Reference:
Krupnov Y.A., Sil'vestrov S.N., Starovoitov V.G., Lapenkova N.V..
Competitive approach to assessing the national security of the Russian Federation
// National Security.
2023. № 5.
P. 13-35.
DOI: 10.7256/2454-0668.2023.5.68816 EDN: AECUMX URL: https://en.nbpublish.com/library_read_article.php?id=68816
Read the article
First Peer Review:
Second Peer Review:
Third Peer Review:
|
EDN: AECUMX
|
Abstract:
The object of the study is the procedure for assessing the state of national security of the Russian Federation, which is being considered for its improvement based on the implementation of a competitive approach when conducting assessments. The authors review the current procedure for assessing national security and justify the need for its improvement. A comparative analysis of domestic and international experience in the formation of criteria, the hierarchical structure of indicators and the prioritization of threats is carried out. The necessity of forming a hierarchical structure, universalization and integration of indicators as part of the implementation of a competitive approach in assessing the state of national security is substantiated. Particular attention is paid to studying the possibility of using uniform international criteria and a system of indicators in domestic practice. Based on the results of the study, the following conclusions are presented. The state of security is not an absolute value, but is characterized by relative indicators obtained from the results of a comparative assessment of the indicators of competing countries. Security monitoring and assessment should be carried out on a cross-country rating basis, comparing different countries, including countries whose activities are the source of the main challenges and threats. The novelty lies in the substantiation of the use of a competitive approach and rating methodology, allowing governing bodies to assess the state of security taking into account domestic development dynamics and a comparative analysis of the indicators of countries that can influence the state of security in Russia. Author also presented the associative series of national interests and national security indicators of the USA and Russia. In contrast to similar studies, an original approach to the formation of a set of indicators of the state of national security is proposed. Building a hierarchical structure of indicators provides an opportunity to focus on the most important international complex and integral indicators, and increase the efficiency and reliability of assessments. The main directions for improving assessment based on the implementation of structural-hierarchical and competitive approaches have been identified.
Keywords:
international comprehensive indicators, national security criteria, national interests, security assessment, comparative analysis method, national security monitoring, competitive approach, hierarchical structure of indicators, National Security Strategy, national security
Reference:
Shamekhina E.V..
Digital transformation of anti-corruption: a retrospective and development prospects
// National Security.
2023. № 4.
P. 52-60.
DOI: 10.7256/2454-0668.2023.4.44043 EDN: THLHLL URL: https://en.nbpublish.com/library_read_article.php?id=44043
Abstract:
The subject of the study is policy and legal documents that are the basis for determining strategic goals and priorities of socio-economic development and ensuring national security of the Russian Federation in the field of combating corruption. The paper considers the development of the processes of digital transformation of public and municipal administration in the aspect of anti-corruption. The anti-corruption potential of integrating end-to-end technologies into traditional models of interaction between society and the state is investigated, and the prospects for countering corruption manifestations through digitalization of public and municipal governance processes are assessed. The importance of the digital transformation of public administration for ensuring openness and transparency of the activities of authorities is substantiated. Particular attention is paid to the absence of a universally recognized definition of digital transformation both in legislation and in the scientific community due to the novelty and "blurring" of the boundaries of this phenomenon. The methodological basis of the study was made up of general scientific and special methods of cognition, the use of which is determined by the specifics of the topic under study (formal legal, historical legal and comparative legal methods). The conducted research made it possible to consider a retrospective of the process of digital transformation of state and municipal administration in the aspect of state anti-corruption policy, as well as to identify promising areas for further development and implementation of digital technologies in anti-corruption activities at the federal level.
Keywords:
transformation of anti-corruption, transparency, anti-corruption, digital technologies, digital transformation, digitalization, openness, corruption, public administration, digital government
Reference:
Sukharev M..
Ideomaterial Polysystems and Politics
// National Security.
2022. № 6.
P. 1-22.
DOI: 10.7256/2454-0668.2022.6.38969 EDN: EXPAJJ URL: https://en.nbpublish.com/library_read_article.php?id=38969
Abstract:
The subject of the study is the interaction of the ideal and material components of political, cultural and socio-economic processes influencing them in large socio-economic systems such as religions, sciences, ethnic groups, regions and states. The concept of social ideo-material polysystems (SMPS) is proposed. IMPS are holistic systems that include social, cultural and economic components that make up a complex society. A feature of such systems is that some of the elements of these systems are material, and some are ideal. A polysystem is a supersystem consisting of fuzzy irregularly interacting ideo-material systems (IMS). It is substantiated that IMPS, consisting of people, artifacts and biological organisms, form integrity due to the system of ideas that unites them. It is the systems of ideas that give meaning to social IMPS, uniting communities, determining their behavior and direction of development. Approaches to the quantitative study of ideal subsystems of IMSI are proposed. Methods: use of systemic, holistic, evolutionary and informational approaches. The highest type of IMSI are civilizations, the most complex known systems in the Universe. A feature of such systems is that some of the elements of these systems are material, and some are ideal. IMS, consisting of people, artifacts and, in some cases, animals and plants, form integrity due to the system of ideas that unites them. These ideal systems manage social IMS, unite communities, determine their behavior and direction of development. IMS are very diverse: they can be scientific communities in which science brings together scientists, scientific instruments, theory, texts, social institutions, buildings; these can be religions in which the scripture unites priests, parishioners, temples, sacred texts and attributes. The complex of ideas on which these systems are based is of a holistic character. Conclusions: The proposed concept of ideo-material polysystems can be used to deepen the study of political systems.
Keywords:
culture, institutions, evolution, nation, ideal, polysystem, ideo-material system, sociology of knowledge, community, paradigm
Reference:
Shmygin V.A., Shultz V.L..
Social Technologies for Broadcasting the Image of the State
// National Security.
2022. № 6.
P. 71-82.
DOI: 10.7256/2454-0668.2022.6.39273 EDN: NYZIXD URL: https://en.nbpublish.com/library_read_article.php?id=39273
Abstract:
The article is devoted to the relevant social technologies in the process of constructing and broadcasting the image of the country. The theoretical basis of the concept of social technologies is described, the essence of which is revealed through social knowledge. The role of a researcher of social technologies who has social knowledge and takes the position of a social consultant in matters of designing and broadcasting the image of the state is considered. The authors consider the technologies of formation and translation of the stock of knowledge about the state on the example of socio-political practice – real cases. The authors analyze the main technological approaches affecting the image of the state: correction of historical memory, "Soft power". The main conclusions of this article are the provisions that the use of the "Soft Power" technological approach in the context of broadcasting the image of the state is relevant at the moment, since it allows to broadcast ideas related to the worldview characteristic of the Russian public consciousness. The universal nature of "soft power" allows to spread ideas – social phenomena that affect the construction of the image. At the same time, the issue of correcting historical memory remains important, which is also a relevant social technology. The historical process in the minds of individuals can acquire additional interpretations, which leads to changes in individuals' perceptions of the historical process and the transformation of attitudes to the history of the state and, accordingly, its image.
