SPECIFIC FEATURES OF NATIONAL AND REGIONAL POLICIES IN CYBER SECURITY
Abstract
The world has a long history of counteracting crime, on-line wars and challenges. Since the public sector has to be ready to respond to cyberattacks, elaboration of practical counteraction measures becomes an urgent task.
The paper considers an organizational mechanism and ways to counteract cyber threats. The international practices of getting public-administrative subjects involved in cyber security activities through a variety of legal acts and operating procedures have been analyzed. The above-mentioned measures are quite varied, which is stipulated by the extent of open access to public information, e-government sophistication, cybercrime incidence, previous experience of fighting cyber threats, as well as public opinion and public involvement.
Information and knowledge about the public sector are created, changed, transferred and expanded to meet the social needs. E-government digitizes certain processes and results, changing them potentially in the ways which are not always predictable or appropriate for either the internal needs of the public sector or public service consumers. Thus, the consequences may be precarious. Therefore, it is expedient to identify the advantages and flaws of e-government and its capacity for counteracting cybercrime in each specific country.
It has been proved that creation of public-private partnerships can become a more effective response of the national and regional policies to cyber security challenges. It is in this format that measures for enhancement of cyberspace cooperation can be used in order to provide a proper component of the national security of Ukraine.
For Ukraine, finding the middle ground among control, openness and security is topical. Under these conditions, both the technicality of the issue and human behaviour should be given an increased attention to. Consideration of the said aspects should lay the basis for creation of public-private partnerships and raise the effectiveness of the national and regional policies in their response to cyber security challenges. It is also important to fully understand the ratio between the cyberthreat-related risks and benefits of using the system chosen to counteract them.
Downloads
References
Prudkui, V.V., Sydorchuk, V.V., Lobodzynska, Т.P. Innovacii v ІТ-menedzhmenti: dopusky ta obmezhennia v procesi vprovadzhennia elektronnogo uriadu v Ukraini [Innovation in ІТ-management: admittances and limitations in the process of introduction of electronic government in Ukraine]. Ekonomichnyi visnyk NTU “КPІ”. URL: http://doi.org/10.20535/2307-5651.15.2018.135689 [in Ukrainian].
Andreasson, K. (2012). Cybersecurity: Public Sector Threats and Responses. CRC Press. Taylor & Francis Group.
Kamarck, E., Nye, J. (2002). Vision of Governance in the 21st Century (Program) Governance.com: democracy in the information age. Brookings Institution Press.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).