Reference:
Skobelina N.A..
Interprofile practices: ensuring safety in the long-term care system (on the example of the Volgograd region)
// Security Issues.
2024. № 2.
P. 18-29.
DOI: 10.25136/2409-7543.2024.2.70689 EDN: EYTSEF URL: https://en.nbpublish.com/library_read_article.php?id=70689
Abstract:
The long-term care system includes diverse specialists who organize long-term care activities and provide services to elderly and disabled people in need of care. Our focus is on interprofile practices that are created in the long-term care system in order to provide high-quality and safe services to the population. The purpose of the article is to identify the features of interprofile practices in the aspect of ensuring safety in long-term care. In the long-term care system, safety is understood as a way to protect the health and well-being of the elderly and disabled, creating conditions to improve the quality of life of citizens in need of care. It is relevant to create safe work for care professionals in order to prevent their professional burnout in long-term care. The article uses the analysis of scientific literature and the results of expert interviews with managers and employees of social service centers of the Volgograd region (N=27, Volgograd region, January – February 2022). The fundamental theory for the study of interprofile interactions of specialists as organized practices is the theory of structuration by E. Giddens. The features of interprofile practices that are reproduced by subjects of long-term care include: versatility, balance of social services and medical care, the technological basis for the interaction of specialists, ensuring safety in the process of long-term care. In the Volgograd region, a mechanism is being built to ensure the safety of elderly people and care professionals in need of care, technologies are being used that integrate the efforts of medical workers and specialists in the field of social services, the creation of which contributes to improving the quality of services for the elderly and disabled. However, not all social service centers in the Volgograd Region use the brigade method and establish cooperation practices between medical professionals and social service specialists, whose integration ensures the safety of both providers and recipients of services.
Keywords:
system, Volgograd region, multilevel, interview, technology, care, long-term, safety, practices, interprofile
Reference:
Nikolaev N.V., Nekrasov M.I., Bogachev D.G., Sokolov A.M..
On the issue of countering security threats associated with the use of weapons made of polymer materials
// Security Issues.
2023. № 2.
P. 68-81.
DOI: 10.25136/2409-7543.2023.2.40642 EDN: MYJVOS URL: https://en.nbpublish.com/library_read_article.php?id=40642
Abstract:
The subject of the study is a scientific and methodological apparatus for designing systems of physical protection of objects that ensure the detection of items made of non-standard materials prohibited from being brought into the protected area. The object of the study is the process of detecting weapons made of polymer materials using special technical means. The aim of the work is to develop the scientific and methodological apparatus for designing systems of physical protection of objects in the direction of updating the models of violators due to the systematic presentation of methods of unauthorized passage of weapons made of polymer materials. The methods of system analysis are used in the work. The authors note the possibility of using 3D weapons as a new means of implementing security threats to objects. In the interests of countering such threats, research is being conducted on the introduction of terahertz (sub-terahertz) personal inspection complexes that detect objects made of non-standard materials hidden under clothing on the body of the object of inspection, as well as determining the main methods of concealed 3D weapons to create adequate models of violators necessary for the design of new and improvement of existing systems of physical protection of objects. The paper presents the characteristics and results of a comparative analysis of the main methods of concealed carrying of such weapons. In conclusion, it is noted that the identification of 3D weapons is complicated by the fact that the details can be modified to make it difficult for security personnel, operators of complexes at the inspection point and machine vision tools to recognize them. The results of the study can be used during the design of physical protection systems for objects that ensure the detection of prohibited items made of non-standard materials. The scientific novelty of the work consists in the development of a scientific and methodological apparatus for designing systems of physical protection of objects by developing intruder models that take into account the methods of concealed carrying of weapons made of polymer materials.
Keywords:
Polymer materials, Physical protection system, 3D printing, Additive technologies, Intruder model, Security threats, Polymer weapons, Personal inspection complexes, 3D weapons, Hidden passage methods
Reference:
Gorbaneva O.I..
Corruption in the allocation of resources in a static model of a combination of general and private interests
// Security Issues.
2022. № 3.
