Serghei A Ohrimenco | Academy of Economic Studies of Moldova (original) (raw)
Papers by Serghei A Ohrimenco
Проф. д-р Марияна Божинова-председател Проф. д-р Андрей Захариев Проф. д-р Атанас Атанасов Проф. ... more Проф. д-р Марияна Божинова-председател Проф. д-р Андрей Захариев Проф. д-р Атанас Атанасов Проф. д-р Румен Брусарски Доц. д-р Искра Пантелеева Доц. д-р Любомир Иванов Доц. д-р Румен Ерусалимов ОРГАНИЗАЦИОНЕН КОМИТЕТ Доц. д-р Галина Чиприянова-председател Проф. д-р Андрей Захариев-съпредседател Членове: Проф. д-р Румен Брусарски Проф. д-р Стоян Проданов Доц. д-р Венцислав Василев Доц. д-р Людмил Несторов Доц. д-р Пламен Петков Доц. д-р Силвия Костова Ст. преп. д-р Виктор Монев Ст. преп. д-р Радослав Николов РЕДАКЦИОНЕН СЪВЕТ Проф. д.н. Божидар Божинов Проф. д-р Георги Иванов Проф. д-р Йордан Василев Проф. д-р Пенка Шишманова Проф. д-р Стефан Симеонов Проф. д-р Теодора Димитрова Доц. д-р Красимира Славева Публикуваните материали са рецензирани. Авторите носят отговорност за съдържанието на материалите, изразените мнения, използваните данни, цитираните източници и езиковото оформление на текстовете. Всички права запазени! Не се разрешават копиране, възпроизвеждане и разпространение на книги или на части от тях по какъвто и да е начин без писменото разрешение на авторите и Академично издателство "Ценов".
Global and National Bussines Transformations - Proactive Management, Financial-Accounting and Planning Solutions
This aгticle examines document-centгic infoгmation systems as its main subject. These systems hav... more This aгticle examines document-centгic infoгmation systems as its main subject. These systems have the сараbilitу to integгate with otheг business platfoгms, such as ERP, СRМ, and ВРМ They include text editoгs, spгeadsheets, document management systems, and email clients used Ьу oгganizations and individuals to stoгe and exchange confidential infoгmation. The aгticle attempts to define the categoгy of "document-centгic systems, " гepгesented Ьу software platfoгms that focus оп document management the throughout theiг entiгe life cycle. The infoгmation content of these systems is often the taгget of cybeгattacks, which оссиr at multiple levels to access sensitive infoгmation-fгom individuals to small and medium businesses, laгge commeгcial oгganizations, and goveгnment agencies.
13TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGY AND STATISTICS IN ECONOMY AND EDUCATION ICAICTSEE – 2023, 2023
The evolution of the cyberspace domain and its accompanying management tools has ushered in an er... more The evolution of the cyberspace domain and its accompanying management tools has ushered in an era characterized by the emergence of new forms of confrontation: cyber blockades and cyber sanctions. This development has paved the ways for enhanced capabilities in economic management, the expansion of diplomatic and trade relationships, and ultimately, the safeguarding of national interests at an unprecedented
level. This paper presents the results of an analysis of these new categories, elucidating their interconnectedness, and highlighting the evolution and continued development of these two domains, particularly within cyberspace. The authors draw attention t o the new dimensions of confrontation within the cyberspace realm, encompassing explicit and
hidden threats to individuals, society, and the state.
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGY AND STATISTICS IN ECONOMY AND EDUCATION ICAICTSEE-2022, 2022
The article describes the main steps to form a model of threats to the security of personal data ... more The article describes the main steps to form a model of threats to the security of personal data during their processing in information systems. Particular attention is paid to the deliberate actions of the violator, which lead to damage to the interests of the individual, society and the state. The results of the analysis of existing methods and standards are presented, including: ISO 27005-2022, The STRIDE Threat Model, NIST Special Publication 800-37. The hierarchical intruder model is described as one of the sources of threats along with malware carriers and bookmarks, the definition and description of attack channels.
MEST Journal, 2024
Traditionally, experts considered several blockades, including sea and land, with the development... more Traditionally, experts considered several blockades, including sea and land, with the development of aircraft transportation-air, and with the advent of space technology and special satellites-space. Also, information blockades have been introduced with the rapid development of computer technology and communication tools. Each type of blockade had its historical characteristics; they differed in costs and, of course, efficiency. In the second half and at the end of the 20 th century, scientists operated the term cyber blockade and restrictions in cyberspace. The paper sequentially considers physical environments (domains): air, land, sea, outer space, information space, and cyberspace. Multiple definitions of cyberspace have emerged as this concept evolves and becomes more nuanced in response to rapid developments in the technical, technological, economic, and social dimensions of modern life. Due to their potential, cyber-attacks and cyber warfare have garnered significant attention considering the ongoing development of society and business. Cyber-attacks are carried out regularly-against government agencies, military and civilian departments, and private businesses. The growing dependence of countries on cyberspace can play a negative role in the process of confrontation. The enemy can attack those areas where cyberspace is a decisive element. The authors discussed the questions of cyber-blockade efficiency.
