Informational support of national security
Abazov K.M. —
Using Modern Information and Communication Technology by International Terrorist Organizations
// Security Issues.
– 2018. – ¹ 3.
– P. 1 - 9.
DOI: 10.25136/2409-7543.2018.3.26406 URL: http://en. nbpublish.com/library_read_article.php?id=26406
Read the article
The subject of the research is information and communication technology that can be used by today's international terrorist organizations for their purposes. The author of the article focuses on the main means that are used by today's terrorist organizations on the Internet: propaganda (including radicalization, recruiting and terrorist instigation), financing (crowdfunding and others) and computer attacks. The authors also analyze the main documents (conventions and resolutions) of the Council of Europe and United Nations Security Council. To analyze the problem, the author has used the systems approach and comparative methods as well as analysis of international law documents. To make conclusions, the author has used the method of synthesis. The scientifiñ novelty of the research is caused by the importance of fight against international terrorist organizations for many states and countries. This problem cannot be solved by each country individually, without cooperation and mutual efforts. To solve the problem, the author suggests to create legal mechanisms and sign an international treaty that would contribute to fighting against terrorist organizations in the cyber space.
confrontation, cyberterrorism, Internet, ISIS, Al-Qaida, International terrorist organizations, terrorism, financing, crowdfunding, propaganda
Organizatsiya islamskoy konferentsii. Komp'yuternaya gruppa reagirovaniya na chrezvychaynye situatsii (OIK-CERT). – [ Elektronnyy resurs] / Rezhim dostupa : https://www.oic-cert.org/en/
Konventsiya Soveta Evropy «O preduprezhdenii terrorizma», Varshava, Pol'sha, 2005g. // Ofitsial'nyy sayt Soveta Evropy. – [Elektronnyy resurs] / Rezhim dostupa: https://www.coe.int/ru/web/conventions/full-list/-/conventions/treaty/196
Konventsiya «O komp'yuternykh prestupleniyakh», Budapesht, Vengriya, 2001g. //Ofitsial'nyy sayt Soveta Evropy. – [Elektronnyy resurs] / Rezhim dostupa : https://www.coe.int/ru/web/conventions/full-list/-/conventions/treaty/185
Evropol. (Otchet «Terrorizm v ES – tekushchaya situatsiya i tendentsii razvitiya, 2013g.»), 2014g., Gaaga, Niderlandy. – [Elektronnyy resurs] / Rezhim dostupa: www.europol.europa.eu/content/european-union-terrorism-situation-and-trend-report-2015
Ordzhi U. D. Predotvrashchenie kiberterrorizma v global'nom informatsionnom obshchestve: vopros kollektivnoy otvetstvennosti gosudarstv // Zashchita ot terrorizma.
Staffing of national security
Kuznetsova N.V. —
Personnel Vulnerabilities of Organization Security
// Security Issues.
– 2018. – ¹ 3.
– P. 10 - 21.
DOI: 10.25136/2409-7543.2018.3.26238 URL: http://en. nbpublish.com/library_read_article.php?id=26238
Read the article
The problems of discovering and evaluating vulnerabilities of organization security provoke great interest of both Russian and foreign researchers. This is caused by the fact that market economy conditions create a great number of risks and threats, both for and from personnel, which predetermines high demands for morals and ethics of employee's personality, his or her professional and psychological dependability. In her article Kuznetsova analyzes approaches to evaluation and identification of personnel vulnerabilities of organization security and describes their kinds, personnel vulnerabilities and professionally important qualities of personnel as well as personnel vulnerability before external environment. The main research method used by the author of the article is the expert survey (questionnaires given to human resources departments and security departments of Irkutsk organisations). To evaluate personnel vulnerabilities of organization security, the author has suggested to use a safe employee profile which is an empirically constructed combination of qualitative features (the most important qualities, personality traits and behavioral patterns) that are typical for employees whose activity do not create threats for organization security. Using this method, the author has described requirements for employees in terms of secure business and has assessed their intensity. The author has also evaluated opportunities of using the aforesaid profile in managing personnel security officials and underlines that the profile can be used in practical management of human resources, in particular, at the stages of hiring employees and their promotion and career development.
threats to personnel security, threats, personnel, organization, personnel vulnerabilities, security, secure employee profile, assessment of vulnerabilities, vulnerabilities, organization personnel security
Ozernikova T. G.Tendentsii transformatsii sotsial'noy otvetstvennosti biznesa v usloviyakh ekonomicheskogo krizisa [Tekst] / T. G. Ozernikova // Izvestiya Irkutskoy gosudarstvennoy ekonomicheskoy akademii. — 2010. — ¹4. — S. 165-176.
Campbell J.-L. Culture Corrupts! A Qualitative Study of Organizational Culture in Corrupt Organizations / Jamie-Lee Campbell, A. Göritz // Journal of Busi-ness Ethics. — 2014. — vol. 120. — no 3. — pp. 291-311.
Shipilov A. I. Kak obespechit' nadezhnost' personala? [Tekst] / A. I. Shipilov, O. A. Shipilova // Upravlenie personalom. — 2002. — ¹ 8. — S. 23–27.
Adekola B. The Impact of Organizational Commitment on Job Satisfaction: A Study of Employees at Nigerian Universities / B. Adekola // International Journal of Human Resource Studies. — 2012. — no 2. — pp. 1-17.
Turenko B.G. Metodicheskie podkhody k otsenke nadezhnosti i konkurentosposobnosti personala predpriyatiya [Tekst] / B. G. Turenko, T. A. Turenko // Izvestiya Baykal'skogo gosudarstvennogo universiteta. — 2016. — ¹26.