• Title/Summary/Keyword: civil security

Search Result 518, Processing Time 0.022 seconds

The Main Negative Factors of Military Influence on the Economic Environment of the Region and its Financial and Economic Security

  • Sytnyk, Yosyf;Havrychenko, Dmytro;Staverska, Tetiana;Primush, Roman;Erfan, Vitalii
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.241-245
    • /
    • 2022
  • The main purpose of the study is to determine the main factors influencing the economic environment of the region and its financial and economic security. Ukraine aspires to become a full member of the European Union, but the events of 2022 have changed everything. Full-scale military operations on the territory of Ukraine significantly affect its socio-economic situation Today, the issue of studying the negative impact of military operations on the economic environment is very relevant. Based on the results of the study, we have identified the main negative factors of the military impact on the economic environment of the region and its financial and economic security.

Threats of MANPADS and Its Counter-Measures

  • Choi, Jin-Tai
    • International Journal of Contents
    • /
    • v.6 no.3
    • /
    • pp.89-96
    • /
    • 2010
  • The International air transportation industry provides a vital communication link which brings prosperity to many states in our modern age. This invaluable link has been threatened by terrorism. Airlines have been one of the most attractive targets in the eyes of terrorists for several reasons, including particularly the international and symbolic nature of aviation, and the potential of multigovernmental involvement which can inevitably generate wide publicity. Terrorist attacks against civil aviation have been committed since the earliest days of civil aviation history. The first attack against civil aircraft dates back to the early 1930s. Since then, aircraft hijacking and other forms of attack against air transport operations have become one of the most serious challenges to the safety of flying. In recent years, a new form of threats against civil aviation has appeared. Man-portable air defense systems (MANPADS) in the hands of criminals, terrorists, and other non-state actors pose a serious potential threat to passenger air travel, the commercial aviation industry, and military aircraft around the world. The purpose of this study is to provide some countermeasures against such attacks. In order to foster a better understanding of the problem, an introduction of MANPADS and a brief history of attacks using MANPADS are presented. It also examines the level of threats, trends of attacks using MANPADS and the possible countermeasures to be taken by the international community.

Decision Support System Regarding the Possibility of Using the Reproductive Technologies Taking into Account Civil Law

  • Hnatchuk, Yelyzaveta;Hovorushchenko, Tetiana;Medzatyi, Dmytro
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.413-420
    • /
    • 2022
  • The review of known methods and decision support systems regarding the possibility of using the reproductive technologies showed that currently there are no methods and decision support systems regarding the possibility of using reproductive technologies taking into account civil law. Although the analyzed methods and systems have great potential for use in different contexts, these methods and systems do not take into account the civil law requirements of any country. The paper has developed a decision support system regarding the possibility of using the reproductive technologies taking into account civil law, which automatically and free of charge determines the possibility/impossibility of surrogate motherhood or in vitro fertilization. If it is determined that surrogate motherhood or in vitro fertilization is impossible, the sufficiency of the information in the analyzed contract is evaluated, and the reasons for the impossibility of surrogate motherhood or in vitro fertilization are presented to the user.

Trends and Prospects for the Development of Virtual Reality and Digital Property

  • Kirillova, Elena Anatolyevna;Blinkov, Oleg Evgenyevich;Blinkova, Elena Victorovna;Vrazhnov, Aleksey Sergeevich;Magomedov, Firdousi Bilyamudinovich
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.284-290
    • /
    • 2022
  • The study considers trends and prospects for developing virtual (augmented) reality and civil transactions in relation to digital property. In jurisprudence, there is a need to determine the legal status of virtual and augmented reality to regulate legal relations in the digital environment. Legal relations using new digital technologies require the creation of new legislative approaches and rules of their legal regulation. The article dwells on the legal status of virtual (augmented) reality and determines the methods of regulating legal relations in the sphere of digital property. The study utilized methods for collecting single and multiple facts in order to identify the main trends in the civil circulation of digital assets, as well as private law methods. The methods of generalization, concreteness, induction and deduction reveal the legal nature and main features of virtual (augmented) reality and digital property. The paper highlights the specifics of virtual reality and civil transactions in relation to digital assets. The research has concluded that the sale, exchange and other actions with digital objects in virtual reality have distinctive features, while digital property has also unique characteristics since it is involved in civil circulation and legal relations.

The Problem and the Proposal in Private Security Regulation (개정 경비업법령의 문제와 과제)

  • Kwon, Ahn Hwang
    • Convergence Security Journal
    • /
    • v.15 no.1
    • /
    • pp.91-104
    • /
    • 2015
  • Korea Privative security regulation was enacted in 1976 and which was revised 18 times. But most of the revision was made by outer forces but not by for the law itself. Now more than 39 years since the law was enacted and 63 years modern private security method was adopted. In this point of time being requires well equipped private security regulation would be revised to match with much changed society. First, there is a problem with the current ways of education, written examination. Second, security guard supervisor examination subject should be revised, which means overlapped subjects must be eliminated. Third, collective civil petition place has to be arranged.

