Information security in cross-border cooperation
Вантажиться...
Дата
Назва журналу
Номер ISSN
Назва тому
Видавець
II. Rákóczi Ferenc Kárpátaljai Magyar Egyetem
Анотація
Abstract. In the context of globalization, information security challenges are becoming increasingly acute, as
cyber threats recognize no state borders, and the fragmented nature of regulation leaves critical
infrastructure vulnerable. This, in turn, heightens the need for harmonized international cybersecurity
standards [1]. Cross-border data exchange and digital interaction create new vulnerabilities: attacks on
governmental and communication systems, unauthorized access to sensitive information, and foreign
interference in electoral processes have become real challenges to both national and international
security. Information manipulation and disinformation campaigns are now considered a growing threat
to security and foreign policy across entire regions (for example, the European Union) [2]. A vivid
example is electoral processes that come under pressure from complex cyber and information attacks.
Unprecedented hybrid influences are being recorded — from illegal financing and massive fake news
dissemination to cyberattacks aimed at destabilizing democratic institutions [3]. Therefore, ensuring
information security in cross-border cooperation is not just relevant but critically important.
This research is devoted to identifying current threats to information security in the cross-border
domain. Its goal is to substantiate mechanisms for countering these threats through international
coordination. To achieve this, it is necessary to address the following tasks: to analyze the main types
of cyber and information threats arising in the context of cross-border interaction; to assess existing
international initiatives, legal norms, and cooperation practices in the field of cybersecurity; and to
determine key directions for enhancing cyber resilience and information protection through joint
efforts of partner states. The relevance of the topic is determined not only by the growing number of
attacks but also by their global nature — attackers can act simultaneously against several countries,
exploiting vulnerabilities across different jurisdictions [5].
The scientific novelty of this study lies in its comprehensive approach to the problem of information
security within cross-border cooperation, which combines technological, legal, and socio-political
aspects. Unlike other studies that mainly focus on technical means of cyber defense, this work
emphasizes the interconnection between joint technological measures and diplomatic cooperation.
The main threats to information security in cross-border cooperation are complex in nature.
Among them are: cyberattacks on critical state information resources and communication networks;
unauthorized intrusions into databases and espionage conducted via the global internet infrastructure;
targeted disinformation campaigns and influence operations in social networks that undermine public
trust; and interference in electoral processes by other states or non-state actors using both cyberattacks
and propaganda. Particularly dangerous are hybrid information operations that combine technical
methods of disruption (for example, hacking critical infrastructure websites) with psychological
influence (mass dissemination of fake content and manipulation of public opinion). Such operations
have repeatedly occurred and demonstrated high effectiveness in destabilizing entire regions.
Опис
Teljes kiadvány: https://kme.org.ua/uk/publications/rol-bezpeki-v-transkordonnomu-ta-mizhnarodnomu-spivrobitnictvi/
Ключові слова
Бібліографічний опис
In Csernicskó István, Maruszinec Marianna, Molnár D. Erzsébet, Mulesza Okszána és Melehánics Anna (szerk.): A biztonság szerepe a határon átnyúló és nemzetközi együttműködésben. Nemzetközi tudományos és szakmai konferencia Beregszász, 2025. október 8–9. Absztraktkötet. Beregszász, II. Rákóczi Ferenc Kárpátaljai Magyar Egyetem, 2025. pp. 246-247.
Endorsement
Review
Supplemented By
Referenced By
Creative Commons license
Except where otherwised noted, this item's license is described as Attribution-NonCommercial-NoDerivs 3.0 United States
