scholarly journals The legal basis for the prohibition and restriction of the use of the Internet in the system of the Ministry of Internal Affairs and the Armed Forces of Russia: a comparative analysis

2020 ◽  
Author(s):  
S.YU. CHimarov
2020 ◽  
Vol 3 (8) ◽  
pp. 6-14
Author(s):  
Valentīns Buls ◽  
Oļegs Ignatjevs

In the view of modern tendencies, the cooperation between state armed institutions is extremely crucial. As an example could be mentioned the reaction of French government on the terrorist attack in Paris in the year 2015 – both, army and police, in close cooperation made a contribution solving this challenge. In the scale of Latvia the cooperation between National Armed Forces and State Border Guard could solve such problems like lack of personnel and equipment in State Border Guard. The aim of the current paper is to give insight in such themes as legal basis of the mentioned cooperation, the possibilities of involving National Armed Forces personnel in border surveillance, the possibilities of National Armed Forces personnel’s training in the field of border surveillance and possibilities for development of such training and make short summary in these topics. This was done by methods of analysis, open source research and comparative analysis. Among other conclusions, authors of the current paper draw a conclusion that cooperation between National Armed Forces and State Border Guard is effective but the possibilities of National Armed Forces personnel’s training should be improved in the way mentioned in the paper.


JOURNAL ASRO ◽  
2019 ◽  
Vol 10 (2) ◽  
pp. 105
Author(s):  
Khairul Huda ◽  
Zaenal Syahlan ◽  
M Syaifi ◽  
Edy Widodo

The development of information technology also developed in line with thedevelopment of human civilization. The development of information technology is veryhelpful, one of which is the internet. The use of the internet has developed into anappropriate means to convey information that is fast, effective and accurate. Submissionof information is not limited to all soldiers and the general public by utilizing technologicalfacilities, namely websites. In conveying the history of Indonesia Warship Raden EddyMartadinata 331 and Indonesia Warship I Gusti Ngurah Rai 332 are still stored in the formof documents on a computer and are still printed in the form of sheets of paper. Inconveying the history of Indonesia Warship, it must be developed further to conveyinformation in the current era. Historical research that executive focuses on the past. Sofar, information on the Indonesia Warship Indonesia Warship's historical informationsystem Raden Eddy Martadinata - 331 and Indonesia Warship I Gusti Ngurah Rai - 332on the web-based Indonesian Armed Forces fleet are still in print. besides usinginformation books, then try to make other alternatives by creating a website, besides thatmembers are expected to access information easily and efficiently. With theineffectiveness in managing Indonesia Warship Indonesia Warship historical data RadenEddy Martadinata - 331 and Indonesia Warship I Gusti Ngurah Rai - 332, a design of theIndonesia Warship historical information system was built in the web-based IndonesianArmada fleet which aims to facilitate the process of Indonesia Warship history search.PHP as a programmer and MySQL as the database.Keywords: Website-Based Indonesia Warship History Information System. PHP MySQL.


Author(s):  
Ayan Chatterjee ◽  
Mahendra Rong

The communication through wireless medium is very popular to the developed society. More specifically, the use of the internet as well as the use of social networking sites is increasing. Therefore, information security is an important factor during wireless communication. Three major components of it are confidentiality, integrity, and availability of information among authorized users. Integrity level is maintained through various digital authentication schemes. Fuzzy logic is an important soft computing tool that increases the digital watermarking system in various ways. In this chapter, different popular and high secured watermarking schemes using fuzzy logic are analyzed with their mathematical and experimental efficiency. A comparative analysis is developed here with corresponding different parameters.


Author(s):  
Pushkar Aneja

With the growing use of the Internet, and more people being connected with it, the security of the data becomes a major concern. It is necessary that the data can only be accessed by the intended receiver and no person in the middle makes alterations to it. This is achieved by encryption of the data using cryptography. This paper presents a comparative analysis of RSA (Rivest-Shamir-Adleman), Caesar Cipher and Playfair Cipher cryptographic techniques. This paper also presents a comparative analysis of Symmetric Key Cryptography and Asymmetric Key Cryptography. Also, this paper includes the basic working of the above-mentioned techniques along with their implementation in C language over Visual Studio Code 1.49.3.


2021 ◽  
Vol 6 ◽  
pp. 68-73
Author(s):  
Svetlana I. Dolgova ◽  

The article analyzes the legal basis and considers certain aspects of the organization of the activities of the internal affairs bodies of the CIS member states to counteract the involvement of minors in destructive groups on the Internet.


2017 ◽  
Vol 55 (6) ◽  
pp. 1731-1756 ◽  
Author(s):  
R.V. Gundur

Current and ex-gang members are hard-to-reach populations for research purposes. To date, researchers have resorted to embedding themselves long-term or recruiting individuals of interest within a target community. Typically, such studies provide a great deal of empirical depth but not necessarily empirical breadth given their lack of comparative analysis and generalizability. Moreover, they often rely on snowballing or chain referral methods that depend on the networks of the recruited seeds. This article explores the use of the Internet to recruit such individuals for face-to-face interviews. This strategy has been employed in settings outside criminology to good effect. This article shows that the online recruitment of current and ex-gang members not only reduces the time necessary to develop contacts but also allows researchers to triangulate data by encountering a diverse array of respondents.


2020 ◽  
pp. 27-37
Author(s):  
Dragana Ćamilović

The use of the Internet, and particularly social networks, has changed the way people inform themselves about potential tourist destinations today. People are often browsing the Internet to find inspiration for their next trip. A nice photograph or a video posted on a Facebook page, for example, can motivate them to further explore the destination and become interested in visiting it. Since local tourist organizations in Serbia play an important role in promoting and supporting tourism on a local level, they need to use the marketing potential of social networks to its fullest. This paper provides an overview of the most commonly used social networking services and the benefits of their use. It also sheds light on the use of Facebook by the local tourist organizations of popular Serbian destinations. The author has investigated Facebook pages of five Serbian local tourist organizations and conducted a comparative analysis according to the number of their fans (i.e., total page likes), total page likes growth comparing to the previous week, the number of their posts in the observed week, and the engagement rates of their fans (in the observed week).


Sign in / Sign up

Export Citation Format

Share Document