Serghei A Ohrimenco | Academy of Economic Studies of Moldova (original) (raw)

Papers by Serghei A Ohrimenco

Research paper thumbnail of Сборник доклади конференция Свищов 9 10 11 2023

Проф. д-р Марияна Божинова-председател Проф. д-р Андрей Захариев Проф. д-р Атанас Атанасов Проф. ... more Проф. д-р Марияна Божинова-председател Проф. д-р Андрей Захариев Проф. д-р Атанас Атанасов Проф. д-р Румен Брусарски Доц. д-р Искра Пантелеева Доц. д-р Любомир Иванов Доц. д-р Румен Ерусалимов ОРГАНИЗАЦИОНЕН КОМИТЕТ Доц. д-р Галина Чиприянова-председател Проф. д-р Андрей Захариев-съпредседател Членове: Проф. д-р Румен Брусарски Проф. д-р Стоян Проданов Доц. д-р Венцислав Василев Доц. д-р Людмил Несторов Доц. д-р Пламен Петков Доц. д-р Силвия Костова Ст. преп. д-р Виктор Монев Ст. преп. д-р Радослав Николов РЕДАКЦИОНЕН СЪВЕТ Проф. д.н. Божидар Божинов Проф. д-р Георги Иванов Проф. д-р Йордан Василев Проф. д-р Пенка Шишманова Проф. д-р Стефан Симеонов Проф. д-р Теодора Димитрова Доц. д-р Красимира Славева Публикуваните материали са рецензирани. Авторите носят отговорност за съдържанието на материалите, изразените мнения, използваните данни, цитираните източници и езиковото оформление на текстовете. Всички права запазени! Не се разрешават копиране, възпроизвеждане и разпространение на книги или на части от тях по какъвто и да е начин без писменото разрешение на авторите и Академично издателство "Ценов".

Research paper thumbnail of Econ Sanctions-

Research paper thumbnail of Cyber Attacks on Document-Centric Systems

Global and National Bussines Transformations - Proactive Management, Financial-Accounting and Planning Solutions

This aгticle examines document-centгic infoгmation systems as its main subject. These systems hav... more This aгticle examines document-centгic infoгmation systems as its main subject. These systems have the сараbilitу to integгate with otheг business platfoгms, such as ERP, СRМ, and ВРМ They include text editoгs, spгeadsheets, document management systems, and email clients used Ьу oгganizations and individuals to stoгe and exchange confidential infoгmation. The aгticle attempts to define the categoгy of "document-centгic systems, " гepгesented Ьу software platfoгms that focus оп document management the throughout theiг entiгe life cycle. The infoгmation content of these systems is often the taгget of cybeгattacks, which оссиr at multiple levels to access sensitive infoгmation-fгom individuals to small and medium businesses, laгge commeгcial oгganizations, and goveгnment agencies.

Research paper thumbnail of New Forms and Features of Cyber Confrontations

13TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGY AND STATISTICS IN ECONOMY AND EDUCATION ICAICTSEE – 2023, 2023

The evolution of the cyberspace domain and its accompanying management tools has ushered in an er... more The evolution of the cyberspace domain and its accompanying management tools has ushered in an era characterized by the emergence of new forms of confrontation: cyber blockades and cyber sanctions. This development has paved the ways for enhanced capabilities in economic management, the expansion of diplomatic and trade relationships, and ultimately, the safeguarding of national interests at an unprecedented
level. This paper presents the results of an analysis of these new categories, elucidating their interconnectedness, and highlighting the evolution and continued development of these two domains, particularly within cyberspace. The authors draw attention t o the new dimensions of confrontation within the cyberspace realm, encompassing explicit and
hidden threats to individuals, society, and the state.

Research paper thumbnail of Cybersecurity risk

Research paper thumbnail of Threats Model for the Security of Personal Data During Their Processing

PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGY AND STATISTICS IN ECONOMY AND EDUCATION ICAICTSEE-2022, 2022

The article describes the main steps to form a model of threats to the security of personal data ... more The article describes the main steps to form a model of threats to the security of personal data during their processing in information systems. Particular attention is paid to the deliberate actions of the violator, which lead to damage to the interests of the individual, society and the state. The results of the analysis of existing methods and standards are presented, including: ISO 27005-2022, The STRIDE Threat Model, NIST Special Publication 800-37. The hierarchical intruder model is described as one of the sources of threats along with malware carriers and bookmarks, the definition and description of attack channels.

Research paper thumbnail of SILENT WARFARE: UNDERSTANDING THE IMPACT OF CYBER BLOCKADES AND SANCTIONS

MEST Journal, 2024

Traditionally, experts considered several blockades, including sea and land, with the development... more Traditionally, experts considered several blockades, including sea and land, with the development of aircraft transportation-air, and with the advent of space technology and special satellites-space. Also, information blockades have been introduced with the rapid development of computer technology and communication tools. Each type of blockade had its historical characteristics; they differed in costs and, of course, efficiency. In the second half and at the end of the 20 th century, scientists operated the term cyber blockade and restrictions in cyberspace. The paper sequentially considers physical environments (domains): air, land, sea, outer space, information space, and cyberspace. Multiple definitions of cyberspace have emerged as this concept evolves and becomes more nuanced in response to rapid developments in the technical, technological, economic, and social dimensions of modern life. Due to their potential, cyber-attacks and cyber warfare have garnered significant attention considering the ongoing development of society and business. Cyber-attacks are carried out regularly-against government agencies, military and civilian departments, and private businesses. The growing dependence of countries on cyberspace can play a negative role in the process of confrontation. The enemy can attack those areas where cyberspace is a decisive element. The authors discussed the questions of cyber-blockade efficiency.

