z-logo
open-access-imgOpen Access
The Conceptual Approach to the Development of Methodologies for the Assessment of Security Environment
Author(s) -
Аnatolii Syrotenko
Publication year - 2019
Publication title -
przegląd strategiczny
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.151
H-Index - 2
eISSN - 2956-5073
pISSN - 2084-6991
DOI - 10.14746/ps.2019.1.6
Subject(s) - computer science , risk analysis (engineering) , identification (biology) , computer security , relation (database) , national security , novelty , information security , management science , business , engineering , political science , data mining , philosophy , botany , theology , law , biology
The main conceptual approaches to the development of a security environment evaluation methodology that would provide more skilled processing of information circulating in a security environment but not fixed during monitoring are considered. The method contains 14 main blocks, which carry analytical, logical, expert comparative and other procedures with the information received from the security environment in relation to destructive processes, phenomena, dangers, threats, as well as conditions in which the implementation of national interests takes place. The novelty of the procedures introduced is a comparison of facts, events detected during monitoring of global and local processes, sorting of events, facts, dangers, threats, etc., on the basis of which identification of geopolitical and other interests of other states is carried out, detection of misinformation, information coverage of various kinds of manipulations and psychological effects. The procedure of projecting events, facts, dangers, threats on the trajectory of global and local processes allows predicting the dynamics of global and local processes, providing information-time and security support for global and local processes, and assessing the risks of detected destructive phenomena and processes allows timely adjusting the parameters of the information – time and security support of global, local and other processes and make managerial decisions in the system of providing the national and military security more reasonably.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here