List of publications on a keyword: «information security»
-
Использование нейросетей в системе образования: преимущества и риски
ProceedingАктуальные проблемы коммуникации: теория и практика- Authors:
- Iurii A. Denisenko, Daniil F. Klimenko
- Work direction:
- Varia (принимаются материалы по другим направлениям, соответствующим теме конференции)
- Abstract:
- Over the past three years, neural networks and other artificial intelligence (AI) technologies have become one of the most discussed topics in education, from school to university. This article examines the main uses of neural networks in the educational process, analyzing their key benefits (personalization, automation of everyday tasks, expanding access to knowledge) and risks (ethical issues, substitution of independent work, digital divide, unreliable information). Based on an analysis of modern scientific and educational literature, it shows how neural networks are changing education and what conditions are necessary for their safe and effective implementation. The research methods include analysis and synthesis of scientific literature, comparison of approaches by different authors, and practical examples.
- Keywords:
- education, information security, artificial intelligence, digitalization, Neural networks, personalized learning, academic integrity
-
The Role and Specific Features of Using Digital Forensics in Forensic Accounting Examination
ProceedingStrategies of Sustainable Development: Social, Law and External-economic Aspects- Author:
- Evgeniia D. D'iachenko
- Work direction:
- Актуальные вопросы юриспруденции
- Abstract:
- The article examines the challenges arising in the investigation of accounting information under the conditions of digitalization, when the key indicators of economic offenses are primarily recorded in electronic systems. The analysis is based on the study of modern approaches to working with digital data, including methods for recovering deleted information, examining metadata, and analyzing audit logs. It is demonstrated that the fragmentary nature of regulatory frameworks and procedural limitations hinder the use of electronic evidence. The author concludes that there is a need to develop unified methodologies for handling digital data and to strengthen interdisciplinary training of experts.
- Keywords:
- information security, accounting systems, electronic data, digital evidence, forensic accounting examination, digital forensics, metadata, procedural requirements
-
Fake News and the Media Landscape: Impact on Public Opinion
Proceeding
Relevant issues of management, economics and economic security- Authors:
- Aida M. Pashaeva, Esmira D. Alieva, Saida V. Kaipbekova
- Work direction:
- Социально-экономическая политика России и зарубежных стран
- Abstract:
- In this article, the authors consider fakes as intentional false information that misleads people. They also examine the relationship between media space, media trust, and responsibility for fakes.
- Keywords:
- information security, information, state, influence, trust, potential, blogger, fakes, media trust, Fake, journalist, blogging, channel, fake information, journalists, article, initiative, media space
-
Information security in international law
Book Chapter
Development of the Russian socio-economic system: challenges and prospects- Authors:
- Sergei N. Salishev, Didar S. Seiubergenova, Taalaibek K. Ismanov
- Work direction:
- Глава 2
- Abstract:
- The chapter considers the problem of forming a multipolar information space and the need to regulate international information security. It analyzes international legal acts regulating information resources. The main attention is paid to the documents adopted by the UN General Assembly and the Council of Europe, which are aimed at combating the criminal use of information technologies and forming a culture of cybersecurity. It is noted that the international community recognizes the importance of information security, but there is a problem of a common understanding of key issues, which complicates the global regulation of this area. In this regard, it is proposed to develop a new universal document at the global level under the auspices of the UN and to unify international legislation in the field of ensuring information security and to develop new regulatory legal acts that can adequately respond to the challenges of the digital age.
- Keywords:
- information technology, information security, international cooperation, criminal law, cyberspace, convention, extraterritoriality
-
Information security models: analysis of international experience
Book Chapter
Development of the Russian socio-economic system: challenges and prospects- Authors:
- Sergei N. Salishev, Didar S. Seiubergenova, Taalaibek K. Ismanov
- Work direction:
- Глава 3
- Abstract:
- The chapter considers the issue of criminal-legal protection of information security at the international level. The main attention is paid to the national legislation of the USA, Great Britain, France and Germany in this area. The main regulatory legal acts aimed at ensuring cybersecurity, as well as liability mechanisms for violations in the field of information security are analyzed. Various aspects of information resource protection are considered, including the protection of state secrets, privacy and critical information infrastructure facilities. An analysis of international experience in countering crimes in the field of information security revealed key problems: difficulties in identifying intruders, difficulties in investigating and solving crimes. It is proposed to create an international convention on information security under the auspices of the UN. It is concluded that the regionalization of acts can lead to an increase in attacks from countries that have not signed the agreement. It is important to regulate liability for recording non-public conversations, dissemination of criminally obtained data and fraudulent access to protected information.