Research paper thumbnail of VII. INTERNATIONAL APPLIED SOCIAL SCIENCES CONGRESS (C-IASOS 2023) FULL PAPER PROCEEDINGS BOOK

Cyber Conflict: Indicators and Assessments, 2023

All copyrights of this publication belong to the Editors. No parts of this publication may not be... more All copyrights of this publication belong to the Editors. No parts of this publication may not be used, copied, reproduced, redistributed, or published without being appropriately referenced. The Authors are responsible for accuracy of all statements and data containe and the accuracy of all references information, and for obtaining and submitting permission from the author and publisher of any previously published material included in this publication. The Publisher and Editors cannot be held responsible for errors or any consequences arising from the use of information contained in this this publication.

Research paper thumbnail of The Nature of Shadow Digital Economics

MEST Journal, Jan 15, 2021

The purpose of this paper is to analyze, discuss, and develop a study of world universal digitali... more The purpose of this paper is to analyze, discuss, and develop a study of world universal digitalization processes as well as challenges and threats, and develop an approach to defining the shadow digital economy. Along with huge innovative achievements, digitalization processes are accompanied by the formation of a digital economy and the growth of illegal activities. Digital economy implies total globalization, creates an ultra-high competitive environment, provides a new quality of life, business, and public services. At the same time, many traditional areas of activity are being destroyed. In addition to understandable achievements, it is necessary to analyze new obvious and hidden threats that digitalization processes carry. The analysis shows the causes and factors of the emergence and functioning of the new segment in the shadow economy. The approaches to the definition of this category and its content are discussed. A classification of criminal-oriented products and services that are the basis of a highly profitable illegal business has been proposed. The problem of confrontation with Shadow Digital Economics acquires particular urgency in the face of the emergence of new overt and hidden threats to the individuals, society, and the state. The main components of the digitalization process are analyzed. Conclusions are drawn about the development of shadow digitalization processes and the formation of a shadow digital economy, which is directly related to cybersecurity.

Research paper thumbnail of Peculiarities of Economic Crimes in the Banking Sphere

Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav

Журнал включено до категорії «Б» переліку наукових фахових видань України, в яких можуть публікув... more Журнал включено до категорії «Б» переліку наукових фахових видань України, в яких можуть публікуватися результати дисертаційних робіт на здобуття наукових ступенів доктора і кандидата наук (юридичні науки) (додаток 4 до наказу МОН України від 28.12.2019 № 1643) Видання індексується в міжнародних базах даних «Index Copernicus International» та «Crossref»

Research paper thumbnail of CYBERTAX: A NEW APPROACH TO CYBERSECURITY RISK MANAGEMENT

CHALLENGES FOR FINANCE AND ECONOMIC ACCOUNTING IN CONDITIONS OF MULTIPLE CRISES, 2023

In our modern world, it may seem that we have a complete understanding of threats, means of count... more In our modern world, it may seem that we have a complete understanding of threats, means of counteraction, risk management, and potential impact. However, reality turns out to be much more complex and less evident. The theory of risk management is constantly evolving and expanding, and this also applies to a new direction - risk management in cyberspace.
This paper presents an analysis of the concept of „Cybertax“ proposed by George K. Tsantes and James F. Ransome. The emergence and evolution of this concept are driven by the necessity to enhance the management of cyber security both in governmental and commercial organizations, as well as among individual users.
It should be recognized that „Cybertax“ - is a measure of the effort and resources used to prove the current state of cybersecurity to others, primarily business partners, regulators, and auditors.

Research paper thumbnail of CYBER THREATS MODELING: AN EMPIRICAL  STUDY

Business Maanagement, 2023

The immediacy of this study is determined by the need to fight back against the modern cyber thre... more The immediacy of this study is determined by the need to fight back
against the modern cyber threats that arise in the process of building a digital economy.
The issues of countering various cyber threats in the activities of small and medium enterprises, firms stand to be a serious problem. Its relevance is constantly increasing. This is due to a number of objective reasons, the main of which are the following.
Firstly, the globalization of economic processes, which leads to a situation where the technical, software and information component of the Information System (IS) is the same in relation to all countries developed in terms of information.
Secondly, a significant change in the landscape of the IS threats themselves. It should be noted that the changes affected both quantitative and qualitative characteristics. Malware, Network Scanning, Man in the Middle, Phishing, DNS Spoofing, Trojan Horses. These are just a few examples of cyber threats carried out against small and
mid-sized businesses and government information systems every day.
The current condition of the information security system of governmental and commercial structures does not provide efficient resolving of up-to-date cybersecurity problems and creation of confident interaction between the critical infrastructure objects.
It should be assumed that there is a need to update the theoretical and
methodological base and practical developments that can protect the rights and legitimate interests of the individual, business and the state from modern security threats and increase the level of security of our economy.

Research paper thumbnail of Cyber-attacks Scenarios Analysis

11TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGY AND STATISTICS IN ECONOMY AND EDUCATION (ICAICTSEE 2021), NOVEMBER 25-26TH, 2021, UNWE, SOFIA, BULGARIA, 2021

The digital transformation, in all its aspects, is accompanied by a rapid growth of cyber threats... more The digital transformation, in all its aspects, is accompanied by a rapid growth of cyber threats and attacks on various critical infrastructure facilities. Some of cyberattacks target personal data, operations management processes, financial reporting results, etc., having as a final objective monetization of the results. Accordingly, there is a need for a complex and comprehensive analysis of information, which presents key
aspects of cyber-attacks. The current paper presents the results of a study aimed to identify and analyze possible scenarios, stages and facets of cyberattacks, highlighting potential motives, goals, objects, means of attack, specific actions, as well as the final potential results of cyber-attacks.

