Economic and cyber security

Bibliographic Details
Title: Economic and cyber security
Authors: Krasnobayev, Victor, Yanko, Alina, Hlushko, Alina, Kruk, Oleg, Kruk, Oleksandr, Gakh, Vitalii, Onyshchenko, Svitlana, Maslii, Oleksandra, Kivshyk, Oleksandr, Potapova, Kateryna, Nalyvaichuk, Mykola, Meliukh, Vasyl, Gurynenko, Stanislav, Koliada, Kostiantyn, Scherbyna, Alexandre, Poltorak, Anastasiia, Tyshchenko, Svitlana, Khrystenko, Olha, Ribachuk, Volodimir, Kuzoma, Vitalii, Stamat, Viktoriia, Kolesnyk, Maksym, Arefieva, Olena, Onopriienko, Dmytro, Kovalenko, Yuliia, Ostapenko, Tetiana, Hrashchenko, Iryna
Publisher Information: PC TECHNOLOGY CENTER, 2023.
Publication Year: 2023
Subject Terms: economic cyber security, national economy, state regulatory policy, semantic role labeling, thema EDItEUR::U Computing and Information Technology::UR Computer security, circular economy, strategically important enterprises, modular number system, thema EDItEUR::K Economics, Finance, Business and Management, non-positional number system, Integer economic data processing systems, intrusion detection systems, institutional support, natural language processing, national security, monitoring financial security, unauthorized access
Description: Collective monograph highlights the results of systematic scientific research devoted to the problems of economic cyber security as a component of the financial security of the state, and contains practical recommendations on measures to strengthen the security of the state, in particular strategically important enterprises, in the presence of modern threats. Chapter 1 analyzes the position of Ukraine in the global cyber security ratings and outlines promising directions for increasing its level, one of which is the improvement of information protection systems of critical infrastructure objects. A data comparison algorithm is considered, which consists in continuous monitoring and scanning of data by constantly comparing data with information patterns of users and services, as well as threat patterns and indicators based on previous experience, not only one's own, within a local network or system, but also globally scale An improved method of rapid data comparison is presented, which provides maximum accuracy of comparison with a minimum amount of equipment for comparing devices. Its use makes it possible to identify potential cyber threats and take preventive measures, which will increase the level of protection of critical infrastructure objects. Chapter 2 focuses on defining strategic directions for ensuring economic cyber security of business in Ukraine. The importance of information protection in the context of the development of the digital economy has been updated, and the place of economic cyber security in the national security system has been determined. A thorough analysis of the dynamics of cyber incidents in the world in recent years was carried out and the specifics of the manifestation of cyber threats at the macro and micro levels were outlined. Special attention is paid to the intrusion detection process and a detailed study of the working principles of modern intrusion detection and prevention systems. It is expected that the use of the proposed recommendations on the cyber security policy will significantly increase the level of information security (confidentiality, integrity and availability) of the business. Chapter 3 is dedicated to solving the problem of strengthening the security of strategically important enterprises of Ukraine by developing effective forms of implementation of the state regulatory policy in this direction. The issue of identifying strategically important enterprises and forming their security at the state level as a basis for supporting and restoring the national economy has been updated. The strategic directions of deregulation of business activity in Ukraine, including strategically important enterprises, have been determined. One of them is institutional support of state regulatory policy, improvement of regulatory policy. On the basis of the analysis of the existing institutional support of the state regulatory policy regarding strategically important enterprises, it has been proved that the basis of the formation of effective forms of implementation of the state regulatory policy of support and strengthening of the security of strategically important enterprises is the need to improve the current legislation, the formation of effective institutional and organizational support and the clustering of the national economy based on strategic important enterprises with the possibility of creating integrated corporate structures. A model of the process of assessing the effectiveness of the implementation of the state regulatory policy on ensuring the security of strategically important enterprises is proposed, which provides regulatory bodies with a tool