Information security under martial law

نویسندگان

چکیده

In modern military realities, it is difficult and even inappropriate to deny the role of information as a tool confrontation, in fact - weapon. Information allows you win war without firing single shot, creating fueling internal contradictions. Such tactics are characteristic new format wars hybrid wars, where direct factor only one components whole.
 It worth paying attention that conditions whole set designed manipulate public opinion, human consciousness presented with help physiological psychological methods means its perception, issue low level culture arises, which causes decrease person's ability critical perception , analysis evaluation received becomes important. this case, form one's own opinion practically absent.
 quite correct believe security involves: an appropriate culture, is, theoretical practical training individual, ensures protection realization his vital interests harmonious development society, regardless presence threats; state create for satisfaction informational needs provision, use environment individual; against various threats.
 The article reveals aspects ensuring rights freedoms, taking into account martial law. Priority areas defined. Typical threats their origins considered. Also, important conclude consists measures ensure security.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mechanism Design for Social Law Synthesis under Incomplete Information

For the social law synthesis problem, when the agents are rational in the sense of game theory and hold some information we need as private information, it naturally evolves into a setting that is perfectly addressed by the framework of algorithmic mechanism design. In this strategic setting, we are not only required to find out the feasible social law for the objective, but also required to fo...

متن کامل

Information Security Policy Concerns as Case Law Shifts toward Balance between Employer Security and Employee Privacy

Employee expectation of privacy within the workplace diminished as information technology use increased within the enterprise. During the same time period, increased use of information technology within the enterprise created a corresponding need for heightened information security. Technology use has continued to become increasingly ingrained within society as a whole to the point that the US ...

متن کامل

Asymmetric Information and Security Design under Knightian Uncertainty∗

We study optimal security design by an informed issuer when the investor faces Knightian uncertainty about the distribution of cash flows and demands robustness: she evaluates each security by the worst-case distribution at which she could justify it being offered by the issuer. First, we show that both standard outside equity and standard risky debt arise as equilibrium securities. Thus, the m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Naukovij vìsnik Užgorods?kogo nacìonal?nogo unìversitetu

سال: 2023

ISSN: ['2664-6153', '2307-3322']

DOI: https://doi.org/10.24144/2307-3322.2023.77.2.20