The methodological foundations of the formation of analytical support for public administration of cybersecurity have been improved. Based on a combination of hierarchical and non-hierarchical clustering methods using the IBM SPSS Statistics package, the country’s regions have been grouped into four clusters, which is the basis for adjusting the priorities of the state cybersecurity policy, a well-grounded approach when choosing means and instruments of influence at the regional level. In modern doctrine and practice of international law, the issues of qualification of cyber warfare remain controversial. There are approaches to justify the application of international humanitarian and criminal law. The most justified, in our opinion, is the qualification of cyber warfare as a violation of the UNO Charter and the use of force, and in some cases – the crime of aggression. The substantive rules of the institution of international cooperation in the fight against cybercrime determine the special principles of this kind of cooperation, the criminalization of certain types of illegal acts, as well as institutional mechanisms and capacity building. The system of international combating cybercrime is based on the principles of technical neutrality, multi-stakeholderism (public-private partnerships), as well as the equivalence of human rights online and offline. In the future, cybercrime will be associated with the use of innovative technologies. As it has been established by the example of the Internet of things, the latest technology, as a general rule, is included in the scope of existing international agreements on cybercrime, but there is no special regulation for them. We propose formal consolidation of the provision on “emergent technologies” in the texts of international legal acts in the field of combating cybercrime. First of all, this concerns the future UNO Convention on the fight against cybercrime, which should also provide for an additional body, such as the T-CY Committee under the Council of Europe Convention, which will provide clarification on the application of the agreement in specific changed circumstances.
The authors have investigated the features of legal support for cybersecurity in some of the leading countries of the world, have established the organizational basis for its support, as well as the main aspects of NATO and the EU’s activities and standards in this area. In particular, the essence of the concept of cybersecurity is determined by referring to the views of both foreign scientists and Ukrainian scientists, and fixing this definition in normative documents of international importance (international standard ISO/IEC 27032:2012). Actual strategic goals in the direction of ensuring cybersecurity in countries such as France, the UK, the United States, as well as the settlement of these issues at the legislative level in Ukraine are highlighted. It has been established which state bodies operate in the indicated countries, whose powers include ensuring cybersecurity. Attention is paid to the settlement of cybersecurity and cyber protection issues at the international level, in particular at the EU and NATO levels. Particular attention is paid to NATO standards – TEMPEST. The content of the norms of the current legislation of Ukraine in the field of ensuring cybersecurity and the nature of the priority tasks of the National Cyber Security Coordination Center under the National Security and Defense Council of Ukraine are disclosed, which are normatively enshrined in the relevant Regulation. The features of the regulatory and organizational support of cybersecurity in some leading countries of the world and in Ukraine are structured.
Security of societies has become one of urgent issues in contemporary world. Too frequently we started encountering one or another form of malicious behavior, criminal activities or terrorism. New and complex threats highlight the need for further synergies and closer cooperation at all levels. Awareness, preparedness and resilience of societies emerge as key preconditions of further secure and sustainable economic development and general well-being. A special attention in those conditions has to be paid to development of theoretically grounded approach to protection of critical infrastructure (CIP), damage or disruption of which can be immensely harmful to unprepared and therefore vulnerable institutions and society. The aim of this paper is to lay theoretical foundations for theoretically grounded approach towards research in CIP area, in order to formulate, ultimately, an approach towards action, which, employing leadership societal stakeholders would allow to enhance awareness of society actors about the threats, i.e, to develop ability to recognize, prevent, and, in case of disaster, to resist to consequences of critical infrastructure infringement. Hence, enhanced resilience of society to critical infrastructure infringement is and ultimate goal of fostering of leadership for critical infrastructure protection.
Lately a lot of attention has been given to legal regulation of cybersecurity. This article will review legal regulation of cybersecurity in Lithuania. Historical retrospective of legal regulation of cybersecurity in Lithuania will be discussed, strategic Lithuanian cybersecurity documents will be analysed, and the Law on Cybersecurity of the Republic of Lithuania will be analysed and evaluated. After a comparative analysis of cybersecurity strategies and laws and a review of legal regulation of cybersecurity in Lithuania, gaps of law-making and of other measures were distinguished, and corresponding conclusions were made. The adoption of the new Law on Cybersecurity, which regulates many important institutes, is evaluated positively. But with regard to the current legal regulation on cybersecurity in Lithuania additional measures are necessary (functions of institutions that formulate cybersecurity policy and perform control functions have not been detailed and distinguished, also functions of the Lithuanian national Computer Emergency Response Team (CERT) are not foreseen in the Law on Cybersecurity, etc.).
This paper examines the reforming process in the coal mining industry in Ukraine and analyses reform outcomes which a gradualist approach adopted to recover the industry has delivered. Ukraine’s gradualist approach is addressed in the paper narrowly through the lens of rent seeking, established in the coal industry in Ukraine in the 1980s, which persisted and stretched across the highest tiers of the government after the country gained independence. By now, reform achievements turned to be much less fruitful than in other countries - proponents of gradualism, first of all CEE and FSU countries. Detailed analysis of strategic documents which define development of the coal mining sector, reveal inconsistencies all of which lead us to the conclusion that the recent reform attempts are not purposed, in fact, towards implementation unlike declared. Strategic documents are not timely consistent when it comes to defining stages of the coal mining reform and a clear implementation timeline, not speaking about agreement on all major reforming steps to be undertaken.