P. 93-104.
DOI: 10.25136/2409-7543.2022.3.33477 EDN: NUODLE URL: https://en.nbpublish.com/library_read_article.php?id=33477
Abstract:
The article is devoted to the study of corruption in the previously studied static model of the combination of common and private interests (SOCHI model) of several agents, namely, corruption in the allocation of resources. The upper level – the principal – allocates resources to the elements of the lower level - agents - so that the latter distribute them between their general and their private interests. The middle level - the supervisor representing the interests of the top level - underestimates the amount of resources allocated to the agent, which he can increase by a certain amount, but no more than to the level initially set by the principal. A three-level hierarchical tree system is formed. This article examines a three-level hierarchical system in which the supervisor uses an economic corruption mechanism in the allocation of resources. Two approaches are used in the study of this mechanism: descriptive and optimization. The descriptive approach assumes that the functions of bribery in question are known. The optimization approach involves the use of Hermeyer's theorem. The influence of corruption in the allocation of resources on system consistency in the SOCHI model is investigated: it is proved that corruption in the allocation of resources can only reduce consistency in the SOCHI model. It is proved that economic corruption is always beneficial for agents, but it turns out to be manipulative for a supervisor. The only way to fight corruption in the allocation of resources has been found.
Keywords:
SPICE-models, mechanism of corruption, system compatability, Principal, supervisor, agent, resource allocation corruption, descriptive approach, optimization approach, bribery function
Reference:
Ilyushchenko A.A..
Legal Regulation ensuring Security in the Regions of the Russian Federation bordering Ukraine
// Security Issues.
2022. № 3.
P. 51-78.
DOI: 10.25136/2409-7543.2022.3.38492 EDN: TUXWFR URL: https://en.nbpublish.com/library_read_article.php?id=38492
Abstract:
The subject of the study is the legal norms regulating the basics of protection of the population and territories from emergency situations, including in conditions of armed conflict. The object of the study is the social relations developing in the field of provision of public security in the border territories of the Russian Federation. The relevance of the research topic is due to the combination of legal and practical circumstances. The author examines in detail such aspects of the topic as issues of internal and external security, fire safety and protection of the population and territories from man-made emergencies, civil defense measures and actions to counter terrorism in the regions bordering Ukraine since the beginning of a special military operation on February 24, 2022. The novelty of the research lies in a comprehensive analysis of legal and organizational problems in the event of new threats with the use of weapons in the Russian border regions with the proposed differentiation of individual processes for the protection of the population, which is necessary to build a high-quality and understandable system for ensuring public security on the territory of the Russian Federation. The mechanism of the established interrelations in the system of ensuring defense and security in armed conflicts outside the territory of the Russian Federation to ensure the state of protection of the individual, society and the state in the border regions of Russia is substantiated. It is proposed to comprehend the legal regime through which, in reality, the ordering of both the public security system itself should be achieved in conditions of regular manifestations of hostile military actions, and the components of this system for military security, civil defense, protection of the population and territories from natural and man-made emergencies, fire safety.
Keywords:
public safety, defense, security status, protection of the population, explosions, civil defense, special military operation, emergency situation, armed conflict, safety
Reference:
Gorbaneva O.I..
Economic corruption in a static model of a combination of general and private interests
// Security Issues.
2022. № 1.
P. 21-34.
DOI: 10.25136/2409-7543.2022.1.33483 URL: https://en.nbpublish.com/library_read_article.php?id=33483
Abstract:
The article is devoted to the study of corruption in the previously studied static model of the combination of general and private interests (SOCHI model) of several agents. In this article, special attention is paid to the study of economic corruption. To do this, an intermediate level is introduced into the previously considered two-level system between the Principal and the Agents - a supervisor who represents the interests of the Principal, but in exchange for a bribe can improve the position of the agent at the expense of the Principal. The latter sets for each agent, himself and the supervisor a share of participation in the total income. The supervisor can increase the agent's share in exchange for a bribe, reducing the Principal's share. This article examines a three-level hierarchical system in which the supervisor uses an economic corruption mechanism, in the study of which two approaches are used: descriptive and optimization. The descriptive approach assumes that the functions of bribery in question are known. The optimization approach involves the use of Hermeyer's theorem. The influence of economic corruption on systemic consistency in the SOCHI model is investigated: it is proved that economic corruption can theoretically increase consistency. But this requires the fulfillment of many conditions, the joint fulfillment of which is unlikely. It is proved that economic corruption is always beneficial for agents, and also for the supervisor. The only way to combat this kind of corruption has been found.