Cyber Conflict: Indicators and Assessments, 2023
All copyrights of this publication belong to the Editors. No parts of this publication may not be... more All copyrights of this publication belong to the Editors. No parts of this publication may not be used, copied, reproduced, redistributed, or published without being appropriately referenced. The Authors are responsible for accuracy of all statements and data containe and the accuracy of all references information, and for obtaining and submitting permission from the author and publisher of any previously published material included in this publication. The Publisher and Editors cannot be held responsible for errors or any consequences arising from the use of information contained in this this publication.
MEST Journal, Jan 15, 2021
The purpose of this paper is to analyze, discuss, and develop a study of world universal digitali... more The purpose of this paper is to analyze, discuss, and develop a study of world universal digitalization processes as well as challenges and threats, and develop an approach to defining the shadow digital economy. Along with huge innovative achievements, digitalization processes are accompanied by the formation of a digital economy and the growth of illegal activities. Digital economy implies total globalization, creates an ultra-high competitive environment, provides a new quality of life, business, and public services. At the same time, many traditional areas of activity are being destroyed. In addition to understandable achievements, it is necessary to analyze new obvious and hidden threats that digitalization processes carry. The analysis shows the causes and factors of the emergence and functioning of the new segment in the shadow economy. The approaches to the definition of this category and its content are discussed. A classification of criminal-oriented products and services that are the basis of a highly profitable illegal business has been proposed. The problem of confrontation with Shadow Digital Economics acquires particular urgency in the face of the emergence of new overt and hidden threats to the individuals, society, and the state. The main components of the digitalization process are analyzed. Conclusions are drawn about the development of shadow digitalization processes and the formation of a shadow digital economy, which is directly related to cybersecurity.
Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav
Журнал включено до категорії «Б» переліку наукових фахових видань України, в яких можуть публікув... more Журнал включено до категорії «Б» переліку наукових фахових видань України, в яких можуть публікуватися результати дисертаційних робіт на здобуття наукових ступенів доктора і кандидата наук (юридичні науки) (додаток 4 до наказу МОН України від 28.12.2019 № 1643) Видання індексується в міжнародних базах даних «Index Copernicus International» та «Crossref»
CHALLENGES FOR FINANCE AND ECONOMIC ACCOUNTING IN CONDITIONS OF MULTIPLE CRISES, 2023
In our modern world, it may seem that we have a complete understanding of threats, means of count... more In our modern world, it may seem that we have a complete understanding of threats, means of counteraction, risk management, and potential impact. However, reality turns out to be much more complex and less evident. The theory of risk management is constantly evolving and expanding, and this also applies to a new direction - risk management in cyberspace.
This paper presents an analysis of the concept of „Cybertax“ proposed by George K. Tsantes and James F. Ransome. The emergence and evolution of this concept are driven by the necessity to enhance the management of cyber security both in governmental and commercial organizations, as well as among individual users.
It should be recognized that „Cybertax“ - is a measure of the effort and resources used to prove the current state of cybersecurity to others, primarily business partners, regulators, and auditors.
Business Maanagement, 2023
The immediacy of this study is determined by the need to fight back against the modern cyber thre... more The immediacy of this study is determined by the need to fight back
against the modern cyber threats that arise in the process of building a digital economy.
The issues of countering various cyber threats in the activities of small and medium enterprises, firms stand to be a serious problem. Its relevance is constantly increasing. This is due to a number of objective reasons, the main of which are the following.
Firstly, the globalization of economic processes, which leads to a situation where the technical, software and information component of the Information System (IS) is the same in relation to all countries developed in terms of information.
Secondly, a significant change in the landscape of the IS threats themselves. It should be noted that the changes affected both quantitative and qualitative characteristics. Malware, Network Scanning, Man in the Middle, Phishing, DNS Spoofing, Trojan Horses. These are just a few examples of cyber threats carried out against small and
mid-sized businesses and government information systems every day.
The current condition of the information security system of governmental and commercial structures does not provide efficient resolving of up-to-date cybersecurity problems and creation of confident interaction between the critical infrastructure objects.
It should be assumed that there is a need to update the theoretical and
methodological base and practical developments that can protect the rights and legitimate interests of the individual, business and the state from modern security threats and increase the level of security of our economy.
11TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGY AND STATISTICS IN ECONOMY AND EDUCATION (ICAICTSEE 2021), NOVEMBER 25-26TH, 2021, UNWE, SOFIA, BULGARIA, 2021
The digital transformation, in all its aspects, is accompanied by a rapid growth of cyber threats... more The digital transformation, in all its aspects, is accompanied by a rapid growth of cyber threats and attacks on various critical infrastructure facilities. Some of cyberattacks target personal data, operations management processes, financial reporting results, etc., having as a final objective monetization of the results. Accordingly, there is a need for a complex and comprehensive analysis of information, which presents key
aspects of cyber-attacks. The current paper presents the results of a study aimed to identify and analyze possible scenarios, stages and facets of cyberattacks, highlighting potential motives, goals, objects, means of attack, specific actions, as well as the final potential results of cyber-attacks.
