Methods hybrid war of Russia against Ukraine. Areas counter
DOI:
https://doi.org/10.20535/2411-1031.2015.3.1.57709Abstract
Disclosed methods of aggression by the Russian Federation in Ukraine in the context of a full-scale «hybrid war». Considered and analysed trends to counter these threats. The findings show proposals for the development of common approaches to areas of combating «hybrid threats».
Key words: hybrid war, aggression, information security, information and psychological impact.
References
Chernysh, V. (2014), What is happening in eastern Ukraine. Once again about terminology [Shcho vidbuvaietsia na Skhodi Ukrainy. Shche raz pro terminolohiiu], available at : http://osvita.mediasapiens.ua/media_law/law/scho_vidbuvaetsya_na_skhodi_ukraini_sche_raz_pro_terminologiyu (accessed 22 February 2015).
Kravchenko, V. (2015), Psychological aspects of Russian “hybrid war” in Ukraine [Psykholohichni aspekty «hibrydnoi viiny» Rosii v Ukraini], available at : https://www.academia.edu/7229745 (accessed 27 February 2015).
Hubarev, V. A., Kozyratskyi, Yu. L. (1997), Features of modeling a complex coalition conflict in the face of opposition [Osobennosti modelirovaniia slozhnogo koalitcionnogo konflikta v usloviiakh protivodeistviia], Radiotekhnika, No 6, pp. 9-14.
Kilcullen, D. (2011), The Accidental Guerrilla: Fighting Small Wars in the Midst of a Big One, Oxford University Press, Oxford, 384 p., ISBN 978-0199754090.
Petryk, V. M., Kuzmenko, A. M., Ostroukhov V. V. and other (2007), Social and Legal Principles of Information Security : tutorial [Sotsialno-pravovi osnovy informatsiinoi bezpeky : navch. posib.], Rosava, Kiev, 496 p., ISBN 966-96-220-5-0.
Slittchenko, V. I. (2002), War of the sixth generation: weapons and military art of the future [Voiny shestogo pokoleniia: oruzhie i voennoe iskusstvo budushchego], Veche, Moskow, 384 p.
Khoffman, F. (2013), Hybrid threat [Gibridnye ugrozy], available at : https://www.academia.edu/7229745 (accessed 05 March 2015).
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 Collection "Information technology and security"
This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors that are published in this collection, agree to the following terms:
- The authors reserve the right to authorship of their work and pass the collection right of first publication this work is licensed under the Creative Commons Attribution License, which allows others to freely distribute the published work with the obligatory reference to the authors of the original work and the first publication of the work in this collection.
- The authors have the right to conclude an agreement on exclusive distribution of the work in the form in which it was published this anthology (for example, to place the work in a digital repository institution or to publish in the structure of the monograph), provided that references to the first publication of the work in this collection.
- Policy of the journal allows and encourages the placement of authors on the Internet (for example, in storage facilities or on personal web sites) the manuscript of the work, prior to the submission of the manuscript to the editor, and during its editorial processing, as it contributes to productive scientific discussion and positive effect on the efficiency and dynamics of citations of published work (see The Effect of Open Access).