National Security - rubric Technologies and methodology of security systems
ïî
National Security
12+
Journal Menu
> Issues > Rubrics > About journal > Authors > Council of Editors > Concept of the Journal > Requirements for publication > Peer-review process > Article retraction > Ethics > Online First Pre-Publication > Copyright & Licensing Policy > Digital archiving policy > Open Access Policy > Article Processing Charge > Article Identification Policy > Plagiarism check policy > Editorial board
Journals in science databases
About the Journal
MAIN PAGE > Journal "National Security" > Rubric "Technologies and methodology of security systems"
Technologies and methodology of security systems
Ivanov V.V. -
Abstract:
Artamonova Y.S. -
Abstract:
Pogodina I.V., Fraimovich D.Y. -
Abstract:
Gazimagomedov G.G., Davydov L.V. -
Abstract:
Ursul A.D. -
Abstract:
Tsaregorodtsev A.V., Kachko A.K. -
Abstract:
Petrenko, A.I. - General characteristics of psychological operations. pp. 0-0
Abstract: The article is devoted to the definition and nature of the term “psychological operations”. The author attempts to classify the psychological operations, based on their scale, the sphere of their application, level of participants, intensity and longevity, the general character of influence. The author also singles out key stages of psychological operations, characterizes the general principles of information and propaganda actions within the psychological operations. The article is concluded with the characteristics of the key structural elements of psychological operations. Keywords: psychological operations, information and propaganda actions, planning of psychological operations, disinformation, lobbying, manipulation, propaganda, crisis management, blackmail, terror
Manoilo, A.V. - Psychological operations: models and technologies of conflict management. pp. 0-0
Abstract: This article examines cultural and civilization approaches to modern models, methods and technologies of psychological management of international and internal political conflicts. In today’s world there is a vast multitude of various methods, means and technologies for psychological warfare to impact conflicts. However, a detailed analysis shows that all of them have clear cultural and civilization-related difference and can be conditionally combined within the framework of four primary ideological approaches: Anglo Saxon, Eastern Asiatic, Middle Eastern (Islamic) and Western European (Roman-Germanic). Keywords: psychological operations, information and psychological wars, conflict management, business, politics, tactics, strategy, tactical schemes, influence, information management, negotiations
Manoylo, A.V. - Psychological operations in political and economical competition pp. 0-0
Abstract: Psychological operations are just as widespread in business, as they are in international relations, and their organizational forms and tactical schemes are various, as well as the objects of influence. These operations are characterized by active use of modern technologies for the formation of public opinion, as well as the technologies of aimed influence on the leaders in the sphere of business – decision – makers. Keywords: psychology, national security, psychological operations, political conflicts, economic competition, raiders, non-friendly mergers, business, technologies of psychological influence, information warfare
Misnik, G.A. - Specific features of harm, which is caused by ecological offences. pp. 0-0
Abstract: The author offers his own vision of the current situation in Russian legislation, judicial and administrative practice, which formed in the sphere civil law and ecological prescriptions, which form the institution of compensation of ecological harm. This article may be useful not only to legal practitioners (that is, judges, prosecutors, employees of ecological bodies), but also to the people, whose constitutional rights, property and health are harmed really or potentially. Keywords: jurisprudence, security, risk, ecology, offence, use of nature, harm, loss, compensation
Vyborny. A. N. - Methodological Principles of Measuring Resources Required for Maintaining Security Measures for the People Subject to the Protection of the State pp. 0-0
Abstract: The article entitled: «Methodological principles of measuring resources required for maintaining of the security measures for the people subject to the protection of the state» dwells upon the questions of the program goal-oriented planning of the activities of the state executive authorities. The article is of the interest for the specialists in the field of management of federal authorities dealing with security measures, law-enforcement agencies, and other executive authorities of the Russian Federation, researchers and educational facilities.
Keywords: economics, economical security, indicators of investment, security, economy, financial policy, state protection, target programs, state power and executive power
Manoilo, A. V. - Ango-Saxon Model of Operations in Information and Psychological War pp. 0-0
Abstract: The article describes the Anglo-Saxon model of a psychological operation based on using technologies of political polarization, political stratification and management of group behavior through activation of ‘anchor’ opinions and initiation of chain behavior.
Keywords: psychology, Anglo-Saxon model, operations of information and psychological war, national security, information security, information technologies, conflicts, psychological war, psychological technologies, international relations
Stepanenko, V.S. - Tendencies, goals and means of realization of ecological policy in the sphere of dealing with waste in the EU and in Russia. pp. 0-0
Abstract: The article includes analysis of defi nition and structure of ecological policy in its comparative legal aspects and implementation in the EU and its Member States, as well as in Russia. The author singles out the economic, ecological, social and psychological factors, which infl uence the formation and implementation of ecological policy.
Keywords: jurisprudence, environment, hazardous substances, ecological security, ecological crisis, ecology, globalization, waste, politics, law
Ursul, A.D. - Problem of security and synergy. pp. 0-0
Abstract: The article is devoted to the possibilities of use of synergy as one of the key general scientifi c approaches in order to study security, having mostly information-related character for the social system. The security is related to up-keeping of the cybernetic system in the condition of infl uence of negative inner and outer factors. The author shows that the most effi cient means to ensure security is on he way of self-organization, complication, and greater information contents of the social system, and not on the way of its isolation and protection.
Keywords: social studies, security, the law of necessary variety, information, information criterion of development, self-organization, self-preservation, synergy, thermodynamic approach, universal evolution.
Androshchuk V.V. -

DOI:
10.7256/2454-0668.2013.3.8910

Abstract:
Sukharev M. - Ideomaterial Polysystems and Politics pp. 1-22

DOI:
10.7256/2454-0668.2022.6.38969

EDN: EXPAJJ

Abstract: The subject of the study is the interaction of the ideal and material components of political, cultural and socio-economic processes influencing them in large socio-economic systems such as religions, sciences, ethnic groups, regions and states. The concept of social ideo-material polysystems (SMPS) is proposed. IMPS are holistic systems that include social, cultural and economic components that make up a complex society. A feature of such systems is that some of the elements of these systems are material, and some are ideal. A polysystem is a supersystem consisting of fuzzy irregularly interacting ideo-material systems (IMS). It is substantiated that IMPS, consisting of people, artifacts and biological organisms, form integrity due to the system of ideas that unites them. It is the systems of ideas that give meaning to social IMPS, uniting communities, determining their behavior and direction of development. Approaches to the quantitative study of ideal subsystems of IMSI are proposed. Methods: use of systemic, holistic, evolutionary and informational approaches. The highest type of IMSI are civilizations, the most complex known systems in the Universe. A feature of such systems is that some of the elements of these systems are material, and some are ideal. IMS, consisting of people, artifacts and, in some cases, animals and plants, form integrity due to the system of ideas that unites them. These ideal systems manage social IMS, unite communities, determine their behavior and direction of development. IMS are very diverse: they can be scientific communities in which science brings together scientists, scientific instruments, theory, texts, social institutions, buildings; these can be religions in which the scripture unites priests, parishioners, temples, sacred texts and attributes. The complex of ideas on which these systems are based is of a holistic character. Conclusions: The proposed concept of ideo-material polysystems can be used to deepen the study of political systems.
Keywords: culture, institutions, evolution, nation, ideal, polysystem, ideo-material system, sociology of knowledge, community, paradigm
Gazimagomedov, G.G., Davydov, L.V. - Conflict bases for the political security of the modern Russia. pp. 9-21
Abstract: Political security and non-conflict condition of society are identical until the civil society manages to form effi cient forms of control over the market and economy as a whole. Till that time the state is fully responsible for the political security and the level of conflict in the society. Non-confl ict situation in the society presupposes minimal social differentiation, negative minimal consequences of functioning of the market relations. Since the market relations defy the state control, the state cannot control the market relations without ruining them. The attempts o the state to interfere with the market prerogatives strengthen the conflict and lower the level of political security.
Keywords: political science, security, state, civil society, market, social differentiation, need, conflict, political order, political security.
Bondar D.A., Korneiko O.V. - Innovations of traffic safety control of the Raxel Telematics company pp. 10-18

