scholarly journals Challenges and Aspects of Cyber Security of the Republic of Croatia

2017 ◽  
Vol 3 (1) ◽  
pp. 87-95
Author(s):  
Nikola Protrka ◽  
Kristijan Marić ◽  
Mihael Plećaš

Abstract The development of the information and communication technology (ICT), regardless of its many advantages, unfortunately has its disadvantage - the abuse of the cyberworld. The global character of cyberspace is specific in terms of national legislation and its view of specificities. Some countries adopted the recommendation of the Convention on Cybercrime of the Council of Europe (Official Gazette NN-MU 9/02, 4/04) and amended their national legislation, whereas others kept implementing their criminal law solutions, which are outdated and cannot reach the level of this type of criminal offences. Consequently, governments are inclined to cooperate and exchange information about this type of crime due to the fact that the criminal offender may be anywhere, and the offence itself can take place at a great distance from the offender. In September 2015, the government of the Republic of Croatia adopted the National Cyber Security Strategy and the Action Plan for the Implementation of the National Cyber Security Strategy, the first allencompassing strategy of the Republic of Croatia on cyber security. The paper also focuses on the role of the Police College in the Action Plan for the Implementation of the National Cyber Security Strategy.

2016 ◽  
Vol 4 (1) ◽  
pp. 61 ◽  
Author(s):  
Muhamad Rizal ◽  
Yanyan Yani

The purpose of state defense is to protect and to save the integrity of the Unitary State of the Republic of Indonesia, the sovereignty of the state, as well as its security from all kinds of threats, whether they are military or non-military ones. One of the non-military threats that potentially threatens the sovereignty and security of the nation-state is the misuse of technology and information in cyberspace. The threat of irresponsible cyber attacks can be initiated by both state and non-state actors. The actors may be an individual, a group of people, a faction, an organization, or even a country. Therefore, the government needs to anticipate cyber threats by formulating cyber security strategies and determining comprehensive steps to defend against cyber attacks; its types and the scale of counter-measures, as well as devising the rules of law. 


2021 ◽  
Vol 21 (2) ◽  
pp. 171-184
Author(s):  
Muawwan Muawwan

Abstract   The escalation of cyber threats in Singapore has prompted the country to intensify its cyberspace security protection. Singapore then implemented numerous strategies by collaborating across agencies and actors to obtain a protective cyberspace security system. This research aimed at figuring out Singapore Cyber Security Strategy (SCSS) documents comprehensively throughout textual analysis based on qualitative approach of an emerging-dominant elements in documents such as actor, instrument, politic, economy, research, and collaboration which were cooperated within actors. The author also fulfilled this analysis using qualitative approach to measure the data relation and the big picture of SCSS documents. Finally, the author found that Singapore’s strategy in applications and infrasctructure aspects, the government intervened them intensively. Singapore, one of the highest technological expertise countries in Southeast Asia, was fuflnerable getting the threats or attacks. So, this country was regulating an excellent cyber system and infrastructure to proctect their cyber management system secure. Meanwhile, Singapore’s policy in core aspects was a transfer due to the fact that Singapore was multi-ethnical and multi-culturalism country. Thus, Singapore’s strategy for ideological aspects was not regulated significantly in SCSS documents.   Keywords: Cyber Security Strategy, Data Relation, Sovereignty   Abstrak   Eskalasi ancaman terhadap ruang siber yang terjadi di Singapura telah mendorong negara tersebut untuk meningkatkan proteksi keamanan ruang sibernya. Singapura kemudian menerapkan berbagai strategi dengan cara menjalin kerjasama lintas instansi dan aktor untuk memperoleh sistem keamanan ruang siber yang lebih protektif. Tulisan ini bermaksud untuk memahami dokumen Singapore Cyber Security Strategy (SCSS) secara komprehensif dengan melakukan analisis kontekstual berdasarkan pendekatan kualitatif terhadap sejumlah unsur yang dominan muncul di dalam dokumen seperti aktor, instrument, politik, ekonomi, penelitian, dan kolaborasi yang dibangun di antara para aktor. Penulis juga melengkapi analisis ini dengan pendekatan kuantitatif untuk mengukur relasi data dan kecenderungan yang tergambar dari dokumen SCSS tersebut. Hasilnya, penulis menemukan bahwa pada level strategi di sektor application dan infrastruktur, pemerintah Singapura memiliki intervensi penuh dalam mengatur seluruh aktivitas di kedua aspek tersebut. Sebagai salah satu negara yang cukup signifikan di dalam pengelolaan teknologinya di kawasan Asia Tenggara, maka Singapura secara eksklusif berupaya membangun sistem dan infrastruktur siber yang mumpuni untuk melindungi tata kelola ruang siber mereka dari berbagai ancaman. Berbeda pada aspek core yang bersifat lebih terbuka (transfer) lantaran banyak dipengaruhi oleh multietnis dan multikulturalisme. Sehingga proteksi terhadap hal-hal yang bersifat ideologis tidak banyak diatur di dalam dokumen SCSS.   Kata kunci: Kedaulatan, Relasi Data, Strategi Keamanan Siber


