{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T05:41:17Z","timestamp":1760074877799,"version":"build-2065373602"},"reference-count":48,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,17]]},"DOI":"10.1109\/acit65614.2025.11185595","type":"proceedings-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:50:58Z","timestamp":1760032258000},"page":"509-515","source":"Crossref","is-referenced-by-count":0,"title":["Comparative Analysis of EU and Ukrainian Cybersecurity Legal Framework: Joint Impact on Global Security Policy"],"prefix":"10.1109","author":[{"given":"Ljubo","family":"Runji\u0107","sequence":"first","affiliation":[{"name":"&#x0160;ibenik University of Applied Sciences,Department of Administrative Studies,&#x0160;ibenik,Croatia"}]},{"given":"Mario Dominik","family":"Buri\u0107","sequence":"additional","affiliation":[{"name":"&#x0160;ibenik University of Applied Sciences,Department of Administrative Studies,&#x0160;ibenik,Croatia"}]},{"given":"Ivan","family":"Livaja","sequence":"additional","affiliation":[{"name":"&#x0160;ibenik University of Applied Sciences,Department of Computing,&#x0160;ibenik,Croatia"}]}],"member":"263","reference":[{"issue":"02","key":"ref1","article-title":"CYBERSECURITY ANALYSIS IN THE CONTEXT OF THE RUSSIA-UKRAINE CONFLICT: CHALLENGES, THREATS, AND DEFENSE STRATEGIES","volume":"12","author":"Budiman","year":"2023"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.47743\/eurint-2024-foc"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.17951\/we.2016.2.2.97"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.15407\/emodel.45.05.054"},{"key":"ref5","article-title":"ICT security in enterprises"},{"volume-title":"ENISA threat landscape 2024: July 2023 to June 2024","year":"2024","key":"ref6"},{"volume":"333","volume-title":"Directive (EU) 2022\/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No 910\/2014 and Directive (EU) 2018\/1972, and repealing Directive (EU) 2016\/1148 (NIS 2 Directive) (Text with EEA relevance)","year":"2022","key":"ref7"},{"volume-title":"Cyberattacks in Russia\u2019s hybrid war agains Ukraine and its ramification for Europe","year":"2022","author":"Barichella","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.53477\/2284-9378-22-92"},{"volume-title":"State Service of Special Communications and Information protection of Ukraine","key":"ref10","article-title":"CERT-UA processed 4315 cyber incidents last year"},{"key":"ref11","article-title":"The President of Ukraine approved a new Cybersecurity Strategy of Ukraine - National Security and Defense Council of Ukraine"},{"key":"ref12","article-title":"Ukraine Cybersecurity Governance Assessment","volume-title":"Geneva Centre for Security Sector Governance","author":"Sp\u00eenu","year":"2020"},{"journal-title":"Law of Ukraine \u201cOn the Basic Principles of Ensuring Cybersecurity of Ukraine.\u201d","year":"2017","key":"ref13"},{"article-title":"The War on Ukraine: A Look at (Underemphasised) Russian Cyber operations","year":"2023","author":"Kaushik","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.60097\/acig\/190263"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2023.105890"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.5604\/01.3001.0016.1323"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.54477\/LH.25192353.2024.2.pp.69-80"},{"volume-title":"Regulation (EU) 2024\/2847 of the European Parliament and of the Council of 23 October 2024 on horizontal cybersecurity requirements for products with digital elements and amending Regulations (EU) No 168\/2013 and (EU) 2019\/1020 and Directive (EU) 2020\/1828 (Cyber Resilience Act) (Text with EEA relevance)","year":"2024","key":"ref19"},{"volume":"119","volume-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation) (Text with EEA relevance)","year":"2016","key":"ref20"},{"volume":"333","volume-title":"Directive (EU) 2022\/2557 of the European Parliament and of the Council of 14 December 2022 on the resilience of critical entities and repealing Council Directive 2008\/114\/EC (Text with EEA relevance)","year":"2022","key":"ref21"},{"article-title":"A Systematic Literature Review on the NIS2 Directive","year":"2024","author":"Ruohonen","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1365\/s43439-022-00067-6"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.69554\/zflw4133"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.32612\/uw.27201643.2021.1.pp.11-22"},{"key":"ref26","article-title":"Data protection and cybersecurity laws in Ukraine","volume-title":"CMS Law-Expert guide comparison","author":"Orlyk","year":"2021"},{"key":"ref27","article-title":"National Cybersecurity Governance: UKRAINE","author":"Davydiuk","year":"2024","journal-title":"NATO Cooperative Cyber Defence Center of Excellence"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1365\/s43439-021-00033-8"},{"journal-title":"International Telecomunication Union","article-title":"Global Cybersecurity Index 2024","year":"2024","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.5296\/ijrd.v11i2.22486"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.5604\/01.3001.0016.0800"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2024.106066"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.60097\/acig\/162868"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-6414-5_18"},{"key":"ref35","article-title":"EU4Digital: Cybersecurity East - EU4Digital"},{"key":"ref36","article-title":"NATO - Topic: Relations with Ukraine"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ukrmico61577.2023.10380330"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780197744475.003.0004"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.5102\/rdi.v14i2.4587"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1590\/s0102-8529.2019420100002"},{"key":"ref41","first-page":"1","article-title":"A Brief Primer on International Law and Cyberspace","volume-title":"Proceedings of the 8th International Conference on Cyber Conflict, Carneige Endowment for International Peace","author":"Hollis"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/cycon.2016.7529431"},{"first-page":"226","article-title":"Legality of the Threat or Use of Nuclear Weapons Case (Advisory Opinion)","year":"1996","key":"ref43"},{"volume-title":"Cyber Upgrade","key":"ref44","article-title":"NIS2 Directive Regulations and Implementation in Croatia"},{"volume-title":"Verkhovna Rada of Ukraine","key":"ref45","article-title":"On Amendments to the Criminal Code of Ukraine to Increase the Effectiveness of Combating Cybercrime under Martial Law: Law of Ukraine No. 2149-IX of March 24, 2022. Database \u201dLegislation of Ukraine"},{"first-page":"334","article-title":"M. Legenkyi, L. Piankivska, and A. Tolbatov, \u201dLegal basis for cybersecurity in Ukraine under martial law","volume-title":"Proc. Conf","key":"ref46"},{"article-title":"White Paper\u2013NIS2 Implementation: Challenges Priorities","volume-title":"ECSO Working Group3, Brussels, Belgium, White Paper","year":"2025","key":"ref47"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.57125\/fel.2022.03.25.01"}],"event":{"name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2025,9,17]]},"location":"Sibenik, Croatia","end":{"date-parts":[[2025,9,19]]}},"container-title":["2025 15th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11185059\/11185456\/11185595.pdf?arnumber=11185595","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T05:04:15Z","timestamp":1760072655000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11185595\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,17]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/acit65614.2025.11185595","relation":{},"subject":[],"published":{"date-parts":[[2025,9,17]]}}}