Management Strategies and Policies in the Contemporary Economy
Traditionally, experts considered several types of blockades, including sea, land, with the devel... more Traditionally, experts considered several types of blockades, including sea, land, with the development of aircraft construction - air, with the advent of space technology and special satellites - space. With the rapid development of computer technology and communication tools, the information blockades have been introduced. Each type of blockade had its own historical characteristics; they differed in costs and, of course, efficiency. In the second half and at the end of the 20th century, scientists operated the term cyber blockade and restrictions in the field of cyberspace. A number of definitions of cyberspace are provided, since this category changes and is refined depending on the rapidly developing technical, technological, economic and social aspects of our life. Because of the threat they pose, cyber-attacks and cyber warfare receive significant attention once society and business is developing. The growing dependence of countries on the cyberspace can play a negative role ...
Новый смысл развития предпринимательства: модель опережения, технологии, кадры, 2023
Современная санкционная политика, направленная на ограничение доступа Российской Федерации к пере... more Современная санкционная политика, направленная на ограничение доступа Российской Федерации к передовым технологиям, имеет давние исторические корни.
Решая проблему недопуска технологического превосходства СССР в мире, в ходе так называемой "холодной войны" капиталистический лагерь стал использовать стратегию управляемого технологического отставания, включающую перечень товаров и технологий, запрещенных к ввозу в СССР и другие социалистические страны.
Strategii si politici de management in economia contemporana, 2023
Traditionally, experts considered several types of blockades, including sea, land, with the devel... more Traditionally, experts considered several types of blockades, including sea,
land, with the development of aircraft construction - air, with the advent of space technology and special satellites - space. With the rapid development of computer technology and communication tools, the information blockades have been introduced. Each type of blockade had its own historical characteristics; they differed in costs and, of course, efficiency. In the second half and at the end of the 20th century, scientists operated the term cyber blockade and restrictions in the field of cyberspace.
A number of definitions of cyberspace are provided, since this category changes and is refined depending on the rapidly developing technical, technological, economic and social aspects of our life.
Because of the threat they pose, cyber-attacks and cyber warfare receive significant attention once society and business is developing. The growing dependence of countries on the cyberspace can play a negative role in the process of confrontation; the enemy can attack those areas where cyberspace is a decisive element.
Журнал включено до категорії «Б» переліку наукових фахових видань України, в яких можуть публікув... more Журнал включено до категорії «Б» переліку наукових фахових видань України, в яких можуть публікуватися результати дисертаційних робіт на здобуття наукових ступенів доктора і кандидата наук (юридичні науки) (додаток 4 до наказу МОН України від 28.12.2019 № 1643) Видання індексується в міжнародних базах даних «Index Copernicus International» та «Crossref»
2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)
Our everyday world is rapidly changing with the help of digital transformation and is increasingl... more Our everyday world is rapidly changing with the help of digital transformation and is increasingly dependent on information technology, and because of that our society needs to be prepared for new challenges and threats that come with the change. The composition of the latter is constantly shifting due to the development and improvement of computer technology, software, and methods for collecting, processing, and storing information and data. In these conditions, the relevance of scientific works on topics related to research in the field of cybercrime as an economic phenomenon increases drastically. The digital transformation of all aspects of daily activity turns the user's devices into the target of attacks aimed at taking possession of their private information (accounts, banking details, etc.) and recently even the devices' computing power. The authors see an immense necessity in studying of shadow (criminal) business models based on the development, debugging, and commercial distribution of criminal software.
2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T), 2021
Our everyday world is rapidly changing with the help of digital transformation and is increasingl... more Our everyday world is rapidly changing with the help of digital transformation and is increasingly dependent on information technology, and because of that our society needs to be prepared for new challenges and threats that come with the change. The composition of the latter is constantly shifting due to the development and improvement of computer technology, software, and methods for collecting, processing, and storing information and data. In these conditions, the relevance of scientific works on topics related to research in the field of cybercrime as an economic phenomenon increases drastically. The digital transformation of all aspects of daily activity turns the user's devices into the target of attacks aimed at taking possession of their private information (accounts, banking details, etc.) and recently even the devices' computing power. The authors see an immense necessity in studying of shadow (criminal) business models based on the development, debugging, and commercial distribution of criminal software.
