STUDY OF CONNECTIVITY OF CONSTRAINTS OF SOCIAL AND INFORMATIONAL SECURITY USING GOOGLE TRENDS AND AHREFS
Main Article Content
Abstract
Introduction. Despite the tendency to increase the number and intensity of threats to social security, the clarity of the meanings of this concept among the population remains rather blurred. This blurriness is aggravated by any attempt to interpret the notion of social security in different languages.
There are two approaches to social security. The first reflects social security as a neutralization of threats to society, and, since most authors consider this approach, it can be conventionally called "traditional". Followers of the second approach, by contrast, hold the view that the threat can go from the side of society. Such an approach can be conventionally called "alternative".
These approaches, in the opinion of the author, can be applied to the information security of the state and come to the conclusion that the state should be protected informally not only from the outside (from foreign states), but also from the inside (from the citizens themselves), based on the same threats, which is based on social security, which is even more important at the time of the hybrid and information warfare. Therefore, the hypothesis of cohesion, mutual influence and interdependence of concepts of social and informational security was put forward and tested. Google Trends and Ahrefs are used as research tools.
Purpose. The purpose and objectives of the paper are to publicize the results of the study of the interdependence of the diverse concepts of social and information security using Google Trends and Ahrefs.
Methods. Analysis, synthesis, statistical methods.
Results. Based on the analysis of queries using the Google Trends service to the Google search engine, you can draw the following conclusions: all terms are high-frequency; all three explored terms are in one way or another interconnected, whatever the various spheres they would touch; the term social security (public security) and the term social security (social protection) are not contiguous terms; the term social security (public security) and the term social security (social protection) are interlinked through the term of informational security.
Originality. The essence of the concept of "social security" is multifactorial, so the interpretation of the meanings of this concept, firstly, depends largely on the clarity of articulation and verbal formulation. Despite the tendency to increase the number and intensity of threats to social security, the clarity of the meanings of this concept among the population remains rather blurred. This blurriness is aggravated in any attempt to interpret the notion of social security in different languages. The concept of information security is the closest popularity to social security. Therefore, the hypothesis of cohesion, mutual influence and interdependence of concepts of social and informational security was put forward and tested. Google Trends and Ahrefs are used as research tools.
Conclusion. Based on the data obtained, the study of social security is relevant. At the same time, the term information security more correlates with the term social security than social protection based on the indicators analyzed by the Google Trends and Ahrefs tools. Consequently, the prospect of further scientific research should consist of carrying out a content analysis of the study of the interdependence of the terms social and information security.Article Details
The authors published in this journal agree with following conditions:
1. The authors reserve to themselves the right to the authorship of their works and transfer the right of their first publication to the journal on the terms of Creatіve Common Attrіbutіon Lіcense which allows to freely extend to other persons the published work with an obligatory reference to the authors of the original work and its first publication in this journal.
2. The authors have the right to complete independent additional agreements concerning the not exclusive distribution of their work in the form in which it was published in this journal (for example, to place the work in the electronic storehouse of an establishment or to publish as a monograph component), under the condition of the preservation of the reference to the first publication of the work in this journal.
3. The journal’s policy allows and encourage the authors to place their manuscripts into the Internet (for example, in depositories of establishments or on personal web-sites) either before submitting of the manuscript for publication or during its editorial processing as it assists the occurrence of a productive scientific discussion and positively affects the efficiency and dynamics of citing of the published work.
AGREEMENT
ABOUT TRANSMISSION OF COPYRIGHT
I, the author of the article / We, the authors of the manuscript _______________________________________________________________________
in case of its acceptance for publication, we transfer the following rights to the founders and editorial boards of the scientific publication "BULLETIN OF THE CHERKASY BOHDAN KHMELNYTSKY NATIONAL UNIVERSITY. ECONOMIC SCIENCES. SERIES "ECONOMIC SCIENCES":
1. Publication of this article in Ukrainian (English, Russian, Polish) and distribution of its printed version.
2. Dissemination of the electronic version of the article through any electronic means (placing on the official journal web site, in electronic databases, repositories, etc.).
At the same time we reserve the right without consent of the editorial board and the founders:
1. Use the materials of the article in whole or in part for educational purposes.
2. To use the materials of the article in whole or in part for writing your own theses.
3. Use article materials to prepare abstracts, conference reports, and oral presentations.
4. Post electronic copies of the article (including the final electronic version downloaded from the journal's official website) to:
a. personal web-pecypcax of all authors (web sites, web pages, blogs, etc.);
b. web-pecypcax of the institutions where the authors work (including electronic institutional repositories);
with. non-profit, open-source web-pecypcax (such as arXiv.org).
With this agreement, we also certify that the submitted manuscript meets the following criteria:
1. Does not contain calls for violence, incitement of racial or ethnic enmity, which are disturbing, threatening, shameful, libelous, cruel, indecent, vulgar, etc.
2. Does not infringe the copyrights and intellectual property rights of others or organizations; contains all the references to the cited authors and / or publications envisaged by applicable copyright law, as well as the results and facts used in the article by other authors or organizations.
3. It has not been previously published in other publishers and has not been published in other publications.
4. Does not include materials that are not subject to publication in the open press, in accordance with applicable law.
____________________ ___________________
First name, Last name, signature of the author
"___" __________ 20__
References
Romak V.A., Lagun A.E, Garasim Yu. R. and others (2015) Audit of information security. Lviv: Spolom, 363 p.
Ilyash O.I. (2010) Essential-typological characteristics of the social security of the region. Ekonomichnyy chasopys-KHKHI, 9-10, 12 - 16.
Aristova I.V., Sulyatsky D.V. (2013) Information security of a person as a consumer of telecommunication services. K. : Pravo Ukrayiny, 184 p.
Kormich B. A. (2004) Information Security: Organizational and Legal Foundations: K .: Condor, 384 p.
Methodology of calculation of indicators of social security [Electronic resource]. – Аccess mode : http://ipzn.org.ua/metodologiya-rozrahunkiv-pokaznykiv-sotsialnoyi-bezpeky/.
Moiseenko I.P. (2013) Social security of the regions of Ukraine and directions of change [Electronic resource] Efektyvna ekonomika, 1. - Access mode: http://nbuv.gov.ua/UJRN/efek_2013_1_5.
Kharchenko B. C. (2005) Information Security. Glossary. K .: КНТ, 264 p.
Tsimbalyuk B.C. (2001) Problems of State Information Policy: Harmonization of International and National Information Law. Pravove, normatyvne ta metrolohichne zabezpechennya systemy zakhystu informatsiyi v Ukrayini. K.: NTUU «KPI», 4.
Hansen F. and Oleshchuk V.A. (2005) Conformance Checking of RBAC Policy and its Implementation, The First Information Security Practice and Experience Conference, ISPEC 2005, Singapore, LNCS Volume 3439, p. 144-155.