Tikhanychev O.V., Tikhanycheva E.O. —
Overview of the history of the development of camouflage uniforms and its influence on the current state of camouflage
// Security Issues. – 2024. – ¹ 3.
– P. 73 - 94.
DOI: 10.25136/2409-7543.2024.3.40022
URL: https://en.e-notabene.ru/nb/article_40022.html
Read the article
Abstract: In the early stages of combat operations, the multi-colored coloring of the uniform served, along with other elements of visualization of the situation, to visually distinguish friendly troops from enemy troops, to separate troops by type and purpose, and not to ensure the secrecy of troops. The issue of camouflage of military equipment and structures, at this stage, has not yet been raised. With the increase in the range and accuracy of weapons, with the advent of automatic weapons, the field military uniform gradually lost the function of identification and acquired the function of camouflage. At first it was a monochromatic khaki coloring, which provides an imitation camouflage function, then a camouflage coloring that adds deforming properties to it. With the advent of military equipment on the battlefield, it had to be painted as well. And later, with the advent of reconnaissance and combat aviation, and other types of long-range weapons, it was necessary to ensure the secrecy of not only the objects of the battlefield, but also the objects of the rear. The article considers the history of the development of methods for increasing the secrecy of personnel through the use of protective coloring of uniforms and equipment. Other aspects of the application of methods for increasing stealth in the optical and other ranges, as well as their development in recent history, are also briefly touched upon.
Tikhanychev O.V. —
On clarifying the concept of "power of attorney" of artificial intelligence systems
// Software systems and computational methods. – 2024. – ¹ 3.
– P. 44 - 54.
DOI: 10.7256/2454-0714.2024.3.44097
URL: https://en.e-notabene.ru/itmag/article_44097.html
Read the article
Abstract: The subject of the study is the concept of "power of attorney" of artificial intelligence controlling robotic means of varying degrees of autonomy. The relevance of the choice of the subject of research as the principles of the use of robotic systems for various purposes, including in a group, and the object of research, which are algorithmic problems arising in the implementation of group action algorithms, is determined by the existing contradiction between the need for joint use of robotic systems, primarily autonomous, and the complexity of the software implementation of this requirement. The implementation of robotics generates certain technological problems related to the efficiency and safety of algorithmic support of autonomous and controlled robotic systems. The manifestation of such problems may be application errors that reduce the effectiveness of joint actions. In robotics, the main potential reason for the appearance of such a situation is the insufficient effectiveness of existing group application control algorithms, determined by the low level of problem study. The article formulates a list of typical situations that determine the use of autonomous and controlled robots in a group with a leader. On the basis of the proposed classification, possible algorithms for controlling movement in the group are analyzed: both calculations for target maneuvering and for ensuring mutual security. The main situations concerning the types of maneuver are formulated and the mathematical apparatus for their calculations is described. Based on the overview analysis of typical algorithms for controlling movement in space, the formulation of the scientific problem of solving the problem of developing group algorithms and mathematical methods is synthesized.
Tikhanychev O.V. —
Battlefield informatization: some possibilities and possible problems
// National Security. – 2024. – ¹ 2.
– P. 1 - 15.
DOI: 10.7256/2454-0668.2024.2.36142
URL: https://en.e-notabene.ru/nbmag/article_36142.html
Read the article
Abstract: The subject of the study is informatization in military affairs, the object of the study is possible ways to control the enemy through intentional and targeted distortion of information about their troops, goals and conditions of action. The author examines in detail such aspects of modern warfare as multi-domain, with a significant shift in emphasis in the sphere of information warfare. As the experience of local wars and armed conflicts of the last decade shows, the forms of their conduct differ significantly from the "classic" wars waged until the end of the XX century. The informatization of the battlefield made it possible to switch to such form of use of troops (forces) as network-centric actions. But the expansion of capabilities, the improvement of technologies of warfare, in accordance with the laws of dialectics, generates certain vulnerabilities. These vulnerabilities manifest themselves in the same area where the strengths are located – in the field of informatization of military operations. Based on this, special attention is paid to assessing the impact of informatization on the adequacy of decisions, primarily in terms of possible vulnerabilities of the management process. Using general scientific research methods: analysis and synthesis, the author, based on the analysis of the main trends of modern armed confrontation, synthesized a description of possible vulnerabilities when using automated control systems, formulated the task of developing a mathematical apparatus for the formation and evaluation of the reliability of information about the opposing systems. This is not about physically changing information in the automated control systems of the enemy: this task is technically difficult, but relatively simple from the point of view of algorithmization. And not about the trivial misleading of a decision-maker, as it has been done many times before. The article deals with the situation of decision-making management through the management of the directed submission of information using vulnerabilities by its automated processing in the automated control system.
Tikhanychev O.V., Tikhanycheva E.O. —
Ensuring the secrecy of objects in the conduct of armed conflicts of varying intensity, as an important aspect of their protection: history, status, development of the process
// Security Issues. – 2023. – ¹ 4.
– P. 126 - 151.
