{"id":"https://openalex.org/W4415004146","doi":"https://doi.org/10.1109/acit65614.2025.11185595","title":"Comparative Analysis of EU and Ukrainian Cybersecurity Legal Framework: Joint Impact on Global Security Policy","display_name":"Comparative Analysis of EU and Ukrainian Cybersecurity Legal Framework: Joint Impact on Global Security Policy","publication_year":2025,"publication_date":"2025-09-17","ids":{"openalex":"https://openalex.org/W4415004146","doi":"https://doi.org/10.1109/acit65614.2025.11185595"},"language":"en","primary_location":{"id":"doi:10.1109/acit65614.2025.11185595","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit65614.2025.11185595","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025287888","display_name":"Ljubo Runji\u0107","orcid":"https://orcid.org/0000-0002-1500-2717"},"institutions":[{"id":"https://openalex.org/I8645926","display_name":"University of South Carolina Aiken","ror":"https://ror.org/02d9k9g58","country_code":"US","type":"education","lineage":["https://openalex.org/I8645926"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ljubo Runji\u0107","raw_affiliation_strings":["&#x0160;ibenik University of Applied Sciences,Department of Administrative Studies,&#x0160;ibenik,Croatia"],"affiliations":[{"raw_affiliation_string":"&#x0160;ibenik University of Applied Sciences,Department of Administrative Studies,&#x0160;ibenik,Croatia","institution_ids":["https://openalex.org/I8645926"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119925201","display_name":"Mario Dominik Buri\u0107","orcid":null},"institutions":[{"id":"https://openalex.org/I8645926","display_name":"University of South Carolina Aiken","ror":"https://ror.org/02d9k9g58","country_code":"US","type":"education","lineage":["https://openalex.org/I8645926"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mario Dominik Buri\u0107","raw_affiliation_strings":["&#x0160;ibenik University of Applied Sciences,Department of Administrative Studies,&#x0160;ibenik,Croatia"],"affiliations":[{"raw_affiliation_string":"&#x0160;ibenik University of Applied Sciences,Department of Administrative Studies,&#x0160;ibenik,Croatia","institution_ids":["https://openalex.org/I8645926"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069949398","display_name":"Ivan Livaja","orcid":null},"institutions":[{"id":"https://openalex.org/I8645926","display_name":"University of South Carolina Aiken","ror":"https://ror.org/02d9k9g58","country_code":"US","type":"education","lineage":["https://openalex.org/I8645926"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ivan Livaja","raw_affiliation_strings":["&#x0160;ibenik University of Applied Sciences,Department of Computing,&#x0160;ibenik,Croatia"],"affiliations":[{"raw_affiliation_string":"&#x0160;ibenik University of Applied Sciences,Department of Computing,&#x0160;ibenik,Croatia","institution_ids":["https://openalex.org/I8645926"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5025287888"],"corresponding_institution_ids":["https://openalex.org/I8645926"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.33882089,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"509","last_page":"515"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9610000252723694,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9610000252723694,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T14258","display_name":"Legal and Policy Issues","score":0.9560999870300293,"subfield":{"id":"https://openalex.org/subfields/3308","display_name":"Law"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T14133","display_name":"Border Security and International Relations","score":0.9539999961853027,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scope","display_name":"Scope (computer science)","score":0.6920999884605408},{"id":"https://openalex.org/keywords/geopolitics","display_name":"Geopolitics","score":0.6794999837875366},{"id":"https://openalex.org/keywords/european-union","display_name":"European