Keywords:
correction of historical knowledge, social construction, historical knowledge, image broadcast, knowledge, soft power, historical memory, the image of the state, social technologies, Image
Reference:
Vakarev A.A., Vinogradov V.V..
Ensuring environmental safety through the development of waste recycling in modern Russia: development, difficulties, solutions at the regional level
// National Security.
2022. № 2.
P. 10-37.
DOI: 10.7256/2454-0668.2022.2.37725 URL: https://en.nbpublish.com/library_read_article.php?id=37725
Abstract:
The subject of the study is the system of relations arising in ensuring the environmental safety of modern Russia in the field of waste processing of solid industrial and household waste. The object of the study is the regional economy of the Volgograd region, where there are significant opportunities for the creation and development of incineration facilities. The authors consider in detail such aspects of the topic as: analysis of the development of the incineration business in the global economy; justification of the potential of the incineration business in modern Russia; analysis of the practice of creating waste disposal facilities in domestic conditions; justification of the construction of incineration plants in the Volgograd region. Special attention is paid to the economic justification of the efficiency of incineration plants in the Volgograd region. The main conclusions of the study are the following: waste disposal is currently a very promising area of business development, a powerful aspect of the growth of the regional economy of some subjects of the Russian Federation; international experience shows that a very powerful economic potential is already involved in this area, especially in the most developed countries of the global economy; the modern market offers a wide range of technical and managerialcommercial funds for the development of waste disposal enterprises; in many regions of Russia there is high business activity for the development of waste disposal enterprises, but this activity encounters environmental restrictions and inertia on the part of environmental organizations; creating conditions for the development of waste recycling facilities in the Volgograd region will have a high economic effect and will have a positive impact on the overall socio-economiceconomic development of the region. A special contribution of the authors to the study of the topic is its actualization and attraction of rich world experience. The novelty of the research lies in the adaptation of the research topic to the practical conditions of the Volgograd region and other regions of Russia.
Keywords:
production, investment, branch, industry, incineration, incineration plant, wastes, effectiveness, region, ecology
Reference:
Basaeva E.K., Kamenetsky E.S., Khosayeva Z.K., Baranov O.A..
Modeling of terrorist activity in RSO-A
// National Security.
2022. № 1.
P. 12-19.
DOI: 10.7256/2454-0668.2022.1.36574 URL: https://en.nbpublish.com/library_read_article.php?id=36574
Abstract:
The subject of the study is the modeling and forecasting of terrorist and extremist activity of RSO-A. This task is urgent, since terrorist activity around the world has remained very high in recent years and even a rough forecast allows us to take preventive measures in case of a possible aggravation of the situation. Usually, an analysis of the mechanisms of radicalization and the formation of extremist groups is used for forecasting. At the same time, the methods of game theory and machine learning and models of the spread of epidemic diseases are used. In all cases, the verification of models requires a large amount of initial information, which, as a rule, is missing. In addition, these models are applicable only for regions with a sufficiently high level of extremist and terrorist activity.The paper proposes a method for predicting terrorist and extremist activity for regions where its level is low. The method is based on the assumption that people who are not satisfied with their social status and do not see prospects for its improvement are involved in various radical groups and/or are inclined to extremism and terrorism. Since it is much easier to get into a radical group whose activities are not prohibited by law, the increase in the intensity of involvement in them outstrips the growth of extremist and terrorist activity and is its harbinger. The method is tested on the example of the Republic of North Ossetia-Alania, in which adherents of radical Islam are a typical radical group. It is shown that for RSO-A, terrorist activity in the region can be predicted by the intensity of involvement in radical groups with a lag of two years. The proposed model allows us to satisfactorily assess the change in terrorist activity in the Republic of North Ossetia-Alania for the period 2015-2019.
Keywords:
mathematical model, terrorist activity, illegal arms trafficking, extremism, radical islam, the involvement coefficient, harbinger, time lag, education abroad, forecast
Reference:
Bondar D.A., Korneiko O.V..
Innovations of traffic safety control of the Raxel Telematics company
// National Security.
2018. № 2.
P. 10-18.
DOI: 10.7256/2454-0668.2018.2.26136 URL: https://en.nbpublish.com/library_read_article.php?id=26136
Abstract:
The subject of this research is the trends, factors and prospects of ensuring traffic safety. The goal of this work is to assess the innovative product of the Raxel Telematics. The place of the traffic safety has been identified within global safety. The authors examine the work on ensuring traffic safety in theory, as well as within the Swedish zero mortality on the roads program. Assessment was made on the Russian programs on reduction of mortality and injury on the roads. Analysis was conducted on the main indexes of accidents in Russia for 2015-2017. The scientific novelty of this research consists in determining the key work on increasing traffic safety, as well as the innovative product offered by the Raxel Telematics. The current trend in Russia shows a decrease in accidents, traffic injuries and mortality. The main reason for this decrease is certainly the innovations in the area of traffic safety. The Raxel Telematics developed a system that allows insurance companies calculate personal specificity of drivers.
Keywords:
zero mortality, global security, insurance, accident rates, risks, national security, road traffic, innovative product, innovation, traffic accidents
Reference:
Tsezar D.A..
The methodology of substantiation of the required effort and funding for prevention and control of forceful action in the maritime space
// National Security.
2017. № 6.
P. 34-41.
DOI: 10.7256/2454-0668.2017.6.24554 URL: https://en.nbpublish.com/library_read_article.php?id=24554
Abstract:
The object of this research is the activity of law enforcement structures on the struggle against forceful action in the maritime space; while the subject is the methodology of substantiation of the required effort and funding for prevention and control of forceful action. The author applies the probabilistic conflict model based on the principles of combat (hard management, combination if fire and maneuver, control over the situation using observation and reconnaissance). For evaluation of parameters of the model and its verification, the author has examined the descriptions of the actions committed by pirates and terrorists in successful or unsuccessful attempts of causing damage to people and tangibles in the maritime space. The article carries out a comparative analysis of capabilities of the law enforcement structures and pirates (terrorists). A number of examples demonstrates the possible application of mathematical methods of justifying decisions to implement one or another type of means of fighting against unlawful actions in the maritime space. The prevention of forceful actions is based on achieving by the military and police watercrafts of the high chance of neutralization of the pirates and terrorists. The application of the presented methodology by the law enforcement structures provides quantitative grounds for increasing the efficiency of their actions.
Keywords:
Maritime space, Military strategy, Combat simulation model, Methodology, Control of forceful action, National security, Watercraft, Maritime piracy, Maritime terrorism, Forceful action
Reference:
Garbuk S.V..
The prospects of implementation of intellectual technologies for the purpose of solving security issues
// National Security.