Author(s):  
Aram Ayvazyan

The Decision of the Government of the Republic of Armenia No 1332-N of 3 October 2019 on Confirmation of the Anti-Corruption Strategy of the Republic of Armenia and its 2019-2022 Action Plan have been studied in the article recognizing its importance in the scope anti-corruption policy implemented by state authorities of the Republic of Armenia. In parallel, some theoretical and law enforcement issues of Plan have been revealed and specific proposals have been made to solve or counteract them as much as possible.


2021 ◽  
Vol 244 ◽  
pp. 10044
Author(s):  
Madina A Raimjanova ◽  
Dildora Kh Shadiyeva ◽  
Laziz S Zoyirov ◽  
Rasulbek B Saidov ◽  
Mavluda T Askarova

The article is devoted to an overview of the development and state of the digital economy of the Republic of Uzbekistan and the world as a whole. In particular, the role of information and communication technologies in enhancing the economic growth of countries and facilitating access to public services is being examined. The main components that stimulate the development of the country’s digital economy (investments in information and communication technologies and their development, digital infrastructure, e-government) are revealed. When studying the material, the methods of analysis, observation, grouping, comparison of world experience in the development of information and communication technologies, and the digitization of the economy were used. A review of the main world ratings that are significant in the development of the digital economy is carried out and the place of the Republic of Uzbekistan in the ratings is revealed, a growth trend is noted. The analysis of the prospects of digital technologies in the Republic of Uzbekistan is carried out, the special role of the documents issued by the government on the development of the digital economy, as well as the organizations created that allow making innovative proposals, is noted. Based on the results of the study of the material, recommendations were made for improving the state of the digital economy in the country and in the world as a whole. These recommendations are also reflected in the regulatory documents on regulating the digitalization of the economy of the Republic of Uzbekistan.


2021 ◽  
Vol IV(1) ◽  
Author(s):  
Arina Alexei ◽  

. Data protection in public organizations in the Republic of Moldova (RM) is ensured by implementing mandatory cyber security controls (MCSR) adopted by the Government. In order to analyze the completeness of the controls, a comparative study was conducted between MCSR and the cyber security standard ISO 27001. The intention to comply with international cyber security standards is reflected in the Strategy on Information Security in the RM for 2019-2024. Compliance with national cyber security controls to international standards will ensure the security of the organization's data and resources by implementing effective, time-verified security controls. Another benefit is the confidence of foreign partners in public organizations of the country, because there will be guarantees that the data provided is confidential, complete and available. It is very important to increase the number of public organizations, certified with the ISO 27001 standard in Moldova in order to ensure the level of compliance with international cyber security requirements. The gap method, which was used in this study, measures the completeness of the MCSR, which is mandatory for public institutions in the Republic of Moldova, compared to the international standard ISO 27001. Based on the results obtained, a series of recommendations were developed which include: the creation of information security management systems (ISMS); performing internal and external audit of systems to meet trends; alignment of the MCSR, issued by the Government of the Republic of Moldova to the security controls of the ISO 27001 standard. It is very important to ensure an acceptable level of cyber security in public institutions in the Republic of Moldova, therefore implementation and certification with international standards is mandatory.


2021 ◽  
Vol 21 (1) ◽  
pp. 69-84
Author(s):  
Putri Bilqis Oktaviani ◽  
Anggraeni Silvia

This research discusses the analysis of security strategy policies made by the Malaysian government in the protection and development of Malaysian cyberspace. This research will explain in detail the strategy of developing challenges as well as the aspects that support the Malaysian cyber space to be saved by the Malaysian cyber space. This research will further discuss the Malaysian security strategy through the official document of the Malaysian security strategy which will later be analyzed through the MAXQDA and GEPHI applications in order to classify the various categories that support it. This research will use the security concept published by Hao Yeli in Three - Perspective Theory of Cyber ​​Sovereignty to classify ideas and data. This research finds that the security of the Malaysian system needs to be developed from both capacity and capability so that the government needs to work together with various related parties   Keywords: Cyber Security, Cybersecurity Challenges, Soveignty   Abstrak   Penelitian ini membahas tentang analisis kebijakan strategi keamanan siber yang dibuat oleh pemerintah Malaysia dalam perlindungan dan pengembangan keamanan ruang siber Malaysia. Penelitian ini akan menjelaskan secara details strategi, tantangan serta aspek – aspek yang mendukung pengembangan ruang siber Malaysia guna mengamankan ruang siber Malaysia. Penelitian ini akan membahas lebih jauh strategi keamanan Malaysia melalui dokumen resmi strategi keamanan siber Malaysia yang nantinya akan di bedah melalui aplikasi MAXQDA dan GEPHI guna mengklasifikasikan berbagai kategori yang mendukung. Penelitian ini akan menggunakan konsep keamanan yang dipublikasikan oleh Hao Yeli dalam A Three – Perspective Theory of Cyber Sovereignty guna mengkasifikasikan gagasan dan data dengan menggunakan metode penelitian kuantitatif. Penelitian ini menemukan bahwa keamanan siber Malaysia perlu dikembangkan baik dari kapasitas maupun kapabilitas sehingga pemerintah Malasyaia perlu bekerjasama dengan berbagai pihak yang terkait.   Kata kunci: Cyber Security, Tantangan Keamanan Cyber, Kedaulatan


