A model of cyberspace information security hazards and information and psychological objects at the Russian Federation
Annotation
The problem of validity of the use of intuitive methods discussed clear the minds of the twentieth century. Today’s demands on security in cyberspace force researchers to use a more finely honed tool. Information and psiholochicheskie processes in cyberspace, are predetermined by age, country and microcultures to which we belong, so we can not consider their moral judgment as a reflection of something absolute. The rules of operating with the polar concepts in cyberspace can also be independent of the individual or the culture of pre-defined view of the world. Our intuition helps us with the reflexive algebra to study the phenomenon infokonflikta thinking in cyberspace.
Keywords
Постоянный URL
Articles in current issue
- Modification of the shortest path search algorithms in the transport network telecommunication system of geoinformation transmission
- Development of landscape models with a high level of detail for large areas
- The program for analyze of seismic activity in question of studding active breaks with South Yakut seismic zone for example
- Информационная безопасность системы поддержки принятия решения
- Visualization of landscape models with a high level of detail for large areas
- Method of distribution of basic geoinformation In the telecommunications system between the management level in the organization of the elimination emergencies
- Algorithms of centralized control over the situation in the network with the help of noise-like waveforms
- Working with big data
- Control of the workbench consisting of six stages and aimed at processing of information related to parameters el navigational testing ground for calibration of navigational and geoinformation systems and complexes in laboratory conditions
- Mathematical medal of access to FMC-services considering to uniform distribution of traffic load between access networks and subscriber and subscriber migration
- Optimization of the solution of FEM linear algebraic systems
- Comparison of algorithms for resources distribution of access networks
- Impulse control flyby spacecraft
- The integrated servelance and orientation space television system
- Basic evolution trends of a macro-level model of information and telecommunication systems
- Evolution trims of information security end telecommunication systems
- Integral assessment of security of information and telecommunication systems
- Software technology evolution trends and information security hazards