2016. № 4.
P. 451-457.
DOI: 10.7256/2454-0668.2016.4.68008 URL: https://en.nbpublish.com/library_read_article.php?id=68008
Abstract:
The object of this research is the technical means of ensuring security. The subject of this research is the questions of increasing the efficiency of technical means of ensuring security based on application of the so-called “intellectual technologies of security”, which allow processing information received from the technical means of ensuring security, but with quality equal to a human operator. The author suggests classification of the tasks of intellectual processing of information, as well as conducts an analysis of the scientific-technical and organizational difficulties that accompany the solution of these tasks. The article examines the questions of comparison and evaluation of the quality of intellectual technologies alongside the main issues of normative regulation, emerging during the practical implementation of such technologies. The scientific novelty consists in the proposed classification of intellectual tasks peculiar for the security systems, as well as in formalization of the scientific-technical tasks associated with the development of intellectual technologies of security. The analysis of the specificities of development of intellectual technologies allowed making conclusion on the purposefulness of establishment of a special center of competency which would coordinate the work in this area.
Keywords:
Efficiency of security systems, Intellectual technologies, Intellectual tasks, Systems of information processing, Internet of things, Identification of images, Normative regulation of security, Safety city, Technical means of security, Intellectual systems
Reference:
Los' A.B., Tsaregorodtsev A.V., Sorokin A.V..
Integrated approach to the construction of secure information and telecommunication systems based on hybrid cloud environment
// National Security.
2016. № 3.
P. 332-337.
DOI: 10.7256/2454-0668.2016.3.67885 URL: https://en.nbpublish.com/library_read_article.php?id=67885
Abstract:
This article examines the issues of ensuring information security in the sphere of cloud technologies. Information and telecommunication systems, operating on the basis of cloud computing technology, over the recent years have become more widespread, with constantly growing needs in processing of the large volumes of data.The key point in the use of cloud computing is the issue of ensuring reliable protection of data during transmission, processing and storage. The article identifies the main problems of cloud computing from the point of view of information security and examines solutions when building complex systems of information protection in cloud architecture. In order too solve this issue, this work applies the method of theoretical analysis of the source data in various areas of the matter under consideration, the method of summarizing the results and formulating appropriate solutions. Scientific novelty of the work consists in a theoretical comprehensive analysis of this problem, including examination of threat to information in the cloud field, existing solutions in the specified direction and development on the basis of the results of the procedure for the comprehensive protection of cloud computing. Proposed applications of cloud computing for processing and storage of information of various categories, including critical assets. For working with such data, it is proposed to create a hybrid cloud environment, incorporating traditional cloud architecture elements of private clouds.
Keywords:
information risks, security requirements, information assets, information security management, information security threats, critical archives, private cloud, hybrid cloud, cloud computing, information and telecommunication systems
Reference:
Mitrofanov R.A..
Fertilization of earth using organic fertilizers as a factor of environmental policy and food safety
// National Security.
2016. № 2.
P. 176-182.
DOI: 10.7256/2454-0668.2016.2.67744 URL: https://en.nbpublish.com/library_read_article.php?id=67744
Abstract:
The analysis of the modern state and possible scenarios of development of agricultural production confirms the need for realization of measures pertaining to stabilization and restoration of farm lands, which increase the fertility of earth of agricultural designation and improve the general environmental situation. Such tasks as biologization and environmentalization of farming can be solved by means of using the technologies of manufacturing the active organic and organic mineral peat-based fertilizers, which are also called humic products. These technologies can significantly cut the cost for producing the biofertilizers. The article conducts a comparative analysis of the influence of the mineral and organic fertilizers on the agricultural productivity, as well as presents a brief description of the unique technology of manufacturing of the effective biofertilizer. Considering an existing opinion that the use of organic fertilizers cannot to the full extent compensate the lack of mineral nutrition especially in the long-term prospects, we can agree that the application of nitrogen fertilizers in small amounts does not produce a negative effect as other “major chemicals”. However, taking into account the current situation, there is not alternative for substituting the significant portion of mineral fertilizers with organic and organic mineral fertilizers.
Keywords:
electrohydraulic technology, no-till technology, organic fertilizers, the negative impact of mineral fertilizers, peat, lack of humus, improve soil fertility, national security, contamination of soils with heavy metal, greening agriculture
Reference:
Shumov V.V..
Basic model of security and its expansion
// National Security.
2016. № 1.
P. 12-29.
DOI: 10.7256/2454-0668.2016.1.67528 URL: https://en.nbpublish.com/library_read_article.php?id=67528
Abstract:
This work explores the factors that significantly affect the security of the constituents of the Russian Federation. For considering in the mathematical model the following factors are being determined: climate factor, socioeconomic factors, level of transnational wellness, and level of integration of the regional national groups into the unified social space of the country. Security is defined through the dichotomy of the values of development and values of preservation. The parameters of the model are being evaluated considering the data on the migration of the population. The author presents calculations on the assessment of the security level in the Russian regions during the peace time and war time (not taking into account the military factors). By using the systemic and historical approaches, along with the methods of mathematical modelling, the author formulates the criterion of regional security, which reflects the values of development (socioeconomic factors) and values of preservation (complementarity of ethnoses, integration of national and regional groups into the country’s social space). The Pareto distribution is used in building of this model; the assessment of parameters is carried out via using the method of least squares. The basic model of regional security can be applied in modelling (expansion of a model): sociopolitical and socioeconomic security, demographical and environmental security, safety in circumstances of emergencies, border security, etc.
Keywords:
regional security, security criterion, mathematical model, expansion model, scenario approach, complementarity of ethnic groups, Pareto distribution, estimation of model parameters, security criterion, verification of the model
Reference:
Shumov V.V..
Model of national security and its supplements
// National Security.
2015. № 6.
P. 788-801.
DOI: 10.7256/2454-0668.2015.6.67234 URL: https://en.nbpublish.com/library_read_article.php?id=67234
Abstract:
The subject of this research is the analysis and determination of the key, maximally aggregated and measurable factors that define the level of security of a state (or a coalition of states). The factors affecting the state of national security (population, territory, technologies, and complementarity of the ethnoses) are being studied for the purpose of building a mathematical model of national security. In the interests of verification of the model, the author uses statistical and analytical data that characterizes the security of the nations of the European and Eurasian unions: size of the population, size of the territories, index of innovations, etc. In order to describe the system of international relations, the work employs the typology og the international systems by Morton Kaplan. In structuring the model, the author utilizes production function, power function, and distribution of Pareto. Using this model, the assessment of the security of the European and Eurasian unions is being carried out. The results of the assessment demonstrate that inclusion of Ukraine into the European Union will lower the EU’s level of security. The technologies are the hampering factor of the expansion of the European Union.