Energies ◽  
2022 ◽  
Vol 15 (2) ◽  
pp. 401
Author(s):  
Feyruz Mustafayev ◽  
Przemyslaw Kulawczuk ◽  
Christian Orobello

Azerbaijan has a well-developed hydrocarbon industry backed with abundant domestic resources. Oil and gas have played a crucial role in the economic revival of the country since independence was regained back in 1991. The legal foundation of the transition to carbon-zero energy generation was laid in the 1990s with a number of acts mentioning the importance of the shift. The government has an ambitious plan to improve the situation, though an action plan with targeted renewables share in production and consumption is still to be prepared. This study, based on systematic review methodology for qualitative research, analyzes the potential of renewables in Azerbaijan with a focus on solar and wind power, discusses the deficiencies hindering the development of the renewables industry, and develops recommendations on applicable actions to improve the situation in this regard. It also includes legislative acts of the Republic concerning renewable energy. The main objective of the study is to explore renewable energy potentials and assess the readiness of the country to make a shift towards green energy. The findings of the article demonstrate enough potential to increase the share of renewables. The potential, however, is obscured with a relatively less solid legal framework and a lack of expertise in the industry.


2021 ◽  
Vol 6 (2) ◽  
Author(s):  
SUKMA ULI NUHA SUGIYONO ◽  
Muhammad Miqdad Miqdad ◽  
Agung Budi Sulistiyo Sulistiyo

According to the Government Regulation of the Republic of Indonesia Number 60 of 2008 concerning the Government's Internal Control System, SPIP is an internal control system that is carried out thoroughly within the Central Government and Regional Governments. The important role of the SPIP is expected to create a culture of supervision over all activities in the entity so that early on it can detect the possibility of storage and minimize the occurrence of actions that can harm the state. SPIP which consists of elements of the Control Environment, Risk Assessment, Control Activities, Information and Communication, and Control Monitoring.The work of the KPU, both in Jember and other regions, is a phased work, which focuses on elections at both the central and regional levels so that the focus of work at this stage is that at this time SPIP reporting is only for administrative purposes. This is the reason why the author describes the phenomena that exist in the field, with the hope that in the future it will not only be an administrative complement but can be used as a control to increase the effectiveness of management at the Jember Regency KPU and can implement SPIP on an ongoing basis. The type of research used is qualitative research using a phenomenological study approach, because the author wants to describe the implementation of SPIP in Jember Regency KPU.


2021 ◽  
Vol 8 (1) ◽  
pp. 72-79
Author(s):  
Ida Farida ◽  
Annisa Lestari

E-Government implementation is the use of technology, information, and communication to realize more efficient and effective government practices in the process of implementing public services in order to facilitate public access to information and create principles of accountability, transparency and good public participation in the Indonesian government. This study aims to explain the implementation of E-Government in Indonesia which encourages the development of information and data systems and is adapted to existing bureaucratic processes. The method used in this research is qualitative research methods. The results showed that public service innovation organized by the government of the Republic of Indonesia was able to create relationships between elements in a country online, not inline, so that efficiency and speed in public services was not only a symbol but a reality.


Author(s):  
Aki-Mauri Huhtinen ◽  
Tommi Kangasmaa ◽  
Arto Hirvelä

Securing society is a central task of the state. In the present day as well as in the future, knowledge and information are ever more closely tied to electronic data transfer. Finland's published Cyber Security Strategy depicts how the government safeguards electronic data transfer, that is, information security against different threat and risk scenarios. Cyber Security Strategy was introduced 2013 and has provided guidance to all governmental actors how to implement security activities to be able to respond to increased security threats in networks. Visuality has increasing importance in strategic communications, not least because it is faster than the written word and globally distributed via social media. Relatedly, camera drones are becoming increasingly important tools in the security economy, especially when it comes to enhancing military capability through combat cameras. The main challenge facing society is that the cyber domain in general, and social media in particular, is moving out of the control of the nation-state.


Sign in / Sign up

Export Citation Format

Share Document