National Security - rubric Informational support of national security
ïî
National Security
12+
Journal Menu
> Issues > Rubrics > About journal > Authors > Council of Editors > Concept of the Journal > Requirements for publication > Peer-review process > Article retraction > Ethics > Online First Pre-Publication > Copyright & Licensing Policy > Digital archiving policy > Open Access Policy > Article Processing Charge > Article Identification Policy > Plagiarism check policy > Editorial board
Journals in science databases
About the Journal
MAIN PAGE > Journal "National Security" > Rubric "Informational support of national security"
Informational support of national security
Kul'ba V.V. -
Abstract:
Kul'ba V.V. -
Abstract:
Osipov V.Y. -
Abstract:
Fedyakin A.V. -
Abstract:
Slezin A.A. -
Abstract:
Yusupov R.M. -
Abstract:
Yusupov R.M. -
Abstract:
Akopov G.L. -
Abstract:
Shutov A.V. -
Abstract:
Shul'ts V.L., Chernov I.V., Shelkov A.B. -
Abstract:
Akopov G.L. -
Abstract:
Pashinyan I.A. -
Abstract:
Sedykh N.S. -
Abstract:
Sedykh N.S. -
Abstract:
Turchenko M.S. -
Abstract:
Buchkova A. -
Abstract:
golovin y.a. -
Abstract:
Stanchik S.S. -
Abstract:
Afanas'eva Y.S. -
Abstract:
Bakhtin S.A. -

DOI:
10.7256/2454-0668.2013.2.7251

Abstract:
Kul'ba V.V. -
Abstract:
Kul'ba V.V. -
Abstract:
Kul'ba V.V. -
Abstract:
Surma I.V. -

DOI:
10.7256/2454-0668.2013.1.8642

Abstract:
Frolov, D.B. - Information geopolitics and the issues of information security. pp. 0-0
Abstract: Information influence forms one of the key instruments for achievement of strategic advantages in the modern world. The development of the world civilization formed a number of prerequisites to the formation of the modern quality and role of these means and forces of information influence. What is the value of information in modern geopolitics and security issues? The author of this article provides his answers to these questions. Keywords: strategy, globalization, information, information influence, information security, information policy, geopolitics, interests of the Russian Federation
Fedyakin, A. V. - Mass Media and State Information Policy in Modern Russia: Legal Grounds and Practice pp. 0-0
Abstract: The article is devoted to the analysis of officially fixed priorities of the state information policy and legal grounds for mass media in modern Russia as well as problems and perspectives of their practical appliance. The author describes the main stages of establishment and evolution of mass media in modern Russia and their peculiarities. He also analyzes the specifics of information space of modern Russia. The author suggests a certain model of state information policy in modern Russia and describes the main trends and content of this model
Keywords: social studies, national security, mass media, information policy, information communications, state construction, political communications, information security, power, information
Slezin, A.A., Puzyrev, A. Yu. - Soviet Military Propaganda in the Province as a Way to Raise National Defense Capability of a Country before a War pp. 0-0
Abstract: Based on the Materials of the Tombov Region as a typical provincial region of the Central Russia, the authors describe contradictory influence of the Soviet military propaganda on readiness of the state and society for the fight with a foreign enemy. The problem is viewed in the context of transformations of relations between the state and society at the turn of 1930-1940th
Keywords: social studies, political studies, war, security, information, correlation, Osoaviakhim, province, mass media, propaganda
Yusupov, R.M. - On the infl uence of information and communication technologies on guarantees of national security in the conditions of formation of the information society. pp. 0-0
Abstract: The problems of national security remain in the situ- Summary Íàöèîíàëüíàÿ áåçîïàñíîñòü 7/8 • 2010 126 ation of information society, however, they gain new specifi c features, due to the greater role of information, information sources and the ICT. The information characteristics cover all the key elements of the problem: geopolitics, national interests, security threats, system of security guarantees, means and methods, key directions. The article is devoted to role and place of information and communication technologies in ensuring national security within the framework of developing information society.
Keywords: military, information and communication technologies, national security, ICT, informatization, information society, national security, national resource.
Shultz, V.L., Yusupov, R.M. - Science and national security. pp. 0-0
Abstract: The article is devoted to the triadic problem of relations of science and national security: science of national security, security of science, is science dangerous.
Keywords: military service, science, national security, ensuring security, threat, protection, national security, ensuring security, threat
Shultz, V.L., Yusupov, R.M. - Science and scientific security. pp. 0-0
Abstract: The article is devoted to the triple problem of the relations between science and national security: the science of national security, security of science, and whether science is dangerous.
Keywords: science, national security, ensuring security, threat, protection.
Akopov, G.L. - Political hacktivism – a threat to national security. pp. 0-0
Abstract: The article includes analysis of key problems and threats of spread of computer crime and information attacks, which are organized on politically important motives. Based on a number of practical examples, the author analyses possible threats of use of modern network technologies for the cyber-attacks.
Keywords: political science, cyberterrorism, hacktivism, cyberwar, cyberattack, information security, cybercrime, Internet, network technologies.
Skorodumova O.B., Skorodumov B.I., Matronina L.F. - Summarized features of ensuring information security pp. 1-9

DOI:
10.7256/2454-0668.2018.2.26045

Abstract: The subject of this research is the information security that in the conditions of intense development of the information sphere, alongside the technical-technological component, progressively obtain the sociopolitical and humanitarian character due to the growing need for protection of the individual, corporation, state, and society as a whole from the information threats. The authors examine the normative technical requirements and normative legal mechanisms of regulation of the relations in the area of creation and application of the modern information technologies, as well as sociocultural factors aimed at preservation of cultural-ethnical values in the conditions of world globalization and formation of the new educational paradigm. The article substantiates the necessity of using the interdisciplinary and transdisciplinary approaches towards solution of the problem of ensuring information security. Based on the methods of socio-philosophical and comparativist analysis, the authors reveal the major threats to information security, and determine the summarized features of ensuring information security. Examining the potential solution of the problem of ensuring information security to the individual, corporation state, and society as a whole, it must be acknowledged that such activity is directly associated with the development of information sphere as a formative factor of the life of modern society and preservation of the cultural-ethnical values in the conditions of world globalization.
Keywords: social expertise, anthropological risk, data protection, cybercrime, insider, confidential information, social engineering, ensuring information security, information threats, information security
Kinsburskaya V.A. - Identifying cryptocurrency holders for the purposes of counteracting laundering of illegally obtained moneys and financing of terrorism pp. 1-14