Keywords:
optimization approach, descriptive approach, economic corruption, agent, Supervisor, Principal, system consistency, corruption mechanism, SOCHI-models, the function of bribery
Reference:
Starovoitov V.G..
The role of municipalities in ensuring economic security of the Russian regions
// Security Issues.
2022. № 1.
P. 1-8.
DOI: 10.25136/2409-7543.2022.1.36842 URL: https://en.nbpublish.com/library_read_article.php?id=36842
Abstract:
The subject of this research is the state of economic security of municipalities and their role in ensuring economic security of the Russian regions. The object of this research is provision of economic security of the Russian regions. The article employs the methods of qualitative, quantitative and multi-criteria analysis for ranking regions and municipalities, as well as the methods of systematization and generalization. The author substantiates the relevance of ensuring economic security on the regional and municipal levels due to the fact that the crucial socioeconomic processes associated with economic activity of an the individual and phenomena determining the quality of life take place namely in the regions and municipalities. The main conclusion consists in determination and application of the most significant scientific approaches and methodologies, as well as best organizational practice of ensuring economic security of the municipalities, which allows detecting the threats and threshold values of the indicators of economic security indicators, and improving the quality of assessment of their level of economic security. This enables the mobilization of municipalities in the activity of ensuring their economic security and socioeconomic development. Experience has proven that the level of economic activity and quality of life is growing in the regions, where municipalities successfully solve the issues of their economic security. The scientific novelty of this study consists in revealing and analyzing the currently most important results in the sphere of economic security of the regions and municipalities, as well as in outlining the promising directions of research and their use in solution of the issues of economic security and socioeconomic development of the Russian regions and municipalities.
Keywords:
monitoring, threshold values, indicator systems, indicators, threats, economic security, municipal formation, region, multi-criteria analysis, ranking of regions
Reference:
Gorbaneva O.I..
Administrative corruption in the static model of balancing common and private interests
// Security Issues.
2021. № 2.
P. 9-19.
DOI: 10.25136/2409-7543.2021.2.33466 URL: https://en.nbpublish.com/library_read_article.php?id=33466
Abstract:
This article is dedicated to examination of corruption in the previously researched static model of balancing common and private interests (SOCHI-models). In the previously considered two-level system, between the upper non-corrupted level and the lower – agents, is introduced the average level which in exchange for a bribe, can weaken the influence of the upper level. The upper level sets the minimum amount of resources for an agent to spend on general purposes. A supervisor, in exchange for a bribe, the role of which is played by the share of agent’s private income, can reduce this lower boundary, allowing the latter to spend more resources on private purposes. This article reviews the three-level hierarchical system “Principal-Supervisor-Agents”, where the supervisor uses the administrative corruption mechanism, which requires two descriptive and optimization approaches towards its examination. The descriptive approach suggests that the considered functions of bribery are known; while the optimization approach implies the use of Germeyer’s theorem. The author explores the impact of administrative corruption upon systemic congruence of the SOCHI-model: it is proven that the administrative corruption can only reduce congruence. The author finds the conditions that can beat or reduce administrative corruption can, as well as conditions when corruption is disadvantageous for supervisor or agent. The article determines the circle of agents that supervisor can exert influence upon.
Keywords:
descriptive approach, administrative corruption, agent, supervisor, Principal, system compatability, mechanism of corruption, SPICE-models, optimization approach, bribery function
Reference:
Shumov V..
The analysis of integration processes in post-Soviet space
// Security Issues.
2020. № 2.