Research paper thumbnail of Organizing a cyber blockade

Management Strategies and Policies in the Contemporary Economy

Traditionally, experts considered several types of blockades, including sea, land, with the devel... more Traditionally, experts considered several types of blockades, including sea, land, with the development of aircraft construction - air, with the advent of space technology and special satellites - space. With the rapid development of computer technology and communication tools, the information blockades have been introduced. Each type of blockade had its own historical characteristics; they differed in costs and, of course, efficiency. In the second half and at the end of the 20th century, scientists operated the term cyber blockade and restrictions in the field of cyberspace. A number of definitions of cyberspace are provided, since this category changes and is refined depending on the rapidly developing technical, technological, economic and social aspects of our life. Because of the threat they pose, cyber-attacks and cyber warfare receive significant attention once society and business is developing. The growing dependence of countries on the cyberspace can play a negative role ...

Research paper thumbnail of Экономические санкции против России в сфере информационных технологий

Новый смысл развития предпринимательства: модель опережения, технологии, кадры, 2023

Современная санкционная политика, направленная на ограничение доступа Российской Федерации к пере... more Современная санкционная политика, направленная на ограничение доступа Российской Федерации к передовым технологиям, имеет давние исторические корни.
Решая проблему недопуска технологического превосходства СССР в мире, в ходе так называемой "холодной войны" капиталистический лагерь стал использовать стратегию управляемого технологического отставания, включающую перечень товаров и технологий, запрещенных к ввозу в СССР и другие социалистические страны.

Research paper thumbnail of ORGANIZING A CYBER BLOCKADE

Strategii si politici de management in economia contemporana, 2023

Traditionally, experts considered several types of blockades, including sea, land, with the devel... more Traditionally, experts considered several types of blockades, including sea,
land, with the development of aircraft construction - air, with the advent of space technology and special satellites - space. With the rapid development of computer technology and communication tools, the information blockades have been introduced. Each type of blockade had its own historical characteristics; they differed in costs and, of course, efficiency. In the second half and at the end of the 20th century, scientists operated the term cyber blockade and restrictions in the field of cyberspace.
A number of definitions of cyberspace are provided, since this category changes and is refined depending on the rapidly developing technical, technological, economic and social aspects of our life.
Because of the threat they pose, cyber-attacks and cyber warfare receive significant attention once society and business is developing. The growing dependence of countries on the cyberspace can play a negative role in the process of confrontation; the enemy can attack those areas where cyberspace is a decisive element.

Research paper thumbnail of EcCrimes Visnik

Журнал включено до категорії «Б» переліку наукових фахових видань України, в яких можуть публікув... more Журнал включено до категорії «Б» переліку наукових фахових видань України, в яких можуть публікуватися результати дисертаційних робіт на здобуття наукових ступенів доктора і кандидата наук (юридичні науки) (додаток 4 до наказу МОН України від 28.12.2019 № 1643) Видання індексується в міжнародних базах даних «Index Copernicus International» та «Crossref»

Research paper thumbnail of Estimation of the Key Segments of the Cyber Crime Economics

2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)

Our everyday world is rapidly changing with the help of digital transformation and is increasingl... more Our everyday world is rapidly changing with the help of digital transformation and is increasingly dependent on information technology, and because of that our society needs to be prepared for new challenges and threats that come with the change. The composition of the latter is constantly shifting due to the development and improvement of computer technology, software, and methods for collecting, processing, and storing information and data. In these conditions, the relevance of scientific works on topics related to research in the field of cybercrime as an economic phenomenon increases drastically. The digital transformation of all aspects of daily activity turns the user's devices into the target of attacks aimed at taking possession of their private information (accounts, banking details, etc.) and recently even the devices' computing power. The authors see an immense necessity in studying of shadow (criminal) business models based on the development, debugging, and commercial distribution of criminal software.

Research paper thumbnail of Estimation of the Key Segments of the Cyber Crime Economics

2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T), 2021

Our everyday world is rapidly changing with the help of digital transformation and is increasingl... more Our everyday world is rapidly changing with the help of digital transformation and is increasingly dependent on information technology, and because of that our society needs to be prepared for new challenges and threats that come with the change. The composition of the latter is constantly shifting due to the development and improvement of computer technology, software, and methods for collecting, processing, and storing information and data. In these conditions, the relevance of scientific works on topics related to research in the field of cybercrime as an economic phenomenon increases drastically. The digital transformation of all aspects of daily activity turns the user's devices into the target of attacks aimed at taking possession of their private information (accounts, banking details, etc.) and recently even the devices' computing power. The authors see an immense necessity in studying of shadow (criminal) business models based on the development, debugging, and commercial distribution of criminal software.

