний документообіг--е-уряд--інформаційно-комунікаційні технології--юридичний супровід
Аннотация: Introduction: Ukraine’s active integration into the European community emphasises the crucial role of digital technologies in ensuring the population’s welfare and the country’s economic growth. Studying the peculiarities of electronic document management in the EU countries will help avoid mistakes and develop an effective system that will meet European standards in many countries on the way to Europeanisation. Objectives: analyse the legal aspects of electronic document management, identify security issues in the information space in Ukraine, and assess Ukrainian e-justice compliance with European standards in the context of digital transformation. Method: it was conducted using general scientific methods, including analysis of legal documents, generalisation, synthesis, system analysis, analytical diagnostics, and statistical data analysis. Results: it is proved that the legal support of the electronic document management system ensures centralised management of documents, their entire life cycle, collaboration, confidentiality, automatic routing and integration with other systems by the legal documents establishing the legal framework on which the relations between the participants to the process are built, defining their rights, duties and responsibilities. Conclusion: the article identifies the main areas of development and problematic aspects of implementing the e-justice system at the current stage of its formation, as well as the prospects for introducing new technologies in this area.
DOI - 0 байт
DOI,
Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus
Найти похожие
2.

Вид документа : Статья из журнала
Шифр издания : 341.225.5:004.056/M52
Автор(ы) : Melnyk, Oleksiy, Drozdov, Oleksandr, Kuznichenko, Serhii
Заглавие : Cybersecurity in Maritime Transport: An International Perspective on Regulatory Frameworks and Countermeasures
Место публикации : Lex Portus. - 2025. - Vol. 11, iss. 1. - P.7-19. - ISSN 2524-101X. - ISSN 2617-541X
Примечания : DOI: https://doi.org/10.62821/lp11101
ISSN: 2524-101X2617-541X
УДК : 341.225.5:004.056
Ключевые слова (''Своб.индексиров.''): global maritime security standards--incident response--international legal frameworks--maritime cybersecurity--maritime law--глобальні стандарти безпеки на морі--реагування на інцидент--міжнародно-правові рамки--морська кібербезпека--морське право
Аннотация: This article combines legal, technical, and organizational aspects to propose a comprehensive approach to addressing cybersecurity of maritime transport. The article highlights key gaps in the international legal framework and suggests a unified legal framework to regulate these cyber threats from a maritime transportation perspective. The article focuses on technical solutions but is supported by professional training in a virtual environment. The main innovation of this article is the interdisciplinary approach, combining technological advances with social research and legal analysis. Among other proposals, developing an international maritime cybersecurity convention, a standard global incident registry and a transnational data sharing system are proposed. Such a systematic framework would have serious potential to address critical safety issues and improve the safety of the global shipping industry.
Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus,
Web of Science - 0 байт
Web of Science
Найти похожие
3.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Serohina, Svitlana, Harashchuk, Ilona, Murtishcheva, Alina, Poproshaieva, Olena, Fomina, Svitlana
Заглавие : International Experience in Ensuring Cybersecurity in Local Self-Government Management as a Component of the National Security of Ukraine
Место публикации : Pakistan Journal of Criminology. - 2024. - Vol. 16, iss. 2. - P.827-841
Примечания : DOI: https://doi.org/10.62271/pjc.16.2.827.841
УДК : 352:[351.746:004.056](477)
Ключевые слова (''Своб.индексиров.''): cybersecurity--cybersecurity entities--international experience--local self-government management--national security--кібербезпека--суб’єкти кібербезпеки--міжнародний досвід--місцеве самоврядування--управління місцевого самоврядування--національна безпека
Аннотация: The study examines the critical relationship between cyber security as a component of national security and its provision in local government administration. The purpose of the study is to evaluate the international experience of ensuring cyber security in the management of local self-governments in Germany, Poland and Ukraine. In research were used visual and graphic methods, a set of methods of processing, comprehension and interpretation of information. This highlights the level of trust in local authorities in Poland, Germany and Ukraine, as well as a comparison of the systems of local self-government entities in the selected countries. It was established that there is a need to create and develop an adequate cybersecurity system. The result of the study is an analysis of the cyber security strategies of Germany, Poland and Ukraine. Prospects for further research are the analysis of the possibility of consolidation and differentiation of powers by subjects of local self-government in ensuring cyber security. An analysis of the real need for the powers related to providing cyber security and the ability to perform them is appropriate.
Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus
Найти похожие
4.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Kryva, Liudmyla, Anisimovych-Shevchuk, Olha, Toma, Mariana, Kutsepal, Svitlana, Derevianko, Serhii
Заглавие : Effectiveness of International Cooperation of the Lublin Triangle Countries in Addressing Terrorist Threats
Место публикации : Pakistan Journal of Criminology. - 2024. - Vol. 16, no. 3. - P.835-850. - ISSN 20742738
Примечания : https://doi.org/10.62271/pjc.16.3.835.850
УДК : 343.326:004]:341.172(477+474.5+438)
Ключевые слова (''Своб.индексиров.''): cyber terrorism--international cooperation--lublin triangle--terrorist threats--war in ukraine--кібертероризм--дезінформація--міжнародне співробітництво--люблінський трикутник--терористичні загрози--війна в україні--disinformation--international cooperation
Аннотация: The problem of terrorism is gaining scale and acquiring new forms, requiring the international community to develop new approaches to combating threats. The aim of the work is to assess the Lublin Triangle countries‘ counter-terrorism activities and identify the potential problems associated with such activities. The research used the doctrinal approach, content analysis, and descriptive and comparative methods. The conducted research described such a format of international cooperation as the Lublin Triangle. Improving the defence capabilities of the countries within the alliance and countering terrorist threats from the Russian Federation is of particular importance because of the Russian-Ukrainian war. Both prospects and problems in the activities of the association were identified. The problematic aspects are related to the aggravation of relations between Ukraine and Poland. Coordinated work of countries in the field of combating disinformation was noted. Several recommendations provided by representatives of non-governmental organisations of the Lublin Triangle countries in this area are summarised. Potential directions for further development of relations between the studied countries were outlined. It was noted that cooperation will only be effective when resolving contradictions and establishing mutual respect and trust.
Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus
Найти похожие
5.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Sopilko, Iryna, Filinovych, Valeriia, Prudnykova, Olena V., Krupnova, Anastasiia, Smetanina, Nataliia
Заглавие : Ensuring the functioning of cyberspace in Ukraine: legal and technical aspects
Параллельн. заглавия :Garantindo o funcionamento do ciberespaço na Ucrânia: aspectos legais e técnicos = Asegurando el funcionamiento del ciberespacio en Ucrania: aspectos legales y técnicos
Место публикации : Sapienza. - 2024. - Vol. 5, no. 3. - Ст.Article number e24055. - P.[1-11]
Примечания : DOI: https://doi.org/10.51798/sijis.v5i3.787
УДК : 342.9:004
Ключевые слова (''Своб.индексиров.''): cyber threat--cybersecurity--cyberspace--information security--information space--national security--кіберзагроза--кібербезпека--кіберпростір--інформаційна безпека--інформаційний простір--національна безпека
Аннотация: The authors studied in detail the technical, social, and legal features of the functioning of cybernetic space. The study gives definitions of the cybernetic domain (space) and related terms, such as information space (sphere), cybersecurity, information security, and the like, it indicates goals, objects, and subjects of interaction in cyberspace. Separately considered are its elements such as uncertainty, deterritoriality and the plurality of actors. In the course of this scientific study, the approaches of scholars who researched the cybernetic domain and related categories were analyzed, appropriate conclusions were made on the basis of their work, and the conceptual basis of the work was formed. The authors provide options for solving problems that arise during the use of cyberspace and the information sphere in general, as well as recommendations for ensuring the cybernetic and information security of the state of Ukraine. The methodological basis for this study was the generally recognized criteria of scientific objectivity, as well as other general scientific research methods that provide a comprehensive analysis of cyberspace as an objective new, fourth domain in a range of air, water, and land spaces of Ukraine. The recommendations and suggestions given by the authors of this scientific paper, as well as the conclusions drawn by them, will help coordinate information policy so that Ukraine can become a worthy member of the global information space, and directly cyberspace based on equality and independence.
Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus
Найти похожие
6.

