по
Security Issues
12+
Journal Menu
> Issues > Rubrics > About journal > Authors > About the Journal > Requirements for publication > Editorial collegium > List of peer reviewers > Review procedure > Policy of publication. Aims & Scope. > Article retraction > Ethics > Legal information
Journals in science databases
About the Journal

MAIN PAGE > Journal "Security Issues" > Contents of Issue № 03/2018
Contents of Issue № 03/2018
Informational support of national security
Abazov K.M. - Using Modern Information and Communication Technology by International Terrorist Organizations pp. 1-9

DOI:
10.25136/2409-7543.2018.3.26406

Abstract: The subject of the research is information and communication technology that can be used by today's international terrorist organizations for their purposes. The author of the article focuses on the main means that are used by today's terrorist organizations on the Internet: propaganda (including radicalization, recruiting and terrorist instigation), financing (crowdfunding and others) and computer attacks. The authors also analyze the main documents (conventions and resolutions) of the Council of Europe and United Nations Security Council. To analyze the problem, the author has used the systems approach and comparative methods as well as analysis of international law documents. To make conclusions, the author has used the method of synthesis. The scientifiс novelty of the research is caused by the importance of fight against international terrorist organizations for many states and countries. This problem cannot be solved by each country individually, without cooperation and mutual efforts. To solve the problem, the author suggests to create legal mechanisms and sign an international treaty that would contribute to fighting against terrorist organizations in the cyber space. 
Staffing of national security
Kuznetsova N.V. - Personnel Vulnerabilities of Organization Security pp. 10-21

DOI:
10.25136/2409-7543.2018.3.26238

Abstract: The problems of discovering and evaluating vulnerabilities of organization security provoke great interest of both Russian and foreign researchers. This is caused by the fact that market economy conditions create a great number of risks and threats, both for and from personnel, which predetermines high demands for morals and ethics of employee's personality, his or her professional and psychological dependability. In her article Kuznetsova analyzes approaches to evaluation and identification of personnel vulnerabilities of organization security and describes their kinds, personnel vulnerabilities and professionally important qualities of personnel as well as personnel vulnerability before external environment. The main research method used by the author of the article is the expert survey (questionnaires given to human resources departments and security departments of Irkutsk organisations). To evaluate personnel vulnerabilities of organization security, the author has suggested to use a safe employee profile which is an empirically constructed combination of qualitative features (the most important qualities, personality traits and behavioral patterns) that are typical for employees whose activity do not create threats for organization security. Using this method, the author has described requirements for employees in terms of secure business and has assessed their intensity. The author has also evaluated opportunities of using the aforesaid profile in managing personnel security officials and underlines that the profile can be used in practical management of human resources, in particular, at the stages of hiring employees and their promotion and career development. 
Doctrine
Damm I.A. - pp. 22-33

DOI:
10.25136/2409-7543.2018.3.26684

Abstract:
System and interaction
Finogeev A.G., Vasin S.M., Gamidullaeva L.A., Finogeev A.A. - pp. 34-55

DOI:
10.25136/2409-7543.2018.3.26619

Abstract:
Technologies and methodology of security systems
Shumov V. - Network structures for the integration and disintegration of political actors (on the example of EU countries) pp. 56-77

DOI:
10.25136/2409-7543.2018.3.26263

Abstract: Insufficient economic growth rates, security problems, the expected exit of the UK from the EU prompt further re-search into the analysis of the processes of integration and disintegration of supra- and interstate entities. The paper presents a security model of the state, consisting of two components - development functions and conservation functions. The development function in the form of a three-factor power production function takes into account the population size of the country, its area, urbanization, gross domestic product per capita and natural population growth. The conservation function operates with variables such as: the share of the state-forming ethnos from the population of the country, the parameters of attraction and ethnic heterogeneity. The verification of the security model was carried out using the example of the EU countries. A model for the security of supra- and interstate political entities (unions) is developed, taking into account the degree of integration between individual countries (the share of state functions transferred to the Union). For the EU countries, an assessment of the heterogeneity parameter relative to the allied country, Germany, has been carried out.
Globalization and national security
Melkumian K.S. - Financing of terrorism: trends of the 21st century with Syrian accent pp. 78-93

DOI:
10.25136/2409-7543.2018.3.23120

Abstract: The subject of the study is the system of financing of terrorism in its broad context, including sources, channels and funding entities. Recognizing the financing of terrorism as an independent subject area requiring special efforts of the international community, the author pays special attention to the key trends in the financing of terrorism of the 21st century in accordance with the characteristics of the modern financial system, the introduction of technologies into the financial system, and political instability, typical for both regions of increased risk of terrorism and the world political system as a whole. Considering the financing of terrorism in integrity, the author engages a systematic approach, comparative analysis and synthesis as the main methods of research. Using a retrospective view, the author comes to the conclusion that the spectrum of sources, channels and actors involved in the financing of terrorism has expanded. Modern technologies, including social networks and new payment systems, provided a broad platform for terrorist organizations to maneuver. The author emphasizes the problem of involving professionals to financial management of terrorist organizations both in terms of increasing the profitability of terrorist assets and handling terrorist operations through financial institutions in accordance with the specifics of the current AML/CFT regime. Within the framework of the article, the analysis of the terrorism financing system is presented for the first time in connection with the current Syrian crisis, the activities of ISIL, as well as the terrorist attacks taken place in the 21st century.
Other our sites:
Official Website of NOTA BENE / Aurora Group s.r.o.
"History Illustrated" Website