<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="article">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">jssi</journal-id>
      <journal-title-group>
        <journal-title>Journal of Security and Sustainability Issues</journal-title>
      </journal-title-group>
      <issn pub-type="epub">2029-7017</issn>
      <issn pub-type="ppub">2029-7017</issn>
      <publisher>
        <publisher-name>LKA</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">JSSI10113</article-id>
      <article-id pub-id-type="doi">10.9770/jssi.2020.10.1(13)</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Article</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Cybersecurity as an Element of Financial Security in the Conditions of Globalization</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <name>
            <surname>Ruvin</surname>
            <given-names>Oleksandr</given-names>
          </name>
          <email xlink:href="mailto:koaduep@gmail.com">koaduep@gmail.com</email>
          <xref ref-type="aff" rid="j_jssi_aff_000"/>
          <xref ref-type="corresp" rid="cor1">∗</xref>
        </contrib>
        <aff id="j_jssi_aff_000">Kyiv Scientific Research Institute of Forensic Expertise of the Ministry of Justice of Ukraine, Smolenska Street, 6, Kyiv, 03057, Ukraine</aff>
        <contrib contrib-type="author">
          <name>
            <surname>Isaieva</surname>
            <given-names>Nataliia</given-names>
          </name>
          <xref ref-type="aff" rid="j_jssi_aff_001"/>
        </contrib>
        <aff id="j_jssi_aff_001">V.M. Koretsky Institute of State and Law of National Academy of Sciences of Ukraine, Trohsvyatitelskaya Street, 4, Kyiv, 01001, Ukraine</aff>
        <contrib contrib-type="author">
          <name>
            <surname>Sukhomlyn</surname>
            <given-names>Larysa</given-names>
          </name>
          <xref ref-type="aff" rid="j_jssi_aff_002"/>
        </contrib>
        <aff id="j_jssi_aff_002">Kremenchuk Mykhailo Ostrohradskyi National University, 20, Pershotravneva Street, Kremenchuk, Poltava region, 39600, Ukraine</aff>
        <contrib contrib-type="author">
          <name>
            <surname>Kalachenkova</surname>
            <given-names>Kateryna</given-names>
          </name>
          <xref ref-type="aff" rid="j_jssi_aff_003"/>
        </contrib>
        <aff id="j_jssi_aff_003">Vasyl’ Stus Donetsk National University 21, 600-richya str., Vinnytsia, 21021, Ukraine</aff>
        <contrib contrib-type="author">
          <name>
            <surname>Bilianska</surname>
            <given-names>Nataliia</given-names>
          </name>
          <xref ref-type="aff" rid="j_jssi_aff_004"/>
        </contrib>
        <aff id="j_jssi_aff_004">National Academy of Internal Affairs,1 Solomjanska Square, 03035, Kyiv, Ukraine</aff>
      </contrib-group>
      <author-notes>
        <corresp id="cor1"><label>∗</label>Corresponding author.</corresp>
      </author-notes>
      <volume>10</volume>
      <issue>1</issue>
      <fpage>175</fpage>
      <lpage>188</lpage>
      <pub-date pub-type="ppub">
        <day>30</day>
        <month>09</month>
        <year>2020</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>30</day>
        <month>09</month>
        <year>2020</year>
      </pub-date>
      <permissions>
        <ali:free_to_read xmlns:ali="http://www.niso.org/schemas/ali/1.0/"/>
      </permissions>
      <abstract>
        <p>The methodological foundations of the formation of analytical support for public administration of cybersecurity have been improved. Based on a combination of hierarchical and non-hierarchical clustering methods using the IBM SPSS Statistics package, the country’s regions have been grouped into four clusters, which is the basis for adjusting the priorities of the state cybersecurity policy, a well-grounded approach when choosing means and instruments of influence at the regional level. In modern doctrine and practice of international law, the issues of qualification of cyber warfare remain controversial. There are approaches to justify the application of international humanitarian and criminal law. The most justified, in our opinion, is the qualification of cyber warfare as a violation of the UNO Charter and the use of force, and in some cases – the crime of aggression. The substantive rules of the institution of international cooperation in the fight against cybercrime determine the special principles of this kind of cooperation, the criminalization of certain types of illegal acts, as well as institutional mechanisms and capacity building. The system of international combating cybercrime is based on the principles of technical neutrality, multi-stakeholderism (public-private partnerships), as well as the equivalence of human rights online and offline. In the future, cybercrime will be associated with the use of innovative technologies. As it has been established by the example of the Internet of things, the latest technology, as a general rule, is included in the scope of existing international agreements on cybercrime, but there is no special regulation for them. We propose formal consolidation of the provision on “emergent technologies” in the texts of international legal acts in the field of combating cybercrime. First of all, this concerns the future UNO Convention on the fight against cybercrime, which should also provide for an additional body, such as the T-CY Committee under the Council of Europe Convention, which will provide clarification on the application of the agreement in specific changed circumstances.</p>
      </abstract>
      <kwd-group>
        <label>Keywords</label>
        <kwd>financial security</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>cybercrime</kwd>
        <kwd>internet of things</kwd>
        <kwd>information and communication technology</kwd>
      </kwd-group>
      <kwd-group kwd-group-type="JEL">
        <label>JEL</label>
        <kwd>F35</kwd>
        <kwd>F42</kwd>
      </kwd-group>
    </article-meta>
  </front>
</article>