Вид документа : Статья из журнала
Шифр издания : 351.75:004/Z39
Автор(ы) : Zavhorodnia, Yuliia, Povydys, Vladyslav, Kozminykh, Alona, Mamontova, Ella
Заглавие : Information Policy of the State in the Context of Growing Cyber Threats
Место публикации : Pakistan Journal of Criminology. - 2023. - Vol. 15, No. 1. - P.111-124
Примечания : References : p. 120-124
УДК : 351.75:004
Ключевые слова (''Своб.индексиров.''): cyber threats--cybersecurity--cybersecurity standards--digital transformation--e-governance--information space--political conflicts--political process--кіберзагрози--кібербезпека--цифрова трансформація--електронне урядування--інформаційний простір--політичні конфлікти--політичний процес
Аннотация: The research subject matter is the foundations of the National concept of the state policy on information in the era of digitalization with an emphasis on cybersecurity. The study aim is to determine possible means to increase the level of information policy efficiency, considering the concept of technological society in the context of digitalization, research into international standards for ensuring cyber security, ideas of a national model of information policy for providing cyber security. The comparison was used to analyze and summarize the approaches to the implementation of digital transformation in public relations. Apart from that, the specific parameters of the activities of the National Agency on Corruption Prevention in terms of digitalization were singled out. Besides, the inductive and deductive methods allowed to distinguish approaches to the information policy model. The authors established that the components of state policy in the context of digitalization include the following components: 1) electronic governance; 2) cyber security. Moreover, the elements of the national model of information were singled out. The results of the research proved that the introduction of the latest information technologies in the activities of government entities creates the need to improve cyber defense.
Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus
Найти похожие
7.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Yemanov, Vladislav, Pasichnyk, Vasyl, Yevtushenko, Ihor, Larin, Stanislav, Mykhailenko, Olena
Заглавие : Ranking Threats to Determine the Cost of Protecting Information in a Cybersecurity Environment
Место публикации : Ingenierie des Systemes d'Information. - 2023. - Vol. 28, Iss. 1. - P.77-84
УДК : 004.056:338.244
Ключевые слова (''Своб.индексиров.''): cybersecurity--information--ranking--security--threats--захист інформації--кібербезпека--ранжування--соціально-економічна система--защита информации--кибербезопасность
Аннотация: The main purpose of the study is to rank certain threats in order to establish further costs for ensuring the protecting of information in the cybersecurity system. Research methodology is a set of methods that form a methodological approach. The main ones are the ranking method through the theory of fuzzy relations and the expert-step method. As a result, due to the ranking of the threats of the selected object, the permissible intensity of the decrease in the level of security and the costs of its provision were determined using the proposed methodology. The results obtained implied the use of modern ranking methods according to the given parameters. In our case, the results obtained allowed us to rank the existing list of threats in the cybersecurity system. The benefit of such results lies in the formation of an information basis for the adoption and implementation of management decisions.The study is limited by selecting only one socio-economic system and its information. The results obtained out in the article have practical and scientific value through a methodical approach to form requirements for the security of the cybersecurity system itself and information of a single object. In the future, more complex socio-economic systems and their cybersecurity should be chosen to apply the methodological approach proposed in the article.
Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus
Найти похожие
8.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Orlovskyi, Ruslan, Kharytonov, Sergiy, Samoshchenko, Igor, Us, Olha, Iemelianenko, Volodymyr
Заглавие : Countering Cybercrime Under Martial Law
Место публикации : Journal of Cyber Security and Mobility. - 2023. - Vol. 12, Iss. 6 . - P.893-910
Примечания : References : p. 905-907
УДК : 343.97:004]“364”
Ключевые слова (''Своб.индексиров.''): countering cybercrime--cyberattack--cybercrime--cyberspace--martial law--протидія кіберзлочинності--кібератака--кіберзлочинність--кіберпростір--військовий стан
Аннотация: To date, it is impossible to imagine your life without all kinds of gadgets, the Internet and social networks. The active using of social networks has long been carried out by all state bodies in order to cause confidence of the population to their actions, to see feedback in the format of comments, as well as to show people all topical processes. It is also important to note that Ukraine is an advanced state in the field of electronic document circulation, and therefore almost all processes, starting from the activities of banking institutions and ending with the activity of air and railway transport are carried out by automated electronic systems. Accordingly, the coordinated and uninterrupted functioning of all of the above is due to the stability of cyberspace. In connection with Russia's attack the information space became the second battlefield. Cyberattacks and official state sites hacking was immediately started, there were active attempts to abduct electronic data of banking institutions and private enterprises. The relevance of this article is determined by it, because a detailed analysis of the characteristic features of cybercrime, the search for methods and mechanisms of countering cybercrime in the conditions of war are the primary tasks and contribution to victory. The purpose of the article is to analyze the current state of countering cybercrime and varieties of cybercrime, to identify features and characteristics of cybercrime, as well as to make proposals for improving the current legislation in this area. The study used the following methods: analysis and synthesis, legal, static, systemic and formal-legal methods, method of interpretation of law. The conclusions, which we will make, can be a basis for further improvement of legislation, research and discussions between theorists and practitioners.
Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus
Найти похожие
9.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Holovkin, Bohdan, Cherniavskyi, Serhii, Tavolzhanskyi, Oleksii
Заглавие : Factors of cybercrime in Ukraine
Место публикации : Relacoes Internacionais no Mundo Atual. - 2023. - Vol. 3, No. 41. - P.464-488
Примечания : References : p. 485-488
УДК : 343.3:004.056
Ключевые слова (''Своб.индексиров.''): criminal market--cyber vulnerabilities--electronic communications--factors of cybercrime--hacker groups--russian cyber aggression--кримінальний ринок--кіберуразливості--електронні комунікації--чинники кіберзлочинності--хакерські групи--російська кіберагресія
Аннотация: The relevance of the research topic is determined by the need to form a holistic scientific approach to explaining the factors of cybercrime in the context of the global COVID-19 pandemic, the armed aggression of the Russian Federation against Ukraine, the accelerated digital transformation of the economy and society, the intensification of hybrid cyber threats, and the existence of a general upward trend in cybercrime. The purpose of the article is to identify, analyse and classify the factors of cybercrime, and to assess their impact on the level of cyberattacks and cybercrime. To achieve this goal, the author uses general scientific methods of cognition (system analysis, classification, synthesis, comparison) and special methods of criminological research (document study, factor analysis, statistical methods, expert opinions). It is found that the most significant impact on the growth of cybercrime is exerted by political (geopolitical and military-political), economic, socio-cultural, socio-psychological, technological factors, which are expressed in the escalation of geopolitical struggle, Russia's use of cyber means to gain an information advantage in the war against Ukraine, and functioning in the dark web of the criminal market of goods and services, insufficient social control over the digital environment, increased connectivity, ease of cyberattacks, low income, social exclusion, informal norms and values, opportunistic attitudes, criminogenic stereotypes of thinking and behaviour in cyberspace during electronic communications and online business. It is stated that favourable conditions for committing cybercrime are the depletion of resources and overload of cybersecurity entities of Ukraine due to the protracted war, vulnerabilities in computer and mobile device software, shortcomings in the cyber security system of public and private information resources, critical infrastructure facilities, and users' non-compliance with the rules of safe behaviour.
Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus
Найти похожие
10.

