Economical support of national security
Reference:
Starovoitov V.G., Krupnov Y.A., Lapenkova N.V.
Investment activity in Russian regions under sanctions and restrictions
// Security Issues.
2023. ¹ 4.
P. 1-14.
DOI: 10.25136/2409-7543.2023.4.44135 EDN: ZTKYIL URL: https://en.nbpublish.com/library_read_article.php?id=44135
Abstract:
The subject of the study is organizational, managerial, socio-economic relations that arise in Russian regions and municipalities during the implementation of investment projects under the conditions of sanctions. The purpose of the study is to analyze and develop recommendations for regional and municipal authorities on attracting investments in the conditions of severe sanctions pressure from “Western” countries on the Russian Federation. The article uses empirical research methods to identify, analyze new trends and best practices in attracting investment to Russian regions and municipalities. The authors examine in detail such aspects of the research topic as the increasing importance of attracting investment to municipalities and regions due to a significant reduction in foreign direct investment due to the imposed sanctions. Particular attention is paid to identifying sources of investment capital in Russia and in “friendly” countries. As well as creating conditions for the implementation of investment projects in Russian regions and municipalities under unprecedented sanctions restrictions. To activate investment processes, it is necessary to ensure: the development and implementation of development strategies for municipalities and regions; identification and use of “unique” natural, industrial and human resources; development of investment infrastructure; creating conditions for the relocation of modern production complexes from large cities; the preferred choice of investors from “friendly” countries and representatives of domestic businesses returning capital from Western offshores; formation of special economic zones in the regions. The novelty of the study lies in the fact that, based on an analysis of the best domestic practices, specific recommendations have been developed for regional and municipal authorities on searching and attracting investment resources to Russian regions and municipalities under the conditions of “strict” sanctions restrictions. The use of research results makes it possible to intensify the processes in regions and municipalities: attracting modern high-tech economic facilities; increasing production and financial potential; improving the quality of life of the population, etc.
Keywords:
economic growth, sanctions restrictions, investment project, investment activity, investments, municipalities, region, economic security, sanctions, investment strategy
Technologies and methodology of security systems
Reference:
Il'in V.V., Nikolaev N.V., Nekrasov M.I., Sokolov A.M.
An Approach to Evaluating the Effectiveness of Systems for Countering Robotic Complexes at Important Facilities
// Security Issues.
2023. ¹ 4.
P. 15-26.
DOI: 10.25136/2409-7543.2023.4.39479 EDN: WKOLMA URL: https://en.nbpublish.com/library_read_article.php?id=39479
Abstract:
The subject of the study is a scientific and methodological apparatus for evaluating the effectiveness of systems for countering robotic complexes. The object of research is a scientific and methodological apparatus for analyzing systems for countering robotic complexes at important facilities. The aim of the work is to develop a scientific and methodological apparatus for evaluating the effectiveness of systems for countering robotic complexes at important facilities in the direction of taking into account their structure, spatial configuration, as well as the synergetic effect of the joint use of heterogeneous technical means as part of the system. In order to achieve the research goal, the general logical-probabilistic modeling method and the tools of modern geoinformation systems are comprehensively applied in the work. The article proposes a new approach to evaluating the effectiveness of spatially distributed multi-bridge systems for countering robotic complexes. The results obtained can be used by interested organizations to evaluate the effectiveness of variants of such systems and identify their vulnerabilities. The scientific novelty consists in the development of an approach to assessing the effectiveness of spatially distributed multi-border systems for countering robotic complexes, taking into account their structure, spatial configuration, as well as the synergetic effect of the joint use of heterogeneous technical means of countering robotic complexes through the integrated use of new logical-probabilistic models and modern geoinformation technologies. The results obtained in the article indicate that the goal of the work has been achieved.
Keywords:
protection of important sites, logical-probabilistic method, the model of the counteraction system, modeling of protection systems, performance indicator, physical protection systems, modeling of security systems, security systems, countering robotic complexes, Robotic complexes
Internal threats and countermeasures
Reference:
Ul'yanov M.V.
A Note on the Definition of Ethnic Enclave
// Security Issues.
2023. ¹ 4.