Keywords:
Security, National security, Historical approach, Systemic approach, Mathematical model, Safety criterion, EU safety, EAEU security, Values, Sovereignty
Reference:
Kuz'min E.A., Dubrovskiy V.Zh., Semenovykh S.M..
The questions of methodology in risk management of theory development programs from the perspective of the concept of life cycle
// National Security.
2015. № 5.
P. 631-647.
DOI: 10.7256/2454-0668.2015.5.66976 URL: https://en.nbpublish.com/library_read_article.php?id=66976
Abstract:
In this research the authors attempt to scientifically substantiate the links and interconditionality of risks from the stages of life cycle of projects and programs of theory development, which are predominantly realized in the form of public-private partnership (PPP). This work makes an emphasis on determining the succession of the stages of life cycle with references to quantitative methods of identification. In generalization of their outlooks upon the mentioned problem, the authors propose an original solution in theoretical search for regularities in repetition of the periods of financial growth and decline. The article substantiates an original approach towards structuring a model of life cycle of projects and programs of theoretical development, and determines the general principles of its structuring. The article presents the conclusions on determinateness of density and richness of risks, as well as their contingency upon specificity of a particular stage of life cycle. Solution of the issue of observability of stages allowed the authors to substantiate the presence of ideal and actual trajectory of project development that is in accord with the life cycle.
Keywords:
Stages of life cycle, Cyclicity, Development projects, Stability, Development trajectory, Risk management, Uncertainty, Public-private partnership, Structural gap, Cointegration management
Reference:
Petukhov A.Yu..
Influence of psychological operations upon the political process in Russia under the conditions of information warfare
// National Security.
2015. № 5.
P. 648-655.
DOI: 10.7256/2454-0668.2015.5.66977 URL: https://en.nbpublish.com/library_read_article.php?id=66977
Abstract:
This article reviews the aspects and certain methods of modern psychological operations in information confrontation, as well as the principle s and mechanisms of the work of mass media as an instrument of these operations. The relevance of this topic is justified by the exponential growth of modern communication networks and the increase of dependence of a separate individual from such networks, which allows conducting global information operations with the collective conscious of entire countries. All of this leads to a massive information warfare actively using the newest technologies of psychological effects. As a conclusion, the author defines a number of major mechanisms and methods of the modern mass media, characteristic to the regularities of the influence of psychological operations, and points out few of the more susceptible areas of modern collective consciousness in Russia with consideration of the external factor. The author also notes the lack of specific idealistic base within Russia for counteracting foreign information influence.
Keywords:
information warfare, psychological safety, information communications, cognitive systems, mass media, collective conscience manipulations, psychological vulnerability, cognitive map, Russia, public opinion
Reference:
Lyapustin A.E..
Development and examination of the models and methods of comprehensive protection of heterogeneous information platforms
// National Security.
2015. № 4.
P. 508-514.
DOI: 10.7256/2454-0668.2015.4.66731 URL: https://en.nbpublish.com/library_read_article.php?id=66731
Abstract:
This work presents the analysis of the modern approaches towards development of comprehensive systems for protecting heterogeneous information platforms. Despite the advantages of the reviewed approaches, majority of them are aimed at solving a particular task, rather than a complex solution to the problem of protection of information in the environment of sophisticated heterogeneous systems. This article demonstrates the architecture of a heterogeneous information system acting as an object of protection. The result of the conducted research lies in the formation of a concept of creation of an Information Security System, the architecture of which is built upon a multi-agent approach and is oriented towards heterogeneous information systems. The author proposes a model for a comprehensive protection of the heterogeneous information platforms and examines the methodology for intelligent threat detection. The results of this research suggest increasing the area of use of the multi-agent approach and its integration into the intelligent analysis of development and functionality of the information systems.
Keywords:
intelligent systemof information protection, threat detection, information security, heterogeneous information platforms, information safety, detection agents, means of information security, information system protection, centralized attacks, information processing
Reference:
Shagieva A.Kh..
Mathematical modeling in crisis management
// National Security.
2015. № 3.
P. 349-358.
DOI: 10.7256/2454-0668.2015.3.66585 URL: https://en.nbpublish.com/library_read_article.php?id=66585
Abstract:
The subject of this research is the system of mathematical modeling of the processes under the conditions of crisis management. Analysis of modern approaches towards solution of the problem of crisis management within enterprises demonstrates that they are based on financial analysis and bankruptcy forecasting using comparison of certain coefficients with the up-to-date values and state the fact of a presence of a final crisis state – bankruptcy. Mathematical modeling provides for a high level of justification of decisions, reduction of time needed to develop solutions, and the ability to deploy countermeasures in order to prevent bankruptcy. The author presents a mathematical model for forecasting crisis within a company based on its financial results. The devised complex of models will allow forecasting the start and development of a crises within a business based on an optimal assortment, structure and volume of products. The use of mathematical modeling and forecasting within the system of crisis management would allow managers and company executives to concretize the methods for preventing, neutralizing, and overcoming the crises.
Keywords:
Management, Crisis, Modeling, Forecasting, Bankruptcy, Analysis, Business, Assortment, Product line, Financial results
Reference:
Khmaladze D.Z..
Special aspects of electronic money within the systems of open and closed circulation
// National Security.
2015. № 3.
P. 359-363.
DOI: 10.7256/2454-0668.2015.3.66586 URL: https://en.nbpublish.com/library_read_article.php?id=66586
Abstract:
The subject of this research is the legal regulation of the transactions made using electronic currency and the special aspects of electronic transactions within the systems of open and closed circulation. The author analyzes minimal requirements in the area of electronic transaction systems based on the flow of electronic money, which can vary depending on the type of electronic money, and are based on a level of openness of such systems. Depending on the level of openness the author subdivides them into closed or open circulation systems. Based on the conducted analysis, the author highlights the characteristic aspects of electronic money that have originated within a closed circulation system, as well as those that originated within the open circulation system. The author comes to a conclusion that openly circulation system of electronic money is characterized by a high level of flexibility and potentially large user base as compared to the closed circulating systems; it is more universal.
Keywords:
Electronic money, E-commerce, Electronic payment system, Online payment system, Statistical reporting, Open circulation system, Closed circulation system, Information society, Public relations, Modern payment methods
Reference:
Pavlov V.P..
Bioelectronic systems for early diagnostics in ensuring the industrial safety in sea and fresh waters
// National Security.
2015. № 2.
P. 197-201.
DOI: 10.7256/2454-0668.2015.2.66400 URL: https://en.nbpublish.com/library_read_article.php?id=66400
Abstract:
This research presents the materials on bioelectronic system of early diagnostics of aquatories developed by the Russian scientists. The article offers a complex approach towards the real-time monitoring of water resources that allows increasing the level of safety within large industrial objects, the functioning of which is connected to the possibility of serious environmental violations in the event of emergency situations. Such bioelectronic systems are based on the diagnostics of the condition of the invertebrates, dwelling within a specific ecosystem that contains a possibility of threats of emergency situations and acts of terrorism. The invertebrates living at the bottom of these waters are used as biosensors. Tiny fiber optic sensors of cardiac activity are attached to them and allow real-time remote continuous monitoring of their condition. Detection of the peculiarities of the behavior of the animals within the changing environment became the foundation of the development of the fiber optic method of monitoring the cardiac activity of the benthic invertebrates with a hard shell: Crustacea (Decapoda) and Mollusca.