Вид документа : Статья из журнала
Шифр издания : 681.32:007.5/Y47
Автор(ы) : Yevseiev, Serhii, Milov, Oleksandr, Opirskyy, Ivan, Dunaievska, Olha, Huk, Oleksandr, Pogorelov, Volodymyr, Bondarenko, Kyrylo, Zviertseva, Nataliia, Melenti, Yevgen, Tomashevsky, Bogdan
Заглавие : Development of a concept for cybersecurity metrics classification
Место публикации : Eastern-European Journal of Enterprise Technologies. - 2022. - Vol. 4, No. 4 (118). - P.6-18
УДК : 681.32:007.5
Ключевые слова (''Своб.индексиров.''): security assessment model--security metrics--security metrics classifier--threat synergy--безпека--кібербезпека--синергія загроз--кибербезопасность--синергия угроз
Аннотация: The development of the IT industry and computing resources allows the formation of cyberphysical social systems (CPSS), which are the integration of wireless mobile and Internet technologies and the combination of the Internet of things with the technologies of cyberphysical systems. To build protection systems, while minimizing both computing and economic costs, various sets of security profiles are used, ensuring the continuity of critical business processes. To assess/compare the level of CPSS security, various assessment methods based on a set of metrics are generally used. Security metrics are tools for providing up-to-date information about the state of the security level, cost characteristics/parameters from both the defense and attack sides. However, the choice of such sets is not always the same/understandable to the average person. This, firstly, leads to the absence of a generally accepted and unambiguous definition, which means that one system is more secure than another. Secondly, it does not take into account the signs of synergy and hybridity of modern targeted attacks. Without this knowledge, it is impossible to show that the metric measures the security level objectively. Thirdly, there is no universal formal model for all metrics that could be used for rigorous analysis. The paper explores the possibility of defining a basic formal model (classifier) for analyzing security metrics. The proposed security assessment model takes into account not only the level of secrecy of information resources, the level of provision of security services, but also allows, based on the requirements put forward, forming the necessary set of security assessment metrics, taking into account the requirements for the continuity of business processes. The average value of the provision of security services to CPSS information resources is 0.99, with an average value of the security level of information resources of 0.8
Текст англ. - 0 байт
Текст англ.,
Текст рос. - 0 байт
Текст рос.
Найти похожие
11.

