Reference:
Nikitin P.V., Dolgov V.I., Gorokhova R.I., Korovin D.I., Bakhtina E.Y..
Methodology for assessing the importance of features when analyzing the implementation of government contracts
// National Security.
2023. № 4.
P. 1-18.
DOI: 10.7256/2454-0668.2023.4.44013 EDN: WKMAFQ URL: https://en.nbpublish.com/library_read_article.php?id=44013
Abstract:
The subject of the research is assessing the risks of performing government contracts. The object of the study is the process of analysis and evaluation of the implementation of government contracts. The study is aimed at developing a methodology that determines the importance and significance of signs that influence the risk of non-fulfillment of government contracts. Research methods were used: data analysis to detect connections and dependencies between various characteristics and the risk of non-fulfillment of government contracts; statistical analysis to obtain an assessment of the impact of each characteristic on the risk of non-fulfillment of contracts and ranking them in order of importance; machine learning to predict the risk of non-fulfillment of government contracts; expert assessments to take into account contextual factors and features, their impact on the importance of features. The main conclusions of the study are the presented methods for assessing the importance of features when analyzing the implementation of government contracts, by using data from various sources, including the register of public procurement of the unified information system (UIS), the register of unscrupulous suppliers (RNP) of the EIS and the SPARK information system. The authors managed to achieve high prediction accuracy (more than 97%) and analyze the most important and significant features. The scientific novelty lies in the fact that the results obtained make it possible to identify and analyze factors from three information systems that influence the risks of non-fulfillment of government contracts. Thus, this study is valuable and important in its field, which contributes to the development of more effective risk management methods and increased efficiency in the implementation of government contracts. The results obtained allow us to identify the factors that have the greatest impact on the risks of non-fulfillment of contracts, which makes the study valuable and important in this area.
Keywords:
machine learning, the importance of signs, classification, risk assessment, feature analysis, the method of support vectors, the SHAP method, contract execution, artificial intelligence, government contracts
Reference:
Shvets Y.V., Dorozhkova P.M..
Mass media in the Information Security management system of Russia
// National Security.
2022. № 1.
P. 20-27.
DOI: 10.7256/2454-0668.2022.1.26058 URL: https://en.nbpublish.com/library_read_article.php?id=26058
Abstract:
The object of the study is the official position of the authorities regarding the information security of the country and the official view of what role the mass media should play in this complex system. The authors pay special attention to recent changes in this area and the analysis of what measures have been taken by the state to regulate the issue of information security. Particular attention is focused on regulatory legal acts, which are legislative initiatives of strategic planning in the field of ensuring the national security of the Russian Federation. When working on the article, the authors emphasized the use of sociological, systemic and institutional research methods. The main conclusion of the studied problem is the awareness of the understanding that the mass media have a strong influence on public consciousness. In this case, it is important to understand who exactly uses the media as a tool of manipulation, since an adequate analysis of these processes will ensure national and information security. In particular, the author substantiates the special role of the institute of television as the main means of social control through the appropriate representation and interpretation of social reality.
Keywords:
state, television, information threats, Information Security Doctrine, manipulations, information security, management, national interests, mass media, TV channel
Reference:
Kosinova S..
Ensuring the security of the Internet space through the "new multipolarity"
// National Security.
2022. № 1.
P. 1-11.
DOI: 10.7256/2454-0668.2022.1.37575 URL: https://en.nbpublish.com/library_read_article.php?id=37575
Abstract:
In the article, the author addresses the topic of Internet governance as one of the urgent problems of international relations. Internet regulation in this context is considered as a new area of world politics, the role of which, in view of its economic, political and cultural potential, will increase in the near future. The study examines the approaches of different countries and international organizations to ensuring the security of the Internet space through its management. The author analyzes the evolution of approaches to Internet governance and the specifics of the growth of actors' involvement in this process. Various actors affecting information security are considered. A special contribution of the author to the study of the topic is the consideration of a historical retrospective of interstate interactions that directly affects the development of technologies around the world. Various methods of communication are analyzed, as well as the key principles and values that should guide the subjects of the Internet governance process. The study mentions the need for developing countries to participate in existing Internet governance mechanisms. The author identifies various scientific approaches to the regulation of the Internet space used to prevent threats to global security. This article concludes about the predominant role of the approach to regulating the Internet space through the "new multipolarity".
Keywords:
global governance, internet resources, security of internet resources, actors of international relations, world politics, international relations, types of internet management, internet governance, the new multipolarity, Internet
Reference:
Duben A.K..
Recent trends in the development of legal regulation in the sphere of ensuring information security of the judicial system in the Russian Federation
// National Security.
2021. № 5.
P. 56-65.
DOI: 10.7256/2454-0668.2021.5.36816 URL: https://en.nbpublish.com/library_read_article.php?id=36816
Abstract:
This article explores the questions of information security in the conditions of digital transformation and improvement of state administration. The author analyzes the impact of these challenges upon the judicial system overall and legal support of information security. Considering the existing scientific research and foreign experience, the conclusion is made on modernization of digital interaction on the issues of notifying the parties about the court hearing. Special attention is given to the institution of identification. Vectors in the development of complex institution of identification in the conditions of digital transformation are outlined. The author analyzes the case law material of the courts of general jurisdiction pertaining to personal data protection of a particular category of citizens; as well as substantiates the importance of digital notification of the parties to court proceedings for preventing the abuse of procedural rights by unconscientious participants. The author believes that formalization of prohibition on posting court documents online, in cases involving military personnel or persons doing military service, would ensure personal data protection of a particular category of citizens. . The conclusion is made that the highlighted issues of ensuring information security in the context of administration of justice testify to poor legal regulation of the institutions of identification and personal data. The consolidation of the uniform principles of legal regulation of relations that arise in the process of consideration and resolution of court cases with the use of information and telecommunications technologies, would allow countering the new challenges and threats in the information sphere, as well as the impact of globalization upon determination of the national strategy for the development of information society.
Keywords:
digital profile, digital technologies, personal data, identification institute, public authorities, legal information, information society, biometric identification, trust space, artificial intelligence
Reference:
Litvinova T.N..
