КІБЕРБЕЗПЕКА В ЄС ТА КРАЇНАХ-ЧЛЕНАХ: ГЕНЕЗИС ТА ПРОБЛЕМИ ЇЇ ПІДВИЩЕННЯ
Keywords:
cybersecurity, cyber resilience, regulatory instruments, EU legislation, innovationsAbstract
The article deals with the issues of establishing cybersecurity in the EU and its member-states at the legislative level as viewed from the point of a systematic approach. The authors identified problematic aspects of improving cybersecurity quality and conditions. They analyzed the impact of the EU member states legislation on cybersecurity. The article as well considers the process of ICT development and presents the ways of creating new challenges by means of new technologies.
References
Василенко М. Підвищення стану кібербезпеки інформаційно-комунікаційних систем: якість в контексті удосконалення інформаційного законодавства / М. Василенко // Юридичний вісник. – 2018. – № 3. – С. 17–24.
Василенко М. Якість кібербезпеки інформаційно-комунікаційних систем (ІКС) та деякі законодавчі питання щодо її підвищення / М. Василенко // Юридичний вісник. – 2018. – № 4.
Резолюція Генеральної Асамблеї ООН «Створення глобальної культури кібербезпеки» від 20 грудня 2002 р. № 57/239 [Електронний ресурс]. – Режим доступу : http://www.un.org/ru/ga/second/57/ second_res.shtml.
Женевська декларація принципів від 12 грудня 2003 р. [Електронний ресурс]. – Режим доступу : http://www.rada. gov.ua.
Туніська програма для інформаційного суспільства від 18 листопада 2005 р. [Електронний ресурс]. – Режим доступу : https://informationsociety.wordpress.com/ basics/wsis_outcomes/tp/.
About ENISA / European Union Agency for Network and Information Security [Електронний ресурс]. – Режим доступу : https://www.enisa.europa.eu/about-enisa.
Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace: adopted by the European Commission on 7 February 2013 / European Union [Електронний ресурс]. – Режим доступу : https://ec.europa.eu/digital-singlemarket/ en/news/eu-cybersecurity-plan-protect-open-internet-and-online-freedom-and-opportunity-cybersecurity.
Законодавство та стратегії у сфері кібербезпеки країн Європейського Союзу, США, Канади та інших [Електронний ресурс]. – Режим доступу : https://clck.ru/ FEMKX.
EU cybersecurity initiatives working towards a more secure online environment / European Union [Електронний ресурс]. – Режим доступу : https://clck.ru/FEMKo.
Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union // Official Journal of the European Union. – 2016. – L. 194. – P. 1–30.
Tauwhare, R. (2016). Improving cybersecurity in the European Union: the Network and Information Security Directive. Journal of Internet Law, 19(2), 1–12.
The EU’s Revised Cybersecurity Strategy [Електронний ресурс]. – Режим доступу : https://www.swp-berlin.org/ fileadmin/contents/products/comments/ 2017C47_bdk_etal.pdf.
Proposal for a regulation of the European Parliament and of the Council on ENISA, the «EU Cybersecurity Agency», and repealing Regulation (EU) 526/2013, and on Information and Communication Techno¬logy cybersecurity certification («Cybersecurity Act») [Електронний ресурс]. – Режим доступу : https://clck.ru/FEMLA.
Renewed Cybersecurity Strategy: European Parliament and Council Joint Communication ‘Resilience, Deterrence and Defence: Building strong cybersecurity for the EU’ (JOIN (2017) 450) [Електронний ресурс]. – Режим доступу : https://clck.ru/ FEMLM.
Commission Proposal for a Cyber¬security Act: Proposal for a Regulation on ENISA, the «EU Cybersecurity Agency», and on Information and Communication Technology cybersecurity certification («Cybersecurity Act») – COM (2017) 477 [Електронний ресурс]. – Режим доступу : https:// clck.ru/FEMLa.
Saleem M. Q., Jaafar J., Hassan M. F. Model driven security frameworks for addressing security problems of Service Oriented Architecture // 2010 International Symposium on Information Technology. – IEEE, 2010. – Т. 3. – С. 1341–1346.
Benet J. Ipfs-content addressed, versioned, p2p file system // arXiv preprint arXiv: 1407.3561. – 2014.
Rogers M., Bhatti S. How to disappear completely: A survey of private peer-to-peer networks // RN. – 2007. – Т. 7. – № 13. – С. 1.
Huang K., Siegel M., Stuart M. Systematically Understanding the Cyber Attack Business: A Survey // ACM Computing Surveys (CSUR). – 2018. – Т. 51. – № 4. – С. 70.
Stahl W. M. The uncharted waters of cyberspace: applying the principles of international maritime law to the problem of cybersecurity // Ga. J. Int’l & Comp. L. – 2011. – Т. 40. – С. 247.
Moore M., Tambini D. (ed.). Digital dominance: the power of Google, Amazon, Facebook, and Apple. – Oxford University Press, 2018.
Simon P. The age of the platform: How Amazon, Apple, Facebook, and Google have redefined business. – BookBaby, 2011.
Haucap J., Heimeshoff U. Google, Facebook, Amazon, eBay: Is the Internet driving competition or market monopolization? // International Economics and Economic Policy. – 2014. – Т. 11. – № 1–2. – С. 49–61.
Petrescu M., Krishen A. S. Analy¬zing the analytics: data privacy concerns. – 2018.
Denley A., Foulsham M., Hitchen B. GDPR: How to Achieve and Maintain Compliance. – Routledge, 2019.
Raul A. C. (ed.). The privacy, data protection and cybersecurity law review. – Law Business Research Limited, 2018.
Furtak A. et al. Bios and secure boot attacks uncovered // The 10th ekoparty Security Conference. – 2014.
Herala A. et al. Strategy for Data: Open it or Hack it? // Journal of Theoretical and Applied Electronic Commerce Research. – 2019. – Т. 14. – № 2. – С. 33–46.
Schmidthuber L., Stütz S., Hilgers D. Outcomes of open government: Does an on¬line platform improve citizens’ perception of local government? // International Journal of Public Sector Management. – 2019.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).