Applying of Information Technologies as an Alternative to Large-Scale Changes of Civil Procedural Legislation Aimed at Increasing the Efficiency of Civil Procedure and Optimizing the Judicial Caseload

2018 ◽  
Vol 1 (8) ◽  
pp. 51-59
Author(s):  
E.S. Smagina ◽  
Lex Russica ◽  
2019 ◽  
pp. 179-188
Author(s):  
D. Kh. Valeev ◽  
N. N. Makolkin

The journal «Herald of Civil Procedure» annually gathers outstanding scholars and practitioners in the field of civil procedure in Kazan. Within the 5 years, the Symposium of the journal has become a real tradition, gained annual participants, friends and listeners, as well as created a platform for large-scale discussion at the highest level. The first and each subsequent symposia are very similar to each other, but every year there is something new, a kind of highlight, giving the event a uniqueness and impetus to move forward, develop, and improve the level.The first Symposium was held in the Spring of 2014, its theme was designated as «The Evolution of the civil process: issues of comparative law and national law». The second Symposium, held in 2015, was devoted to the reform of the civil process and its current state. The 2016 Symposium, the third in a row, was named «Kazan arbitration day: development of the rule of law and regional problems». The fourth Symposium of the journal «Herald of Civil Procedure» was named the «Electronic justice and information technologies in civil proceedings» and was held on September 29, 2017.In 2018 the V Annual Symposium of the journal was devoted not only to civil procedure, but also to some aspects of substantive law, as it was devoted to the issues of evidentiary law, which made it possible to invite academics and legal practitioners, as well as experts in the field of evidence and establishment of evidence to participate in the event. A striking contribution to the Symposium was the participation of academics-representatives of various law schools of Russia, practicing lawyers, representatives of the judicial community, as well as academics of Kazan University.


Author(s):  
Mykola Ryzhkov ◽  
Anastasiia Siabro

Achievements in the sphere of automatization and telecommunication are an essential component of transformation of the international peace and security system. This article presents, that consequences of changes are of a dual character. On the one hand, new technologies are becoming an important component of society modernization strategies in developing countries, on the other hand, they can be used for armament modernization or creation of new means of confrontation in modern international relations. APR countries face the most relevant issue of information technologies usage. The article deals with the process of discussion of new challenges and threats to international security, emerging as a result of development and large-scale implementation of information-communication technologies. Positions of states regarding the adoption of resolution in the sphere of international information security were studied through examples of Japan, India, and China. It is proved in the article, that information technologies have become an important component of the security system in the world. Technologies usage may lead to steady international development as well as to information arms race. That is why working out a common position on international information security issues is of crucial importance. It is within the framework of the UN, that different states of the world are given an opportunity to express their visions of the problem of international information security and work out common approaches to its solution. The article shows, that states’ positions have similar as well as different features. For instance, all states express concern regarding possible limitation of technology transfer for the establishment of a more controlled international political environment. But states’ positions have major differences as to mechanisms of information security provision. Thus, Japan and India strive to achieve a balanced system of international information security, which should at the same time have preventive mechanisms against the emergence of threats in the information and science and technology spheres and guarantee continuation of scientific-technological development, which is a crucial component of development and modernization strategies in many countries of the world. China came forward with position of strong regulation of international information security issues and suggested framing of corresponding regulations of the states’ conduct in the cyberspace.


Author(s):  
Do Lin'

This article examines the basis of legal regulation and Internet censorship in China. The genesis, development and relevant regulatory basis of legal regulation of Internet in China is examined. The author comes to the conclusion that on the one hand, Internet in China is subject to tight control due to the rapid development of technologies of observation and increase of police access to user data. Currently, China is one of the leaders in engineering and export of automated instruments for monitoring social networks. The citizens face restrictions based on the control of login accounts that give access to the Internet; blockchain apps and their developers are also subject to control and must provide registration of real names of the users; international corporations, such as Apple, Microsoft, Linkedin, are forced to bend to the demands of Chinese authorities and help to determine and punish the users who do not adhere to the censorship requirements in China. On the other hand, Chinese government makes everything possible for the large scale implementation of information technologies into socioeconomic life of the country, namely industrial and commercial sectors. Usage of internet in the sphere of sociopolitical life restricted, since China justifiably sees a threat to political stability and social security of the country.