- Keywords:
- information security, national legislation, cybersecurity, criminal law protection, liability for violations, protection of information resources
-
Fakes and trash streams as a threat to information security
Proceeding
The Topical Issues of the Humanities and Social Sciences- Authors:
- Sirazhitdin A. Temirkhanov, Zarina V. Iusifova, Saida V. Kaipbekova
- Work direction:
- Образование и право
- Abstract:
- The authors of this article consider fakes as deliberate false information, according to which people are misled, and the characteristics of fake information are also considered. Such a trend is considered as trash streams originating in foreign countries, which are subsequently relevant in the Russian Federation and adversely affecting the younger generation. Legal initiatives against the spread of fakes are being considered.
- Keywords:
- information security, information, influence, trust, government, potential, blogger, fakes, media trust, Fake, journalist, trash stream, trash streams, trash streamer, blogging, channel, fake information, journalists, article, initiative
-
The role of critical thinking in the development of information security culture of technical university students
Proceeding
Psychologically Safe Educational Environment: Design Problems and Development Prospects- Authors:
- Svetlana A. Solovyova, Natalia Y. Evsyukova, Mikhail A. Kulebyaev
- Work direction:
- Well-Being and Security of a Person in Contemporary Educational Environment
- Abstract:
- The article presents the results of a study aimed at identifying the relationship between the level of development of critical thinking and the level of formation of an information security culture. The study was conducted among 250 students of the Volga branch of MADI using specialized questionnaires and tests. The data obtained can contribute to the development of more effective strategies to counter modern cyber threats, emphasizing the importance of critical thinking in strengthening the culture of information security.
- Keywords:
- digital technologies, information security culture, critical thinking, cyber threats, technical component, cognitive component, behavioral component, value-semantic component
-
The specifics of the information security culture of technical university students
Research Article
Development of education Volume 7 No 2- Authors:
- Svetlana A. Solovyova, Mikhail A. Kulebyaev
- Work direction:
- Pedagogy and Modern Education
- Abstract:
- The article presents the results of a study of the peculiarities of the information security culture of students of technical universities. The relevance is due to the globalization of digital technologies penetrating into all spheres of human life, both socio-political, state, professional and personal, which clearly determines the need for the formation and development of an information security culture. This issue is especially relevant in relation to students of technical universities – future specialists in the engineering industry, since they will work with technical systems and information that may be subject to various threats in the field of information security. The effectiveness of programs for the formation and development of an information security culture is largely determined by the study of the features and specifics of the manifestation of its components (technical, cognitive, behavioral, and value-semantic). The study was carried out in the form of a ascertaining experiment using the author's diagnostic questionnaire "The level of information security culture". 781 students of the Volga branch of MADI took part in the study. Based on the highlighted structure of the information security culture, the study established the specific features of the formation of its components among students of a technical university, namely, the results of the study revealed insufficient fixation in the minds of students of a technical university of the values of information security culture, a low level of patterns of safe behavior, with the general development of technical literacy in the digital space.
- Keywords:
- information security culture, technical component, cognitive component, behavioral component, value-semantic component
-
Social media is the secret weapon of nazism
Proceeding
University as a factor of Modernization of Russia: History and Prospects (to the 55th anniversary of the I.N. Ulyanov ChSU)- Author:
- Anastasiia V. Kalita
- Work direction:
- Война как фактор формирования национальной идентичности
- Abstract:
- This study examines the problem of the influence of social networks on the spread and strengthening of the ideology of Nazism in modern society. The work analyzes specific examples of the use of social networks to spread Nazi ideas to a certain age category, and also suggests possible ways to combat this phenomenon.
