Implementation of International Standards of Equal Access to Public Service in the Legislation of the Republic of Uzbekistan: Analysis and Prospects
DOI:
https://doi.org/10.59022/ujldp.540Keywords:
Equal Access, Public Service, International Standards, Implementation, Non-Discrimination, Civil Service Reform, Uzbekistan, GovernanceAbstract
This research examines the implementation of international standards of equal access to public service in the legislation of the Republic of Uzbekistan. The study analyses how universal human rights treaties, constitutional provisions, and sectoral legislation incorporate the principle of equal and non-discriminatory access to civil service. Using doctrinal legal analysis and comparative methodology, the research identifies existing gaps between international obligations and domestic legal practice. The findings reveal that while Uzbekistan has made significant legislative progress, enforcement mechanisms and specific anti-discrimination provisions remain underdeveloped. The study recommends strengthening institutional accountability, expanding transparent competitive procedures, and aligning national legislation more closely with international standards to advance equitable public governance.
References
Ahmadov, T. (2020). Equal access to public service: International and national standards. Tashkent University Press.
Alelyani, T. (2024). Establishing trust in artificial intelligence-driven autonomous healthcare systems: An expert-guided framework. Frontiers in Digital Health, 6, Article 1474692. https://doi.org/10.3389/fdgth.2024.1474692
Burbank, J., Greene, T., & Kaabouch, N. (2024). Detecting and mitigating attacks on GPS devices. Sensors, 24(17), Article 5529. https://doi.org/10.3390/s24175529
Elendu, C., Omeludike, E. K., Oloyede, P. O., Obidigbo, B. T., & Omeludike, J. C. (2024). Legal implications for clinicians in cybersecurity incidents: A review. Medicine, 103(39), Article e39887. https://doi.org/10.1097/MD.0000000000039887
El-Rewini, Z., Sadatsharan, K., Selvaraj, D. F., Plathottam, S. J., & Ranganathan, P. (2020). Cybersecurity challenges in vehicular communications. Vehicular Communications, 23, Article 100214. https://doi.org/10.1016/j.vehcom.2019.100214
Giannaros, A., Karras, A., Theodorakopoulos, L., Karras, C., Kranias, P., Schizas, N., Kalogeratos, G., & Tsolis, D. (2023). Autonomous vehicles: Sophisticated attacks, safety issues, challenges, open topics, blockchain, and future directions. Journal of Cybersecurity and Privacy, 3(3), 493–543. https://doi.org/10.3390/jcp3030025
Huszár, V. D., & Adhikarla, V. K. (2021). Live spoofing detection for automatic human activity recognition applications. Sensors, 21(21), Article 7339. https://doi.org/10.3390/s21217339
Kidmose, B. (2025). A review of smart vehicles in smart cities: Dangers, impacts, and the threat landscape. Vehicular Communications, 51, Article 100871. https://doi.org/10.1016/j.vehcom.2024.100871
Kifor, C. V., & Popescu, A. (2024). Automotive cybersecurity: A survey on frameworks, standards, and testing and monitoring technologies. Sensors, 24(18), Article 6139. https://doi.org/10.3390/s24186139
Kollarova, M., Granak, T., Strelcova, S., & Ristvej, J. (2023). Conceptual model of key aspects of security and privacy protection in a smart city in Slovakia. Sustainability, 15(8), Article 6926. https://doi.org/10.3390/su15086926
Lin, X., Lee, C.-Y., & Fan, C. K. (2025). Exploring the impacts of autonomous vehicles on the insurance industry and strategies for adaptation. World Electric Vehicle Journal, 16(3), Article 119. https://doi.org/10.3390/wevj16030119
Lingras, S., & Basu, A. (2025). The security of autonomous vehicle software and its national security implications. European Journal of Applied Science, Engineering and Technology, 3(1), 180–188.
López González, A., Moreno, M., Moreno Román, A. C., Hadfeg Fernández, Y., & Cepero Pérez, N. (2024). Ethics in artificial intelligence: An approach to cybersecurity. Inteligencia Artificial, 27(73), 38–54.
Margaret, I., Schoubben, F., & Verwaal, E. (2024). When do investors see value in international environmental management certification of multinational corporations? Global Strategy Journal, 14(1), 25–55.
Matos, F., Bernardino, J., Durães, J., & Cunha, J. (2024). A survey on sensor failures in autonomous vehicles: Challenges and solutions. Sensors, 24(16), Article 5108.
Meng, L., Yang, L., Yang, W., & Zhang, L. (2022). A survey of GNSS spoofing and anti-spoofing technology. Remote Sensing, 14(19), Article 4826.
Pande, D., & Taeihagh, A. (2023). Navigating the governance challenges of disruptive technologies: Insights from regulation of autonomous systems in Singapore. Journal of Economic Policy Reform, 26(3), 298–319.
Sakhai, M., Sithu, K., Oke, M. K. S., & Wielgosz, M. (2025). Cyberattack resilience of autonomous vehicle sensor systems. Applied Sciences, 15(13), Article 7493.
Schellekens, M. (2016). Car hacking: Navigating the regulatory landscape. Computer Law & Security Review, 32(2), 307–315.
Schepis, D., Purchase, S., Olaru, D., Smith, B., & Ellis, N. (2023). How governments influence autonomous vehicle innovation. Transportation Research Part A: Policy and Practice, 178, Article 103874.
Taeihagh, A., & Lim, H. S. M. (2019). Governing autonomous vehicles: Emerging responses for safety, liability, privacy, cybersecurity, and industry risks. Transport Reviews, 39(1), 103–128.
Tikhomirov, Yu. A. (2019). Public service in the rule of law state. Yurait Publishing.
Tzoannos, Z.-R., Kosmanos, D., Xenakis, A., & Chaikalis, C. (2024). The impact of spoofing attacks in connected autonomous vehicles under traffic congestion conditions. Telecom, 5(3), 747–759.
Verma, P., Newe, T., O'Mahony, G. D., Brennan, D., & O'Shea, D. (2025). Toward a unified understanding of cyber resilience. IEEE Access, 13, 49945–49965.
Wang, J., Li, F., Zhang, X., & Sun, H. (2024). Adversarial obstacle generation against LiDAR-based 3D object detection. IEEE Transactions on Multimedia, 26, 2686–2699.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Uzbek Journal of Law and Digital Policy

This work is licensed under a Creative Commons Attribution 4.0 International License.