DOI: 10.25136/2409-7543.2023.4.39371
URL: https://en.e-notabene.ru/nb/article_39371.html
Read the article
Abstract: The object of the study is to ensure the security of objects during the conduct of military conflicts of varying intensity. The subject of the study is to increase security by increasing secrecy. Historical analysis shows that secrecy is provided mainly due to the coloring of military uniforms and objects. At the early stages of combat operations, the colors of uniforms served, along with other elements of visual visualization of the situation, to visually distinguish their troops from enemy troops, the separation of troops by gender and purpose, and the issue of masking combat and rear facilities was not relevant. With the increase in the range, accuracy and rate of fire of weapons, the field military uniform gradually lost the function of identification and acquired the function of disguise. At first it was a one-color "khaki" color, then a camouflage coloring. With the appearance of military equipment on the battlefield, it also had to be painted, masking turned from a poorly formalized process into one of the forms of ensuring combat operations – engineering. Subsequently, with the advent of reconnaissance and combat aircraft, and other types of long-range weapons, it was necessary to ensure the secrecy of not only the objects of the battlefield, but also the objects of the rear. Separate sections of masking – reducing the optical visibility of objects in the air and at sea. The article examines the history of the development of methods for increasing the secrecy of personnel, weapons and objects through the use of protective coloring of uniforms, equipment and military equipment. Other aspects of the application of methods of increasing stealth in optical and other ranges, their development in recent history are briefly touched upon.
Tikhanychev O.V. —
Non-Lethal Weapons as a Means of Expanding the Capabilities to Defeat the Enemy
// National Security. – 2023. – ¹ 3.
– P. 32 - 48.
DOI: 10.7256/2454-0668.2023.3.39468
URL: https://en.e-notabene.ru/nbmag/article_39468.html
Read the article
Abstract: The subject of the study is the impact on the enemy during armed conflicts of varying intensity, the object of the study is the features of the so-called "non-lethal" weapons used in this process. The author has studied in detail the process of influencing enemy objects during the conduct of military operations with the use of non-lethal weapons, analyzed the features of its use in local wars and armed conflicts. The relevance of the study is determined by the appearance in leading foreign countries of updated conceptual and combat documents defining the principles and conditions for the use of non-lethal weapons. When writing a review article, general scientific research methods – analysis and synthesis - were used. Based on the analysis of the features of the use of non-lethal weapons during local wars and armed conflicts of recent times, the particular consequences of its use are analyzed. Based on the results of the analysis, the author concludes that the purpose of using such weapons is not the humanization of conflicts stated in a number of conceptual documents, but to increase the effectiveness of defeating the enemy in difficult conditions of modern warfare. Thus, it is determined that the increasing role of non-lethal weapons in modern operations is determined by its physical properties, which make it possible to solve the tasks of defeating enemy objects and defending their objects in difficult background-target conditions characteristic of modern local wars and armed conflicts
Tikhanychev O.V. —
Safety Rules of Heuristic Behavior Algorithms as a Prototype of the "Morality" of Robotic Systems
// National Security. – 2022. – ¹ 6.
– P. 164 - 178.
DOI: 10.7256/2454-0668.2022.6.38856
URL: https://en.e-notabene.ru/nbmag/article_38856.html
Read the article
Abstract: The relevance of choosing the subject of research, as the use of autonomous robotic systems for various purposes and the object of research, which are algorithmic problems arising in terms of algorithm security control, is determined by the existing contradiction between the need for autonomous robotic systems and the complexity of the software implementation of this requirement. The study was conducted on the example of the application of robotics in the field of autonomous transport systems. The implementation of trends of autonomization in this area generates certain legal and technological problems related to the security of algorithmic support of autonomous systems. The manifestation of such problems are critical application errors that are problematic to identify at the development stage. In robotics, the main potential cause of these errors is the functioning of the software of autonomous robotic systems outside the framework of deterministic algorithms that were tested during their development. And if for conventional technical systems the consequences of application errors are predictable, and responsibility for their results is determined, then for the case of autonomous robots, the situation requires a solution. In the article, using general scientific methods of analysis and synthesis, the main aspects of the current state and prospects of the problem of algorithmization of the use of autonomous systems are investigated. Based on a review analysis of algorithmic problems of using autonomous robots, possible consequences and causes of algorithmic errors arising from their use, the formulation of the scientific problem of solving the problem of developing heuristic algorithms that determine their application using a dynamically formed system of predicate behavior similar to human morality is synthesized.
Tikhanychev O.V. —
The myth of the "humanity" of non-lethal weapons
// Conflict Studies / nota bene. – 2022. – ¹ 3.
– P. 60 - 74.
DOI: 10.7256/2454-0617.2022.3.35062
URL: https://en.e-notabene.ru/cfmag/article_35062.html
Read the article
Abstract: The subject of the study is a non-lethal (non-lethal) weapon. The object of the study is the thesis of his humanity and safety, put forward by some military experts. The main purpose of the study is to evaluate the correctness of the thesis about its safety based on the analysis of the features of the use of non-lethal weapons in modern local wars and armed conflicts. The relevance of the study is determined by the appearance in the United States and NATO of updated conceptual and combat documents defining the principles and conditions for the use of non-lethal weapons. When writing the review article, general scientific research methods were used – analysis and synthesis, implemented on the basis of studying organizational documents that are in the public domain. Based on the assessment of the use of non-lethal weapons during local wars and recent military conflicts, the features and consequences of its use are analyzed. Based on the results of the analysis, conclusions are drawn that the purpose of using such weapons is not the humanization of conflicts stated in a number of conceptual documents, but to increase the effectiveness of defeating the enemy in difficult conditions of modern conflicts. Thus, in the review article it is determined that the increasing role of non-lethal weapons in modern operations is determined by its physical properties, which make it possible to solve the tasks of defeating the enemy in difficult conditions of the background-target situation characteristic of modern local wars and armed conflicts
Tikhanychev O.V. —
On clarifying the quality control of software products
// Software systems and computational methods. – 2022. – ¹ 2.
