Статья 'Социально-культурные риски «больших пользовательских данных» российских граждан' - журнал 'Человек и культура' - NotaBene.ru
по
Journal Menu
> Issues > Rubrics > About journal > Authors > About the Journal > Requirements for publication > Editorial collegium > Editorial board > Peer-review process > Policy of publication. Aims & Scope. > Article retraction > Ethics > Online First Pre-Publication > Copyright & Licensing Policy > Digital archiving policy > Open Access Policy > Article Processing Charge > Article Identification Policy > Plagiarism check policy
Journals in science databases
About the Journal

MAIN PAGE > Back to contents
Man and Culture
Reference:

Socio-cultural risks of "big user data" of Russian citizens

Bylevskiy Pavel Gennadievich

ORCID: 0000-0002-0453-526X

PhD in Philosophy

Associate Professor, Department of Information Culture of Digital Transformation; Department of International Information Security, Moscow State Linguistic University

119034, Russia, Ostozhenka str., 36, office 106

pr-911@yandex.ru
Other publications by this author
 

 

DOI:

10.25136/2409-8744.2023.4.43896

EDN:

WEVENQ

Received:

24-08-2023


Published:

05-09-2023


Abstract: The subject of the article is the current socio-cultural risks of Russian citizens as users of computer and telecommunication technologies and Internet communications. The object of the study is the consequences of digital transformation, such as the advantages and threats of automating the generation, collection and analysis of "big user data". The relevance of the topic is due to the adoption by the Russian Government of the "Concept of formation and development of the culture of information security of citizens of the Russian Federation" on December 22, 2022. Socio-cultural risks and threats, including traditional values and identity, associated with being in a "digital" environment and user actions are considered. Special attention is paid to the analysis of threats to Russian citizens from the "electronic totalitarianism" of unfriendly countries and global corporate digital platforms, as well as the possibilities of counteraction. The novelty of the study of socio-cultural risks of information security in the application of the profile system-dynamic culturological approach, evolutionary and structural-functional methods. Taking into account the rapid changes in the landscape of socio-cultural digital risks in recent years, the research materials were Russian scientific publications in the journals of the list of HAC (categories K1, K2) and foreign ones in the international database Scopus (quartiles Q1, Q2) 2021−2023, "critical" for the formation of modern digital threats. A special contribution is the use of developments obtained in the course of research of scientific and practical communications in the information security of the financial sector, conducted under the guidance of the author in 2010-2023. The results of the study are conclusions about the need to take into account the balance of advantages and threats of "digitalization", the management of socio-cultural risks of "big user data" in the interests of Russian citizens. The main conclusion is to determine the decisive role in the development and improvement of the general civil culture of information security not only of the professional activities of state bodies and specialized organizations, but also of all citizens.


Keywords:

big user data, big data analysis, digital sociocultural risks, information security, digital transformation, digital totalitarianism, traditional values, sociocultural identity, disinformation, manipulation of consciousness

This article is automatically translated. You can find original text of the article here.

Introduction

Digital transformation, the universal, ubiquitous, continuous and increasingly diverse application of computer and telecommunications technologies and Internet communications, brings many opportunities unknown before. A necessary condition for using the advantages of digital transformation is the already accomplished transformation of all Russian citizens into users of computer and telecommunications technologies and Internet communications. Almost all citizens live around the clock in the "digital environment", being both objects and subjects of digitalization, their involvement and user activity increases. However, "big user data", including data about citizens, can be used both to improve digital services and to obtain confidential information, as well as to manipulate consciousness, deceit, disinformation, and involvement in destructive activities.

The phenomenon of "big user data" clearly and prominently represents the tendency of increasing the share of socio-cultural factors of information security in comparison with technical and other aspects; the need to develop an appropriate mass culture requires scientific understanding by methods of cultural studies. In order to determine effective means of reducing the socio-cultural risks of automating the generation, collection and analysis of "big user data" of Russian citizens to an acceptable level, cultural analysis is used in this article. The purpose of the article is to establish ways to achieve an optimal balance of advantages and threats of "big user data", the current ratio of which is the object of research. The subject of the study is the current socio-cultural risks of Russian citizens as users of computer and telecommunication technologies and Internet communications.