Вид документа : Однотомное издание
Шифр издания : DOI: 10.15587/978/M78-797934
Автор(ы) : Yevseiev, Serhii, Hryshchuk, Ruslan, Molodetska, Kateryna, Nazarkevych, Mariia, Melenti, Yevgen
Заглавие : Modeling of security systems for critical infrastructure facilities : monograph
Выходные данные : Б.м., 2022
Колич.характеристики :181 p.
ISBN, Цена 978-617-7319-57-2 (on-line): Б.ц.
ISBN, Цена 978-617-7319-56-5 (print): Б.ц.
УДК : 004.056
Ключевые слова (''Своб.индексиров.''): concept of a multi-loop security system--post-quantum security mechanisms--socio-cyber-physical systems--кібербезпека--система безпеки--критична інфраструктура--багатоконтурна система безпека--інформаційна безпека--соціальна інженерія
Аннотация: The development of Industry 4.0 technologies is based on the rapid growth of the computing capabilities of mobile wireless technologies, which has made it possible to significantly expand the range of digital services and form a conglomeration of socio-cyber-physical systems and smart technologies. The First Section discusses the issues of building security systems based on the proposed Concept of multi-contour security systems, taking into account the hybridity and synergy of modern targeted cyber-attacks, their integration with social engineering methods. This approach not only increases the level of security, but also forms an objective approach to the use of post-quantum security mechanisms based on the proposed Lotka-Volterra models. The Second Section analyzes the features of the functioning of social Internet services and establishes their role in ensuring the information security of the state. An approach is proposed to identify signs of threats in the text content of social Internet services, which will allow to quickly respond to changing situations and effectively counteract such threats. A classifier of information security profiles of users of social Internet services has been developed to assess the level of their danger as potential participants in disinformation campaigns. A method for identifying and evaluating the information and psychological impact on user communities in services is proposed. Models of conflict interaction of user groups in social Internet services are considered on the example of civil movements. To effectively counter threats to information security of the state, it is proposed to use the concept of synergistic user interaction and self-organization processes in a virtual community. Particular attention is paid to countering the manipulation of public opinion in the decision-making process by users of social Internet services. The Third Section proposes a biometric security system that works to authenticate users based on a comparison of their fingerprints and certain templates stored in a biometric database. A method for determining the contour based on the passage of a curve and the filtering function of contour lines has been developed. The stage of skeletal identification is analyzed in detail. The Ateb-Gabor method with wave thinning has been developed. The performance of skeletal algorithms such as the Zhang-Suen thinning algorithm, the Hilditch algorithm, and the Ateb-Gabor method with wave decimation is analyzed. The presented results of experiments with biometric fingerprints based on the NIST Special Database 302 database showed the effectiveness of the proposed method. The software and firmware were developed using the Arduino Nano.
Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus
Найти похожие
12.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Getman, Anatolii P., Danilyan, Oleg G., Dzeban, Aleksander P., Kalynovskyi, Yurii Yuriiovych
Заглавие : Modern ontology: reflection on the continuity of cyberspace and virtual reality
Параллельн. заглавия :Ontología moderna: reflexión sobre la continuidad del ciberespacio y realidad virtual
Место публикации : Revista de Filosofia. - 2022. - Vol. 39, № 102. - P.78-94
УДК : 141.12:004
Ключевые слова (''Своб.индексиров.''): cyberspace--computer technologies--information processes--internet space--virtual reality--комп'ютерні технології--кіберпростір--інформаційні процеси--інтернет-простір--віртуальна реальність--філософія--онтологія--соціальнa філософія--компьютерные технологии--киберпространство--информационные процессы--интернет-пространство--виртуальная реальность--социальная философия--философия--онтология
Аннотация: The article demonstrates that information and communication technologies, which are actively implemented in modern life, have no analogues in the past. Reality, characterized by the concept of “cyberspace”, has become one of the main factors of sociocultural reality, a special living environment with which all spheres of public life are connected − economic, social, political, spiritual. Modernity is characterized by the emergence of electronic virtual reality, which significantly changes the language, bringing in new elements of communication. Today, the Internet in some way is a global information space that unites all existing telecommunications and information networks. It is stated that the formation of global information networks has become a direct consequence of computer technology, so the global information space is primarily cybernetic (computer) in nature. The question is raised about the spatial and temporal characteristics of virtual reality and their ontological substantiation, because cyberspace presupposes the existence of a certain world, characterized by the length and metrics represented in consciousness. The thesis about the sociality of cyberspace is substantiated. It is shown that cyberspace is artificially maintained and developed by real space, so it is concluded that it is impossible and inexpedient to study it as an independent phenomenon.
Текст - 0 байт
Текст
Найти похожие
13.