DOI:
10.7256/2454-0668.2019.3.29720

Abstract: The goal of this research is the examination of the actual and potential risks of using cryptocurrency in criminal activities, including for laundering money obtained illegally, financing of terrorism, and determination of the acceptable methods of counteracting unlawful acts. In the course of this study, the author analyzes the documents of the Financial Action Task Force (FATF) pertinent to regulation of the sphere of virtual assets (since 2013 and up to the new revision of Recommendation 15 and Glossary adopted by FATF in October 2018; as well as the preliminary version of requirements for the representatives of cryptocurrency sector announced by FATF in February 2019); examines the models of legal regulation of cryptocurrency sector aimed at counteracting money laundering and terrorism financing in a number of foreign countries, Russian law enforcement practice on criminal offences related to the use of cryptocurrency, and the position of expert community with regards to determination of the legal status of cryptocurrencies as a subject of criminal violation. The main conclusions lie in the development of proposals on amending the current anti-legalization legislation aimed at the establishment of vigilant control over cryptocurrency circulation for counteracting money laundering and financing of terrorism in the Russian Federation. The author endorses an opinion on the need for licensing the activity of service providers regarding the exchange, transfer and storage of cryptocurrencies, and establishing responsibility of the indicated organizations for conducting verification of identity of cryptocurrency holders and their transactions; as well as points at the possible ways of collection and verification of identity information.
Keywords: KYC, cryptocurrency, cryptocurrency operations, terrorist financing, risk-based approach, AML, FATF, identification, licensing, virtual currency
Kosinova S. - Ensuring the security of the Internet space through the "new multipolarity" pp. 1-11

DOI:
10.7256/2454-0668.2022.1.37575

Abstract: In the article, the author addresses the topic of Internet governance as one of the urgent problems of international relations. Internet regulation in this context is considered as a new area of world politics, the role of which, in view of its economic, political and cultural potential, will increase in the near future. The study examines the approaches of different countries and international organizations to ensuring the security of the Internet space through its management. The author analyzes the evolution of approaches to Internet governance and the specifics of the growth of actors' involvement in this process. Various actors affecting information security are considered. A special contribution of the author to the study of the topic is the consideration of a historical retrospective of interstate interactions that directly affects the development of technologies around the world. Various methods of communication are analyzed, as well as the key principles and values that should guide the subjects of the Internet governance process. The study mentions the need for developing countries to participate in existing Internet governance mechanisms. The author identifies various scientific approaches to the regulation of the Internet space used to prevent threats to global security. This article concludes about the predominant role of the approach to regulating the Internet space through the "new multipolarity".
Keywords: global governance, internet resources, security of internet resources, actors of international relations, world politics, international relations, types of internet management, internet governance, the new multipolarity, Internet
Nikitin P.V., Dolgov V.I., Gorokhova R.I., Korovin D.I., Bakhtina E.Y. - Methodology for assessing the importance of features when analyzing the implementation of government contracts pp. 1-18

DOI:
10.7256/2454-0668.2023.4.44013

EDN: WKMAFQ

Abstract: The subject of the research is assessing the risks of performing government contracts. The object of the study is the process of analysis and evaluation of the implementation of government contracts. The study is aimed at developing a methodology that determines the importance and significance of signs that influence the risk of non-fulfillment of government contracts. Research methods were used: data analysis to detect connections and dependencies between various characteristics and the risk of non-fulfillment of government contracts; statistical analysis to obtain an assessment of the impact of each characteristic on the risk of non-fulfillment of contracts and ranking them in order of importance; machine learning to predict the risk of non-fulfillment of government contracts; expert assessments to take into account contextual factors and features, their impact on the importance of features. The main conclusions of the study are the presented methods for assessing the importance of features when analyzing the implementation of government contracts, by using data from various sources, including the register of public procurement of the unified information system (UIS), the register of unscrupulous suppliers (RNP) of the EIS and the SPARK information system. The authors managed to achieve high prediction accuracy (more than 97%) and analyze the most important and significant features. The scientific novelty lies in the fact that the results obtained make it possible to identify and analyze factors from three information systems that influence the risks of non-fulfillment of government contracts. Thus, this study is valuable and important in its field, which contributes to the development of more effective risk management methods and increased efficiency in the implementation of government contracts. The results obtained allow us to identify the factors that have the greatest impact on the risks of non-fulfillment of contracts, which makes the study valuable and important in this area.
Keywords: machine learning, the importance of signs, classification, risk assessment, feature analysis, the method of support vectors, the SHAP method, contract execution, artificial intelligence, government contracts
Manoilo A.V. -

DOI:
10.7256/2454-0668.2013.3.2475

Abstract:
Shvets Y.V., Dorozhkova P.M. - Mass media in the Information Security management system of Russia pp. 20-27

DOI:
10.7256/2454-0668.2022.1.26058

Abstract: The object of the study is the official position of the authorities regarding the information security of the country and the official view of what role the mass media should play in this complex system. The authors pay special attention to recent changes in this area and the analysis of what measures have been taken by the state to regulate the issue of information security. Particular attention is focused on regulatory legal acts, which are legislative initiatives of strategic planning in the field of ensuring the national security of the Russian Federation. When working on the article, the authors emphasized the use of sociological, systemic and institutional research methods. The main conclusion of the studied problem is the awareness of the understanding that the mass media have a strong influence on public consciousness. In this case, it is important to understand who exactly uses the media as a tool of manipulation, since an adequate analysis of these processes will ensure national and information security. In particular, the author substantiates the special role of the institute of television as the main means of social control through the appropriate representation and interpretation of social reality.
Keywords: state, television, information threats, Information Security Doctrine, manipulations, information security, management, national interests, mass media, TV channel
Sedykh N.S. -

DOI:
10.7256/2454-0668.2014.1.9384

Abstract:
Litvinova T.N. - The European and Russian policies on preventing cyberterrorism (on the example of fight against Cyber Jihad pp. 32-47