union","score":0.6140000224113464},{"id":"https://openalex.org/keywords/legislation","display_name":"Legislation","score":0.5626999735832214},{"id":"https://openalex.org/keywords/directive","display_name":"Directive","score":0.5582000017166138},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.41830000281333923},{"id":"https://openalex.org/keywords/international-security","display_name":"International security","score":0.4122999906539917},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.412200003862381},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.40299999713897705}],"concepts":[{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.6920999884605408},{"id":"https://openalex.org/C201960208","wikidata":"https://www.wikidata.org/wiki/Q159385","display_name":"Geopolitics","level":3,"score":0.6794999837875366},{"id":"https://openalex.org/C2910001868","wikidata":"https://www.wikidata.org/wiki/Q458","display_name":"European union","level":2,"score":0.6140000224113464},{"id":"https://openalex.org/C2777351106","wikidata":"https://www.wikidata.org/wiki/Q49371","display_name":"Legislation","level":2,"score":0.5626999735832214},{"id":"https://openalex.org/C2779547435","wikidata":"https://www.wikidata.org/wiki/Q1121492","display_name":"Directive","level":2,"score":0.5582000017166138},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.5135999917984009},{"id":"https://openalex.org/C155202549","wikidata":"https://www.wikidata.org/wiki/Q178803","display_name":"International trade","level":1,"score":0.42410001158714294},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.41830000281333923},{"id":"https://openalex.org/C509929229","wikidata":"https://www.wikidata.org/wiki/Q3312693","display_name":"International security","level":2,"score":0.4122999906539917},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.412200003862381},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.40299999713897705},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3946000039577484},{"id":"https://openalex.org/C18555067","wikidata":"https://www.wikidata.org/wiki/Q8375051","display_name":"Joint (building)","level":2,"score":0.3919000029563904},{"id":"https://openalex.org/C21931767","wikidata":"https://www.wikidata.org/wiki/Q8798","display_name":"Ukrainian","level":2,"score":0.3815000057220459},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3806000053882599},{"id":"https://openalex.org/C528167355","wikidata":"https://www.wikidata.org/wiki/Q258307","display_name":"National security","level":2,"score":0.3666999936103821},{"id":"https://openalex.org/C55447825","wikidata":"https://www.wikidata.org/wiki/Q4394526","display_name":"International law","level":2,"score":0.3646000027656555},{"id":"https://openalex.org/C3116431","wikidata":"https://www.wikidata.org/wiki/Q31728","display_name":"Public administration","level":1,"score":0.32600000500679016},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.3077000081539154},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.299699991941452},{"id":"https://openalex.org/C52487910","wikidata":"https://www.wikidata.org/wiki/Q911488","display_name":"Data Protection Directive","level":4,"score":0.2888999879360199},{"id":"https://openalex.org/C34355311","wikidata":"https://www.wikidata.org/wiki/Q166542","display_name":"International relations","level":3,"score":0.27880001068115234},{"id":"https://openalex.org/C2778069335","wikidata":"https://www.wikidata.org/wiki/Q32098","display_name":"Sanctions","level":2,"score":0.2646999955177307},{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.26190000772476196},{"id":"https://openalex.org/C557252395","wikidata":"https://www.wikidata.org/wiki/Q1889","display_name":"Diplomacy","level":3,"score":0.2563999891281128},{"id":"https://openalex.org/C108115952","wikidata":"https://www.wikidata.org/wiki/Q5155650","display_name":"Comparative research","level":2,"score":0.2551000118255615},{"id":"https://openalex.org/C115314567","wikidata":"https://www.wikidata.org/wiki/Q208202","display_name":"European Union law","level":3,"score":0.2540000081062317},{"id":"https://openalex.org/C190253527","wikidata":"https://www.wikidata.org/wiki/Q295354","display_name":"Law and