Protection of Information Sovereignty as an Important Component of the Political Function of the State

  • Zadorozhnia, Halyna;Mykhtunenko, Viktoriia;Kovalenko, Hanna;Kuryliuk, Yurii;Yurchenko, Liubov;Maslennykova, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.151-154
    • /
    • 2021
  • State information policy is an important component of foreign and domestic policy of the country and covers all spheres of society. The rapid development of the information sphere is accompanied by the emergence of fundamentally new threats to the interests of the individual, society, state and its national security. The article considers the components of the state information policy to ensure information security of the country and identifies the main activities of public authorities in this area. Internal and external information threats to the national security of Ukraine and ways to guarantee the information security of the country are analyzed. Information security is seen as a component of national security, as well as a global problem of information protection, information space, information sovereignty of the country and information support of government decisions. Approaches to ensure the process of continuity of the information security system of the state in order to monitor new threats, identify risks and levels of their intensity are proposed.

Efficiency of Innovative Development Management: Interstate Assessment of the Economic Competitiveness in the Context of European Integration and Economic Security

  • Khodakivska, Olga;Ramos, Olena Ribeiro;Nechyporenko, Oleksandr;Tsiutsiupa, Svitlana;Krasnoshtan, Olexander;Mayovets, Yaryna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.67-72
    • /
    • 2021
  • The article identifies areas for effective management of innovative development. The competitiveness of the economy in the context of European integration and economic security is assessed. The level of innovative economy of some countries of the world is analyzed. The issue of attracting foreign investors to stimulate innovative production in Ukraine is raised. It is identified the need for the formation of an updated state policy capable of providing innovative development and improving the competitive position of the state in international rankings. Emphasis is placed on the need to form a critical mass of managers-civil servants capable of developing, implementing and monitoring the policy of innovative development of entrepreneurship.

Analysis on Information Security Educational Institutions with Statistical Yearbook of Education (교육통계연보를 이용한 정보보호 교육기관 현황에 대한 분석)

  • Kim Tae Sung;Kim Jong Ha;Kim Min Jeong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.10B
    • /
    • pp.880-890
    • /
    • 2004
  • As the side effects of information society, for example hacking, virus, etc., diffuse, the information security becomes one of the most important issues over the world. Information security manpower who produce the information security products, and who conduct the information security services are critical factor to complete secure information society In spite of many Plans formulated and implemented by government and civil sector, there is no systematic analysis on the current status of information security educational institutions. This article aims to analyze the current status of information security educational institutions - colleges, universities and graduate schools-with Statistical Yearbook of Education, and to predict the supply of information supply manpower.

Modern Management Technologies in the System of Ensuring the Security in the Context of Socio-Economic Development and the Digital Economy

  • Panchenko, Vladimir;Dombrovska, Svitlana;Samchyk, Maksym;Mykhailyk, Nataliia;Chabaniuk, Odarka
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.213-219
    • /
    • 2022
  • The main purpose of the study is to determine the main aspects of the introduction of modern management technologies into the security system in the context of socio-economic development and digitalization of the economy. Socio-economic development and a high level of security include growth in income, labor productivity, production volumes, increased competitiveness, changes in the institutional environment, consciousness, activity, social security, the quality of the education system, healthcare, etc. Despite the root cause of economic development, it is not an end in itself, but a tool for ensuring social development. Gaining access for citizens to education, health care, observance of the principles of equality and justice, ensuring protection are directly dependent on the level of economic well-being, the level of economic potential of the country or regions. The research methodology involved the use of both theoretical and practical methods. As a result of the study, the key elements of the introduction of modern management technologies into the security system in the context of socio-economic development and digitalization of the economy were identified.

A Study on the Civil Resource Utilization of Military Defense (국방 분야의 민간자원 활용에 관한 연구)

  • Park, Kyun Yong;Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.16 no.3_1
    • /
    • pp.3-10
    • /
    • 2016
  • This study is to actively respond to changes in terms of age, it was to find a possible way to realize the effective application of research to expand the civilian use of resources in the defense sector. Utilization of civil resources were first introduced by the previous government institutions to be applied to the military, our country, the use of private resources began with the 1948 case of a consignment of rubbish. In particular, in the process of overcoming the economic crisis IMF 1990s the government increased its advantage in the public service sector while introducing elements of civil to the public sector. Meanwhile, the Pentagon was promoting policies that foster and promote the civil sector in defense of "defense reform law" in terms of the advancement of military operations. The results of the work carried establish schemes for the civil use of resources, which can be protected by legal and institutional supplement, it is determined that you need a dedicated organization for the construction of projects.