DOI:
10.7256/2454-0668.2020.3.30197

Abstract: The subject of this research is to determine similarities and differences in the fight against “Cyber Jihad” in policy of the European Union and the Russian Federation. The object of this research is the prevention of cyberterrorism as a threat to national and international security, associated with the dynamic development of information technologies worldwide, absence of censorship and the wide availability of materials published on the Internet. The author describes the legal framework for countering cyberterrorism in the European Union and the Russian Federation. Special attention is given to the difference in approaches in the European and Russian legislation towards fight against undesirable materials in the global network, difficulties related to countering "Cyber-Jihad", identification of people from risk groups who may be involved in terrorist activities as a result of hostile propaganda. The scientific novelty of this work consists in the empirical proof that the difference in approaches to countering cyberterrorism in the European Union and the Russian Federation significantly reduces the results of fight against the global "Cyber Jihad". The author reveals the key legal, technical and ideological difficulties in the fight against "Cyber-Jihad", underlines the need for coordination of the efforts of Europe and Russia in this area, as well as indicates the importance of prevention and ideological counter-propaganda among youth and at-risk population groups.
Keywords: terrorist acts, countering terrorism, legal regulation, Cyber Jihad, cyber terrorism, cyber security, European Union, Russia, extremist materials, recruitment
Sedykh, N.S. - Role of mass communications in the information and psychological fight against terrorism. pp. 32-49

DOI:
10.7256/2454-0668.2014.1.63892

Abstract: The article concerns the role of mass communications in the social reality construction. In this regard the author analyzes some consequences of global information penetration of the social sphere, as well as some specific features of mass communication influence on the public opinion and individual conscience. The author provides the result of discourse analysis for the TV programs of the Channel 1 in the period between 8 and 14 of July, 2013. The main criteria for the choice of TV programs for analysis was the presence of social rhetoric, defining the specificities of ideological inf luence. The author views the problems of information and psychological anti-terrorism activities with regard to the role of pedagogical journalism and educational technologies. The author refers to the issue of consolidation of efforts of pedagogical and journalist communities in order to develop projects aimed against extremist and terrorist ideologies among the youth. The author points out the need to form specialized educational programs for additional professional education for some categories of teachers and social pedagogues, journalists, law-enforcement officers in order to develop specific competencies in for professional purposes of extremism and terrorism prevention, as well formation of antiterrorism values in the Russian society.
Keywords: society, terrorism, threat, youth, information, mass communications, discourse, information and psychological counteraction, education, pedagogical journalism.
Duben A.K. - Recent trends in the development of legal regulation in the sphere of ensuring information security of the judicial system in the Russian Federation pp. 56-65

DOI:
10.7256/2454-0668.2021.5.36816

Abstract: This article explores the questions of information security in the conditions of digital transformation and improvement of state administration. The author analyzes the impact of these challenges upon the judicial system overall and legal support of information security. Considering the existing scientific research and foreign experience, the conclusion is made on modernization of digital interaction on the issues of notifying the parties about the court hearing. Special attention is given to the institution of identification. Vectors in the development of complex institution of identification in the conditions of digital transformation are outlined. The author analyzes the case law material of the courts of general jurisdiction pertaining to personal data protection of a particular category of citizens; as well as substantiates the importance of digital notification of the parties to court proceedings for preventing the abuse of procedural rights by unconscientious participants. The author believes that formalization of prohibition on posting court documents online, in cases involving military personnel or persons doing military service, would ensure personal data protection of a particular category of citizens. . The conclusion is made that the highlighted issues of ensuring information security in the context of administration of justice testify to poor legal regulation of the institutions of identification and personal data. The consolidation of the uniform principles of legal regulation of relations that arise in the process of consideration and resolution of court cases with the use of information and telecommunications technologies, would allow countering the new challenges and threats in the information sphere, as well as the impact of globalization upon determination of the national strategy for the development of information society.
Keywords: digital profile, digital technologies, personal data, identification institute, public authorities, legal information, information society, biometric identification, trust space, artificial intelligence
R. M. Aslanov, À. À. Ìorozov - System analysis of legal guarantees for the information security in Russian Federation. pp. 56-59
Abstract: Currently in the Russian Federation there are all necessary conditions for the transfer to the information society, and one of such conditions is the development of the system of normative regulation of the relations in the sphere of information security. It is also fair to note that the social relations in the information sphere influence the development of information=related legislation, as well as legislation in the sphere of information security.
Keywords: guarantees, distribution, information, security, system, regulation, conditions, relations, society.
Akopov, G.L. - Political and legal threats of spreading socially-oriented Internet technologies. pp. 60-67
Abstract: The article includes analysis of the existing threats to national security within the context of development of Internet technologies the formation of the information society in the Russian Federation. At the current stage of development of the information society and integration of the social networks into the private lives of persons, the issue of security and protection of personal data is quite topical. At the same time the process of involvement of a person into the Internet society, on one hand shows the abilities for the political choice, and on the other had includes the process of imposition of decision-making as well as a number of cyber-threats.
Keywords: political science, Internet, social networks, Internet-resources, Internet-society, Internet-threats, information security, internet-communication, personal data.
Surma, I.V. - The new global supranational actor in the international relations within the framework of national security. pp. 66-80