The European and Russian policies on preventing cyberterrorism (on the example of fight against Cyber Jihad
// National Security.
2020. № 3.
P. 32-47.
DOI: 10.7256/2454-0668.2020.3.30197 URL: https://en.nbpublish.com/library_read_article.php?id=30197
Abstract:
The subject of this research is to determine similarities and differences in the fight against “Cyber Jihad” in policy of the European Union and the Russian Federation. The object of this research is the prevention of cyberterrorism as a threat to national and international security, associated with the dynamic development of information technologies worldwide, absence of censorship and the wide availability of materials published on the Internet. The author describes the legal framework for countering cyberterrorism in the European Union and the Russian Federation. Special attention is given to the difference in approaches in the European and Russian legislation towards fight against undesirable materials in the global network, difficulties related to countering "Cyber-Jihad", identification of people from risk groups who may be involved in terrorist activities as a result of hostile propaganda. The scientific novelty of this work consists in the empirical proof that the difference in approaches to countering cyberterrorism in the European Union and the Russian Federation significantly reduces the results of fight against the global "Cyber Jihad". The author reveals the key legal, technical and ideological difficulties in the fight against "Cyber-Jihad", underlines the need for coordination of the efforts of Europe and Russia in this area, as well as indicates the importance of prevention and ideological counter-propaganda among youth and at-risk population groups.
Keywords:
terrorist acts, countering terrorism, legal regulation, Cyber Jihad, cyber terrorism, cyber security, European Union, Russia, extremist materials, recruitment
Reference:
Kinsburskaya V.A..
Identifying cryptocurrency holders for the purposes of counteracting laundering of illegally obtained moneys and financing of terrorism
// National Security.
2019. № 3.
P. 1-14.
DOI: 10.7256/2454-0668.2019.3.29720 URL: https://en.nbpublish.com/library_read_article.php?id=29720
Abstract:
The goal of this research is the examination of the actual and potential risks of using cryptocurrency in criminal activities, including for laundering money obtained illegally, financing of terrorism, and determination of the acceptable methods of counteracting unlawful acts. In the course of this study, the author analyzes the documents of the Financial Action Task Force (FATF) pertinent to regulation of the sphere of virtual assets (since 2013 and up to the new revision of Recommendation 15 and Glossary adopted by FATF in October 2018; as well as the preliminary version of requirements for the representatives of cryptocurrency sector announced by FATF in February 2019); examines the models of legal regulation of cryptocurrency sector aimed at counteracting money laundering and terrorism financing in a number of foreign countries, Russian law enforcement practice on criminal offences related to the use of cryptocurrency, and the position of expert community with regards to determination of the legal status of cryptocurrencies as a subject of criminal violation. The main conclusions lie in the development of proposals on amending the current anti-legalization legislation aimed at the establishment of vigilant control over cryptocurrency circulation for counteracting money laundering and financing of terrorism in the Russian Federation. The author endorses an opinion on the need for licensing the activity of service providers regarding the exchange, transfer and storage of cryptocurrencies, and establishing responsibility of the indicated organizations for conducting verification of identity of cryptocurrency holders and their transactions; as well as points at the possible ways of collection and verification of identity information.
Keywords:
KYC, cryptocurrency, cryptocurrency operations, terrorist financing, risk-based approach, AML, FATF, identification, licensing, virtual currency
Reference:
Skorodumova O.B., Skorodumov B.I., Matronina L.F..
Summarized features of ensuring information security
// National Security.
2018. № 2.
P. 1-9.
DOI: 10.7256/2454-0668.2018.2.26045 URL: https://en.nbpublish.com/library_read_article.php?id=26045
Abstract:
The subject of this research is the information security that in the conditions of intense development of the information sphere, alongside the technical-technological component, progressively obtain the sociopolitical and humanitarian character due to the growing need for protection of the individual, corporation, state, and society as a whole from the information threats. The authors examine the normative technical requirements and normative legal mechanisms of regulation of the relations in the area of creation and application of the modern information technologies, as well as sociocultural factors aimed at preservation of cultural-ethnical values in the conditions of world globalization and formation of the new educational paradigm. The article substantiates the necessity of using the interdisciplinary and transdisciplinary approaches towards solution of the problem of ensuring information security. Based on the methods of socio-philosophical and comparativist analysis, the authors reveal the major threats to information security, and determine the summarized features of ensuring information security. Examining the potential solution of the problem of ensuring information security to the individual, corporation state, and society as a whole, it must be acknowledged that such activity is directly associated with the development of information sphere as a formative factor of the life of modern society and preservation of the cultural-ethnical values in the conditions of world globalization.
Keywords:
social expertise, anthropological risk, data protection, cybercrime, insider, confidential information, social engineering, ensuring information security, information threats, information security
Reference:
Bartosh A.A..
Strategies of information warfare
// National Security.
2016. № 4.
P. 485-499.
DOI: 10.7256/2454-0668.2016.4.68012 URL: https://en.nbpublish.com/library_read_article.php?id=68012
Abstract:
The object of this research is the information warfare, which can be carried out within the framework of color revolution and/or hybrid war. The subject of this research is the role of strategies of demolition and exhaustion that are being examined with regards to information warfare in the aforementioned conflicts. It is stated that the strategies of information warfare can be viewed as the varieties of strategies of demolition and of exhaustion implemented in conventional conflicts. The author determines the content and mutual influence of the strategies of demolition and exhaustion in the information warfare pertaining to color revolution and hybrid warfare. It is underlined that in the modern conflicts “hard power” is being implemented in combination with the non-military methods of affecting the enemy, including the information-psychological warfare. The author examines the role of public diplomacy and “soft power” in the information warfare. The approaches towards development of Russia’s strategy in counteracting information warfare are being proposed. The main conclusion of this work lies in the necessity of establishment of countermeasures against the disruptive information technologies in political-administrative, cultural-economic, and cultural-worldview spheres, taking into account the use of the two interconnected information strategies of demolition and exhaustion by the adversary. The author’s main contribution consists in justification of implementation of the strategies of demolition and exhaustion in color revolution and hybrid warfare correspondingly. The author is first to attempt to pursue correlation and interconnection between the strategies of demolition and exhaustion in the information warfare of modernity.
