Open Access
Issue
SHS Web Conf.
Volume 107, 2021
9th International Conference on Monitoring, Modeling & Management of Emergent Economy (M3E2 2021)
Article Number 02002
Number of page(s) 8
Section Economic Security
DOI https://doi.org/10.1051/shsconf/202110702002
Published online 24 May 2021
  1. Proekt zakonu Ukrayiny Pro krytychnu infrastrukturu ta yiyi zakhyst (Draft Law of Ukraine on Critical Infrastructure and its Protection) (2019), http://search.ligazakon.ua/l_doc2.nsf/link1/JH7YW00A.html [Google Scholar]
  2. National Bank of Ukraine, Vyznacheno kryteriyi vidnesennya obyektiv bankivskoyi systemy do krytychnoyi infrastruktury (The criteria for assigning the objects of the banking system to the critical infrastructure are defined) (2020), https://bit.ly/3doFp5A [Google Scholar]
  3. Verkhovna Rada of Ukraine, Poryadok vnesennya obyektiv krytychnoyi informatsiynoyi infrastruktury do derzhavnoho reyestru obyektiv krytychnoyi informatsiynoyi infrastruktury, yoho formuvannya ta zabezpechennya funktsionuvannya (The procedure for entering critical information infrastructure facilities in the state register of critical information in- frastructure facilities, its formation and operation) (2020), https://cutt.ly/2vf0xTE [Google Scholar]
  4. C. Alcaraz, S. Zeadally, International Journal of Critical Infrastructure Protection 8, 53 (2015) [Google Scholar]
  5. R. Mosadeghi, R. Richards, R. Tomlinson, Critical Infrastructure Protection and Uncertainty Analysis (2017), chap. Chapter 8, pp. 193–223, https://www.worldscientific.com/doi/abs/10.1142/9789813207950_0008 [Google Scholar]
  6. G. Giannopoulos, R. Filippini, M. Schimmer, Risk Assessment Methodologies for Critical Infrastructure Protection. Part I: A state of the Art, JRC Technical Notes (Publications Office of the European Union, Luxembourg, 2012), ISBN 978-92-7923839-0, https://bit.ly/32jzHvu [Google Scholar]
  7. D. Rehak, P. Senovsky, S. Slivkova, Systems 6, 21 (2018) [Google Scholar]
  8. G. Amélie, B. Aurélia, L. Emmanuel, E. Mohamed, D. Gilles, The Challenge of Critical Infrastructure Dependency Modelling and Simulation for Emergency Management and Decision Making by the Civil Security Authorities, in Critical Information Infrastructures Security, edited, by E. Rome, M. Theocharidou, S. Wolthusen (Springer International Publishing, Cham, 2016), pp. 255–258, ISBN 978-3-319-33331-1 [Google Scholar]
  9. C. Pursiainen, International Journal of Disaster Risk Reduction 27, 632 (2018) [Google Scholar]
  10. A. Ianioglo, T. Polajeva, Journal of Business Economics and Management 18, 1228 (2017) [Google Scholar]
  11. L. Osberg, A. Sharpe, Economic Security in Nova Scotia (2008), http://csls.ca/reports/csls2008-05.pdf [Google Scholar]
  12. V. Ioan-Franc, M.A. Diamescu, Revista Romana de Economie 31 (2010) [Google Scholar]
  13. K. Schimmel, S. Liu, J. Nicholls, N. Nechval, J. Forrest, Advances in Systems Science and Applications 17, 14 (2017) [Google Scholar]
  14. E. Kopp, L. Kaffenberger, C. Wilson, Cyber risk, market failures, and financial stability, https://www.imf.org/-/media/Files/Publications/WP/2017/wp17185.ashx [Google Scholar]
  15. M. Kos´ny, M. Piotrowska, Economic security of households: Assessment based on scenario analysis (2019), http://www.ecineq.org/ecineq_bari13/FILESxBari13/CR2/p183.pdf [Google Scholar]
  16. J.S. Hacker, G.A. Huber, A. Nichols, P. Rehm, M. Schlesinger, R. Valletta, S. Craig, Review of Income and Wealth 60, S5 (2014) [Google Scholar]
  17. J.S. Hacker, G.A. Huber, P. Rhem, M. Schlesinger, R. Valetta, Economic Security at Risk: Findings from the Economic Security Index (The Rockefeller Foundation, New York, NY, 2010), http://economicsecurityindex.org/upload/media/Economic_Security_Index_Full_Report.pdf [Google Scholar]
  18. S. Bistarelli, F. Fioravanti, P. Peretti, F. Santini, Journal of Experimental & Theoretical Artificial Intelligence 24, 161 (2012) [Google Scholar]
  19. J.S. Hacker, G.A. Huber, A. Nichols, P. Rehm, M. Schlesinger, R. Valletta, S. Craig, Review of Income and Wealth 60, S5 (2014) [Google Scholar]
  20. M.E. Johnson, E. Goetz, IEEE Security Privacy 5, 16 (2007) [Google Scholar]
  21. M. Kahler, The Pacific Review 17, 485 (2004) [Google Scholar]
  22. O. Sukhodolia, S. Kondratov, D. Bobro, V. Horbulin, Developing The Critical Infrastructure Protection System in Ukraine (NISS, Kyiv, 2017) [Google Scholar]
  23. R.L.B.J. Allen, Enterprise Security Risk Management: Concepts and Applications (Rothstein Publishing, Brookfield, Connecticut, 2017) [Google Scholar]
  24. A. Wakefield, Corporate Security and Enterprise Risk Management, in Corporate Security in the 21st Century: Theory and Practice in International Perspective, edited by K. Walby, R.K. Lippert (Palgrave Macmillan UK, London, 2014), pp. 235–253, ISBN 978-1-137-34607-0, https://doi.org/10.1057/9781137346070_13 [Google Scholar]
  25. R. McCormack, A. Lord, Risky business: Implementing risk management in national security decisionmaking (2019) [Google Scholar]
  26. M. Dehmer, S. Meyer-Nieberg, G. Mihelcic, S. Pickl, M. Zsifkovits, EURO Journal on Decision Processes 3, 305 (2015) [Google Scholar]
  27. N.V. Zachosova, Modern econ. pp. 14–25 (2011) [Google Scholar]
  28. N.V. Zachosova, Econ. Finan. Law pp. 7–13 (2010) [Google Scholar]
  29. D.B. Bobro, Strat. priorit. pp. 77–85 (2016) [Google Scholar]
  30. O.I. Ivanenko, Bul. of KNTU pp. 9–22 (2020) [Google Scholar]
  31. O.V. Cherevko, Efektyvna ekonomika (2014) [Google Scholar]
  32. I.O. Dotsenko, O.P. Melnychuk, SR pp. 79–84 (2018) [Google Scholar]
  33. M. Velykodna, Psychodynamic Practice 27, 10 (2021) [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.