to influence its level with the provision of economic development and social stability in Ukraine. Chapter 4 explores Semantic role labeling (SRL) as a key Natural Language Processing (NLP) task that plays a vital role in extracting meaningful information from text. The role of SRL and its application is considered in the context of economics and cyber security, because the accurate definition and analysis of semantic roles in text is critical due to the rapid increase in the amount and complexity of textual information. State-of-the-art NLP classifiers used in decision-making, market analysis and financial reports, media articles, and economic texts are reviewed. It is emphasized that the process of determining relevant information from a large array of data collected from disparate sources requires an optimal methodological base, which should include the use of special tools for cleaning, tokenization, marking parts of speech with labels for preparation for NLP analysis. With the help of NLP classifiers, it becomes possible to automatically identify data, which allows to get information about market trends or security threats, depending on the specific field. It is noted that the proposed methods are practically significant, as they improve the ability to extract useful information, assess risks and make informed decisions by organizing unstructured textual data. Chapter 5 is dedicated to the comprehensive substantiation of the theoretical and methodological foundations and practical methods of monitoring the state of financial security of Ukraine in conditions of economic turbulence as a factor ensuring the preservation of the state's financial system. Indicators of the state of financial security of regions are proposed and it is proved that they are not strongly connected, and also interconnected with the state of financial security of the state, which allows their use as input information in the process of calculating the integral indicator of the state of financial security of the region. On the basis of the proposed methodology for assessing the state of financial security of regions, integral indicators of the state of financial security of regions of Ukraine were calculated, which are actually the result of collapsing indicators by subsystems into a system index for a certain region, high values of which characterize a relatively stable value of financial security of a certain region, and low values signal its dangerous or critical condition. Chapter 6 discusses the essence and features of the circular economy as an innovative com-ponent of the modern economy, which functions and develops on the basis of sustainable devel-opment, the deep reasons for its emergence, formation and transformation into a factor in the formation of a new paradigm of the global economy. Being a mechanism for the implementation of the Global Goals of sustainable development, the concept of a closed cycle economy encourages highly deve loped countries and businesses to introduce innovations and define the development of a circular economy as a priority in their long-term strategies. The monograph is intended for researchers who are engaged in the development of measures to increase the financial security of the state, primarily through the development or improvement of security systems in cyberspace, as well as practitioners who are looking for the best scientific solutions for implementation, which can contribute to the formation of reliable cyber protection measures in the information environment of the enterprise, contributing to the increase of its financial security. The monograph is also useful for state authorities, which are forced to search for operational, most effective solutions to ensure the financial security of the state as a whole, its strategic enterprises, including critical infrastructure, in particular through the regulation of security measures in the information space, in the presence of modern external threats.
Published
Document Type: Book
File Description: image/jpeg
Language: English
Access URL: https://directory.doabooks.org/handle/20.500.12854/134888
http://monograph.com.ua/pctc/catalog/book/978-617-7319-98-5
Rights: CC BY NC ND
Accession Number: edsair.dedup.wf.002..53d38d5df3a208e7df6fb86b423f79c5
Database: OpenAIRE
FullText Text:
  Availability: 0
CustomLinks:
  – Url: https://explore.openaire.eu/search/publication?articleId=dedup_wf_002%3A%3A53d38d5df3a208e7df6fb86b423f79c5
    Name: EDS - OpenAIRE (ns324271)
    Category: fullText
    Text: View record at OpenAIRE
Header DbId: edsair
DbLabel: OpenAIRE
An: edsair.dedup.wf.002..53d38d5df3a208e7df6fb86b423f79c5
RelevancyScore: 921
AccessLevel: 3
PubType: Book
PubTypeId: book
PreciseRelevancyScore: 920.546508789063
IllustrationInfo
Items – Name: Title
  Label: Title
  Group: Ti
  Data: Economic and cyber security
– Name: Author
  Label: Authors