DOI:
10.7256/2454-0668.2018.2.26136

Abstract: The subject of this research is the trends, factors and prospects of ensuring traffic safety. The goal of this work is to assess the innovative product of the Raxel Telematics. The place of the traffic safety has been identified within global safety. The authors examine the work on ensuring traffic safety in theory, as well as within the Swedish zero mortality on the roads program. Assessment was made on the Russian programs on reduction of mortality and injury on the roads. Analysis was conducted on the main indexes of accidents in Russia for 2015-2017. The scientific novelty of this research consists in determining the key work on increasing traffic safety, as well as the innovative product offered by the Raxel Telematics. The current trend in Russia shows a decrease in accidents, traffic injuries and mortality. The main reason for this decrease is certainly the innovations in the area of traffic safety. The Raxel Telematics developed a system that allows insurance companies calculate personal specificity of drivers.
Keywords: zero mortality, global security, insurance, accident rates, risks, national security, road traffic, innovative product, innovation, traffic accidents
Vakarev A.A., Vinogradov V.V. - Ensuring environmental safety through the development of waste recycling in modern Russia: development, difficulties, solutions at the regional level pp. 10-37

DOI:
10.7256/2454-0668.2022.2.37725

Abstract: The subject of the study is the system of relations arising in ensuring the environmental safety of modern Russia in the field of waste processing of solid industrial and household waste. The object of the study is the regional economy of the Volgograd region, where there are significant opportunities for the creation and development of incineration facilities. The authors consider in detail such aspects of the topic as: analysis of the development of the incineration business in the global economy; justification of the potential of the incineration business in modern Russia; analysis of the practice of creating waste disposal facilities in domestic conditions; justification of the construction of incineration plants in the Volgograd region. Special attention is paid to the economic justification of the efficiency of incineration plants in the Volgograd region. The main conclusions of the study are the following: waste disposal is currently a very promising area of business development, a powerful aspect of the growth of the regional economy of some subjects of the Russian Federation; international experience shows that a very powerful economic potential is already involved in this area, especially in the most developed countries of the global economy; the modern market offers a wide range of technical and managerialcommercial funds for the development of waste disposal enterprises; in many regions of Russia there is high business activity for the development of waste disposal enterprises, but this activity encounters environmental restrictions and inertia on the part of environmental organizations; creating conditions for the development of waste recycling facilities in the Volgograd region will have a high economic effect and will have a positive impact on the overall socio-economiceconomic development of the region. A special contribution of the authors to the study of the topic is its actualization and attraction of rich world experience. The novelty of the research lies in the adaptation of the research topic to the practical conditions of the Volgograd region and other regions of Russia.
Keywords: production, investment, branch, industry, incineration, incineration plant, wastes, effectiveness, region, ecology
Shumov V. - Basic model of security and its expansion

DOI:
10.7256/2454-0668.2016.1.13124

Abstract: This work explores the factors that significantly affect the security of the constituents of the Russian Federation. For considering in the mathematical model the following factors are being determined: climate factor, socioeconomic factors, level of transnational wellness, and level of integration of the regional national groups into the unified social space of the country. Security is defined through the dichotomy of the values of development and values of preservation. The parameters of the model are being evaluated considering the data on the migration of the population. The author presents calculations on the assessment of the security level in the Russian regions during the peace time and war time (not taking into account the military factors). By using the systemic and historical approaches, along with the methods of mathematical modelling, the author formulates the criterion of regional security, which reflects the values of development (socioeconomic factors) and values of preservation (complementarity of ethnoses, integration of national and regional groups into the country’s social space). The Pareto distribution is used in building of this model; the assessment of parameters is carried out via using the method of least squares. The basic model of regional security can be applied in modelling (expansion of a model): sociopolitical and socioeconomic security, demographical and environmental security, safety in circumstances of emergencies, border security, etc.
Keywords: regional security, security criterion, mathematical model, expansion model, scenario approach, complementarity of ethnic groups, Pareto distribution, estimation of model parameters, security criterion, verification of the model
Basaeva E.K., Kamenetsky E.S., Khosayeva Z.K., Baranov O.A. - Modeling of terrorist activity in RSO-A pp. 12-19

DOI:
10.7256/2454-0668.2022.1.36574

Abstract: The subject of the study is the modeling and forecasting of terrorist and extremist activity of RSO-A. This task is urgent, since terrorist activity around the world has remained very high in recent years and even a rough forecast allows us to take preventive measures in case of a possible aggravation of the situation. Usually, an analysis of the mechanisms of radicalization and the formation of extremist groups is used for forecasting. At the same time, the methods of game theory and machine learning and models of the spread of epidemic diseases are used. In all cases, the verification of models requires a large amount of initial information, which, as a rule, is missing. In addition, these models are applicable only for regions with a sufficiently high level of extremist and terrorist activity.The paper proposes a method for predicting terrorist and extremist activity for regions where its level is low. The method is based on the assumption that people who are not satisfied with their social status and do not see prospects for its improvement are involved in various radical groups and/or are inclined to extremism and terrorism. Since it is much easier to get into a radical group whose activities are not prohibited by law, the increase in the intensity of involvement in them outstrips the growth of extremist and terrorist activity and is its harbinger. The method is tested on the example of the Republic of North Ossetia-Alania, in which adherents of radical Islam are a typical radical group. It is shown that for RSO-A, terrorist activity in the region can be predicted by the intensity of involvement in radical groups with a lag of two years. The proposed model allows us to satisfactorily assess the change in terrorist activity in the Republic of North Ossetia-Alania for the period 2015-2019.
Keywords: mathematical model, terrorist activity, illegal arms trafficking, extremism, radical islam, the involvement coefficient, harbinger, time lag, education abroad, forecast
Shumov V.V. - Basic model of security and its expansion pp. 12-29

DOI:
10.7256/2454-0668.2016.1.67528

Abstract: This work explores the factors that significantly affect the security of the constituents of the Russian Federation. For considering in the mathematical model the following factors are being determined: climate factor, socioeconomic factors, level of transnational wellness, and level of integration of the regional national groups into the unified social space of the country. Security is defined through the dichotomy of the values of development and values of preservation. The parameters of the model are being evaluated considering the data on the migration of the population. The author presents calculations on the assessment of the security level in the Russian regions during the peace time and war time (not taking into account the military factors). By using the systemic and historical approaches, along with the methods of mathematical modelling, the author formulates the criterion of regional security, which reflects the values of development (socioeconomic factors) and values of preservation (complementarity of ethnoses, integration of national and regional groups into the country’s social space). The Pareto distribution is used in building of this model; the assessment of parameters is carried out via using the method of least squares. The basic model of regional security can be applied in modelling (expansion of a model): sociopolitical and socioeconomic security, demographical and environmental security, safety in circumstances of emergencies, border security, etc.
Keywords: regional security, security criterion, mathematical model, expansion model, scenario approach, complementarity of ethnic groups, Pareto distribution, estimation of model parameters, security criterion, verification of the model
Krupnov Y.A., Sil'vestrov S.N., Starovoitov V.G., Lapenkova N.V. - Competitive approach to assessing the national security of the Russian Federation pp. 13-35