 1. The problem of balancing the advantages and threats of "digital doubles" of citizens

"Big user data" is a kind of "digital double" of each person and social groups, material for automated analysis in real time of actions, preferences (musical [1], etc.) and habits, for "recognition" of emotions and moods, intentions, feelings and thoughts. The possibilities of their use are twofold, the line between the advantages and risks of digitalization can be very thin, to distinguish the essential nuances requires a high culture of information security, both professional and civil. This facet is capable of gaining momentum, changing: yesterday's advantages can quickly and unexpectedly turn into new threats reaching a critical level.

The rapid development and new applications of technologies are accompanied by large-scale socio-cultural changes and tectonic shifts both at the national level and in international relations, the destruction of unipolar globalism, including in the field of digital services [2]. In such modern realities, in order to maintain the necessary balance of using the advantages and minimizing the associated risks of digital transformation, in particular, "big user data", there was a need for an appropriate mass security culture. Confirmation is the "Concept of formation and development of the culture of information security of citizens of the Russian Federation", adopted on December 22, 2022 by the Decree of the Government of the Russian Federation No. 4088-R.

In ensuring information security, the role of the appropriate culture of citizens, their general caution and lack of illusions about the supposedly trusted nature of the Internet environment, the absence of threats in it is great [3]. Projecting familiar realities onto computer and telecommunication technologies, citizens themselves first of all take care of protecting the secrets of their personal lives (the contents of correspondence and negotiations, documents, photographs, videos, location data, actions, behavior, etc.), understanding the associated risks and threats to reputation, slander, blackmail, copyright infringement, etc. As the anonymity of Internet and mobile users ends, caution increases with regard to the content of mail, voice, video, short message and file exchange, ratings, comments and own publications on the Internet, permissions for external access to applications and data on their mobile devices [4].

Theoretically, any computer data can be identified, directly or indirectly, as user data and personalized (correlated with one or another identified person) by cross-matching various databases. Within the framework of the available data, it is technically possible to establish and legally prove what, where and at what point in time a particular user did, groups of users with almost any statistical coverage. To do this, a study is needed (in the case of security incidents, especially crimes ? an investigation), clarifying the degree and nature of participation in data operations by developers, manufacturers, service providers, users and other people. The greater the danger of an information security incident, the more resources, including highly qualified specialists, are involved, the more detailed the details of "authorship" or involvement in the processing of specific citizens can be.

 "Big user data" is an important area of ensuring information security, both national, public and personal, including the need for a secure civil user culture. On the part of the state, the law protects the privacy of personal life, correspondence, personal financial, medical, biometric and other information, including in digital form. A consistent state policy of protecting citizens' personal data is being implemented, which so far mainly refers only to information about long-term personal social status identifiers recorded in official documents (first name, last name, patronymic, date and place of birth, permanent residence address, etc.).

However, "big user data" at the moment can be considered the most meaningful in terms of the possibilities of automated "knowledge extraction" about citizens and the least protected from the associated threats. So far, both the state and citizens have underestimated the risks associated with "big user data". At the same time, to counter such threats, it is extremely important for citizens to know about their existence, the ability to recognize them, react correctly, and report such incidents to authorized organizations [5]. The problem is becoming clearer as it worsens, caused by the preservation of cross-border Internet communications in new, much less favorable conditions: since 2014, international cooperation in countering cybercrime has significantly decreased, the cross-border aggressiveness of which has sharply increased [6]. Threats have significantly increased and the risks of cross-border fraud, psychological special operations against Russian citizens, cyber-sabotage, anti-Russian actions by unfriendly states and global digital platforms based in the United States have increased.

2. Structural and functional features of "big user data"

Automation of data generation and analysis, in particular, the actual user data, including biometric data, opens up unique, unprecedented opportunities for obtaining the necessary information. Big user data is an electronic digital representation of the parameters of a person's stay as an object and his active actions in computer and telecommunication systems. A variety of "digital footprints" form a "digital double" of the user, constantly updated in real time. Structurally, these data can be divided into two main polar types (with further detailed ranking): the results of conscious actions of users and data about people automatically generated when they are in the range of network digital sensors.

Conscious actions of users in the digital environment are their communication through mobile and Internet communications (voice and video communication, short and mail text messages, file forwarding), ratings and comments, creation and publication of content on Internet resources, social networks and through blogging services. The main equipment in this case are personal computers connected to the Internet, both desktop and mobile. User data includes not only the direct result consciously created by the user (text message, post, etc.), but also a set of recorded accompanying various technical parameters. Internet service providers, direct operators of large user data, have access to the characteristics of the type, manufacturer, software, identification number, etc. of the computer device used, as well as all user actions performed with it: the list and time of viewing Internet resources, running programs, received and sent messages, files, etc.