DOI:
10.7256/2454-0668.2013.1.62343

Abstract: The modern information processes in the society lead to the changes in the government structures and technologies in favor of those, who manage information streams and resources. Modern Internet has the potential for provoking various crises, or strengthening existing crises. Information and communication structure of the state is a strategic resource, which requires constant control and attention. Any destructive activities in the information sphere may have serious consequences for the manageable networks and systems, therefore the information networks currently serve as means of information warfare for public politicians, religious organizations, entrepreneurs and businessmen, criminals, criminal and terroristic groups. The role of studying the cyber-terrorism, the scientific bases for the means against it is ever-growing nowadays in the conditions of complicating social and political structures, loss of trust to political institutions, inefficiency of some existing mechanisms of inß uence on the society. These and other circumstances require the development of an efficient state policy against cyber-terrorism, as well as the development of a new “intellectual technology” and program instruments, in order to control the “dark Web” and to analyze social networks. Therefore, the information guarantees of foreign policy and international relations have value, which is similar to such priority issues of global policy, as non-proliferation of nuclear arms, regulation of regional conß icts and peace-making, support of global security, protection of cultural heritage and guarantees of human rights.
Keywords: political science, social networks, Internet space, cyber-attacks, social bots, SMISC, BFT-ONE, Internet mass media, the Arabian spring, cyber-terrorism.
Stanchik, S.S. - Role of the Internet in the modern revolutions. pp. 67-72
Abstract: The “colored” upheavals on the post-Soviet territory were mostly successful due to the use of mass media by the revolutionary opposition in order to manipulate the society. The goal of this article is to show how Internet became the weapon of revolutionaries. It should be noted that the so-called “colored” revolutions became the first wave of this type, when the opposition used the global web as an instrument for the demonization of the ruling government and for the manipulation of the social opinion. The popular social networkds, such as Facebook, Odnoklasniki, Vkontakte, etc.) were not used in “colored” revolutions, since they appeared later. Thanks to the Internet, the opposition managed to arrange on-line protest actions and the bloggers, who were financed by the opposition, wrote anti-governement articles. The organizers of the “colored revolutions” in the post-Soviet territory also paid attention to the specialized forums and sites. The lawful government attempted to fight the Internet-revolutionaries, but the global web was new, and the ef- ficient methods for fighting it were not yet formed. Therfore, one can say that the mass media were key in the support of turnovers in Georgia, Ukraine and Kirgizia.
Keywords: political science, revolution, riot, colored, orange, Internet, manipulation, opposition, anti-government, nework.
Sedykh, N.S. - Modern terrorism from the point of view of information and psychological threats. pp. 68-75
Abstract: The article includes analysis of terrorism as an information and psychological threat. The author views the means of mass communication as a discourse system, and their role in social construction of the phenomenon of terrorism. The author offers the methods for the studies of the specifi c psychological and information-based infl uence of mass media and communications reports on terrorism in order to organize an efficient information and psychological counteraction.
Keywords: psychology, terrorism, terrorist act, threat, influence, information, communication, text, discourse, media-discourse.
Shultz, V.L. - Scenario analysis of the effi ciency of management of the information support of the state policy of Russia in the Arctic territory. pp. 104-137
Abstract: The article is devoted to a complex of methodological and applied problems of improved effi ciency of management of information support of the state policy of the Russian Federation in the Arctic region. The author shows the methods of modeling and structural and dynamic analysis of the effi ciency of information management. Then the author shows the results of the development and scenario analysis of the multy-graph (multi-chart) models of information confrontation of geopolitical opponents of Russia.
Keywords: security, information support, scenario modeling, structural and dynamic analysis, active information campaign, information threat, destructive infl uence, effi ciency of management.
Pashinyan, I.A. - Specifi c features of perception of information risk. pp. 107-113
Abstract: The article is devoted to the results of studies of differences in perception of information risks by two groups of experts: journalists and special service staff. The author describes the mechanisms for the deformation of perception of professional risks due to psychological peculiarities of these groups. The author then comes to a conclusion that a number of mechanisms may infl uence the results of expertise, which should be taken into account when analyzing reliability and trustworthiness of the results of expertise.
Keywords: political science, security, information, journalist, information risk, expert method, deformation effect, phenomenon, competence, cognition.
Afanasieva, Y.S. - Television broadcasting as a factor for the military policy of the modern states. pp. 110-117
Abstract: Since the modern warfare is part of the “mediabased policy”, and it uses new instruments in order to create military and political pressure and to gain information superiority, it actively uses the mass media. This article is devoted to the study of television broadcasting based on various motives of lawful behavior in the legal sphere, as well as the methods of influence of on the legal conscience of people via the mass media in order to form anticriminal position in the social sphere. The author includes political analysis of television broadcasting as a factor in the political relations in time of war, military and political tensions. The author also singles out the specific features of the television broadcasting as the “weapon of mass influence ”. The author shows the possibility of the broadcasting resources in the information field of the network-centered war. The author then characterizes the functions for the television broadcasting at various stages of the military conflict, provides generalizations on the manipulative technologies in the sphere of television broadcasting, then offers the options for the protection of their influence, she also analyzes the Russian and foreign experience of television broadcasting in the implementation of the military policy of a state.
Keywords: political science, television, politics, security, state, television broadcasting, technologies, people, power.
Turchenko, M.S. - Political agenda in the discourse practices of V.V. Putin at the time of federal election campaigns in 2000 – 2010. pp. 114-120
Abstract: The study of verbal activities of politics is quite important within the political science, since their sayings are often performative by their nature, that is they not only provide for the characteristics of the political system and constellation of actors, but they actually change the world. Due to this fact the discourse practices of V. Putin in Russian politics become a topical issue for research and study.
Keywords: political science, national security, politics, election campaigns, Putin, Russia, discourse, political agenda, political course, information.
Bakhtin, S.A. - The Internet economy – the new challenge for the national economic security: the general characteristics. pp. 118-122
Abstract: The article is devoted to the influence of the Internet on the global and national economic development. The author supports the thesis on the Internet-economy phenomenon as a fundamental factor for the transition from the industrial market economy to the innovation economy via the new Internet-based communication infrastructure. The author also views the critical factors for the development of the Internet economy and the problems of its formation in the Russian Federation.
Keywords: economics, Internet, intermediary, social, network, communication, infrastructure, national, security.
Nartsissova S.U., Noskov Y.M., Krupennikov N.A., Matvienko S.V., Kondrat'ev V.S. -

DOI:
10.7256/2454-0668.2013.5.9871

Abstract:
Nartsyssova, S.Y., Noskov, Y.M., Krupennikov, N.A, Matvienko, S.V., Kondratiev, V.S. - Thinking as a personal development factor: modeling specific cogitativestyle features of argumentation. pp. 124-148

