Reference:
Tumysov I.A..
The issue of research methodology of group political values.
// National Security.
2018. № 3.
P. 58-69.
DOI: 10.7256/2454-0668.2018.3.22211 URL: https://en.nbpublish.com/library_read_article.php?id=22211
Abstract:
The author meticulously examines such aspects of the subject as the difficulties of empirical research of political values, dependence of research methods and their combination choice on the goals of the research and the probable goals themselves, specifics of qualitative and quantitative methods in terms of scientific axiological endeavors, the main political values classifications used in scientific literature. The work demonstrates the logic of the proposed approach on the example of a real empirical research, which concerns the study of the hierarchy of political values of such social group as modern students. To answer the question of optimal research method of group political values the author uses the traditional method of the scientific sources analysis. Author’s contribution to the study of the issue lies in identifying the main goals and the most adequate types of political values research methods. The scientific novelty of the study is in determining the number of difficulties encountered by scientists dealing with value issues. Readers will be able to not only choose the aim of their group political values research, but also select an optimal set of qualitative and quantitative methods for their study.
Keywords:
hierarchy of political values, classification of political values, a set of political values, quantitative methods, qualitative methods, methodology of value study, political values, national political culture, political sociology, political science
Reference:
Akunchenko E.A., Damm I.A., Shchedrin N.V..
Anti-corruption security of electoral process: state and prospects
// National Security.
2018. № 1.
P. 49-71.
DOI: 10.7256/2454-0668.2018.1.25323 URL: https://en.nbpublish.com/library_read_article.php?id=25323
Abstract:
This article presents the results of work of the third Siberian Anti-Corruption Forum with international participation “Anti-corruption Security of Electoral process: State and Prospect” that was held on December 7, 2017 in the Siberian Federal University (Krasnoyarsk). Rich program of the event allowed viewing the key problems of examination and prevention of corruption in electoral process form various perspectives. Among the forum participants were the leading Russian and foreign scholars, heads and employees of the law enforcement agencies, representatives of government authorities, mass media, and civil society institutions. The key topics of the scientific practical dialogue became the general questions of corruption control in the Russian Federation, as well as specific issues of examination and organization of prevention of electoral corruption. The forum participants have discussed the major trends in development of the state anti-corruption policy in the area of protection of electoral rights of the citizens; formulated a number of propositions aimed at increasing efficiency of preventing corruption during the organization and conduct of elections; as well as acknowledged the need for implementation of the extensive anti-corruption awareness and education program for the majority of subjects of the electoral process.
Keywords:
lobbying power, abuse of law, bribery of voters, electoral techniques, national security, electoral process, elections, corruption, election campaign, dummy candidate
Reference:
Yurchenko, A.V..
For the future managers on the need
to take into account the security functions
when managing a business.
// National Security.
2014. № 1.
P. 128-142.
DOI: 10.7256/2454-0668.2014.1.63901 URL: https://en.nbpublish.com/library_read_article.php?id=63901
Abstract:
The object of study is the further
development of the optional course “Security of entrepreneurial activity” for a wide range of
students at the National Research University —
Higher School of Economics. The author
has developed a new course “Managing the
business security systems’ especially for the
4th y ear s tudents f or t he B achelor’s d egree a t
the management faculty. The methodologically
organized studies show the possibility for the
adaptation of the interdisciplinary course for
the specialized audience. Just like the previous
course, the “Managing the business security
systems “course is developed for the first time.
The competence, which the students have
gained during their third year of studies have
formed a sufficient basis for the studies within
the framework of this course. The experience
shows that in the near future the authors
shall negotiate with their colleagues having
related course in order to provide a qualified
solution of connecting disciplines and mutual
complementing of courses. The measures are
taken to develop several study disciplines on
business security, which may logically continue
the professional study programs for the students
of one specialty, allowing to provide the students
with additional spheres of competence, which
they could use efficiently in their practical
activities after graduation.
Keywords:
entrepreneurial activities, business, management, marketing, security systems, complex security of an enterprise, target audience, competences, Bachelor’s program, decomposition principle.
Reference:
Mikhailova, A.V..
The method of preliminary examination of
potential contracting parties
via the Internet resources.
// National Security.
2014. № 1.
P. 143-152.
DOI: 10.7256/2454-0668.2014.1.63902 URL: https://en.nbpublish.com/library_read_article.php?id=63902
Abstract:
This article was written based on the
results of course “Security of entrepreneurial
activity”, and it is devoted to the methods of
studying potential contracting parties with the
use of Internet. As an illustration for the distance means of gaining information about the potential
contracting parties the author methodologically
provides examples of popular schemes in the
Internet community, and they are based upon
lack of information in one of the parties. Novelty
of the material is due to the fact that it is aimed
at the youth audience, actively using Internet
resources for business purposes. Taking this
fact into consideration, today the enterprises no
matter what size they are should protect their
commercial secrets carefully and at the same
time use commercial intelligence. Within the
context of this work, the author evaluates the
information of potential contracting parties,
since in the everyday life individuals often
have to do with the contracting parties, and not
competitors. Additionally, collection of such
information is easier to bring into system, while
competitor monitoring is often personalized and
it requires certain professional knowledge and
capacities within the relevant field.