Keywords:
Adjustment, Threats, Model, National security, Controlled chaos, Strategy of exhaustion, Strategy of demolition, Information warfare, Hybrid war, Color revolution
Reference:
Lebedeva E.V..
Information security of CIS states: stages of implementation
// National Security.
2016. № 4.
P. 500-508.
DOI: 10.7256/2454-0668.2016.4.68013 URL: https://en.nbpublish.com/library_read_article.php?id=68013
Abstract:
In this work the author focuses his attention on the process of international dialogue with regards to the questions of information security. The object of this research is the information policy of CIS countries on international arena. The goal of this article consists in determination of specificity of the stages of CIS countries’ work over the establishment of the normative legal and methodological base of ensuring the international information security. In order to achieve the set goal it is necessary to detect the key disputes on this issue with the Western colleagues, as well as to underline the dynamics of the notion “information security”. The scientific novelty consists in the acquired results during the course of this research pertaining to the assessment of CIS countries international policy in the information-communication sphere within the framework of the stages of its development throughout the period of 1990-2015. The analysis of the work of regional institutions from a perspective of the intergovernmental documents allowed explaining the conclusions that currently CIS states attempt to establish a complex and open system of international information security based on compliance of its participants to the universal rules that ensure security of information environment. The author presents the characteristic of CIS states information, its goals and principles in the context of three periods of its development.
Keywords:
Normative base, Political manipulation, Cybercrime, United Nations, Shanghai Cooperation Organization (SCO), Commonwealth of Independent States (CIS), Sources of threats, Regional information security, Information space, Information security
Reference:
Zinov'eva E.S..
The role of social media in contemporary international conflicts: the existing scientific approaches and future research directions
// National Security.
2016. № 3.
P. 358-368.
DOI: 10.7256/2454-0668.2016.3.67888 URL: https://en.nbpublish.com/library_read_article.php?id=67888
Abstract:
The article is devoted to the analysis of the role of social media in contemporary international conflicts, as well as review of existing scientific approaches to the study of this new phenomenon.The author uses an interdisciplinary theoretical and methodological framework - the philosophy of technology and theories of political communication. The theory of political communication allows to analyze the characteristics of new media and their role in political communication in conflict, while the philosophy of technology makes it possible to assess the impact of technology on social processes, including international conflicts.As soon as the social media have become an integral part of the international policy and conflicts, the researchers are moving away from techno optimism in the evaluation of new Internet communications, according to which new media contribute to the democratization, the reduction of conflict, and consider the new media as a factor in the escalation conflicts, so techno pessimism becomes increasingly popular. At the same time, new media, like any other technology, are neutral and can be used by different groups for resolution as well as escalation of conflicts. However, studies on the role of social media in conflict resolution are underrepresented in the modern scientific literature. The author is proposes research agenda on the role of new media in the settlement of current conflicts.
Keywords:
international conflicts, world politics, internet, information security, conflict resolution, political communication, social networks, social media, philosophy of technology, conflict management
Reference:
Kostin A.O., Zhigulin G.P., Volodina A.A..
Analysis of the threat of loss of legal power of documents within the system of remote financial document management
// National Security.
2016. № 2.
P. 228-235.
DOI: 10.7256/2454-0668.2016.2.67749 URL: https://en.nbpublish.com/library_read_article.php?id=67749
Abstract:
The authors carefully examine such aspects of the topic as the threat to information security for the St. Petersburg municipal authorities within the system of remote financial document management. The authors underline the advantages of the system of remote financial document management, new system introduced in July of 2013 before the system of electronic document management. The article presents information for receiving the qualified certificate of verification key in the federal treasury of St. Petersburg. The individual properties of electronic document management, with the help of which it retains its legal power from the technical point of view, are being reviewed. The main conclusion consists in building a generalized model that describes the conditions under which emerges the threat of “loss of legal power of an electronic document”. The scientific novelty consists in examination of threat with regards to the questions of information security during the transfer of data between the St. Petersburg municipal authorities and the federal treasury.
Keywords:
electronic document management system, loss of legal force, electronic signature, threat to information security, electronic document, Remote financial document, federal treasury, qualified certificate, source of threats, municipality
Reference:
Petukhov A.Yu., Ivlieva P.D..
Psycholinguistic analysis of the media coverage of the Ukrainian crisis within German mass media throughout 2014
// National Security.
2015. № 4.
P. 548-556.
DOI: 10.7256/2454-0668.2015.4.66736 URL: https://en.nbpublish.com/library_read_article.php?id=66736
Abstract:
This article is dedicated to the analysis of the information materials from the popular German mass media on the Ukrainian crisis throughout 2014 from the perspective of psycholinguistics. A special attention is given to the formation of images of Russia and Ukraine within the framework of information-psychological confrontation using psycholinguistic processing of the text, use of special approaches and strategies for determining and delivering information. The relevance of this topic is substantiated by the significant increase in information and psychological confrontation between Western Europe and the United States on one hand, and Russia on the other. As the result of the analysis, the authors come to a conclusion that many articles contain not only informational subtext, but a propagandistic one as well, called to instill a point of view among readers that will correspond with the current foreign policy of the EU and Germany pertaining to the Ukrainian crisis and its key players.
Keywords:
media coverage of the conflict, Germany, Ukraine, Russia, Ukrainian crisis, psycholinguistics, information warfare, psychological operations, mass media, power
Reference:
Akopov G.L..
Hacktivism – a challenge to national security within information society
// National Security.
2015. № 4.
P. 557-562.
DOI: 10.7256/2454-0668.2015.4.66737 URL: https://en.nbpublish.com/library_read_article.php?id=66737
Abstract:
This article examines the issues of cyber threats and cyberterrorism. The explanation for this phenomenon is the dynamic information-communication development of the modern society. The article examines the factors that gave rise to cyberterrorism. A special attention is given to the so-called hacktivists – those who commit acts of cyberterrorism without financial gain, but rather to support their political ideas; a number of specific examples of hacktivist activity are being presented. As a result, the governments today are forced to concentrate harder about creation of a cyber shield to ensure information safety. Among the main conclusions the author substantiates the need to place cyber security as the corner stone of every nation. To ensure information and cyber security and counteract these threads, the author recommends forming cyber forces based on scientific brigades.