DOI:
10.7256/2454-0668.2023.5.68816

EDN: AECUMX

Abstract: The object of the study is the procedure for assessing the state of national security of the Russian Federation, which is being considered for its improvement based on the implementation of a competitive approach when conducting assessments. The authors review the current procedure for assessing national security and justify the need for its improvement. A comparative analysis of domestic and international experience in the formation of criteria, the hierarchical structure of indicators and the prioritization of threats is carried out. The necessity of forming a hierarchical structure, universalization and integration of indicators as part of the implementation of a competitive approach in assessing the state of national security is substantiated. Particular attention is paid to studying the possibility of using uniform international criteria and a system of indicators in domestic practice. Based on the results of the study, the following conclusions are presented. The state of security is not an absolute value, but is characterized by relative indicators obtained from the results of a comparative assessment of the indicators of competing countries. Security monitoring and assessment should be carried out on a cross-country rating basis, comparing different countries, including countries whose activities are the source of the main challenges and threats. The novelty lies in the substantiation of the use of a competitive approach and rating methodology, allowing governing bodies to assess the state of security taking into account domestic development dynamics and a comparative analysis of the indicators of countries that can influence the state of security in Russia. Author also presented the associative series of national interests and national security indicators of the USA and Russia. In contrast to similar studies, an original approach to the formation of a set of indicators of the state of national security is proposed. Building a hierarchical structure of indicators provides an opportunity to focus on the most important international complex and integral indicators, and increase the efficiency and reliability of assessments. The main directions for improving assessment based on the implementation of structural-hierarchical and competitive approaches have been identified.
Keywords: international comprehensive indicators, national security criteria, national interests, security assessment, comparative analysis method, national security monitoring, competitive approach, hierarchical structure of indicators, National Security Strategy, national security
Chirkov, D.K., Sarkisyan, A.Zh. - High techology crime: tendencies and perspectives. pp. 20-26

DOI:
10.7256/2454-0668.2013.1.62339

Abstract: The article includes general criminalistic characteristics of crimes in the sphere of telecommunications and computer information, the authors provide for the dynamics of development of such crimes for the period since 2009 to 2012 in comparison to the number of Internet users for the same period. In the latest decade the Internet became a virtual space, where people may express their ideas, get involved in social activities, etc. Currently the Internet networks play an important roles in our communications. We transfer money via computers, cash dispensers, and electronic payment system, we set the routes, look for good restaurants, find out what movie we should watch, and all of these actions depend on information technolgies. Many Internet users are attacked by cybercriminals. The above-mentioned problems are discussed in this article. The article may be useful for the officers of the law-enforcement bodies working with high-technology crimes.
Keywords: jurisprudence, high technologies, cybercrime, criminal law, Internet technologies, statistical data, telecommunications sphere, computer information, characteristics of crimes, Internet users.
Karpov, Y.S. - Analogous and derived narcotic and psychedelic substances: topical problems of their definition, qualification and control. pp. 23-37
Abstract: The article is devoted to the problem of finding adequate counter-measures against the new psychoactive drugs, known as “designer drugs”, as well as to development and implementation of measures against drug addiction, control and stabilization of the narco-situation. The author analyzes the definitions analogous and derived narcotic and psychedelic substances and shows their principal similarities and differences, then the author offers to amend the existing legislation in part of its criteria for recognition of a substance as analogous or derived from the prohibited substances. The author also pays attention to the order of holding studies and expertises of such substances.
Keywords: jurisprudence, drug addiction, psychoactive drugs, designer drugs, analogous narcotics, derived narcotics, anti-narcotics legislation, new measures, legal aspects, the principle of formally defined law.
Tsezar D.A. - The methodology of substantiation of the required effort and funding for prevention and control of forceful action in the maritime space pp. 34-41

DOI:
10.7256/2454-0668.2017.6.24554

Abstract: The object of this research is the activity of law enforcement structures on the struggle against forceful action in the maritime space; while the subject is the methodology of substantiation of the required effort and funding for prevention and control of forceful action. The author applies the probabilistic conflict model based on the principles of combat (hard management, combination if fire and maneuver, control over the situation using observation and reconnaissance). For evaluation of parameters of the model and its verification, the author has examined the descriptions of the actions committed by pirates and terrorists in successful or unsuccessful attempts of causing damage to people and tangibles in the maritime space. The article carries out a comparative analysis of capabilities of the law enforcement structures and pirates (terrorists). A number of examples demonstrates the possible application of mathematical methods of justifying decisions to implement one or another type of means of fighting against unlawful actions in the maritime space. The prevention of forceful actions is based on achieving by the military and police watercrafts of the high chance of neutralization of the pirates and terrorists. The application of the presented methodology by the law enforcement structures provides quantitative grounds for increasing the efficiency of their actions.
Keywords: Maritime space, Military strategy, Combat simulation model, Methodology, Control of forceful action, National security, Watercraft, Maritime piracy, Maritime terrorism, Forceful action
Tsaregorodtsev A.V. -

DOI:
10.7256/2454-0668.2013.5.9587

Abstract:
Tsaregorodtsev, A.V. - Forming the trees of objectives for the identification of security requirements of the cloud computing environments. pp. 51-68

DOI:
10.7256/2454-0668.2013.5.63366

Abstract: The need for the improvement and higher efficiency of the cardinal principles of information security management in the sphere of cloud computing requires a multi-aspect sphere of guarantees for the systemic quality. Application of the formalized structural synthesis methods and technologies for the systems of information security management in the cloud computing, providing for various levels of requirements hierarchy, could allow for the more efficient use of local technologies and automation qualities, as well as systemic manifestations. The empiric quality of tree models systemic structure provides a good opportunity. Special attention is paid to formation of the trees of objectives for the identification of security requirements in the cloud computing and formation of the basis for the formalized synthesis of security platforms in information and telecommunications systems, functioning based upon the cloud computing technologies in accordance with the established systemic criteria and the system development factor. Considering the lack of transparency in such spheres as service level agreements, and realistic supplier capabilities, existing in most cloud computing services, the prerequisites are formed for the formation of a novel method for the formation of the hybrid sphere of information security requirements for cloud computing.
Keywords: information security, cloud computing, cloud services, information security threats, analysis of information risks, management methods, information security requirements, business assets, tree of objectives, hybrid environment.
Shamekhina E.V. - Digital transformation of anti-corruption: a retrospective and development prospects pp. 52-60

DOI:
10.7256/2454-0668.2023.4.44043

EDN: THLHLL

Abstract: The subject of the study is policy and legal documents that are the basis for determining strategic goals and priorities of socio-economic development and ensuring national security of the Russian Federation in the field of combating corruption. The paper considers the development of the processes of digital transformation of public and municipal administration in the aspect of anti-corruption. The anti-corruption potential of integrating end-to-end technologies into traditional models of interaction between society and the state is investigated, and the prospects for countering corruption manifestations through digitalization of public and municipal governance processes are assessed. The importance of the digital transformation of public administration for ensuring openness and transparency of the activities of authorities is substantiated. Particular attention is paid to the absence of a universally recognized definition of digital transformation both in legislation and in the scientific community due to the novelty and "blurring" of the boundaries of this phenomenon. The methodological basis of the study was made up of general scientific and special methods of cognition, the use of which is determined by the specifics of the topic under study (formal legal, historical legal and comparative legal methods). The conducted research made it possible to consider a retrospective of the process of digital transformation of state and municipal administration in the aspect of state anti-corruption policy, as well as to identify promising areas for further development and implementation of digital technologies in anti-corruption activities at the federal level.
Keywords: transformation of anti-corruption, transparency, anti-corruption, digital technologies, digital transformation, digitalization, openness, corruption, public administration, digital government
Pogodina, I.V., Fraimovich, D.Y. - Economic security of the regions (dynamic analysis of the retrospective characteristics of the regional gross product). pp. 60-63
Abstract: The article includes the method of analysis of the dynamics of economic security of the regions of the Russian Federation based on the correlation of offi cial statistics on the RGP of the subjects of the Central Federal District. As a result, implementation of the method in question uncovers indicative characteristics, which need to be optimized based on the medium value in a particular federal district.
Keywords: economics, security, analysis, RGP, regions, subjects of the Russian Federation, dynamics, values, statistics, regional.
Tsaregorodtsev, A.V., Taraskin, M.M., Derbin E.A. - One of the approaches to the formalized description of threats, vulnerabilities and risks in the system of information protection at an enterprise. pp. 60-68
Abstract: The authors evaluate one of the approaches to the evaluation of threats, vulnerabilities and risks in the systems of information protection of organizations, which allows to have all-inclusive analysis and to formulate the requirements for the guarantees of security of information in an organization. Use of such an approach shall allow one to cut the costs of the excess security measures, which often take place, when the evaluation of risks is taken subjectively. It shall also aid in planning and implementation of the protection at all of the stages of vital cycles of information systems and to guarantee that the necessary means can be taken in short periods of time. The authors offer practical advice for the choice of counter-measures and evaluation of efficiency of their various options.
Keywords: warfare, security, information, organization, risk, threat, vulnerability, model, method, identification.
Tsaregorodtsev A.V., Ermoshkin G.N. -

