scholarly journals USE OF OPEN SOURCES OF INFORMATION IN THE INTERESTS OF INTELLIGENCE AND ENSURING INFORMATION SECURITY

MEST Journal ◽  
2021 ◽  
Vol 9 (1) ◽  
pp. 37-45
Author(s):  
Olena Ivanenko

The study of the experience of using open sources of information in the interests of intelligence-by-intelligence services studied the methodology and organization of the use of open sources of information in the interests of intelligence and information security of the country. Methods of collecting, analyzing, and processing information are considered, sources for information use are clarified. Information security is an integral part of national security and is closely linked to open-source intelligence. Nowadays, this type of intelligence is relevant because sometimes the ability to obtain intelligence through closed sources is significantly limited. The information obtained in this way should be carefully checked and analyzed, compared with the information obtained through intelligence and vice versa. The considered advantages of open sources of information are that the risk of failure of the agent is excluded or considerable means and efforts for the search of such are saved. The information provided by the World Wide Web is truly inexhaustible. In total, more than two-thirds of the intelligence obtained is obtained through open sources of information. The studied methods of working with information obtained from open sources have shown that analytical intelligence is a component of intelligence activities, which consists of identifying, evaluating, forecasting various political, economic, and social processes, events, activities based on information, mostly obtained from open sources, extracted by an exploration of other types (agency, technical).

Author(s):  
John K. Hope

The purpose of this chapter is to examine the past two decades of technology use in adult education with the intention of providing a critical lens with which to view future technological trends in adult education. The article begins with a brief summary of technological trends, such as the introduction of the Internet and the World Wide Web, that have influenced adult education over the past two decades. Political, economic, social, and pedagogical issues that have influenced the use of technology in adult education are also discussed and possible solutions to these issues are outlined. The article concludes with an attempt to extrapolate future technological trends that could influence the direction of adult education in the decade to come.


Author(s):  
Sergio Flesca ◽  
Fillippo Furfaro ◽  
Sergio Greco ◽  
Ester Zumpano

The World Wide Web is of strategic importance as a global repository for information and a means of communicating and sharing knowledge. Its explosive growth has caused deep changes in all the aspects of human life, has been a driving force for the development of modern applications (e.g., Web portals, digital libraries, wrapper generators, etc.), and has greatly simplified the access to existing sources of information, ranging from traditional DBMS to semi-structured Web repositories. The adoption by the WWW consortium (W3C) of XML (eXtensible Markup Language) as the new standard for information exchange among Web applications has led researchers to investigate classical problems in the new environment of repositories containing large amounts of data in XML format.


1999 ◽  
Vol 9 (3) ◽  
pp. 451-454
Author(s):  
M.P. Garber ◽  
K. Bondari

Results of a national survey indicated that the top four sources of information used by garden writers for new or appropriate plants were nursery catalogs, botanical and public gardens, seed company catalogs, and gardening magazines. More than 50% of the participating garden writers reportedly used these four sources a lot. The most frequently used books and magazines were Horticulture Magazine (34.6%), Manual of Woody Landscape Plants (24.1%), and Fine Gardening (23.7%). About 29% of the garden writers used the World Wide Web to source information and the two most widely used type of sites were universities and botanical gardens and arboreta. A high percentage of garden writers desire greater or more frequent communications with botanical gardens and arboreta (90.4%), university personnel (87.4%), and plant producers (86.3%).


Author(s):  
Ana María Carrillo

This chapter deals with the development and production of vaccines in Mexico from the last third of the nineteenth century to 1989, when the erosion of this sector began. Along with discussing Mexican’s physicians’ reception of discoveries in microbiology and immunology, it points out the existence of a network of relationships between Mexican institutions and others around the world. The chapter shows that vaccine development and production did not follow a constant ascendant path, but that it also suffered declines and regressions. It describes the field’s achievements and limitations, and reveals its relationships with the political, economic, and social conditions of the country in different historical moments. Finally, it evaluates the importance of attaining national self-sufficiency in vaccine development and production for the building of the state in pre- and post-revolutionary Mexico, and seeks to provide some answers to the questions of how and why the erosion of this strategic field occurred.


Author(s):  
John K. Hope

The purpose of this article is to provide a critical review of the past two decades of technology use in adult education. The article begins with a brief summary of technological trends, such as the introduction of the Internet and the World Wide Web, that have influenced adult education over the past two decades. Political, economic, social, and pedagogical issues that have influenced the use of technology in adult education are also discussed and possible solutions to these issues are outlined. The article concludes with an attempt to extrapolate future technological trends that could influence the direction of adult education in the decade to come.