Research paper thumbnail of Shadow of Digital Economics

2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T), 2019

the main purpose of this article is to analyze, discuss, and develop an approach to defining the ... more the main purpose of this article is to analyze, discuss, and develop an approach to defining the shadow digital economy that accompanies worldwide digitalization processes. Digital economy implies total globalization, creates an ultra-high competitive environment, provides a new quality of life, business and public services. At the same time, many traditional areas of activity are being destroyed. In addition to understandable achievements, it is necessary to analyze new obvious and hidden threats that digitalization processes carry. An analysis of the causes and factors of the emergence and functioning of the new segment in the shadow economy is conducted. The approaches to the definition of this category and its content are discussed. A classification of criminal-oriented products and services that are the basis of a highly profitable illegal business has been proposed. The problem of confrontation with Shadow Digital Economics acquires particular urgency in the face of the emerge...

Research paper thumbnail of Сборник доклади конференция Свищов 9 10 11 2023

Проф. д-р Марияна Божинова-председател Проф. д-р Андрей Захариев Проф. д-р Атанас Атанасов Проф. ... more Проф. д-р Марияна Божинова-председател Проф. д-р Андрей Захариев Проф. д-р Атанас Атанасов Проф. д-р Румен Брусарски Доц. д-р Искра Пантелеева Доц. д-р Любомир Иванов Доц. д-р Румен Ерусалимов ОРГАНИЗАЦИОНЕН КОМИТЕТ Доц. д-р Галина Чиприянова-председател Проф. д-р Андрей Захариев-съпредседател Членове: Проф. д-р Румен Брусарски Проф. д-р Стоян Проданов Доц. д-р Венцислав Василев Доц. д-р Людмил Несторов Доц. д-р Пламен Петков Доц. д-р Силвия Костова Ст. преп. д-р Виктор Монев Ст. преп. д-р Радослав Николов РЕДАКЦИОНЕН СЪВЕТ Проф. д.н. Божидар Божинов Проф. д-р Георги Иванов Проф. д-р Йордан Василев Проф. д-р Пенка Шишманова Проф. д-р Стефан Симеонов Проф. д-р Теодора Димитрова Доц. д-р Красимира Славева Публикуваните материали са рецензирани. Авторите носят отговорност за съдържанието на материалите, изразените мнения, използваните данни, цитираните източници и езиковото оформление на текстовете. Всички права запазени! Не се разрешават копиране, възпроизвеждане и разпространение на книги или на части от тях по какъвто и да е начин без писменото разрешение на авторите и Академично издателство "Ценов".

Research paper thumbnail of Econ Sanctions-

Research paper thumbnail of Cyber Attacks on Document-Centric Systems

Global and National Bussines Transformations - Proactive Management, Financial-Accounting and Planning Solutions

This aгticle examines document-centгic infoгmation systems as its main subject. These systems hav... more This aгticle examines document-centгic infoгmation systems as its main subject. These systems have the сараbilitу to integгate with otheг business platfoгms, such as ERP, СRМ, and ВРМ They include text editoгs, spгeadsheets, document management systems, and email clients used Ьу oгganizations and individuals to stoгe and exchange confidential infoгmation. The aгticle attempts to define the categoгy of "document-centгic systems, " гepгesented Ьу software platfoгms that focus оп document management the throughout theiг entiгe life cycle. The infoгmation content of these systems is often the taгget of cybeгattacks, which оссиr at multiple levels to access sensitive infoгmation-fгom individuals to small and medium businesses, laгge commeгcial oгganizations, and goveгnment agencies.

Research paper thumbnail of New Forms and Features of Cyber Confrontations

13TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGY AND STATISTICS IN ECONOMY AND EDUCATION ICAICTSEE – 2023, 2023

The evolution of the cyberspace domain and its accompanying management tools has ushered in an er... more The evolution of the cyberspace domain and its accompanying management tools has ushered in an era characterized by the emergence of new forms of confrontation: cyber blockades and cyber sanctions. This development has paved the ways for enhanced capabilities in economic management, the expansion of diplomatic and trade relationships, and ultimately, the safeguarding of national interests at an unprecedented
level. This paper presents the results of an analysis of these new categories, elucidating their interconnectedness, and highlighting the evolution and continued development of these two domains, particularly within cyberspace. The authors draw attention t o the new dimensions of confrontation within the cyberspace realm, encompassing explicit and
hidden threats to individuals, society, and the state.

Research paper thumbnail of Cybersecurity risk

Research paper thumbnail of Threats Model for the Security of Personal Data During Their Processing

PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGY AND STATISTICS IN ECONOMY AND EDUCATION ICAICTSEE-2022, 2022

The article describes the main steps to form a model of threats to the security of personal data ... more The article describes the main steps to form a model of threats to the security of personal data during their processing in information systems. Particular attention is paid to the deliberate actions of the violator, which lead to damage to the interests of the individual, society and the state. The results of the analysis of existing methods and standards are presented, including: ISO 27005-2022, The STRIDE Threat Model, NIST Special Publication 800-37. The hierarchical intruder model is described as one of the sources of threats along with malware carriers and bookmarks, the definition and description of attack channels.

Research paper thumbnail of SILENT WARFARE: UNDERSTANDING THE IMPACT OF CYBER BLOCKADES AND SANCTIONS

MEST Journal, 2024

Traditionally, experts considered several blockades, including sea and land, with the development... more Traditionally, experts considered several blockades, including sea and land, with the development of aircraft transportation-air, and with the advent of space technology and special satellites-space. Also, information blockades have been introduced with the rapid development of computer technology and communication tools. Each type of blockade had its historical characteristics; they differed in costs and, of course, efficiency. In the second half and at the end of the 20 th century, scientists operated the term cyber blockade and restrictions in cyberspace. The paper sequentially considers physical environments (domains): air, land, sea, outer space, information space, and cyberspace. Multiple definitions of cyberspace have emerged as this concept evolves and becomes more nuanced in response to rapid developments in the technical, technological, economic, and social dimensions of modern life. Due to their potential, cyber-attacks and cyber warfare have garnered significant attention considering the ongoing development of society and business. Cyber-attacks are carried out regularly-against government agencies, military and civilian departments, and private businesses. The growing dependence of countries on cyberspace can play a negative role in the process of confrontation. The enemy can attack those areas where cyberspace is a decisive element. The authors discussed the questions of cyber-blockade efficiency.

