{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T19:40:42Z","timestamp":1768419642600,"version":"3.49.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,15]]},"DOI":"10.1109\/acit52158.2021.9548431","type":"proceedings-article","created":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T23:29:27Z","timestamp":1633130967000},"page":"489-493","source":"Crossref","is-referenced-by-count":2,"title":["International Legal Instruments and Counteraction Mechanisms Against Information Violations and Cybercrime"],"prefix":"10.1109","author":[{"given":"Constantine","family":"Flissak","sequence":"first","affiliation":[]},{"given":"Volodymyr","family":"Burdin","sequence":"additional","affiliation":[]},{"given":"Mykhailo","family":"Kasianchuk","sequence":"additional","affiliation":[]},{"given":"Vladyslav","family":"Kolomiiets","sequence":"additional","affiliation":[]},{"given":"Bohdana","family":"Tychna","sequence":"additional","affiliation":[]},{"given":"Sviatoslav","family":"Mazuryk","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","article-title":"Matrix Algorithms of Processing of the Information Flow in Computer Systems Based on Theoretical and Numerical Krestenson&#x2019;s Basis","author":"yakymenko","year":"2010","journal-title":"Modern Problems of Radio Engineering Telecommunications and Computer Science (TCSET&#x2013;2010) Proceedings of the X&#x2013;th International Conference"},{"key":"ref30","article-title":"Methodological requirements for informational provision of economic diplomacy","volume":"3 4","author":"flissak","year":"2013","journal-title":"Economic Annals-XXI"},{"key":"ref10","year":"0","journal-title":"On the Guidelines of the Cybersecurity Strategy of the Republic of Latvia for 2014-2018"},{"key":"ref11","year":"0","journal-title":"Law On the Security of Information Technologies"},{"key":"ref12","year":"2014"},{"key":"ref13","year":"0"},{"key":"ref14","year":"2017","journal-title":"Cybersecurity Strategy of the Republic of Poland for the years 2017-2022"},{"key":"ref15","year":"0"},{"key":"ref16","year":"0"},{"key":"ref17","year":"0","journal-title":"Action Plan for the Implementation of the Concept of Cyber Security of the Slovak Republic for 2015-2020"},{"key":"ref18","year":"0","journal-title":"Government Decision No 1139\/2013 (21 March) on the National Cyber Security Strategy of Hungary"},{"key":"ref19","year":"0"},{"key":"ref28","article-title":"Creation of a global culture of cybersecurity and the protection of critical information infrastructures","year":"0","journal-title":"Resolution adopted by the General Assembly 58\/199"},{"key":"ref4","article-title":"Theoretical and methodological problems of security research","author":"jagusiak","year":"2014"},{"key":"ref27","year":"0"},{"key":"ref3","article-title":"Cybercrime - international standards of combating the phenomenon and Polish penal regulations","volume":"1","author":"golonka","year":"2016","journal-title":"Studies in Law Research Papers"},{"key":"ref6","author":"moore","year":"0","journal-title":"Introducing the economics of cybersecurity Principles and policy options"},{"key":"ref29","article-title":"Creation of a global culture of cybersecurity and taking stock of national efforts to protect critical information Infrastructures","year":"0","journal-title":"Resolution adopted by the General Assembly 64\/211"},{"key":"ref5","article-title":"Cyber Conflict and National Security","author":"lin","year":"2013"},{"key":"ref8","article-title":"Cyberspace and international law","author":"worona","year":"2020"},{"key":"ref7","first-page":"9","article-title":"Elements of national cybersecurity strategy for developing nations","volume":"1","author":"newmeyer","year":"2015","journal-title":"National Cybersecurity Institute Journal"},{"key":"ref2","article-title":"Cyber Crime and Cyber Terrorism. Investigator&#x2019;s Handbook","author":"babak","year":"2015"},{"key":"ref9","year":"0"},{"key":"ref1","year":"0","journal-title":"EU Cybercrime Center will fight online crime and protect e-consumers"},{"key":"ref20","year":"2018"},{"key":"ref22","first-page":"128","article-title":"Understanding cybercrime: Phenomena, challenges and legal response","author":"gercke","year":"2014","journal-title":"INU Telecommunication Development Sector"},{"key":"ref21","year":"0"},{"key":"ref24","article-title":"European Parliament resolution of 12 September 2013 on a Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace (2013\/2606(RSP)","year":"0","journal-title":"Official Journal of the European Union 2016"},{"key":"ref23","year":"0","journal-title":"European Treaty Series - No 185"},{"key":"ref26","year":"2020"},{"key":"ref25","article-title":"Directive 2013\/40\/EU of the European Parliament and of the Council of 12 August 2013 on attacks against information systems and replacing Council Framework Decision 2005\/222\/JHA","year":"0","journal-title":"Official Journal of the European Union 14 8 2013"}],"event":{"name":"2021 11th International Conference on Advanced Computer Information Technologies (ACIT)","location":"Deggendorf, Germany","start":{"date-parts":[[2021,9,15]]},"end":{"date-parts":[[2021,9,17]]}},"container-title":["2021 11th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9548321\/9548113\/09548431.pdf?arnumber=9548431","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T11:46:32Z","timestamp":1652183192000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9548431\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,15]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/acit52158.2021.9548431","relation":{},"subject":[],"published":{"date-parts":[[2021,9,15]]}}}