2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T), 2019
the main purpose of this article is to analyze, discuss, and develop an approach to defining the ... more the main purpose of this article is to analyze, discuss, and develop an approach to defining the shadow digital economy that accompanies worldwide digitalization processes. Digital economy implies total globalization, creates an ultra-high competitive environment, provides a new quality of life, business and public services. At the same time, many traditional areas of activity are being destroyed. In addition to understandable achievements, it is necessary to analyze new obvious and hidden threats that digitalization processes carry. An analysis of the causes and factors of the emergence and functioning of the new segment in the shadow economy is conducted. The approaches to the definition of this category and its content are discussed. A classification of criminal-oriented products and services that are the basis of a highly profitable illegal business has been proposed. The problem of confrontation with Shadow Digital Economics acquires particular urgency in the face of the emerge...
Проф. д-р Марияна Божинова-председател Проф. д-р Андрей Захариев Проф. д-р Атанас Атанасов Проф. ... more Проф. д-р Марияна Божинова-председател Проф. д-р Андрей Захариев Проф. д-р Атанас Атанасов Проф. д-р Румен Брусарски Доц. д-р Искра Пантелеева Доц. д-р Любомир Иванов Доц. д-р Румен Ерусалимов ОРГАНИЗАЦИОНЕН КОМИТЕТ Доц. д-р Галина Чиприянова-председател Проф. д-р Андрей Захариев-съпредседател Членове: Проф. д-р Румен Брусарски Проф. д-р Стоян Проданов Доц. д-р Венцислав Василев Доц. д-р Людмил Несторов Доц. д-р Пламен Петков Доц. д-р Силвия Костова Ст. преп. д-р Виктор Монев Ст. преп. д-р Радослав Николов РЕДАКЦИОНЕН СЪВЕТ Проф. д.н. Божидар Божинов Проф. д-р Георги Иванов Проф. д-р Йордан Василев Проф. д-р Пенка Шишманова Проф. д-р Стефан Симеонов Проф. д-р Теодора Димитрова Доц. д-р Красимира Славева Публикуваните материали са рецензирани. Авторите носят отговорност за съдържанието на материалите, изразените мнения, използваните данни, цитираните източници и езиковото оформление на текстовете. Всички права запазени! Не се разрешават копиране, възпроизвеждане и разпространение на книги или на части от тях по какъвто и да е начин без писменото разрешение на авторите и Академично издателство "Ценов".
Global and National Bussines Transformations - Proactive Management, Financial-Accounting and Planning Solutions
This aгticle examines document-centгic infoгmation systems as its main subject. These systems hav... more This aгticle examines document-centгic infoгmation systems as its main subject. These systems have the сараbilitу to integгate with otheг business platfoгms, such as ERP, СRМ, and ВРМ They include text editoгs, spгeadsheets, document management systems, and email clients used Ьу oгganizations and individuals to stoгe and exchange confidential infoгmation. The aгticle attempts to define the categoгy of "document-centгic systems, " гepгesented Ьу software platfoгms that focus оп document management the throughout theiг entiгe life cycle. The infoгmation content of these systems is often the taгget of cybeгattacks, which оссиr at multiple levels to access sensitive infoгmation-fгom individuals to small and medium businesses, laгge commeгcial oгganizations, and goveгnment agencies.
13TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGY AND STATISTICS IN ECONOMY AND EDUCATION ICAICTSEE – 2023, 2023
The evolution of the cyberspace domain and its accompanying management tools has ushered in an er... more The evolution of the cyberspace domain and its accompanying management tools has ushered in an era characterized by the emergence of new forms of confrontation: cyber blockades and cyber sanctions. This development has paved the ways for enhanced capabilities in economic management, the expansion of diplomatic and trade relationships, and ultimately, the safeguarding of national interests at an unprecedented
level. This paper presents the results of an analysis of these new categories, elucidating their interconnectedness, and highlighting the evolution and continued development of these two domains, particularly within cyberspace. The authors draw attention t o the new dimensions of confrontation within the cyberspace realm, encompassing explicit and
hidden threats to individuals, society, and the state.
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGY AND STATISTICS IN ECONOMY AND EDUCATION ICAICTSEE-2022, 2022
The article describes the main steps to form a model of threats to the security of personal data ... more The article describes the main steps to form a model of threats to the security of personal data during their processing in information systems. Particular attention is paid to the deliberate actions of the violator, which lead to damage to the interests of the individual, society and the state. The results of the analysis of existing methods and standards are presented, including: ISO 27005-2022, The STRIDE Threat Model, NIST Special Publication 800-37. The hierarchical intruder model is described as one of the sources of threats along with malware carriers and bookmarks, the definition and description of attack channels.