P. 27-38.
DOI: 10.25136/2409-7543.2023.4.68753 EDN: OLKXPG URL: https://en.nbpublish.com/library_read_article.php?id=68753
Abstract:
The author considers in detail the main approaches to the definition of ethnic enclave and enclavization. Taking into account the degree of elaboration of this problem due to the peculiarities of historical development, special attention is focused on the approaches reflected in foreign English-language publications on the economy of the enclave and social modeling. The author also addresses the problem of the formation of ethnic enclaves in the Russian Federation, acting as an obvious threat to public security. The methodological basis of the research is presented by the general dialectical method of scientific cognition. The prospects of enclavization are illustrated by official statistical data on the number of people registered for migration and who have received citizenship. Based on the analysis, it is concluded that the main features of an ethnic (polyethnic) enclave are the presence of a special economic structure and socio-cultural environment that exclude the processes of assimilation into society. In order to identify the enclave, it is advisable to use sociological methods (questionnaires, surveys of the local population) and a survey of the territory. Considering that migration processes are related to the determinants of crime, it is necessary to study the phenomenon of ethnic enclaves in a criminal aspect. Moreover, with the growth of external migration, the prospects of enclavization seem quite real. The negative consequences of enclavization are the growth of social exclusion, tension, an increase in crime, including migration and organized ethnic crime.
Keywords:
ethnic enclave, migration registration, ethnic quarter, enclavization, segregation model, enclave hypothesis, assimilation theory, economy, migration, threshold value
Economical support of national security
Reference:
Mishin A., Andriyanov N.A.
Indicators for assessing the risk of execution of state contracts with a long life cycle
// Security Issues.
2023. ¹ 4.
P. 39-59.
DOI: 10.25136/2409-7543.2023.4.44047 EDN: AIIJFD URL: https://en.nbpublish.com/library_read_article.php?id=44047
Abstract:
The subject of the study is the process of monitoring the execution and assessing the risk of execution of government contracts in the Russian Federation. The research methodology consists of studying statistical data on government procurement in Russia; enriching data from the UIS with additional data from market analysis systems; analyzing the subject area and identifying potentially valuable categorical data that have not been previously studied by other scientists and applying the tools of one-way analysis of variance to these data in order to assess their statistical significance for solving problems of predicting the execution of government contracts. By applying the ANOVA method to a dataset that included more than 83 thousand consolidated records, results were obtained confirming the significance of a number of categorical features relating to the supplier’s industry, its legal form and region for predicting the execution of government contracts. At the same time, it was revealed that such characteristics as form of ownership, method of placing an order, legal category of the size of the supplier’s business and budget level are not statistically significant for forecasting purposes. The results obtained can be used by researchers in the course of cluster analysis, exploratory data analysis, and when constructing an ensemble of models for predicting the execution of government contracts. The results obtained expand and deepen existing approaches in terms of searching for new significant features based on information capabilities contained in government information systems and other big data sources.
Keywords:
model features, register of unscrupulous suppliers, contractor, risk assessment, 44-FZ, unified information system in the field of public procurement, monitoring of contract execution, Government procurement, supplier assessment, financial indicators
Legal support of national security
Reference:
Sergeeva A.A., Pitul'ko K.V.
Features of countering the spread of the ideology of Nazism among young people
// Security Issues.
2023. ¹ 4.
P. 60-68.
DOI: 10.25136/2409-7543.2023.4.69008 EDN: DUDZYN URL: https://en.nbpublish.com/library_read_article.php?id=69008
Abstract:
The authors analyze the main determinants of the spread of the ideology of Nazism among young people. The authors consider general social and special criminological measures for the prevention of criminally punishable manifestations of the ideology of Nazism. In the modern period, the spread of the ideology of Nazism is characterized by a high social danger, therefore, the development of a set of measures aimed at preventing it is of exceptional importance. To date, there are a number of legal instruments designed to punish persons who share Nazi views and implement them in concrete actions. However, the legal provision for the prevention of manifestations of socially dangerous behavior is not characterized by completeness and does not have a full-fledged basis. The general structure of criminological prevention of the spread of the ideology of Nazism has not been developed either. The authors substantiate the modern concept of its implementation. In the course of the study, standard general scientific and private scientific methods were used: formal-logical, system-structural, comparative-legal. Scientifically based recommendations aimed at clarifying the boundaries of preventive activities are formulated. It is proposed to use general social, special criminological and individual preventive measures to prevent manifestations of the ideology of Nazism. Special emphasis is placed on the information and propaganda and counter-propaganda vectors of prevention. The authors draw attention to the fact that the need to improve the criminological prevention of manifestations of the ideology of Nazism among young people is due to the lack of legal certainty in the provisions of the law regulating the conditions for criminal prosecution, the lack of an organized system of preventive impact, general unfavorable trends in the spread of the ideology of Nazism among young people. At the same time, it is quite important to distinguish between imitation of preventive activity and its actual implementation. In this regard, the authors substantiate the important role of patriotic education of young people.
