{"id":10486,"date":"2021-08-05T11:23:35","date_gmt":"2021-08-05T01:23:35","guid":{"rendered":"http:\/\/ihaefe.org\/?p=10486"},"modified":"2022-04-06T12:30:19","modified_gmt":"2022-04-06T02:30:19","slug":"%d0%bc%d0%be%d0%bd%d0%be%d0%b3%d1%80%d0%b0%d1%84%d0%b8%d1%8f-%d0%be%d0%b1%d0%b5%d1%81%d0%bf%d0%b5%d1%87%d0%b5%d0%bd%d0%b8%d0%b5-%d0%b1%d0%b5%d0%b7%d0%be%d0%bf%d0%b0%d1%81%d0%bd%d0%be%d1%81%d1%82","status":"publish","type":"post","link":"http:\/\/ihaefe.org\/2021\/08\/05\/%d0%bc%d0%be%d0%bd%d0%be%d0%b3%d1%80%d0%b0%d1%84%d0%b8%d1%8f-%d0%be%d0%b1%d0%b5%d1%81%d0%bf%d0%b5%d1%87%d0%b5%d0%bd%d0%b8%d0%b5-%d0%b1%d0%b5%d0%b7%d0%be%d0%bf%d0%b0%d1%81%d0%bd%d0%be%d1%81%d1%82\/","title":{"rendered":"\u041c\u043e\u043d\u043e\u0433\u0440\u0430\u0444\u0438\u044f \u00ab\u041e\u0411\u0415\u0421\u041f\u0415\u0427\u0415\u041d\u0418\u0415 \u0411\u0415\u0417\u041e\u041f\u0410\u0421\u041d\u041e\u0421\u0422\u0418 \u0421\u0428\u0410: \u0422\u0420\u0410\u041d\u0421\u0424\u041e\u0420\u041c\u0410\u0426\u0418\u042f \u0418\u041d\u0422\u0415\u0420\u041f\u0420\u0415\u0422\u0410\u0426\u0418\u0419 \u0418 \u041c\u0415\u0416\u0412\u0415\u0414\u041e\u041c\u0421\u0422\u0412\u0415\u041d\u041d\u042b\u0425 \u0412\u0417\u0410\u0418\u041c\u041e\u0414\u0415\u0419\u0421\u0422\u0412\u0418\u0419 \u0412 2009\u20132020 \u0433\u0433.\u00bb"},"content":{"rendered":"<\/p>\n<p style=\"text-align: justify;\">The posture brought to understanding that term security may be interpreted as governmental efforts to push system to a track which the government decided as an optimal and safety one for the state. This problem is researched on examples of Barack Obama\u2019s and Donald Trump\u2019s presidencies. In chapter 1 \u201cMethodological problems of security modeling\u201d different discipline\u2019s basic approaches to social phenomena modeling are analyzed. The result let to interpret security modeling as a trans-disciplinary problem which is possible to solve in a manner of borrowing and mutual adaptation of history, philosophy, political science, mathematics, physics and cybernetics several provisions. In chapter 2 \u201cElaboration of a new security provision model\u201d it let to view United States as a system consists of 16 subsystems which interact mutually in accordance with laws suggested by the system independently and used by the system to involve people in its activities. Such understanding made the view at the phenomenon as objective as possible. To reach the purpose indirect coding language had been developed. It let to translate strategies\u2019 priorities into numbers and symbols codes which take into consideration non-mathematical and non-physical nature of society and follow its existence peculiarities. This language and results of global modeling provided in 1980ths made possible to create a frame of the model and supplement it by algorithm for practical use. Chapter 3 \u201cUnited States security provision: outlines of interpretations\u2019 system\u201d opens practical part of the research. Here investigation brought to invention of three self-generated control mechanisms which let US system to be both stable and innovative one. Also, phenomenon of methacontrol had been isolated. System generated it to control lower levels control mechanisms. Chapter 4 \u201cStructure and transformations of priorities\u201d is devoted to more complicated control mechanisms derived from the structure of strategies and priorities adopted by a government. The ones bring any subsystem to its place suggested by executive power vision and establish interconnections among subsystems. Most of the control mechanisms are grouped into complexes. Also, phenomenon of relation as a control one is isolated. Possibility of a control mechanism to connect different levels (metha)control mechanisms and to control them is called relation. In chapter 5 \u201cSpecifics of U.S. dynamics and bifurcation mechanisms\u201d U.S. historical dynamical time of late 20th \u2013 early 21st centuries general posture is drawn. It is understood as a combination of cyclical, directed and irregular temporal processes. The character of dynamics, mutual interaction and context of political parties\u2019 roles establish six bifurcation mechanisms which are understood as ones of further vector of development choosing by the system, but the frame of the alternatives doesn\u2019t mean the system break or collapse. On the contrary, the mechanisms let United States to remain a system with highly adaptive potential. Chapter 6 \u201cNon-Identified