P. 15-35.
DOI: 10.25136/2409-7543.2020.2.32864 URL: https://en.nbpublish.com/library_read_article.php?id=32864
Abstract:
The object of this research is the social, political and economic integration processes in post-Soviet space. The subject of this research is the model of assessment, construction of scenarios and forecast of integration processes. For the analysis, forecasting and assessment of risks of integration processes, the author employs two approaches: 1) usage of methods of the theory of security and mathematical modeling of integration (disintegration) processes of political and socioeconomic actors aimed and increase of their security; 2) assessment of challenges and unfavorable consequences using the paradigm “impossibility – risk – security”. The model of security is based on dichotomy (inextricable connection) of the values of sovereignty (development) and retention, and considers the key factors affecting successful development of the states, trans- and supranational formations: size and ethnic composition of population, interethnic relationship, social indicators of development. The experience of integration processes on the European continent is summarized. It is historically proven that the basis for economic integration consists in the effective mechanisms of political and military integration. The author develops three scenarios of integration in the post-Soviet space: 1) pessimistic, commonwealth of states – insurance of the freedom of movement of commodities, services, capital and workforce, and realization of the coordinated or single policy with regards to economic sectors; 2) realistic, federation with the elements of confederation – joint administration of the Union cover 50% of state functions; 3) optimistic, being a part of the Russian Federation – joint administration of Federation covers80% of state functions, with the possibility of significant increase of country’s security, if 3-7 republics of the former Soviet Union are a part of Russia. The quantitative analysis of geopolitical situation demonstrates the presence of favorable conditions for integration processes.
Keywords:
pessimistic scenario, integration scenarios, mathematical model, impossibility, risk, safety, integration processes, optimistic scenario, realistic scenario, geopolitical inversion
Reference:
Zelenkov M..
Improvement of transport and logistic systems management in the conditions of growing threat of maritime terrorism and piracy
// Security Issues.
2019. № 4.
P. 20-35.
DOI: 10.25136/2409-7543.2019.4.29670 URL: https://en.nbpublish.com/library_read_article.php?id=29670
Abstract:
The object of this research is the transport and logistics system. The subject of this research is the maritime terrorism and piracy as a threat to transport and logistics process at sea. The goal consists to determine and substantiate the manifestations of maritime terrorism and piracy as a remaining threat to commercial operation of maritime transport. Analysis is conducted on the potential object of terrorist attacks, piracy affected areas, as well as tactics and methods used by terrorist organizations, which allowed formulating five main forms of maritime terrorism based on the criteria of use of maritime space and selection of targets by terrorists. Special role is assigned to determination of the key factors contributing to maritime terrorism and piracy, peculiarities of their manifestation in most problematic areas of the World Ocean. The scientific novelty consists in theoretical and practical substantiation of the choice of research methods. The acquired results led to the conclusion that each sea transport region has its own specificities in manifestation of maritime terrorism and piracy. At the same time, there are universal forms, methods and means of their manifestation. Based on these facts, the author determined and substantiated the three basic areas for improvement of transport and logistic systems management to attenuate threats of maritime terrorism and piracy in the XXI century.
Keywords:
piracy, maritime terrorism, Africa, Southeast Asia, water transport, maritime logistics, commercial exploitation, transport security, transport and logistics systems, management
Reference:
Novosel'skiy A.V..
The reflection of legal assessment of hybrid war against Syria in scientific publications
// Security Issues.
2019. № 3.
P. 10-18.
DOI: 10.25136/2409-7543.2019.3.29995 URL: https://en.nbpublish.com/library_read_article.php?id=29995
Abstract:
The goal of this article is to expand the awareness of military-political figures on the special meaning of legal assessment of hybrid war against Syria, as well as inform them on the existing results of scientific research on the topic. The relevance is substantiated by insufficient familiarization of public with the mechanism of undue influence on the Syrian Arab Republic by the world backstage of the West. The author presents the new texts pertaining to the subject in question reduced to the three groups. The first group combines the publications of scholars, who described the phenomenon of “hybrid war” in Syrian conflict. The second group includes the works of scholars, who examined the aspects of international humanitarian law in the conditions of hybrid warfare against Syria. The third group is limited by findings of the experts, who explained the motives of negative attitude of world backstage of the West towards the fate of legitimate regime / Syrian citizens. The scientific novelty consists in substantiation of the need for introducing the concept of “hybrid war” into legal field and recognizing it as equal crime against humanity as a regular war. The main results of this work lies in the proof that formalization of the concept of “hybrid war” and its introduction into the legal field of international community would contribute to ensuring security of Russia, as well as enhancing its international authority.
Keywords:
legal treatment, world arrangement, world-wide backstage, the West, hybrid war, the Middle East, range of problems, Syria, war, confrontation
Reference:
Belov P..