DOI:
10.7256/2454-0668.2013.5.9583

Abstract:
Tsaregorodtsev, A.V., Ermoshkin, G.N. - Basic principles for the formation of the tree of objectives for information security in the cloud computing. pp. 69-79

DOI:
10.7256/2454-0668.2013.5.63358

Abstract: Changing security contour and loss of internal control over the critical assets of organizations followed by the later migration of these assets to the cloud spheres made the problem of information cloud computing security management in the corporate system a top priority issue. All of the above requires the change in the traditional approaches to the information security guarantees and development of the novel methodological apparatus, allowing for higher efficiency of the IT resources and considerably lowering their costs via diversification of information streams in the organization and their migration to the cloud architecture. Much attention is paid to the topical information security problems and their possible solutions based on formation of the trees of objectives for the information security in the cloud computing environment. The authors offer a novel concept for the cloud computing environment security based upon the tree of objectives, allowing to take into account all of the critical processes in the sphere of information security management, and to take into consideration the terms of common responsibility and common obligations of the parties, the above-mentioned qualities shall allow the organizations to make decisions on the formation of information network based on the criterion of minimal infrastructure costs, while guaranteeing the necessary information security level.
Keywords: i n for mat ion secu r it y, cloud computing, cloud services, information security threats, tree of objectives, management methods, information security requirements, service provision model, counter-measures, business processes.
Shmygin V.A., Shultz V.L. - Social Technologies for Broadcasting the Image of the State pp. 71-82

DOI:
10.7256/2454-0668.2022.6.39273

EDN: NYZIXD

Abstract: The article is devoted to the relevant social technologies in the process of constructing and broadcasting the image of the country. The theoretical basis of the concept of social technologies is described, the essence of which is revealed through social knowledge. The role of a researcher of social technologies who has social knowledge and takes the position of a social consultant in matters of designing and broadcasting the image of the state is considered. The authors consider the technologies of formation and translation of the stock of knowledge about the state on the example of socio-political practice – real cases. The authors analyze the main technological approaches affecting the image of the state: correction of historical memory, "Soft power". The main conclusions of this article are the provisions that the use of the "Soft Power" technological approach in the context of broadcasting the image of the state is relevant at the moment, since it allows to broadcast ideas related to the worldview characteristic of the Russian public consciousness. The universal nature of "soft power" allows to spread ideas – social phenomena that affect the construction of the image. At the same time, the issue of correcting historical memory remains important, which is also a relevant social technology. The historical process in the minds of individuals can acquire additional interpretations, which leads to changes in individuals' perceptions of the historical process and the transformation of attitudes to the history of the state and, accordingly, its image.
Keywords: correction of historical knowledge, social construction, historical knowledge, image broadcast, knowledge, soft power, historical memory, the image of the state, social technologies, Image
Karpovich O.G. -

DOI:
10.7256/2454-0668.2013.5.6432

Abstract:
Karpovich, O.G. - Problems and perspectives for the studies of modern concepts, models of technologies for the international conflict management. pp. 80-93

DOI:
10.7256/2454-0668.2013.5.63359

Abstract: The article presents the results of the analysis of the key problems and perspectives in the studies of the modern concepts, models, and technologies for the international conflict management. The author provides a classification of scientific approaches towards the studies of the role of technologies for the direct and indirect information and psychological influence in the sphere of international conflict management both in the interests of their complete or partial regulation, and in the interests of their political escalation.
Keywords: political science, national security, international conflict management, international relations, foreign policy, political conf licts, psychological technologies, psychological operations, information war, information policy.
Lipuntsov, Y.P. - Organization of the infrastructure of provision of state electronic services. pp. 96-106
Abstract: The transfer to the information society presupposes the considerable growth of transparency of activities of the state bodies. For each of the information system of state institution, there has to be a list of reported events, which have to publicized and the regime of making them public. Information of the departmental system is considered open from the moment when it is transferred to the information repository of open state information.
Keywords: economics, information, society, state, reporting, repository, publication, access, transparency, documents.
Artamonova, Y.S. - The term “security” at the scientifi c, theoretical and legal levels. pp. 152-160
Abstract: Brief description: this article covers one of the top issues of the contemporary science - development of «security» in social sciences and the humanities. The problem of the semantic defi nition of «security» is analyzed in the article below as well as the outlines of the problem analysis are defi ned. The article analyzes the origins of the concept of disclosure and the nature of security.
Keywords: security, level, info, right, a model element, system, concept, cooperation.
Mitrofanov R.A. - Fertilization of earth using organic fertilizers as a factor of environmental policy and food safety

DOI:
10.7256/2454-0668.2016.2.15327

Abstract: The analysis of the modern state and possible scenarios of development of agricultural production confirms the need for realization of measures pertaining to stabilization and restoration of farm lands, which increase the fertility of earth of agricultural designation and improve the general environmental situation. Such tasks as biologization and environmentalization of farming can be solved by means of using the technologies of manufacturing the active organic and organic mineral peat-based fertilizers, which are also called humic products. These technologies can significantly cut the cost for producing the biofertilizers. The article conducts a comparative analysis of the influence of the mineral and organic fertilizers on the agricultural productivity, as well as presents a brief description of the unique technology of manufacturing of the effective biofertilizer. Considering an existing opinion that the use of organic fertilizers cannot to the full extent compensate the lack of mineral nutrition especially in the long-term prospects, we can agree that the application of nitrogen fertilizers in small amounts does not produce a negative effect as other “major chemicals”. However, taking into account the current situation, there is not alternative for substituting the significant portion of mineral fertilizers with organic and organic mineral fertilizers.
Keywords: electrohydraulic technology, no-till technology, organic fertilizers, the negative impact of mineral fertilizers, peat, lack of humus, improve soil fertility, national security, contamination of soils with heavy metal, greening agriculture
Mitrofanov R.A. - Fertilization of earth using organic fertilizers as a factor of environmental policy and food safety pp. 176-182

