National Security - rubric Academic life
ïî
National Security
12+
Journal Menu
> Issues > Rubrics > About journal > Authors > Council of Editors > Concept of the Journal > Requirements for publication > Peer-review process > Article retraction > Ethics > Online First Pre-Publication > Copyright & Licensing Policy > Digital archiving policy > Open Access Policy > Article Processing Charge > Article Identification Policy > Plagiarism check policy > Editorial board
Journals in science databases
About the Journal
MAIN PAGE > Journal "National Security" > Rubric "Academic life"
Academic life
Zemlyanskii I.N. -
Abstract:
Kalemulloev M.V. -

DOI:
10.7256/2454-0668.2013.2.7270

Abstract:
Zemlyantsky, I.N. - Peculiarities of formalized studies of individual capital reproduction. pp. 0-0
Abstract: The author describes methodological and methodical peculiarities of modeling of reproduction processes, taking a linear – dynamic model as an example. The author shows the peculiarities of the formation of the graphic model, as a supporting instrument, while forming the EM – models in order to make it more adequate to the process, which is modeled.
Keywords: economics, reproduction, capital, modeling, theory, process, growth, method, instrument, forecast.
Akunchenko E.A., Damm I.A., Shchedrin N.V. - Anti-corruption security of electoral process: state and prospects pp. 49-71

DOI:
10.7256/2454-0668.2018.1.25323

Abstract: This article presents the results of work of the third Siberian Anti-Corruption Forum with international participation “Anti-corruption Security of Electoral process: State and Prospect” that was held on December 7, 2017 in the Siberian Federal University (Krasnoyarsk). Rich program of the event allowed viewing the key problems of examination and prevention of corruption in electoral process form various perspectives. Among the forum participants were the leading Russian and foreign scholars, heads and employees of the law enforcement agencies, representatives of government authorities, mass media, and civil society institutions. The key topics of the scientific practical dialogue became the general questions of corruption control in the Russian Federation, as well as specific issues of examination and organization of prevention of electoral corruption. The forum participants have discussed the major trends in development of the state anti-corruption policy in the area of protection of electoral rights of the citizens; formulated a number of propositions aimed at increasing efficiency of preventing corruption during the organization and conduct of elections; as well as acknowledged the need for implementation of the extensive anti-corruption awareness and education program for the majority of subjects of the electoral process.
Keywords: lobbying power, abuse of law, bribery of voters, electoral techniques, national security, electoral process, elections, corruption, election campaign, dummy candidate
Tumysov I.A. - The issue of research methodology of group political values. pp. 58-69

DOI:
10.7256/2454-0668.2018.3.22211

Abstract: The author meticulously examines such aspects of the subject as the difficulties of empirical research of political values, dependence of research methods and their combination choice on the goals of the research and the probable goals themselves, specifics of qualitative and quantitative methods in terms of scientific axiological endeavors, the main political values classifications used in scientific literature. The work demonstrates the logic of the proposed approach on the example of a real empirical research, which concerns the study of the hierarchy of political values of such social group as modern students. To answer the question of optimal research method of group political values the author uses the traditional method of the scientific sources analysis. Author’s contribution to the study of the issue lies in identifying the main goals and the most adequate types of political values research methods. The scientific novelty of the study is in determining the number of difficulties encountered by scientists dealing with value issues. Readers will be able to not only choose the aim of their group political values research, but also select an optimal set of qualitative and quantitative methods for their study.
Keywords: hierarchy of political values, classification of political values, a set of political values, quantitative methods, qualitative methods, methodology of value study, political values, national political culture, political sociology, political science
Yurchenko A.V. -

DOI:
10.7256/2454-0668.2014.1.10467

Abstract:
Yurchenko, A.V. - For the future managers on the need to take into account the security functions when managing a business. pp. 128-142

DOI:
10.7256/2454-0668.2014.1.63901

Abstract: The object of study is the further development of the optional course “Security of entrepreneurial activity” for a wide range of students at the National Research University — Higher School of Economics. The author has developed a new course “Managing the business security systems’ especially for the 4th y ear s tudents f or t he B achelor’s d egree a t the management faculty. The methodologically organized studies show the possibility for the adaptation of the interdisciplinary course for the specialized audience. Just like the previous course, the “Managing the business security systems “course is developed for the first time. The competence, which the students have gained during their third year of studies have formed a sufficient basis for the studies within the framework of this course. The experience shows that in the near future the authors shall negotiate with their colleagues having related course in order to provide a qualified solution of connecting disciplines and mutual complementing of courses. The measures are taken to develop several study disciplines on business security, which may logically continue the professional study programs for the students of one specialty, allowing to provide the students with additional spheres of competence, which they could use efficiently in their practical activities after graduation.
Keywords: entrepreneurial activities, business, management, marketing, security systems, complex security of an enterprise, target audience, competences, Bachelor’s program, decomposition principle.
Mikhailova A.V. -