Theoretical and Methodological Aspects of National Security Management
// Security Issues.
2018. № 4.
P. 10-27.
DOI: 10.25136/2409-7543.2018.4.26775 URL: https://en.nbpublish.com/library_read_article.php?id=26775
Abstract:
The subject of this research is to develop an adequate framework of categories and concepts and modern methods of system research as well as to improve the management of the national security process in general and information-psychological and industrial-environmental spheres of national security in particular. The rationale of thsi research is caused both by the imperfection of the current paradigm of national security (mostly of humanitarian descriptive nature) and the growing issue of preservation of nations and strategic stability as a result of the intensified struggle for deficit natural resources. The methodology of national security management is an interdisciplinary instrument that is based on the energy-enthropic concept and classification of real dangers, and includes such contemporary research methods as systems analysis on the basis of categoric thinking and modelling and systems synthesis of measures necessary to improve the management-by-objective of the national security. The novelty of the research is caused by the following: the author gives a definition of national, information-psychological and industrial-environmental security, describes the subject matter and contents of relevant professional activities and chosen inderdisciplinary instrument to manage and improve the aforesaid spheres of security, and demonstrates reliability of these definitions. These definitions may be used in the university and post-graduate educational processes as well as professional activity of experts.
Keywords:
system, risk, modeling, calls, threats, dangers, interests, values, needs, damage
Reference:
Shakhmanov F.F., Fomin A.V..
Experimental Approbation of a Mathematical Model Used to Assess the Collective Fire Hazard Risk of Automobile Gas Stations
// Security Issues.
2018. № 4.
P. 1-9.
DOI: 10.25136/2409-7543.2018.4.26807 URL: https://en.nbpublish.com/library_read_article.php?id=26807
Abstract:
The subject of the research is the assessment of the fire hazard risk of automobile gas stations for the purpose of establishing a risk-oriented approach to performing the federal state fire supervision. The risk-oriented approach implies the method of supervision that defines the frequency of audits based on referring a facility to a certain risk category. The results of analysing the risk-oriented approach to performing federal state fire supervision of automobile gas stations demonstrate that criteria that are used to assess the collective fire hazard risk do not include the probability and severity of harm that can be caused to people during fire. The authors offer their own mathematical model for assessing the collective fire hazard risk that takes into account the probability and severity of potential negative consequences of fire at an automobile gas station. Results of the experimental approbation of the aforesaid mathematical model have demonstrated that the model answers the requirements of the applicable legislation of the Russian Federation about the need to take into account the probability and severity of potential negative consequences of fire for people and allows to clarify the frequency of audits. The model can apply to other immovable hazard locations of a similar class of functional fire hazard.
Keywords:
fire hazard, experimental approbation, mathematical model, collective fire risk, risk category, state fire supervision, automobile gas stations, risk-oriented approach, fire hazard assessment, potential consequences of a fire
Reference:
Pashayev A.M., Nabiyev R.N., Nagiyev N.T., Velieva Q.D., Rustamov R.R..
Particularities of Designing Automated Distance Security Unit
// Security Issues.
2018. № 1.
P. 32-51.
DOI: 10.25136/2409-7543.2018.1.24602 URL: https://en.nbpublish.com/library_read_article.php?id=24602
Abstract:
The subject of the research is the modern security units that protect from terrorism and unlawful interference. The authors of the article examine modern security systems that are used to protect facilities against terrorism and unlawful interference. Studying perspectives for developing domestic and foreign means of security systems, the authors state that full safety and security of life supporting strategic facilities is possible only by combining several systems, i.e. video surveillance, access control, and security and fire alarm in natural sequence based on a single software and hardware system. Such intergrated security systems allow to provide security of major, minor and highly dangerous strategic facilities and life supporting facilities with a quality satisfying all modern requirements. The authors also provide a comparative analysis of the main technical characteristics of current security systems that protect especially important facilities as well as description of requirements for designing integrated security systems taking into account modern requirements. As a result, the authors of the article define technical requirements for creating improved automated remotely operated integrated security systems taking into account the requirements for operational efficiency, reliability and ergonomics of protection of strategically important facilities. Remote control feature is one of the main advantanges of the aforesaid system. The remote control is enabled through a digital network. This is what allows the aforesaid system to create monitoring connected points located in different parts of a facility at a long distance from one another.
