The article deals with the actual problem of the spread of information terrorism in the world space. Information terrorism is a new type of criminal activity. Terrorists use modern information resources, the Internet to spread the ideology of terrorism. The general scientific dialectical method and a complex of scientific methods of cognition (system-structural, formal-logical) represent the methodological basis of the research. The results reached by the authors are that in modern conditions the threat of information terrorism has become a reality. Comprehensive prevention of the threat of information terrorism must be carried out within the framework of reforming the country through the widespread automation and digitalization of all life...
The article is devoted to the legal analysis of information security as an important regulatory inst...
The article gives general characterisation of the ways in which these organizations use modern comm...
The article focuses on the destructive phenomenon of cyberterrorism as an atypical manifestation (fo...
The article examines the phenomenon of terrorism in modern conditions and current problems related t...
The article examines the phenomenon of terrorism in modern conditions and current problems related t...
Introduction. The terrorism - is a phenomenon always in dynamics,it has regularities in changes. The...
The article provides a comprehensive analysis of one of the most complex problems of our time — ter...
The article presents the opposite, but dependent on each other's reality - Revolutionary War informa...
The article presents the opposite, but dependent on each other's reality - Revolutionary War informa...
Information became the main resource of social, political, economic and scientific-technical develop...
The article is devoted to the legal analysis of information security as an important regulatory inst...
The article is devoted to the legal analysis of information security as an important regulatory inst...
International terrorism is one of the global problems of today. In recent years it has increased and...
The article is devoted to the legal analysis of information security as an important regulatory inst...
The article is devoted to the legal analysis of information security as an important regulatory inst...
The article is devoted to the legal analysis of information security as an important regulatory inst...
The article gives general characterisation of the ways in which these organizations use modern comm...
The article focuses on the destructive phenomenon of cyberterrorism as an atypical manifestation (fo...
The article examines the phenomenon of terrorism in modern conditions and current problems related t...
The article examines the phenomenon of terrorism in modern conditions and current problems related t...
Introduction. The terrorism - is a phenomenon always in dynamics,it has regularities in changes. The...
The article provides a comprehensive analysis of one of the most complex problems of our time — ter...
The article presents the opposite, but dependent on each other's reality - Revolutionary War informa...
The article presents the opposite, but dependent on each other's reality - Revolutionary War informa...
Information became the main resource of social, political, economic and scientific-technical develop...
The article is devoted to the legal analysis of information security as an important regulatory inst...
The article is devoted to the legal analysis of information security as an important regulatory inst...
International terrorism is one of the global problems of today. In recent years it has increased and...
The article is devoted to the legal analysis of information security as an important regulatory inst...
The article is devoted to the legal analysis of information security as an important regulatory inst...
The article is devoted to the legal analysis of information security as an important regulatory inst...
The article gives general characterisation of the ways in which these organizations use modern comm...
The article focuses on the destructive phenomenon of cyberterrorism as an atypical manifestation (fo...