DOI:
10.7256/2454-0668.2016.2.67744

Abstract: The analysis of the modern state and possible scenarios of development of agricultural production confirms the need for realization of measures pertaining to stabilization and restoration of farm lands, which increase the fertility of earth of agricultural designation and improve the general environmental situation. Such tasks as biologization and environmentalization of farming can be solved by means of using the technologies of manufacturing the active organic and organic mineral peat-based fertilizers, which are also called humic products. These technologies can significantly cut the cost for producing the biofertilizers. The article conducts a comparative analysis of the influence of the mineral and organic fertilizers on the agricultural productivity, as well as presents a brief description of the unique technology of manufacturing of the effective biofertilizer. Considering an existing opinion that the use of organic fertilizers cannot to the full extent compensate the lack of mineral nutrition especially in the long-term prospects, we can agree that the application of nitrogen fertilizers in small amounts does not produce a negative effect as other “major chemicals”. However, taking into account the current situation, there is not alternative for substituting the significant portion of mineral fertilizers with organic and organic mineral fertilizers.
Keywords: electrohydraulic technology, no-till technology, organic fertilizers, the negative impact of mineral fertilizers, peat, lack of humus, improve soil fertility, national security, contamination of soils with heavy metal, greening agriculture
Morozova, D.A. - State regulation of innovation development of the higher education based on mechanisms of partnership between the private entities and the state. pp. 186-202
Abstract: Effi ciency of the innovation activity of the higher school much depends on close interaction of the state and private sectors of the economics. The state serves as a moderator of specifi c forms and mechanisms of such interaction. One of the ways of organization of such innovation activity in the sphere of higher education may be the partnership between the private entities and the state.
Keywords: economics, sector, development, mechanism, partnership, education, state, regulation, regulation, innovation, development.
Pavlov V.P. - Bioelectronic systems for early diagnostics in ensuring the industrial safety in sea and fresh waters

DOI:
10.7256/2454-0668.2015.2.13259

Abstract: This research presents the materials on bioelectronic system of early diagnostics of aquatories developed by the Russian scientists. The article offers a complex approach towards the real-time monitoring of water resources that allows increasing the level of safety within large industrial objects, the functioning of which is connected to the possibility of serious environmental violations in the event of emergency situations. Such bioelectronic systems are based on the diagnostics of the condition of the invertebrates, dwelling within a specific ecosystem that contains a possibility of threats of emergency situations and acts of terrorism. The invertebrates living at the bottom of these waters are used as biosensors. Tiny fiber optic sensors of cardiac activity are attached to them and allow real-time remote continuous monitoring of their condition. Detection of the peculiarities of the behavior of the animals within the changing environment became the foundation of the development of the fiber optic method of monitoring the cardiac activity of the benthic invertebrates with a hard shell: Crustacea (Decapoda) and Mollusca.
Keywords: Bioelectronic systems, early diagnostics of ecosystems, marine safety, bio indicator, biological monitoring, animal testing, variable pulsometry, remote monitoring , selection of cardiac rhysms, distribution of cardiac intervals
Pavlov V.P. - Bioelectronic systems for early diagnostics in ensuring the industrial safety in sea and fresh waters pp. 197-201

DOI:
10.7256/2454-0668.2015.2.66400

Abstract: This research presents the materials on bioelectronic system of early diagnostics of aquatories developed by the Russian scientists. The article offers a complex approach towards the real-time monitoring of water resources that allows increasing the level of safety within large industrial objects, the functioning of which is connected to the possibility of serious environmental violations in the event of emergency situations. Such bioelectronic systems are based on the diagnostics of the condition of the invertebrates, dwelling within a specific ecosystem that contains a possibility of threats of emergency situations and acts of terrorism. The invertebrates living at the bottom of these waters are used as biosensors. Tiny fiber optic sensors of cardiac activity are attached to them and allow real-time remote continuous monitoring of their condition. Detection of the peculiarities of the behavior of the animals within the changing environment became the foundation of the development of the fiber optic method of monitoring the cardiac activity of the benthic invertebrates with a hard shell: Crustacea (Decapoda) and Mollusca.
Keywords: Bioelectronic systems, early diagnostics of ecosystems, marine safety, bio indicator, biological monitoring, animal testing, variable pulsometry, remote monitoring, selection of cardiac rhysms, distribution of cardiac intervals
Los A.B., Tsaregorodtsev A.V., Sorokin A.V. - Integrated approach to the construction of secure information and telecommunication systems based on hybrid cloud environment

DOI:
10.7256/2454-0668.2016.3.16542

Abstract: This article examines the issues of ensuring information security in the sphere of cloud technologies. Information and telecommunication systems, operating on the basis of cloud computing technology, over the recent years have become more widespread, with constantly growing needs in processing of the large volumes of data.The key point in the use of cloud computing is the issue of ensuring reliable protection of data during transmission, processing and storage. The article identifies the main problems of cloud computing from the point of view of information security and examines solutions when building complex systems of information protection in cloud architecture. In order too solve this issue, this work applies the method of theoretical analysis of the source data in various areas of the matter under consideration, the method of summarizing the results and formulating appropriate solutions. Scientific novelty of the work consists in a theoretical comprehensive analysis of this problem, including examination of threat to information in the cloud field, existing solutions in the specified direction and development on the basis of the results of the procedure for the comprehensive protection of cloud computing. Proposed applications of cloud computing for processing and storage of information of various categories, including critical assets. For working with such data, it is proposed to create a hybrid cloud environment, incorporating traditional cloud architecture elements of private clouds.
Keywords: information risks, security requirements, information assets, information security management, information security threats, critical archives, private cloud, hybrid cloud, cloud computing, information and telecommunication systems
Los' A.B., Tsaregorodtsev A.V., Sorokin A.V. - Integrated approach to the construction of secure information and telecommunication systems based on hybrid cloud environment pp. 332-337

DOI:
10.7256/2454-0668.2016.3.67885

Abstract: This article examines the issues of ensuring information security in the sphere of cloud technologies. Information and telecommunication systems, operating on the basis of cloud computing technology, over the recent years have become more widespread, with constantly growing needs in processing of the large volumes of data.The key point in the use of cloud computing is the issue of ensuring reliable protection of data during transmission, processing and storage. The article identifies the main problems of cloud computing from the point of view of information security and examines solutions when building complex systems of information protection in cloud architecture. In order too solve this issue, this work applies the method of theoretical analysis of the source data in various areas of the matter under consideration, the method of summarizing the results and formulating appropriate solutions. Scientific novelty of the work consists in a theoretical comprehensive analysis of this problem, including examination of threat to information in the cloud field, existing solutions in the specified direction and development on the basis of the results of the procedure for the comprehensive protection of cloud computing. Proposed applications of cloud computing for processing and storage of information of various categories, including critical assets. For working with such data, it is proposed to create a hybrid cloud environment, incorporating traditional cloud architecture elements of private clouds.
Keywords: information risks, security requirements, information assets, information security management, information security threats, critical archives, private cloud, hybrid cloud, cloud computing, information and telecommunication systems
Shagieva A.K. - Mathematical modeling in crisis management

DOI:
10.7256/2454-0668.2015.3.14962

Abstract: The subject of this research is the system of mathematical modeling of the processes under the conditions of crisis management. Analysis of modern approaches towards solution of the problem of crisis management within enterprises demonstrates that they are based on financial analysis and bankruptcy forecasting using comparison of certain coefficients with the up-to-date values and state the fact of a presence of a final crisis state – bankruptcy. Mathematical modeling provides for a high level of justification of decisions, reduction of time needed to develop solutions, and the ability to deploy countermeasures in order to prevent bankruptcy. The author presents a mathematical model for forecasting crisis within a company based on its financial results. The devised complex of models will allow forecasting the start and development of a crises within a business based on an optimal assortment, structure and volume of products. The use of mathematical modeling and forecasting within the system of crisis management would allow managers and company executives to concretize the methods for preventing, neutralizing, and overcoming the crises.
Keywords: Management, Crisis, Modeling, Forecasting, Bankruptcy, Analysis, Business, Assortment, Product line, Financial results
Shagieva A.Kh. - Mathematical modeling in crisis management pp. 349-358