Research paper thumbnail of VII. INTERNATIONAL APPLIED SOCIAL SCIENCES CONGRESS (C-IASOS 2023) FULL PAPER PROCEEDINGS BOOK

Cyber Conflict: Indicators and Assessments, 2023

All copyrights of this publication belong to the Editors. No parts of this publication may not be... more All copyrights of this publication belong to the Editors. No parts of this publication may not be used, copied, reproduced, redistributed, or published without being appropriately referenced. The Authors are responsible for accuracy of all statements and data containe and the accuracy of all references information, and for obtaining and submitting permission from the author and publisher of any previously published material included in this publication. The Publisher and Editors cannot be held responsible for errors or any consequences arising from the use of information contained in this this publication.

Research paper thumbnail of The Nature of Shadow Digital Economics

MEST Journal, Jan 15, 2021

The purpose of this paper is to analyze, discuss, and develop a study of world universal digitali... more The purpose of this paper is to analyze, discuss, and develop a study of world universal digitalization processes as well as challenges and threats, and develop an approach to defining the shadow digital economy. Along with huge innovative achievements, digitalization processes are accompanied by the formation of a digital economy and the growth of illegal activities. Digital economy implies total globalization, creates an ultra-high competitive environment, provides a new quality of life, business, and public services. At the same time, many traditional areas of activity are being destroyed. In addition to understandable achievements, it is necessary to analyze new obvious and hidden threats that digitalization processes carry. The analysis shows the causes and factors of the emergence and functioning of the new segment in the shadow economy. The approaches to the definition of this category and its content are discussed. A classification of criminal-oriented products and services that are the basis of a highly profitable illegal business has been proposed. The problem of confrontation with Shadow Digital Economics acquires particular urgency in the face of the emergence of new overt and hidden threats to the individuals, society, and the state. The main components of the digitalization process are analyzed. Conclusions are drawn about the development of shadow digitalization processes and the formation of a shadow digital economy, which is directly related to cybersecurity.

Research paper thumbnail of Peculiarities of Economic Crimes in the Banking Sphere

Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav

Журнал включено до категорії «Б» переліку наукових фахових видань України, в яких можуть публікув... more Журнал включено до категорії «Б» переліку наукових фахових видань України, в яких можуть публікуватися результати дисертаційних робіт на здобуття наукових ступенів доктора і кандидата наук (юридичні науки) (додаток 4 до наказу МОН України від 28.12.2019 № 1643) Видання індексується в міжнародних базах даних «Index Copernicus International» та «Crossref»

Research paper thumbnail of CYBERTAX: A NEW APPROACH TO CYBERSECURITY RISK MANAGEMENT

CHALLENGES FOR FINANCE AND ECONOMIC ACCOUNTING IN CONDITIONS OF MULTIPLE CRISES, 2023

In our modern world, it may seem that we have a complete understanding of threats, means of count... more In our modern world, it may seem that we have a complete understanding of threats, means of counteraction, risk management, and potential impact. However, reality turns out to be much more complex and less evident. The theory of risk management is constantly evolving and expanding, and this also applies to a new direction - risk management in cyberspace.
This paper presents an analysis of the concept of „Cybertax“ proposed by George K. Tsantes and James F. Ransome. The emergence and evolution of this concept are driven by the necessity to enhance the management of cyber security both in governmental and commercial organizations, as well as among individual users.
It should be recognized that „Cybertax“ - is a measure of the effort and resources used to prove the current state of cybersecurity to others, primarily business partners, regulators, and auditors.

Research paper thumbnail of CYBER THREATS MODELING: AN EMPIRICAL  STUDY

Business Maanagement, 2023

The immediacy of this study is determined by the need to fight back against the modern cyber thre... more The immediacy of this study is determined by the need to fight back
against the modern cyber threats that arise in the process of building a digital economy.
The issues of countering various cyber threats in the activities of small and medium enterprises, firms stand to be a serious problem. Its relevance is constantly increasing. This is due to a number of objective reasons, the main of which are the following.
Firstly, the globalization of economic processes, which leads to a situation where the technical, software and information component of the Information System (IS) is the same in relation to all countries developed in terms of information.
Secondly, a significant change in the landscape of the IS threats themselves. It should be noted that the changes affected both quantitative and qualitative characteristics. Malware, Network Scanning, Man in the Middle, Phishing, DNS Spoofing, Trojan Horses. These are just a few examples of cyber threats carried out against small and
mid-sized businesses and government information systems every day.
The current condition of the information security system of governmental and commercial structures does not provide efficient resolving of up-to-date cybersecurity problems and creation of confident interaction between the critical infrastructure objects.
It should be assumed that there is a need to update the theoretical and
methodological base and practical developments that can protect the rights and legitimate interests of the individual, business and the state from modern security threats and increase the level of security of our economy.