Keywords:
extremism, crime, National security, preventive actions, personal security, crime prevention, tolerance, prevention, aggression, ideology of Nazism
Scientific and engineering support of national security
Reference:
Degterev A.K.
Assesment of the risk of degazation of the Black Sea: type of limnological disaster on lake Nyos reconsidered
// Security Issues.
2023. ¹ 4.
P. 69-77.
DOI: 10.25136/2409-7543.2023.4.69339 EDN: GVCACD URL: https://en.nbpublish.com/library_read_article.php?id=69339
Abstract:
The possibility of a repetition of the limnological catastrophe in the Black Sea is considered. It is shown that, in contrast to the volcanic lakes of Africa Nyos and Manun, where limnological catastrophes occurred in the 1980s, the concentration of dissolved gases in deep waters is significantly less than the saturation value. This eliminates the mechanism of so called “eruption” of carbon dioxide such as gas lift. However, on a smaller scale, significant methane releases are possible during strong eruptions of underwater mud volcanoes. The mechanism for the release of carbon dioxide from the lake into the atmosphere is so similar to a volcanic eruption that mathematical models developed for ordinary volcanoes are used to describe it. In both cases, the rise of erupted masses occurs due to an increase in the buoyancy of the gas-liquid mixture, which carries with it particles of the environment. The formation and growth of gas bubbles at intermediate depths occurs provided that the total partial pressure of all gases inside the bubble exceeds the hydrostatic pressure at a given depth. The article shows that the concentration of dissolved methane in the Black Sea is much less than the saturation level. Due to the relatively low solubility of methane in water, methane bubbles are able to overcome a significant depth range. And as additional components of the gas mixture, together with methane, carbon dioxide and hydrogen sulfide can thus enter the atmosphere. It was concluded that as the water temperature in the Black Sea increases due to climate change, the reserves of methane gas hydrate at the bottom of the sea will begin to decompose, which will also be accompanied by jet gas release. At the same time, methane can escape to the surface from depths of no more than 900 m.
Keywords:
deep waters, mud volcanoes, gas bubbles, carbon dioxide poisoning, dissolved gases, Black Sea, Lake Nyos, limnological disaster, disaster forecasting, natural disasters
Doctrine
Reference:
Massunov S.L.
Criticism of modern approaches to the interpretation of the concept of «threat» in technical disciplines: elements of theoretical absurdity of some researchers' ideas
// Security Issues.
2023. ¹ 4.
P. 78-90.
DOI: 10.25136/2409-7543.2023.4.69071 EDN: KCYBOX URL: https://en.nbpublish.com/library_read_article.php?id=69071
Abstract:
In the presented work, the subject of research is one of the main categories of the conceptual apparatus of such a new direction of theoretical thought as the science of safety - the concept of «threat». Despite the obvious simplicity of this term and its widespread use in everyday life and legal practice, disputes about its substantive basis do not stop in the scientific community. Insufficient elaboration of the main categories of safety theory leads to numerous ambiguous interpretations of its fundamental terms, which do not allow forming a strictly defined theoretical basis. Therefore, in this article, using the example of the analysis of publications published in scientific journals and on the «AGA-Sofia»s website, the most obvious shortcomings of existing approaches to the interpretation of the concept of «threat» and its main characteristics are revealed. The solution of the tasks set in the work is based on the application of methods of logical analysis, laws of terminology and methodological principles of philosophy. The paper draws attention to the fact that, unlike the general case, when a threat is formulated as the intention (possibility) of causing any harm to someone / something (the object of the threat) on the part of someone/something (the source of the threat), in technical disciplines, the threat is presented as the possibility of harmful consequences as a result of object–object/subject relations (the impact of something on someone/something). Among the identified shortcomings in the interpretation of the characteristics of the threat, it is emphasized that it does not necessarily have to be manifested. If the threat is real, it can be both explicit and hidden. In addition, its potential form is legitimate, due to the two-dimensionality of the universal «possibility». At the same time, the author draws attention to the grossest methodological miscalculation made by some researchers - the threat cannot be a phenomenon, since it represents only the possibility of harmful consequences of any phenomenon. The article draws attention to the fallacy of attempts by some authors to extend the scope of the definition of «threat» to the concepts of «blackmail» and «ultimatum», as well as to the possibility of perception responses when harm is caused as a result of the threat. The inaccuracies allowed by researchers in defining the term «threat source» are analyzed, and the validity of the use of certain terms closely related to the concept of threat, such as «threat to the safety of the object», «threat to interests», «threat of unauthorized access» is justified.