Keywords:
cyberterrorism, cyber threat, cyber forces, hacker attacks, hacktivism, information sovereignty, cyber shield, information security, cyber security, information society
Reference:
Markova A.V..
Virtual communicative confrontation
between the United States and China
// National Security.
2014. № 6.
P. 940-945.
DOI: 10.7256/2454-0668.2014.6.65741 URL: https://en.nbpublish.com/library_read_article.php?id=65741
Abstract:
This article is dedicated to the confrontation between the United States and China
within the modern information communication networks. The author examines the current state
of China’s security from the perspective of the theory of information warfare. Main mechanisms of
the manipulative methods of the psychological operations against China based on inducing within
the mentality of an individual the symptoms of a borderline psychopathology are being analyzed.
This article studies the tendency of a broad implementation of information technologies within the
military facilities that provide cyber security in order to increase their level of combat capability.
The author explores the use of information and virtual communication ways to influence the consciousness
of citizens as an intrinsic part of modern international processes. The author comes to
a conclusion that the United States and China gradually expand their capabilities in waging cyber
and information-psychological warfare. These circumstances lead to an inevitable confrontation especially
in the Pacific Rim, where China virtually has no adversaries who can compete in military
or economic power.
Keywords:
manipulations, People’s Liberation Army, National Security Agency, cyber security, USA, China, Internet, information warfare, information technologies, cyber warfare.
Reference:
Chuprakova N.S..
Informational psychological influence
of virtual communication upon
the youth within the modern political process
// National Security.
2014. № 6.
P. 946-955.
DOI: 10.7256/2454-0668.2014.6.65742 URL: https://en.nbpublish.com/library_read_article.php?id=65742
Abstract:
This article is dedicated to the issue of influence of the modern mass communication
upon the youth. The author conducts an experimental research on the changes in the psychophysiological
characteristics of individuals under the influence of virtual communication technologies. The
purpose of this experiment is the research on the psychophysiological characteristics of 12–13 year old
students in order to determine the link between various specters of activity in the computer virtual
reality and the psychophysiological profile of the students. This longitudinal study is substantiated by
the character of the experiment, conducted over the course of two years with the same students (two
classes of 25 and 27 children respectively). The computer laterometry technology allows us to form
various amplitude time structures of sound and noise square waves and provides a wide spectrum of
strategies of producing a signal and registering the reaction. In the course of this study it became evident
that factors such as personal anxiety, emotional tension and excitability of the right hemisphere
cause the susceptibility to the influence of the incoming information. Thus the teenagers become receptive
to the various types of information, which can lead to a destructive nature of their participation
in the political life of the society.
Keywords:
methods of mass communication, virtual reality, hemispheric asymmetry, personal anxiety, political consciousness, Internet, consciousness manipulation, informational influence, social networks, protest.
Reference:
Sedykh N.S., Gshiyantz R.E..
The graphical model
of the social representations of terrorism
// National Security.
2014. № 5.
P. 712-724.
DOI: 10.7256/2454-0668.2014.5.65580 URL: https://en.nbpublish.com/library_read_article.php?id=65580
Abstract:
This article presents the main results of an empirical research, the goal of which is to study
the peculiarities of the student youth’s perception of subjects of terrorism. As such, the following
were examined: a terrorist — the leader of a terrorist movement, responsible for development of corresponding
ideology, propaganda, and promoting the idea of extremism for the purpose of recruiting
new members into the ranks of the organization; a terrorist — the executant, member of a terrorist cell
responsible for the preparation and carrying out of an act of terrorism; a male and a female terrorist
bombers. The methodology behind the research is developed based on the semantic differential and
is aimed at detecting the physical appearance, socio-demographic characteristics and character traits
of terrorists, which will solve various problems with regards to carrying out their destructive actions.
For the purpose of expansion the interpretations and development of conclusions, the author offers
a graphical model of social representations of terrorism, which allows illustrating the key vectors of
terrorist activity and the structure of perception about subjects of terrorism. This presents an interest
in the context of problematics of antiterrorist activity. In the analysis of the results, one of the aspects
taken into consideration is that of the role of mass-media in the social formation of the phenomenon
of terrorism. The question of optimizing the social and informational-psychological countermeasures
to terrorism under the modern circumstances becomes more relevant.
Keywords:
Terrorism, terrorist, society, youth, information, mass communication, influence, social perceptions, preventative measures, informational-psychological countermeasures.
Reference:
Vladimirova, T.V..
Information security: social practices and structures.
// National Security.
2014. № 3.
P. 390-397.
DOI: 10.7256/2454-0668.2014.3.65062 URL: https://en.nbpublish.com/library_read_article.php?id=65062
Abstract:
Definition of information security continues its formation in various spheres of social life, as well as in theoretical
knowledge in general. The author considers that various study directions and approaches to information security
may be regarded from a single methodological standpoint, as expressed in the language of social and philosophical
theory. Such an operation in the view of the author shall facilitate further development and fulfillment of the understanding
of social nature of this term. The author connects information security guarantees with understanding and
possession of specificities of the modern social practices, allowing to keep information streams adequate to the outside
world for an individual or social systems, thus, providing for comprehensive and sustainable situation for individuals
and systems in the conditions of growing deviations/innovations, communication variability and growing intensity
of information streams. Theoretical and methodological basis for the study is formed with the sociological theories
of A. Giddens, M. Castells, J. Urry. The author also uses the works of Russian scientists in the sphere of information
security guarantees. It is noted that guarantees of information security are formed with various social practices and
social structures. The offered approach allows to develop understanding of social aspects of information security, to
see specific features of information guarantees practices, to fix the contradiction between locality of structures and
the network stream character of information threats. It is noted that high intensity of communication mobility practices
in security guarantees becomes possible thanks to security privatization as a specific feature of such practices.
Keywords:
information security, information security practices, information security structures, security privatization, structural locality, information industry, information infrastructure, information law institutions, new mobility information streams.
