Please use this identifier to cite or link to this item:
https://dspace.kmf.uz.ua/jspui/handle/123456789/5896Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Artem Rudenko | en |
| dc.contributor.author | Natalia Bilous | en |
| dc.contributor.author | Наталя Білоус | uk |
| dc.date.accessioned | 2026-02-13T10:23:13Z | - |
| dc.date.available | 2026-02-13T10:23:13Z | - |
| dc.date.issued | 2025 | - |
| dc.identifier.citation | In Csernicskó István, Maruszinec Marianna, Molnár D. Erzsébet, Mulesza Okszána és Melehánics Anna (szerk.): A biztonság szerepe a határon átnyúló és nemzetközi együttműködésben. Nemzetközi tudományos és szakmai konferencia Beregszász, 2025. október 8–9. Absztraktkötet. Beregszász, II. Rákóczi Ferenc Kárpátaljai Magyar Egyetem, 2025. pp. 246-247. | en |
| dc.identifier.isbn | 978-617-8143-50-3 (puhatáblás) | - |
| dc.identifier.isbn | 978-617-8143-51-0 (PDF) | - |
| dc.identifier.uri | https://dspace.kmf.uz.ua/jspui/handle/123456789/5896 | - |
| dc.description | Teljes kiadvány: https://kme.org.ua/uk/publications/rol-bezpeki-v-transkordonnomu-ta-mizhnarodnomu-spivrobitnictvi/ | en |
| dc.description.abstract | Abstract. In the context of globalization, information security challenges are becoming increasingly acute, as cyber threats recognize no state borders, and the fragmented nature of regulation leaves critical infrastructure vulnerable. This, in turn, heightens the need for harmonized international cybersecurity standards [1]. Cross-border data exchange and digital interaction create new vulnerabilities: attacks on governmental and communication systems, unauthorized access to sensitive information, and foreign interference in electoral processes have become real challenges to both national and international security. Information manipulation and disinformation campaigns are now considered a growing threat to security and foreign policy across entire regions (for example, the European Union) [2]. A vivid example is electoral processes that come under pressure from complex cyber and information attacks. Unprecedented hybrid influences are being recorded — from illegal financing and massive fake news dissemination to cyberattacks aimed at destabilizing democratic institutions [3]. Therefore, ensuring information security in cross-border cooperation is not just relevant but critically important. This research is devoted to identifying current threats to information security in the cross-border domain. Its goal is to substantiate mechanisms for countering these threats through international coordination. To achieve this, it is necessary to address the following tasks: to analyze the main types of cyber and information threats arising in the context of cross-border interaction; to assess existing international initiatives, legal norms, and cooperation practices in the field of cybersecurity; and to determine key directions for enhancing cyber resilience and information protection through joint efforts of partner states. The relevance of the topic is determined not only by the growing number of attacks but also by their global nature — attackers can act simultaneously against several countries, exploiting vulnerabilities across different jurisdictions [5]. The scientific novelty of this study lies in its comprehensive approach to the problem of information security within cross-border cooperation, which combines technological, legal, and socio-political aspects. Unlike other studies that mainly focus on technical means of cyber defense, this work emphasizes the interconnection between joint technological measures and diplomatic cooperation. The main threats to information security in cross-border cooperation are complex in nature. Among them are: cyberattacks on critical state information resources and communication networks; unauthorized intrusions into databases and espionage conducted via the global internet infrastructure; targeted disinformation campaigns and influence operations in social networks that undermine public trust; and interference in electoral processes by other states or non-state actors using both cyberattacks and propaganda. Particularly dangerous are hybrid information operations that combine technical methods of disruption (for example, hacking critical infrastructure websites) with psychological influence (mass dissemination of fake content and manipulation of public opinion). Such operations have repeatedly occurred and demonstrated high effectiveness in destabilizing entire regions. | en |
| dc.language.iso | en | en |
| dc.publisher | II. Rákóczi Ferenc Kárpátaljai Magyar Egyetem | en |
| dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
| dc.subject | information security | en |
| dc.subject | cross-border cooperation | en |
| dc.subject | cybersecurity | en |
| dc.title | Information security in cross-border cooperation | en |
| dc.type | dc.type.conferenceAbstract | en |
| Appears in Collections: | A biztonság szerepe a határon átnyúló és nemzetközi együttműködésben | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| Information_security_cross_border_cooperation_2025.pdf | In Csernicskó István, Maruszinec Marianna, Molnár D. Erzsébet, Mulesza Okszána és Melehánics Anna (szerk.): A biztonság szerepe a határon átnyúló és nemzetközi együttműködésben. Nemzetközi tudományos és szakmai konferencia Beregszász, 2025. október 8–9. Absztraktkötet. Beregszász, II. Rákóczi Ferenc Kárpátaljai Magyar Egyetem, 2025. pp. 246-247. | 10 MB | Adobe PDF | View/Open |
This item is licensed under a Creative Commons License