Keywords:
possibility, analysis, the source of the threat, safety, technical disciplines, criticism of shortcomings, characteristics, threat interpretation, concept, potentiality
Legal support of national security
Reference:
Mongush A.S., Ondar A.E.
Analysis of juvenile delinquency in the Republic of Tyva
// Security Issues.
2023. ¹ 4.
P. 91-101.
DOI: 10.25136/2409-7543.2023.4.68936 EDN: JPWOXT URL: https://en.nbpublish.com/library_read_article.php?id=68936
Abstract:
The article deals with issues related to the analysis of juvenile delinquency in the Republic of Tyva (Russia). In particular, a study of the criminological characteristics of juvenile delinquency in the Republic of Tyva was conducted, information and analytical statistics of internal affairs bodies were studied, where data on types of crimes for 12 months of 2022 were examined in more detail in comparison with the same period of 2021 in the Russian Federation, as well as crimes committed in the region under consideration. In the course of the conducted scientific research, general scientific, private scientific and special legal methods of cognition were used. An empirical study was conducted, within the framework of which students of Tuva State University were surveyed in order to obtain information about possible causes of juvenile delinquency according to the respondents. The analysis made it possible to assess the criminological state and establish the characteristics of the offender's personality. The authors present their own point of view of the need to put into practice a number of measures to prevent juvenile delinquency in the Republic of Tyva. The scientific novelty of the research consist in the establishment of the features of juvenile delinquency in the Republic of Tyva, in particular its quantitative and qualitative changes occurring in the overall structure of crime. An attempt to predict the trend of juvenile delinquency in the Republic of Tyva and identify the main factors influencing juvenile delinquency, as well as in the development of preventive measures of delinquent behavior of adolescents in order to help stabilize this category of crime, keep its level at a socially tolerant level, contribute to a positive change in the qualitative characteristics of crime, namely the structure of crime, its nature. In particular, when carrying out individual preventive work with minors, state bodies need to put into practice a unified document management system for the timely exchange of information that will allow them to adequately respond to all challenges and threats in activities to protect the life, health, rights and freedoms of minors.
Keywords:
specific gravity, subjects of prevention, property crimes, statistical data, analysis, types of crimes, the identity of the criminal, Republic of Tyva, crime, minors
Legal support of national security
Reference:
Pinchuk L.V.
The structure and content of the traffic crimes
// Security Issues.
2023. ¹ 4.
P. 102-110.
DOI: 10.25136/2409-7543.2023.4.69252 EDN: KCGMMB URL: https://en.nbpublish.com/library_read_article.php?id=69252
Abstract:
The subject of the study is the main approaches to determining the system of dynamic and temporal relationships of road traffic crimes included in the mechanism of road traffic crimes, its content and structure, as well as the law enforcement practice of investigating this category of criminal cases. The purpose of the study is to clarify and substantiate the substantive elements of the mechanism of traffic crimes and to define its concept. The author substantiates the idea that knowledge and understanding of the system of dynamic and temporal relationships of road traffic crimes helps law enforcement officers at the initial stage of the investigation to find out which objects interacted with each other during the commission of criminal acts, to form versions as to the condition and properties of these objects carried out contact interaction. The methodological basis of the study is: the method of critical analysis (the analysis of various points of view of the authors on the concept of "mechanism of road traffic crimes" was carried out and elements of the mechanism of road traffic crimes were identified), the method of legal modeling (a variant of the structural construction of the mechanism of road traffic crimes was proposed, the formulation of the concept of "mechanism of road traffic crimes" was carried out). The author summarizes new material on the topic under study: official statistics data for 2022 and six months of 2023, research by domestic authors from 1999 to 2023, and also uses the author's experience in investigating traffic crimes as an investigator of internal affairs bodies. The author analyzes the available points of view in the forensic literature and proposes a definition of the mechanism of traffic crimes, as well as its possible content and structure. The author comes to the conclusion that the mechanism of traffic crimes is a system of dynamic and temporal relationships, the main elements of which are: 1) the driver; 2) the vehicle; 3) various types of road situations, including information about road conditions and the environment in each form – from the initial to the culmination.