– P. 1 - 12.
DOI: 10.7256/2454-0714.2022.2.37985
URL: https://en.e-notabene.ru/itmag/article_37985.html
Read the article
Abstract: Despite the extensive volume of experience in the field of control automation, there are quite a lot of problems in the process of developing automated systems, including those related to the development of application software for them. With this in mind, the process of software development of automated control systems is chosen as the subject of research. The object of the study is a model of quality control of this process. Currently, legal regulation of software quality control is based on a paradigm that determines that the quality of programs will be checked exclusively for compliance with the requirements of the terms of contract. But, as practice has shown, such a paradigm does not fully meet modern conditions, providing not full-fledged quality control -- the verification of compliance of programs with customer expectations formulated at the stage of system design is needed. To find ways to solve the problem, the article uses general scientific methods of analysis. Based on the analysis of currently used methods and models of software testing, proposals for clarifying the paradigm of its evaluation and control are synthesized. The article formulates a scientific and practical problem and suggests a possible approach to its solution based on the refinement of the quality assessment paradigm currently used, on the transition from a "rigid", preset model to an expanded quality assessment model that takes into account not only the requirements of the terms of the contract, but also the conditions for their implementation.
The novelty of the proposed approach lies in the fact that the solution of the formulated task will provide an overall improvement in the quality of control by improving the safety and effectiveness of programs based on the transition to the use of an extended dynamic testing model of the software being developed, implemented within the framework of a refined quality assessment paradigm
Tikhanychev O.V. —
Models based on "estimation bias" as a tool for predicting potential threats
// National Security. – 2022. – ¹ 1.
– P. 45 - 54.
DOI: 10.7256/2454-0668.2022.1.36163
URL: https://en.e-notabene.ru/nbmag/article_36163.html
Read the article
Abstract: In statistics, there is a phenomenon called "estimation bias". It is determined by the fact that with the spontaneous formation of the studied samples in social research, a kind of "shift" occurs, determined by the motivation of respondents. The analysis shows that a similar phenomenon occurs in many areas of evaluation related to a person: writing reviews about products and services, conducting surveys, forming applications. This principle can manifest itself in the formation of public opinion on socially significant issues: during elections, referendums, and the like. Moreover, knowledge of the principle of "displacement" can be used to organize a deliberate "shift" of the results of socially significant surveys. Examples of such use are the technologies of "color" revolutions carried out by relatively small groups of people or the well–known method of so-called "smart voting". Using general scientific methods of analysis and synthesis, the article shows possible approaches to the formation of such "shifts", analyzes the possible consequences of the implementation of such technologies and formulates proposals to counteract them. It is concluded that the purposeful use of "bias" assessment technologies can lead to conflicts of interests between different groups of society and the authorities, but it could not be corrected until now due to the lack of appropriate counteraction mechanisms. The development of mechanisms for assessing the consequences of the "shift" and countering it, theoretically, can provide counteraction to the use of external influences to destabilize the state in the case of intentional use of the "shift". In case of accidental formation of a "bias", forecasting methods will ensure the detection of an error. Conclusions are drawn that the proposed methodology for assessing the "bias" is not just a theory, its implementation will have a practical effect, which is to increase the stability of the system of state and municipal management.
Tikhanychev O.V. —
Theory and practice of “hybrid” confrontation: an overview of conflicts since the XV century to the present
// Conflict Studies / nota bene. – 2021. – ¹ 2.
– P. 1 - 12.
DOI: 10.7256/2454-0617.2021.2.35598
URL: https://en.e-notabene.ru/cfmag/article_35598.html
Read the article
Abstract: The subject of this research is the indirect forms of confrontation in intergovernmental conflicts conflicts. The object of this research is the “hybrid warfare” as a form of indirect confrontation. It is established that currently the methods of military and nonmilitary intergovernmental confrontation are being extensively used. One of the actively implemented concepts is the so called “hybrid war”. The author examines the key components of “hybrid” actions; and leaning on the analysis of historical experience, concludes that these approaches have deep historical roots. The article reviews not the classical mercenarism, but namely “hybrid” actions, when the hirer and the purpose of involving mercenaries are hidden, while military actions are accompanied by economic confrontation and massive information attacks. The examples of such actions can be seen in wars back in the XV–XVII centuries. The analysis of warfare and armed conflicts experience allows concluding the threat of “hybrid” actions is extremely relevant now and in the foreseeable future. It is also worth noting that in the future, other “hybrid” approaches towards intergovernmental confrontation that have previously been used in the past can be modified to the new conditions of civilizational development. The author concludes that Russia should be ready to counter such threats, and outlines possible aspects of such counteraction.
Tikhanychev O.V. —
On the use of modern technologies of information survey
// Software systems and computational methods. – 2021. – ¹ 1.
– P. 63 - 76.
