Information Security of the Person, Society and State最新文献

筛选
英文 中文
Organizational and Legal Aspects of Improving Strategic Communications in Public Authorities’ Activities 在公共当局活动中改进战略沟通的组织和法律方面
Information Security of the Person, Society and State Pub Date : 2021-12-20 DOI: 10.51369/2707-7276-2021-(1-3)-8
Andriy Blahodarnyi
{"title":"Organizational and Legal Aspects of Improving \u0000Strategic Communications in Public Authorities’ Activities","authors":"Andriy Blahodarnyi","doi":"10.51369/2707-7276-2021-(1-3)-8","DOIUrl":"https://doi.org/10.51369/2707-7276-2021-(1-3)-8","url":null,"abstract":"Effective communication between governmental institutions and the civil society as a reflection of democratic development plays an increasingly significant role in the process of state formation. The analysis of recent research and publications shows that the issue of strategic communications draws attention of both leading domestic and foreign scientists and research centers. However, due to the dynamic development of events, this issue needs further analysis, the prerequisite for which is the study of the information interaction phenomenon under current conditions. \u0000The methodological basis of the study is a polymethodological approach, which encompassed in particular such methods as dialectical and comparative ones. In accordance with the set goal, the article studies the issues of communications of public authorities with various institutions of a civil society under existing conditions of a hybrid war against Ukraine. \u0000In the process of the analysis, the author concluded that when choosing the format of communication between the public authorities and various institutions of the civil society one should take into account the characteristics of a particular subject of information interaction. Various formats of information interaction should possess a common feature: in the process of implementation of a public policy the information should be primarily used to favor the citizens’ patriotic spirit; to enhance the state power and the Armed Forces’ authority among the population; to intensify the measures of anti-propaganda.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114501585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Confrontation Based on the Use of Reflective Control: Theory and Practice 基于反思性控制的信息对抗:理论与实践
Information Security of the Person, Society and State Pub Date : 2021-12-20 DOI: 10.51369/2707-7276-2021-(1-3)-11
Volodymyr Shemayev
{"title":"Information Confrontation Based on the Use of Reflective Control: Theory and Practice","authors":"Volodymyr Shemayev","doi":"10.51369/2707-7276-2021-(1-3)-11","DOIUrl":"https://doi.org/10.51369/2707-7276-2021-(1-3)-11","url":null,"abstract":"The article deals with the problem of improving the preparation and conduct of information confrontation in Ukraine based on the theory of reflexive control as a type of information management in the conditions of a hybrid war waged by the Russian Federation against Ukraine and EU countries. The advantages of information management are determined and its model is presented. The theoretical foundations of reflexive control, its evolution and application in the military sphere are substantiated. The principle, purpose, tasks, objects and subjects of the reflexive control are defined, as well as the destructive and constructive functions of applying the reflexive control in information confrontation. It is emphasized the essential role of V. Lefebvre's works for the introduction of the concept of reflection in the system-wide interdisciplinary field as well as such concepts as: reflexive system, rank of reflection, reflexive control based on the reflective approach. The ways the reflexive approach and information tools are applied by the Russian Federation in the hybrid war against Ukraine and for destabilization of the situation on the European continent are exemplified. It is suggested that the theoretical basis of the reflexive approach should be extended towards combining it with the mechanism of goal-setting in the information confrontation, development of models of choice in the conditions of using swift and expanded reflection; exploring the possibilities of reflexive control and programming, when the choice of the object is made on the basis of the models that take into account the image of another subject.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"47 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121113576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Threats to the State Security of Ukraine in the Hybrid Warfare 混合战争中乌克兰国家安全面临的信息威胁
Information Security of the Person, Society and State Pub Date : 2021-12-20 DOI: 10.51369/2707-7276-2021-(1-3)-3
V. Ostroukhov, M. Prysiazhniuk
{"title":"Information Threats to the State Security of Ukraine in the Hybrid Warfare","authors":"V. Ostroukhov, M. Prysiazhniuk","doi":"10.51369/2707-7276-2021-(1-3)-3","DOIUrl":"https://doi.org/10.51369/2707-7276-2021-(1-3)-3","url":null,"abstract":"The existence, self-preservation and progressive development of Ukraine as a sovereign state depend on a clear commitment to protection of its national interests and provision of state security. In modern conditions, the geopolitical standing of a state in the international arena, its ability to influence world events depends not only on economic and military strength but also on the information factor which plays increasingly important role nowadays.\u0000Rapid IT development at the beginning of the 21st century has led to a new global socio-technological problem, namely the problem of information security of a man, society and the state. The essence of this problem is that the most important interests of a man, society and the state are determined by the information environment. Therefore, deliberate or unintentional, external or internal influences on the information sphere can hinder those interests and pose a threat to the information security of a man, society and the state. Such a threat to national security is posed by external information expansion.