In their paper, the authors studied legal understanding of cyber threats in the contemporary world. The emphasis was placed on the fact thatthere is no definition of ʽcyber threatsʼ at both the international and domestic levels, which leads to adverse consequences. The authors suggested their own perception of ʽa cyber threatʼ – illegal punishable acts of subjects of information legal relations that create a danger to vital interests of man, society and the state as a whole, fulfillment of which depends on proper operation of information, telecommunication and information telecommunication systems, as well as to relations associated with information production, collection, acquisition, storage, use, dissemination, protection, and security. It is stated that the essence of cyber threatsconsists in their sources, that is, in subjects of information legal relations, while information is their direct target. Information interventions pose a major threat to cybersecurity. It was noted that threats can be both internal and external. To develop an effective mechanism able to counter cyber threatsto Ukraine, it is suggested taking current practices of foreign countries and the international community as a model and bringing them in line with the Ukrainian realities.
In their paper, the authors studied legal understanding of cyber threats in the contemporary world. The emphasis was placed on the fact thatthere is no definition of ʽcyber threatsʼ at both the international and domestic levels, which leads to adverse consequences. The authors suggested their own perception of ʽa cyber threatʼ – illegal punishable acts of subjects of information legal relations that create a danger to vital interests of man, society and the state as a whole, fulfillment of which depends on proper operation of information, telecommunication and information telecommunication systems, as well as to relations associated with information production, collection, acquisition, storage, use, dissemination, protection, and security. It is stated that the essence of cyber threatsconsists in their sources, that is, in subjects of information legal relations, while information is their direct target. Information interventions pose a major threat to cybersecurity. It was noted that threats can be both internal and external. To develop an effective mechanism able to counter cyber threatsto Ukraine, it is suggested taking current practices of foreign countries and the international community as a model and bringing them in line with the Ukrainian realities.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.