DOI:
10.7256/2454-0668.2013.5.63362

Abstract: The authors of the article develop and discuss the conceptual model of cogitative-style determination of the argument. They provide the comparative cogitative style model, showing effect of cogitativestyle mobility, as well as specific features of the organization of psycholinguistic and psychosemantic studies, processing its results by the following methods of the sampling theory: with the use of contingency tables, with the use of χ2- Pearson criterion, with the dot-biserial coefficient of correlation of Pearson, univariate analysis of variance. The conclusions provided in the article were formed by the empirical research of interrelation between cogitative styles and features of the argumentation.
Keywords: cognition, cogitative style model, cogitative style specific features, Mann-Whitney U-test, dispersion analysis, chi^2 criterion, empiric frequencies, theoretical frequencies, contingency tables, modeling
Buchkova, A.I. - Specifi c features of infl uence of the Internet on the political socialization of the youth in the modern Russia. pp. 132-141
Abstract: The article is devoted to the specifi c features of infl uence of the Internet on the political socialization of the youth in Russia. It is noted that the global network is a key agent of political socialization in the modern information society, and that it may be used in order to infl uence the youth, for example, to manipulate it into protest activities, such as actions and meetings. At the same time multi-functional social networks are recognized as most demanded mechanisms of infl uence on the youth. The author also analyzes the specifi c features of the modern political parties and youth organizations, which actively use Internet technologies, and which may become centers for uniting the youth. It is noted that there is need to understand the mechanisms and specifi c features of infl uence of the global network on the youth, which in turn shall allow to make the process of political socialization of the modern Russian youth more predictable and well-aimed, thus supporting the state security and protection of sovereignty of the state.
Keywords: social studies, socialization, politics, youth, Internet, agent, infl uence, social network, party, organization.
Golovin, Y.A. - Activation of the modern mass media in the sphere of guarantees of information security. pp. 142-148
Abstract: The author analyzes the historical development of the role of mass media in social and political life. The author analyzes the basic document for the state information policy in the sphere of guarantees of political security in the Russian Federation. Then the author correlates each type of state information policy with the mass media. The author analyzes the objects of state information policy and classifi es them, then he points out the general vectors for the political government in the sphere of information security of mass media.
Keywords: political science, political government, political power, doctrine, political process, information security, security, object, mass media, politics.
Sipok, R.P. - Meaning and effi ciency of the mass media in guaranteeing social security. pp. 149-158
Abstract: The object of the studies in this article regards the social relations in the modern society and the infl uence of the mass media on the legal conscience of the people. The goal of this article is to study various means of infl uence of the mass media on criminal and anti-criminal conscience of people in the modern society. The use of results of this study may be helpful for the mass media personnel for the formation of the educated policy in the sphere of information for the peole in order to form an anti-criminal culture of behavior and to lay the legal ground for the growth of social self-conscience. As a result of this study, the author comes to a conclusion that the maximum level of legal conscience in the society is one of the most effi cient guarantees of the law-abiding behavior of the people for the state and the society. The author also comes to a conclusion that solidarity of the people with the crime-prevention operations and with the protection of victims is a positive condition for such activities. For example, in the opinion of many psychologists the more effi ciently the mass media fulfi ll the requirements of the people, the more sustainable and broader becomes the connection among them. However, the commission of many crimes takes place under the infl uence of the mass media, which spread the information in order to improve the ratings of their TV programs or publications. The main value of this article is the conclusion of the author, that in order to make the implementation of the criminal law policy more effi cient it is important that the state would have certain information impact on the people, since self-regulation of the mass media and provision of information on prevented and duly investigated crimes may have a positive impact on the formation of the general criminal situation in our state.
Keywords: jurisprudence, crime, security, protection, invincibility, mass media, legal conscience, state, punishment, infl uence.
Shutov, A.V. - Sports as a channel for aggression in the modern world. pp. 181-187
Abstract: In connection with the development of mass media and public communications appeared an opportunity to study sport in new ways. In this article, the emphasis is on the communicative channel between the athletes and spectators, as well as the functioning of this channel in the wide dissemination of digital technologies. Author examines the sport as one of the most important for modern society channels out of aggression.
Keywords: sport, aggression, violent behaviors, hooligans, fighting
Kostin A., Zhigulin G., Volodina A. - Analysis of the threat of loss of legal power of documents within the system of remote financial document management

DOI:
10.7256/2454-0668.2016.2.14865

Abstract: The authors carefully examine such aspects of the topic as the threat to information security for the St. Petersburg municipal authorities within the system of remote financial document management. The authors underline the advantages of the system of remote financial document management, new system introduced in July of 2013 before the system of electronic document management. The article presents information for receiving the qualified certificate of verification key in the federal treasury of St. Petersburg. The individual properties of electronic document management, with the help of which it retains its legal power from the technical point of view, are being reviewed. The main conclusion consists in building a generalized model that describes the conditions under which emerges the threat of “loss of legal power of an electronic document”. The scientific novelty consists in examination of threat with regards to the questions of information security during the transfer of data between the St. Petersburg municipal authorities and the federal treasury.  
Keywords: electronic document management system, loss of legal force, electronic signature, threat to information security, electronic document, Remote financial document, federal treasury, qualified certificate, source of threats, municipality
Kostin A.O., Zhigulin G.P., Volodina A.A. - Analysis of the threat of loss of legal power of documents within the system of remote financial document management pp. 228-235

DOI:
10.7256/2454-0668.2016.2.67749

Abstract: The authors carefully examine such aspects of the topic as the threat to information security for the St. Petersburg municipal authorities within the system of remote financial document management. The authors underline the advantages of the system of remote financial document management, new system introduced in July of 2013 before the system of electronic document management. The article presents information for receiving the qualified certificate of verification key in the federal treasury of St. Petersburg. The individual properties of electronic document management, with the help of which it retains its legal power from the technical point of view, are being reviewed. The main conclusion consists in building a generalized model that describes the conditions under which emerges the threat of “loss of legal power of an electronic document”. The scientific novelty consists in examination of threat with regards to the questions of information security during the transfer of data between the St. Petersburg municipal authorities and the federal treasury.  
Keywords: electronic document management system, loss of legal force, electronic signature, threat to information security, electronic document, Remote financial document, federal treasury, qualified certificate, source of threats, municipality
Bocharov M.I., Bocharova T.I., Simonova I.V. -

DOI:
10.7256/2454-0668.2014.2.9576

Abstract:
Bocharov, M.I., Bocharova, T.I., Simonova, I.V. - The substantial elements of teaching information security at the basic and general secondary education. pp. 260-275

DOI:
10.7256/2454-0668.2014.2.64066

Abstract: The article contains analysis of how the requirements of the modern society and standards of general and general secondary education on the issues of teaching information security are reflected in the school manuals on information science. The authors study the role of teaching information security and socialization of school graduates in the modern information society. The authors single out specific features of teaching information security within the framework of the course of information science based upon the analysis of the manual sets by several authors. Based upon the revealed patterns in the system of provision of materials and contents of the manuals themselves, the authors provide recommendations for the improvement of the approaches towards formation of the contents of teaching information security. The authors also clarify the definition of information security regarding teaching school students, substantiating its use. The authors then provide components for the teaching standard for information security for basic and general secondary education, as the basis for the system of teaching information security within the framework of information science.
Keywords: contents of school manuals, information security, teaching information security, information science, teaching methods, teaching school students, socialization of school students, study contents, information technologies, security problems.
Zinovieva E. - The role of social media in contemporary international conflicts: the existing scientific approaches and future research directions