Keywords:
Bioelectronic systems, early diagnostics of ecosystems, marine safety, bio indicator, biological monitoring, animal testing, variable pulsometry, remote monitoring, selection of cardiac rhysms, distribution of cardiac intervals
Reference:
Petukhov A.Y., Krasnitsiy N.V..
Assessment of the political stability in Russia:
problem of an effective measurement
// National Security.
2014. № 6.
P. 881-893.
DOI: 10.7256/2454-0668.2014.6.65736 URL: https://en.nbpublish.com/library_read_article.php?id=65736
Abstract:
The authors make an attempt to analyze the results of a research on the political stability
in Russia over the 8 year period using one of the characteristic indexing methods of the Fund for
Peace USA and an influential American magazine Foreign Policy — the “Fragile States Index”. As an
alternative to such methods the authors offer their own mathematical model of calculating the level of
political stability based on the authors’ socioenergetic approach. It is concluded that the politicization
of the assessment makes the ratings become just another instrument of a political pressure. From the
perspective of the political analysis, the authors’ model gives a more precise evaluation of the existing
reality and is also capable of forecasting the progression of the situation, which makes it more effective
in a number of particular cases. Therefore, the prognostic nonlinear dynamic models (although
they use static data) are more independent and politically neutral instruments in the assessment of the
parameters of power and country.
Keywords:
socioenergetic approach, Fund for Peace, political stability, nonlinear dynamics, Fragile States Index, rating, assessment, indicator, modeling.
Reference:
Shultz V.L., Kulba V.V., Shelkov A.B., Chernov I.V..
Diagnostics and scenario analysis of the external threats to regional security
// National Security.
2014. № 5.
P. 626-664.
DOI: 10.7256/2454-0668.2014.5.65574 URL: https://en.nbpublish.com/library_read_article.php?id=65574
Abstract:
This work is dedicated to the methodological and applied issues of improving the processes
of managing regional security under the conditions of aggravated antagonism between nations of the
West and Russia, as well as the instability of the world economy. It presents a diagnostic methodology,
structural analysis and evaluation of the main threats to national security. We will examine the
issues of countermeasures towards the destructive information influences, built upon disinformation
and manipulation technologies. This article demonstrates the results of an analysis of the key aspects
of the processes of regional security management. It goes over the mechanisms of using scenario
analysis in managing the social and economic development of a region and providing protection to
social stability from the external and internal threats. We look at the results of scenario research of
the developed multigraph models of managing regional security. In order to solve the entirety of the
problems at hand, the article offers a methodological approach, which is based on the modeling and
advanced scenario analysis of the processes of a situation progression within the regional social and economic systems, as well as in the external environment. Its main advantage is the ability to: assess
the level of vulnerability of social and economic systems influenced by the external and internal
threats to the regional security; conduct a complex analysis of a particular region’s situation within
any given timeframe; form a short-term and long-term prognoses of its development; evaluate the
effectiveness and concurrence of the multiple, spread across time and space strategic and tactical
management solutions for achieving the set goals under the conditions of ambiguity. The article
shows that the effectiveness of the countermeasures for the emerging threats to regional security
from geopolitical enemies of the Russian Federation, as well as internal sources of vulnerability that
they have created and financed, depends on creation and widespread use of complex mechanisms that
would provide a coordinated solution to at least two basic sets of tasks: ensuring a stable social and
economic development of a region, and its protection from the external and internal informational
threats to the social stability.
Keywords:
regional security, social stability, diagnostics of threats, management, informational influence, scenario analysis, imitational modeling, symbol graphs, management decisions, threat countermeasures.
Reference:
Borobov, V.N..
Personnel management and motivation in a modern organization.
// National Security.
2014. № 4.
P. 493-504.
DOI: 10.7256/2454-0668.2014.4.65405 URL: https://en.nbpublish.com/library_read_article.php?id=65405
Abstract:
Labor activity within the market economy framework is a complicated system of personnel interaction in the
process of production, distribution and consumption of material values. These complicated relations are centered upon
the interests of the people, who are at the same time producers and consumers of the necessary goods and services within the market. The scientific publication reveals the nature of personnel management. The author evaluates the main goals
of personnel management and the problems of rational use of productive resources (first of all, human resources). The
author discusses the general model of personnel management in a modern organization and the process of personnel
motivation involving various stimuli for the workers. The author proposes the measures to be taken in order to make
personnel management in a modern organization more efficient, and make the products more competitive. Currently a
scientific solution to this problem in the Russian economy presupposes the presence of a substantiated mechanism for
the management of production resources, including a mechanism for managing the personnel of various categories in
the process of production and consumption of the material values based upon an economic use of resources. The main
goal of persons in charge of the work (masters, shop mechanics, power engineers) and workers and service personnel is
to organize security of works and control over compliance with the internal rules of enterprises and security guidelines
by the staff. Efficiency of personnel management in a modern organization, competitiveness of products and well-being
of the workers may only be achieved by compliance with the system of interrelated measures.
Keywords:
economics, economic resources, specialists, human resources, stimulation, motivation, process of work, rewards, management goals, qualified personnel.
Reference:
Tsaregorodtsev, A.V., Ermoshkin, G.N..
Basic principles for the formation of the
tree of objectives for information security
in the cloud computing.
// National Security.
2013. № 5.
P. 69-79.
DOI: 10.7256/2454-0668.2013.5.63358 URL: https://en.nbpublish.com/library_read_article.php?id=63358
Abstract:
Changing security contour and loss
of internal control over the critical assets of
organizations followed by the later migration
of these assets to the cloud spheres made the
problem of information cloud computing security
management in the corporate system a top priority
issue. All of the above requires the change in
the traditional approaches to the information
security guarantees and development of the novel
methodological apparatus, allowing for higher
efficiency of the IT resources and considerably
lowering their costs via diversification of
information streams in the organization and
their migration to the cloud architecture. Much
attention is paid to the topical information
security problems and their possible solutions based on formation of the trees of objectives for
the information security in the cloud computing
environment. The authors offer a novel concept
for the cloud computing environment security
based upon the tree of objectives, allowing to
take into account all of the critical processes in
the sphere of information security management,
and to take into consideration the terms of
common responsibility and common obligations
of the parties, the above-mentioned qualities
shall allow the organizations to make decisions
on the formation of information network based
on the criterion of minimal infrastructure costs,
while guaranteeing the necessary information
security level.