The second pole of user data is data about people that is automatically generated and processed (transmitted over networks, collected, analyzed and stored) without their participation, and often without their knowledge. Such data about people are generated by "input devices" of personal computers and the "Internet of things" ? wearable computerized devices (gadgets), as well as sensors of the "Internet of things", industrial and household "smart" computer equipment [7]. A striking example is digital video surveillance systems in public places with the possibility of automated face recognition and identification of citizens [8]. Digitization, including remotely, can generate any data about various human parameters that can be crucial: location [9], appearance, voice, speech and accompanying sounds, movements and actions, gestures and facial expressions, smells, pulse and respiratory rate, electroencephalograms and electrocardiograms, etc.

Functionally, the analysis of user data is necessary to support, optimize and improve Internet services and the computer and telecommunications equipment used. Large user data is distinguished not so much by quantitative characteristics, volumes, as by its continuous streaming nature, constant updating in real time. Automation of their analytics allows you to use the results almost without delay to reverse the impact on the user (including large social groups) in interactive real time. Summary analysis of various databases of large user data allows their operators (or buyers) to obtain statistics, which may include classified information, up to state secrets [10]. These possible functions can be performed both in the interests of the user and his home country, and against, in different proportions of combinations of advantages and threats. Such abuses on the part of organizations providing digital services are largely made possible due to the vulnerabilities of the users themselves, insufficient protection of their own user data.

Computer and telecommunication equipment, software and digital services are only technical means of communication of people – socio-cultural subjects. From the point of view of cultural studies, information security protects people's rights to values, and the main source of threats is violators of these rights, people and organizations seeking to benefit at the expense of harming others. Computer and telecommunication technologies are neutral in themselves, but they can be functionally used by people in a fairly wide range for equal mutually beneficial cooperation, and for exploitation, damage, destructive, illegal actions. In the same opposite way, depending on the socio-cultural context, the same "big user data", equipment for their generation and processing can be used. The state policy and the general civil culture of information security are necessary in order to take into account such risks in a timely manner, predict such threats and counteract them.

 3. The evolutionary dynamics of digital socio-cultural threats to Russian citizens

The socio-cultural threats of "big user data", as well as their previously unknown advantages, are due to the technologies of automated analysis, potential "omniscience" about everyone and everyone in the range of sensors of digital network devices. A simple dialectic is that if these technologies are used for the common good, then these are advantages, if for causing damage, then threats. A more complex dialectic is connected with the fact that some people can benefit by causing damage to others, including through digital technologies – and this is already the field of information security. That is why in popular culture there is a very thin, shaky and fluctuating line between utopian and dystopian [11] perception of the possibilities of "artificial intelligence" technologies based on automated analysis of "big user data". Digital "paradise", in which technology does all the work for a person, solves all problems and makes the most important decisions, easily turns into "digital totalitarianism" [12], inspiring false joys and illusory happiness to exploited people plunged into squalor [13]. Spontaneous awareness of such socio-cultural threats has contributed to various criticism and public counteraction campaigns [14].

To what extent, in a particular situation, the use of computer and telecommunications solutions serves mutually beneficial cooperation, and to what extent it is an instrument of destruction, subordination and exploitation, scientific analysis should determine [15]. Countering socio-cultural threats, preventing and minimizing damage to values belong to the culture of information security, the core science is cultural studies. Evolutionary cultural analysis allows us to identify changes in technologies, services, society and culture that have led to the creation of a new landscape of socio-cultural threats to digital transformation, in particular, the role of "big user data". Structural and functional analysis helps to determine the list of current threats, their targets and potential victims, the nature and extent of damage, security measures.

In general, the successful solution in the 2000s of organizational and technical issues of information security, including the protection of personal data, made it possible to reduce the risks of violations, damage from the actions of intruders to an acceptable level. Digital transformation, the transformation of almost all Russian citizens into users of mobile computer devices and the coverage of wireless broadband Internet access led in the 2010s to a qualitative change in the landscape of threats, especially socio-cultural ones. All citizens have become users of computer and telecommunication technologies, the use of Internet services has become one of the primary cultural needs, it turned out to be associated with high-level values, including traditional ones that define socio-cultural identity [16].