DOI:
10.7256/2454-0668.2016.3.16376

Abstract: The article is devoted to the analysis of the role of social media in contemporary international conflicts, as well as review of existing scientific approaches to the study of this new phenomenon.The author uses an interdisciplinary theoretical and methodological framework - the philosophy of technology and theories of political communication. The theory of political communication allows to analyze the characteristics of new media and their role in political communication in conflict, while the philosophy of technology makes it possible to assess the impact of technology on social processes, including international conflicts.As soon as the social media have become an integral part of the international policy and conflicts, the researchers are moving away from techno optimism in the evaluation of new Internet communications, according to which new media contribute to the democratization, the reduction of conflict, and consider the new media as a factor in the escalation conflicts, so techno pessimism becomes increasingly popular. At the same time, new media, like any other technology, are neutral and can be used by different groups for resolution as well as escalation of conflicts. However, studies on the role of social media in conflict resolution are underrepresented in the modern scientific literature. The author is proposes research agenda on the role of new media in the settlement of current conflicts.
Keywords: international conflicts, world politics, internet, information security, conflict resolution, political communication, social networks, social media, philosophy of technology, conflict management
Zinov'eva E.S. - The role of social media in contemporary international conflicts: the existing scientific approaches and future research directions pp. 358-368

DOI:
10.7256/2454-0668.2016.3.67888

Abstract: The article is devoted to the analysis of the role of social media in contemporary international conflicts, as well as review of existing scientific approaches to the study of this new phenomenon.The author uses an interdisciplinary theoretical and methodological framework - the philosophy of technology and theories of political communication. The theory of political communication allows to analyze the characteristics of new media and their role in political communication in conflict, while the philosophy of technology makes it possible to assess the impact of technology on social processes, including international conflicts.As soon as the social media have become an integral part of the international policy and conflicts, the researchers are moving away from techno optimism in the evaluation of new Internet communications, according to which new media contribute to the democratization, the reduction of conflict, and consider the new media as a factor in the escalation conflicts, so techno pessimism becomes increasingly popular. At the same time, new media, like any other technology, are neutral and can be used by different groups for resolution as well as escalation of conflicts. However, studies on the role of social media in conflict resolution are underrepresented in the modern scientific literature. The author is proposes research agenda on the role of new media in the settlement of current conflicts.
Keywords: international conflicts, world politics, internet, information security, conflict resolution, political communication, social networks, social media, philosophy of technology, conflict management
Vladimirova, T.V. - Network communications as a new “salvation formula” for the social order pp. 371-378

DOI:
10.7256/2454-0668.2013.2.62622

Abstract: The article includes the development of the approach towards the problem of security in the society as sustainable social order in the conditions of growing deviation/variety. The analysis of the evolution theory of N. Luhmann allows one to see the role of deviation in the modern destinies in more detail. The idea of the author is that once the “semantic hypertrophy of variety ” appears, the social system develops a new “salvation formula” for the social order, which is development of network communication space. The network has a unique quantity – the limitless ability to meet the need for the Undeniable. In this sense, one may say that development of network communications “saves” the order in the society by localizing the anomia in the virtual network space.
Keywords: social studies, security, society, communication, variation, deviation, network, anomia, accumulation, acceleration.
Vladimirova T.V. -

DOI:
10.7256/2454-0668.2014.3.11511

Abstract:
Vladimirova, T.V. - Information security: social practices and structures. pp. 390-397

DOI:
10.7256/2454-0668.2014.3.65062

Abstract: Definition of information security continues its formation in various spheres of social life, as well as in theoretical knowledge in general. The author considers that various study directions and approaches to information security may be regarded from a single methodological standpoint, as expressed in the language of social and philosophical theory. Such an operation in the view of the author shall facilitate further development and fulfillment of the understanding of social nature of this term. The author connects information security guarantees with understanding and possession of specificities of the modern social practices, allowing to keep information streams adequate to the outside world for an individual or social systems, thus, providing for comprehensive and sustainable situation for individuals and systems in the conditions of growing deviations/innovations, communication variability and growing intensity of information streams. Theoretical and methodological basis for the study is formed with the sociological theories of A. Giddens, M. Castells, J. Urry. The author also uses the works of Russian scientists in the sphere of information security guarantees. It is noted that guarantees of information security are formed with various social practices and social structures. The offered approach allows to develop understanding of social aspects of information security, to see specific features of information guarantees practices, to fix the contradiction between locality of structures and the network stream character of information threats. It is noted that high intensity of communication mobility practices in security guarantees becomes possible thanks to security privatization as a specific feature of such practices.
Keywords: information security, information security practices, information security structures, security privatization, structural locality, information industry, information infrastructure, information law institutions, new mobility information streams.
Manoylo, A. V. - Psychological Operations in Raider Wars pp. 464-470

DOI:
10.7256/2454-0668.2013.3.62818

Abstract: The article describes the purposes, tasks, methods and technologies of psychological war operations used in raider (hostile) takeovers, i.e. operations on unfriendly absorption of Russian companies.
Keywords: psychology, national security, raiders, psychological security, information war, information inf luence technologies, economic security, psychological operations, unfriendly absorption, business security.
bartosh a.a. - Strategies of information warfare

DOI:
10.7256/2454-0668.2016.4.17807

Abstract: The object of this research is the information warfare, which can be carried out within the framework of color revolution and/or hybrid war. The subject of this research is the role of strategies of demolition and exhaustion that are being examined with regards to information warfare in the aforementioned conflicts. It is stated that the strategies of information warfare can be viewed as the varieties of strategies of demolition and of exhaustion implemented in conventional conflicts. The author determines the content and mutual influence of the strategies of demolition and exhaustion in the information warfare pertaining to color revolution and hybrid warfare. It is underlined that in the modern conflicts “hard power” is being implemented in combination with the non-military methods of affecting the enemy, including the information-psychological warfare. The author examines the role of public diplomacy and “soft power” in the information warfare. The approaches towards development of Russia’s strategy in counteracting information warfare are being proposed. The main conclusion of this work lies in the necessity of establishment of countermeasures against the disruptive information technologies in political-administrative, cultural-economic, and cultural-worldview spheres, taking into account the use of the two interconnected information strategies of demolition and exhaustion by the adversary. The author’s main contribution consists in justification of implementation of the strategies of demolition and exhaustion in color revolution and hybrid warfare correspondingly. The author is first to attempt to pursue correlation and interconnection between the strategies of demolition and exhaustion in the information warfare of modernity.
Keywords: Adjustment, Threats, Model, National security, Controlled chaos, Strategy of exhaustion, Strategy of demolition, Information warfare, Hybrid war, Color revolution
Bartosh A.A. - Strategies of information warfare pp. 485-499

