Methodology for Informational Base Preparation for Development of Preventive Measures and Threat to National Security Manageability
Abstract
These days, threats to national security are multiplicative. Effective responses to such threats require high-quality informational base, which is achieved through description, analysis and assessment of threats using appropriate methodology. Various approaches and methods for analyzing and assessing threats to national security are currently being applied in science and practice. General methods that do not allow comprehensive description and formation of a full picture of the threat are often proposed, or methods used only in one and not applicable to other spheres of social relations. The aim of this article is to develop unified, universal methodology for describing, analyzing and assessing threats to national security. The result of the study is Check-list, which allows to describe and assess the threat, as well as to determine the list and content of measures to be taken by public authorities in accordance with their functional purpose.
References
[2] Amanov, Zh.K., Salimgerey, A.A., and Nhrtleu, M.N. 2019. Essential properties of national interests, their classification. KazNU after Al-Farabi Journal, Legal Series, 3(91): 33-42.
[3] Borodushko, V.I. 2013. National security problems research from the perspective of risk theory. News of the Saint-Petersburg State Economic University, 3(81): 57-64.
[4] Dzhabarov, Sh.Y., Matkurbonov, D.M., and Rakhmonov, B.I. 2016. Methods of assessing information security of telecommunication networks. Young Scientist, 20: 141-144.
[5] Fleming, B. 2011. The Hybrid Threat Concept: Contemporary War, Military Planning and the Advent of Unrestricted Operational Art. School of Advanced Military Studies.
[6] Given, L.M. (Ed.). 2008. The SAGE Encyclopedia of Qualitative Research Methods. SAGE Publication.
[7] Gorodetskiy, A.Y. 2018. About evidence-based approaches to formation of the national risk management system of economic security. Concept of a Federal Risk Management System in the Field of Economic Security. Collection of Materials of the All-Russian Symposium ‘Strategic Management Problems’, 20 February, in Moscow, Russian Federation.
[8] Hoffman, F.G. 2007. Conflict in the 21 Century: The Rise of Hybrid Wars. Potomac Institute for Policy Studies.
[9] Kolios, A., and Read, G. 2013. A political, economic, social, technology, legal and environmental (PESTLE) approach for risk identification of the tidal industry in the United Kingdom. Available at: www.mdpi.com/journal/energies
[10] Melnikov, V.P., S.A. Kleimenov, S.A., and Petrakov, A.M. 2008. Information Security and Information Protection. Akademiya.
[11] Prokhozhev, A.A. 2005. General Theory of National Security. RAGS.
[12] Vorobyev, Y.L. 2013. National security and strategic risk management in Russia. Civil Defense Strategy: Problems and Researches, 2: 95-104.
[13] Willis, H.H., et al. 2018. Homeland Security National Risk Characterization. Risk Assessment Methodology. RAND Corporation.
[14] Wilson, B. 2005. Five-by-Five Whys. Available at: http://www.bill-wilson.net/b73
[15] Yergaziev, B.B., Bazarov, Y.T., and Smailova, U.Y. 2019. National security threat model. KazNU after Al-Farabi Journal, Legal Series, 3(91): 11-22.
[16] International Conference on Sustainable Manufacturing & Operations Management (ISOM). 2013. June 26-28. Available at: https://issuu.com/giapindia/docs/isom_2013_proceedings__giap_journal
[17] International Standard ISO 31000. Risk Management – Manual. Risk management – Guidelines. 2018. Available at: https://webstore.ansi.org/Standards/ISO/ISO310002018?gclid=EAIaIQobChMIjen82Lbi5wIVg 8Cy Ch3xVw8FEAMYASAAEgI7K_D_BwE
[18] Method ‘5w2h’. 2016. Available at: https://www.heflo.com/blog/action-plan/5w2h-method/
[19] National Standard of the Russian Federation GOST RF ISO/IEC 31010 – 2011. Risk Management. Risk Assessment Methods ISO/IEC 31010:2009 Risk management – Risk assessment techniques (IDT). 2012. Standard inform, Federal Agency for Technical Regulation and Metrology. Available at: http://docs.cntd.ru/ document/gost-r-iso-mek-31010-2011
[20] Order of the Minister of Defense and Aerospace Industry of the Republic of Kazakhstan No. 48/НҚ as of March 19, 2018 ‘About Approval of the Rules for Information Exchange for Information Security between Operational Centers for Information Security and National Coordination Center for Information Security’. 2018. Available at: https://tengrinews.kz/zakon/pravitelstvo_respubliki_kazahstan_premer_ministr_rk/hozyaystvennaya_ dey atelnost/id-V1800016886/
[21] Resolution of the Government of the Republic of Kazakhstan No. 756 as of July 2, 2014 ‘About establishment of natural and man-made emergencies classification’. 2014. Available at: https://primeminister.kz/ru/ decisions/02072014-756
[22] Resolution of the Government of the Republic of Kazakhstan No. 790 as of 29 November 2017 ‘About Approval of the State Planning System in the Republic of Kazakhstan’. 2017. Available at: http://adilet. zan.kz/rus/docs/P1700000790
[23] Risk Management Fundamentals. Homeland Security Management Doctrine. 2011. Available at: https://www.dhs.gov/sites/default/files/publications/rma-risk-management-fundamentals.pdf
[24] Decree of the President of the Republic of Kazakhstan No. 554 as of September 29, 2017 ‘About approval of the Military Doctrine of the Republic of Kazakhstan’. 2017. Available at: http://adilet.zan.kz/rus/ docs/U1700000554
The Copyright Transfer Form to ASERS Publishing (The Publisher)
This form refers to the manuscript, which an author(s) was accepted for publication and was signed by all the authors.
The undersigned Author(s) of the above-mentioned Paper here transfer any and all copyright-rights in and to The Paper to The Publisher. The Author(s) warrants that The Paper is based on their original work and that the undersigned has the power and authority to make and execute this assignment. It is the author's responsibility to obtain written permission to quote material that has been previously published in any form. The Publisher recognizes the retained rights noted below and grants to the above authors and employers for whom the work performed royalty-free permission to reuse their materials below. Authors may reuse all or portions of the above Paper in other works, excepting the publication of the paper in the same form. Authors may reproduce or authorize others to reproduce the above Paper for the Author's personal use or for internal company use, provided that the source and The Publisher copyright notice are mentioned, that the copies are not used in any way that implies The Publisher endorsement of a product or service of an employer, and that the copies are not offered for sale as such. Authors are permitted to grant third party requests for reprinting, republishing or other types of reuse. The Authors may make limited distribution of all or portions of the above Paper prior to publication if they inform The Publisher of the nature and extent of such limited distribution prior there to. Authors retain all proprietary rights in any process, procedure, or article of manufacture described in The Paper. This agreement becomes null and void if and only if the above paper is not accepted and published by The Publisher, or is with drawn by the author(s) before acceptance by the Publisher.