Research paper thumbnail of Cyber-attacks Scenarios Analysis

11TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGY AND STATISTICS IN ECONOMY AND EDUCATION (ICAICTSEE 2021), NOVEMBER 25-26TH, 2021, UNWE, SOFIA, BULGARIA, 2021

The digital transformation, in all its aspects, is accompanied by a rapid growth of cyber threats... more The digital transformation, in all its aspects, is accompanied by a rapid growth of cyber threats and attacks on various critical infrastructure facilities. Some of cyberattacks target personal data, operations management processes, financial reporting results, etc., having as a final objective monetization of the results. Accordingly, there is a need for a complex and comprehensive analysis of information, which presents key
aspects of cyber-attacks. The current paper presents the results of a study aimed to identify and analyze possible scenarios, stages and facets of cyberattacks, highlighting potential motives, goals, objects, means of attack, specific actions, as well as the final potential results of cyber-attacks.

Research paper thumbnail of Organizing a cyber blockade

Management Strategies and Policies in the Contemporary Economy

Traditionally, experts considered several types of blockades, including sea, land, with the devel... more Traditionally, experts considered several types of blockades, including sea, land, with the development of aircraft construction - air, with the advent of space technology and special satellites - space. With the rapid development of computer technology and communication tools, the information blockades have been introduced. Each type of blockade had its own historical characteristics; they differed in costs and, of course, efficiency. In the second half and at the end of the 20th century, scientists operated the term cyber blockade and restrictions in the field of cyberspace. A number of definitions of cyberspace are provided, since this category changes and is refined depending on the rapidly developing technical, technological, economic and social aspects of our life. Because of the threat they pose, cyber-attacks and cyber warfare receive significant attention once society and business is developing. The growing dependence of countries on the cyberspace can play a negative role ...

Research paper thumbnail of Экономические санкции против России в сфере информационных технологий

Новый смысл развития предпринимательства: модель опережения, технологии, кадры, 2023

Современная санкционная политика, направленная на ограничение доступа Российской Федерации к пере... more Современная санкционная политика, направленная на ограничение доступа Российской Федерации к передовым технологиям, имеет давние исторические корни.
Решая проблему недопуска технологического превосходства СССР в мире, в ходе так называемой "холодной войны" капиталистический лагерь стал использовать стратегию управляемого технологического отставания, включающую перечень товаров и технологий, запрещенных к ввозу в СССР и другие социалистические страны.

Research paper thumbnail of ORGANIZING A CYBER BLOCKADE

Strategii si politici de management in economia contemporana, 2023

Traditionally, experts considered several types of blockades, including sea, land, with the devel... more Traditionally, experts considered several types of blockades, including sea,
land, with the development of aircraft construction - air, with the advent of space technology and special satellites - space. With the rapid development of computer technology and communication tools, the information blockades have been introduced. Each type of blockade had its own historical characteristics; they differed in costs and, of course, efficiency. In the second half and at the end of the 20th century, scientists operated the term cyber blockade and restrictions in the field of cyberspace.
A number of definitions of cyberspace are provided, since this category changes and is refined depending on the rapidly developing technical, technological, economic and social aspects of our life.
Because of the threat they pose, cyber-attacks and cyber warfare receive significant attention once society and business is developing. The growing dependence of countries on the cyberspace can play a negative role in the process of confrontation; the enemy can attack those areas where cyberspace is a decisive element.

Research paper thumbnail of EcCrimes Visnik

Журнал включено до категорії «Б» переліку наукових фахових видань України, в яких можуть публікув... more Журнал включено до категорії «Б» переліку наукових фахових видань України, в яких можуть публікуватися результати дисертаційних робіт на здобуття наукових ступенів доктора і кандидата наук (юридичні науки) (додаток 4 до наказу МОН України від 28.12.2019 № 1643) Видання індексується в міжнародних базах даних «Index Copernicus International» та «Crossref»

Research paper thumbnail of Estimation of the Key Segments of the Cyber Crime Economics

2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)

Our everyday world is rapidly changing with the help of digital transformation and is increasingl... more Our everyday world is rapidly changing with the help of digital transformation and is increasingly dependent on information technology, and because of that our society needs to be prepared for new challenges and threats that come with the change. The composition of the latter is constantly shifting due to the development and improvement of computer technology, software, and methods for collecting, processing, and storing information and data. In these conditions, the relevance of scientific works on topics related to research in the field of cybercrime as an economic phenomenon increases drastically. The digital transformation of all aspects of daily activity turns the user's devices into the target of attacks aimed at taking possession of their private information (accounts, banking details, etc.) and recently even the devices' computing power. The authors see an immense necessity in studying of shadow (criminal) business models based on the development, debugging, and commercial distribution of criminal software.

Research paper thumbnail of Estimation of the Key Segments of the Cyber Crime Economics

2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T), 2021

Our everyday world is rapidly changing with the help of digital transformation and is increasingl... more Our everyday world is rapidly changing with the help of digital transformation and is increasingly dependent on information technology, and because of that our society needs to be prepared for new challenges and threats that come with the change. The composition of the latter is constantly shifting due to the development and improvement of computer technology, software, and methods for collecting, processing, and storing information and data. In these conditions, the relevance of scientific works on topics related to research in the field of cybercrime as an economic phenomenon increases drastically. The digital transformation of all aspects of daily activity turns the user's devices into the target of attacks aimed at taking possession of their private information (accounts, banking details, etc.) and recently even the devices' computing power. The authors see an immense necessity in studying of shadow (criminal) business models based on the development, debugging, and commercial distribution of criminal software.