DOI:
10.7256/2454-0668.2016.4.68012

Abstract: The object of this research is the information warfare, which can be carried out within the framework of color revolution and/or hybrid war. The subject of this research is the role of strategies of demolition and exhaustion that are being examined with regards to information warfare in the aforementioned conflicts. It is stated that the strategies of information warfare can be viewed as the varieties of strategies of demolition and of exhaustion implemented in conventional conflicts. The author determines the content and mutual influence of the strategies of demolition and exhaustion in the information warfare pertaining to color revolution and hybrid warfare. It is underlined that in the modern conflicts “hard power” is being implemented in combination with the non-military methods of affecting the enemy, including the information-psychological warfare. The author examines the role of public diplomacy and “soft power” in the information warfare. The approaches towards development of Russia’s strategy in counteracting information warfare are being proposed. The main conclusion of this work lies in the necessity of establishment of countermeasures against the disruptive information technologies in political-administrative, cultural-economic, and cultural-worldview spheres, taking into account the use of the two interconnected information strategies of demolition and exhaustion by the adversary. The author’s main contribution consists in justification of implementation of the strategies of demolition and exhaustion in color revolution and hybrid warfare correspondingly. The author is first to attempt to pursue correlation and interconnection between the strategies of demolition and exhaustion in the information warfare of modernity.
Keywords: Adjustment, Threats, Model, National security, Controlled chaos, Strategy of exhaustion, Strategy of demolition, Information warfare, Hybrid war, Color revolution
Lebedeva E.V. - Information security of CIS states: stages of implementation pp. 500-508

DOI:
10.7256/2454-0668.2016.4.68013

Abstract: In this work the author focuses his attention on the process of international dialogue with regards to the questions of information security. The object of this research is the information policy of CIS countries on international arena. The goal of this article consists in determination of specificity of the stages of CIS countries’ work over the establishment of the normative legal and methodological base of ensuring the international information security. In order to achieve the set goal it is necessary to detect the key disputes on this issue with the Western colleagues, as well as to underline the dynamics of the notion “information security”. The scientific novelty consists in the acquired results during the course of this research pertaining to the assessment of CIS countries international policy in the information-communication sphere within the framework of the stages of its development throughout the period of 1990-2015. The analysis of the work of regional institutions from a perspective of the intergovernmental documents allowed explaining the conclusions that currently CIS states attempt to establish a complex and open system of international information security based on compliance of its participants to the universal rules that ensure security of information environment. The author presents the characteristic of CIS states information, its goals and principles in the context of three periods of its development.
Keywords: Normative base, Political manipulation, Cybercrime, United Nations, Shanghai Cooperation Organization (SCO), Commonwealth of Independent States (CIS), Sources of threats, Regional information security, Information space, Information security
Petukhov A.Y., Ivlieva P.D. - Psycholinguistic analysis of the media coverage of the Ukrainian crisis within German mass media throughout 2014

DOI:
10.7256/2454-0668.2015.4.15770

Abstract: This article is dedicated to the analysis of the information materials from the popular German mass media on the Ukrainian crisis throughout 2014 from the perspective of psycholinguistics. A special attention is given to the formation of images of Russia and Ukraine within the framework of information-psychological confrontation using psycholinguistic processing of the text, use of special approaches and strategies for determining and delivering information. The relevance of this topic is substantiated by the significant increase in information and psychological confrontation between Western Europe and the United States on one hand, and Russia on the other. As the result of the analysis, the authors come to a conclusion that many articles contain not only informational subtext, but a propagandistic one as well, called to instill a point of view among readers that will correspond with the current foreign policy of the EU and Germany pertaining to the Ukrainian crisis and its key players.
Keywords: media coverage of the conflict, Germany, Ukraine, Russia, Ukrainian crisis, psycholinguistics, information warfare, psychological operations, mass media, power
Petukhov A.Yu., Ivlieva P.D. - Psycholinguistic analysis of the media coverage of the Ukrainian crisis within German mass media throughout 2014 pp. 548-556

DOI:
10.7256/2454-0668.2015.4.66736

Abstract: This article is dedicated to the analysis of the information materials from the popular German mass media on the Ukrainian crisis throughout 2014 from the perspective of psycholinguistics. A special attention is given to the formation of images of Russia and Ukraine within the framework of information-psychological confrontation using psycholinguistic processing of the text, use of special approaches and strategies for determining and delivering information. The relevance of this topic is substantiated by the significant increase in information and psychological confrontation between Western Europe and the United States on one hand, and Russia on the other. As the result of the analysis, the authors come to a conclusion that many articles contain not only informational subtext, but a propagandistic one as well, called to instill a point of view among readers that will correspond with the current foreign policy of the EU and Germany pertaining to the Ukrainian crisis and its key players.
Keywords: media coverage of the conflict, Germany, Ukraine, Russia, Ukrainian crisis, psycholinguistics, information warfare, psychological operations, mass media, power
Akopov G.L. - Hacktivism – a challenge to national security within information society

DOI:
10.7256/2454-0668.2015.4.15834

Abstract: This article examines the issues of cyber threats and cyberterrorism. The explanation for this phenomenon is the dynamic information-communication development of the modern society. The article examines the factors that gave rise to cyberterrorism. A special attention is given to the so-called hacktivists – those who commit acts of cyberterrorism without financial gain, but rather to support their political ideas; a number of specific examples of hacktivist activity are being presented. As a result, the governments today are forced to concentrate harder about creation of a cyber shield to ensure information safety. Among the main conclusions the author substantiates the need to place cyber security as the corner stone of every nation. To ensure information and cyber security and counteract these threads, the author recommends forming cyber forces based on scientific brigades.
Keywords: cyberterrorism, cyber threat, cyber forces, hacker attacks, hacktivism, information sovereignty, cyber shield, information security, cyber security, information society
Akopov G.L. - Hacktivism – a challenge to national security within information society pp. 557-562

DOI:
10.7256/2454-0668.2015.4.66737

Abstract: This article examines the issues of cyber threats and cyberterrorism. The explanation for this phenomenon is the dynamic information-communication development of the modern society. The article examines the factors that gave rise to cyberterrorism. A special attention is given to the so-called hacktivists – those who commit acts of cyberterrorism without financial gain, but rather to support their political ideas; a number of specific examples of hacktivist activity are being presented. As a result, the governments today are forced to concentrate harder about creation of a cyber shield to ensure information safety. Among the main conclusions the author substantiates the need to place cyber security as the corner stone of every nation. To ensure information and cyber security and counteract these threads, the author recommends forming cyber forces based on scientific brigades.
Keywords: cyberterrorism, cyber threat, cyber forces, hacker attacks, hacktivism, information sovereignty, cyber shield, information security, cyber security, information society
Vladimirova T.V. -

