The article discusses the relevance of China's center of power within the framework of social and political changes of the contemporary world. It is stated that China's economic and military build-up is a factor of social and political changes in the international arena. Among the factors affecting political and economic changes in political system of the PRC, the article notes the influence of traditionalism and soft power. Confucian values inherent in China's management culture, involve ideological influence over Chinese form of government, which is connected with the CPC dictatorship. The article reveals the growing influence of China on global economic and political processes.
The article is relevant, since it provides an assessment of anti-corruption policy as a political process at the regional and local levels. Purpose of the article: to identify the stages of the political process on anti-corruption policy focused on the prevention of the negative consequences of corruption. The levels of the political process, as substantiated in the article, are associated with the development of socio-economic and political differences between regions. The identification of these levels is the scientific novelty of this study. In the modern period, there is a crisis of international relations, globalization and the strengthening of national trends, including in the dynamics of the development of political processes. The fight against terrorism, the COVID-19 epidemic, environmental problems, and anti-corruption policies are not united in a global perspective, but “disintegrate” into national apartments and become problems of individual countries, not the entire modern community. This is the specificity of the political process at the global and national levels. The article is devoted to the problems of managing economic security, and combating corruption of the Ministry of Internal Affairs of the Russian Federation for the Transbaikal Region (hereinafter UEBiPK UMVD of Russia for the Transbaikal Region), further which is part of the police. This organization is an operational subdivision that carries out, within its competence, operational-search activities directed against crimes in relation to state power, the interests of the civil service and service in local government bodies. The specificity of the activities of the UEBiPK UMVD of Russia for the Transbaikal Region is the identification and documentation of economic, corruption malfeasance, as well as the implementation of operational support for anti-corruption policy. Anti-corruption policy as a political process in the Transbaikal Region is unstable, taking into account the cross-border specifics and has four levels: detection, response, prevention and evaluation of effectiveness. This conclusion is a scientific achievement of the authors. In addition, the author analyzes the political stability that is necessary for the implementation of the anti-corruption policy of the Transbaikal Region. The main thrust of this policy is economic crimes committed using information and communication technologies. The article describes the effectiveness of anti-corruption policy in the Transbaikal Territory
The article is relevant, as it provides an assessment of the information security of universities. Ensuring the security of corporate information, which is increasingly stored, processed and disseminated using information and communication technologies (ICT). This is a particularly important problem for knowledge-intensive organizations such as universal ones; the effective conduct of their main educational activities and research activities increasingly depends on the availability, integrity and accuracy of computer information resources. One of the more important mechanisms to reduce the number of security breaches, and thus corporate information, is the development and implementation of a formal information security policy (ISP). Although much has now been written about the importance and role of information security policies and approaches to formulating them, there is relatively little empirical material that is incorporated into the structure or content of security policies. The purpose of the article is to fill this gap in the literature through this method of using the structure and methods of authentic information security policies. Having established the parameters and key features of university policies, the article critically examines the concept of information security embedded in the policy. Two important conclusions can be drawn from this study: 1) the wide variety of disparate policies and standards used, whether there will be a consistent approach to security management; and 2) the range of specific issues explicitly covered by university policy, a surprisingly low and highly technocentric view of information security management. This article is one of the first to objectively, rigorously and independently assess the content of authentic information security policies and information security documentation frameworks in a well-organized organizational environment. The article notes that there are four different levels of information policy: “system security policy, product security policy, community security policy, and corporate information security policy.” All policies involve: personal use of information systems, information disclosure, physical security, breaches and hacks, viruses, system access control, mobile computing, internet access, software development, encryption and contingency planning
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.