\u0000The development of the advanced information technologies has led to the transition from the so-called classical war to a new type of warfare, namely information and psychological one. The sophisticated technical equipment and facilities which can affect not only the psyche and consciousness of people but also the information and technical infrastructure of states enable us to consider information weapons as a means of mass destruction capable of exerting large-scale psychological impact on political and business opponents.\u0000Similarly, the Russian Federation exerts destructive informational and psychological influence both outside and inside Ukraine using social contradictions, provoking ethnic and religious conflicts, undermining social unity and inciting hostility.\u0000The analysis of the ways of applying methods of information and psychological influence by the Russian Federation on the temporarily occupied territories of Donetsk and Luhansk regions and in the Autonomous Republic of Crimea makes it possible to identify major threats to state security in the information sphere which are aimed at discrediting the top military and political leadership of the state, inciting anti-state sentiments in Ukraine and conducting information operations to mold the cultural oneness of the population on the occupied territory of Crimea and the population of Russia. The information aggression against Ukraine nowadays is aimed at weakening and splitting the country from within through engineering and exacerbating existing political, socio-economic, ethnic and other contradictions.\u0000Underestimation of the possibilities of information and psychological influence and of measures to counteract influences as well as failure to regulate the specifics of a particular territory can be fatal during the further aggravation of the military-political situation around Ukraine. \u0000In view of the above, the task of all state, public,","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125412306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topical Issues of Implementing E-Hrivnia 实施e - vnia的热点问题
Information Security of the Person, Society and State Pub Date : 2021-12-20 DOI: 10.51369/2707-7276-2021-(1-3)-12
O. Yudin, Oleksii Skitsko
{"title":"Topical Issues of Implementing E-Hrivnia","authors":"O. Yudin, Oleksii Skitsko","doi":"10.51369/2707-7276-2021-(1-3)-12","DOIUrl":"https://doi.org/10.51369/2707-7276-2021-(1-3)-12","url":null,"abstract":"At the present stage of society development, the topical issues are changing the standards of economic relations and accelerating the development of the digital economy. The mechanisms for the implementation of banking payment systems are undergoing significant changes. In a number of states, pilot projects for the emission of digital state currencies are now in test mode. Experts are studying the problems of issuing digital money, and macroeconomic regulators are beginning to evaluate both positive expectations and negative results of using digital and information technologies when creating a new type of funds. It was concluded that the release of e-hryvnia into circulation, on the one hand, will make it possible to speed up and simplify the transfer of funds between the owners of electronic wallets, to increase the level of comfort in carrying out these operations, however, on the other hand, an increase in the number of cybercrimes should be expected, especially considering the lack of proper regulation of special legislative framework.\u0000The development of the national digital currency is a natural result of the digital society development, the growing influence of social platforms as well as the state's policy on creating a digital economy.\u0000One of the significant positive consequences of the development and implementation of the digital hryvnia is a decrease in the number of intermediaries in the implementation of cash payments, up to the complete exclusion of banking structures responsible for the transfer and processing of personal data, which leads to a decrease in costs, as well as to an increase in the speed of funds transfers, stabilization of the entire financial system and economic security of the country as a whole.\u0000The introduction of the concept of e-hryvnia will contribute to the formation of a highly developed technological society in Ukraine, as well as to the financial and technological integration of the general population. Cash tokenization is the next phase of digital transformation.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127654282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Psychological Aspects of Security Sector Specialists Training for Information and Analytical Activity 信息和分析活动安全部门专家培训的心理方面
Information Security of the Person, Society and State Pub Date : 2021-12-15 DOI: 10.51369/2707-7276-2020-(1-3)-2
Lyudmila Herman, Julia Andrusyshyn
{"title":"Psychological Aspects of Security Sector Specialists Training for Information and Analytical Activity","authors":"Lyudmila Herman, Julia Andrusyshyn","doi":"10.51369/2707-7276-2020-(1-3)-2","DOIUrl":"https://doi.org/10.51369/2707-7276-2020-(1-3)-2","url":null,"abstract":"The article emphasizes that psychological training is a part of professional training of specialists in any sphere, but for professionals in information and analytical activities it should be an integral part, resulted in readiness for professional activity taking into account the objective and subjective factors. Achievement of the required level of national security is conditioned by the continuous receipt of reliable and complete information about various threats, the degree of their danger and possible ways of neutralizing. Given the growing demands of providing the state, public authorities and local governments leadership with a highly professional analytical product in the rapid development of information and intellectual technologies, the role of effective performance of information and