Вид документа : Однотомное издание
Шифр издания : DOI: 10.15587/978/S98-711876
Автор(ы) : Yevseiev S., Ponomarenko V., Laptiev O., Milov O., Korol O., Melenti, Yevgen
Заглавие : Synergy of building cybersecurity systems : monograph
Выходные данные : Kharkiv: PC TECHNOLOGY CENTER, 2021
Колич.характеристики :175 p.
ISBN, Цена 978-617731931-2: Б.ц.
ISBN, Цена 978-617731932-9: Б.ц.
УДК : 004.056
Ключевые слова (''Своб.индексиров.''): algebraic geometric codes--classifiers of cyber threats--crypto-code constructions--cybersecurity--modeling of conflict-cooperative interaction--алгебраїчні геометричні коди--класифікатори кіберзагроз--конструкції криптокоду--кібербезпека--моделювання конфліктно-кооперативної взаємодії
Аннотация: The development of the modern world community is closely related to advances in computing resources and cyberspace. The formation and expansion of the range of services is based on the achievements of mankind in the field of high technologies. However, the rapid growth of computing resources, the emergence of a full-scale quantum computer tightens the requirements for security systems not only for information and communication systems, but also for cyber-physical systems and technologies. The methodological foundations of building security systems for critical infrastructure facilities based on modeling the processes of behavior of antagonistic agents in security systems are discussed in the first chapter. The concept of information security in social networks, based on mathematical models of data protection, taking into account the influence of specific parameters of the social network, the effects on the network are proposed in second chapter. The nonlinear relationships of the parameters of the defense system, attacks, social networks, as well as the influence of individual characteristics of users and the nature of the relationships between them, takes into account. In the third section, practical aspects of the methodology for constructing post-quantum algorithms for asymmetric McEliece and Niederreiter cryptosystems on algebraic codes (elliptic and modified elliptic codes), their mathematical models and practical algorithms are considered. Hybrid crypto-code constructions of McEliece and Niederreiter on defective codes are proposed. They can significantly reduce the energy costs for implementation, while ensuring the required level of cryptographic strength of the system as a whole. The concept of security of corporate information and educational systems based on the construction of an adaptive information security system is proposed.
Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus
Найти похожие
14.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Yevseiev, Serhii, Ryabukha, Yurii, Milov, Oleksandr, Milevskyi, Stanislav, Pohasii, Serhii, Ivanchenko, Yevheniia, Ivanchenko, Ihor, Melenti, Yevgen, Opirskyy, Ivan, Pasko, Igor
Заглавие : Development of a method for assessing forecast of social impact in regional communities
Место публикации : Eastern-European Journal of Enterprise Technologies. - 2021. - Vol. 6, Iss. 2 (114). - P.30-43
УДК : 004.056:004.738.5(045)
Ключевые слова (''Своб.индексиров.''): models of influence--rating of political parties--regional society--social networks--socio-cyber-physical system--моделі впливу--рейтинг політичних партій--регіональне товариство--соціальні мережі--соціально-кібер-фізична система--модели влияния--рейтинг политических партий--региональное общество--социальные сети--социо-кибер-физическая система
Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст
Найти похожие
15.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Nizovtsev, Yuriy Yu., Parfylo, Oleg A., Barabash, Olha O., Kyrenko, Sergij G., Smetanina, Nataliia V.
Заглавие : Mechanisms of money laundering obtained from cybercrime: the legal aspect
Место публикации : Journal of money laundering control. - 2021. - С. Ранний доступ
УДК : 343.9
Ключевые слова (''Своб.индексиров.''): відмивання грошей--кіберзлочинність--кіберпростір--міжнародне право--міжнародна злочинність--отмывание денег--киберпреступность--киберпространство (кибернетическое пространство)--cyber laundering--cybercrime--cyberspace--international law--international organizations--money laundering
Аннотация: Purpose: The use of computer technology to commit cyber laundering increases their social danger, creates new ways to commit cyber laundering, causes the masking of traces of cyber laundering and expands the geography of cyber laundering, while eliminating traditional state borders. That is why, the researched problems have a high level of relevance. The purpose of this research is to promote the spread of international standards in the field of combating money laundering, as well as an analysis of the mechanisms of money laundering obtained from cybercrime. Design/methodology/approach: The leading methods that were used in the article for the purpose of conducting research were a number of general scientific methods, such as analysis and synthesis, deduction, induction, forecasting, modeling, analogy and a number of special methods of study and cognition, which include comparative legal, historical legal, formal legal and structural functional methods. Findings: The main results prospects for further research and the applied value of the material. Large-scale cyber laundering of illegal income has long become a global problem that requires a solution from all states of the world, which means that these problems can only be overcome through active interstate cooperation. Originality/value: The article analyzes inter alia the international legislation in the field of money laundering mechanisms obtained from cybercrime and examines the activities of international organizations in this area.
Анотація - 0 байт
Анотація
Найти похожие
16.