DOI:
10.7256/2454-0668.2013.4.7476

Abstract:
Vladimirova T.V. - Information security: sociological perspective of the term pp. 597-604

DOI:
10.7256/2454-0668.2013.4.63058

Abstract: The article discusses a topical issue of the definition of information security within the object field of sociological knowledge. The author analyzes traditional definitions of information security, and she offers an approach towards structuring the information environment and the attitudes to information environment both in the broad and narrow understanding of the term. The author provides for the understanding of information security as security of social practices of the information service in the conditions of growing intensity of information streams and outdating information.
Keywords: social studies, security, information environment, information, cyber-space, modern time, practices, actual/virtual, social, speed-up/outdate
Sedykh N.S., Gshiyants R.E., Gshiyants R.E., Gshiyants R.E. -

DOI:
10.7256/2454-0668.2014.5.11888

Abstract:
Sedykh N.S., Gshiyantz R.E. - The graphical model of the social representations of terrorism pp. 712-724

DOI:
10.7256/2454-0668.2014.5.65580

Abstract: This article presents the main results of an empirical research, the goal of which is to study the peculiarities of the student youth’s perception of subjects of terrorism. As such, the following were examined: a terrorist — the leader of a terrorist movement, responsible for development of corresponding ideology, propaganda, and promoting the idea of extremism for the purpose of recruiting new members into the ranks of the organization; a terrorist — the executant, member of a terrorist cell responsible for the preparation and carrying out of an act of terrorism; a male and a female terrorist bombers. The methodology behind the research is developed based on the semantic differential and is aimed at detecting the physical appearance, socio-demographic characteristics and character traits of terrorists, which will solve various problems with regards to carrying out their destructive actions. For the purpose of expansion the interpretations and development of conclusions, the author offers a graphical model of social representations of terrorism, which allows illustrating the key vectors of terrorist activity and the structure of perception about subjects of terrorism. This presents an interest in the context of problematics of antiterrorist activity. In the analysis of the results, one of the aspects taken into consideration is that of the role of mass-media in the social formation of the phenomenon of terrorism. The question of optimizing the social and informational-psychological countermeasures to terrorism under the modern circumstances becomes more relevant.
Keywords: Terrorism, terrorist, society, youth, information, mass communication, influence, social perceptions, preventative measures, informational-psychological countermeasures.
Markova A.V. -

DOI:
10.7256/2454-0668.2014.6.13664

Abstract:
Markova A.V. - Virtual communicative confrontation between the United States and China pp. 940-945

DOI:
10.7256/2454-0668.2014.6.65741

Abstract: This article is dedicated to the confrontation between the United States and China within the modern information communication networks. The author examines the current state of China’s security from the perspective of the theory of information warfare. Main mechanisms of the manipulative methods of the psychological operations against China based on inducing within the mentality of an individual the symptoms of a borderline psychopathology are being analyzed. This article studies the tendency of a broad implementation of information technologies within the military facilities that provide cyber security in order to increase their level of combat capability. The author explores the use of information and virtual communication ways to influence the consciousness of citizens as an intrinsic part of modern international processes. The author comes to a conclusion that the United States and China gradually expand their capabilities in waging cyber and information-psychological warfare. These circumstances lead to an inevitable confrontation especially in the Pacific Rim, where China virtually has no adversaries who can compete in military or economic power.
Keywords: manipulations, People’s Liberation Army, National Security Agency, cyber security, USA, China, Internet, information warfare, information technologies, cyber warfare.
Chuprakova N.S. -

DOI:
10.7256/2454-0668.2014.6.13724

Abstract:
Chuprakova N.S. - Informational psychological influence of virtual communication upon the youth within the modern political process pp. 946-955

DOI:
10.7256/2454-0668.2014.6.65742

Abstract: This article is dedicated to the issue of influence of the modern mass communication upon the youth. The author conducts an experimental research on the changes in the psychophysiological characteristics of individuals under the influence of virtual communication technologies. The purpose of this experiment is the research on the psychophysiological characteristics of 12–13 year old students in order to determine the link between various specters of activity in the computer virtual reality and the psychophysiological profile of the students. This longitudinal study is substantiated by the character of the experiment, conducted over the course of two years with the same students (two classes of 25 and 27 children respectively). The computer laterometry technology allows us to form various amplitude time structures of sound and noise square waves and provides a wide spectrum of strategies of producing a signal and registering the reaction. In the course of this study it became evident that factors such as personal anxiety, emotional tension and excitability of the right hemisphere cause the susceptibility to the influence of the incoming information. Thus the teenagers become receptive to the various types of information, which can lead to a destructive nature of their participation in the political life of the society.
Keywords: methods of mass communication, virtual reality, hemispheric asymmetry, personal anxiety, political consciousness, Internet, consciousness manipulation, informational influence, social networks, protest.
Lebedeva E.V. - Information security of CIS states: stages of implementation

DOI:
10.7256/2454-0668.2016.4.17585

Abstract: In this work the author focuses his attention on the process of international dialogue with regards to the questions of information security. The object of this research is the information policy of CIS countries on international arena. The goal of this article consists in determination of specificity of the stages of CIS countries’ work over the establishment of the normative legal and methodological base of ensuring the international information security. In order to achieve the set goal it is necessary to detect the key disputes on this issue with the Western colleagues, as well as to underline the dynamics of the notion “information security”. The scientific novelty consists in the acquired results during the course of this research pertaining to the assessment of CIS countries international policy in the information-communication sphere within the framework of the stages of its development throughout the period of 1990-2015. The analysis of the work of regional institutions from a perspective of the intergovernmental documents allowed explaining the conclusions that currently CIS states attempt to establish a complex and open system of international information security based on compliance of its participants to the universal rules that ensure security of information environment. The author presents the characteristic of CIS states information, its goals and principles in the context of three periods of its development.
Keywords: Normative base, Political manipulation, Cybercrime, United Nations, Shanghai Cooperation Organization (SCO), Commonwealth of Independent States (CIS), Sources of threats, Regional information security, Information space, Information security
Other our sites:
Official Website of NOTA BENE / Aurora Group s.r.o.