Databases of personal data acquired particular value for fraudsters (as well as for unscrupulous advertising and marketing specialists, including political ones) for massive attacks (phishing) [17], the use of which helped to better gain confidence in potential victims [18]. In the "Report of the Center for Monitoring and Responding to computer attacks in the credit and financial sphere of the Information Security Department of the Bank of Russia 1.09.2018 - 31.08.2019)" it was noted: the most frequent target of attackers were not technical means of Internet banking, but socio–cultural, psychological vulnerabilities of customers; the main tool of attacks, instead of the former specialized malicious software (banking "viruses"), became fraudulent tricks ("social engineering"). In social networks and messengers, scammers (also "telephone") and intruders began to act, who encouraged vulnerable users to destructive activity [19], involved them in groups of suicide, drug use, cyberbullying (harassment), "school shootings", extreme behavior, political extremism, etc.

At this time, the phenomenon of "big user data" was formed, automation of thorough and detailed tracking and analysis of the behavior of individuals and social groups, which can serve as a "key" to access other people's values from money to beliefs. For operators of large user data, starting with global digital platforms and services, different formats of trading "big data" of their users have become one of the main sources of profits. Automation of the analysis of political preferences and management of the behavior of employees of organizations [20], users in social networks has led to an increase in socio-cultural risks, becoming a powerful tool for managing political mobilization [21], inspiring coups known as "color revolutions" from the outside, as well as hidden external influence on the internal policy of the victim states.

The trigger that exacerbated the problem of socio-cultural threats to the security of "big user data" was the years 2020-2022. Global strict quarantine measures introduced in 2020 in connection with overestimated estimates of coronavirus threats have led to an abrupt increase in the number of users, the volume of use of financial, educational and other remote services, videoconferencing and messengers, an increase in the list and importance of associated values. The beginning of a Special military operation in Ukraine in 2022 marked an aggravation of the crisis and an increase in the conflict of international relations, the destruction of unipolar globalism, including in the field of digital services [22].

In addition to the anti-Russian technological sanctions of unfriendly states, a high-level socio-cultural threat also manifested itself: global digital platforms, in the spirit of "digital totalitarianism", introduced discriminatory censorship against the official Russian press, journalists and bloggers [23]. User data of Russian citizens and their online behavior began to be used for the production and broadcast of fake news, targeted misinformation, propaganda of gender radicalism and "childfree" [24], "cancellation culture" [25], etc.

 Results

The conducted research shows the complex dynamics of the ratio of advantages and socio-cultural threats and risks associated with the "big user data" of Russian citizens. It is revealed that the transformation of all citizens into users and objects of computer and telecommunication technologies as a result of digital transformation has led to the emergence of critical threats to socio-cultural values. The targets of the attacks were not so much technical devices as the consciousness and personalities of citizens; not only cybercriminals, but also unfriendly states, global digital platforms based in the United States began to act as intruders and violators. The abuses of foreign operators are expressed in the uncontrolled trading of "big user data" of Russians, extracting from them with the help of automated analysis of confidential information used to manipulate consciousness and hidden destructive effects (disinformation) on behavior and deformation of values, socio-cultural identity.

The main conclusion of the study is that countering socio-cultural threats, reducing the risks of "big user data" requires both targeted state measures in the field of information security and the development of a specialized civil culture. State measures include the development of federal legislation in the field of technological and infrastructural support of digital sovereignty, independence from technology imports, obligations of data operators to store and process data on the territory of Russia, as well as the empowerment of state bodies to block access to prohibited content and Internet resources, cancel the registration of domain names, and hold violators accountable.

It is predicted to strengthen the still undeveloped state regulation of the security of "big user data" of Russian citizens; it is necessary to develop legislative regulation of their turnover, initiated in 2018 by Federal Bill No. 571124-7 "On Amendments to the Federal Law "On Information, Information Technologies and Information Protection". There is a need to improve the profile of the general civil culture of information security, the development of training and methodological materials on threats, risks and means of ensuring the security of "big user data", as well as their broadcast to a mass audience by educational organizations, the press and social advertising.

