Development of recreational nature use in Ukraine under European integration conditions: Functional and management aspect
Andrij ZaverbnyjThe article examines the peculiarities of the development of recreational nature use in Ukraine under the conditions of European integration. A review and analysis of literary sources on the problem of defining the essence of the concept of "recreation" was carried out, which made it possible to define this term as "restoration of the physical, psycho-emotional forces of a person through active/passive activity with voluntarily allocated time, money, and other resources for this process." The functional-management aspect of the development of recreational nature use in Ukraine under the conditions of European integration is analyzed. The key principles of the formation, formation and further development of recreational nature use in Ukraine from the functional side are highlighted. A functional approach to the development of recreational nature use is proposed. A typology of the functions of recreational nature use has been developed, detailing their essence and meaning. Each of the considered functional groups is associated with certain spheres of human activity, although there are no clear boundaries between them due to the interconnectedness of all social needs. Having identified and developed a classification of the types of functions of recreational nature use, it is proposed to implement them through a system of purposeful management by using recreational facilities, lands, other resources of Ukraine of a recreational nature, etc. the dynamics of investment in the recreational sphere were analyzed, the variability of its volumes, caused primarily by the instability of the financial support of this type of activity, was revealed. The role and significance of the recreational sphere and recreational nature use in society will be revealed through a wide range of its effects, namely: economic, social, cultural, ecological, international, informational, etc.
References
[1] Fedorova, K. (2023). 6 high-profile cyberattacks on business: Cases of Yahoo, GitHub, and Marriott. Retrieved from https://hub.kyivstar.ua/articles/6-guchnyh-kiberatak-na-biznes-kejsy-yahoo-github-i-marriott.
[2] Biliavska, Yu., & Shestak, Ya. (2022). Cyber security and cyber hygiene: The new era of digital technologies. Commodities and Markets, 3, 47-59. doi: 10.31617/2.2022(43)04
[3] Vyshnivskyi, V.V., & Pampukha, A.I. (2022). Cyber security in Ukraine. In Scientific and practical online conference “Digital transformation of cybersecurity” (pp. 31-33). Kyiv: State University of Information and Communication Technologies.
[4] Hnatiuk, S.O., Berdybaiev, R.Sh., Sydorenko, V.M., Zhyharevych, O.K., & Smirnova, T.V. (2023). System for cyber security events correlation and incident management in critical infrastructure objects. Cybersecurity: Education, Science, Technique, 3(19), 76-196. doi: 10.28925/2663-4023.2023.19.176196.
[5] Gryciuk, Yu.I. (2016). Cyber intervention and cyber security of Ukraine: Problems and prospects of overcoming them. Scientific bulletin of UNFU, 26.8, 327-337.
[6] Dаvydеnkо, Ye. (2023). Corporate security at Ukrainian enterprises in time of war. Economy and Society, 58. doi: 10.32782/2524-0072/2023-58-44.
[7] Dіоrdіcа, І. (2017). The concept and content of cyber threats at the present stage. Entrepreneurship, Economy and Law, 4, 99-107.
[8] Dovhan, O.D., & Doronin, I.M. (2017). Escalation of cyber threats to Ukraine's national interests and legal aspects of cyber defence. Kyiv: Artek Publishing House.
[9] Zhylin, А.V., Shаpоvаl, О.М., & Uspenskyi, О.А. (2021). Information security technologies in information and telecommunication systems. Kyiv: Polytechnic Publishing House.
[10] Law of Ukraine No. 2163-VIII “On the Basic Principles of Ensuring Cybersecurity of Ukraine”. (2017, October). Retrieved from https://zakon.rada.gov.ua/laws/show/2163-19?lang=en#Text.
[11] Zаnudа, А. (2023). Attack on Kyivstar. What dangers does it pose, apart from the lack of communication? Retrieved from https://www.bbc.com/ukrainian/articles/cglp7kz0rjmo.
[12] Kyrychеnkо, А. (2023). Cybersecurity in Ukraine: Ways of development and opportunities. Retrieved from https://www.ukrinform.ua/rubric-technology/3704093-kiberbezpeka-v-ukraini-slahi-rozvitku-ta-mozlivosti.html.
[13] Business cybersecurity in an unstable environment. (2022). Retrieved from https://www.pwc.com/ua/uk/publications/2022/cybersecurity-uncertainty-state.html.
[14] Panasiuk, O. (2022). Cybersecurity: How Ukrainian businesses can protect themselves from Russian hackers' attacks during the war. Tips from IT experts. Retrieved from https://uaspectr.com/2022/07/27/yak-ukrayinskomu-biznesu-zahystytysya-vid-atak-hakeriv/.
[15] Kuzmenkо, О., Маkliuk, О., & Chеrnyshovа, О. (2022). Business cyber security in time of war. Economy and Society, 44. doi: 10.32782/2524-0072/2022-44-21.
[16] Lynnyk, O.I., & Artemenko, N.V. (2013). Enterprise economic security strategy as a factor in reducing the impact of external and internal threats. Bulletin of the National Technical University “KhPI”. Series: Technical progress and production efficiency, 67, 159-169.
[17] Pеshkо, М., & Zаvеrbnyj, А. (2023). Digitalization of the Ukrainian economy in the conditions of european integration. Economy and Society, 47. doi: 10.32782/2524-0072/2023-47-56.
[18] Resolution of the Cabinet of Ministers of Ukraine No. 1163-2023-р “On approval of the action plan for 2023-2024 to implement the Cybersecurity Strategy of Ukraine”. (2019, December). Retrieved from https://zakon.rada.gov.ua/laws/show/1163-2023-%D1%80?lang=en#Text.
[19] Order of the President of Ukraine No. 447/2021. “On the Decision of the National Security and Defence Council of Ukraine of 14 May 2021 “On the Cybersecurity Strategy of Ukraine”. (2021, August). Retrieved from https://zakon.rada.gov.ua/laws/show/447/2021?lang=en#Text.
[20] Franchuk, V.I. (2009). Theoretical foundations of corporate security. Actual Problems of Economics, 7, 161-167.
[21] Shyra, T.B. (2018). Corporate security of enterprises in Ukraine: Identification of key threats. Scientific notes of Taurida National V.I. Vernadsky University Series: Economy and Management, 29(68(6)), 93-96.