DOI: 10.7256/2454-0714.2021.1.31229
URL: https://en.e-notabene.ru/itmag/article_31229.html
Read the article
Abstract: The subject of this research is the process of software development for automated control systems. The object of this research is the initial stage of this process – information survey of the object of automation. At the present stage, despite availability of quite an extensive list of automation means for the formation of information models of automated objects, this process is not always structured rationally. One of the reasons lies in the absence of methodology for the use of modern technologies for building information models. For solution of this problem, the author formulates a scientific and practical task for improving the process of information survey of the objects of automation based on the modern approaches and specialized means for their implementation. The article employs the methods of analysis and synthesis. Based on the analysis of peculiarities of building information models of automated control systems, in addition to the “classical” iterative approach, the author synthesizes the algorithms that are based on the principles of building the model from the output document of the program and sequential description of the operator's actions in the software on the input of information in fulfilling the functional tasks. The implementation of the proposed algorithms in practice may ensure the effectiveness of using modern automation means for information survey, by inserting into the process of software creation for automated control systems.
Tikhanychev O.V. —
Clarification of the structure of “hybrid forces”
// National Security. – 2021. – ¹ 1.
– P. 40 - 48.
DOI: 10.7256/2454-0668.2021.1.33387
URL: https://en.e-notabene.ru/nbmag/article_33387.html
Read the article
Abstract: The subject of this research is the “hybrid wars”, while the object is the “hybrid forces” as a means of conducting hybrid wars. The author establishes that that currently in assessment of “hybrid forces”, the latter imply military and irregular formations opposing on the battlefield. At the same time, the analysis of the content of “hybrid wars” demonstrates that the structure of “hybrid forces” should be understood in a broader sense, considering procurement and all-round support, including those carried out covertly. This approach provides a more accurate assessment of “hybrid wars” and its actors. The main conclusion of consists in the proposal to expand the structure of “hybrid forces”, alight in with the structure of modern” hybrid” conflicts. The novelty of this research lies in the fact that based on clarification of the actors and structure of “hybrid forces”, the author formulates recommendations on clarification of the mechanisms for assessing course of “hybrid” wars, analysis of the possible vectors for “hybrid” actions; as well as underlines the need for regulation of international legislation in the area of conducting armed conflicts and their actors. The analysis of open sources describing the subject area shows that this problem was not previously solved in such a statement
Tikhanychev O.V. —
Articulation of the problem of ensuring security of the algorithms of intelligent systems
// National Security. – 2020. – ¹ 5.
– P. 45 - 55.
DOI: 10.7256/2454-0668.2020.5.33286
URL: https://en.e-notabene.ru/nbmag/article_33286.html
Read the article
Abstract: Relevance of the selected topic is defined by implementation of autonomous robotic systems of various designation. The object of this research is the algorithmic problems emerging in monitoring the security of algorithms. The author determines the existing contradiction between the need for automation of robotics and the complexity of software implementation of this requirement. The research is carried out on the example of implementation of robotics in transport and military spheres. Realization of the trends of automation in these spheres generates certain legal and technological problems associated with algorithmic support of the autonomous systems. The indicated problems manifest in unrecoverable application errors, divided by the experts into the errors of first and second grade. The primary cause for the occurrence of such errors in robotics consists in misuse of autonomous robotic systems software. If for conventional technical systems the consequences of such errors and responsibility thereof are predictable, the problem of implementation of the autonomous robots needs to be addressed. Using the general scientific methods of analysis and synthesis, the author examines the key aspects of the current state and prospects of algorithmization of usage of autonomous systems. Leaning on the general review of algorithmic problems of implementation of autonomous robots, implications and manifestation of errors of first and second grade emerging in their implementation, the author synthesizes articulation of the scientific problem of division of responsibility between the developers and the users of systems in the context of elaboration of algorithms of their implementation,
Tikhanychev O.V. —
On the quality indicators of automated control systems software
// Software systems and computational methods. – 2020. – ¹ 2.
– P. 22 - 36.
DOI: 10.7256/2454-0714.2020.2.28814
URL: https://en.e-notabene.ru/itmag/article_28814.html
Read the article
Abstract: The subject of the research is the process of developing automated control systems software. The object of the research is the quality control system of this process. The regulatory documents establish a list of the main characteristics of program quality assessment, which, as practice has shown, does not fully meet its purpose, providing not quality control, but verification of the compliance of programs with the customer's requirements formulated in the terms of reference. One of the reasons for this lies in the impossibility of evaluating exclusively quantitative indicators of the quality of systems, including both technical means and a person. An attempt to use world practice, for example, relatively successful quality models from the ISO / IEC 25000: 2014 standards have not yet been implemented: the model itself is allowed to be used by regulatory documents (GOST R ISO / IEC 25010-2015), but the quality indicators described in it are not accepted. Private improvements to existing methods do not solve the problem systematically. The article uses general scientific methods of analysis and synthesis. Based on the analysis of existing approaches to assessing the quality of software development, proposals for improving this process are synthesized.The article formulates a scientific and practical problem and offers one of the approaches to its solution, based on the refinement of existing methods for assessing quality based on the model described in GOST R ISO / IEC 25010, taking into account the real needs of users, interpreted through reducing the likelihood of errors of the first and second kind arising from the use of software. The solution of the formulated problem will provide a general increase in the efficiency of automated control through the use of quantitative and qualitative assessments of the software being developed.
