{"title":"Passive Cyber Defense as a Norm Preservation Tool: Romania’s Behaviour as a Norm Antipreneur in Cybersecurity","authors":"Răzvan-Ovidiu Ceuca","doi":"10.54851/v5i2y202302","DOIUrl":"https://doi.org/10.54851/v5i2y202302","url":null,"abstract":": The complex challenges of cyberspace have pushed the states of the world to promote cybersecurity approaches addressing these challenges. While some states advocate for the contentious new active cyber defense approach, others continue to rely on the current passive cyber defense strategy. Previous contributions in literature have identified the technical, legal, and political elements impacting state-level decision-making, while omitting normative incentives. Therefore, this study aims to explain why Romania normatively employs passive cyber defense. Empirical evidence shows that Romania acts as a norm antipreneur, promoting a passive cyber defense that cultivates the civil society’s resilience through cybersecurity research, training, and dissemination of information of public interest.","PeriodicalId":127637,"journal":{"name":"Romanian Cyber Security Journal","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139210891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Who is Threatening My Avatar in Metaverse?","authors":"Mădălina Zamfir, Andreea-Cătălina Crăciun","doi":"10.54851/v5i2y202308","DOIUrl":"https://doi.org/10.54851/v5i2y202308","url":null,"abstract":"","PeriodicalId":127637,"journal":{"name":"Romanian Cyber Security Journal","volume":"45 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139213466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain and Cyber-Security: the Opportunity to Develop a National Data Analysis Platform to Ensure National Security and Financial Stability","authors":"Bogdan Vacusta, Constantin Nica","doi":"10.54851/v5i2y202307","DOIUrl":"https://doi.org/10.54851/v5i2y202307","url":null,"abstract":"","PeriodicalId":127637,"journal":{"name":"Romanian Cyber Security Journal","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139212785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Role of Cyber Security in the Technology Transfer of eHealth Applications","authors":"Luminița Crăciun","doi":"10.54851/v5i2y202306","DOIUrl":"https://doi.org/10.54851/v5i2y202306","url":null,"abstract":": The major changes in the field of health, determined by the evolution of the digital world, but also by other social factors (Covid-19 pandemic, the Russian-Ukrainian war, the increase in the incidence of drugs and car accidents, etc.) or natural factors (cataclysms) generate the need for a rapid technological transfer between eHealth software developers and healthcare professionals. The European Commission for Health constantly carries out studies to present the situation of digitization of the medical field in EU member countries, also proposing measures for those in which the pace of implementation of IT solutions is slower. In addition to this situation, the Commission emphasizes that it is necessary to take the the appropriate measures to avoid risks and protect personal data from cyber attacks and threats by ill-wishers, which can make it difficult to perform the medical act. This article highlights the fact that eHealth applications can be protected from attacks like phishing, ransomware, DDoS, malware, etc. if the technological transfer confirms the inclusion of cyber protection measures in the new product or if it is done with the help of blockchain technology.","PeriodicalId":127637,"journal":{"name":"Romanian Cyber Security Journal","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139209277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Security Mechanisms of the Health E-learning System: Case Study","authors":"Lidia Băjenaru, Claudiu Gura, Ion Smeureanu","doi":"10.54851/v5i2y202310","DOIUrl":"https://doi.org/10.54851/v5i2y202310","url":null,"abstract":"","PeriodicalId":127637,"journal":{"name":"Romanian Cyber Security Journal","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139213175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}