State Management of the Development of National Cybersecurity Systems |
Kryshtanovych, Myroslav
(Lviv Polytechnic National University)
Storozhev, Roman (Taras Shevchenko National University of Kyiv) Malyshev, Kostiantyn (Zhytomyr Polytechnic State University) Munko, Anna (Dnipropetrovsk State University of Internal Affairs) Khokhba, Olena (Dnipropetrovsk State University of Internal Affairs) |
1 | Sylkin, O., Kryshtanovych, M., Bekh, Y., & Riabeka, O. Methodology of forming model for assessing the level financial security . Management Theory and Studies for Rural Business and Infrastructure Development, 2020, 42(3), 391-398. https://doi.org/10.15544/mts.2020.39 DOI |
2 | Gandhi, R., Sharma, A., Mahoney, W., Sousan, W., Zhu, Q., Laplante, P. Dimensions of cyber-attacks: Cultural, social, economic, and political. IEEE Technology and Society Magazine, 2011, 30(1): 28-38. https://doi.org/10.1109/MTS.2011.940293 DOI |
3 | Jarvis, L., Macdonald, S., Nouri, L. The cyberterrorism threat: Findings from a survey of researchers. Studies in Conflict & Terrorism, 37(1): 2014, 68-90. https://doi.org/10.1080/1057610X.2014.853603 DOI |
4 | Luo, H.N. An emergency management system for government data security based on artificial intelligence. Ingenierie des Systemes d'Information, Vol. 25, No. 2, 2020, pp. 207-213. https://doi.org/10.18280/isi.250208 DOI |
5 | Kryshtanovych, S., Gutsulyak, V., Huzii, I., Helzhynska, T., & Shepitchak, V. Modeling the process of risk management response to the negative impact of risks as the basis for ensuring economic security. Business, Management and Economics Engineering, 2021, 19(2), 289-302. https://doi.org/10.3846/bmee.2021.14798 DOI |
6 | Kryshtanovych, S., Treshchov, M., Durman, M., Lopatchenko, I., & Kernova, M. Gender parity in public administration in the context of the development of european values in the management system. Financial and Credit Activity: Problems of Theory and Practice, 2021, 4(39), 475-481. https://doi.org/10.18371/.v4i39.241416 DOI |
7 | Thijittang, S. A study of pragmatic strategies of English of Thai University students: Apology speech acts. University of Tasmania. 2010.https://eprints.utas.edu.au/10754/7/Thijittang_whole_thesis.pdf |
8 | Gordieiev, O., Kharchenko, V., Illiashenko, O., Morozova, O., Gasanov, M. Concept of using eye tracking technology to assess and ensure cybersecurity, functional safety and usability. International Journal of Safety and Security Engineering, Vol. 11, No. 4, 2011, pp. 361-367. https://doi.org/10.18280/ijsse.110409 DOI |
9 | Kryshtanovych, M., Petrovskyi, P., Khomyshyn, I., Bezena, I., & Serdechna, I. Peculiarities of implementing governance in the system of social security. Business, Management and Economics Engineering, 2020, 18(1), 142-156. https://doi.org/10.3846/bme.2020.12177 . DOI |
10 | Ismail A., Saad M., Abbas R. Cybersecurity in internet of things, Review of Computer Engineering Studies, Vol. 5, No. 1, 2018, pp. 17-22. https://doi.org/10.18280/rces.050104 DOI |
11 | Kryshtanovych M., Britchenko I., Losonczi P., Baranovska T., Lukashevska U. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents. International Journal of Computer Science and Network Security. Vol. 22 2022, No. 4 pp. 33-38. https://doi.org/10.22937/IJCSNS.2022.22.4.5 DOI |
12 | Petroye, O., Lyulyov, O., Lytvynchuk, I., Paida, Y., Pakhomov, V. Effects of information security and innovations on country's image: Governance aspect. International Journal of Safety and Security Engineering, Vol. 10, No. 4, 2020, pp. 459-466. https://doi.org/10.18280/ijsse.100404 DOI |
13 | Yasmin, M., Sohail, A.; Sarkar, M., & Hafeez, R. Creative methods in transforming education using human resources. Creativity Studies, 10(2), 2017, 145-158. https://doi.org/10.3846/23450479.2017.1365778 DOI |
14 | Hutchings, A. Crime from the keyboard: organised cybercrime, co-offending, initiation and knowledge transmission. Crime, Law and Social Change, 62(1): 2014, 1-20. https://doi.org/10.1007/s10611-014-9520-z . DOI |
15 | Lainjo, B. Network security and its implications on program management. International Journal of Safety and Security Engineering, Vol. 10, No. 6, 2020, pp. 739-746. https://doi.org/10.18280/ijsse.100603 DOI |