Reference:
Bocharov, M.I., Bocharova, T.I., Simonova, I.V..
The substantial elements of teaching information security at the basic and general secondary education.
// National Security.
2014. № 2.
P. 260-275.
DOI: 10.7256/2454-0668.2014.2.64066 URL: https://en.nbpublish.com/library_read_article.php?id=64066
Abstract:
The article contains analysis of how the requirements of the modern society and standards of general and
general secondary education on the issues of teaching information security are reflected in the school manuals on
information science. The authors study the role of teaching information security and socialization of school graduates
in the modern information society. The authors single out specific features of teaching information security within
the framework of the course of information science based upon the analysis of the manual sets by several authors.
Based upon the revealed patterns in the system of provision of materials and contents of the manuals themselves,
the authors provide recommendations for the improvement of the approaches towards formation of the contents of
teaching information security. The authors also clarify the definition of information security regarding teaching
school students, substantiating its use. The authors then provide components for the teaching standard for information
security for basic and general secondary education, as the basis for the system of teaching information security
within the framework of information science.
Keywords:
contents of school manuals, information security, teaching information security, information science, teaching methods, teaching school students, socialization of school students, study contents, information technologies, security problems.
Reference:
Sedykh, N.S..
Role of mass communications
in the information and psychological fight
against terrorism.
// National Security.
2014. № 1.
P. 32-49.
DOI: 10.7256/2454-0668.2014.1.63892 URL: https://en.nbpublish.com/library_read_article.php?id=63892
Abstract:
The article concerns the role of
mass communications in the social reality
construction. In this regard the author analyzes
some consequences of global information
penetration of the social sphere, as well as
some specific features of mass communication
influence on the public opinion and individual
conscience. The author provides the result of
discourse analysis for the TV programs of the
Channel 1 in the period between 8 and 14 of
July, 2013. The main criteria for the choice of
TV programs for analysis was the presence
of social rhetoric, defining the specificities of
ideological inf luence. The author views the
problems of information and psychological
anti-terrorism activities with regard to the role
of pedagogical journalism and educational
technologies. The author refers to the issue
of consolidation of efforts of pedagogical and
journalist communities in order to develop
projects aimed against extremist and terrorist
ideologies among the youth. The author points
out the need to form specialized educational
programs for additional professional education
for some categories of teachers and social
pedagogues, journalists, law-enforcement
officers in order to develop specific competencies
in for professional purposes of extremism and
terrorism prevention, as well formation of antiterrorism
values in the Russian society.
Keywords:
society, terrorism, threat, youth, information, mass communications, discourse, information and psychological counteraction, education, pedagogical journalism.
Reference:
Nartsyssova, S.Y., Noskov, Y.M., Krupennikov, N.A, Matvienko, S.V., Kondratiev, V.S..
Thinking as a personal development factor:
modeling specific cogitativestyle features of
argumentation.
// National Security.
2013. № 5.
P. 124-148.
DOI: 10.7256/2454-0668.2013.5.63362 URL: https://en.nbpublish.com/library_read_article.php?id=63362
Abstract:
The authors of the article develop and discuss the
conceptual model of cogitative-style determination
of the argument. They provide the comparative
cogitative style model, showing effect of cogitativestyle
mobility, as well as specific features of the
organization of psycholinguistic and psychosemantic
studies, processing its results by the
following methods of the sampling theory: with
the use of contingency tables, with the use of χ2-
Pearson criterion, with the dot-biserial coefficient
of correlation of Pearson, univariate analysis
of variance. The conclusions provided in the
article were formed by the empirical research of
interrelation between cogitative styles and features
of the argumentation.
Keywords:
cognition, cogitative style model, cogitative style specific features, Mann-Whitney U-test, dispersion analysis, chi^2 criterion, empiric frequencies, theoretical frequencies, contingency tables, modeling
Reference:
Vladimirova T.V..
Information security: sociological perspective
of the term
// National Security.
2013. № 4.
P. 597-604.
DOI: 10.7256/2454-0668.2013.4.63058 URL: https://en.nbpublish.com/library_read_article.php?id=63058
Abstract:
The article discusses a topical issue of the definition of information security within the object field of
sociological knowledge. The author analyzes traditional definitions of information security, and she offers an
approach towards structuring the information environment and the attitudes to information environment both
in the broad and narrow understanding of the term. The author provides for the understanding of information
security as security of social practices of the information service in the conditions of growing intensity of information
streams and outdating information.
Keywords:
social studies, security, information environment, information, cyber-space, modern time, practices, actual/virtual, social, speed-up/outdate
Reference:
Manoylo, A. V..
Psychological Operations in Raider Wars
// National Security.
2013. № 3.
P. 464-470.
DOI: 10.7256/2454-0668.2013.3.62818 URL: https://en.nbpublish.com/library_read_article.php?id=62818
Abstract:
The article describes the purposes, tasks,
methods and technologies of psychological war operations
used in raider (hostile) takeovers, i.e. operations
on unfriendly absorption of Russian companies.
Keywords:
psychology, national security, raiders, psychological security, information war, information inf luence technologies, economic security, psychological operations, unfriendly absorption, business security.
Reference:
Vladimirova, T.V..
Network communications as a new “salvation formula”
for the social order
// National Security.
2013. № 2.
P. 371-378.
DOI: 10.7256/2454-0668.2013.2.62622 URL: https://en.nbpublish.com/library_read_article.php?id=62622
Abstract:
The article includes the development of the approach
towards the problem of security in the society
as sustainable social order in the conditions of growing
deviation/variety. The analysis of the evolution theory
of N. Luhmann allows one to see the role of deviation
in the modern destinies in more detail. The idea of the author is that once the “semantic hypertrophy of variety
” appears, the social system develops a new “salvation
formula” for the social order, which is development
of network communication space. The network has a
unique quantity – the limitless ability to meet the need
for the Undeniable. In this sense, one may say that development
of network communications “saves” the order
in the society by localizing the anomia in the virtual
network space.
Keywords:
social studies, security, society, communication, variation, deviation, network, anomia, accumulation, acceleration.
