?
Информационные атаки
С. 258-308.
Dzyaloshinsky I. M.
Kiriya I., В кн. : Энциклопедия мировой индустрии СМИ. : М. : Аспект Пресс, 2013. Гл. 15. С. 388-414.
This chapter is analysing french media market in its current situation. It collects main data about advertizing market and its structure, dinamics in 2009-2010. The structure of main assets of french media conglomerates (like Canal+, Hersant, Lagardere) is described as well. Main trends and changes in field of media concentration during second half of 2000s are presented. Separately ...
Added: September 5, 2013
Торопкина В.А., Радбиль Т. Б., Рацибурская Л. В. et al., Вестник Московского университета. Серия 9: Филология 2018 № 2 С. 127-155
The article regards the problem of interpretation and evaluation of wordbuilding processes and their results in the Russian language as a reflection of certain socio-cultural, cognitive and communicative priorities. Based on the material of neologisms in mass media and advertising the authors expose the specificity of the ways of the world language conceptualization, the social ...
Added: September 29, 2020
Deineko A.G., Legal Issues in the Digital Age 2021 No. 3 P. 33-57
The article reviews the new Russian legislation introducing the experimental legal regime for the use of highly automated transportation vehicles (HATVs) (driverless vehicles) on public roads. The article analyzes strategic planning documents related to the subject, such as the governmental Traffic Safety Concept for Public Roads with Driverless Transportation Vehicles (DTVs) and the European Union’s ...
Added: March 18, 2022
Соколов А. Ю., Soldatkina O., Вестник Пермского университета. Юридические науки 2023 № 4 (62) С. 602-612
Introduction: the study discusses legal information distribution as an important tool of legal policy in the field of information security, as its priority aimed at ensuring a proper level of information security of the population. A promising direction in this area is shifting a focus on the activities of constituent entities, including those aimed at ...
Added: January 19, 2024
Tulchinskii G. L., Философские науки 2015 № 5 С. 24-33
The article examines the role of historical memory for the consolidation of society,
as a matter of symbolic politics. The author formulates the conditions under which
the phenomena of social life are the objects for the symbolic politics. There is a
systematization of communication technologies and tools for symbolic politics. The
special case is a genocide in historical memory ...
Added: January 17, 2016
Starykh V., Mukhamedzyanov G., В кн. : Actual Problems of System and Software Engineering. Proceedings of the 6th International Conference Actual Problems of System and Software Engineering. Moscow, Russia, 12-14 November, 2019. Vol. 2514.: CEUR Workshop Proceedings, 2019. С. 193-199.
The article deals with the solution of the problems of the formation and use of applied ontologies as a
Abstract: The purpose of this article - the forming of theoretical foundations, analysis of working tools and technologies for the construction of an information system that allows to optimize the scanning of IS for compliance with information ...
Added: February 2, 2021
Avdoshin S. M., Savelieva A., , in : Satellite Workshops & Doctoral Consortium. : Nizhny Novgorod : Higher School of Economics in Nizhny Novgorod, 2012. P. 157-168.
Today the demand is growing for information security experts capable of analyzing problems and making decisions in business situations that involve risk or uncertainty. These skills can be acquired through systematic studying of various information security incidents. In this paper we propose a framework of methods, tools and taxonomies for analysis of case studies in ...
Added: January 22, 2013
Maslova E. A., Kalinina S., В кн. : Научная дискуссия: вопросы математики, физики, химии, биологии. Ч. Секция 2.10: Методы и системы защиты информации, информационная безопасность. Специальность 05.13.19. Кн. Информатика, вычислительная техника и управление. Вып. Сборник статей по материалам XV Международной заочной научно-практической конференции.: М. : Международный центр науки и образования, 2014.
Рассматриваются проблемы комплексной автоматизации среднего и малого бизнеса в России с акцентом на вопросы обеспечения информационной безопасности. ...
Added: March 21, 2014
Elin V., Право и жизнь 2015 Т. 1 № 199 С. 146-165
In article the concept of information crimes reveals, the place and information role as a part of a crime is defined, information characteristic as object and a crime subject is given. In article various approaches to classification of information crimes are analyzed, classification of information crimes, including in connection with categories information, and also on ...
Added: March 4, 2016
Dzyaloshinsky I. M., В кн. : Информационное сопровождение социальных проектов в современном обществе: Материалы III Международной научно-практической конференции. : М. : ИД "АТИСО", 2012. С. 58-80.
Понятие «повестка дня» имеет множество значений, включая тривиальное: «перечень вопросов, которые будут обсуждаться на собрании, заседании». Однако в последние годы этим понятием все чаще обозначают способ формулирования проблем, решение которых кажется важным для определенного субъекта, или определенной группы людей, или общества в целом. При таком подходе возникает несколько вопросов, ответу на которые и посвящена эта ...