analytical functions by all security institutions is growing. After all, insufficient analytical support for state authorities activities leads to the impossibility of early forecasting of state and world events, adequate consideration of favorable and destructive factors affecting the social, political and economic life of the country. \u0000Therefore, competent specialists in the field of information and analytical activities determine the quality of analytical products preparation. The publication identifies the main psychological factors of professional success of specialists in information and analytical activities, formulates the definition of their psychological competence. It suggests a set of individual psychological qualities that should be inherent in a successful analyst, which include: objectivity, independence, ability to work under the influence of stressors, ability to work in a team, reflexivity, flexibility and non-standard thinking, ability to respond adequately to criticism, ability to defend one’s opinion, ability to argue, etc.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116955655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Problems in legal regulation of officially restricted information’s content in Ukraine 乌克兰官方限制信息内容的法律规制问题
Information Security of the Person, Society and State Pub Date : 2020-12-15 DOI: 10.51369/2707-7276-2020-(1-3)-10
I. Kasperskyi
{"title":"Problems in legal regulation of officially restricted information’s content in Ukraine","authors":"I. Kasperskyi","doi":"10.51369/2707-7276-2020-(1-3)-10","DOIUrl":"https://doi.org/10.51369/2707-7276-2020-(1-3)-10","url":null,"abstract":"The article considers the problems of legal regulation and the practice of classifying information as officially restricted in Ukraine. \u0000Based on the analysis of the relevant requirements of constitutional and administrative legislation and lists of officially restricted information, a number of problems have been identified that have a significant impact on the security of this type of limited access data. \u0000The basic problems are the deficiency of the definition of officially restricted information in law and the fragmentary legislative recognition of the features of this data, which would allow to form the criteria for classifying information as officially restricted. \u0000These shortcomings force the authorities to act on their own, which illegally restricts access to information.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122898877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Subjectivity as a Prerequisite for Qualitative Development of Ukrainian Polygraphology 主体性:乌克兰测谎学质量化发展的前提
Information Security of the Person, Society and State Pub Date : 2020-12-15 DOI: 10.51369/2707-7276-2020-(1-3)-11
T. Morozova, O. Morozov
{"title":"Subjectivity as a Prerequisite for Qualitative Development of Ukrainian Polygraphology","authors":"T. Morozova, O. Morozov","doi":"10.51369/2707-7276-2020-(1-3)-11","DOIUrl":"https://doi.org/10.51369/2707-7276-2020-(1-3)-11","url":null,"abstract":"The subject of consideration is the analysis of the history of formation and current trends in domestic polygraphology with an emphasis on subjectivity as \u0000a mandatory component of further qualitative development of this area with the provision of state interests, including the interests of state security.\u0000Polygraph studies have been conducted by domestic specialists on a regular basis since 1998. In 22 years, this method of establishing the truth from the little-known, mythical, and since the 30s of the last century, traditionally unacceptable by our lawyers, has become well-known and generally praised by society. Publications on the positive results of polygraph examinations on high-profile criminal proceedings, official investigations, personnel inspections in law enforcement agencies and special services have contributed to the growing popularity of the method. The use of a polygraph in filming and television broadcasts on a number of Ukrainian channels, checking politicians for integrity, and public polygraph calls to political opponents and business competitors have become traditional.\u0000Analysis of attempts to introduce polygraph technologies in different countries shows that after the initial accumulation of knowledge and experience, the formation of a positive attitude of society, then especially important is the direction of regulatory and theoretical and methodological framework for the use of polygraph. Blind copying of someone else’s experience is inevitably accompanied by copying someone else’s mistakes, the harmful dependence of the pace, quality and vector of development of the polygraph of a particular state on outside influence.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129782503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Socialoriented and Popular Resources of Network Are the Internet in Informative War Against Ukraine 社会化、大众化的网络资源是乌克兰信息化战争中的互联网
Information Security of the Person, Society and State Pub Date : 2020-12-15 DOI: 10.51369/2707-7276-2020-(1-3)-12
V. Ostroukhov, M. Prysiazhniuk
{"title":"Socialoriented \u0000and Popular Resources of Network Are the Internet in Informative War Against Ukraine","authors":"V. Ostroukhov, M. Prysiazhniuk","doi":"10.51369/2707-7276-2020-(1-3)-12","DOIUrl":"https://doi.org/10.51369/2707-7276-2020-(1-3)-12","url":null,"abstract":"In the article technologies of the use of the socialoriented and popular resources of network are examined the Internet in informative war against Ukraine. The concept of informative war, problem of the use of social networks of the Internet, in harm informative safety of Ukraine and ways of counteraction these threats open up.\u0000In the 21st century, the creation of a single information space that allows it to develop faster has become positive for humanity. However, the creation of an information society also leads to negative manifestations that give rise to such a concept as information warfare.