Reference:
Surma, I.V..
The new global supranational actor in the international
relations within the framework of national security.
// National Security.
2013. № 1.
P. 66-80.
DOI: 10.7256/2454-0668.2013.1.62343 URL: https://en.nbpublish.com/library_read_article.php?id=62343
Abstract:
The modern information processes in the society lead
to the changes in the government structures and technologies
in favor of those, who manage information
streams and resources. Modern Internet has the potential
for provoking various crises, or strengthening existing
crises. Information and communication structure
of the state is a strategic resource, which requires constant
control and attention. Any destructive activities in
the information sphere may have serious consequences
for the manageable networks and systems, therefore
the information networks currently serve as means of
information warfare for public politicians, religious organizations,
entrepreneurs and businessmen, criminals,
criminal and terroristic groups. The role of studying
the cyber-terrorism, the scientific bases for the means
against it is ever-growing nowadays in the conditions
of complicating social and political structures, loss of
trust to political institutions, inefficiency of some existing
mechanisms of inß uence on the society. These and
other circumstances require the development of an efficient state policy against cyber-terrorism, as well as
the development of a new “intellectual technology” and
program instruments, in order to control the “dark Web”
and to analyze social networks. Therefore, the information
guarantees of foreign policy and international relations
have value, which is similar to such priority issues
of global policy, as non-proliferation of nuclear arms,
regulation of regional conß icts and peace-making, support
of global security, protection of cultural heritage
and guarantees of human rights.
Keywords:
political science, social networks, Internet space, cyber-attacks, social bots, SMISC, BFT-ONE, Internet mass media, the Arabian spring, cyber-terrorism.
Reference:
Afanasieva, Y.S..
Television broadcasting as a factor for the military
policy of the modern states.
// National Security.
2012. № 6.
P. 110-117.
DOI: 10.7256/2454-0668.2012.6.62002 URL: https://en.nbpublish.com/library_read_article.php?id=62002
Abstract:
Since the modern warfare is part of the “mediabased
policy”, and it uses new instruments in order
to create military and political pressure and to
gain information superiority, it actively uses the
mass media. This article is devoted to the study of
television broadcasting based on various motives
of lawful behavior in the legal sphere, as well as
the methods of influence of on the legal conscience
of people via the mass media in order to form anticriminal
position in the social sphere. The author
includes political analysis of television broadcasting
as a factor in the political relations in time
of war, military and political tensions. The author
also singles out the specific features of the television
broadcasting as the “weapon of mass influence
”. The author shows the possibility of the
broadcasting resources in the information field of
the network-centered war. The author then characterizes
the functions for the television broadcasting
at various stages of the military conflict,
provides generalizations on the manipulative technologies
in the sphere of television broadcasting,
then offers the options for the protection of their
influence, she also analyzes the Russian and foreign
experience of television broadcasting in the
implementation of the military policy of a state.
Keywords:
political science, television, politics, security, state, television broadcasting, technologies, people, power.
Reference:
Bakhtin, S.A..
The Internet economy – the new challenge for the
national economic security: the general characteristics.
// National Security.
2012. № 6.
P. 118-122.
DOI: 10.7256/2454-0668.2012.6.62003 URL: https://en.nbpublish.com/library_read_article.php?id=62003
Abstract:
The article is devoted to the influence of the Internet
on the global and national economic development.
The author supports the thesis on the
Internet-economy phenomenon as a fundamental
factor for the transition from the industrial market
economy to the innovation economy via the new
Internet-based communication infrastructure. The
author also views the critical factors for the development
of the Internet economy and the problems
of its formation in the Russian Federation.
Keywords:
economics, Internet, intermediary, social, network, communication, infrastructure, national, security.
Reference:
Stanchik, S.S..
Role of the Internet in the modern revolutions.
// National Security.
2012. № 5.
P. 67-72.
DOI: 10.7256/2454-0668.2012.5.61550 URL: https://en.nbpublish.com/library_read_article.php?id=61550
Abstract:
The “colored” upheavals on the post-Soviet territory were
mostly successful due to the use of mass media by the revolutionary opposition in order to manipulate the society. The goal
of this article is to show how Internet became the weapon of
revolutionaries. It should be noted that the so-called “colored”
revolutions became the first wave of this type, when the opposition
used the global web as an instrument for the demonization
of the ruling government and for the manipulation of the social
opinion. The popular social networkds, such as Facebook, Odnoklasniki,
Vkontakte, etc.) were not used in “colored” revolutions,
since they appeared later. Thanks to the Internet, the opposition
managed to arrange on-line protest actions and the
bloggers, who were financed by the opposition, wrote anti-governement
articles. The organizers of the “colored revolutions”
in the post-Soviet territory also paid attention to the specialized
forums and sites. The lawful government attempted to fight the
Internet-revolutionaries, but the global web was new, and the ef-
ficient methods for fighting it were not yet formed. Therfore, one
can say that the mass media were key in the support of turnovers
in Georgia, Ukraine and Kirgizia.
Keywords:
political science, revolution, riot, colored, orange, Internet, manipulation, opposition, anti-government, nework.
Reference:
Buchkova, A.I..
Specifi c features of infl uence of the Internet on the political socialization of the youth in the
modern Russia.
// National Security.
2012. № 4.
P. 132-141.
DOI: 10.7256/2454-0668.2012.4.61364 URL: https://en.nbpublish.com/library_read_article.php?id=61364
Abstract:
The article is devoted to the specifi c features of infl uence of the Internet on the political socialization of the youth in
Russia. It is noted that the global network is a key agent of political socialization in the modern information society, and
that it may be used in order to infl uence the youth, for example, to manipulate it into protest activities, such as actions
and meetings. At the same time multi-functional social networks are recognized as most demanded mechanisms of infl uence
on the youth. The author also analyzes the specifi c features of the modern political parties and youth organizations,
which actively use Internet technologies, and which may become centers for uniting the youth. It is noted that there is
need to understand the mechanisms and specifi c features of infl uence of the global network on the youth, which in turn
shall allow to make the process of political socialization of the modern Russian youth more predictable and well-aimed,
thus supporting the state security and protection of sovereignty of the state.
