scholarly journals Problems of providing protection of cyber space from the activities of terrorist organizations.

2021 ◽  
pp. 148-154
Author(s):  
I. OZERCHUK

The problems of ensuring the protection of cyberspace from the activities of terrorist organizations have been studied. The existing definitions of terrorism in cyberspace in the legal literature are considered. There is an analysis of legislative acts in the field of counter-terrorism, among which the Cyber ​​Security Strategy of Ukraine and the Concept of Counter-Terrorism stand out. The article covers main tendencies of development of activity of the international terrorist organizations with use of information technologies, main tasks of which are reduced to: propaganda of terrorism, including with use of the Internet; recruiting and training new members; obtaining information about the objects of possible terrorist attacks; ensuring terrorist activities; distribution of instructional materials for the manufacture of explosive devices. On the basis of the analysis of innovations of the anti-terrorist legislation of the EU countries the ways of improvement of counteraction of activity of the terrorist organizations in cyberspace are offered.

2012 ◽  
pp. 352-375
Author(s):  
Gilbert Ramsay

Over the last few years, it has often been suggested that use of the Internet for a variety of terrorist purposes constitutes a serious threat, and requires action of some kind at the international level. This chapter begins by examining the threat. It argues that the looseness of “terrorism” as a phenomenon – particularly as represented on the Internet – means that the problem may have been exaggerated. The issue, after all, is not in and of itself that terrorist organizations or individual “terrorists” are using the Internet, but rather, whether there is more terrorist violence happening as a result. This question is far from resolved, but there does not seem to be compelling evidence that there is. The chapter then considers the proposition that an “international problem” like terrorist use of the Internet requires an “international solution.” It provides the observation that this formula assumes a symmetry between actions available to terrorist actors and states which may, in itself, make for unimaginative counter-terrorism policy. It then considers whether there is a residue of issues arising from terrorist use of the Internet which can genuinely not be countered at a local level, and which are not already relevant to existing international counter-terrorism provisions. Given the serious changes action here would imply for Internet governance, and the uncertainty of the gains that would be delivered in terms of security, there is probably not good reason yet for drastic international action against specifically terrorist misuse of the Internet.


Author(s):  
Victor Merkuryev ◽  
Oksana Khlopkova ◽  
Aleksandr Klementev

The development of information technologies, changes in the nature of work, transformation of public values lead to a spread of gamification technology and its wide use in the sphere of social management of public and business structures. The authors examine the historical aspect of the development of gamification technology and its practical application in different public sectors. Generalization of the existing data on the essence of gamification made it possible to work out its concept. The authors describe the mechanism of creating a game model and analyze approaches to its design. They are convinced that the advantages of gamification as a social technology are based on specific traits of human psychology and enable its use as a mechanism of covert manipulation. The paper presents examples of using gamification in business, state regulation, management of social processes. The research of the activities of transnational terrorist organizations became a basis for the conclusion that gamification technologies are actively used for terrorist and extremist purposes. The authors also analyze the threats of using gamification in terrorist activities, specifically, for increasing interest in such actions, recruiting new members of terrorist organizations, intensifying the activity of supporters, fundraising and committing terrorist acts. Specific attention is paid to threats of using the gamification technology on the territory of the Russian Federation. The counteraction to the use of gamification technology for terrorist and extremist goals becomes a context for analyzing the normative legal acts of the Russian Federation, including the Complex Plan of Counteracting the Ideology of Terrorism in the Russian Federation in 2019-2023. The authors present a complex of measures aimed at counteracting the use of gamification technology for terrorist and extremist purposes.


Author(s):  
Serhii Cherniavskyi ◽  
Viktoria Babanina ◽  
Oleksandr Mykytchyk ◽  
Liudmyla Mostepaniuk

The article is dedicated to the study of the measures used to combat cybercrime in different countries. It is observed that the world's leading countries are actively expanding and creating units in the armed forces and intelligence services that should ensure the development of offensive capabilities in cyberspace. In particular, the operational cooperation of law enforcement agencies, such as Interpol, Europol and Eurojust, in the fight against cybercrime is being stepped up. Anti-cybercrime activities are carried out not only by individual states, but also by their blocs, including NATO. In Ukraine, unlike the developed countries of the world, measures to combat cybercrime are less developed. Despite the existence of special laws and strategies, in particular the Cyber Security Strategy of Ukraine, the fight against cybercrime is not effective due to the declarative nature of most of the provisions of this strategy. It is concluded that one of the problematic aspects of the phenomenon of cybercrime is the low level of education in information technologies of the population of Ukraine.