Keywords:
contracting parties, personal data, Internet, social networks, monitoring, scamming, disinformation, business intelligence, infobusiness, law on information.
Reference:
Kutyina, M.M..
Comparative analysis
of modern Russian and foreign
entrepreneurial risks classifications.
// National Security.
2014. № 1.
P. 153-161.
DOI: 10.7256/2454-0668.2014.1.63903 URL: https://en.nbpublish.com/library_read_article.php?id=63903
Abstract:
This article was written after taking the
course “Security of entrepreneurial activity”,
and it is devoted to comparison of Russian and
foreign entrepreneurial risks classifications.
The author uses comparative method in order to
compare the approaches towards entrepreneurial
risks in Russian and foreign science, then
comparing some of classifications of such risks,
establishing and analyzing their specificities.
The novelty of the article is due to the fact that
it is a first modern attempt to compare Russian
and foreign risk management schools with their
differing approaches. This article includes
analysis of various approaches to understanding
entrepreneurial risks by Russian and foreign
scientists, as well as various systems for their
classifications. Finally, it is noted that Russian
and foreign risk classification systems (as well
as approaches to understanding entrepreneurial
risks as such) have significant similarities, while
having a number of specific features. Perhaps,
these specificities reflect specific features and
problems of certain business environments.
Keywords:
entrepreneurship, security of entrepreneurial activity, risk management, e nt r e p r e ne u r ia l r i sk, cla s si f ic at ion of entrepreneurial risks, possible changes measures, unfavorable result, business, analysis, control.
Reference:
Borovkov, M.S..
Complex of preventive measures
for protection of business
against hostile takeover.
// National Security.
2014. № 1.
P. 162-170.
DOI: 10.7256/2454-0668.2014.1.63904 URL: https://en.nbpublish.com/library_read_article.php?id=63904
Abstract:
The object of studies in this article is
one of the divisions of the theory of takeovers
and mergers in business, namely, hostile
takeover, and the article is written after taking
the course “Security of entrepreneurial activity”.
Methodologically, the author provides an
overview of the scientific publications on foreign
and Russian practice. He provides theoretical
analysis of the main elements, models and
possible strategies for the protection against
hostile takeovers. The author pays special
attention to the Russian situation, involving
the Russian legislation and practical examples.
For the first time the author used Redel Group
factual data for the analysis. Most of the
strategies should be applied together for a
maximum results. The pills, the parachutes and
supermajority should be displayed publicly in
order to lower the possibility of future takeover
and raising the price of shares. The protection
of assets, strategic alliance and strategic
acquisition should be used only in emergency
situations. The author concludes that the situation in the Russian market of mergers and
acquisitions is not as tragic, as it seems. In spite
of the domination of the administrative resource,
lack of development of the financial market, lack
of friendly takeovers, and corruption, one may
protect his own business, if he takes care of it
in advance.
Keywords:
mergers, conglomerate, hostile takeovers, share, asset, resource, two-level offer, the Russian Federation, white knight, poison pills.
Reference:
Cherkasov, V.N..
Is it still possible to establish the rating?
(Some thoughts on the monograph by
Y. A. Shumilov. Introduction into legal
scientometrics.
// National Security.
2013. № 6.
P. 151-160.
DOI: 10.7256/2454-0668.2013.6.63881 URL: https://en.nbpublish.com/library_read_article.php?id=63881
Abstract:
The problem of establishing the rating
of a scientist has both scientific and practical
dimensions. This approach is used to establish
(mostly in other states, but lately in Russia as
well) the level of journals, quality of article
published in them, funding for the research,
employee evaluation, their hiring in monitoring.
Taking into account these criteria, the activities
of the higher education institutions and scientific
research institutes is evaluated, and decisions
are made of whether specific institutions should
exist or not. The article contains critical analysis
of the negative features of the method used
for establishing the rating by the author of the
monograph and also by some scientific electronic
resources, and some practical examples are
provided. The author proposes to take measures in
order to improve the method for rating calculation
by involving some additional markers. The author
substantiates the need to include correcting
coefficients, and provides a new formula for rating
calculation. Since currently the rating is mostly
based upon a single criterion — citedness, the
author offers a number of additional markers,
such as number of publication (with the corrective
coefficients offered by the author), the edition size,
impact-factor, presence of works of the author in
the Internet, number of views and downloads of
his works. It may be considered that the use of
the above-mentioned calculation methods shall
considerably improve the authenticity of ratings.
Keywords:
rating, marker, coefficient, impactfactor, Hirsch index, Internet, list of journals indexed, Russian Science Citation Index, scientific electronic library, Dissernet.
Reference:
Yurchenko, A.V..