Keywords:
road conditions, road situation, driver, vehicle, mechanism of road traffic offences, forensic characteristics of offences, crime investigation techniques, road traffic offences, forensic methodology, road accidents
Internal threats and countermeasures
Reference:
Cherepanova M.I., Shcheglova D.K.
Regression Model of Population Health in Russian Regions
// Security Issues.
2023. ¹ 4.
P. 111-125.
DOI: 10.25136/2409-7543.2023.4.39112 EDN: JXBTAM URL: https://en.nbpublish.com/library_read_article.php?id=39112
Abstract:
Brief results of a sociological study conducted in six border territories of modern Russian society are presented. The subject of the study was the components of the reproductive mechanisms of human capital, namely the attitude of the population to health and motivation to preserve it. The object of the study was the human capital of the Russian borderlands. The research methodology is based on an interdisciplinary complex analysis, including structural-functional, activity-based approaches in conjunction with a secondary analysis of the phenomenon of human capital in the field of various humanities and economic sciences. The specifics of the functioning of the reproductive components of human capital were measured based on the analysis of relevant regional statistics and questionnaire questions, expert survey. The novelty of the study lies in the regional specifics of the attitude of the population of six border regions of Russia to the potential of their health and motivation to use health-saving technologies in their lives. Territorial models of population health disorders are described. Conclusions are drawn that at the present stage of the development of Russian society, opposite trends are being realized. On the one hand, the negative consequences of the Covid-19 pandemic, the combination of structural disorders in the system of providing medical care to the population and the increase in morbidity of various kinds, which caused an unprecedented increase in mortality in all territories of Russia. The opposite and positive trend can be called the formation of the legislative framework of a new health protection strategy in Russian society. The main goal of this strategy is to preserve and increase the human capital of the country, including, first of all, the health of the nation, as well as its education and motivation for a long and fruitful life for the benefit of Russian society
Keywords:
border territories, social well-being, self-preserving behavior, health of the nation, healthy lifestyle, health care, demographic security, health, reproductive mechanisms, human capital
Scientific and engineering support of national security
Reference:
Tikhanychev O.V., Tikhanycheva E.O.
Ensuring the secrecy of objects in the conduct of armed conflicts of varying intensity, as an important aspect of their protection: history, status, development of the process
// Security Issues.
2023. ¹ 4.
P. 126-151.
DOI: 10.25136/2409-7543.2023.4.39371 EDN: JXXGOA URL: https://en.nbpublish.com/library_read_article.php?id=39371
Abstract:
The object of the study is to ensure the security of objects during the conduct of military conflicts of varying intensity. The subject of the study is to increase security by increasing secrecy. Historical analysis shows that secrecy is provided mainly due to the coloring of military uniforms and objects. At the early stages of combat operations, the colors of uniforms served, along with other elements of visual visualization of the situation, to visually distinguish their troops from enemy troops, the separation of troops by gender and purpose, and the issue of masking combat and rear facilities was not relevant. With the increase in the range, accuracy and rate of fire of weapons, the field military uniform gradually lost the function of identification and acquired the function of disguise. At first it was a one-color "khaki" color, then a camouflage coloring. With the appearance of military equipment on the battlefield, it also had to be painted, masking turned from a poorly formalized process into one of the forms of ensuring combat operations – engineering. Subsequently, with the advent of reconnaissance and combat aircraft, and other types of long-range weapons, it was necessary to ensure the secrecy of not only the objects of the battlefield, but also the objects of the rear. Separate sections of masking – reducing the optical visibility of objects in the air and at sea. The article examines the history of the development of methods for increasing the secrecy of personnel, weapons and objects through the use of protective coloring of uniforms, equipment and military equipment. Other aspects of the application of methods of increasing stealth in optical and other ranges, their development in recent history are briefly touched upon.