economics","level":1,"score":0.2540000081062317}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit65614.2025.11185595","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit65614.2025.11185595","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2478926918","https://openalex.org/W2733095465","https://openalex.org/W2767069445","https://openalex.org/W3045234505","https://openalex.org/W3199080144","https://openalex.org/W4234370932","https://openalex.org/W4307983286","https://openalex.org/W4311943648","https://openalex.org/W4313564678","https://openalex.org/W4316689630","https://openalex.org/W4320027020","https://openalex.org/W4323519390","https://openalex.org/W4385290788","https://openalex.org/W4388305565","https://openalex.org/W4388362003","https://openalex.org/W4390606615","https://openalex.org/W4393005945","https://openalex.org/W4400323186","https://openalex.org/W4400992255","https://openalex.org/W4403714226","https://openalex.org/W4404985096","https://openalex.org/W4405349195","https://openalex.org/W4405529239"],"related_works":[],"abstract_inverted_index":{"In":[0],"this":[1,64,93,188,210],"comprehensive":[2],"research":[3,65,94,134,189,211],"paper":[4],"authors\u2019":[5],"primary":[6],"objective":[7],"is":[8,66,119],"to":[9,100,136,149,191,214,235],"meticulously":[10],"examine":[11],"and":[12,16,23,28,53,76,80,108,115,127,145,158,171,175,197,205,218],"elucidate":[13],"the":[14,19,29,70,86,97,129,142,193,228,242],"alignment":[15],"disparities":[17],"between":[18],"European":[20,59,123,143,229],"Union\u2019s":[21],"Network":[22],"Information":[24],"Security":[25],"Directive":[26],"2022/2555":[27],"Law":[30],"of":[31,36,38,63,73,85,195,209,244],"Ukraine":[32,54],"\"On":[33],"Basic":[34],"Principles":[35],"Cybersecurity":[37],"Ukraine\",":[39],"while":[40,162],"simultaneously":[41],"placing":[42],"a":[43,221,236],"significant":[44],"emphasis":[45],"on":[46,69],"implications":[47],"for":[48,92],"cybersecurity":[49,117,203],"governance,":[50],"cross-border":[51,81,156],"cooperation,":[52],"ongoing":[55],"integration":[56],"efforts":[57,139],"into":[58],"Union.":[60],"The":[61,90,207],"scope":[62,75],"particularly":[67],"focused":[68],"thorough":[71],"comparison":[72,182],"legislation":[74],"objectives,":[77],"specific":[78],"obligations,":[79],"collaboration":[82],"in":[83,121,140,241],"light":[84],"current":[87],"geopolitical":[88,131],"context.":[89],"motivation":[91],"stems":[95],"from":[96],"urgent":[98],"need":[99],"establish":[101],"harmonized":[102,114],"regulations":[103],"that":[104,167,224],"can":[105],"effectively":[106],"address":[107],"combat":[109],"state-sponsored":[110],"cyber":[111],"threats.":[112,246],"A":[113],"unified":[116],"policy":[118],"pivotal":[120],"fortifying":[122],"security,":[124],"fostering":[125,220],"diplomacy,":[126],"stabilizing":[128],"intricate":[130],"landscape.":[132],"This":[133],"aims":[135],"advance":[137],"substantial":[138],"unifying":[141],"Union":[144],"Ukraine\u2019s":[146],"legal":[147],"framework":[148],"minimize":[150],"regulatory":[151],"gaps,":[152],"thereby":[153],"promoting":[154],"enhanced":[155],"cooperation":[157],"building":[159],"diplomatic":[160,198],"trust":[161],"jointly":[163],"deterring":[164],"common":[165],"adversaries":[166],"break":[168],"international":[169,239],"law":[170],"threaten":[172],"both":[173],"global":[174],"regional":[176],"security.":[177],"By":[178],"employing":[179],"high-level":[180],"structural":[181],"rather":[183],"than":[184],"granular":[185],"technical":[186],"provisions,":[187],"aspires":[190],"target":[192],"audience":[194],"policymakers":[196],"personnel,":[199],"as":[200,202],"well":[201],"experts":[204],"scholars.":[206],"findings":[208],"are":[212],"expected":[213],"provide":[215],"actionable":[216],"insights":[217],"recommendations,":[219],"collaborative":[222],"environment":[223],"not":[225],"only":[226],"strengthens":[227],"Union-Ukraine":[230],"relationship":[231],"but":[232],"also":[233],"contributes":[234],"more":[237],"resilient":[238],"order":[240],"face":[243],"emerging":[245]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