  Group: Au
  Data: <searchLink fieldCode="AR" term="%22Krasnobayev%2C+Victor%22">Krasnobayev, Victor</searchLink><br /><searchLink fieldCode="AR" term="%22Yanko%2C+Alina%22">Yanko, Alina</searchLink><br /><searchLink fieldCode="AR" term="%22Hlushko%2C+Alina%22">Hlushko, Alina</searchLink><br /><searchLink fieldCode="AR" term="%22Kruk%2C+Oleg%22">Kruk, Oleg</searchLink><br /><searchLink fieldCode="AR" term="%22Kruk%2C+Oleksandr%22">Kruk, Oleksandr</searchLink><br /><searchLink fieldCode="AR" term="%22Gakh%2C+Vitalii%22">Gakh, Vitalii</searchLink><br /><searchLink fieldCode="AR" term="%22Onyshchenko%2C+Svitlana%22">Onyshchenko, Svitlana</searchLink><br /><searchLink fieldCode="AR" term="%22Maslii%2C+Oleksandra%22">Maslii, Oleksandra</searchLink><br /><searchLink fieldCode="AR" term="%22Kivshyk%2C+Oleksandr%22">Kivshyk, Oleksandr</searchLink><br /><searchLink fieldCode="AR" term="%22Potapova%2C+Kateryna%22">Potapova, Kateryna</searchLink><br /><searchLink fieldCode="AR" term="%22Nalyvaichuk%2C+Mykola%22">Nalyvaichuk, Mykola</searchLink><br /><searchLink fieldCode="AR" term="%22Meliukh%2C+Vasyl%22">Meliukh, Vasyl</searchLink><br /><searchLink fieldCode="AR" term="%22Gurynenko%2C+Stanislav%22">Gurynenko, Stanislav</searchLink><br /><searchLink fieldCode="AR" term="%22Koliada%2C+Kostiantyn%22">Koliada, Kostiantyn</searchLink><br /><searchLink fieldCode="AR" term="%22Scherbyna%2C+Alexandre%22">Scherbyna, Alexandre</searchLink><br /><searchLink fieldCode="AR" term="%22Poltorak%2C+Anastasiia%22">Poltorak, Anastasiia</searchLink><br /><searchLink fieldCode="AR" term="%22Tyshchenko%2C+Svitlana%22">Tyshchenko, Svitlana</searchLink><br /><searchLink fieldCode="AR" term="%22Khrystenko%2C+Olha%22">Khrystenko, Olha</searchLink><br /><searchLink fieldCode="AR" term="%22Ribachuk%2C+Volodimir%22">Ribachuk, Volodimir</searchLink><br /><searchLink fieldCode="AR" term="%22Kuzoma%2C+Vitalii%22">Kuzoma, Vitalii</searchLink><br /><searchLink fieldCode="AR" term="%22Stamat%2C+Viktoriia%22">Stamat, Viktoriia</searchLink><br /><searchLink fieldCode="AR" term="%22Kolesnyk%2C+Maksym%22">Kolesnyk, Maksym</searchLink><br /><searchLink fieldCode="AR" term="%22Arefieva%2C+Olena%22">Arefieva, Olena</searchLink><br /><searchLink fieldCode="AR" term="%22Onopriienko%2C+Dmytro%22">Onopriienko, Dmytro</searchLink><br /><searchLink fieldCode="AR" term="%22Kovalenko%2C+Yuliia%22">Kovalenko, Yuliia</searchLink><br /><searchLink fieldCode="AR" term="%22Ostapenko%2C+Tetiana%22">Ostapenko, Tetiana</searchLink><br /><searchLink fieldCode="AR" term="%22Hrashchenko%2C+Iryna%22">Hrashchenko, Iryna</searchLink>
– Name: Publisher
  Label: Publisher Information
  Group: PubInfo
  Data: PC TECHNOLOGY CENTER, 2023.
– Name: DatePubCY
  Label: Publication Year
  Group: Date
  Data: 2023
– Name: Subject
  Label: Subject Terms
  Group: Su
  Data: <searchLink fieldCode="DE" term="%22economic+cyber+security%22">economic cyber security</searchLink><br /><searchLink fieldCode="DE" term="%22national+economy%22">national economy</searchLink><br /><searchLink fieldCode="DE" term="%22state+regulatory+policy%22">state regulatory policy</searchLink><br /><searchLink fieldCode="DE" term="%22semantic+role+labeling%22">semantic role labeling</searchLink><br /><searchLink fieldCode="DE" term="%22thema+EDItEUR%3A%3AU+Computing+and+Information+Technology%3A%3AUR+Computer+security%22">thema EDItEUR::U Computing and Information Technology::UR Computer security</searchLink><br /><searchLink fieldCode="DE" term="%22circular+economy%22">circular economy</searchLink><br /><searchLink fieldCode="DE" term="%22strategically+important+enterprises%22">strategically important enterprises</searchLink><br /><searchLink fieldCode="DE" term="%22modular+number+system%22">modular number system</searchLink><br /><searchLink fieldCode="DE" term="%22thema+EDItEUR%3A%3AK+Economics%2C+Finance%2C+Business+and+Management%22">thema EDItEUR::K Economics, Finance, Business and Management</searchLink><br /><searchLink fieldCode="DE" term="%22non-positional+number+system%22">non-positional number system</searchLink><br /><searchLink fieldCode="DE" term="%22Integer+economic+data+processing+systems%22">Integer economic data processing systems</searchLink><br /><searchLink fieldCode="DE" term="%22intrusion+detection+systems%22">intrusion detection systems</searchLink><br /><searchLink fieldCode="DE" term="%22institutional+support%22">institutional support</searchLink><br /><searchLink fieldCode="DE" term="%22natural+language+processing%22">natural language processing</searchLink><br /><searchLink fieldCode="DE" term="%22national+security%22">national security</searchLink><br /><searchLink fieldCode="DE" term="%22monitoring+financial+security%22">monitoring financial security</searchLink><br /><searchLink fieldCode="DE" term="%22unauthorized+access%22">unauthorized access</searchLink>
– Name: Abstract
  Label: Description