Keywords:
social studies, socialization, politics, youth, Internet, agent, infl uence, social network, party, organization.
Reference:
Golovin, Y.A..
Activation of the modern mass media in the sphere of guarantees of information security.
// National Security.
2012. № 4.
P. 142-148.
DOI: 10.7256/2454-0668.2012.4.61365 URL: https://en.nbpublish.com/library_read_article.php?id=61365
Abstract:
The author analyzes the historical development of the role of mass media in social and political life. The author analyzes the
basic document for the state information policy in the sphere of guarantees of political security in the Russian Federation.
Then the author correlates each type of state information policy with the mass media. The author analyzes the objects
of state information policy and classifi es them, then he points out the general vectors for the political government in the
sphere of information security of mass media.
Keywords:
political science, political government, political power, doctrine, political process, information security, security, object, mass media, politics.
Reference:
Sipok, R.P..
Meaning and effi ciency of the mass media in guaranteeing social security.
// National Security.
2012. № 4.
P. 149-158.
DOI: 10.7256/2454-0668.2012.4.61366 URL: https://en.nbpublish.com/library_read_article.php?id=61366
Abstract:
The object of the studies in this article regards the social relations in the modern society and the infl uence of the mass
media on the legal conscience of the people. The goal of this article is to study various means of infl uence of the mass
media on criminal and anti-criminal conscience of people in the modern society. The use of results of this study may be
helpful for the mass media personnel for the formation of the educated policy in the sphere of information for the peole
in order to form an anti-criminal culture of behavior and to lay the legal ground for the growth of social self-conscience.
As a result of this study, the author comes to a conclusion that the maximum level of legal conscience in the society is
one of the most effi cient guarantees of the law-abiding behavior of the people for the state and the society. The author
also comes to a conclusion that solidarity of the people with the crime-prevention operations and with the protection of
victims is a positive condition for such activities. For example, in the opinion of many psychologists the more effi ciently
the mass media fulfi ll the requirements of the people, the more sustainable and broader becomes the connection among
them. However, the commission of many crimes takes place under the infl uence of the mass media, which spread the
information in order to improve the ratings of their TV programs or publications. The main value of this article is the
conclusion of the author, that in order to make the implementation of the criminal law policy more effi cient it is important
that the state would have certain information impact on the people, since self-regulation of the mass media and provision
of information on prevented and duly investigated crimes may have a positive impact on the formation of the general
criminal situation in our state.
Keywords:
jurisprudence, crime, security, protection, invincibility, mass media, legal conscience, state, punishment, infl uence.
Reference:
Pashinyan, I.A..
Specifi c features of perception of information risk.
// National Security.
2012. № 3.
P. 107-113.
DOI: 10.7256/2454-0668.2012.3.59478 URL: https://en.nbpublish.com/library_read_article.php?id=59478
Abstract:
The article is devoted to the results of studies of differences in perception of information risks by two groups of experts:
journalists and special service staff. The author describes the mechanisms for the deformation of perception of professional
risks due to psychological peculiarities of these groups. The author then comes to a conclusion that a number of mechanisms
may infl uence the results of expertise, which should be taken into account when analyzing reliability and trustworthiness
of the results of expertise.
Keywords:
political science, security, information, journalist, information risk, expert method, deformation effect, phenomenon, competence, cognition.
Reference:
Turchenko, M.S..
Political agenda in the discourse practices of V.V. Putin at the time of federal election campaigns
in 2000 – 2010.
// National Security.
2012. № 3.
P. 114-120.
DOI: 10.7256/2454-0668.2012.3.59479 URL: https://en.nbpublish.com/library_read_article.php?id=59479
Abstract:
The study of verbal activities of politics is quite important within the political science, since their sayings are often performative
by their nature, that is they not only provide for the characteristics of the political system and constellation of
actors, but they actually change the world. Due to this fact the discourse practices of V. Putin in Russian politics become
a topical issue for research and study.
Keywords:
political science, national security, politics, election campaigns, Putin, Russia, discourse, political agenda, political course, information.
Reference:
R. M. Aslanov, А. А. Мorozov.
System analysis of legal guarantees for the information security in Russian Federation.
// National Security.
2012. № 2.
P. 56-59.
DOI: 10.7256/2454-0668.2012.2.59456 URL: https://en.nbpublish.com/library_read_article.php?id=59456
Abstract:
Currently in the Russian Federation there are all necessary conditions for the transfer to the information society, and one of such conditions is the development of the system of normative regulation of the relations in the sphere of information security. It is also fair to note that the social relations in the information sphere influence the development of information=related legislation, as well as legislation in the sphere of information security.
Keywords:
guarantees, distribution, information, security, system, regulation, conditions, relations, society.
Reference:
Akopov, G.L..
Political and legal threats of spreading socially-oriented Internet technologies.
// National Security.
2012. № 2.
P. 60-67.
DOI: 10.7256/2454-0668.2012.2.59457 URL: https://en.nbpublish.com/library_read_article.php?id=59457
Abstract:
The article includes analysis of the existing threats to national security within the context of development of
Internet technologies the formation of the information society in the Russian Federation. At the current stage of
development of the information society and integration of the social networks into the private lives of persons,
the issue of security and protection of personal data is quite topical. At the same time the process of involvement
of a person into the Internet society, on one hand shows the abilities for the political choice, and on the other had
includes the process of imposition of decision-making as well as a number of cyber-threats.
Keywords:
political science, Internet, social networks, Internet-resources, Internet-society, Internet-threats, information security, internet-communication, personal data.
Reference:
Sedykh, N.S..
Modern terrorism from the point of view of information and psychological threats.
// National Security.
2012. № 2.
P. 68-75.
DOI: 10.7256/2454-0668.2012.2.59458 URL: https://en.nbpublish.com/library_read_article.php?id=59458
Abstract:
The article includes analysis of terrorism as an information and psychological threat. The author views the
means of mass communication as a discourse system, and their role in social construction of the phenomenon
of terrorism. The author offers the methods for the studies of the specifi c psychological and information-based
infl uence of mass media and communications reports on terrorism in order to organize an efficient information
and psychological counteraction.