DOI:
10.7256/2454-0668.2015.3.66585

Abstract: The subject of this research is the system of mathematical modeling of the processes under the conditions of crisis management. Analysis of modern approaches towards solution of the problem of crisis management within enterprises demonstrates that they are based on financial analysis and bankruptcy forecasting using comparison of certain coefficients with the up-to-date values and state the fact of a presence of a final crisis state – bankruptcy. Mathematical modeling provides for a high level of justification of decisions, reduction of time needed to develop solutions, and the ability to deploy countermeasures in order to prevent bankruptcy. The author presents a mathematical model for forecasting crisis within a company based on its financial results. The devised complex of models will allow forecasting the start and development of a crises within a business based on an optimal assortment, structure and volume of products. The use of mathematical modeling and forecasting within the system of crisis management would allow managers and company executives to concretize the methods for preventing, neutralizing, and overcoming the crises.
Keywords: Management, Crisis, Modeling, Forecasting, Bankruptcy, Analysis, Business, Assortment, Product line, Financial results
Vlasyuk, G.V. - Feelings and emotions as the basis for the interaction management t echnologies pp. 357-370

DOI:
10.7256/2454-0668.2013.2.62621

Abstract: Today a large amount of problems regarding successful interactions constantly arises. The author analyzes the bases of guarantees and support of interaction (as paths of closeness), and analyzes the sensual specific features of perception of situation, as well as the technologies, which allow to regulate the perception of the situation by the partner in an interaction from the standpoint of the resource approach. It establishes an issue on the need to understand the mechanisms of interaction management, which is related with the emotional and sensual sphere of living.
Keywords: social studies, resources, feelings, emotions, paths of closeness, sensual connections, perception, distance, value.
Khmaladze D.Z. - Special aspects of electronic money within the systems of open and closed circulation

DOI:
10.7256/2454-0668.2015.3.15472

Abstract: The subject of this research is the legal regulation of the transactions made using electronic currency and the special aspects of electronic transactions within the systems of open and closed circulation. The author analyzes minimal requirements in the area of electronic transaction systems based on the flow of electronic money, which can vary depending on the type of electronic money, and are based on a level of openness of such systems. Depending on the level of openness the author subdivides them into closed or open circulation systems. Based on the conducted analysis, the author highlights the characteristic aspects of electronic money that have originated within a closed circulation system, as well as those that originated within the open circulation system. The author comes to a conclusion that openly circulation system of electronic money is characterized by a high level of flexibility and potentially large user base as compared to the closed circulating systems; it is more universal.
Keywords: Electronic money, E-commerce, Electronic payment system, Online payment system, Statistical reporting, Open circulation system , Closed circulation system, Information society, Public relations, Modern payment methods
Khmaladze D.Z. - Special aspects of electronic money within the systems of open and closed circulation pp. 359-363

DOI:
10.7256/2454-0668.2015.3.66586

Abstract: The subject of this research is the legal regulation of the transactions made using electronic currency and the special aspects of electronic transactions within the systems of open and closed circulation. The author analyzes minimal requirements in the area of electronic transaction systems based on the flow of electronic money, which can vary depending on the type of electronic money, and are based on a level of openness of such systems. Depending on the level of openness the author subdivides them into closed or open circulation systems. Based on the conducted analysis, the author highlights the characteristic aspects of electronic money that have originated within a closed circulation system, as well as those that originated within the open circulation system. The author comes to a conclusion that openly circulation system of electronic money is characterized by a high level of flexibility and potentially large user base as compared to the closed circulating systems; it is more universal.
Keywords: Electronic money, E-commerce, Electronic payment system, Online payment system, Statistical reporting, Open circulation system, Closed circulation system, Information society, Public relations, Modern payment methods
Androschuk, V. V. - Concerning the Possibility to Use Experience and Recommendations of the Foreign Auditors’ Unions for Fraud and Theft Management in Russia pp. 418-425

DOI:
10.7256/2454-0668.2013.3.62813

Abstract: The article is devoted to the expansion of fraud and theft in international economic community. Corporate fraud is a term covering a whole range of such serious violations as embezzlement, bribery, forgery, blackmail and etc. For the purpose of fraud management, a new profession of an auditor for fraud and theft was created. This profession includes a wide range of competences. Official investigation of fraud cases has only one purpose which is to clarify the facts. Starting the investigation of fraud, an auditor first makes a hypothesis about a person being guilty or not guilty and then tries to gather enough evidence in order to clarity what actually happened in the reality. Investigation of fraud requires mutual efforts of experts in different spheres. Recommendations on frau management developed on the basis of experience of auditors from many foreign countries are analyzed, summarized and presented in a form of a special guide. Several main provisions of this guide are described in the present article.
Keywords: fraud, theft, white collar crime, association, audit, auditor, financial security, corruption, entrepreneurial activity, forensic audit.
Garbuk S.V. - The prospects of implementation of intellectual technologies for the purpose of solving security issues

DOI:
10.7256/2454-0668.2016.4.19207

Abstract: The object of this research is the technical means of ensuring security. The subject of this research is the questions of increasing the efficiency of technical means of ensuring security based on application of the so-called “intellectual technologies of security”, which allow processing information received from the technical means of ensuring security, but with quality equal to a human operator. The author suggests classification of the tasks of intellectual processing of information, as well as conducts an analysis of the scientific-technical and organizational difficulties that accompany the solution of these tasks. The article examines the questions of comparison and evaluation of the quality of intellectual technologies alongside the main issues of normative regulation, emerging during the practical implementation of such technologies. The scientific novelty consists in the proposed classification of intellectual tasks peculiar for the security systems, as well as in formalization of the scientific-technical tasks associated with the development of intellectual technologies of security. The analysis of the specificities of development of intellectual technologies allowed making conclusion on the purposefulness of establishment of a special center of competency which would coordinate the work in this area.
Keywords: Efficiency of security systems, Intellectual technologies, Intellectual tasks, Systems of information processing, Internet of things, Identification of images, Normative regulation of security, Safety city, Technical means of security, Intellectual systems
Garbuk S.V. - The prospects of implementation of intellectual technologies for the purpose of solving security issues pp. 451-457

DOI:
10.7256/2454-0668.2016.4.68008

Abstract: The object of this research is the technical means of ensuring security. The subject of this research is the questions of increasing the efficiency of technical means of ensuring security based on application of the so-called “intellectual technologies of security”, which allow processing information received from the technical means of ensuring security, but with quality equal to a human operator. The author suggests classification of the tasks of intellectual processing of information, as well as conducts an analysis of the scientific-technical and organizational difficulties that accompany the solution of these tasks. The article examines the questions of comparison and evaluation of the quality of intellectual technologies alongside the main issues of normative regulation, emerging during the practical implementation of such technologies. The scientific novelty consists in the proposed classification of intellectual tasks peculiar for the security systems, as well as in formalization of the scientific-technical tasks associated with the development of intellectual technologies of security. The analysis of the specificities of development of intellectual technologies allowed making conclusion on the purposefulness of establishment of a special center of competency which would coordinate the work in this area.
Keywords: Efficiency of security systems, Intellectual technologies, Intellectual tasks, Systems of information processing, Internet of things, Identification of images, Normative regulation of security, Safety city, Technical means of security, Intellectual systems
Borobov V.N. -

DOI:
10.7256/2454-0668.2014.4.11937

Abstract:
Borobov, V.N. - Personnel management and motivation in a modern organization. pp. 493-504