  Group: Ab
  Data: Collective monograph highlights the results of systematic scientific research devoted to the problems of economic cyber security as a component of the financial security of the state, and contains practical recommendations on measures to strengthen the security of the state, in particular strategically important enterprises, in the presence of modern threats. Chapter 1 analyzes the position of Ukraine in the global cyber security ratings and outlines promising directions for increasing its level, one of which is the improvement of information protection systems of critical infrastructure objects. A data comparison algorithm is considered, which consists in continuous monitoring and scanning of data by constantly comparing data with information patterns of users and services, as well as threat patterns and indicators based on previous experience, not only one's own, within a local network or system, but also globally scale An improved method of rapid data comparison is presented, which provides maximum accuracy of comparison with a minimum amount of equipment for comparing devices. Its use makes it possible to identify potential cyber threats and take preventive measures, which will increase the level of protection of critical infrastructure objects. Chapter 2 focuses on defining strategic directions for ensuring economic cyber security of business in Ukraine. The importance of information protection in the context of the development of the digital economy has been updated, and the place of economic cyber security in the national security system has been determined. A thorough analysis of the dynamics of cyber incidents in the world in recent years was carried out and the specifics of the manifestation of cyber threats at the macro and micro levels were outlined. Special attention is paid to the intrusion detection process and a detailed study of the working principles of modern intrusion detection and prevention systems. It is expected that the use of the proposed recommendations on the cyber security policy will significantly increase the level of information security (confidentiality, integrity and availability) of the business. Chapter 3 is dedicated to solving the problem of strengthening the security of strategically important enterprises of Ukraine by developing effective forms of implementation of the state regulatory policy in this direction. The issue of identifying strategically important enterprises and forming their security at the state level as a basis for supporting and restoring the national economy has been updated. The strategic directions of deregulation of business activity in Ukraine, including strategically important enterprises, have been determined. One of them is institutional support of state regulatory policy, improvement of regulatory policy. On the basis of the analysis of the existing institutional support of the state regulatory policy regarding strategically important enterprises, it has been proved that the basis of the formation of effective forms of implementation of the state regulatory policy of support and strengthening of the security of strategically important enterprises is the need to improve the current legislation, the formation of effective institutional and organizational support and the clustering of the national economy based on strategic important enterprises with the possibility of creating integrated corporate structures. A model of the process of assessing the effectiveness of the implementation of the state regulatory policy on ensuring the security of strategically important enterprises is proposed, which provides regulatory bodies with a tool to influence its level with the provision of economic development and social stability in Ukraine. Chapter 4 explores Semantic role labeling (SRL) as a key Natural Language Processing (NLP) task that plays a vital role in extracting meaningful information from text. The role of SRL and its application is considered in the context of economics and cyber security, because the accurate definition and analysis of semantic roles in text is critical due to the rapid increase in the amount and complexity of textual information. State-of-the-art NLP classifiers used in decision-making, market analysis and financial reports, media articles, and economic texts are reviewed. It is emphasized that the process of determining relevant information from a large array of data collected from disparate sources requires an optimal methodological base, which should include the use of special tools for cleaning, tokenization, marking parts of speech with labels for preparation for NLP analysis. With the help of NLP classifiers, it becomes possible to automatically identify data, which allows to get information about market trends or security threats, depending on the specific field. It is noted that the proposed methods are