Tikhanychev O.V. —
Development Management and Project Management: Contrast or Complement?
// Software systems and computational methods. – 2020. – ¹ 2.
– P. 53 - 68.
DOI: 10.7256/2454-0714.2020.2.29603
URL: https://en.e-notabene.ru/itmag/article_29603.html
Read the article
Abstract: The subject of this research is the process of developing software for automated control systems. The object of research is the means of organizing software development. A generally recognized promising direction for increasing the efficiency of the use of organizational and technical systems is the automation of their management. A significant share of the effectiveness of any complex technical system is provided by its software. This primarily applies to the application software. The development of application programs is fraught with certain difficulties, primarily of an organizational nature. The generalized analysis showed that in world practice there is a fairly wide range of tools for organizing the program development process. These tools are proposed to be divided into two large groups with respect to the attitude to the process and the degree of detail on "project management tools" and "development controls". Each of the tools is effective for certain conditions of software development. The review article analyzes the factors affecting the effectiveness of the use of a particular tool, synthesized proposals on the expediency of using various control systems in different conditions of the development process. The analysis showed that for the conditions of the development of applied software for automated decision support systems, the most effective is the integrated use of process control automation tools.
Tikhanychev O.V. —
Digital economy and “cloud” society
// Trends and management. – 2020. – ¹ 2.
– P. 17 - 27.
DOI: 10.7256/2454-0730.2020.2.31926
URL: https://en.e-notabene.ru/tumag/article_31926.html
Read the article
Abstract: The object of this research is the process of management informatization in economic sphere. The subject of this research is the impact of active implementation of information management technologies upon transformation of this process. At the same time, the article does not dispute the effectiveness and feasibility of the segment of rendering digital services, but rather focuses on studying digital economy overall and its impact upon the modern information society. The relevance is defined by the fact that the expert opinions on digital economy and its prospects substantially differ, and the experience of rapid transition to remote work during the COVID-19 pandemic significantly increased the number of potential problems. The application of systemic approach, methods of decomposition and comparative analysis, taking into account the experience of organization of remote work during the quarantine, allowed viewing the questions of digitalization of the economy as one of the spheres of human activity from a comprehensive perspective. The conclusion is made that digitalization of the economy, although not being a “know-how” in the direct sense, ensures taking the economic management processes to the new level, which due to changes in content of the processes in “real” economy, may substantially affect development of society as whole.
Tikhanychev O.V. —
Autonomous robotics: on the problem of control over modifiable algorithms
// Security Issues. – 2020. – ¹ 2.
– P. 36 - 47.
DOI: 10.25136/2409-7543.2020.2.31937
URL: https://en.e-notabene.ru/nb/article_31937.html
Read the article
Abstract: The subject of this research is the application of autonomous robotic systems of various designation. The object of this research is the algorithmic problems emerging in this area, namely the problem of control over security of algorithms. The study is carried out on the basis of implementation of robotics in military sphere. The analysis of peculiarities of the modern military operations demonstrates that one of the aspects of revolution in military science is the battlefield robotics. However, its realization generates certain issues in legal sphere, related to algorithmic support of the autonomous system. The manifestations of such problem consist in critical use errors, divided by the experts into the errors of first and second grade. The main cause of these errors is the software functionality of the autonomous robotic system. If the consequences for conventional armament are predictable, and the responsibility for their results is determined, the situation in case of implementation of military robots requires solution. Application of the general scientific methods of analysis and synthesis allow examining the main aspects of current state and prospects of the problem of algorithmization with regards to implementation of autonomous systems. The article synthesizes articulation of the scientific tasks aimed at solution of the problem of division of responsibility between the developers and users of similar system in terms of development and testing of the algorithms of their implementation.
Tikhanychev O.V. —
Hybrid warfare: a new word in military art or the well forgotten new?
// Security Issues. – 2020. – ¹ 1.
– P. 30 - 43.
DOI: 10.25136/2409-7543.2020.1.30256
URL: https://en.e-notabene.ru/nb/article_30256.html
Read the article
Abstract: The author examines the aspect of one of the military strategies – the so-called “hybrid warfare”. Analysis is conducted on the key components of “hybrid” actions. Examination of historical allows concluding that these approaches have deep historical roots. This refers not to the classical mercenary, but namely to “hybrid” actions, when the contractor and purpose of mercenaries are hidden, and military actions are accompanied by economic confrontation and mass cyber-attacks. The author carries out component-wise analysis for understanding the nature of emergence and waging of “hybrid” warfare at different historical stages. Based on the experience of conducting warfare and armed conflicts, the conclusion is made that the threat of “hybrid” actions is extremely relevant currently and in the foreseeable future. Moreover, the author determines that other previously existing but modified with consideration of new factors of civilizational development “hybrid” approaches towards organization of inter-state confrontation may be implemented. The need to ensure readiness of the Russian Federation to parrying such threats is underlined.
Tikhanychev O.V. —
Usage of models based on quantitative risk theory for support of decision-making on counteraction of destructive social technologies
// Security Issues. – 2020. – ¹ 1.
– P. 44 - 58.