Research paper thumbnail of Shadow of Digital Economics

2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T), 2019

the main purpose of this article is to analyze, discuss, and develop an approach to defining the ... more the main purpose of this article is to analyze, discuss, and develop an approach to defining the shadow digital economy that accompanies worldwide digitalization processes. Digital economy implies total globalization, creates an ultra-high competitive environment, provides a new quality of life, business and public services. At the same time, many traditional areas of activity are being destroyed. In addition to understandable achievements, it is necessary to analyze new obvious and hidden threats that digitalization processes carry. An analysis of the causes and factors of the emergence and functioning of the new segment in the shadow economy is conducted. The approaches to the definition of this category and its content are discussed. A classification of criminal-oriented products and services that are the basis of a highly profitable illegal business has been proposed. The problem of confrontation with Shadow Digital Economics acquires particular urgency in the face of the emerge...

Research paper thumbnail of Экономические санкции в сфере информационных технологий

Экономические санкции в сфере информационных технологий

В монографии систематизированы различные аспекты санкций, включая их исторический контекст, текущ... more В монографии систематизированы различные аспекты санкций, включая их исторический контекст, текущие тенденции, а также многообразие подходов к оценке их эффективности. Особое внимание уделено анализу современных киберсанкций и их влиянию на международные отношения и глобальную экономику. Содержание данной монографии является логическим продолжением проведенных исследований авторов.
Материал предназначен для широкого круга читателей, включая преподавателей, студентов, аспирантов экономических специальностей, научных сотрудников, работников организаций и предприятий.

Research paper thumbnail of Chapter 24: The digital world has a long shadow

The Elgar Companion to Information Economics, 2024

The main goal of this work is to analyze, discuss, and develop the theoretical foundations of the... more The main goal of this work is to analyze, discuss, and develop the theoretical foundations of the shadow digital economy, which was intensely developed in parallel with the digitalization processes of the economies of the leading countries of the world. Based on the analysis of literary sources, a definition of “shadow digital economy” (SDE) with the identification of legal, mathematical, socio-psychological and managerial approaches is proposed. Organized forms of traditional crime and their possible connection with the SDE, and the classification of actors in informational counteraction are considered. Such general features as latent nature, coverage of all phases of social production, etc. are highlighted as the basis for the functioning of the SDE, as an entrepreneurial activity. The most important feature should be considered the parasitic nature of all the processes of the SDE, including but not limited to simple actions to disclose/unauthorized change of the source code of the software product, the monetization of renting botnets and so on. The activities of some of the most prominent hacker groups are considered.

Research paper thumbnail of Анализ концепции «этичный хакинг» (на примере платформы HackerOne)

Государство и рынок: евразийская доминанта развития в условиях формирования многополярного мира : коллективная монография / под ред. д-ра экон, наук, проф. С.А. Дятлова, д-ра экон, наук, Д.Ю. Миропольского, д-ра экон, наук, проф. Т.А. Селшцевой. - СПб. : Изд-во СПбГЭУ, 2023. - 632 с., 2023

Хакинг, как явление, возникло относительно недавно, получило развитие в усло-виях распространения... more Хакинг, как явление, возникло относительно недавно, получило развитие в усло-виях распространения информационно-коммуникационных технологий и глобальной сети Интернет. Данная деятельность представляет собой внесение изменений в состав программного обеспечения для достижения определенных (чаще всего, корыстных) це-лей. Данные несанкционированные измерения являются вредоносными и могут пред-ставлять серьезную угрозу личности, обществу и государству.

Research paper thumbnail of Теневая цифровая экономика и ее основные сегменты

Человеческий капитал в в модели устойчивого экономического роста России, 2022

Наш мир стремительно изменяется под влиянием цифровой трансформации, и необходима серьезная подго... more Наш мир стремительно изменяется под влиянием цифровой трансформации, и необходима серьезная подготовка к новыи вызовам и угрозам. Состав последних постоянно изменяется вследствие развития и совершенствования вычислительной техники, программного обемпечения и технологий сбора, обработки и хранения информации. В этих условиях возрастает актуальность научно-исследовательских работ по тематике, связанной с оцценкой возможных угроз в цифровой экономике.

Research paper thumbnail of Chapter 8 Challenges for Digital Transformation in the Manufacturing Industry

SOCIO-ECONOMIC DEVELOPMENT - o- INTERDISCIPLINARY ECOSYSTEMS PERSPECTIVE, 2020

The transitional stage in scientific and technological development, the complex processes of ado... more The transitional stage in scientific and technological development, the complex processes of adoption of modern innovations are associated with the implementation of the concept of the fourth industrial revolution, Industry 4.0. At this moment, its analogues and more advanced versions are being implemented all over the world. Having become the universally recognised management term, Industry
4.0 is used in a much broader sense than its original meaning, encompassing many innovations. Among them are smart manufacturing, the Internet of Things, artificial intelligence, a variety of nano-devices, 3D printing (including food, organs and tissues), medical robotic surgeons, and many others. The emergence of new
technologies is not accidental, it is an answer to the pressing problems of modern generations who want to save time and money by receiving services in digital format.