Keywords:
system, video surveillance, security, protection, integration, perimeter, facility, strategic, capacity, sensors
Reference:
Kobets P.N..
Topical issues of complex security provision and terrorism prevention on air transport: problems and solutions
// Security Issues.
2017. № 3.
P. 1-16.
DOI: 10.25136/2409-7543.2017.3.22715 URL: https://en.nbpublish.com/library_read_article.php?id=22715
Abstract:
The urgency of the topic is undoubtful due to the fast growth of terrorist activity in Russia and abroad in the recent years tending to become a global threat. The research subject is the bulk of scientific publications, normative acts and judicial practice reflecting the characteristics of terrorist crime on air transport and the measures of its prevention. The author attempts at characterizing the set of theoretical and practical problems connected with anti-terrorist measures implementation and improvement on air transport. The author uses the set of general scientific research methods including comparison, analysis, synthesis, along with the formal-logical, comparative-legal and other specific methods including historical and statistical. The main part of the research is devoted to the criminological characteristic of security provision in airports and the use of technical equipment. The author characterizes the public danger of terrorist crimes, reveals the legal framework of this phenomenon, studies the existing aviation security systems, and defines the range of problems of their use. The author concludes that aviation security doesn’t exist independently, it is fulfilled by means of particular measures. While most scholars pay special attention to the problem of passengers control, the author believes that any airport staff member has an opportunity to commit terrorist attack. The author concludes that at the present time, though with significant difficulties, the scientific ideas about terrorism prevention on air transport are being realized in law enforcement practice by means of control strengthening and the development of organizational anti-terrorist measures. The author analyzes airport security systems, detects their weak points and offers the ways to solve the problems using technical means. Practical importance of the study consists in the fact that the proposed recommendations can be used in information and analytical materials, in system organization and management work aimed at combating terrorism on air transport.
Keywords:
aircraft, transport security, terrorist act, unlawful interference, aviation security, high risk facilities, terrorist threat, air terrorism, combating air terrorism, security provision
Reference:
Mustafaev A.G..
Neural network system of cyber-attacks detection on the basis of traffic analysis
// Security Issues.
2016. № 2.
P. 1-7.
DOI: 10.7256/2409-7543.2016.2.18834 URL: https://en.nbpublish.com/library_read_article.php?id=18834
Abstract:
The author considers the methods of network attacks on a computer system detecting and reveals their advantages and drawbacks. The development of new methods and means of protection of computing systems from network attacks is urgent. The author considers the possibility of using artificial neural networks for traffic analysis. The author offers the neural network model of the incoming traffic filtration. The research is aimed at the creation of an adaptive neural network system serving as a cyber-attacks detection complex helping to take the peculiarities of the network traffic into consideration. To design the artificial neural network the author applies the Neural Network Toolbox pack from MATLAB 8.6 (R2015b). The author develops and offers the method of analysis of incoming traffic on the base of a three-layered neural network. The results of its teaching and testing demonstrate the possibility of its successful application for network cyber-attacks detection. The best results can be acquired in computing systems using the limited software suite allowing forming the traits of normal behavior for attacks detection more effectively.
Keywords:
computer network, network traffic, intrusion detection, error back propagation, multilayer perceptron, artificial neural network, classification, attacks detection, supervised learning, anomaly detection
Reference:
Kul'ba V.V., Shul'ts V.L., Shelkov A.B., Chernov I.V..
Scenario Analysis in Management of Information Support of the Processes of Prevention and Conflict Management in the Arctic Regions
// Security Issues.
2013. № 1.
P. 62-152.
DOI: 10.7256/2306-0417.2013.1.301 URL: https://en.nbpublish.com/library_read_article.php?id=301
Abstract:
The article is devoted to a range of problems related to management of information support of Russian state policy in Arctic Regions under the conditions of active confrontation of rivals. The author analyzes prerequisites, forms and nature of international conflicts and provides the results of scenario analysis of efficiency of management of information support of the processes of prevention and conflict management.
Keywords:
Security, international conflict, information threat, information management, information suppport, information campaign, information influence, scenario analysis, simulation study, performance efficiency