\u0000The main purpose of information warfare is to weaken the moral and material forces of the enemy and strengthen their own, disrupt the exchange of information of the competitor. The main task of information wars is to manipulate the masses. \u0000The rapid development of information technology allows more effective information and psychological impact on the mass consciousness. The Internet space with its social networks has become a new platform for information wars.\u0000Socially oriented and publicly available Internet resources in the Joint Forces Operation zone are characterized by the dominance of pro-Russian propaganda in the liberated and temporarily occupied territories of Ukraine, and the active use of Internet social networks to the detriment of Ukraine’s information security. Their main tasks are to disseminate destructive information aimed at destabilizing the situation in eastern Ukraine. Russia is waging an information war against Ukraine, which has a negative impact on the formation of Ukraine’s image in the international arena.\u0000The implementation of strategic priorities and basic principles and tasks of the state information policy of Ukraine requires the improvement of organizational and legal mechanisms of information security management, intellectual and personnel and resource support.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131849013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protection Of NATO And Ukraine Classified Information In The 1990s And At The Beginning Of The Xxi Century 20世纪90年代和21世纪初北约和乌克兰机密信息的保护
Information Security of the Person, Society and State Pub Date : 2020-12-15 DOI: 10.51369/2707-7276-2020-(1-3)-8
A. Huz
{"title":"Protection Of NATO And Ukraine Classified Information In The 1990s And At The Beginning Of The Xxi Century","authors":"A. Huz","doi":"10.51369/2707-7276-2020-(1-3)-8","DOIUrl":"https://doi.org/10.51369/2707-7276-2020-(1-3)-8","url":null,"abstract":"The article proves that as a result of inspections by the NATO Security Office, Ukraine has established a strong system of protection of classified information coming from NATO institutions, NATO material media are stored quite reliably, and a mechanism for issuing certificates of personal admission has been established. The Security Agreement between the Government of Ukraine and NATO of 1995 established a flexible and extensive national network for the registration of documents of the Alliance, NATO information subjects, which in January 2021 has 29 centers, branches and contact points. During the study period, the Security Service of Ukraine prepared more than 50 agreements on mutual protection of classified information.\u0000At the same time, due to modern threats to national security, in accordance with today’s requirements, this system also needs to be improved.\u0000In particular, in the context of the tasks of reforming the system of protection of state secrets and other restricted information, taking into account the practice of NATO and EU member states, the draft Law of Ukraine «On Security of Classified Information» needs to be amended. After all, it is this law that should determine the legal and organizational principles of the functioning of the state security system of classified information. At the same time, the analysis of this project gives grounds to claim that it raises the issue of security of classified information to a new level, attempts to move away from the Soviet principles of protection of state secrets and focuses on the best examples of NATO and EU member states.\u0000Thus, we can state with confidence that in the process of cooperation between Ukraine and NATO in the field of protection classified information, an effective system has been created that is constantly improving, responding to current threats to national security and in accordance with today’s requirements.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123442892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Component of Terrorist Threat: Legal Fixing 恐怖主义威胁的信息构成:法律修正
Information Security of the Person, Society and State Pub Date : 2020-12-15 DOI: 10.51369/2707-7276-2020-(1-3)-4
Ivan Tkachov
{"title":"Information Component of Terrorist Threat: \u0000Legal Fixing","authors":"Ivan Tkachov","doi":"10.51369/2707-7276-2020-(1-3)-4","DOIUrl":"https://doi.org/10.51369/2707-7276-2020-(1-3)-4","url":null,"abstract":"The article is devoted to studies legal fixing of information component of terrorist threat in nationwide level legal acts of Ukraine. \u0000Analyzed the National Security Strategy of Ukraine 2020, Concept of Development of Security And Defense Sector of Ukraine 2016, Strategy of Cybersecurity of Ukraine 2016, the project of the new Strategy of Cybersecurity of Ukraine 2021–2025, the Counter-Terrorism Concept of the Ukraine 2019 and the Action Plan of the implementation of the Counter-Terrorism Concept of the Ukraine.\u0000It is noted that realization of the terrorist threat in the information sphere may be turned out by : the socially dangerous activity in cyberspace for terrorist purpose; armed forces` activity in interaction with organized crime groups with the using of the means of terrorism as a reveal of hybrid war; using the modern information and communication technologies for conducting terrorist acts by the intrusion to the automated control systems of the technological processes in the critical infrastructure facilities; implementation of acts of cyberterrorism in relation to the information infrastructure; using the cyberspace by the terrorist organizations and for the terrorism` financing; conducting the acts of cyber terrorism against information infrastructure.\u0000On the nationwide level it is fixed the priority objects of the terrorist cyberattacks (nuclear power facilities, power supply management systems, storages of strategic types of raw materials, water supply systems, chemical and biological objects).","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122176491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信