Scientific Journal of KubSAU

Polythematic online scientific journal
of Kuban State Agrarian University
ISSN 1990-4665
AGRIS logo UlrichsWeb logo DOAJ logo

Name

Shilovich Oleg Borisovich

Scholastic degree

Academic rank

Honorary rank

Organization, job position

Krasnodar office of the Rostov State Transport University
   

Web site url

Email


Articles count: 2

Sort by: Date Title Views
160 kb

HUMAN CAPITAL DEVELOPMENT AND NATIONAL WEALTH GROWTH

abstract 0951401069 issue 95 pp. 1191 – 1202 30.01.2014 ru 1617
We observe such conceptions as “national wealth”, “human capital”, possible directions of its growth and also administration of its development
491 kb

IT SABOTAGE IN THE CORPORATE SPHERE

abstract 1161602086 issue 116 pp. 1350 – 1361 29.02.2016 ru 770
Nine out of ten acts of sabotage are committed by people one way or another associated with information technologies. According to experts at InfoWatch, developer of systems to protect confidential information from insiders, the reason for this profession lies in the psychological characteristics of these employees. Reading more will allow understanding the problem with a couple of examples from the life that most powerfully illustrate typical traits of professionals in the information environment. And, although the first teller did not hide his name, the second one decided to remain anonymous. Deep psychological background of the act of sabotage often leads to the fact that a disgruntled employee threatens boss or colleagues, for example, by e-mail. Sometimes he even shares his thoughts with someone from colleagues. In other words, not only the attacker knows the information about the upcoming sabotage. Analysts estimate that other people know 31% of information about the plans of a saboteur. Of these, 64% are colleagues, 21% with friends 14% — family members and another 14% were accomplices. It was also determined that 62% of corporate saboteurs think through their actions beforehand. In 47% of cases, they commit preparatory acts (e.g., theft of confidential data backups). 27% — design and test of the future mechanism of the attack (preparing a logic bomb on the corporate network, additional hidden system entries, etc). In 37% of cases the activity of employees can be noted: of this amount, 67% of preparatory actions visible online 11% offline and 22% both
.