DOI:
10.7256/2454-0668.2014.4.65405

Abstract: Labor activity within the market economy framework is a complicated system of personnel interaction in the process of production, distribution and consumption of material values. These complicated relations are centered upon the interests of the people, who are at the same time producers and consumers of the necessary goods and services within the market. The scientific publication reveals the nature of personnel management. The author evaluates the main goals of personnel management and the problems of rational use of productive resources (first of all, human resources). The author discusses the general model of personnel management in a modern organization and the process of personnel motivation involving various stimuli for the workers. The author proposes the measures to be taken in order to make personnel management in a modern organization more efficient, and make the products more competitive. Currently a scientific solution to this problem in the Russian economy presupposes the presence of a substantiated mechanism for the management of production resources, including a mechanism for managing the personnel of various categories in the process of production and consumption of the material values based upon an economic use of resources. The main goal of persons in charge of the work (masters, shop mechanics, power engineers) and workers and service personnel is to organize security of works and control over compliance with the internal rules of enterprises and security guidelines by the staff. Efficiency of personnel management in a modern organization, competitiveness of products and well-being of the workers may only be achieved by compliance with the system of interrelated measures.
Keywords: economics, economic resources, specialists, human resources, stimulation, motivation, process of work, rewards, management goals, qualified personnel.
Lyapustin A. - Development and examination of the models and methods of comprehensive protection of heterogeneous information platforms

DOI:
10.7256/2454-0668.2015.4.15662

Abstract: This work presents the analysis of the modern approaches towards development of comprehensive systems for protecting heterogeneous information platforms. Despite the advantages of the reviewed approaches, majority of them are aimed at solving a particular task, rather than a complex solution to the problem of protection of information in the environment of sophisticated heterogeneous systems. This article demonstrates the architecture of a heterogeneous information system acting as an object of protection. The result of the conducted research lies in the formation of a concept of creation of an Information Security System, the architecture of which is built upon a multi-agent approach and is oriented towards heterogeneous information systems. The author proposes a model for a comprehensive protection of the heterogeneous information platforms and examines the methodology for intelligent threat detection. The results of this research suggest increasing the area of use of the multi-agent approach and its integration into the intelligent analysis of development and functionality of the information systems.
Keywords: intelligent systemof information protection , threat detection, information security, heterogeneous information platforms, information safety, detection agents, means of information security, information system protection, centralized attacks, information processing
Lyapustin A.E. - Development and examination of the models and methods of comprehensive protection of heterogeneous information platforms pp. 508-514

DOI:
10.7256/2454-0668.2015.4.66731

Abstract: This work presents the analysis of the modern approaches towards development of comprehensive systems for protecting heterogeneous information platforms. Despite the advantages of the reviewed approaches, majority of them are aimed at solving a particular task, rather than a complex solution to the problem of protection of information in the environment of sophisticated heterogeneous systems. This article demonstrates the architecture of a heterogeneous information system acting as an object of protection. The result of the conducted research lies in the formation of a concept of creation of an Information Security System, the architecture of which is built upon a multi-agent approach and is oriented towards heterogeneous information systems. The author proposes a model for a comprehensive protection of the heterogeneous information platforms and examines the methodology for intelligent threat detection. The results of this research suggest increasing the area of use of the multi-agent approach and its integration into the intelligent analysis of development and functionality of the information systems.
Keywords: intelligent systemof information protection, threat detection, information security, heterogeneous information platforms, information safety, detection agents, means of information security, information system protection, centralized attacks, information processing
Bolkunov O.N. -

DOI:
10.7256/2454-0668.2013.4.8897

Abstract:
Bolkunov, O.N. - Quantitative dimension of the international energy security pp. 536-548

DOI:
10.7256/2454-0668.2013.4.63052

Abstract: The article is devoted to the development of methodology for the quantitative dimension of the international security of energy supply. It is noted that in order to accurately evaluate energy security of the state, its energy system should be equally evaluated from the various perspectives (economic, political, social, environmental, national security, international obligations and treaties), including an entire complex of its components. Energy security evaluation should characterize the quality of the national energy policy. The article contains analysis of the characteristic features which such an evaluation should possess. The author singles out the key methods for the quantitative dimension of the energy security of the state as well as their strong and weak points. Based upon the above-mentioned analysis the method for the complex evaluation of international energy security (CEIES) was formed. Evaluation includes 21 indicators of energy security in 4 interrelated dimensions: economic, technological, socialpolitical and environmental. In addition to the description of the method the article includes comparative analysis of the key quantitative methods for the energy security evaluation with the specific features of CEIES being pointed out. For example, CEIES serves as an useful indicator for the general condition of all of the spheres of energy security within the state. Based on it one can provide retrospective analysis of implementation of measures aimed to guarantee energy security of the state, as well as predict the efficiency of implementation of current and newly developed energy strategies. Additionally, such an evaluation allows to compare the levels of energy security in different sates and to modify the national energy strategies based on the analysis of successful practices. Finally, based upon the data on energy security in the neighboring states, one may ease the conditions for regional and international energy cooperation.
Keywords: security guarantees, energy strategy, national security, energy system, comparative political science, energy policy, quantitative studies, energy security, state administration, international politics.
Belousova A.V. -

DOI:
10.7256/2454-0668.2013.4.8957

Abstract:
Belousova, A.V. - Modeling and evaluation of the innovative development effects in the export sector of economy: the Far East pp. 549-555

DOI:
10.7256/2454-0668.2013.4.63053

Abstract: The article contains scenario modeling and evaluation of economic effects from the events aimed for innovative development of the economy of the Far Eastern Federal District and for neutralization of export-transaction related threats to the economic security of the macro-region according with the state programs. The author uses the following prerequisites for the evaluated scenarios: development of export specialization of the district in the sphere of manufacturing activity; changes in the parameters for the technical development of the export sector of the macro-region. Within the first scenario the author singles out export of manufacturing products, which shall generate maximal growth of the gross regional product for the district, as well as limitations for the comparable effects in case of development of other specialized manufactures of the Far Eastern economics. Within the second scenario the author identifies the factors for the innovative development of the export sector, lowering the risks of technological dependency of the Far Eastern Federal District on the other states, which is generated by import of equipment and machinery.
Keywords: export sector of economy, raw products export, innovative development, economic security, economic effect, export specialization, technical, manufacturing re-equipment, macro-region, Far Eastern Federal District
Shul'ts V.L., Kul'ba V.V., Shelkov A.B., Chernov I.V. -

DOI:
10.7256/2454-0668.2014.5.13061

Abstract:
Shultz V.L., Kulba V.V., Shelkov A.B., Chernov I.V. - Diagnostics and scenario analysis of the external threats to regional security pp. 626-664

DOI:
10.7256/2454-0668.2014.5.65574

Abstract: This work is dedicated to the methodological and applied issues of improving the processes of managing regional security under the conditions of aggravated antagonism between nations of the West and Russia, as well as the instability of the world economy. It presents a diagnostic methodology, structural analysis and evaluation of the main threats to national security. We will examine the issues of countermeasures towards the destructive information influences, built upon disinformation and manipulation technologies. This article demonstrates the results of an analysis of the key aspects of the processes of regional security management. It goes over the mechanisms of using scenario analysis in managing the social and economic development of a region and providing protection to social stability from the external and internal threats. We look at the results of scenario research of the developed multigraph models of managing regional security. In order to solve the entirety of the problems at hand, the article offers a methodological approach, which is based on the modeling and advanced scenario analysis of the processes of a situation progression within the regional social and economic systems, as well as in the external environment. Its main advantage is the ability to: assess the level of vulnerability of social and economic systems influenced by the external and internal threats to the regional security; conduct a complex analysis of a particular region’s situation within any given timeframe; form a short-term and long-term prognoses of its development; evaluate the effectiveness and concurrence of the multiple, spread across time and space strategic and tactical management solutions for achieving the set goals under the conditions of ambiguity. The article shows that the effectiveness of the countermeasures for the emerging threats to regional security from geopolitical enemies of the Russian Federation, as well as internal sources of vulnerability that they have created and financed, depends on creation and widespread use of complex mechanisms that would provide a coordinated solution to at least two basic sets of tasks: ensuring a stable social and economic development of a region, and its protection from the external and internal informational threats to the social stability.
Keywords: regional security, social stability, diagnostics of threats, management, informational influence, scenario analysis, imitational modeling, symbol graphs, management decisions, threat countermeasures.
Kuzmin E., Dubrovskii V.Z., Semenovykh S.M. - The questions of methodology in risk management of theory development programs from the perspective of the concept of life cycle