DOI: 10.25136/2409-7543.2020.1.30628
URL: https://en.e-notabene.ru/nb/article_30628.html
Read the article
Abstract: The object of this research is the process of intergovernmental opposition based on the methods and techniques of “soft power”. The subject of this research is the modeling of personal risks of the participants of sociopolitical processes that ensure counteraction to social destabilization technologies. The article is dedicated to counteraction of destructive technologies implemented in intergovernmental opposition within the framework of “soft power”. For quantitative substantiation of the content of counteraction methods, it is proposed to apply geometrical interpretation of probability-value risk model used in technology and economics, as well as in decision-making on the subconscious level by each individual. The conducted formalization of subject area allowed describing the risk model of making decisions by a specific individual regarding the participation in protect actions. Using the methods of analysis and synthesis, the author examines the behavioral components of the model, as well as its possible effect on the behavior of potential participants of protests through modification of these components. The conclusions are made on possibility of realization of some variations of such effect. Thus, the article targets the development of model of addressing the risks to evaluate the methods of countering “soft power” techniques.
Tikhanychev O.V. —
Research of the role of the scientific and technical support in development of software products for Automated Control Systems
// Trends and management. – 2020. – ¹ 1.
– P. 19 - 31.
DOI: 10.7256/2454-0730.2020.1.31212
URL: https://en.e-notabene.ru/tumag/article_31212.html
Read the article
Abstract: The subject of this research is the process of development of software products for Automated Control Systems of industrial and special designation. The object of this research is the functional responsibilities of the software developers based on their roles in this process. The general scientific methods of analysis and synthesis were applied in studying the peculiarities of the development of software products. Leaning on analysis of the content of technical documentation standards that regulates the software development for automated systems of special designation and determines the content of the process and functions of its participants, the author synthesized the suggestions on clarification of the list of experts engaged in the process and their competences. The problem is articulated regarding the improvement of functional responsibilities of the participants of this process. It is proposed to specify the technical documentation standards, list of involved experts, and their training programs. Execution of such measures should help to bring the process of development of software products for Automated Control Systems in compliance with the current demands.
Tikhanychev O.V. —
“Digital economy”: technological breakthrough or new utilization of known methods?
// Trends and management. – 2019. – ¹ 4.
– P. 59 - 65.
DOI: 10.7256/2454-0730.2019.4.28940
URL: https://en.e-notabene.ru/tumag/article_28940.html
Read the article
Abstract: The object of this research is the process of informatization of management in the economic sector. The subject of this research is the impact from the active implementation of information technologies of management upon the state of this process. The article explores not the segment of digital industry, which efficiency and reasonableness of which unquestionable, but the “digital” economy as a whole. The relevance of this work is defined by substantial discrepancies in the export opinions on “digital” economy. To analyze the content of these discrepancies, the author examines the peculiarities of “digital” economy in comparison with the process of informatization of management in other areas of activity. The use of systemic approach, methods of decomposition and comparative analysis, allowed viewing the questions of “digitalization” of economy in a complex, as one of the spheres of human activity. Based on application of generalization method, a conclusion is made that “digitalization” of economy is not a “know-how” or panacea from all problems, rather the transfer of its management to a new level ensuring achievement of vast results with current capacity and means by increasing the efficiency of their utilization. At the same time, the analysis of the factors of “digitalization” revealed that it would exert certain influence upon development of “real” economy, and it is unacceptable to not take it into account.
Tikhanychev O.V. —
Paradigm of duality of management in the information era
// Trends and management. – 2019. – ¹ 3.
– P. 57 - 63.
DOI: 10.7256/2454-0730.2019.3.27127
URL: https://en.e-notabene.ru/tumag/article_27127.html
Read the article
Abstract: The subject of this research is the process of managing complex socio-technical systems. The object of this research is the paradigm of duality of management, consisting in the presence of objective and subjective components within it. Currently, in the conditions of formation of a postindustrial society, many seemingly unchangeable management paradigms are changing, including some fundamental ones. This fully affects the paradigm of duality, which has historically formed as an accord and discord of the objective (mental) and subjective (willful) components. As demonstrated by the analysis of the situation formed in the area of management of socio-technical systems with development of programing and technical means of supporting decision-making, human participation in the process of decision-making gradually decreases. At the same time, in managing hybrid and anthropocentric systems, the role of the willful component remains the same, and in number of instances even increases. This factor exerts influence upon the content of the process of decision-making and implementation thereof. Correspondingly, this fact should be considered in devising requirements towards automated management systems and training programs from management specialists. Based on the analysis of the current state of management process, the author synthesizes proposal on improving the organization of management in the conditions of permanent process of informatization of all spheres of human activity. The author is first to formulate applied aspects of changes in the paradigm of duality of management associated with the changes in training of management personnel and development software systems of decision-making support.
Tikhanychev O.V. —
On transformation of the system of “citizen-government” relations in the context of information society
// Trends and management. – 2019. – ¹ 3.
– P. 15 - 24.