DOI:
10.7256/2454-0668.2014.1.10468

Abstract:
Mikhailova, A.V. - The method of preliminary examination of potential contracting parties via the Internet resources. pp. 143-152

DOI:
10.7256/2454-0668.2014.1.63902

Abstract: This article was written based on the results of course “Security of entrepreneurial activity”, and it is devoted to the methods of studying potential contracting parties with the use of Internet. As an illustration for the distance means of gaining information about the potential contracting parties the author methodologically provides examples of popular schemes in the Internet community, and they are based upon lack of information in one of the parties. Novelty of the material is due to the fact that it is aimed at the youth audience, actively using Internet resources for business purposes. Taking this fact into consideration, today the enterprises no matter what size they are should protect their commercial secrets carefully and at the same time use commercial intelligence. Within the context of this work, the author evaluates the information of potential contracting parties, since in the everyday life individuals often have to do with the contracting parties, and not competitors. Additionally, collection of such information is easier to bring into system, while competitor monitoring is often personalized and it requires certain professional knowledge and capacities within the relevant field.
Keywords: contracting parties, personal data, Internet, social networks, monitoring, scamming, disinformation, business intelligence, infobusiness, law on information.
Chekrkasov V. -

DOI:
10.7256/2454-0668.2013.6.10523

Abstract:
Cherkasov, V.N. - Is it still possible to establish the rating? (Some thoughts on the monograph by Y. A. Shumilov. Introduction into legal scientometrics. pp. 151-160

DOI:
10.7256/2454-0668.2013.6.63881

Abstract: The problem of establishing the rating of a scientist has both scientific and practical dimensions. This approach is used to establish (mostly in other states, but lately in Russia as well) the level of journals, quality of article published in them, funding for the research, employee evaluation, their hiring in monitoring. Taking into account these criteria, the activities of the higher education institutions and scientific research institutes is evaluated, and decisions are made of whether specific institutions should exist or not. The article contains critical analysis of the negative features of the method used for establishing the rating by the author of the monograph and also by some scientific electronic resources, and some practical examples are provided. The author proposes to take measures in order to improve the method for rating calculation by involving some additional markers. The author substantiates the need to include correcting coefficients, and provides a new formula for rating calculation. Since currently the rating is mostly based upon a single criterion — citedness, the author offers a number of additional markers, such as number of publication (with the corrective coefficients offered by the author), the edition size, impact-factor, presence of works of the author in the Internet, number of views and downloads of his works. It may be considered that the use of the above-mentioned calculation methods shall considerably improve the authenticity of ratings.
Keywords: rating, marker, coefficient, impactfactor, Hirsch index, Internet, list of journals indexed, Russian Science Citation Index, scientific electronic library, Dissernet.
Kutina M.M. -

DOI:
10.7256/2454-0668.2014.1.10469

Abstract:
Kutyina, M.M. - Comparative analysis of modern Russian and foreign entrepreneurial risks classifications. pp. 153-161

DOI:
10.7256/2454-0668.2014.1.63903

Abstract: This article was written after taking the course “Security of entrepreneurial activity”, and it is devoted to comparison of Russian and foreign entrepreneurial risks classifications. The author uses comparative method in order to compare the approaches towards entrepreneurial risks in Russian and foreign science, then comparing some of classifications of such risks, establishing and analyzing their specificities. The novelty of the article is due to the fact that it is a first modern attempt to compare Russian and foreign risk management schools with their differing approaches. This article includes analysis of various approaches to understanding entrepreneurial risks by Russian and foreign scientists, as well as various systems for their classifications. Finally, it is noted that Russian and foreign risk classification systems (as well as approaches to understanding entrepreneurial risks as such) have significant similarities, while having a number of specific features. Perhaps, these specificities reflect specific features and problems of certain business environments.
Keywords: entrepreneurship, security of entrepreneurial activity, risk management, e nt r e p r e ne u r ia l r i sk, cla s si f ic at ion of entrepreneurial risks, possible changes measures, unfavorable result, business, analysis, control.
Yurchenko, A.V. - On the experience of organization of the all-University additional course on the issues of security of entrepreneurial activities in the National Research University “Higher School of Economics”. pp. 157-164