practically significant, as they improve the ability to extract useful information, assess risks and make informed decisions by organizing unstructured textual data. Chapter 5 is dedicated to the comprehensive substantiation of the theoretical and methodological foundations and practical methods of monitoring the state of financial security of Ukraine in conditions of economic turbulence as a factor ensuring the preservation of the state's financial system. Indicators of the state of financial security of regions are proposed and it is proved that they are not strongly connected, and also interconnected with the state of financial security of the state, which allows their use as input information in the process of calculating the integral indicator of the state of financial security of the region. On the basis of the proposed methodology for assessing the state of financial security of regions, integral indicators of the state of financial security of regions of Ukraine were calculated, which are actually the result of collapsing indicators by subsystems into a system index for a certain region, high values of which characterize a relatively stable value of financial security of a certain region, and low values signal its dangerous or critical condition. Chapter 6 discusses the essence and features of the circular economy as an innovative com-ponent of the modern economy, which functions and develops on the basis of sustainable devel-opment, the deep reasons for its emergence, formation and transformation into a factor in the formation of a new paradigm of the global economy. Being a mechanism for the implementation of the Global Goals of sustainable development, the concept of a closed cycle economy encourages highly deve loped countries and businesses to introduce innovations and define the development of a circular economy as a priority in their long-term strategies. The monograph is intended for researchers who are engaged in the development of measures to increase the financial security of the state, primarily through the development or improvement of security systems in cyberspace, as well as practitioners who are looking for the best scientific solutions for implementation, which can contribute to the formation of reliable cyber protection measures in the information environment of the enterprise, contributing to the increase of its financial security. The monograph is also useful for state authorities, which are forced to search for operational, most effective solutions to ensure the financial security of the state as a whole, its strategic enterprises, including critical infrastructure, in particular through the regulation of security measures in the information space, in the presence of modern external threats.<br />Published
– Name: TypeDocument
  Label: Document Type
  Group: TypDoc
  Data: Book
– Name: Format
  Label: File Description
  Group: SrcInfo
  Data: image/jpeg
– Name: Language
  Label: Language
  Group: Lang
  Data: English
– Name: URL
  Label: Access URL
  Group: URL
  Data: <link linkTarget="URL" linkTerm="https://directory.doabooks.org/handle/20.500.12854/134888" linkWindow="_blank">https://directory.doabooks.org/handle/20.500.12854/134888</link><br /><link linkTarget="URL" linkTerm="http://monograph.com.ua/pctc/catalog/book/978-617-7319-98-5" linkWindow="_blank">http://monograph.com.ua/pctc/catalog/book/978-617-7319-98-5</link>
– Name: Copyright
  Label: Rights
  Group: Cpyrght
  Data: CC BY NC ND
– Name: AN
  Label: Accession Number
  Group: ID
  Data: edsair.dedup.wf.002..53d38d5df3a208e7df6fb86b423f79c5
PLink https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsair&AN=edsair.dedup.wf.002..53d38d5df3a208e7df6fb86b423f79c5
RecordInfo BibRecord:
  BibEntity:
    Languages:
      – Text: English
    Subjects:
      – SubjectFull: economic cyber security
        Type: general
      – SubjectFull: national economy
        Type: general
      – SubjectFull: state regulatory policy
        Type: general
      – SubjectFull: semantic role labeling
        Type: general
      – SubjectFull: thema EDItEUR::U Computing and Information Technology::UR Computer security
        Type: general
      – SubjectFull: circular economy
        Type: general
      – SubjectFull: strategically important enterprises
        Type: general
      – SubjectFull: modular number system
        Type: general
      – SubjectFull: thema EDItEUR::K Economics, Finance, Business and Management
        Type: general
      – SubjectFull: non-positional number system
        Type: general
      – SubjectFull: Integer economic data processing systems
        Type: general
      – SubjectFull: intrusion detection systems
        Type: general
      – SubjectFull: institutional support
        Type: general
      – SubjectFull: natural language processing
        Type: general
      – SubjectFull: national security