Keywords:
optical stealth of objects, masking ranges, army camouflage, ways of disguise, protective coloration, disguise, camouflage pattern, ensuring secrecy, object protection, distortion of the contours of objects
Scientific and engineering support of national security
Reference:
Strizhkov V.A.
Application of machine learning methods to counter insider threat to information security
// Security Issues.
2023. ¹ 4.
P. 152-165.
DOI: 10.25136/2409-7543.2023.4.68856 EDN: JZMHXQ URL: https://en.nbpublish.com/library_read_article.php?id=68856
Abstract:
The subject of the study is the problem of internal threats to information security in organizations in the face of malicious insiders, as well as negligent employees. The object of the study is machine learning algorithms in terms of their applicability for detecting abnormal behavior of employees. The author delves into the problems of insider threat, and also considers various approaches to detecting malicious user actions, adapting these concepts to the most suitable machine learning algorithms in terms of functionality, implemented further in the framework of the experiment. The emphasis is on the insufficiency of existing generally accepted security measures and policies and the need to improve them through new technological solutions. The main result of the conducted research is an experimental demonstration of how controlled machine learning and data mining can be effectively used to identify internal threats. During the experiment, a realistic set of input data is used, compiled on the basis of real cases of insider activity, which makes it possible to evaluate the operation of machine learning algorithms in conditions close to combat. When comparing the results obtained, the most efficient algorithm is determined, which is preferable for future studies with a larger data set. A special contribution of the author is a fresh look at the understanding of the insider threat and an experimentally substantiated argument in favor of a new approach to countering this threat, combining a complex of diverse measures. Thus, the work involves both mathematical methods on which the logic of machine-learning algorithms is based: classification, regression, adaptive enhancement, etc., and linguistic methods used for preprocessing the input data set, such as stemming, vectorization and tokenization.
Keywords:
information security, vectorization, logistic regression, classification algorithms, adaptive boosting, anomalous behavior, supervised learning algorithms, machine learning, internal intruder, insider threat
Scientific and engineering support of national security
Reference:
Duben A.K.
Technological sovereignty as the basis of the national security of the Russian Federation
// Security Issues.
2023. ¹ 4.
P. 166-172.
DOI: 10.25136/2409-7543.2023.4.69347 EDN: JZMTQE URL: https://en.nbpublish.com/library_read_article.php?id=69347
Abstract:
The subject of the study forms a set of legal acts of the Russian Federation, international treaties (agreements) regulating public relations in the field of of technological sovereignty, law enforcement practice, as well as the provisions of theoretical interdisciplinary research in this area. The research is devoted to an urgent topic in legal science. Technological sovereignty is a concept that assumes the ability of a state to control its technology, data, and digital infrastructure. This issue is of concern in an era of globalization and increasing dependence on technology, as the State seeks to maintain its technological independence and protect its interests in the digital sphere. The article examines the concept of technological sovereignty and its importance in the modern world, with an emphasis on the need to control data. The methodological basis of this work is a system of modern general scientific and private law methods. The study of the formation, development, place and role of technological sovereignty was carried out using the following general scientific methods: analysis and synthesis, abstraction and modeling, observation, generalization, description, classification, etc. The work used special private law methods of cognition of comparative law, formal law. To achieve the goals and objectives of this study, the author provides a brief analysis of existing methodological approaches to technological sovereignty as a concept in the general knowledge system, and also formulates the author's definition of this category. The author concludes that ensuring technological sovereignty will guarantee the national security of the Russian Federation, thereby creating conditions for countering new challenges, threats and risks: internal and external information threats when using digital technologies; developing destructive processes aimed at the information space of the Russian Federation, violation of the rights and freedoms of citizens, public safety and the state, as well as the tasks of ensuring the socio-economic development of the country and domestic digital technologies, the technological sovereignty of the Russian Federation.
Keywords:
competition, National security, security, data protection, law and order, independence, information, technological sovereignty, data security, the concept