DOI: 10.7256/2454-0730.2019.3.27691
URL: https://en.e-notabene.ru/tumag/article_27691.html
Read the article
Abstract: One of the trends in development of human society is characterized by consistent improvements to the system of relation between an individual (citizen) and the government. There are currently three known key types of such systems, described by formal models: defined by priority of government over individual; defined by the importance of human values; based on solidary and subsidiary relations. There are certain issues associated with application of all of these models. Therefore, the object of this research is the system of governing, and the subject is the structure of the model of “citizen-government” relations. Based on the conducted analysis, it is determined that one of the sources of existing problems lies in the fixed nature of the system of relations, when interaction between the government and all its citizens is structured by practically same principles. A conclusion is made that such situation can lead to emergence of internal conflicts; but this situation cannot be resolved at this time due to absence of corresponding segregation mechanisms. With the arrival of the era of information revolution, such mechanism have emerged, and some of them were even successfully tested, providing the opportunity to structure a new model of “citizen-government” relations that is based on the individual consideration of needs and abilities of each. The author concludes that implementation of the proposed model will have practical effect consisting in increased efficiency of the functionality of the system of governing.
Tikhanychev O.V. —
On the legal and ethical aspects of autonomous use of mobile robots in the sphere of military operations
// Security Issues. – 2019. – ¹ 3.
– P. 33 - 42.
DOI: 10.25136/2409-7543.2019.3.28960
URL: https://en.e-notabene.ru/nb/article_28960.html
Read the article
Abstract: The subject of this research is the application of autonomous robots of various designation. The object of this research is the occurring legal and moral-ethical aspects. The work is conducted on the example of the use of robotics in military sphere. Analysis of peculiarities of the modern military actions demonstrated that one of the revolutionary aspects in military sphere lies in implementation of robotics in the battlefield. However, the implementation of this trend generates certain problems in the legal and humanitarian sphere. As with any weapon, use of battlefield robots can results in critical errors, divided by the experts in the errors of first and second type. In robotics, the primary cause of such errors consists in functionality of software of robotic systems. If for conventional armament the consequences of these errors are predictable and responsibility is established, then in the case of using battlefield robots, the situation requires a solution. Based on the general review of the legal and moral-ethical problems of using mobile robots, possible consequences and causes of occurrence of errors of first and second type, the article synthesizes articulation of the scientific task of solving the problem of allocation of responsibility between developers and users of such systems.
Tikhanychev O.V. —
Cyber Intelligence as a Threat of Information Era
// Security Issues. – 2019. – ¹ 2.
– P. 24 - 33.
DOI: 10.25136/2409-7543.2019.2.26787
URL: https://en.e-notabene.ru/nb/article_26787.html
Read the article
Abstract:
The object of the research is the process of collection information about important events and phenomena through indirect methods. The subject of the research is the methods of collecting information about objects in cyber space. In his review article Tikhanychev states that ensurance of secrecy has always been an important principle of military. However, while earlier secrecy was maintained mostly in physical space, later it was transferred to radioelectronic and other spheres. With the beginning of post-industrial era and network-centered wars, new methods of collecting information on the Internet were created which made intelligence agencies to develop relevant countermeasures. To describe such measures the author of the article has used the method of technology analysis used by intelligence Internet communities to collect information. Based on the analysis, the researcher offers countermeasures. The main conclusion of the research is that post-industrial era has brought more opportunities for government and non-government structures to collect information through open sources such as social networks, based on indirect signs of electronic devices' functioning, and others. According to the researcher, in order to counter these methods, it is necessary to switch from passive measures of data protection, processing and exchange to active principles of information protection. The researcher offers a number of short-term and long-term organizational and technical measures to ensure this principle.
Tikhanychev O.V. —
Regarding the Applied Use of Risk Models
// Security Issues. – 2019. – ¹ 2.
– P. 42 - 51.
DOI: 10.25136/2409-7543.2019.2.27633
URL: https://en.e-notabene.ru/nb/article_27633.html
Read the article
Abstract: The object of the research is the process of inter-state confrontation based on the soft power methods. The subject of the research is the methods of modelling personal risks of socio-political process participants and forecasting consequences of the use of social technologies that destabilize society as well as relevant counter measures. This is a review article that is devoted to the analysis of destructive technologies used in the process of inter-state confrontation within the soft power methods. Tikhanychev analyzes the main factors and risks considered by each individual during decision making process including those within social processes. For quantitative substantiation of these methods, the author offers to use geometric interpretaiton of probability cost estimation risk model that is practically used in technology and economics as well as by each individual in his or her decision making process subconsciously. The author analyzes behavioral patterns of models as well as possibility to influence individual's behavior through modification of these patterns. The researcher concludes that such influence is possible and describes some variants thereof. At the end of the article the researcher sets a target to develop a risk assessment model that would evaluate methods of soft power technology counteraction.
Tikhanychev O.V. —
User interfaces in automated systems: development issues
// Software systems and computational methods. – 2019. – ¹ 2.
– P. 11 - 22.
DOI: 10.7256/2454-0714.2019.2.28443
URL: https://en.e-notabene.ru/itmag/article_28443.html
Read the article
Abstract: The subject of research is the software development process of automated control systems. The object of study is the development of user interfaces for control automation software. The generally recognized prospective direction for increasing the efficiency of organizational and technical systems is the automation of their management, which ensures increased efficiency and validity of decisions made. A significant impact on the effectiveness of any automated system is provided by its software. This primarily relates to application software. Application development is fraught with certain difficulties, including those associated with the creation of user interfaces. The analysis of development practice shows the presence of a number of problems in this area, determined by the fact that this problem is at the junction of scientific disciplines: control theory, ergonomics, technical aesthetics and psychology. During the study, general scientific methods of analysis and synthesis were used.The authors analyzes the factors affecting the efficiency of user interface development. Based on this analysis, suggestions for solving the problem are synthesized based on the use of standardization, unification and prototyping tools.The analysis showed that for the development conditions of application software for automated control systems, the last of the listed approaches provides the greatest efficiency, namely, the use of specialized prototyping systems. It is proposed to finalize the normative documentation specifying the development of automated control systems for the mandatory stage of prototyping user interfaces in the structure of the process of creating such systems
Tikhanychev O.V. —
“Hybrid” warfare: history, current state, and framework for countermeasures
// National Security. – 2019. – ¹ 1.