References
1. Serdechniy A.L., Kodenceva N.G., Petelin A.A., Lemeshko A.A., & Ruzhenko V.E. (2021). Risk analysis using an information map of musical preferences. Informaciâ i bezopasnostʹ, 4(24), 601-608. doi:10.36622/VSTU.2021.24.4.013
2. Yakovleva, S.N., & Khamidullin, R.F. (2022). Information risks as a threat to the social security of modern digital society. Izvestiâ Tulʹskogo gosudarstvennogo universiteta. Gumanitarnye nauki, 3, 67-77. doi:10.24412/2071-6141-2022-3-67-77
3. Wang, X., Li, Y., Khasraghi, H., & Trumbach, Ch. (2023). The mediating role of security anxiety in internet threat avoidance behavior. Computers & Security, 134. doi:10.1016/j.cose.2023.103429
4. Rodríguez-Priego, N., Porcu, L., & Kitchen, Ph. (2022). Sharing but caring: Location based mobile applications (LBMA) and privacy protection motivation. Journal of Business Research, 140, 546-555. doi:10.1016/j.jbusres.2021.11.022
5. Jiang, T., Shen, G., Guo, Ch., Cui, Yu., & Xie, B. (2023). BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence. Computer Networks, 224. doi:10.1016/j.comnet.2023.109604
6. Al-Kasasbeh, B. (2022). Model of the information security protection subsystem operation and method of optimization of its composition. Egyptian Informatics Journal, 23(3), 511-516. doi:10.1016/j.eij.2022.05.003
7. Najmi, Kh., AlZain, M., Masud, M., Jhanjhi, N., Al-Amri, J., & Baz, M. (2023). A survey on security threats and countermeasures in IoT to achieve users confidentiality and reliability. Materials Today: Proceedings, 81(Part 2), 377-382. doi:10.1016/j.matpr.2021.03.417
8. Chaplygina, V.N., & Moskvichev, A.A. (2022). Application of facial biometrics for information and analytical support of investigative measures. Forensics: yesterday, today, tomorrow, 1(21), 177-187. doi: 10.55001/2587-9820.2022.29.81.016
9. Lojis, Z.Z., & Chupakhin, R.V. (2022). Actual problems of using geolocation data in the search for minors missing. Rossijskij sledovatel, 4, 23-27. doi:10.18572/1812-3783-2022-4-23-27
10. Bylevskiy, P.G. (2023). User and personal data − risk analysis of knowledge extraction. Information security questions, 1(140), 35-40. doi:10.52190/20732600_2023_1_35
11. Yakovlev, M.V. (2023). The State of ratification and its disciplinary techniques: the orientation of socio-political transformation. Tomsk State University Journal Of Philosophy Sociology And Political Science, 71, 246-259. doi:10.17223/1998863X/71/23
12. Bobrinsky, N.A. (2021). Moscow punitive innovation: interim results. Statute, 6, 89-95. edn: XGHMYM
13. Knorre, B.K., & Murashova, A.A. (2021). "In the beginning there was a word ...", and at the end there will be a number? Orthodoxy and Anti-Digital Protest in Russia: from the 1990s to the coronavirus. Universe of Russia. Sociology. Ethnology, 2(30), 146-166. doi:10.17323/1811-038X-2021-30-2-146-166
14. Iyanna, Sh., Kaur, P., Ractham, P., Talwar, Sh., & Islam, N. (2022). Digital transformation of healthcare sector. What is impeding adoption and continued usage of technology-driven innovations by end-users? Journal of Business Research, 153, 150-161. doi:10.1016/j.jbusres.2022.08.007
15. Gaivoronskaya, Ya.V. Wings of Icarus: about the risks and threats of digital transformation of society. (2021). Advances in Law Studies, 4(9), 81-85. doi:10.29039/2409-5087-2021-9-4-81-85
16. Skudnova, T.D., & Ivanchenko, O.V. (2022). Transformation of Russian identity in conditions of social uncertainty: transdisciplinary analysis. Social and Humanitarian knowledge, 2, 207-215. doi:10.34823/SGZ.2022.2.51786
17. Zavyalov, A.N. (2022). Internet fraud (phishing): problems of counteraction and prevention. Baikal Research Journal, 2(13). doi:10.17150/2411-6262.2022.13(2).36
18. Frank, M., Jaeger, L., & Ranft, L. (2022). Contextual drivers of employees' phishing susceptibility: Insights from a field study. Decision Support Systems, 160. doi:10.1016/j.dss.2022.113818
19. Galyashina, E.I., & Nikishin, V.D. (2021). Destructive speech behavior in the digital environment: factors determining the negative impact on the user's worldview. (2021). Lex Russica, 6(175), 79-94. doi:10.17803/1729-5920.2021.175.6.079-094
20. Ogbanufe, O. (2021). Enhancing End-User Roles in Information Security: Exploring the Setting, Situation, and Identity. Computers & Security, 108. doi:10.1016/j.cose.2021.102340
21. Denisenko, P.V., & Esiev, E.T. (2021). Internet technologies as a tool of political mobilization in the era of big data. Political science issues, 11(4(68)), 1115-1121. doi:10.35775/PSI.2021.68.4.017
22. Levashov, V.K., & Grebenyuk, O.V. (2022). Actual changes in social networks and the digital environment during the special military operation in Ukraine. Social and Humanitarian knowledge, 8(2(30)), 204-213. doi:10.18255/2412-6519-2022-2-204-213
23. Rovinskaya T.L. (2022). Freedom of speech in the conditions of digital dictatorship of IT corporations. Polis. Political Studies, 2, 22-36. doi:10.17976/jpps/2022.02.03
24. Slyshkin, G.G., Malygina, L.E., & Pavlova, E.S. (2022). Radical feminine and masculine media discourse in the aspect of linguistic security. Verhnevolzhski philological bulletin, 2(29), 53-60. doi:10.20323/2499-9679-2022-2-29-53-60
25. Bylevskiy P.G., & Tsatskina, E.P. (2022) Phenomenological analysis of the phenomenon of "cancellation culture". Vestnik of Moscow State Linguistic University. Humanitarian sciences, 2(857), 162-169. doi:10.52070/2542-2197_2022_2_857_16