        Type: general
      – SubjectFull: monitoring financial security
        Type: general
      – SubjectFull: unauthorized access
        Type: general
    Titles:
      – TitleFull: Economic and cyber security
        Type: main
  BibRelationships:
    HasContributorRelationships:
      – PersonEntity:
          Name:
            NameFull: Krasnobayev, Victor
      – PersonEntity:
          Name:
            NameFull: Yanko, Alina
      – PersonEntity:
          Name:
            NameFull: Hlushko, Alina
      – PersonEntity:
          Name:
            NameFull: Kruk, Oleg
      – PersonEntity:
          Name:
            NameFull: Kruk, Oleksandr
      – PersonEntity:
          Name:
            NameFull: Gakh, Vitalii
      – PersonEntity:
          Name:
            NameFull: Onyshchenko, Svitlana
      – PersonEntity:
          Name:
            NameFull: Maslii, Oleksandra
      – PersonEntity:
          Name:
            NameFull: Kivshyk, Oleksandr
      – PersonEntity:
          Name:
            NameFull: Potapova, Kateryna
      – PersonEntity:
          Name:
            NameFull: Nalyvaichuk, Mykola
      – PersonEntity:
          Name:
            NameFull: Meliukh, Vasyl
      – PersonEntity:
          Name:
            NameFull: Gurynenko, Stanislav
      – PersonEntity:
          Name:
            NameFull: Koliada, Kostiantyn
      – PersonEntity:
          Name:
            NameFull: Scherbyna, Alexandre
      – PersonEntity:
          Name:
            NameFull: Poltorak, Anastasiia
      – PersonEntity:
          Name:
            NameFull: Tyshchenko, Svitlana
      – PersonEntity:
          Name:
            NameFull: Khrystenko, Olha
      – PersonEntity:
          Name:
            NameFull: Ribachuk, Volodimir
      – PersonEntity:
          Name:
            NameFull: Kuzoma, Vitalii
      – PersonEntity:
          Name:
            NameFull: Stamat, Viktoriia
      – PersonEntity:
          Name:
            NameFull: Kolesnyk, Maksym
      – PersonEntity:
          Name:
            NameFull: Arefieva, Olena
      – PersonEntity:
          Name:
            NameFull: Onopriienko, Dmytro
      – PersonEntity:
          Name:
            NameFull: Kovalenko, Yuliia
      – PersonEntity:
          Name:
            NameFull: Ostapenko, Tetiana
      – PersonEntity:
          Name:
            NameFull: Hrashchenko, Iryna
      – PersonEntity:
          Name:
            NameFull: Krasnobayev, Victor
      – PersonEntity:
          Name:
            NameFull: Yanko, Alina
      – PersonEntity:
          Name:
            NameFull: Hlushko, Alina
      – PersonEntity:
          Name:
            NameFull: Kruk, Oleg
      – PersonEntity:
          Name:
            NameFull: Kruk, Oleksandr
      – PersonEntity:
          Name:
            NameFull: Gakh, Vitalii
      – PersonEntity:
          Name:
            NameFull: Onyshchenko, Svitlana
      – PersonEntity:
          Name:
            NameFull: Maslii, Oleksandra
      – PersonEntity:
          Name:
            NameFull: Kivshyk, Oleksandr
      – PersonEntity:
          Name:
            NameFull: Potapova, Kateryna
      – PersonEntity:
          Name:
            NameFull: Nalyvaichuk, Mykola
      – PersonEntity:
          Name:
            NameFull: Meliukh, Vasyl
      – PersonEntity:
          Name:
            NameFull: Gurynenko, Stanislav
      – PersonEntity:
          Name:
            NameFull: Koliada, Kostiantyn
      – PersonEntity:
          Name:
            NameFull: Scherbyna, Alexandre
      – PersonEntity:
          Name:
            NameFull: Poltorak, Anastasiia
      – PersonEntity:
          Name:
            NameFull: Tyshchenko, Svitlana
      – PersonEntity:
          Name:
            NameFull: Khrystenko, Olha
      – PersonEntity:
          Name:
            NameFull: Ribachuk, Volodimir
      – PersonEntity:
          Name:
            NameFull: Kuzoma, Vitalii
      – PersonEntity:
          Name:
            NameFull: Stamat, Viktoriia
      – PersonEntity:
          Name:
            NameFull: Kolesnyk, Maksym
      – PersonEntity:
          Name:
            NameFull: Arefieva, Olena
      – PersonEntity:
          Name:
            NameFull: Onopriienko, Dmytro
      – PersonEntity:
          Name:
            NameFull: Kovalenko, Yuliia
      – PersonEntity:
          Name:
            NameFull: Ostapenko, Tetiana
      – PersonEntity:
          Name:
            NameFull: Hrashchenko, Iryna
    IsPartOfRelationships:
      – BibEntity:
          Dates:
            – D: 24
              M: 11
              Type: published
              Y: 2023
          Identifiers:
            – Type: issn-locals
              Value: edsair
            – Type: issn-locals
              Value: edsairFT
          Titles:
            – TitleFull: Economic and cyber security
              Type: main
ResultId 1