DOI:
10.7256/2454-0668.2013.1.62352

Abstract: This article includes information on the experience of organization of the all-University additional course on the issues of security of entrepreneurial activities for the students for bachelor and master degrees in the National Research University “Higher School of Economics”. In the point of view of the author, the students of various majors, who shall gain bachelor degrees in the spheres of economics, management, social studies, psychology, business informatics and other spheres of knowledge, should come to the state government bodies and economics with due knowledge on security guarantees for the private persons and legal entities, who are subjects of modern market relations. The course is aimed for the students who probably shall not work in the security divisions of companies or for the security organizations.
Keywords: entrepreneurial activity, business, security sphere, management, complicated security system, targeted audience, higher education.
Borovkov M.S. -

DOI:
10.7256/2454-0668.2014.1.10471

Abstract:
Borovkov, M.S. - Complex of preventive measures for protection of business against hostile takeover. pp. 162-170

DOI:
10.7256/2454-0668.2014.1.63904

Abstract: The object of studies in this article is one of the divisions of the theory of takeovers and mergers in business, namely, hostile takeover, and the article is written after taking the course “Security of entrepreneurial activity”. Methodologically, the author provides an overview of the scientific publications on foreign and Russian practice. He provides theoretical analysis of the main elements, models and possible strategies for the protection against hostile takeovers. The author pays special attention to the Russian situation, involving the Russian legislation and practical examples. For the first time the author used Redel Group factual data for the analysis. Most of the strategies should be applied together for a maximum results. The pills, the parachutes and supermajority should be displayed publicly in order to lower the possibility of future takeover and raising the price of shares. The protection of assets, strategic alliance and strategic acquisition should be used only in emergency situations. The author concludes that the situation in the Russian market of mergers and acquisitions is not as tragic, as it seems. In spite of the domination of the administrative resource, lack of development of the financial market, lack of friendly takeovers, and corruption, one may protect his own business, if he takes care of it in advance.
Keywords: mergers, conglomerate, hostile takeovers, share, asset, resource, two-level offer, the Russian Federation, white knight, poison pills.
Gorokhova, D.I. - The Council of Europe Convention in the sphere of protection of individuals in the sphere of automatic processing of the personal data. pp. 165-170

DOI:
10.7256/2454-0668.2013.1.62353

Abstract: This article is written based on the report, which was part of the course on “Security of Entrepreneurial Activities”. It is devoted to the principal issues regarding rights of individuals in the process of automatic processing of personal data. The author evaluates the legislation of the EU and the Russian Federation in this sphere, and she pays attention to one of the key directions in the modern legal practice in the sphere of protection of personal data of physical persons from unlawful use and disclosure.
Keywords: jurisprudence, protection, personal data, unlawful disclosure, the Council of Europe Convention, the Russian Federation, ratification, Federal Service for Supervision in the Sphere of Telecom, Information Technologies and Mass Communications, technical regulations, limitations.
Kiselev, N.S. - Preventive measures against raider hostile takeovers. pp. 171-178

DOI:
10.7256/2454-0668.2013.1.62354

Abstract: This article is written based on the report, which was part of the course on “Security of Entrepreneurial Activities ”. It is devoted to the topical issue of raider hostile takeovers. The author provides directions for the formation of preventive security system in a company, and mentions various means of protection from raider hostile takeovers. He also provides practical examples of raider hostile takeovers.
Keywords: jurisprudence, raiders, security, hostile takeover, attack, protection, enterprise, shareholders, credit debt, preventive measures.
Krivenko, S.G. - The use of offshore companies in implementation of dubious financial deals and legal risks for the contracting parties. pp. 179-184

DOI:
10.7256/2454-0668.2013.1.62355

Abstract: This article is written based on the report, which was part of the course on “Security of Entrepreneurial Activities ”. It is devoted to the legal aspects of business with the use of offshore companies, and the legal risks for the contracting parties of such companies. These materials allow the future corporate law professionals to learn more about the sphere of activities, which contains reputation risks for the good faith business, as well as about the possible use of Russian companies in the legalization of criminal income and the legal consequences of such acts.
Keywords: jurisprudence, offshore zones, minimized taxation, laundering of income, terrorism financing, ß y-by-night organizations, legal risks, reputation risks, contracting parties, unlawful activities.
Smirnova, E.S. - Foreign legal experience of dealing with the naturalization problems regarding the service of foreign citizens in the armed forces of the EU. pp. 215-220
Abstract: The article is devoted to the study of international legal cooperation of the EU states in the sphere of defense, as well as their cooperation in the sphere of naturalization of the young citizens of the EU, and to some history of the European Defense Agency, united foreign and police forces of the EU in the XX century.
Keywords: jurisprudence, security, state, union, law, service, foreigners, contract, agreement.
Other our sites:
Official Website of NOTA BENE / Aurora Group s.r.o.