Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2022.22.5.3

State Management of the Development of National Cybersecurity Systems  

Kryshtanovych, Myroslav (Lviv Polytechnic National University)
Storozhev, Roman (Taras Shevchenko National University of Kyiv)
Malyshev, Kostiantyn (Zhytomyr Polytechnic State University)
Munko, Anna (Dnipropetrovsk State University of Internal Affairs)
Khokhba, Olena (Dnipropetrovsk State University of Internal Affairs)
Publication Information
International Journal of Computer Science & Network Security / v.22, no.5, 2022 , pp. 11-16 More about this Journal
Abstract
The main purpose of the study is to determine the main elements of the state management of the development of national cybersecurity. Cybersecurity ensures the protection of the properties of information resources and the operability of technical and software users and is directed against relevant cyber incidents. Therefore, today it is impossible to ignore the importance of public administration of the processes taking place in it. The methodological support of our study is determined by its goals and objectives and is based on the use of a combination of general scientific and special methods of scientific knowledge, which ensured the completeness and reliability of the results obtained. The article has limitations and concerns the lack of practical implementation of the research results. The study is purely theoretical to reflect the main aspects of the modern system of state management of the development of national cybersecurity. Further research requires an analysis of the world experience of state management of the development of national cybersecurity.
Keywords
State management; National Cybersecurity; cybersecurity; security;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Sylkin, O., Kryshtanovych, M., Bekh, Y., & Riabeka, O. Methodology of forming model for assessing the level financial security . Management Theory and Studies for Rural Business and Infrastructure Development, 2020, 42(3), 391-398. https://doi.org/10.15544/mts.2020.39   DOI
2 Gandhi, R., Sharma, A., Mahoney, W., Sousan, W., Zhu, Q., Laplante, P. Dimensions of cyber-attacks: Cultural, social, economic, and political. IEEE Technology and Society Magazine, 2011, 30(1): 28-38. https://doi.org/10.1109/MTS.2011.940293   DOI
3 Jarvis, L., Macdonald, S., Nouri, L. The cyberterrorism threat: Findings from a survey of researchers. Studies in Conflict & Terrorism, 37(1): 2014, 68-90. https://doi.org/10.1080/1057610X.2014.853603   DOI
4 Luo, H.N. An emergency management system for government data security based on artificial intelligence. Ingenierie des Systemes d'Information, Vol. 25, No. 2, 2020, pp. 207-213. https://doi.org/10.18280/isi.250208   DOI
5 Kryshtanovych, S., Gutsulyak, V., Huzii, I., Helzhynska, T., & Shepitchak, V. Modeling the process of risk management response to the negative impact of risks as the basis for ensuring economic security. Business, Management and Economics Engineering, 2021, 19(2), 289-302. https://doi.org/10.3846/bmee.2021.14798   DOI
6 Kryshtanovych, S., Treshchov, M., Durman, M., Lopatchenko, I., & Kernova, M. Gender parity in public administration in the context of the development of european values in the management system. Financial and Credit Activity: Problems of Theory and Practice, 2021, 4(39), 475-481. https://doi.org/10.18371/.v4i39.241416   DOI
7 Thijittang, S. A study of pragmatic strategies of English of Thai University students: Apology speech acts. University of Tasmania. 2010.https://eprints.utas.edu.au/10754/7/Thijittang_whole_thesis.pdf
8 Gordieiev, O., Kharchenko, V., Illiashenko, O., Morozova, O., Gasanov, M. Concept of using eye tracking technology to assess and ensure cybersecurity, functional safety and usability. International Journal of Safety and Security Engineering, Vol. 11, No. 4, 2011, pp. 361-367. https://doi.org/10.18280/ijsse.110409   DOI
9 Kryshtanovych, M., Petrovskyi, P., Khomyshyn, I., Bezena, I., & Serdechna, I. Peculiarities of implementing governance in the system of social security. Business, Management and Economics Engineering, 2020, 18(1), 142-156. https://doi.org/10.3846/bme.2020.12177 .   DOI
10 Ismail A., Saad M., Abbas R. Cybersecurity in internet of things, Review of Computer Engineering Studies, Vol. 5, No. 1, 2018, pp. 17-22. https://doi.org/10.18280/rces.050104   DOI
11 Kryshtanovych M., Britchenko I., Losonczi P., Baranovska T., Lukashevska U. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents. International Journal of Computer Science and Network Security. Vol. 22 2022, No. 4 pp. 33-38. https://doi.org/10.22937/IJCSNS.2022.22.4.5   DOI
12 Petroye, O., Lyulyov, O., Lytvynchuk, I., Paida, Y., Pakhomov, V. Effects of information security and innovations on country's image: Governance aspect. International Journal of Safety and Security Engineering, Vol. 10, No. 4, 2020, pp. 459-466. https://doi.org/10.18280/ijsse.100404   DOI
13 Yasmin, M., Sohail, A.; Sarkar, M., & Hafeez, R. Creative methods in transforming education using human resources. Creativity Studies, 10(2), 2017, 145-158. https://doi.org/10.3846/23450479.2017.1365778   DOI
14 Hutchings, A. Crime from the keyboard: organised cybercrime, co-offending, initiation and knowledge transmission. Crime, Law and Social Change, 62(1): 2014, 1-20. https://doi.org/10.1007/s10611-014-9520-z .   DOI
15 Lainjo, B. Network security and its implications on program management. International Journal of Safety and Security Engineering, Vol. 10, No. 6, 2020, pp. 739-746. https://doi.org/10.18280/ijsse.100603   DOI