Author(s):  
A. Mel'nikova

Globalization has increased the breadth of coverage of the audience of modern mass media, which is used by terrorists, increasing the scale and demonstrative cruelty of terrorist actions, conducting them with the expectation of maximum publicity. Analysis of the specifics of modern media reveals a shift in emphasis from the beautiful to the shocking, ugly, frightening. At the same time, the situation when the mass media make the culture of murder and violence an integral part of the mass consciousness, leads to the fact that information about terrorist acts becomes for the media not so much frightening or terrifying as a desirable object that raises the rating. In addition to the use of media resources to intimidate, intimidate the population, the article also examines the use of the Internet to create a new image of a terrorist as a fighter for faith and freedom, as well as the use of social networks to recruit new members of terrorist organizations. The last two areas are related to a new phenomenon - the fusion of terrorism with the Internet, this phenomenon is called “electronic Jihad”or “ cyberjihad”.


2018 ◽  
Vol 22 (2) ◽  
pp. 353-356
Author(s):  
V.P. Kovalchuk ◽  
I.M. Kovalenko ◽  
S.V. Kovalenko ◽  
V.M. Burkot ◽  
V.O. Kovalenko

Innovations change the world in all spheres of life, and education is not an exception. Modern requirements of time put us new challenges that require the use of new information technologies at all stages of the educational process in higher education institutions, in particular the use of the Internet. In addition, it has been noted that Internet resources increase motivation and contribute to the formation of a fully developed personality. Testing and evaluating students' knowledge and abilities is an integral part of the credit-module system. One of the forms of evaluation of the initial level of knowledge, consolidation and improvement of assimilation of information is testing. It should be noted that in a number of countries, testing has shifted traditional forms of control — oral and written exams and interviews. However, in Ukraine, educators remain adherents of a combination of testing and classical analysis of material. It allows the most efficient distribution of the training time of a practical class, 100% control of the knowledge and the effectiveness of mastering the material of all the students of the academic group. Technical progress stimulates the search for new variants and possibilities of testing, its various variations. One of the options that can help solve this problem was a smartphone. In order to facilitate the work of the teacher at the Department of Microbiology, an online testing system with the use of smartphones was introduced. Online testing is conducted among students with Ukrainian and English language training. With the Google Forms platform, the teacher creates a form which contains the student's records and tests. Students directly from the teacher get a link to fill out an online form directly at the lesson. For testing, a database containing standard KROK-1 licensed test tasks is used. The form can contain any number of test tasks that are in arbitrary order, as well as a changed order of distractors, which makes it impossible to write off. At the same time, all students are in the same conditions: all write one option. After submitting the form, the student receives a notification that his response is recorded. Re-linking is not possible. In turn, the teacher receives a message on the result of the test in the table — the ratio of correct answers to the total number of questions, as well as options for their answers. First and foremost, questions are displayed on which students gave the largest number of incorrect answers. This allows the topic to be considered in the process of discussion of the most difficult tasks from the students perspective, and in the future it will allow more efficiently to create forms for on-line tests and to focus on these issues.


2020 ◽  
Vol 102 (913) ◽  
pp. 367-387
Author(s):  
Massimo Marelli

AbstractDigitalization and new technologies have an increasingly important role in today's humanitarian activities. As humanitarian organizations become more active in and reliant on new and digital technologies, they evolve from being simple bystanders to being fully fledged stakeholders in cyberspace, vulnerable to adverse cyber operations that could impact on their capacity to protect and assist people affected by armed conflict or other situations of violence.This shift makes it essential for humanitarian organizations to understand and properly map their resulting cyber perimeter. Humanitarian organizations can protect themselves and their activities by devising appropriate cyber strategies for the digital environment. Clearly defining the digital boundaries within which they carry out operations lays the groundwork for humanitarian organizations to develop a strategy to support and protect humanitarian action in the digital environment, channel available resources to where they are most needed, and understand the areas in which their operational dialogue and working modalities need to be adapted for cyberspace.The purpose of this article is to identify the unique problems facing international humanitarian organizations operating in cyberspace and to suggest ways to address them. More specifically, the article identifies the key elements that an international humanitarian organization should consider in developing a cyber security strategy. Throughout, the International Committee of the Red Cross and its specificities are used as an example to illustrate the problems identified and the possible ways to address them.


Author(s):  
Andreas HAGGMAN

This paper introduces readers to core concepts around cyber wargaming. Wargames can be powerful learning tools, but few wargames exist to teach players about cyber security. By way of highlighting possibilities in this space, the author has developed an original educational tabletop wargame based on the UK National Cyber Security Strategy and deployed the game to a variety of organisations to determine its pedagogic efficacy. Overall, it is found that the game was effective in generating high-engagement participation and clear learning opportunities. Furthermore, there are design lessons to be learned from existing games for those seeking to use wargames for cyber security training and education.


Sign in / Sign up

Export Citation Format

Share Document