Method of Information and Timing Support of Global, Local Socio-Political and other Processes in the Contemporary Security Environment

TitleMethod of Information and Timing Support of Global, Local Socio-Political and other Processes in the Contemporary Security Environment
Publication TypeJournal Article
Year of Publication2020
AuthorsBohdanovych, VYu., Syrotenko, АM, Pievtsov, HV, Dovhan, OD, Dublian, OV
Short TitleSci. innov.
DOI10.15407/scine16.02.094
Volume16
Issue2
SectionThe World of Innovations
Pagination94-99
LanguageEnglish
Abstract
Introduction. The information monitoring technologies in the security environment (SE), which are currently implemented in practical activity of the security and defense sector, are capable of detecting only hazards, threats, and some other destructive phenomena and factors that make it difficult to implement preventive measures to respond to the forecasted changes in SE.
Problem Statement. It is also very important to monitor the global and local processes, strategies of the leading states, trends in the development of the situation in certain regions in order to timely identify the threats, to assess their character, level, scale, and to forecast their dynamics and risks for defining areas of national security in the case of its implementation.
Purpose. The development of the method for information and timing support of global, local socio-political, and other processes in the contemporary security environment.
Materials and Methods. The method of information and timing support of global, local, and other processes (hereinafter referred to as “the Method”) uses a set of analytical, logical, and other procedures with information obtained during the SE evaluation regarding destructive phenomena, events, threats, and conditions under which the national interests are realized within given time.
Results. The established procedures provide the comparison of the facts and events detected during the monitoring of SE, with global and local processes taken into account, which enables identifying the geopolitical and other interests and intentions of other states, determining measures for information deception, information cover, various kinds of manipulations and psychological effect, and making managerial decisions in the system of ensuring national security on a timely basis.
Conclusions. The proposed method enables raising the efficiency of the implementation of the national interests, as it improves the information and analytical maintenance of the system of national security assurance. In particular, it makes it possible to identify the links between the active and covert actions of individual centers of power, neighboring states and competitors, and to provide sound recommendations on responses, in order to reduce risks in the key areas of national security to the military and political leadership of the state.
Keywordsglobal processes, information and timing support, local processes, national security, security environment, threat
References
1. The Decree of the President of Ukraine «On the decision of the National Security and Defense Council of Ukraine “On the Concept of Development of the Security and Defense Sector of Ukraine”» of 04.03.2016 no. 92/2016. 
URL: http://zakon.rada.gov.ua./laws/show/92/2016 (Last accessed: 09.12.2019).
2. Bohdanovych, V. Yu., Romanchenko, I. S., Svyda, I. Yu., Syrotenko, A. M. (2019). Methodology of integrated use of military and non-military forces and means of the security and defense sector for counteracting modern threats to military security of Ukraine. Lviv [in Ukrainian].
3. The Decree of the President of Ukraine «On the decision of the National Security and Defense Council of Ukraine “On the Strategy of National Security of Ukraine”» of 06.05.2015 on. 287/2015. 
URL: http://zakon.rada.gov.ua./laws/show/287/2015 (Last accessed: 09.12.2019).
4. Bohdanovych, V. Yu., Syrotenko, A. M., Pryma, A. M., Vovchanskyi, V. I. (2019). New “labyrinths” of security environment and their influence on the provision of military security of the state. Science and Technology of the Air Force of Ukraine, 2(35), 9–15 [in Ukrainian].
5. Bohdanovych, V.Yu., Svuda, I. Yu., Skulish Ye. D. (2012). Theoretical and methodological bases for ensuring the national security of Ukraine. Vol. 4: Military security of Ukraine and ways of its provision. Kyiv  [in Ukrainian].
6. Bohdanovych, V. Yu., Svyda, I. Yu., Skulish Ye. D. (2012). Theoretical and methodological bases of ensuring national security of Ukraine: monohraph: 7 t. Vol. 1: Theoretical foundations, methods and technologies of ensuring national security of Ukraine. Kyiv  [in Ukrainian].
7. Method Ischikawa Chart. 1952.
URL: http: // www. inventech.ru/pub/methods/metod-0019 (Last accessed: 02.12.2019).