2021 ◽  
Vol 21 (4) ◽  
pp. 34-52
Author(s):  
Agidi Ejime Pally

Nigeria as a nation has been experiencing security challenges at alarming level in the last few years. This has taken various forms such as kidnapping from ransom, herders and farmers clashes, organized crimes, and cybercrimes, implosive movement of small and light arms. Trans border crimes, human trafficking, and slavery among others. This has affected Nigeria’s external relations with the outside world negatively in various ways, such as constriction of bilateral trade volume, cold diplomatic relations, low tourism attraction, low educational exchang e, reduction of military trainings abroad, refusal of arms purchase, low foreign investments among others. The diversity nature of the Nigerian state stands a gap in finding solutions to the myriads of problems as Nigeria’s image abroad has been dented badly. Restructuring the Nigerian state in various spheres has been the agitation of many Nigerians in the recent time. This paper therefore examines restructuring the Nigerian state, National security and its implications on her relationship with the external world. It is a qualitative paper that focused on secondary sources of information, and adopted structural functional theory as its framework of analysis. The paper argued that restructuring the political structures in Nigeria will advance quality security in Nigeria. It is the opinion of the paper that improves security in the country will enhance robust Nigerian’s relationship with the external world. The paper recommended among others, the restructuring of political economic and social structures through the instrument and legitimacy of national conference. This has to be backed by legislations from the national and state assembly. Keywords: Restructuring, External Relationships, National Security, Political Structure, National Conference


2009 ◽  
pp. 2129-2139 ◽  
Author(s):  
Yücel Saygin ◽  
Dilek Hakkani-Tür ◽  
Gökhan Tür

Information security and privacy in the context of the World Wide Web (WWW) are important issues that are still being investigated. However, most of the present research is dealing with access control and authentication-based trust. Especially with the popularity of WWW as one of the largest information sources, privacy of individuals is now as important as the security of information. In this chapter, our focus is text, which is probably the most frequently seen data type in the WWW. Our aim is to highlight the possible threats to privacy that exist due to the availability of document repositories and sophisticated tools to browse and analyze these documents. We first identify possible threats to privacy in document repositories. We then discuss a measure for privacy in documents with some possible solutions to avoid or, at least, alleviate these threats.


2006 ◽  
pp. 133-148 ◽  
Author(s):  
Yücel Saygin ◽  
Dilek Hakkini-Tur ◽  
Gökhan Tur

Information security and privacy in the context of the World Wide Web (WWW) are important issues that are still being investigated. However, most of the present research is dealing with access control and authentication-based trust. Especially with the popularity of WWW as one of the largest information sources, privacy of individuals is now as important as the security of information. In this chapter, our focus is text, which is probably the most frequently seen data type in the WWW. Our aim is to highlight the possible threats to privacy that exist due to the availability of document repositories and sophisticated tools to browseand analyze these documents. We first identify possible threats to privacy in document repositories. We then discuss a measure for privacy in documents with some possible solutions to avoid or, at least, alleviate these threats.


2018 ◽  
Vol 1 (XVIII) ◽  
pp. 301-334
Author(s):  
Andrzej Świątkowski

The purpose of this report is to explain is to present collective labour law in the broad political, economic, social and legal context. Although this analysis deals with strikes in Poland between the Great Wars, socialist Poland and the current third Polish Republic this study tries to explain an importance of statutory regulations of the right to strike as well as the right to organize strikes both in the capitalist system (1918-1939), at the beginning of the last decade of social Poland (1981-1989) and after the both political and economic changes had been introduced (since June 1989 until now). The Author must admit, though, he did not try to identify labour law as a political subject rather than a really legal one. He was under the obligation imposed by the German-Israeli leading team of the world wide research network to provide the most comprehensive respondes to the questions posed.


Author(s):  
S. A. Zaporozhets

The article is devoted to the study of information security of Ukraine in the conditions of hybrid war, confrontation of hybrid threats from the Russian Federation, as well as priority directions for the effective provision of information security in our country. The analysis of this problem shows that the current state of Ukraine's information security system is characterized by an increase in existing threats, and on the other hand by the emergence of new challenges. Technological innovation processes, information breakthroughs, globalization of the world and tendencies of regional integration, along with providing enormous opportunities for the country's progressive development, have many negative consequences. One of the consequences has been the intensification of hybrid warfare between world countries, including against Ukraine. States' capacity to conduct information and information-psychological operations, to increase the sensitivity of society to the death of civilians and to the loss of military personnel in military conflicts are increasing. In the current conditions of globalization, the technological basis of which is the global information and telecommunication networks and a single information space, there is a tendency to change the principles and methods of management, including in military affairs. The ability of information to influence people's worldview and moods gives them the opportunity to gain an advantage over an adversary without engaging in a forceful confrontation with him. In fact, the correct method of working with information has become a new way of conducting an armed struggle, namely a hybrid war. In this regard, the leading countries of the world are undergoing a gradual transformation of approaches to the formulation of military policy of the state, which are practically embodied in ensuring the information security of the state in the conditions of hybrid war. The full-scale information war of Russia against our state has demonstrated the importance of ensuring information security as one of the main components of national security. In view of the above, the state and military authorities of the country were tasked with developing effective measures to neutralize the negative information impact of the Russian Federation and counteract its further deployment. The article also analyzes well-known approaches to improving the effectiveness of state response to national security threats in the information sphere in the context of the current armed conflict in eastern Ukraine. It is established that in order to achieve the appropriate level of information security it is necessary to create a single state mechanism for ensuring information security. A method for solving problems arising in this field is proposed.


Sign in / Sign up

Export Citation Format

Share Document