List of publications on a keyword: «information security»
-
The role of critical thinking in the development of information security culture of technical university students
ProceedingPsychologically Safe Educational Environment: Design Problems and Development Prospects- Authors:
- Svetlana A. Solovyova, Natalia I. Evsiukova, Mikhail A. Kulebyaev
- Work direction:
- Well-Being and Security of a Person in Contemporary Educational Environment
- Abstract:
- The article presents the results of a study aimed at identifying the relationship between the level of development of critical thinking and the level of formation of an information security culture. The study was conducted among 250 students of the Volga branch of MADI using specialized questionnaires and tests. The data obtained can contribute to the development of more effective strategies to counter modern cyber threats, emphasizing the importance of critical thinking in strengthening the culture of information security.
- Keywords:
- digital technologies, information security culture, critical thinking, cyber threats, technical component, cognitive component, behavioral component, value-semantic component
-
The specifics of the information security culture of technical university students
Research ArticleDevelopment of education Volume 7 No 2- Authors:
- Svetlana A. Solovyova, Mikhail A. Kulebyaev
- Work direction:
- Pedagogy and Modern Education
- Abstract:
- The article presents the results of a study of the peculiarities of the information security culture of students of technical universities. The relevance is due to the globalization of digital technologies penetrating into all spheres of human life, both socio-political, state, professional and personal, which clearly determines the need for the formation and development of an information security culture. This issue is especially relevant in relation to students of technical universities – future specialists in the engineering industry, since they will work with technical systems and information that may be subject to various threats in the field of information security. The effectiveness of programs for the formation and development of an information security culture is largely determined by the study of the features and specifics of the manifestation of its components (technical, cognitive, behavioral, and value-semantic). The study was carried out in the form of a ascertaining experiment using the author's diagnostic questionnaire "The level of information security culture". 781 students of the Volga branch of MADI took part in the study. Based on the highlighted structure of the information security culture, the study established the specific features of the formation of its components among students of a technical university, namely, the results of the study revealed insufficient fixation in the minds of students of a technical university of the values of information security culture, a low level of patterns of safe behavior, with the general development of technical literacy in the digital space.
- Keywords:
- information security culture, technical component, cognitive component, behavioral component, value-semantic component
-
Social media is the secret weapon of nazism
ProceedingUniversity as a factor of Modernization of Russia: History and Prospects (to the 55th anniversary of the I.N. Ulyanov ChSU)- Author:
- Anastasiia V. Kalita
- Work direction:
- Война как фактор формирования национальной идентичности
- Abstract:
- This study examines the problem of the influence of social networks on the spread and strengthening of the ideology of Nazism in modern society. The work analyzes specific examples of the use of social networks to spread Nazi ideas to a certain age category, and also suggests possible ways to combat this phenomenon.
- Keywords:
- historical memory, information security, youth, patriotism, teenagers, social networks
-
Problems of Bias and Opacity of Neural Network Models
Book ChapterModern issues of pedagogy and psychology: theoretical and methodological approaches and practical research results- Author:
- Natalia G. Mironova
- Work direction:
- Глава 7
- Abstract:
- In recent decades, experts in the field of cognitive psychology and epistemology have described about two hundred distortions inherent in human thinking. Systems based on artificial intelligence models that are actively being created and introduced into social practice exhibit characteristics similar to human thinking, incl. cognitive defects. The chapter analyzes some cognitive distortions that, according to the author, are inherent in artificial intelligence models, in particular large generative neural network models.
- Keywords:
- information security, philosophical problems of artificial intelligence, neural network models
-
Politika tsifrovogo suvereniteta gosudarstva: zarubezhnyi i rossiiskii opyt
Book ChapterPrinciples of the New Ecosystem Formation: economic aspects- Authors:
- Dilmurad B. Iakhiaev, Liudmila V. Voronina, Aleksei V. Grigorishchin, Dmitrii S. Shiriaevskii, Timofei A. Oshomkov
- Work direction:
- Глава 1
- Abstract:
- The introduction of digital technologies, services and platforms into all spheres of life raises issues of ensuring digital security and the sustainability of socio-economic and political systems in both developed and developing countries. The increasing information impact, including from external forces, is leading many countries to reconsider the principles of preserving national sovereignty. A new political concept of national sovereignty is developing, a separate element of which is digital sovereignty. This paper examines the main priorities of the domestic policy of a number of states (China, Brazil, Germany, USA, India, Norway, Russia) in the field of digitalization, which are aimed at creating digital sovereignty. The authors studied government programs and strategic planning documents; the authors also identified the main problems arising during the digital transformation of economic systems in Russia and proposed ways to solve them.
- Keywords:
- information security, digitalization, digital economy, digital sovereignty, digital security
-
The Modern Importance of Information Security and Information Protection in the Country's Economic Security System
Book ChapterLaw and economic development: current issues- Author:
- Andrei V. Minakov
- Work direction:
- Глава 3
- Abstract:
- Information security is an important part of the country's economic security. At present, the economies of many countries are experiencing an increase in the influence of cybercrime on them, since there are various crimes related to data theft, fraud, account hacking, cyber-attacks by criminals operating in the information field both for financial gain and for terrorist purposes, negatively affecting the security of the financial system and the stability of the economies of countries, including Russia. Therefore, the government, business and the whole society must take various steps to combat threats in the field of information technology.
