по
Security Issues
12+
Journal Menu
> Issues > Rubrics > About journal > Authors > About the Journal > Requirements for publication > Editorial collegium > Peer-review process > Peer-review in 24 hours: How do we do it? > Policy of publication. Aims & Scope. > Article retraction > Ethics > Copyright & Licensing Policy > Publication in 72 hours: How do we do it? > Digital archiving policy > Open Access Policy > Open access publishing costs > Article Identification Policy > Plagiarism check policy
Journals in science databases
About the Journal

MAIN PAGE > Journal "Security Issues" > Contents of Issue № 02/2019
Contents of Issue № 02/2019
Technologies and methodology of security systems
Mitin A.Y. - Armed Confrontation Modeling. Experience of the Foreign States pp. 1-9

DOI:
10.25136/2409-7543.2019.2.28626

Abstract: The article is devoted to the development of the simulation modeling of military actions based on the USA army experience. In his research Mitin has discovered that various kinds of modeling have been used to gain practical experience in managing military subdivisions since ancient times. With the developing mathematics and computers, simulation and modeling have reached a new level. The researcher demonstrates that at the present time simulation is actively used by the USA as part of their armed military training. The USA uses standartized solutions which ensures compatibility of all systems at all levels of management. In his article Minin discovers the problem from the point of view of systems evolutionary approach by studying and generalising accumulated experience in the use of simulation systems by the USA army. The experience analyzed can be used to develop Russian information technologies to support the management of military forces during armed confrontation including that to defeat attack of critically important facilities and to substantiate relevant solutions. 
Shumov V.V., Malitsky K.T. - Evaluating the Levels of Security and Socio-Political Tension in Russia's Regions pp. 10-23

DOI:
10.25136/2409-7543.2019.2.29430

Abstract: Today there is a growing threat to Russia's national security both from the side of certain states and blocks (sanctions, trade wars, NATO placing their forces close to Russian borders, etc.) and traditional threats such as illegal migraton from other countries, cross-border crime, etc.). Slow pace of economic growth, social stratification and other factors have a negative influence on the society and make it necessary to study the levels of security and socio-political tension in Russia's regions. Thus, the object of the research is the social, ethnic and economic processes in different regions that influence the security and socio-political tension therein. The subject of the research is the model of security and  index of socio-political tension in regions. To analyze security processes, the researchers have used systems approach, complex approach, historical approach, regional statistics and social research methods (rating and indexes) as well as mathematical methods to evaluate parameters of the model. The modeling results complete views of specialists in the theory and practice of security. The researchers also compare the results to research data in related areas (mathematical models of tension in regions, life quality rating, human development index). It is recommended to apply the research results in the sphere of management and government to create scenarios of socio-political development, to timely discover threats to national security and substantiate measures aimed at ensuring national, state, social and other kinds of security. 
External threats and countermeasures
Tikhanychev O.V. - Cyber Intelligence as a Threat of Information Era pp. 24-33

DOI:
10.25136/2409-7543.2019.2.26787

Abstract:   The object of the research is the process of collection information about important events and phenomena through indirect methods. The subject of the research is the methods of collecting information about objects in cyber space. In his review article Tikhanychev states that ensurance of secrecy has always been an important principle of military. However, while earlier secrecy was maintained mostly in physical space, later it was transferred to radioelectronic and other spheres. With the beginning of post-industrial era and network-centered wars, new methods of collecting information on the Internet were created which made intelligence agencies to develop relevant countermeasures. To describe such measures the author of the article has used the method of technology analysis used by intelligence Internet communities to collect information. Based on the analysis, the researcher offers countermeasures. The main conclusion of the research is that post-industrial era has brought more opportunities for government and non-government structures to collect information through open sources such as social networks, based on indirect signs of electronic devices' functioning, and others. According to the researcher, in order to counter these methods, it is necessary to switch from passive measures of data protection, processing and exchange to active principles of information protection. The researcher offers a number of short-term and long-term organizational and technical measures to ensure this principle. 
Confrontation and defense potentialities
Kovalev A.A. - Prospects for Creating the Unified Army in the European Union Outside NATO pp. 34-41

DOI:
10.25136/2409-7543.2019.2.27109

Abstract: The subject of the research is the process of legislative provision for creation of sub-divisions that ensure security of European Union states. Providing that security of all EU countries is part of their foreign relations, military units act as such sub-divisions. In his article Kovalev demonstrates that this solution ensures participation of foreign expeditionary forces. He analyzes legislative initiatives and their potential implementation depending on the degree of participation of each member state in global peacekeeping operations. The research method used by the author is the comparative characteristic of the use of national military forces in each EU country as well as forecasting method that defines potential participation of a EU country in international expeditionary activities. The novelty of the research is caused by the fact that for the first time in the academic literature the author analyzes opportunity for legislative provision of building a military block based on European initiative. The researcher describes ways for implementation of the aforesaid agreement, relevant support measures and sets goals for the use of the EU countries initiative in terms of global security. The author uses direct comparison of NATO block as a centralised model built according to the sample and targets of global security based on the USA initiative and de-centralized model of European states unitiative.
Person and citizen within security systems
Tikhanychev O.V. - Regarding the Applied Use of Risk Models pp. 42-51

DOI:
10.25136/2409-7543.2019.2.27633

Abstract: The object of the research is the process of inter-state confrontation based on the soft power methods. The subject of the research is the methods of modelling personal risks of socio-political process participants and forecasting consequences of the use of social technologies that destabilize society as well as relevant counter measures. This is a review article that is devoted to the analysis of destructive technologies used in the process of inter-state confrontation within the soft power methods. Tikhanychev analyzes the main factors and risks considered by each individual during decision making process including those within social processes. For quantitative substantiation of these methods, the author offers to use geometric interpretaiton of probability cost estimation risk model that is practically used in technology and economics as well as by each individual in his or her decision making process subconsciously. The author analyzes behavioral patterns of models as well as possibility to influence individual's behavior through modification of these patterns. The researcher concludes that such influence is possible and describes some variants thereof. At the end of the article the researcher sets a target to develop a risk assessment model that would evaluate methods of soft power technology counteraction. 
Other our sites:
Official Website of NOTA BENE / Aurora Group s.r.o.
"History Illustrated" Website