Вид документа : Статья из журнала
Шифр издания : 323.2:007/T37
Автор(ы) : Teremetskyi, Vladyslav, Tokarieva, Kseniia, Dziuba, Iurii, Shelukhin, Nikolay, Predmestnikov, Oleh, Parpan, Ulyana
Заглавие : Combatting Disinformation And Cyber Threats In The European Union And United States: Lessons For Ukraine
Место публикации : Journal of Legal, Ethical and Regulatory Issues. - 2021. - Vol. 24, Spec. Iss. 1. - P.1-10
УДК : 323.2:007
Ключевые слова (''Своб.индексиров.''): hybrid war--cyber threats--disinformation--infodemia--information security--information society--mass media--misinformation--гібридна війна--кіберзагрози--дезінформація--інфодемія--інформаційна безпека--інформаційне суспільство--засоби масової інформації (змі)--гибридная война--киберугроза--дезинформация--инфодемия--информационная безопасность--информационное общество--средства массовой информации (сми)
Аннотация: The article analyzes the main means of counteracting misinformation, disinformation and cyber threats used by the European and international communities. It is determined that the main challenges of our time, which exacerbate the problem of disinformation, are Russia's information policy and the COVID-19 pandemic. The main institutions and regulations of Europe, which are aimed at overcoming the spread of false information in the media, are analyzed. The experience of France is mentioned, which created a powerful legal mechanism to prevent misinformation and combat its manifestations. The current state of US information security and the effectiveness of the US policy of combating disinformation are described. Special attention is paid to the issues of media and cyber education of the population. The latest trends in the institutionalization of countering misinformation and disinformation in Ukraine and ways to improve the strengthening of information security in the country are studied. It is established that Ukraine, as a direct participant in the information war, is obliged to support and involve at the national level European initiatives to strengthen information security and cyber security. The first steps include updating the legislation on information, increasing the role of information security in national security acts, approving the Strategy for Counteracting Disinformation and the Strategy for Ensuring Information Security, and institutionalizing the fight against misinformation and disinformation.
Текст - 0 байт
Текст
Найти похожие
17.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Marcinauskaite, Renata, Razmetaeva, Yulia
Заглавие : Privacy protection in the digital age: a criminal law perspective
Место публикации : International Comparative Jurisprudence. - 2021. - Vol. 7, Iss. 2. - P.153-168
УДК : 343.4
Ключевые слова (''Своб.индексиров.''): digital age--eu privacy approach--inviolability of privacy--lithuanian privacy approach--principle of equivalent treatment--privacy--ukrainian privacy approach--us privacy approach--цифрова епоха--кіберпростір--конфіденційність--недоторканність приватного життя--кримінальна відповідальність--цифровая эпоха--конфиденциальность--неприкосновенность личной жизни--киберпространство (кибернетическое пространство)--уголовная ответственность
Аннотация: Privacy as a fundamental right faces considerable challenges as people’s activities have moved into cyberspace. The development of technology has had an impact on a various areas related to personal privacy. This article discusses changes to the concept of privacy in the digital age, presents approaches to privacy issues in the law of the European Union (EU) and United States (US) today, and reveals the aspects of privacy protection in criminal law based on the relevant Lithuanian case law and Ukrainian law. This analysis showed that legal regulation and practice must be adapted to the changed situation. The use of technology has created new ways of committing serious privacy violations; therefore, criminal law must be ready to properly respond to the changing nature of crimes against personal privacy in the digital age.
Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст
Найти похожие
18.

Вид документа : Статья из сборника (однотомник)
Шифр издания : 343.34:004.7/M70
Автор(ы) : Milov, Oleksandr, Melenti, Yevgen, Milevskyi, Stanislav, Pohasii, Serhii, Yevseiev, Serhii
Заглавие : Cyber Terrorism as an Object of Modeling
Место публикации : CEUR Workshop Proceedings: Proceedings of the 3rd International Conference on Information Security and Information Technologies (ISecIT 2021), co-located with 1st International Forum "Digital Reality" (DRForum 2021), Odesa, Ukraine, September 13-19, 2021. - Odesa, 2021. - Vol. 3200: Information Security and Information Technologies, ISecIT 2021. - P.204-210
УДК : 343.34:004.7 + 004.7:343.34
Ключевые слова (''Своб.индексиров.''): cyber terrorism--cyberspace--кібертероризм--кіберзагроза--кіберпростір--кибертерроризм (компьютерный терроризм)--киберугроза
Аннотация: The article examines issues related to the characteristics of cyber terrorism, as well as related concepts of terrorism and cyberspace. The definitions of these concepts are given. The types of cyber threats directly related to cyber terrorism are identified. The differences and similarities of the mentioned cyber threats are described. A structure that reflects the main features of cyber terrorism, which should be included in the model of cyber terrorism is presented.
Текст - 0 байт
Текст
Найти похожие
19.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Holovkin, Bohdan M., Tavolzhanskyi, Oleksii V., Lysodyed, Oleksandr V.
Заглавие : Corruption as a Cybersecurity Threat in the New World Order
Место публикации : Connections. - 2021. - Vol. 20, Iss. 2. - P.75-87
УДК : 343.85 + 343.35:35.08
Ключевые слова (''Своб.индексиров.''): corruption--covid-19 pandemic--cybersecu-rity threats--cybersecurity--fight against corruption--post-pandemic conditions--корупція--пандемія covid-19--загрози кібербезпеці--кібербезпека--боротьба з корупцією--коррупция--борьба с коррупцией--пандемия covid-19--кибербезопасность
Аннотация: The important topic of cybersecurity relative to the fight against corruption in the context of global challenges in the pandemic and post-pandemic world requires further research. The purpose of this article is to identify and analyze current and prospective cybersecurity issues in this context by applying general-scientific and special-legal methods of cogni-tion. Using the dialectical method, theoretical background, and contempo-rary views on ensuring cybersecurity served to investigate the key current challenges. Formal-legal and comparative methods allowed to recommend measures to enhance cybersecurity in view of the massive digitalization and social transformations. The authors emphasize the need to establish a national cybersecurity policy based on society’s information literacy and culture, combining respect to traditional and historical values with a mod-ern understanding of multicultural communication and well-being.
Текст - 0 байт
Текст
Найти похожие
20.