MEST Journal, 2024
Traditionally, experts considered several blockades, including sea and land, with the development... more Traditionally, experts considered several blockades, including sea and land, with the development of aircraft transportation-air, and with the advent of space technology and special satellites-space. Also, information blockades have been introduced with the rapid development of computer technology and communication tools. Each type of blockade had its historical characteristics; they differed in costs and, of course, efficiency. In the second half and at the end of the 20 th century, scientists operated the term cyber blockade and restrictions in cyberspace. The paper sequentially considers physical environments (domains): air, land, sea, outer space, information space, and cyberspace. Multiple definitions of cyberspace have emerged as this concept evolves and becomes more nuanced in response to rapid developments in the technical, technological, economic, and social dimensions of modern life. Due to their potential, cyber-attacks and cyber warfare have garnered significant attention considering the ongoing development of society and business. Cyber-attacks are carried out regularly-against government agencies, military and civilian departments, and private businesses. The growing dependence of countries on cyberspace can play a negative role in the process of confrontation. The enemy can attack those areas where cyberspace is a decisive element. The authors discussed the questions of cyber-blockade efficiency.
Cyber Conflict: Indicators and Assessments, 2023
All copyrights of this publication belong to the Editors. No parts of this publication may not be... more All copyrights of this publication belong to the Editors. No parts of this publication may not be used, copied, reproduced, redistributed, or published without being appropriately referenced. The Authors are responsible for accuracy of all statements and data containe and the accuracy of all references information, and for obtaining and submitting permission from the author and publisher of any previously published material included in this publication. The Publisher and Editors cannot be held responsible for errors or any consequences arising from the use of information contained in this this publication.
MEST Journal, Jan 15, 2021
The purpose of this paper is to analyze, discuss, and develop a study of world universal digitali... more The purpose of this paper is to analyze, discuss, and develop a study of world universal digitalization processes as well as challenges and threats, and develop an approach to defining the shadow digital economy. Along with huge innovative achievements, digitalization processes are accompanied by the formation of a digital economy and the growth of illegal activities. Digital economy implies total globalization, creates an ultra-high competitive environment, provides a new quality of life, business, and public services. At the same time, many traditional areas of activity are being destroyed. In addition to understandable achievements, it is necessary to analyze new obvious and hidden threats that digitalization processes carry. The analysis shows the causes and factors of the emergence and functioning of the new segment in the shadow economy. The approaches to the definition of this category and its content are discussed. A classification of criminal-oriented products and services that are the basis of a highly profitable illegal business has been proposed. The problem of confrontation with Shadow Digital Economics acquires particular urgency in the face of the emergence of new overt and hidden threats to the individuals, society, and the state. The main components of the digitalization process are analyzed. Conclusions are drawn about the development of shadow digitalization processes and the formation of a shadow digital economy, which is directly related to cybersecurity.
Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav
Журнал включено до категорії «Б» переліку наукових фахових видань України, в яких можуть публікув... more Журнал включено до категорії «Б» переліку наукових фахових видань України, в яких можуть публікуватися результати дисертаційних робіт на здобуття наукових ступенів доктора і кандидата наук (юридичні науки) (додаток 4 до наказу МОН України від 28.12.2019 № 1643) Видання індексується в міжнародних базах даних «Index Copernicus International» та «Crossref»
CHALLENGES FOR FINANCE AND ECONOMIC ACCOUNTING IN CONDITIONS OF MULTIPLE CRISES, 2023
In our modern world, it may seem that we have a complete understanding of threats, means of count... more In our modern world, it may seem that we have a complete understanding of threats, means of counteraction, risk management, and potential impact. However, reality turns out to be much more complex and less evident. The theory of risk management is constantly evolving and expanding, and this also applies to a new direction - risk management in cyberspace.
This paper presents an analysis of the concept of „Cybertax“ proposed by George K. Tsantes and James F. Ransome. The emergence and evolution of this concept are driven by the necessity to enhance the management of cyber security both in governmental and commercial organizations, as well as among individual users.
It should be recognized that „Cybertax“ - is a measure of the effort and resources used to prove the current state of cybersecurity to others, primarily business partners, regulators, and auditors.
Business Maanagement, 2023
The immediacy of this study is determined by the need to fight back against the modern cyber thre... more The immediacy of this study is determined by the need to fight back
against the modern cyber threats that arise in the process of building a digital economy.
The issues of countering various cyber threats in the activities of small and medium enterprises, firms stand to be a serious problem. Its relevance is constantly increasing. This is due to a number of objective reasons, the main of which are the following.
Firstly, the globalization of economic processes, which leads to a situation where the technical, software and information component of the Information System (IS) is the same in relation to all countries developed in terms of information.
Secondly, a significant change in the landscape of the IS threats themselves. It should be noted that the changes affected both quantitative and qualitative characteristics. Malware, Network Scanning, Man in the Middle, Phishing, DNS Spoofing, Trojan Horses. These are just a few examples of cyber threats carried out against small and
mid-sized businesses and government information systems every day.
The current condition of the information security system of governmental and commercial structures does not provide efficient resolving of up-to-date cybersecurity problems and creation of confident interaction between the critical infrastructure objects.
It should be assumed that there is a need to update the theoretical and
methodological base and practical developments that can protect the rights and legitimate interests of the individual, business and the state from modern security threats and increase the level of security of our economy.
11TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGY AND STATISTICS IN ECONOMY AND EDUCATION (ICAICTSEE 2021), NOVEMBER 25-26TH, 2021, UNWE, SOFIA, BULGARIA, 2021
The digital transformation, in all its aspects, is accompanied by a rapid growth of cyber threats... more The digital transformation, in all its aspects, is accompanied by a rapid growth of cyber threats and attacks on various critical infrastructure facilities. Some of cyberattacks target personal data, operations management processes, financial reporting results, etc., having as a final objective monetization of the results. Accordingly, there is a need for a complex and comprehensive analysis of information, which presents key
aspects of cyber-attacks. The current paper presents the results of a study aimed to identify and analyze possible scenarios, stages and facets of cyberattacks, highlighting potential motives, goals, objects, means of attack, specific actions, as well as the final potential results of cyber-attacks.
Management Strategies and Policies in the Contemporary Economy
Traditionally, experts considered several types of blockades, including sea, land, with the devel... more Traditionally, experts considered several types of blockades, including sea, land, with the development of aircraft construction - air, with the advent of space technology and special satellites - space. With the rapid development of computer technology and communication tools, the information blockades have been introduced. Each type of blockade had its own historical characteristics; they differed in costs and, of course, efficiency. In the second half and at the end of the 20th century, scientists operated the term cyber blockade and restrictions in the field of cyberspace. A number of definitions of cyberspace are provided, since this category changes and is refined depending on the rapidly developing technical, technological, economic and social aspects of our life. Because of the threat they pose, cyber-attacks and cyber warfare receive significant attention once society and business is developing. The growing dependence of countries on the cyberspace can play a negative role ...
Новый смысл развития предпринимательства: модель опережения, технологии, кадры, 2023
Современная санкционная политика, направленная на ограничение доступа Российской Федерации к пере... more Современная санкционная политика, направленная на ограничение доступа Российской Федерации к передовым технологиям, имеет давние исторические корни.
Решая проблему недопуска технологического превосходства СССР в мире, в ходе так называемой "холодной войны" капиталистический лагерь стал использовать стратегию управляемого технологического отставания, включающую перечень товаров и технологий, запрещенных к ввозу в СССР и другие социалистические страны.
Strategii si politici de management in economia contemporana, 2023
Traditionally, experts considered several types of blockades, including sea, land, with the devel... more Traditionally, experts considered several types of blockades, including sea,
land, with the development of aircraft construction - air, with the advent of space technology and special satellites - space. With the rapid development of computer technology and communication tools, the information blockades have been introduced. Each type of blockade had its own historical characteristics; they differed in costs and, of course, efficiency. In the second half and at the end of the 20th century, scientists operated the term cyber blockade and restrictions in the field of cyberspace.
A number of definitions of cyberspace are provided, since this category changes and is refined depending on the rapidly developing technical, technological, economic and social aspects of our life.
Because of the threat they pose, cyber-attacks and cyber warfare receive significant attention once society and business is developing. The growing dependence of countries on the cyberspace can play a negative role in the process of confrontation; the enemy can attack those areas where cyberspace is a decisive element.
Журнал включено до категорії «Б» переліку наукових фахових видань України, в яких можуть публікув... more Журнал включено до категорії «Б» переліку наукових фахових видань України, в яких можуть публікуватися результати дисертаційних робіт на здобуття наукових ступенів доктора і кандидата наук (юридичні науки) (додаток 4 до наказу МОН України від 28.12.2019 № 1643) Видання індексується в міжнародних базах даних «Index Copernicus International» та «Crossref»
2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)
Our everyday world is rapidly changing with the help of digital transformation and is increasingl... more Our everyday world is rapidly changing with the help of digital transformation and is increasingly dependent on information technology, and because of that our society needs to be prepared for new challenges and threats that come with the change. The composition of the latter is constantly shifting due to the development and improvement of computer technology, software, and methods for collecting, processing, and storing information and data. In these conditions, the relevance of scientific works on topics related to research in the field of cybercrime as an economic phenomenon increases drastically. The digital transformation of all aspects of daily activity turns the user's devices into the target of attacks aimed at taking possession of their private information (accounts, banking details, etc.) and recently even the devices' computing power. The authors see an immense necessity in studying of shadow (criminal) business models based on the development, debugging, and commercial distribution of criminal software.
2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T), 2021
Our everyday world is rapidly changing with the help of digital transformation and is increasingl... more Our everyday world is rapidly changing with the help of digital transformation and is increasingly dependent on information technology, and because of that our society needs to be prepared for new challenges and threats that come with the change. The composition of the latter is constantly shifting due to the development and improvement of computer technology, software, and methods for collecting, processing, and storing information and data. In these conditions, the relevance of scientific works on topics related to research in the field of cybercrime as an economic phenomenon increases drastically. The digital transformation of all aspects of daily activity turns the user's devices into the target of attacks aimed at taking possession of their private information (accounts, banking details, etc.) and recently even the devices' computing power. The authors see an immense necessity in studying of shadow (criminal) business models based on the development, debugging, and commercial distribution of criminal software.
