CYBERSECURITY AS AN ELEMENT OF DEMOCRATIC CONSOLIDATION: LESSONS FROM KHARKIV REGION
Abstract
In the context of hybrid warfare and targeted information aggression, the issue of cybersecurity is gaining particular importance not only as a technical challenge, but also as a key factor in ensuring national, political and social stability. Cybersecurity is emerging as an important element of democratic development, as information attacks are often aimed at undermining public trust, destabilising local governance and devaluing democratic institutions. The experience of Ukraine, namely the Kharkiv region, is considered as a significant example of how regional communities can withstand complex cyber and information challenges. The example of the Kharkiv region shows not only technical but also a clear political colouring of cyber threats, namely: massive DDoS attacks on public services, hacking of information resources, phishing campaigns, spyware, attacks on local media, active use of bot farms in social networks, i.e. everything that serves as a tool to pressure public opinion, create panic, discredit local governments and spread disinformation.
The article emphasises the particular danger of information campaigns that masquerade as legitimate sources but aim to spread hostile propaganda narratives, reduce the level of critical thinking and create an environment hostile to democratic values. These cyber tools can be aimed at both undermining the electoral process and creating artificial discontent among the population. At the same time, the example of the Kharkiv region demonstrates that with proper coordination between the authorities, law enforcement agencies, media and civil society, it is possible to effectively counter cyber threats. It is concluded that raising the level of digital literacy of the population, building local cyber defence systems, information transparency and engaging citizens in countering disinformation contribute to the formation of a sustainable democracy.
In such conditions, not only technical defenses but also the informational resilience of communities becomes a decisive factor in countering hybrid threats. This approach not only safeguards critical infrastructure but also strengthens public trust in democratic institutions.
Downloads
References
Dubov, D. 2013. Strategic aspects of Ukraine's cybersecurity. Strategic priorities 4: 119–127 (in Ukrainian).
Bukharev, V. V. 2018. Administrative and Legal Principles for Ensuring Cybersecurity in Ukraine: Author's Abstract. dis... Candidate of Legal Sciences: 12.00.07. Sumy: Sumy State University ((in Ukrainian).
Kornienko, B. Security of Information and Communication Systems and Networks: a Textbook for Students of Speciality 125 «Cybersecurity». Kyiv: NAU. (in Ukrainian).
Makarenko, E. 2011. International Cooperation in the Sphere of Information Security: Regional Context. Current Problems of International Relations. URL: http://apir.iir.edu.ua/index.php/apmv/article/view/2116/1879 (in Ukrainian).
Dzyundzyuk, V. 2018. Information warfare as an important component of modern hybrid warfare. Public administration of the 21st century: world practices and national perspectives: XVIII International Scientific Congress «Public administration of the 21st century: world practices and national perspectives». Kharkiv: KharRI NAPU (in Ukrainian).
Kotukh, E. 2020. Electronic government and cybersecurity in social networks: implementation features. Bulletin of the National Center for Public Administration of Ukraine. Series: State Administration 583-591. URL: http://repositsc.nuczu.edu.ua/bitstream/123456789/18688/1/vdu13.pdf (in Ukrainian).
Lyzanchuk, V. 2017. Information Security of Ukraine: Theory and Practice: Textbook. Lviv: Publishing Center of the Ivan Franko National University of Lviv
Motivation of public officials in the implementation of e-government services / V. V. Komarovsky, V. A. Yatsenko, V. I. Bondaruk, O. V. Nyunko, I. V. Komarovsky 2012. Theoretical and applied issues of state building. Issue 10: 373-428. URL: file:///C:/Users/intel/Downloads/tppd_2012_10_27%20(1).pdf
On the decision of the National Security and Defense Council of Ukraine of May 14, 2021 «On the Cybersecurity Strategy of Ukraine»: Decree of the President of Ukraine. URL: https://zakon.rada.gov.ua/laws/show/447/2021#Text
Author’s copyright and licensing.
License Terms: Authors retain copyright and also grant the Journal the right to publish original scientific articles that contain research results and are not under consideration for publication in other issues. All material is licensed under a Creative Commons Attribution License International CC-BY, which allows others to distribute their work with the copyright of this work and recognition of the first publication in this Journal.
If the article is taken for publishing in The Journal of V.N. Karazin Kharkiv National University. “Political Science Issues”, the author must sign a copyright transfer agreement. The agreement is sent by post (original document) or by e-mail (scanned copy of the document) to the Editorial Board of the Journal.
By this agreement the author certifies that the submitted material:
- does not violate the copyrights of other people or organizations;
- has not been previously published in other issues and has not been given for publishing to other issues.
The author gives the editorial board the rights to:
- publish the article in Ukrainian (English) and distribute its printed version;
- translate the article into English (for articles in Ukrainian) and distribute the printed version of the translation;
- distribute the electronic version of the article, as well as the electronic version of the English-language translation of the article (for articles in Ukrainian and Russian), through any electronic means (placing on the official journal web site, in electronic databases, repositories, etc.).
The author reserves the right without the consent of the editorial board and the founders to:
- Completely or partly use the materials of the article for educational purposes.
- Completely or partly use the materials of the article for writing own theses.
- Use the materials of the article to prepare abstracts, conference reports, and oral presentations.
- Post electronic copies of the article (including the final electronic version downloaded from the journal's official website) to:
- personal web-resources of all authors (web sites, web pages, blogs, etc.);
- web-resources of institutions where authors work (including electronic institutional repositories);
- non-profit, open-source web resources (such as arXiv.org).