STUDY OF APPLIED ASPECTS OF CONFLICT THEORY IN SECURITY SYSTEMS

Author:

Shevchenko Svitlana1ORCID,Skladannyi Pavlo1ORCID,Nehodenko Olena2ORCID,Nehodenko Vitalii1ORCID

Affiliation:

1. Borys Grinchenko Kyiv University

2. State University of Telecommunication

Abstract

The problem of conflicts and conflict situations has always been in the center of attention of scientists, first of all, sociologists. However, the current state of these theories includes a large number of currents in various fields of knowledge. We meet them in history, philosophy, psychology, jurisprudence, biology, medicine, pedagogy, cultural studies, economics, military affairs, technical systems, in particular in security and cyber security systems. In addition, there are attempts to apply a mathematical apparatus for modeling and solving certain issues in the decision-making process. This determines the relevance of this study, which is devoted to the analysis of ways of introducing the theoretical foundations of the theory of conflicts into the information security system. The article analyzes the views of scientists regarding the application of conflict theory in various sciences and disciplines. A review of literary sources in the context of the theory of conflicts in information systems was carried out, the definition of "information conflict" and its characteristics were highlighted. It is justified to carry out research through the interaction of the planes of the theory of conflict theory and the theory of information and cybernetic security in three perspectives: "subject - subject" or "person - person"; "subject - object" or "man - machine"; "object - object" or "machine - machine". To determine the main characteristics of conflicts in security systems, the general structure and stages of conflicts were highlighted. The structure of conflicts in security systems includes the definition of boundaries; state and activity variables; causal relationships and feedback; several interconnected subsystems; conflict delay (or conflict resolution). The following stages are distinguished in the dynamics of the conflict: emergence of a conflict situation; latent stage; active stage; stage of ending the conflict. In the process of conflict management in information security, the opportunity to apply analytical methods is outlined: differential equations, decision-making theory, operations research, and game theory. This study is an introduction to the theory of conflicts in security systems and can be used in the educational process of students of the specialty 125 Cybersecurity.

Publisher

Borys Grinchenko Kyiv University

Subject

General Medicine

Reference40 articles.

1. Gallo, G. (2012). Conflict Theory, Complexity and Systems Approach. Systems Research and Behavioral Science, 30(2), 156–175. https://doi.org/10.1002/sres.2132

2. Chykryi, A. A. (1992). Konflyktno-upravliaemыe protsessы. Naukova dumka.

3. Druzhynyn, V.V., Kontorov, D.S. (1982). Konflyktnaia radyolokatsyia (Opыt systemnoho yssledovanyia). Radyo y sviaz.

4. Parshutkyn, A. V. (2014). Kontseptualnaia model vzaymodeistvyia konflyktuiushchykh ynformatsyonnыkh y telekommunykatsyonnыkh system. Voprosы kyberbezopasnosty, 5(8), 2-6.

5. Makarenko, S. Y., Mykhailov, R. L. (2016). Ynformatsyonnыe konflyktы – analyz rabot y metodolohyy yssledovanyia. Systemы upravlenyia, sviazy y bezopasnosty, 3, 95–178. https://doi.org/10.24411/2410-9916-2016-10304.

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3