2018 ◽  
Vol 50 ◽  
pp. 01186
Author(s):  
Ivan Evdokimov ◽  
Halina Danilava ◽  
Tatiana Yamskikh ◽  
Roman Tsarev

The purpose of this research in educational environment is to improve the quality of the educational process with the help of new information technologies. The paper examines practical issues of digital ecosystems implementation in education on the basis of relational databases, as, from the authors’ point of view, in the organization data are less subject to change in time than business processes. Therefore the strategy of information systems development where the database functions as a cornerstone provides the result, that is more stable than, for example, a functional approach in software development. Within the frames of this research information technologies of quality control in education are being created. They are intended for the exact and full representation of teaching materials as a system used as a source of information for the assessment of learning and teaching materials and creation of electronic resources on this platform. The structure of the created database, operation practices and topical issues of its introduction in more large-scale digital ecosystems are considered. As a result the database ready for use as a management solution for higher education institutions is created. This is important as information technologies provide additional opportunities for the development in the sphere of higher education, quality improvement of the educational process. The authors conclude that introduction of innovative information technologies in management system of higher education institution is relevant and perspective.


2006 ◽  
Vol 15 (01) ◽  
pp. 11-15
Author(s):  
J. L. Talmon

SummaryTo raise awareness for actions that are urgently needed to accompany the large scale implementations of ICT in Health Care that are currently taking place in many countries around the world.An analysis of a few studies that have recently been described in the literature guided by recent suggestions for research and development of evaluation of health ICT.Six specific recommendations for action are specified:Development of good implementation practice,Development of an experience base of implementation of ICT in health care,Setting up a surveillance system for unintended effects,Build an evidence base of best evaluation practice,Developing guidelines for proper reporting of evaluation studies,Education of clinicians and decision makers.


All the large scale and medium scale companies have the anticipation of obtaining long term benefits perhaps of short term financial losses, probable breakdown as well. For that Enterprise Information Technologies (EIT) put into service by many large scale and medium scale companies in an increasing number in the expectation of achieving long term benefits. EIT is a very costly and risky asset of Information Technology and the assessment is done based on the increase in the production and the reinforcement of corporate restructure through the business integration process. To work out this, we propose Analytical Network Process (ANP) to handle distinguished assessment of associated set of evident, critical and operational attributes. To illustrate the stability and the consequential administrative significance, we perform analyzes and carry out experiments with real-world data.


2020 ◽  
Vol 5 ◽  
pp. 141-149
Author(s):  
Andrei Șestacov

Information technologies have already radically transformed the communications and information technology sectors, trade, media, and the education sector, especially education, which is on the top priority. Digital technologies will radically change the way data is sent and retrieved, will allow immediate and real-time feedback from students, will facilitate access to education through distance learning, will allow new service providers to enter traditional markets education. Thus, a diligent and well planned implementation of cyber security, as well as information security of information networks of educational institutions will provide a definite competitive advantage in the information environment. In the context of a dynamic information environment prone to large-scale cyber-attacks, in which cybercriminals are using increasingly advanced methods to implement attack vectors that are undetectable and difficult to neutralize, this scientific study is designed to protect data and security of your institutions as well as to ensure the confidentiality of your students and teachers. Whether we are talking about large or small educational institutions, this study provides a series of recommendations on the secure use of social networks with a minimum set of measures needed to prevent cyber-attacks as well as reduce the damage caused in case of attacks. At the same time, it will examine the best practices in the online environment, effectively analyze the privacy settings of mobile devices and present some top tips for the secure use of social networks. The study aims to comply with the following minimum set of measures in order to prevent cyber-attacks in educational institutions, and reduce the damage caused in the event of attacks. Cyber-bezpieczeństwo w obszarze edukacji Technologie informacyjne radykalnie przekształciły sektory komunikacji, handlu, mediów i edukacji. Technologie cyfrowe zmienią sposób przesyłania i wyszukiwania danych, umożliwią natychmiastową informację zwrotną od uczniów w czasie rzeczywistym oraz ułatwiają dostęp do edukacji poprzez kształcenie na odległość. Zatem rzetelne i dobrze zaplanowane wdrożenie cyberbezpieczeństwa, a także bezpieczeństwa informacyjnego sieci informacyjnych placówek oświatowych zapewni zdecydowaną przewagę konkurencyjną w środowisku informacyjnym. Artykuł ma na celu przedstawienie środków zapobiegawczych przeciw cyberatakom w placówkach edukacyjnych i ograniczania szkód wyrządzanych w przypadku takich ataków.


Sign in / Sign up

Export Citation Format

Share Document