Keywords:
psychology, terrorism, terrorist act, threat, influence, information, communication, text, discourse, media-discourse.
Reference:
Shultz, V.L..
Scenario analysis of the effi ciency of management of the information support of the state policy
of Russia in the Arctic territory.
// National Security.
2011. № 6.
P. 104-137.
DOI: 10.7256/2454-0668.2011.6.58995 URL: https://en.nbpublish.com/library_read_article.php?id=58995
Abstract:
The article is devoted to a complex of methodological and applied problems of improved effi ciency of management of
information support of the state policy of the Russian Federation in the Arctic region. The author shows the methods of
modeling and structural and dynamic analysis of the effi ciency of information management. Then the author shows the
results of the development and scenario analysis of the multy-graph (multi-chart) models of information confrontation
of geopolitical opponents of Russia.
Keywords:
security, information support, scenario modeling, structural and dynamic analysis, active information campaign, information threat, destructive infl uence, effi ciency of management.
Reference:
Shutov, A.V..
Sports as a channel for aggression in the modern world.
// National Security.
2011. № 5.
P. 181-187.
DOI: 10.7256/2454-0668.2011.5.58767 URL: https://en.nbpublish.com/library_read_article.php?id=58767
Abstract:
In connection with the development of mass media and public communications appeared an opportunity to study sport in
new ways. In this article, the emphasis is on the communicative channel between the athletes and spectators, as well as the
functioning of this channel in the wide dissemination of digital technologies. Author examines the sport as one of the most
important for modern society channels out of aggression.
Keywords:
sport, aggression, violent behaviors, hooligans, fighting
Reference:
Shultz, V.L., Yusupov, R.M..
Science and scientific security.
// National Security.
2011. № 2.
DOI: 10.7256/2454-0668.2011.2.58167 URL: https://en.nbpublish.com/library_read_article.php?id=58167
Abstract:
The article is devoted to the triple problem of the relations between science and national security: the science of
national security, security of science, and whether science is dangerous.
Keywords:
science, national security, ensuring security, threat, protection.
Reference:
Akopov, G.L..
Political hacktivism – a threat to national security.
// National Security.
2011. № 2.
DOI: 10.7256/2454-0668.2011.2.58168 URL: https://en.nbpublish.com/library_read_article.php?id=58168
Abstract:
The article includes analysis of key problems and threats of spread of computer crime and information attacks,
which are organized on politically important motives. Based on a number of practical examples, the author analyses
possible threats of use of modern network technologies for the cyber-attacks.
Keywords:
political science, cyberterrorism, hacktivism, cyberwar, cyberattack, information security, cybercrime, Internet, network technologies.
Reference:
Shultz, V.L., Yusupov, R.M..
Science and national security.
// National Security.
2010. № 11.
DOI: 10.7256/2454-0668.2010.11.57925 URL: https://en.nbpublish.com/library_read_article.php?id=57925
Abstract:
The article is devoted to the triadic problem of relations
of science and national security: science of national
security, security of science, is science dangerous.
Keywords:
military service, science, national security, ensuring security, threat, protection, national security, ensuring security, threat
Reference:
Yusupov, R.M..
On the infl uence of information
and communication technologies on guarantees of
national security in the conditions of formation of
the information society.
// National Security.
2010. № 7.
DOI: 10.7256/2454-0668.2010.7.57661 URL: https://en.nbpublish.com/library_read_article.php?id=57661
Abstract:
The problems of national security remain in the situ-
Summary
Национальная безопасность 7/8 • 2010
126
ation of information society, however, they gain new
specifi c features, due to the greater role of information,
information sources and the ICT. The information
characteristics cover all the key elements of
the problem: geopolitics, national interests, security
threats, system of security guarantees, means and
methods, key directions. The article is devoted to role
and place of information and communication technologies
in ensuring national security within the framework
of developing information society.
Keywords:
military, information and communication technologies, national security, ICT, informatization, information society, national security, national resource.
Reference:
Fedyakin, A. V..
Mass Media and State Information Policy in Modern Russia: Legal Grounds and Practice
// National Security.
2010. № 5.
DOI: 10.7256/2454-0668.2010.5.57539 URL: https://en.nbpublish.com/library_read_article.php?id=57539
Abstract:
The article is devoted to the analysis of officially fixed priorities of the state information policy and legal grounds for mass media in modern Russia as well as problems and perspectives of their practical appliance. The author describes the main stages of establishment and evolution of mass media in modern Russia and their peculiarities. He also analyzes the specifics of information space of modern Russia. The author suggests a certain model of state information policy in modern Russia and describes the main trends and content of this model
Keywords:
social studies, national security, mass media, information policy, information communications, state construction, political communications, information security, power, information
Reference:
Slezin, A.A., Puzyrev, A. Yu..
Soviet Military Propaganda in the Province as a Way to Raise National Defense Capability of a Country before a War
// National Security.
2010. № 5.
DOI: 10.7256/2454-0668.2010.5.57540 URL: https://en.nbpublish.com/library_read_article.php?id=57540
Abstract:
Based on the Materials of the Tombov Region as a typical provincial region of the Central Russia, the authors describe contradictory influence of the Soviet military propaganda on readiness of the state and society for the fight with a foreign enemy. The problem is viewed in the context of transformations of relations between the state and society at the turn of 1930-1940th
Keywords:
social studies, political studies, war, security, information, correlation, Osoaviakhim, province, mass media, propaganda
Reference:
Frolov, D.B..
Information geopolitics and the issues of information security.
// National Security.
2009. № 1.
DOI: 10.7256/2454-0668.2009.1.56226 URL: https://en.nbpublish.com/library_read_article.php?id=56226
Abstract:
Information influence forms one of the key instruments for achievement of strategic advantages in the modern world. The development of the world civilization formed a number of prerequisites to the formation of the modern quality and role of these means and forces of information influence. What is the value of information in modern geopolitics and security issues? The author of this article provides his answers to these questions.
Keywords: strategy, globalization, information, information influence, information security, information policy, geopolitics, interests of the Russian Federation