Вид документа : Однотомное издание
Шифр издания :
Автор(ы) : Yevseiev S., Milov O., Milevskyi S., Voitko O., Kasianenko M., Melenti Y., Pohasii S., Stepanov H., Turinskyi O., Faraon S.
Заглавие : Development and analysis of gametheoretical models of security systems agents interaction
Место публикации : Eastern-European Journal of Enterprise Technologies. - 2020. - Vol. 2. Issue 4. - P.15-29
УДК : 007
ББК : З81
Ключевые слова (''Своб.индексиров.''): game theory--теория игры--теорія гри--cybersecurity--кибербезопасность--кібербезпека--stackelberg games--игры штакельберга--ігри штакельберга--nash games--нэш игры--неш ігри--game equilibrium--игровое равновесие--ігрова рівновага--strategy--стратегия--стратегія
Аннотация: A game-theoretic approach is presented, which claims to be a universal method for solving most problems in the field of cybersecurity. As arguments to confirm the superiority of game theory, mathematical validity and provability of the optimality of decisions made, unlike the widely used heuristics, the possibility of developing reliable protection based on analytical results, ensuring a timely response to cyberattacks in conditions of limited resources, as well as distributed nature of decision making are highlighted. The definitions of the basic concepts used in security tasks based on game-theoretic models are introduced. The features of the application of game theory methods in the field of cybersecurity are listed and the limitations of research in this area are formulated, namely: a restriction on game strategies, simultaneous moves of players in the behavior patterns of security system agents, uncertainty in the time the players take the move, uncertainty in the final goal of the enemy, unpredictability of further player moves, lack of players’ assessment of enemy resources. as well as its ultimate goals, the inability to timely assess the current state of the game. The game-theoretic models are aligned with the listed security problems, and the main solutions obtained as a result of using the corresponding models are also determined. Many methods of game theory have been formed, for each of which a relationship is determined between the game model, its scope, simulation result and security services that the method under consideration supports. The limitations of the classical representation of game theory models are determined, the need to overcome which follows from the requirements for providing basic security services. Such limitations include: the ability of the defender to detect attacks, the certainty of the probabilities of a change of state before the start of the game, the synchronism of the players’ moves, the inability to scale the model due to the size and complexity of the system under consideration. Models of the main tasks of the interaction of antagonistic agents of security systems have been developed. The resulting models made it possible to obtain solutions to two of the most common tasks in the field of cybersecurity, namely, the interaction of the system administrator and the attacker in organizing the protection of information resources. The tasks are solved for various conditions – the game matrix contains cost estimates of resources and the matrix reflects the probability of threat realization. Pure and mixed strategies are defined for various initial conditions, which allows to exclude from the consideration strategies that are not included in the solution. A synergistic approach to the use of game-theoretic modeling was formed taking into account the behavior of agents of security systems, based on an analysis of the diversity and characteristics of game-theoretic models, their inherent limitations and scope
Текст - 0 байт
Текст,
Текст - 0 байт
Текст
Найти похожие
 1-20    21-23 
 

Умовні позначення місця знаходження

3_пов.(ЗПІ) – зала правової інформації, НБК

4_пов.(НАб) – абонемент наукової літератури, НБК

4_пов.(ДБФ) – довідково-бібліографічний фонд, НБК

5_пов.(З/П) – зала періодичних видань, НБК

6_пов.(АХЛ) – абонемент художньої літератури, НБК

6_пов.(ЗІЛ) – зала літератури іноземними мовами, НБК

7_пов.(Хр) – книгосховище, НБК

8_пов.(РК) – книгосховище рідкісних видань та дисертацій, НБК

НБВ – інформаційно-бібліографічний відділ, НБК, 7 поверх

Ст.Аб. – студентський абонемент, НБК, 5 поверх

Філ №1 – філія № 1 (вул. Динамівська, 4)

Філ №2 – філія № 2 (вул. Григорія Сковороди, 106)

Полт. фак. – Полтавський юридичний інститут, м. Полтава