Peer Review

Peer reviewers' evaluations remain confidential and are not disclosed to the public. Only external reviews, authorized for publication by the article's author(s), are made public. Typically, these final reviews are conducted after the manuscript's revision. Adhering to our double-blind review policy, the reviewer's identity is kept confidential.
The list of publisher reviewers can be found here.

In the peer-reviewed article "Socio–cultural risks" of large user data of "Russian citizens", the subject of the study is the modern socio-cultural risks of Russian citizens as users of computer and telecommunications technologies and Internet communications. The purpose of the study follows from the title of the work and is formulated in the work as follows: to establish ways to achieve an optimal balance of advantages and threats of "big user data". The methodology of the study is not explicitly indicated. The author uses the analytical method as a research method, which is used to diagnose problems and create hypotheses that allow them to be solved. In the work, this method was used to consider the problem of balancing the advantages and threats of "digital twins" of citizens, revealing the structural and functional features of "big user data", identifying the evolutionary dynamics of digital socio-cultural threats to Russian citizens. The relevance of this study is due to: firstly, the growing trend of datafication of human life; secondly, the real threats to the information security of the individual and his consciousness in the face of increasing destructive information impact; thirdly, the need and public need to create the foundations of a system of parrying and localization of threats. The scientific novelty of the publication is related to the substantiation of the position that the transformation of all citizens into users and objects of computer and telecommunication technologies as a result of digital transformation has led to the emergence of critical threats to socio-cultural values. The work shows that the objects of attacks were not so much technical devices as human consciousness; not only cybercriminals, but also unfriendly states began to act as intruders and violators. The analytical study showed that countering socio-cultural threats and reducing the risks of "big user data" requires both targeted government measures in the field of information security and the development of a specialized civil culture. It can be assumed that, according to the author, these are the ways to achieve an optimal balance of the advantages and threats of "big user data". The conclusions formulated in the article are generally justified. The content meets the requirements of the scientific text. However, it is worth noting that the problem of risks is not disclosed in the article (in fact, the risk in the work is identified with threats, but this is far from the case). This study is characterized by general consistency and literacy of presentation. The article has a good level of scientific conceptualization. It will be of interest to specialists researching the problems of information security in a socio-cultural context. The bibliography of the work includes only 25 publications and includes editions in both Russian and foreign languages. Thus, the appeal to the main opponents from the area under consideration is fully present. Conclusion: The article "Socio-cultural risks" of large user data of "Russian citizens" has scientific and theoretical significance, corresponds to the branch - sociological sciences. The work can be published.
Link to this article

You can simply select and copy link from below text field.


Other our sites:
Official Website of NOTA BENE / Aurora Group s.r.o.