The urgency of the article is conditioned by the problem of serious information threats spreading connected with the global Internet network. The authors emphasize that young people are most affected by cyber-extremism, as this social group, although an active user, is not trained consciously and critically to perceive and process the information flow that is on the Internet. The purpose of the article is to develop mechanisms for University students' readiness formation to counteract cybercrime activities. The authors present in the paper methodological, organizational and pedagogical mechanisms of students' readiness formation to counteract cyber-extremist activity. The complex of pedagogical conditions is developed: identification of cas...
The article is devoted to the problem of counteraction of the ideology of terrorism and extremism in...
This article demonstrates the importance of the aspects of social life which include prevention and ...
In the article there are explored the concepts of cybersecurity and information security. It is prov...
The urgency of the article is conditioned by the problem of serious information threats spreading co...
The article covers the issue of preparedness for preventing cyber threats from future managers of or...
The article discusses the problems of cyber-security of participants of the educational process, emp...
The relevance of the study is due to the need for a comprehensive scientific study of the nature, sp...
The paper aims to explore the behavior of Russian school-age children who are faced with a new socia...
The article analyses the problems that appear in the process of protecting the educational instituti...
AbstractIn the latest years a spectacular growth of hacking cracking activity is going one. In many ...
In the present article key questions of counteraction to the extremist activity at the present stage...
Development of information society of XXI century brought, apart from many welcomed and positive con...
The article deals with the actual problem of information security of adolescents, which is revealed ...
This thesis deals with the prevention of cyberbullying at selected elementary school XY. Four object...
This paper focuses on an important element of human safety, as it describes cyberspace as an environ...
The article is devoted to the problem of counteraction of the ideology of terrorism and extremism in...
This article demonstrates the importance of the aspects of social life which include prevention and ...
In the article there are explored the concepts of cybersecurity and information security. It is prov...
The urgency of the article is conditioned by the problem of serious information threats spreading co...
The article covers the issue of preparedness for preventing cyber threats from future managers of or...
The article discusses the problems of cyber-security of participants of the educational process, emp...
The relevance of the study is due to the need for a comprehensive scientific study of the nature, sp...
The paper aims to explore the behavior of Russian school-age children who are faced with a new socia...
The article analyses the problems that appear in the process of protecting the educational instituti...
AbstractIn the latest years a spectacular growth of hacking cracking activity is going one. In many ...
In the present article key questions of counteraction to the extremist activity at the present stage...
Development of information society of XXI century brought, apart from many welcomed and positive con...
The article deals with the actual problem of information security of adolescents, which is revealed ...
This thesis deals with the prevention of cyberbullying at selected elementary school XY. Four object...
This paper focuses on an important element of human safety, as it describes cyberspace as an environ...
The article is devoted to the problem of counteraction of the ideology of terrorism and extremism in...
This article demonstrates the importance of the aspects of social life which include prevention and ...
In the article there are explored the concepts of cybersecurity and information security. It is prov...