- Keywords:
- historical memory, information security, youth, Patriotism, teenagers, social networks
-
Problems of Bias and Opacity of Neural Network Models
Book Chapter
Modern issues of pedagogy and psychology: theoretical and methodological approaches and practical research results- Author:
- Natalia G. Mironova
- Work direction:
- Глава 7
- Abstract:
- In recent decades, experts in the field of cognitive psychology and epistemology have described about two hundred distortions inherent in human thinking. Systems based on artificial intelligence models that are actively being created and introduced into social practice exhibit characteristics similar to human thinking, incl. cognitive defects. The chapter analyzes some cognitive distortions that, according to the author, are inherent in artificial intelligence models, in particular large generative neural network models.
- Keywords:
- information security, philosophical problems of artificial intelligence, neural network models
-
Politika tsifrovogo suvereniteta gosudarstva: zarubezhnyi i rossiiskii opyt
Book Chapter
Principles of the New Ecosystem Formation: economic aspects- Authors:
- Dilmurad B. Iakhiaev, Liudmila V. Voronina, Aleksei V. Grigorishchin, Dmitrii S. Shiriaevskii, Timofei A. Oshomkov
- Work direction:
- Глава 1
- Abstract:
- The introduction of digital technologies, services and platforms into all spheres of life raises issues of ensuring digital security and the sustainability of socio-economic and political systems in both developed and developing countries. The increasing information impact, including from external forces, is leading many countries to reconsider the principles of preserving national sovereignty. A new political concept of national sovereignty is developing, a separate element of which is digital sovereignty. This paper examines the main priorities of the domestic policy of a number of states (China, Brazil, Germany, USA, India, Norway, Russia) in the field of digitalization, which are aimed at creating digital sovereignty. The authors studied government programs and strategic planning documents; the authors also identified the main problems arising during the digital transformation of economic systems in Russia and proposed ways to solve them.
- Keywords:
- information security, digitalization, digital economy, digital sovereignty, digital security
-
The Modern Importance of Information Security and Information Protection in the Country's Economic Security System
Book Chapter
Law and economic development: current issues- Author:
- Andrei V. Minakov
- Work direction:
- Глава 3
- Abstract:
- Information security is an important part of the country's economic security. At present, the economies of many countries are experiencing an increase in the influence of cybercrime on them, since there are various crimes related to data theft, fraud, account hacking, cyber-attacks by criminals operating in the information field both for financial gain and for terrorist purposes, negatively affecting the security of the financial system and the stability of the economies of countries, including Russia. Therefore, the government, business and the whole society must take various steps to combat threats in the field of information technology.
- Keywords:
- information security, economic security, information protection, cyber threats, data privacy, data protection
-
Methodological approaches in the organization of pedagogical support of information security of adolescents
Review Article
Development of education Volume 6 No 3- Author:
- Olga N. Kurmakaeva
- Work direction:
- Pedagogy and Modern Education
- Abstract:
- The article deals with the actual problem of information security of adolescents, which is revealed through factors affecting the development of personality. The purpose of the study is the methodological justification of the developed and implemented model of pedagogical support of information security of adolescents in an institution of additional education and pedagogical conditions for its successful implementation. The work is based on theoretical analysis and generalization of pedagogical practice. The material for the study was the content of training courses on programming in an institution of additional education. The results of the study showed that the presented model of pedagogical support of information security of adolescents should be based on synergetic, axeological, socio-cultural and activity approaches. The article specifies the pedagogical conditions under which it is possible to form the qualities of a person capable of resisting information threats and conforming to the norms of our society.
- Keywords:
- information security, pedagogical support, information threats, teenagers in the digital space
-
Prospects for Surveillance Systems Usage
Proceeding
Relevant issues of management, economics and economic security- Authors:
- Aleksey Y. Khoroshilov, Tatyana L. Fomicheva
- Work direction:
- Угрозы экономической безопасности и пути их преодоления
- Abstract:
- The article evaluates the expansion tendency of surveillance systems, used for security and maintaining order. Related risks are analyzed.
