The protection of cultural heritage is an important element of a country’s cultural policy. The article describes the nature of threats posed by armed conflicts to cultural heritage and the destruction of Ukrainian cultural property by Russian aggression in 2022. The article aims at discussion of the consequences of Russia’s deliberate destruction of Ukrainian cultural heritage and offers an interdisciplinary insight into protection of cultural heritage during the contemporary armed conflict. These initial observations from Russian aggression against Ukraine serve as a starting point for a discussion on challenges related to the protection of cultural heritage during a potential armed conflict in Central and Eastern Europe. Drawing on practical observations from Ukraine, the article calls for improvements to the protection of cultural heritage in Poland.
The methodological foundations of the formation of analytical support for public administration of cybersecurity have been improved. Based on a combination of hierarchical and non-hierarchical clustering methods using the IBM SPSS Statistics package, the country’s regions have been grouped into four clusters, which is the basis for adjusting the priorities of the state cybersecurity policy, a well-grounded approach when choosing means and instruments of influence at the regional level. In modern doctrine and practice of international law, the issues of qualification of cyber warfare remain controversial. There are approaches to justify the application of international humanitarian and criminal law. The most justified, in our opinion, is the qualification of cyber warfare as a violation of the UNO Charter and the use of force, and in some cases – the crime of aggression. The substantive rules of the institution of international cooperation in the fight against cybercrime determine the special principles of this kind of cooperation, the criminalization of certain types of illegal acts, as well as institutional mechanisms and capacity building. The system of international combating cybercrime is based on the principles of technical neutrality, multi-stakeholderism (public-private partnerships), as well as the equivalence of human rights online and offline. In the future, cybercrime will be associated with the use of innovative technologies. As it has been established by the example of the Internet of things, the latest technology, as a general rule, is included in the scope of existing international agreements on cybercrime, but there is no special regulation for them. We propose formal consolidation of the provision on “emergent technologies” in the texts of international legal acts in the field of combating cybercrime. First of all, this concerns the future UNO Convention on the fight against cybercrime, which should also provide for an additional body, such as the T-CY Committee under the Council of Europe Convention, which will provide clarification on the application of the agreement in specific changed circumstances.
The authors have investigated the features of legal support for cybersecurity in some of the leading countries of the world, have established the organizational basis for its support, as well as the main aspects of NATO and the EU’s activities and standards in this area. In particular, the essence of the concept of cybersecurity is determined by referring to the views of both foreign scientists and Ukrainian scientists, and fixing this definition in normative documents of international importance (international standard ISO/IEC 27032:2012). Actual strategic goals in the direction of ensuring cybersecurity in countries such as France, the UK, the United States, as well as the settlement of these issues at the legislative level in Ukraine are highlighted. It has been established which state bodies operate in the indicated countries, whose powers include ensuring cybersecurity. Attention is paid to the settlement of cybersecurity and cyber protection issues at the international level, in particular at the EU and NATO levels. Particular attention is paid to NATO standards – TEMPEST. The content of the norms of the current legislation of Ukraine in the field of ensuring cybersecurity and the nature of the priority tasks of the National Cyber Security Coordination Center under the National Security and Defense Council of Ukraine are disclosed, which are normatively enshrined in the relevant Regulation. The features of the regulatory and organizational support of cybersecurity in some leading countries of the world and in Ukraine are structured.
Security of societies has become one of urgent issues in contemporary world. Too frequently we started encountering one or another form of malicious behavior, criminal activities or terrorism. New and complex threats highlight the need for further synergies and closer cooperation at all levels. Awareness, preparedness and resilience of societies emerge as key preconditions of further secure and sustainable economic development and general well-being. A special attention in those conditions has to be paid to development of theoretically grounded approach to protection of critical infrastructure (CIP), damage or disruption of which can be immensely harmful to unprepared and therefore vulnerable institutions and society. The aim of this paper is to lay theoretical foundations for theoretically grounded approach towards research in CIP area, in order to formulate, ultimately, an approach towards action, which, employing leadership societal stakeholders would allow to enhance awareness of society actors about the threats, i.e, to develop ability to recognize, prevent, and, in case of disaster, to resist to consequences of critical infrastructure infringement. Hence, enhanced resilience of society to critical infrastructure infringement is and ultimate goal of fostering of leadership for critical infrastructure protection.
Lately a lot of attention has been given to legal regulation of cybersecurity. This article will review legal regulation of cybersecurity in Lithuania. Historical retrospective of legal regulation of cybersecurity in Lithuania will be discussed, strategic Lithuanian cybersecurity documents will be analysed, and the Law on Cybersecurity of the Republic of Lithuania will be analysed and evaluated. After a comparative analysis of cybersecurity strategies and laws and a review of legal regulation of cybersecurity in Lithuania, gaps of law-making and of other measures were distinguished, and corresponding conclusions were made. The adoption of the new Law on Cybersecurity, which regulates many important institutes, is evaluated positively. But with regard to the current legal regulation on cybersecurity in Lithuania additional measures are necessary (functions of institutions that formulate cybersecurity policy and perform control functions have not been detailed and distinguished, also functions of the Lithuanian national Computer Emergency Response Team (CERT) are not foreseen in the Law on Cybersecurity, etc.).