Research paper thumbnail of SECURITATEA INFORMAŢIONALĂ 2011 CONFERINŢĂ INTERNAŢIONALĂ (ediţia a VIII-a

CONFERINŢĂ INTERNAŢIONALĂ (ediţia a VIII-a), 2011

SECURITATEA INFORMAŢIONALĂ 2011 CONFERINŢĂ INTERNAŢIONALĂ (ediţia a VIII-a) 4 mai 2011

Research paper thumbnail of SECURITATEA INFORMAŢIONALĂ 2010 CONFERINŢĂ INTERNAŢIONALĂ ( ediţia a VII-a

SECURITATEA INFORMAŢIONALĂ 2010 CONFERINŢĂ INTERNAŢIONALĂ ( ediţia a VII-a), 2010

CONFERINŢĂ INTERNAŢIONALĂ ( ediţia a VII-a)

Research paper thumbnail of Nauka i praktyka bezpieczeństwa

НОВОЕ НАПОЛНЕНИЕ НАУКИ СЕКЬЮРИТОГИИ, 2019

This paper discusses the problematic situation of criminal information technologies, their defini... more This paper discusses the problematic situation of criminal information
technologies, their definitions, market structure, and, in conclusion, provides directions for further research.

Research paper thumbnail of SHADOW DIGITAL TECHNOLOGIES  THREATS TO NATIONAL SECURITY

"Economics,Management, Finance and Banking", 2022

A sector of economic relations covering all types of production and economic activities that, in... more A sector of economic relations covering all types of production and economic activities that, in their focus, content, nature and form, contradict the requirements of the law and are being carried out contrary to state regulation of the economy and bypassing control over it

Research paper thumbnail of Основные сегменты теневой цифровой экономики

Основные сегменты теневой цифровой экономики, 2022

Основные сегменты теневой цифровой экономики

Research paper thumbnail of THE NATURE OF SHADOW DIGITAL ECONOMICS

International Scientific Conference MANAGEMENT 2020 - ZITEH 2020, 2020

The purpose o f this paper is to analyze, discuss and develop a study o f world universal digita... more The purpose o f this paper is to analyze, discuss and develop a study o f world universal digitalization processes as well as challenges and threats, and develop an approach to defining the shadow digital economy. Along with huge innovative achievements, digitalization processes are accompanied by the formation of a digital economy and the growth o f illegal activities. Digital economy implies total
globalization, creates an ultra-high competitive environment, provides a new quality of life, business and public services. At the same time, many traditional areas of activity are being destroyed. In addition to understandable achievements, it is necessary to analyze new obvious and hidden threats that digitalization processes carry. The analysis of the causes and factors o f the emergence and functioning of the new segment in the shadow economy. The approaches to the definition o f this category and its content are discussed. A classification of criminal-oriented products and services that are the basis of a highly profitable illegal business has been proposed. The problem of
confrontation with Shadow Digital Economics acquires particular urgency in the face of the emergence of new overt and hidden threats to the individuals, society and the state. The main components of the digitalization process are analyzed.

Research paper thumbnail of DIGITAL THREAT ANALYSIS

DIGITAL THREAT ANALYSIS

Our ubiquitous world is changing rapidly under the influence of digital transformation and seriou... more Our ubiquitous world is changing rapidly under the influence of digital
transformation and serious preparation for new challenges and threats is required. The composition of the latter is constantly changing due to the development and improvement of computing equipment, software and technologies for collecting, processing and storing information. Under these conditions, the relevance of research work on topics related to the
assessment of possible threats in the digital economy is increasing. An additional factor of influence is changes in the digital information structure, the transition to remote (home) work of users and others. Modern society increasingly relies on robotic and digital operations instead of human labor. All this puts the information and communication resources of the state and individual firms at risk of hacker attacks and software abuse. This paper examines the historical aspects of the development of program abuse as the basis of modern digital threats to the individual, society, and the state.

Research paper thumbnail of CYBERSECURITY RISK

Economic Security in the Context of Systemic Transformations, 2024

This paper presents the multifaceted field of cyber risks, their structure and composition, explo... more This paper presents the multifaceted field of cyber risks, their structure and composition, exploring the challenges posed by the rapid evolution of digital technologies. It highlights the prevalence of cyber risks as a set of activities performed in various sectors of human life, revealing the vulnerabilities faced by individual and collective users, commercial organisations, governments and individuals in today's hyperconnected
landscape. The paper emphasises the importance of robust risk management strategies, highlighting the dynamic and persistent nature of cyber threats. A host of relevant international standards, frameworks and cyber risk management techniques to mitigate potential losses are reviewed. Approaches to defining the category of cyber risk are analysed. Daily attack techniques are reviewed. Risk analysis based on a set of reports from leading computer firms has been carried out. The structure of cyber security threats affecting the level of risk is determined. Despite the existing scientific and practical achievements in the field of cyber security, the ever-changing tactics of cyber criminals require constant adaptation of organisational and technical actions and the adoption of a set of proactive measures. Cyber risk management strategies are
discussed, which include the selection of possible approaches, taking into account factors such as the level of cyber maturity, available resources, required skills and experience in cyber risk management. The article
identifies the most prominent risk management tools, suggests some risk management strategies and advocates a comprehensive approach to cyber security that recognises the inevitability of cyber attacks and the need to build resilience in the face of emerging threats.

Research paper thumbnail of 10th Anniversary of the Awarding of the Honorary Doctorate Diploma at the D.A. Tsenov Academy of Economics (Svishtov, Bulgaria)

10th Anniversary of the Awarding of the Honorary Doctorate Diploma at the D.A. Tsenov Academy of Economics (Svishtov, Bulgaria), 2024

10th Anniversary of the Awarding of the Honorary Doctorate Diploma at the D.A. Tsenov Academy of ... more 10th Anniversary of the Awarding of the Honorary Doctorate Diploma at the D.A. Tsenov Academy of Economics (Svishtov, Bulgaria)