Keywords:
i n for mat ion secu r it y, cloud computing, cloud services, information security threats, tree of objectives, management methods, information security requirements, service provision model, counter-measures, business processes.
Reference:
Karpovich, O.G..
Problems and perspectives for the studies of
modern concepts, models of technologies for
the international conflict management.
// National Security.
2013. № 5.
P. 80-93.
DOI: 10.7256/2454-0668.2013.5.63359 URL: https://en.nbpublish.com/library_read_article.php?id=63359
Abstract:
The article presents the results of the
analysis of the key problems and perspectives
in the studies of the modern concepts, models,
and technologies for the international conflict
management. The author provides a classification
of scientific approaches towards the studies of
the role of technologies for the direct and indirect
information and psychological influence in the
sphere of international conflict management
both in the interests of their complete or partial
regulation, and in the interests of their political
escalation.
Keywords:
political science, national security, international conflict management, international relations, foreign policy, political conf licts, psychological technologies, psychological operations, information war, information policy.
Reference:
Tsaregorodtsev, A.V..
Forming the trees of objectives for the
identification of security requirements of
the cloud computing environments.
// National Security.
2013. № 5.
P. 51-68.
DOI: 10.7256/2454-0668.2013.5.63366 URL: https://en.nbpublish.com/library_read_article.php?id=63366
Abstract:
The need for the improvement and
higher efficiency of the cardinal principles of
information security management in the sphere
of cloud computing requires a multi-aspect
sphere of guarantees for the systemic quality.
Application of the formalized structural synthesis
methods and technologies for the systems of
information security management in the cloud
computing, providing for various levels of
requirements hierarchy, could allow for the more
efficient use of local technologies and automation
qualities, as well as systemic manifestations. The
empiric quality of tree models systemic structure
provides a good opportunity. Special attention
is paid to formation of the trees of objectives for
the identification of security requirements in the
cloud computing and formation of the basis for
the formalized synthesis of security platforms
in information and telecommunications systems,
functioning based upon the cloud computing
technologies in accordance with the established
systemic criteria and the system development
factor. Considering the lack of transparency in
such spheres as service level agreements, and
realistic supplier capabilities, existing in most
cloud computing services, the prerequisites are
formed for the formation of a novel method for
the formation of the hybrid sphere of information
security requirements for cloud computing.
Keywords:
information security, cloud computing, cloud services, information security threats, analysis of information risks, management methods, information security requirements, business assets, tree of objectives, hybrid environment.
Reference:
Bolkunov, O.N..
Quantitative dimension
of the international energy security
// National Security.
2013. № 4.
P. 536-548.
DOI: 10.7256/2454-0668.2013.4.63052 URL: https://en.nbpublish.com/library_read_article.php?id=63052
Abstract:
The article is devoted to the development of methodology for the quantitative dimension of the
international security of energy supply. It is noted that in order to accurately evaluate energy security
of the state, its energy system should be equally evaluated from the various perspectives (economic,
political, social, environmental, national security, international obligations and treaties), including
an entire complex of its components. Energy security evaluation should characterize the quality of the
national energy policy. The article contains analysis of the characteristic features which such an evaluation
should possess. The author singles out the key methods for the quantitative dimension of the energy
security of the state as well as their strong and weak points. Based upon the above-mentioned analysis
the method for the complex evaluation of international energy security (CEIES) was formed. Evaluation
includes 21 indicators of energy security in 4 interrelated dimensions: economic, technological, socialpolitical
and environmental. In addition to the description of the method the article includes comparative
analysis of the key quantitative methods for the energy security evaluation with the specific features of
CEIES being pointed out. For example, CEIES serves as an useful indicator for the general condition of
all of the spheres of energy security within the state. Based on it one can provide retrospective analysis
of implementation of measures aimed to guarantee energy security of the state, as well as predict the
efficiency of implementation of current and newly developed energy strategies. Additionally, such an evaluation allows to compare the levels of energy security in different sates and to modify the national
energy strategies based on the analysis of successful practices. Finally, based upon the data on energy
security in the neighboring states, one may ease the conditions for regional and international energy
cooperation.
Keywords:
security guarantees, energy strategy, national security, energy system, comparative political science, energy policy, quantitative studies, energy security, state administration, international politics.
Reference:
Belousova, A.V..
Modeling and evaluation of the innovative
development effects in the export sector of economy:
the Far East
// National Security.
2013. № 4.
P. 549-555.
DOI: 10.7256/2454-0668.2013.4.63053 URL: https://en.nbpublish.com/library_read_article.php?id=63053
Abstract:
The article contains scenario modeling and evaluation of economic effects from the events aimed
for innovative development of the economy of the Far Eastern Federal District and for neutralization of
export-transaction related threats to the economic security of the macro-region according with the state
programs. The author uses the following prerequisites for the evaluated scenarios: development of export
specialization of the district in the sphere of manufacturing activity; changes in the parameters for the
technical development of the export sector of the macro-region. Within the first scenario the author singles
out export of manufacturing products, which shall generate maximal growth of the gross regional product
for the district, as well as limitations for the comparable effects in case of development of other specialized
manufactures of the Far Eastern economics. Within the second scenario the author identifies the factors
for the innovative development of the export sector, lowering the risks of technological dependency of the
Far Eastern Federal District on the other states, which is generated by import of equipment and machinery.
Keywords:
export sector of economy, raw products export, innovative development, economic security, economic effect, export specialization, technical, manufacturing re-equipment, macro-region, Far Eastern Federal District
Reference:
Androschuk, V. V..
Concerning the Possibility to Use Experience
and Recommendations of the Foreign Auditors’
Unions for Fraud and Theft Management
in Russia
// National Security.
2013. № 3.
P. 418-425.
DOI: 10.7256/2454-0668.2013.3.62813 URL: https://en.nbpublish.com/library_read_article.php?id=62813
Abstract:
The article is devoted to the expansion
of fraud and theft in international economic community.
Corporate fraud is a term covering a whole
range of such serious violations as embezzlement,
bribery, forgery, blackmail and etc. For the purpose
of fraud management, a new profession of
an auditor for fraud and theft was created. This
profession includes a wide range of competences.
Official investigation of fraud cases has only one
purpose which is to clarify the facts. Starting the
investigation of fraud, an auditor first makes a hypothesis
about a person being guilty or not guilty
and then tries to gather enough evidence in order
to clarity what actually happened in the reality.
Investigation of fraud requires mutual efforts of
experts in different spheres. Recommendations on
frau management developed on the basis of experience
of auditors from many foreign countries are
analyzed, summarized and presented in a form of a
special guide. Several main provisions of this guide
are described in the present article.
Keywords:
fraud, theft, white collar crime, association, audit, auditor, financial security, corruption, entrepreneurial activity, forensic audit.