Added: February 14, 2013
Dzyaloshinsky I. M., М. : АПК и ППРО, 2012
Монография посвящена анализу структуры и особенностей российского медиапространства. Исследован категориальный аппарат, применяемый для описания медиапространства, обобщен материал, дающий представление о состоянии традиционных и новых медиа, а также создателях и потребителях коммуникационных и информационных ресурсов. ...
Added: February 14, 2013
Maksimenko A., Маркетинг в России и за рубежом 2009 № 5 С. 39-48
The article presents the results of a study of the viewers' attitude to negative information content in the Russian media. Held factor analysis of “evil” information content, viewer response strategies considered to promote death and violence. ...
Added: December 31, 2019
Zhuravlev M., / Social Science Research Network. Series SSRN Working Paper Series "Higher School of Economics Research Paper". 2013.
This article touches upon the problem of legal ensuring the information security of business entities. Topicality of the problem is predetermined by high importance of business information protection in market economy functioning in the context of information-oriented society and digital era. Novelty of this research consists in providing the most comprehensive approach to determining the ...
Added: November 19, 2013
Avdoshin S. M., Savelieva A., Информационные технологии 2012 № 5 С. 58-62
In this paper we propose a new approach to teaching practical information security in higher school based on case studies. We justify its place in information security curriculum by providing an example from our experience of using the approach for BSc and MSc students of Higher School of Economics in the courses on "Technical and ...
Added: September 7, 2012
Tulikov A. V., Современное право 2013 № 8 С. 27-31
We study the problem of restricting the rights and freedoms in order to ensure information security. The limitations and problems associated with them relations of public and private interests considered as a system consisting of a set of elements such as objects, subjects of information security and the activities of these entities to ensure information ...
Added: October 8, 2013
Baranov A., Системы высокой доступности 2012 Vol. 8 No. 2 P. 12-15
The direction of cloud computing protection development is considered in the article. It is suggested to consider the structure of a queuing system based on processing data centers (PDC), as the combination of six components: the hardware PDC element; telecommunication PDC resources access element; users and the software associated to them; the «middle» PDC layer, ...
Added: December 2, 2012
Savelieva A., Открытое образование 2011 № 5 С. 12-17
In this paper the authors propose a new approach to teaching practical information security in higher school based on case studies. They justify its place in information security curriculum by providing an example from the experience of using the approach for BSc and MSc students of Higher School of Economics in the courses on «Technical ...
Added: December 8, 2012
Baranov A., Baranov P., Проблемы информационной безопасности. Компьютерные системы 2018 № 4 С. 62-67
The paper examines probability-theoretic models of information distortion at message level. We research control sum distribution segments that are typical for network protocols like TCP.
As an addition operation we use both bitwise coordinate addition and addition of numbers in binary code with carry. Control sum error probability for asymptotic assessments provided distortion probability is low ...
Added: July 31, 2019
Tuv A., Gudkov Y., В кн. : Менеджмент качества и менеджмент информационных систем (MQ&ISM-2012). Материалы международной конференции. : М. : Фонд «Качество», 2012. С. 91-94.
Рассматриваются новые методы регистрации движения на базе активных инфракрасных датчиков движения для систем управления информационной безопасностью. Исследуются источники погрешностей таких датчиков и структурные решения компенсации влияния помех. ...
Added: February 6, 2013
Борисов М. А., Budnik R., Войниканис Е. А. et al., М. : Юрайт, 2023
The course outlines the basic concepts and institutions of information law in Russia. The theoretical foundations of the legal regulation of information relations are highlighted, the principles of information law are considered, its norms and sources are analyzed at the level of deep problematization, the features of information and legal relations that are formed under ...
Added: March 1, 2023
Baranov A., Baranov P., Проблемы информационной безопасности. Компьютерные системы 2019 № 3 С. 35-40
Control sum mechanism efficiency research aimed at distortion revealing in a message being transmitted is a relevant task that is solved using different possible information transfer operation condition models.
In the paper distortions are modelled as an overlay of noise component with low signal/noise ratio , which poses most practical interest. Considered class of control sums ...
Added: December 29, 2019
Васильев А. М., Issaev L., Korotayev A. et al., Азия и Африка сегодня 2018 № 12 С. 3-10
В статье рассматриваются медиастратегии «Исламского государства» (ИГ). Авторы приходят к выводу, что «мягкая сила» ИГ основывается на трех составляющих: культура, политическая идеология и внешняя политика. Источниками «мягкой силы» являются компоненты ее привлекательности для потребителя, т.е. те элементы и образы, которые позволяют заинтересованному и применяющему «мягкую силу» добиться контроля над потребителем. За время своего существования ИГ ...
Added: October 13, 2018
Podmarev A., Информационная безопасность 2020 № 1 С. 6-7
ИБ в гражданской авиации: некоторые вопросы обработки ПД и безопасности КИИ ...
Added: September 2, 2021