priorities: its place and role in system of interpretations\u201d is devoted to non-identified priorities which are difficult to mark with any subsystem code because of too general definition, its geographical character and content of other related documents. Such priorities establish additional interconnections among strategies, stress importance of any subsystem, serve for political continuity from one president to another. This investigation let to reconstruct networks of U.S. security interpretations and related interagency interaction for Barack Obama\u2019s and Donald Trump\u2019s terms in chapter 7 \u201cNetworks of structural ties and interagency interaction\u201d. It let to isolate that common understanding of security had been divided into three clusters (economic, military and civil-humanitarian) for period of 2009\u20132016. So, trade, military, civil and humanitarian fields had been the pillars of B. Obama\u2019s overall security strategy of the United States. In 2015\u20132016 under influence of the military overall US strategy disintegrated and 44th president didn\u2019t manage to establish a new one in the same manner. Unlike his predecessor D. Trump built integrated system of US security interpretations and set technology development as its core. In chapter 8 \u201cUnited States security provision: interpretations and interactions system in temporal context\u201d Barack Obama\u2019s and Donald Trump\u2019s policies are presented as peculiar phenomena of a common field. Also, structure of strategies adopted in 2014\u20132015 let to isolate that B. Obama\u2019s policy in last two years of his presidential term contributed to D. Trump\u2019s victory. Their presidential terms had been connected by temporal historical processes, and by factors of US civilization. Chapter 9 \u201cIndirect coding: sense of experiment and language application prospects\u201d is devoted to the model practical application in field of political analysis and international relations, its new potential interdisciplinary ties are suggested. Also, it includes some indirect coding language improvements for several practical purposes related to fields of regional studies, regional development, domestic and foreign policy, international relations. The monograph is supplemented by new terms glossary, tables, pictures and coding map.<\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/new.ihaefe.org\/wp-content\/uploads\/2021\/08\/Boldyrev_United-States-Security-Provision-1.pdf\">Overview<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/new.ihaefe.org\/wp-content\/uploads\/2019\/09\/boldyrev.pdf\"><strong>Boldyrev, Vitalii E.<\/strong><\/a><\/p>\n<p>email:\u00a0\u00a0<a href=\"mailto:boldyrev89@list.ru\">boldyrev89@list.ru<\/a><\/p>\n<p><a href=\"http:\/\/new.ihaefe.org\/wp-content\/uploads\/2021\/08\/DSC07363-11.jpg\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-10492\" title=\"DSC07363 (1)\" src=\"http:\/\/new.ihaefe.org\/wp-content\/uploads\/2021\/08\/DSC07363-11.jpg\" alt=\"\" width=\"600\" height=\"789\" srcset=\"http:\/\/ihaefe.org\/wp-content\/uploads\/2021\/08\/DSC07363-11.jpg 600w, http:\/\/ihaefe.org\/wp-content\/uploads\/2021\/08\/DSC07363-11-228x300.jpg 228w, http:\/\/ihaefe.org\/wp-content\/uploads\/2021\/08\/DSC07363-11-46x60.jpg 46w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The posture brought to understanding that term security may be interpreted as governmental efforts to push system to a track which the government decided as &hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","ngg_post_thumbnail":0},"categories":[10],"tags":[],"_links":{"self":[{"href":"http:\/\/ihaefe.org\/wp-json\/wp\/v2\/posts\/10486"}],"collection":[{"href":"http:\/\/ihaefe.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/ihaefe.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/ihaefe.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/ihaefe.org\/wp-json\/wp\/v2\/comments?post=10486"}],"version-history":[{"count":2,"href":"http:\/\/ihaefe.org\/wp-json\/wp\/v2\/posts\/10486\/revisions"}],"predecessor-version":[{"id":11867,"href":"http:\/\/ihaefe.org\/wp-json\/wp\/v2\/posts\/10486\/revisions\/11867"}],"wp:attachment":[{"href":"http:\/\/ihaefe.org\/wp-json\/wp\/v2\/media?parent=10486"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/ihaefe.org\/wp-json\/wp\/v2\/categories?post=10486"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/ihaefe.org\/wp-json\/wp\/v2\/tags?post=10486"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}