Leading directions of development of communicative activity of leaders of public administration bodies. Mechanisms of creating their image. Creation of an information space that will contribute to the formation of a positive image of the government.
- 572. Information and communication mechanisms of the influence on social connection: axiological aspect
Analysis of information and communication mechanisms of influence on social consciousness. Consideration of the role of taboos, which are understood as a manifestation of social and communicative pathology. Protective barriers and "moral immunity".
Characteristics of information and communication technologies. History of the creation of a computer system. Classification operating system: DOS, Windows, Unix, Linux, Mac OS. Databases management systems: the concept, characteristics, architecture.
Study of the possibility of information and communication technologies. The essence of activating involuntary attention, increasing motivation to study, expanding the possibilities of working with visual aids, contributing to the achievement of set goal.
Performing work using state-of-the-art communication technologies. Advantages of the possibility to work at home or telework. The employment contract to perform work in specified working hours. Work and its interference into employee's family life.
The problem of self-development of a pedagogical employee of a general secondary education institution. An overview of the teacher's self-development model in the context of informal education цшер using information and communication technologies.
Role of information and communication technologies in teaching foreign languages. Using modern applications to improve effectiveness of teaching foreign languages. Using ICT in secondary schools and its impact on training information technology teachers.
The purpose of the work is to research and study innovations, information and communication technologies, as an important aspect of contemporary historical and socio-communicative studies, as well as the development of library and archival affairs.
Review digital communication and traditional computer-based technologies. The European Telecommunications Standards Institute. Computer and network hardware and software. Features of use of information and communication technologies in modern society.
Aspects of the application of information and computer technologies in educational processes to assess their effectiveness in European universities. Requirements of European educational standards that affect the structure and methods of teaching.
Modern requirements for the athlete in game sports. The search for effective means and methods of teaching basketball. Creation of a computer system for accounting and analysis of training loads. Control over the level of physical fitness of the players.
In the scientific article, the author analyzed the time of illegal crossing of the Polish-Czechoslovak border by Ukrainians, the forms of participation of volunteers in the life of Carpathian Ukraine, and the number of people killed in confrontations.
The purpose of the this paper is to highlight the development of information- psychological warfare, its history, concepts, technologies and methods, which are one of the most important areas of work in the field of modern international relations.
The features of using information as a weapon in modern society. As of today, information legal relations are rapidly developing, which is due to scientific progress, the use of innovative technologies and the emergence of new information resources.
- 585. Information competence formation in international medical students: motivation-targetive criterion
Determination of indicators of the level of information competence, which include cognitive interest in information activity, attitude to the acquisition of competence. Awareness of the need for lifelong learning, the desire to perceive new information.
Modern library activity as information engineering. Sorting, systematization, protection, promotion and use of information in the classical library. Introduction of modern information technologies for the formation, storage and use of library funds.
The relevance of the study is determined by the high risks of legalization of funds and financing of terrorism in the Ukrainian economy and the risks of conducting financial transactions related to states that carry out armed aggression against Ukraine.
The basis for effects of electromagnetic radiation on microorganisms. Specific effects on microorganisms by the Apparatus "KSK-BARS". The treatment of participants in space missions as an to antibacterial and antiviral therapy by non-pharmaceutic means.
- 589. Information Hiding
Steganographic communication with quantum information. Software integrity checking expressions for robust tamper detection. Exposing digital forgeries through specular highlights on the eye. Imaging sensor noise as digital X-ray for revealing forgeries.
Goals and characteristics of the areas of cognitive linguistics. Analysis of the interaction of the information subsystem of the language with other communication systems of the environment. Language unit as a type of information and virtual objects.
Theory and implementation on automatic adaptive metadata generation for image retrieval. Query optimisation as part of distribution design for complex value databases. Conceptual modelling and problem solving techniques for complex narrative events.
The use firewalls to create a demilitarized zone to protect the servers from unauthorized access. The versions of creation of virtual private networks that can combine some geographically distant networks in one network using global information space.
The role of intermediaries in search the information of private. Revealed to uninformed parties. Strategic manipulation of certification. The choice a monopoly intermediary. Capture a large share of the surplus. The competition among intermediaries.
The importance and role of information security in the context of ensuring the national security of the state. Analysis of the main threats to information security, such as cyber attacks, consideration of strategic approaches to their neutralization.
The structure of an information security program. Creation and implementation of policies and standards. Activity of federal sentencing guidelines for criminal convictions. System and network access control. Conducting a business impact analysis.
Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.
The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.
The tasks of information provision of public authorities. Role in securing the state apparatus of information management for the adoption and resolution of state, local and district current issues. Legal and informational aspects of the indicated issues.
Crypto applications of combinatorial group theory. Generating rooted trees of nodes uniformly at random. Designs, strongly regular graphs and codes constructed from some primitive groups. Quantum jump codes and some related combinatorial designs.
Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.