Reference:
Vlasyuk, G.V..
Feelings and emotions as the basis for the interaction
management t echnologies
// National Security.
2013. № 2.
P. 357-370.
DOI: 10.7256/2454-0668.2013.2.62621 URL: https://en.nbpublish.com/library_read_article.php?id=62621
Abstract:
Today a large amount of problems regarding
successful interactions constantly arises. The author analyzes
the bases of guarantees and support of interaction
(as paths of closeness), and analyzes the sensual specific
features of perception of situation, as well as the technologies,
which allow to regulate the perception of the
situation by the partner in an interaction from the standpoint
of the resource approach. It establishes an issue
on the need to understand the mechanisms of interaction
management, which is related with the emotional and
sensual sphere of living.
Keywords:
social studies, resources, feelings, emotions, paths of closeness, sensual connections, perception, distance, value.
Reference:
Chirkov, D.K., Sarkisyan, A.Zh..
High techology crime: tendencies and perspectives.
// National Security.
2013. № 1.
P. 20-26.
DOI: 10.7256/2454-0668.2013.1.62339 URL: https://en.nbpublish.com/library_read_article.php?id=62339
Abstract:
The article includes general criminalistic characteristics
of crimes in the sphere of telecommunications and computer
information, the authors provide for the dynamics
of development of such crimes for the period since 2009
to 2012 in comparison to the number of Internet users
for the same period. In the latest decade the Internet became
a virtual space, where people may express their
ideas, get involved in social activities, etc. Currently the
Internet networks play an important roles in our communications.
We transfer money via computers, cash
dispensers, and electronic payment system, we set the
routes, look for good restaurants, find out what movie
we should watch, and all of these actions depend on information
technolgies. Many Internet users are attacked
by cybercriminals. The above-mentioned problems are
discussed in this article. The article may be useful for
the officers of the law-enforcement bodies working with
high-technology crimes.
Keywords:
jurisprudence, high technologies, cybercrime, criminal law, Internet technologies, statistical data, telecommunications sphere, computer information, characteristics of crimes, Internet users.
Reference:
Tsaregorodtsev, A.V., Taraskin, M.M., Derbin E.A..
One of the approaches to the formalized description
of threats, vulnerabilities and risks in the
system of information protection at an enterprise.
// National Security.
2012. № 6.
P. 60-68.
DOI: 10.7256/2454-0668.2012.6.61996 URL: https://en.nbpublish.com/library_read_article.php?id=61996
Abstract:
The authors evaluate one of the approaches to
the evaluation of threats, vulnerabilities and
risks in the systems of information protection of
organizations, which allows to have all-inclusive analysis and to formulate the requirements for
the guarantees of security of information in an
organization. Use of such an approach shall allow
one to cut the costs of the excess security
measures, which often take place, when the evaluation
of risks is taken subjectively. It shall also
aid in planning and implementation of the protection
at all of the stages of vital cycles of information
systems and to guarantee that the necessary
means can be taken in short periods of time. The
authors offer practical advice for the choice of
counter-measures and evaluation of efficiency of
their various options.
Keywords:
warfare, security, information, organization, risk, threat, vulnerability, model, method, identification.
Reference:
Karpov, Y.S..
Analogous and derived narcotic and psychedelic substances:
topical problems of their definition, qualification and control.
// National Security.
2012. № 5.
P. 23-37.
DOI: 10.7256/2454-0668.2012.5.61545 URL: https://en.nbpublish.com/library_read_article.php?id=61545
Abstract:
The article is devoted to the problem of finding adequate
counter-measures against the new psychoactive drugs,
known as “designer drugs”, as well as to development
and implementation of measures against drug addiction,
control and stabilization of the narco-situation. The author
analyzes the definitions analogous and derived narcotic
and psychedelic substances and shows their principal
similarities and differences, then the author offers
to amend the existing legislation in part of its criteria
for recognition of a substance as analogous or derived
from the prohibited substances. The author also pays attention
to the order of holding studies and expertises of
such substances.
Keywords:
jurisprudence, drug addiction, psychoactive drugs, designer drugs, analogous narcotics, derived narcotics, anti-narcotics legislation, new measures, legal aspects, the principle of formally defined law.
Reference:
Gazimagomedov, G.G., Davydov, L.V..
Conflict bases for the political security of the modern Russia.
// National Security.
2012. № 2.
P. 9-21.
DOI: 10.7256/2454-0668.2012.2.59451 URL: https://en.nbpublish.com/library_read_article.php?id=59451
Abstract:
Political security and non-conflict condition of society are identical until the civil society manages to form effi cient
forms of control over the market and economy as a whole. Till that time the state is fully responsible for the political
security and the level of conflict in the society. Non-confl ict situation in the society presupposes minimal social
differentiation, negative minimal consequences of functioning of the market relations. Since the market relations
defy the state control, the state cannot control the market relations without ruining them. The attempts o the state
to interfere with the market prerogatives strengthen the conflict and lower the level of political security.
Keywords:
political science, security, state, civil society, market, social differentiation, need, conflict, political order, political security.
Reference:
Pogodina, I.V., Fraimovich, D.Y..
Economic security of the regions (dynamic analysis of the retrospective characteristics
of the regional gross product).
// National Security.
2012. № 1.
P. 60-63.
DOI: 10.7256/2454-0668.2012.1.59029 URL: https://en.nbpublish.com/library_read_article.php?id=59029
Abstract:
The article includes the method of analysis of the dynamics of economic security of the regions of the Russian Federation
based on the correlation of offi cial statistics on the RGP of the subjects of the Central Federal District. As a result, implementation
of the method in question uncovers indicative characteristics, which need to be optimized based on the medium
value in a particular federal district.
Keywords:
economics, security, analysis, RGP, regions, subjects of the Russian Federation, dynamics, values, statistics, regional.
Reference:
Artamonova, Y.S..
The term “security” at the scientifi c, theoretical and legal levels.
// National Security.
2011. № 6.
P. 152-160.
DOI: 10.7256/2454-0668.2011.6.58998 URL: https://en.nbpublish.com/library_read_article.php?id=58998
Abstract:
Brief description: this article covers one of the top issues of the contemporary science - development of «security»
in social sciences and the humanities. The problem of the semantic defi nition of «security» is analyzed in the article
below as well as the outlines of the problem analysis are defi ned. The article analyzes the origins of the concept of
disclosure and the nature of security.
Keywords:
security, level, info, right, a model element, system, concept, cooperation.
Reference:
Lipuntsov, Y.P..
Organization of the infrastructure of provision of state electronic services.
// National Security.
2011. № 4.
P. 96-106.
DOI: 10.7256/2454-0668.2011.4.58503 URL: https://en.nbpublish.com/library_read_article.php?id=58503
Abstract:
The transfer to the information society presupposes the considerable growth of transparency of activities of the
state bodies. For each of the information system of state institution, there has to be a list of reported events, which
have to publicized and the regime of making them public. Information of the departmental system is considered
open from the moment when it is transferred to the information repository of open state information.