2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T), 2019
the main purpose of this article is to analyze, discuss, and develop an approach to defining the ... more the main purpose of this article is to analyze, discuss, and develop an approach to defining the shadow digital economy that accompanies worldwide digitalization processes. Digital economy implies total globalization, creates an ultra-high competitive environment, provides a new quality of life, business and public services. At the same time, many traditional areas of activity are being destroyed. In addition to understandable achievements, it is necessary to analyze new obvious and hidden threats that digitalization processes carry. An analysis of the causes and factors of the emergence and functioning of the new segment in the shadow economy is conducted. The approaches to the definition of this category and its content are discussed. A classification of criminal-oriented products and services that are the basis of a highly profitable illegal business has been proposed. The problem of confrontation with Shadow Digital Economics acquires particular urgency in the face of the emerge...
Экономические санкции в сфере информационных технологий
В монографии систематизированы различные аспекты санкций, включая их исторический контекст, текущ... more В монографии систематизированы различные аспекты санкций, включая их исторический контекст, текущие тенденции, а также многообразие подходов к оценке их эффективности. Особое внимание уделено анализу современных киберсанкций и их влиянию на международные отношения и глобальную экономику. Содержание данной монографии является логическим продолжением проведенных исследований авторов.
Материал предназначен для широкого круга читателей, включая преподавателей, студентов, аспирантов экономических специальностей, научных сотрудников, работников организаций и предприятий.
The Elgar Companion to Information Economics, 2024
The main goal of this work is to analyze, discuss, and develop the theoretical foundations of the... more The main goal of this work is to analyze, discuss, and develop the theoretical foundations of the shadow digital economy, which was intensely developed in parallel with the digitalization processes of the economies of the leading countries of the world. Based on the analysis of literary sources, a definition of “shadow digital economy” (SDE) with the identification of legal, mathematical, socio-psychological and managerial approaches is proposed. Organized forms of traditional crime and their possible connection with the SDE, and the classification of actors in informational counteraction are considered. Such general features as latent nature, coverage of all phases of social production, etc. are highlighted as the basis for the functioning of the SDE, as an entrepreneurial activity. The most important feature should be considered the parasitic nature of all the processes of the SDE, including but not limited to simple actions to disclose/unauthorized change of the source code of the software product, the monetization of renting botnets and so on. The activities of some of the most prominent hacker groups are considered.
Государство и рынок: евразийская доминанта развития в условиях формирования многополярного мира : коллективная монография / под ред. д-ра экон, наук, проф. С.А. Дятлова, д-ра экон, наук, Д.Ю. Миропольского, д-ра экон, наук, проф. Т.А. Селшцевой. - СПб. : Изд-во СПбГЭУ, 2023. - 632 с., 2023
Хакинг, как явление, возникло относительно недавно, получило развитие в усло-виях распространения... more Хакинг, как явление, возникло относительно недавно, получило развитие в усло-виях распространения информационно-коммуникационных технологий и глобальной сети Интернет. Данная деятельность представляет собой внесение изменений в состав программного обеспечения для достижения определенных (чаще всего, корыстных) це-лей. Данные несанкционированные измерения являются вредоносными и могут пред-ставлять серьезную угрозу личности, обществу и государству.
Человеческий капитал в в модели устойчивого экономического роста России, 2022
Наш мир стремительно изменяется под влиянием цифровой трансформации, и необходима серьезная подго... more Наш мир стремительно изменяется под влиянием цифровой трансформации, и необходима серьезная подготовка к новыи вызовам и угрозам. Состав последних постоянно изменяется вследствие развития и совершенствования вычислительной техники, программного обемпечения и технологий сбора, обработки и хранения информации. В этих условиях возрастает актуальность научно-исследовательских работ по тематике, связанной с оцценкой возможных угроз в цифровой экономике.
SOCIO-ECONOMIC DEVELOPMENT - o- INTERDISCIPLINARY ECOSYSTEMS PERSPECTIVE, 2020
The transitional stage in scientific and technological development, the complex processes of ado... more The transitional stage in scientific and technological development, the complex processes of adoption of modern innovations are associated with the implementation of the concept of the fourth industrial revolution, Industry 4.0. At this moment, its analogues and more advanced versions are being implemented all over the world. Having become the universally recognised management term, Industry
4.0 is used in a much broader sense than its original meaning, encompassing many innovations. Among them are smart manufacturing, the Internet of Things, artificial intelligence, a variety of nano-devices, 3D printing (including food, organs and tissues), medical robotic surgeons, and many others. The emergence of new
technologies is not accidental, it is an answer to the pressing problems of modern generations who want to save time and money by receiving services in digital format.