- Keywords:
- information security, surveillance, privacy, face recognition
-
The Problem of International Information Security
Proceeding
Prospects for Socio-Economic Development of Russia- Authors:
- Alexander A. Alekseev, Tatyana L. Fomicheva
- Work direction:
- Современные тенденции развития мирового сообщества
- Abstract:
- In the era of globalization and the development of information technology, information is becoming increasingly important. Information reduces uncertainty, increases the amount of knowledge about objects, people and events, helps to understand, to learn something. To ensure international information security, the UN Convention on International Information Security and the Convention of the Shanghai Cooperation Organization member states were developed, which will be considered in this work. Theoretical models of the existence of these conventions in the future will also be proposed, their pros and cons will be identified.
- Keywords:
- information, international information Security, Budapest Convention on International Information Security, Shanghai Cooperation Organization Convention
-
Features of Formation of Competences in the Field of Information Security Among Future Employees of Customs Authorities
Proceeding
Psychologically Safe Educational Environment: Design Problems and Development Prospects- Authors:
- Denis A. Vasiliev, Evgeny I. Travkin
- Work direction:
- Psychological security in the digital environment of an educational institution
- Abstract:
- The article discusses the methodological features of forming a culture of information security among future customs authorities within the “Customs” field of study. The methodological educational system of teaching of basic of information security to university students is analysed in the present article.
- Keywords:
- higher education, customs, customs authorities, information security culture, information protection
-
Actual problems in the field of information security of the modern state
Proceeding
Relevant issues of management, economics and economic security- Authors:
- Aleksandr V. Nikishkin, Igor V. Stepanov, Daria N. Lanina
- Work direction:
- Угрозы экономической безопасности и пути их преодоления
- Abstract:
- The authors reveal the problem of information security as the main task of the state, affecting many spheres of life and ensuring not only domestic issues, but also multilateral international relations
- Keywords:
- information security, information, civil society, modern society, Informatization of society, human values, false information
-
Ensuring the security of critical information infrastructure: the powers of the federal government bodies of the Russian Federation
Proceeding
Relevant issues of management, economics and economic security- Authors:
- Ilia P. Mikhnev, Svetlana V. Mikhneva
- Work direction:
- Угрозы экономической безопасности и пути их преодоления
- Abstract:
- The article discusses the competences and powers of the state authorities of the Russian Federation within their legal status in the field of ensuring the security of critical information infrastructure. Some functions and authorities in the field of information security have changed in a number of federal executive bodies. In particular, the Federal Security Service, on the basis of a presidential decree, is authorized to create a state system for detecting, preventing and eliminating the consequences of computer attacks on information resources of the Russian Federation. However, not all rights and obligations are enshrined; a number of powers cause the duality of the legal status of certain federal bodies of state power. The clarity and unambiguity of securing the rights and obligations of state bodies authorized in the field of information security are guarantees for effectively ensuring the security of important information infrastructure facilities.
- Keywords:
- information security, critical information infrastructure, public authority, federal authority, computer attacks, computer incidents
-
Information security of the individual, society, state
Proceeding
Topical issues of law, economic and management- Authors:
- Aleksandr V. Nikishkin, Igor V. Stepanov, Maksim S. Aiupov
- Work direction:
- Уголовное право и криминология, уголовно-исполнительное право
- Abstract:
- The authors comprehensively consider the information security of the state, which is the most important and integral element not only of state policy, but also of society as a whole
- Keywords:
- information security, information transformation, the state authorities, the development of society, the transmission of information, rule of law, international politics
-
Zashchita konfidentsial'noi informatsii ot nesanktsionirovannogo dostupa pri proektirovanii avtomatizirovannykh sistem radionuklidnoi spektrometrii na baze stsintilliatsionnogo gamma-spektrometra
Book Chapter
Education and science: current trends- Authors:
- I P. Mikhnev, Nataliia A. Sal'nikova, Irina P. Medintseva
- Work direction:
- Парадигмы современной науки
- Abstract:
- The monograph presents studies of information protection tools against unauthorized access to automated radionuclide spectrometry systems based on a scintillation gamma spectrometer. As a result of the conducted researches, the system's security indicators have been obtained, which allow to calculate and optimize the probability of damage from unauthorized access taking into account the operating time and the applied information protection means. The developed analytical estimations allow to calculate the upper and lower bounds of the probability of unauthorized access to confidential information at the design stages of automated systems.
- Keywords:
- natural radionuclides, information security, unauthorized access, design of automated systems, system radionuclide spectrometry, threats to information security