Keywords:
economics, information, society, state, reporting, repository, publication, access, transparency, documents.
Reference:
Morozova, D.A..
State regulation of innovation development of the higher education based on mechanisms
of partnership between the private entities and the state.
// National Security.
2011. № 3.
P. 186-202.
DOI: 10.7256/2454-0668.2011.3.58391 URL: https://en.nbpublish.com/library_read_article.php?id=58391
Abstract:
Effi ciency of the innovation activity of the higher school much depends on close interaction of the state and private
sectors of the economics. The state serves as a moderator of specifi c forms and mechanisms of such interaction.
One of the ways of organization of such innovation activity in the sphere of higher education may be the partnership
between the private entities and the state.
Keywords:
economics, sector, development, mechanism, partnership, education, state, regulation, regulation, innovation, development.
Reference:
Ursul, A.D..
Problem of security and synergy.
// National Security.
2011. № 2.
DOI: 10.7256/2454-0668.2011.2.58158 URL: https://en.nbpublish.com/library_read_article.php?id=58158
Abstract:
The article is devoted to the possibilities of use of synergy as one of the key general scientifi c approaches in order
to study security, having mostly information-related character for the social system. The security is related to
up-keeping of the cybernetic system in the condition of infl uence of negative inner and outer factors. The author
shows that the most effi cient means to ensure security is on he way of self-organization, complication, and greater
information contents of the social system, and not on the way of its isolation and protection.
Keywords:
social studies, security, the law of necessary variety, information, information criterion of development, self-organization, self-preservation, synergy, thermodynamic approach, universal evolution.
Reference:
Stepanenko, V.S..
Tendencies, goals and means
of realization of ecological policy in the sphere of
dealing with waste in the EU and in Russia.
// National Security.
2010. № 7.
DOI: 10.7256/2454-0668.2010.7.57660 URL: https://en.nbpublish.com/library_read_article.php?id=57660
Abstract:
The article includes analysis of defi nition and structure
of ecological policy in its comparative legal aspects
and implementation in the EU and its Member
States, as well as in Russia. The author singles out the
economic, ecological, social and psychological factors,
which infl uence the formation and implementation
of ecological policy.
Keywords:
jurisprudence, environment, hazardous substances, ecological security, ecological crisis, ecology, globalization, waste, politics, law
Reference:
Manoilo, A. V..
Ango-Saxon Model of Operations in Information and Psychological War
// National Security.
2010. № 1.
DOI: 10.7256/2454-0668.2010.1.57283 URL: https://en.nbpublish.com/library_read_article.php?id=57283
Abstract:
The article describes the Anglo-Saxon model of a psychological operation based on using technologies of political polarization, political stratification and management of group behavior through activation of ‘anchor’ opinions and initiation of chain behavior.
Keywords:
psychology, Anglo-Saxon model, operations of information and psychological war, national security, information security, information technologies, conflicts, psychological war, psychological technologies, international relations
Reference:
Vyborny. A. N..
Methodological Principles of Measuring Resources Required for Maintaining Security Measures for the People Subject to the Protection of the State
// National Security.
2009. № 5.
DOI: 10.7256/2454-0668.2009.5.57028 URL: https://en.nbpublish.com/library_read_article.php?id=57028
Abstract:
The article entitled: «Methodological principles of measuring resources required for maintaining of the security measures for the people subject to the protection of the state» dwells upon the questions of the program goal-oriented planning of the activities of the state executive authorities. The article is of the interest for the specialists in the field of management of federal authorities dealing with security measures, law-enforcement agencies, and other executive authorities of the Russian Federation, researchers and educational facilities.
Keywords:
economics, economical security, indicators of investment, security, economy, financial policy, state protection, target programs, state power and executive power
Reference:
Manoylo, A.V..
Psychological operations in political and economical competition
// National Security.
2009. № 3.
DOI: 10.7256/2454-0668.2009.3.56757 URL: https://en.nbpublish.com/library_read_article.php?id=56757
Abstract:
Psychological operations are just as widespread in business, as they are in international relations, and their organizational forms and tactical schemes are various, as well as the objects of influence. These operations are characterized by active use of modern technologies for the formation of public opinion, as well as the technologies of aimed influence on the leaders in the sphere of business – decision – makers.
Keywords: psychology, national security, psychological operations, political conflicts, economic competition, raiders, non-friendly mergers, business, technologies of psychological influence, information warfare
Reference:
Misnik, G.A..
Specific features of harm, which is caused by ecological offences.
// National Security.
2009. № 3.
DOI: 10.7256/2454-0668.2009.3.56758 URL: https://en.nbpublish.com/library_read_article.php?id=56758
Abstract:
The author offers his own vision of the current situation in Russian legislation, judicial and administrative practice, which formed in the sphere civil law and ecological prescriptions, which form the institution of compensation of ecological harm. This article may be useful not only to legal practitioners (that is, judges, prosecutors, employees of ecological bodies), but also to the people, whose constitutional rights, property and health are harmed really or potentially.
Keywords: jurisprudence, security, risk, ecology, offence, use of nature, harm, loss, compensation
Reference:
Petrenko, A.I..
General characteristics of psychological operations.
// National Security.
2009. № 1.
DOI: 10.7256/2454-0668.2009.1.56224 URL: https://en.nbpublish.com/library_read_article.php?id=56224
Abstract:
The article is devoted to the definition and nature of the term “psychological operations”. The author attempts to classify the psychological operations, based on their scale, the sphere of their application, level of participants, intensity and longevity, the general character of influence. The author also singles out key stages of psychological operations, characterizes the general principles of information and propaganda actions within the psychological operations. The article is concluded with the characteristics of the key structural elements of psychological operations.
Keywords: psychological operations, information and propaganda actions, planning of psychological operations, disinformation, lobbying, manipulation, propaganda, crisis management, blackmail, terror
Reference:
Manoilo, A.V..
Psychological operations: models and technologies of conflict management.
// National Security.
2009. № 1.
DOI: 10.7256/2454-0668.2009.1.56225 URL: https://en.nbpublish.com/library_read_article.php?id=56225
Abstract:
This article examines cultural and civilization approaches to modern models, methods and technologies of psychological management of international and internal political conflicts. In today’s world there is a vast multitude of various methods, means and technologies for psychological warfare to impact conflicts. However, a detailed analysis shows that all of them have clear cultural and civilization-related difference and can be conditionally combined within the framework of four primary ideological approaches: Anglo Saxon, Eastern Asiatic, Middle Eastern (Islamic) and Western European (Roman-Germanic).
Keywords: psychological operations, information and psychological wars, conflict management, business, politics, tactics, strategy, tactical schemes, influence, information management, negotiations