CONFERINŢĂ INTERNAŢIONALĂ (ediţia a VIII-a), 2011
SECURITATEA INFORMAŢIONALĂ 2011 CONFERINŢĂ INTERNAŢIONALĂ (ediţia a VIII-a) 4 mai 2011
SECURITATEA INFORMAŢIONALĂ 2010 CONFERINŢĂ INTERNAŢIONALĂ ( ediţia a VII-a), 2010
CONFERINŢĂ INTERNAŢIONALĂ ( ediţia a VII-a)
НОВОЕ НАПОЛНЕНИЕ НАУКИ СЕКЬЮРИТОГИИ, 2019
This paper discusses the problematic situation of criminal information technologies, their defini... more This paper discusses the problematic situation of criminal information
technologies, their definitions, market structure, and, in conclusion, provides directions for further research.
"Economics,Management, Finance and Banking", 2022
A sector of economic relations covering all types of production and economic activities that, in... more A sector of economic relations covering all types of production and economic activities that, in their focus, content, nature and form, contradict the requirements of the law and are being carried out contrary to state regulation of the economy and bypassing control over it
Основные сегменты теневой цифровой экономики, 2022
Основные сегменты теневой цифровой экономики
International Scientific Conference MANAGEMENT 2020 - ZITEH 2020, 2020
The purpose o f this paper is to analyze, discuss and develop a study o f world universal digita... more The purpose o f this paper is to analyze, discuss and develop a study o f world universal digitalization processes as well as challenges and threats, and develop an approach to defining the shadow digital economy. Along with huge innovative achievements, digitalization processes are accompanied by the formation of a digital economy and the growth o f illegal activities. Digital economy implies total
globalization, creates an ultra-high competitive environment, provides a new quality of life, business and public services. At the same time, many traditional areas of activity are being destroyed. In addition to understandable achievements, it is necessary to analyze new obvious and hidden threats that digitalization processes carry. The analysis of the causes and factors o f the emergence and functioning of the new segment in the shadow economy. The approaches to the definition o f this category and its content are discussed. A classification of criminal-oriented products and services that are the basis of a highly profitable illegal business has been proposed. The problem of
confrontation with Shadow Digital Economics acquires particular urgency in the face of the emergence of new overt and hidden threats to the individuals, society and the state. The main components of the digitalization process are analyzed.
DIGITAL THREAT ANALYSIS
Our ubiquitous world is changing rapidly under the influence of digital transformation and seriou... more Our ubiquitous world is changing rapidly under the influence of digital
transformation and serious preparation for new challenges and threats is required. The composition of the latter is constantly changing due to the development and improvement of computing equipment, software and technologies for collecting, processing and storing information. Under these conditions, the relevance of research work on topics related to the
assessment of possible threats in the digital economy is increasing. An additional factor of influence is changes in the digital information structure, the transition to remote (home) work of users and others. Modern society increasingly relies on robotic and digital operations instead of human labor. All this puts the information and communication resources of the state and individual firms at risk of hacker attacks and software abuse. This paper examines the historical aspects of the development of program abuse as the basis of modern digital threats to the individual, society, and the state.
Economic Security in the Context of Systemic Transformations, 2024
This paper presents the multifaceted field of cyber risks, their structure and composition, explo... more This paper presents the multifaceted field of cyber risks, their structure and composition, exploring the challenges posed by the rapid evolution of digital technologies. It highlights the prevalence of cyber risks as a set of activities performed in various sectors of human life, revealing the vulnerabilities faced by individual and collective users, commercial organisations, governments and individuals in today's hyperconnected
landscape. The paper emphasises the importance of robust risk management strategies, highlighting the dynamic and persistent nature of cyber threats. A host of relevant international standards, frameworks and cyber risk management techniques to mitigate potential losses are reviewed. Approaches to defining the category of cyber risk are analysed. Daily attack techniques are reviewed. Risk analysis based on a set of reports from leading computer firms has been carried out. The structure of cyber security threats affecting the level of risk is determined. Despite the existing scientific and practical achievements in the field of cyber security, the ever-changing tactics of cyber criminals require constant adaptation of organisational and technical actions and the adoption of a set of proactive measures. Cyber risk management strategies are
discussed, which include the selection of possible approaches, taking into account factors such as the level of cyber maturity, available resources, required skills and experience in cyber risk management. The article
identifies the most prominent risk management tools, suggests some risk management strategies and advocates a comprehensive approach to cyber security that recognises the inevitability of cyber attacks and the need to build resilience in the face of emerging threats.
10th Anniversary of the Awarding of the Honorary Doctorate Diploma at the D.A. Tsenov Academy of Economics (Svishtov, Bulgaria), 2024
10th Anniversary of the Awarding of the Honorary Doctorate Diploma at the D.A. Tsenov Academy of ... more 10th Anniversary of the Awarding of the Honorary Doctorate Diploma at the D.A. Tsenov Academy of Economics (Svishtov, Bulgaria)