DOI:
10.7256/2454-0668.2015.5.12850

Abstract: In this research the authors attempt to scientifically substantiate the links and interconditionality of risks from the stages of life cycle of projects and programs of theory development, which are predominantly realized in the form of public-private partnership (PPP). This work makes an emphasis on determining the succession of the stages of life cycle with references to quantitative methods of identification. In generalization of their outlooks upon the mentioned problem, the authors propose an original solution in theoretical search for regularities in repetition of the periods of financial growth and decline. The article substantiates an original approach towards structuring a model of life cycle of projects and programs of theoretical development, and determines the general principles of its structuring. The article presents the conclusions on determinateness of density and richness of risks, as well as their contingency upon specificity of a particular stage of life cycle. Solution of the issue of observability of stages allowed the authors to substantiate the presence of ideal and actual trajectory of project development that is in accord with the life cycle.
Kuz'min E.A., Dubrovskiy V.Zh., Semenovykh S.M. - The questions of methodology in risk management of theory development programs from the perspective of the concept of life cycle pp. 631-647

DOI:
10.7256/2454-0668.2015.5.66976

Abstract: In this research the authors attempt to scientifically substantiate the links and interconditionality of risks from the stages of life cycle of projects and programs of theory development, which are predominantly realized in the form of public-private partnership (PPP). This work makes an emphasis on determining the succession of the stages of life cycle with references to quantitative methods of identification. In generalization of their outlooks upon the mentioned problem, the authors propose an original solution in theoretical search for regularities in repetition of the periods of financial growth and decline. The article substantiates an original approach towards structuring a model of life cycle of projects and programs of theoretical development, and determines the general principles of its structuring. The article presents the conclusions on determinateness of density and richness of risks, as well as their contingency upon specificity of a particular stage of life cycle. Solution of the issue of observability of stages allowed the authors to substantiate the presence of ideal and actual trajectory of project development that is in accord with the life cycle.
Keywords: Stages of life cycle, Cyclicity, Development projects, Stability, Development trajectory, Risk management, Uncertainty, Public-private partnership, Structural gap, Cointegration management
Petukhov A.Y. - Influence of psychological operations upon the political process in Russia under the conditions of information warfare

DOI:
10.7256/2454-0668.2015.5.16221

Abstract: This article reviews the aspects and certain methods of modern psychological operations in information confrontation, as well as the principle s and mechanisms of the work of mass media as an instrument of these operations. The relevance of this topic is justified by the exponential growth of modern communication networks and the increase of dependence of a separate individual from such networks, which allows conducting global information operations with the collective conscious of entire countries. All of this leads to a massive information warfare actively using the newest technologies of psychological effects.  As a conclusion, the author defines a number of major mechanisms and methods of the modern mass media, characteristic to the regularities of the influence of psychological operations, and points out few of the more susceptible areas of modern collective consciousness in Russia with consideration of the external factor. The author also notes the lack of specific idealistic base within Russia for counteracting foreign information influence.
Keywords: manipulation of public opinion, the media, cognitive systems, information communication, psychological security, information warfare, psychological vulnerability, cognitive mapping, Russia, public opinion
Petukhov A.Yu. - Influence of psychological operations upon the political process in Russia under the conditions of information warfare pp. 648-655

DOI:
10.7256/2454-0668.2015.5.66977

Abstract: This article reviews the aspects and certain methods of modern psychological operations in information confrontation, as well as the principle s and mechanisms of the work of mass media as an instrument of these operations. The relevance of this topic is justified by the exponential growth of modern communication networks and the increase of dependence of a separate individual from such networks, which allows conducting global information operations with the collective conscious of entire countries. All of this leads to a massive information warfare actively using the newest technologies of psychological effects.  As a conclusion, the author defines a number of major mechanisms and methods of the modern mass media, characteristic to the regularities of the influence of psychological operations, and points out few of the more susceptible areas of modern collective consciousness in Russia with consideration of the external factor. The author also notes the lack of specific idealistic base within Russia for counteracting foreign information influence.
Keywords: information warfare, psychological safety, information communications, cognitive systems, mass media, collective conscience manipulations, psychological vulnerability, cognitive map, Russia, public opinion
Shumov V. - Model of national security and its supplements

DOI:
10.7256/2454-0668.2015.6.12852

Abstract: The subject of this research is the analysis and determination of the key, maximally aggregated and measurable factors that define the level of security of a state (or a coalition of states). The factors affecting the state of national security (population, territory, technologies, and complementarity of the ethnoses) are being studied for the purpose of building a mathematical model of national security. In the interests of verification of the model, the author uses statistical and analytical data that characterizes the security of the nations of the European and Eurasian unions: size of the population, size of the territories, index of innovations, etc. In order to describe the system of international relations, the work employs the typology og the international systems by Morton Kaplan. In structuring the model, the author utilizes production function, power function, and distribution of Pareto. Using this model, the assessment of the security of the European and Eurasian unions is being carried out. The results of the assessment demonstrate that inclusion of Ukraine into the European Union will lower the EU’s level of security. The technologies are the hampering factor of the expansion of the European Union.
Shumov V.V. - Model of national security and its supplements pp. 788-801

DOI:
10.7256/2454-0668.2015.6.67234

Abstract: The subject of this research is the analysis and determination of the key, maximally aggregated and measurable factors that define the level of security of a state (or a coalition of states). The factors affecting the state of national security (population, territory, technologies, and complementarity of the ethnoses) are being studied for the purpose of building a mathematical model of national security. In the interests of verification of the model, the author uses statistical and analytical data that characterizes the security of the nations of the European and Eurasian unions: size of the population, size of the territories, index of innovations, etc. In order to describe the system of international relations, the work employs the typology og the international systems by Morton Kaplan. In structuring the model, the author utilizes production function, power function, and distribution of Pareto. Using this model, the assessment of the security of the European and Eurasian unions is being carried out. The results of the assessment demonstrate that inclusion of Ukraine into the European Union will lower the EU’s level of security. The technologies are the hampering factor of the expansion of the European Union.
Keywords: Security, National security, Historical approach, Systemic approach, Mathematical model, Safety criterion, EU safety, EAEU security, Values, Sovereignty
Petukhov A.Y., Krasnitskiy N.V. -

DOI:
10.7256/2454-0668.2014.6.13647

Abstract:
Petukhov A.Y., Krasnitsiy N.V. - Assessment of the political stability in Russia: problem of an effective measurement pp. 881-893

DOI:
10.7256/2454-0668.2014.6.65736

Abstract: The authors make an attempt to analyze the results of a research on the political stability in Russia over the 8 year period using one of the characteristic indexing methods of the Fund for Peace USA and an influential American magazine Foreign Policy — the “Fragile States Index”. As an alternative to such methods the authors offer their own mathematical model of calculating the level of political stability based on the authors’ socioenergetic approach. It is concluded that the politicization of the assessment makes the ratings become just another instrument of a political pressure. From the perspective of the political analysis, the authors’ model gives a more precise evaluation of the existing reality and is also capable of forecasting the progression of the situation, which makes it more effective in a number of particular cases. Therefore, the prognostic nonlinear dynamic models (although they use static data) are more independent and politically neutral instruments in the assessment of the parameters of power and country.
Keywords: socioenergetic approach, Fund for Peace, political stability, nonlinear dynamics, Fragile States Index, rating, assessment, indicator, modeling.
Other our sites:
Official Website of NOTA BENE / Aurora Group s.r.o.