– P. 39 - 48.
DOI: 10.7256/2454-0668.2019.1.28100
URL: https://en.e-notabene.ru/nbmag/article_28100.html
Read the article
Abstract: The object of this research is the “hybrid” methods of confrontation, while the subjects is the structure of “hybrid” confrontation and its transformation over time. The author examines the key components of “hybrid” actions, as well as using the analysis of historical experience, concludes that such approaches have deep historical roots. The examples of such actions, as demonstrated by the historical analysis, can be found in wars of the XVI-XVII centuries. It is noteworthy that the leaders, in their practical implication, were the counties of Anglo-Saxon Alliance. Systemic approach alongside the methods of decomposition and comparative analysis allowed considering the questions of organization of the “hybrid” (in other terminology of “nontraditional” or “diffuse”) warfare. Based on the analysis of experience acquired in waging war and armed conflicts, the conclusion is made that the threat of “hybrid” actions is extremely relevant, both currently and in the foreseeable future. The author underlines the need or ensuring Russia’s readiness to defuse such treats, as well as describes the possible approaches towards implementation of countermeasures.
Tikhanychev O.V. —
Once Again about the Challenges of Using Battle Robot Systems
// Security Issues. – 2018. – ¹ 5.
– P. 63 - 72.
DOI: 10.25136/2409-7543.2018.5.25937
URL: https://en.e-notabene.ru/nb/article_25937.html
Read the article
Abstract: The scope of the research is the use of robots in the military. The object of the research is the moral, ethical and legal challenges that may arise in this sphere, first of all, in the use of automated battle robots. One of the revolutionary aspects in the military today is the robotization of the battle field. This trend creates certain technological, legal and humanitarian problems. Like any other weapons, robots may be used with crucial errors that experts divide into the errors of the first andn the second kinds. While consequences of such errors are quite predictable for usual weapons and it is no problem who bears a responsibility in case of errors being made, the situation is much more difficult for the use of military robots. The author of the article analyzes the main aspects of the matter using general research methods such as analysis and synthesis. Bsed on the review of legal, moral and aesthetical challenges of using automated military robots, possible consequences and errors of the first and the second kinds that may arise, the author of the article emphasizes the need to differentiate between responsibility of designers and responsibility of users.
Tikhanychev O.V. —
Agile technologies in software development of decision support systems
// Software systems and computational methods. – 2018. – ¹ 2.
– P. 51 - 59.
DOI: 10.7256/2454-0714.2018.2.23743
URL: https://en.e-notabene.ru/itmag/article_23743.html
Read the article
Abstract: The subject of the study is the process of developing software for automated control systems. Object of research - methodologies for organizing software development. Automation of management is a universally recognized promising direction of increasing the efficiency of the application of complex technical systems. First of all, automation, organized by the principle of decision support systems. The basis of the effectiveness of any automated system is its software. First of all, this applies to application software. The development of such programs entails certain difficulties, primarily organizational ones. Generalized analysis has shown that in the world practice there is a rather wide range of methods for organizing the development of programs. These methods can be divided into two large groups with respect to the algorithms used for "hard" and "flexible" ones. Each of the approaches is effective for certain conditions of work. The article analyzes the factors influencing the effectiveness of applying a particular methodology, synthesizes suggestions on the appropriateness of using different methodologies in different conditions of the development process. The analysis showed that for the development of automated decision support systems, the use of "flexible" approaches is most effective. In the article features of Scrum technology are considered, as a typical implementation of "flexible" methodologies. Conclusions about the expediency of its application in the development of application software for automated decision support systems are formulated
Tikhanychev O.V. —
Cyber Weapons Restraints as the Safety Enforcement Factor in the Networked World
// Security Issues. – 2018. – ¹ 2.
– P. 43 - 49.
DOI: 10.25136/2409-7543.2018.2.25377
URL: https://en.e-notabene.ru/nb/article_25377.html
Read the article
Abstract: The subject of the research is the cyber security issues. The object of the research is the features of using cyber weapons that may impact the international and national cyber security. In this review article the author clarifies existing approaches to restraining the use of such weapons. The rapid development of information technologies has resulted in new forms of interstate warfare including that against cyber space attacks. Taking this factor into account, the author of the article provides a review of cyber space security issues and clarifies relevant state security issues. To analyze the aforesaid problems, the author has used the comparative method and systems approach as well as the category approach. To make conclusions, the author has applied the synthesis method. The author states that the problem of unauthorized use of cyber weapons is a systemic one and thus cannot be solved by a state independently and without cooperation with other actors. The author suggests that in order to resolve the issue, it is necessary to apply approaches similar to those that are currently used to restrain the use of military equipment and ultimate technologies.