- Keywords:
- information security, economic security, information protection, cyber threats, data privacy, data protection
-
Methodological approaches in the organization of pedagogical support of information security of adolescents
Review ArticleDevelopment of education Volume 6 No 3- Author:
- Olga N. Kurmakaeva
- Work direction:
- Pedagogy and Modern Education
- Abstract:
- The article deals with the actual problem of information security of adolescents, which is revealed through factors affecting the development of personality. The purpose of the study is the methodological justification of the developed and implemented model of pedagogical support of information security of adolescents in an institution of additional education and pedagogical conditions for its successful implementation. The work is based on theoretical analysis and generalization of pedagogical practice. The material for the study was the content of training courses on programming in an institution of additional education. The results of the study showed that the presented model of pedagogical support of information security of adolescents should be based on synergetic, axeological, socio-cultural and activity approaches. The article specifies the pedagogical conditions under which it is possible to form the qualities of a person capable of resisting information threats and conforming to the norms of our society.
- Keywords:
- information security, pedagogical support, information threats, teenagers in the digital space
-
Prospects for Surveillance Systems Usage
ProceedingRelevant issues of management, economics and economic security- Authors:
- Aleksey Y. Khoroshilov, Tatyana L. Fomicheva
- Work direction:
- Угрозы экономической безопасности и пути их преодоления
- Abstract:
- The article evaluates the expansion tendency of surveillance systems, used for security and maintaining order. Related risks are analyzed.
- Keywords:
- information security, surveillance, privacy, face recognition
-
The Problem of International Information Security
ProceedingProspects for Socio-Economic Development of Russia- Authors:
- Alexander A. Alekseev, Tatyana L. Fomicheva
- Work direction:
- Современные тенденции развития мирового сообщества
- Abstract:
- In the era of globalization and the development of information technology, information is becoming increasingly important. Information reduces uncertainty, increases the amount of knowledge about objects, people and events, helps to understand, to learn something. To ensure international information security, the UN Convention on International Information Security and the Convention of the Shanghai Cooperation Organization member states were developed, which will be considered in this work. Theoretical models of the existence of these conventions in the future will also be proposed, their pros and cons will be identified.
- Keywords:
- information, international information Security, Budapest Convention on International Information Security, Shanghai Cooperation Organization Convention
-
Features of Formation of Competences in the Field of Information Security Among Future Employees of Customs Authorities
ProceedingPsychologically Safe Educational Environment: Design Problems and Development Prospects- Authors:
- Denis A. Vasiliev, Evgeny I. Travkin
- Work direction:
- Psychological security in the digital environment of an educational institution
- Abstract:
- The article discusses the methodological features of forming a culture of information security among future customs authorities within the “Customs” field of study. The methodological educational system of teaching of basic of information security to university students is analysed in the present article.
- Keywords:
- higher education, customs, customs authorities, information security culture, information protection
-
Actual problems in the field of information security of the modern state
ProceedingRelevant issues of management, economics and economic security- Authors:
- Aleksandr V. Nikishkin, Igor V. Stepanov, Daria N. Lanina
- Work direction:
- Угрозы экономической безопасности и пути их преодоления
- Abstract:
- The authors reveal the problem of information security as the main task of the state, affecting many spheres of life and ensuring not only domestic issues, but also multilateral international relations
- Keywords:
- information security, information, civil society, modern society, Informatization of society, human values, false information
-
Ensuring the security of critical information infrastructure: the powers of the federal government bodies of the Russian Federation
ProceedingRelevant issues of management, economics and economic security- Authors:
- Ilia P. Mikhnev, Svetlana V. Mikhneva
- Work direction:
- Угрозы экономической безопасности и пути их преодоления
- Abstract:
- The article discusses the competences and powers of the state authorities of the Russian Federation within their legal status in the field of ensuring the security of critical information infrastructure. Some functions and authorities in the field of information security have changed in a number of federal executive bodies. In particular, the Federal Security Service, on the basis of a presidential decree, is authorized to create a state system for detecting, preventing and eliminating the consequences of computer attacks on information resources of the Russian Federation. However, not all rights and obligations are enshrined; a number of powers cause the duality of the legal status of certain federal bodies of state power. The clarity and unambiguity of securing the rights and obligations of state bodies authorized in the field of information security are guarantees for effectively ensuring the security of important information infrastructure facilities.
- Keywords:
- information security, critical information infrastructure, public authority, federal authority, computer attacks, computer incidents
-
Information security of the individual, society, state
ProceedingTopical issues of law, economic and management- Authors:
- Aleksandr V. Nikishkin, Igor V. Stepanov, Maksim S. Aiupov
- Work direction:
- Уголовное право и криминология, уголовно-исполнительное право
- Abstract:
- The authors comprehensively consider the information security of the state, which is the most important and integral element not only of state policy, but also of society as a whole
- Keywords:
- information security, information transformation, the state authorities, the development of society, the transmission of information, rule of law, international politics
-
Zashchita konfidentsial'noi informatsii ot nesanktsionirovannogo dostupa pri proektirovanii avtomatizirovannykh sistem radionuklidnoi spektrometrii na baze stsintilliatsionnogo gamma-spektrometra
Book ChapterEducation and science: current trends- Authors:
- I P. Mikhnev, Nataliia A. Sal'nikova, Irina P. Medintseva
- Work direction:
- Парадигмы современной науки
- Abstract:
- The monograph presents studies of information protection tools against unauthorized access to automated radionuclide spectrometry systems based on a scintillation gamma spectrometer. As a result of the conducted researches, the system's security indicators have been obtained, which allow to calculate and optimize the probability of damage from unauthorized access taking into account the operating time and the applied information protection means. The developed analytical estimations allow to calculate the upper and lower bounds of the probability of unauthorized access to confidential information at the design stages of automated systems.
- Keywords:
- natural radionuclides, information security, unauthorized access, design of automated systems, system radionuclide spectrometry, threats to information security