On the experience of organization of the all-University
additional course on the issues of security of entrepreneurial
activities in the National Research University
“Higher School of Economics”.
// National Security.
2013. № 1.
P. 157-164.
DOI: 10.7256/2454-0668.2013.1.62352 URL: https://en.nbpublish.com/library_read_article.php?id=62352
Abstract:
This article includes information on the experience of
organization of the all-University additional course
on the issues of security of entrepreneurial activities
for the students for bachelor and master degrees in
the National Research University “Higher School of
Economics”. In the point of view of the author, the
students of various majors, who shall gain bachelor
degrees in the spheres of economics, management,
social studies, psychology, business informatics and
other spheres of knowledge, should come to the state
government bodies and economics with due knowledge
on security guarantees for the private persons
and legal entities, who are subjects of modern market
relations. The course is aimed for the students who
probably shall not work in the security divisions of
companies or for the security organizations.
Keywords:
entrepreneurial activity, business, security sphere, management, complicated security system, targeted audience, higher education.
Reference:
Gorokhova, D.I..
The Council of Europe Convention in the sphere of
protection of individuals in the sphere of automatic
processing of the personal data.
// National Security.
2013. № 1.
P. 165-170.
DOI: 10.7256/2454-0668.2013.1.62353 URL: https://en.nbpublish.com/library_read_article.php?id=62353
Abstract:
This article is written based on the report, which was part
of the course on “Security of Entrepreneurial Activities”.
It is devoted to the principal issues regarding rights of
individuals in the process of automatic processing of
personal data. The author evaluates the legislation of the
EU and the Russian Federation in this sphere, and she
pays attention to one of the key directions in the modern legal practice in the sphere of protection of personal data
of physical persons from unlawful use and disclosure.
Keywords:
jurisprudence, protection, personal data, unlawful disclosure, the Council of Europe Convention, the Russian Federation, ratification, Federal Service for Supervision in the Sphere of Telecom, Information Technologies and Mass Communications, technical regulations, limitations.
Reference:
Kiselev, N.S..
Preventive measures against raider hostile takeovers.
// National Security.
2013. № 1.
P. 171-178.
DOI: 10.7256/2454-0668.2013.1.62354 URL: https://en.nbpublish.com/library_read_article.php?id=62354
Abstract:
This article is written based on the report, which was
part of the course on “Security of Entrepreneurial Activities
”. It is devoted to the topical issue of raider hostile
takeovers. The author provides directions for the
formation of preventive security system in a company,
and mentions various means of protection from raider
hostile takeovers. He also provides practical examples
of raider hostile takeovers.
Keywords:
jurisprudence, raiders, security, hostile takeover, attack, protection, enterprise, shareholders, credit debt, preventive measures.
Reference:
Krivenko, S.G..
The use of offshore companies in implementation
of dubious financial deals and legal risks for the
contracting parties.
// National Security.
2013. № 1.
P. 179-184.
DOI: 10.7256/2454-0668.2013.1.62355 URL: https://en.nbpublish.com/library_read_article.php?id=62355
Abstract:
This article is written based on the report, which was
part of the course on “Security of Entrepreneurial Activities
”. It is devoted to the legal aspects of business
with the use of offshore companies, and the legal risks
for the contracting parties of such companies. These
materials allow the future corporate law professionals
to learn more about the sphere of activities, which
contains reputation risks for the good faith business,
as well as about the possible use of Russian companies
in the legalization of criminal income and the legal
consequences of such acts.
Keywords:
jurisprudence, offshore zones, minimized taxation, laundering of income, terrorism financing, ß y-by-night organizations, legal risks, reputation risks, contracting parties, unlawful activities.
Reference:
Smirnova, E.S..
Foreign legal experience of dealing with the naturalization problems regarding the service
of foreign citizens in the armed forces of the EU.
// National Security.
2011. № 3.
P. 215-220.
DOI: 10.7256/2454-0668.2011.3.58393 URL: https://en.nbpublish.com/library_read_article.php?id=58393
Abstract:
The article is devoted to the study of international legal cooperation of the EU states in the sphere of defense, as
well as their cooperation in the sphere of naturalization of the young citizens of the EU, and to some history of
the European Defense Agency, united foreign and police forces of the EU in the XX century.
Keywords:
jurisprudence, security, state, union, law, service, foreigners, contract, agreement.
Reference:
Zemlyantsky, I.N..
Peculiarities of formalized studies of individual capital reproduction.
// National Security.
2011. № 2.
DOI: 10.7256/2454-0668.2011.2.58173 URL: https://en.nbpublish.com/library_read_article.php?id=58173
Abstract:
The author describes methodological and methodical peculiarities of modeling of reproduction processes, taking
a linear – dynamic model as an example. The author shows the peculiarities of the formation of the graphic model,
as a supporting instrument, while forming the EM – models in order to make it more adequate to the process,
which is modeled.
Keywords:
economics, reproduction, capital, modeling, theory, process, growth, method, instrument, forecast.