Smart technologies and innovations in design for control of technological processes and objects: eco

Page 1


Smart Technologies and Innovations in Design for Control of Technological Processes and Objects: Economy and Production: Proceeding of the International Science and Technology Conference "FarEast■on-2018" Volume 1 Denis B. Solovev

Visit to download the full and correct content document: https://textbookfull.com/product/smart-technologies-and-innovations-in-design-for-con trol-of-technological-processes-and-objects-economy-and-production-proceeding-of-t he-international-science-and-technology-conference-fareast/

More products digital (pdf, epub, mobi) instant download maybe you interests ...

Intelligent Techniques and Applications in Science and Technology Proceedings of the First International Conference on Innovations in Modern Science and Technology Subhojit Dawn

https://textbookfull.com/product/intelligent-techniques-andapplications-in-science-and-technology-proceedings-of-the-firstinternational-conference-on-innovations-in-modern-science-andtechnology-subhojit-dawn/

Coulson and Richardson’s Chemical Engineering, Fourth Edition: Volume 3A: Chemical and Biochemical Reactors and Reaction Engineering R. Ravi

https://textbookfull.com/product/coulson-and-richardsonschemical-engineering-fourth-edition-volume-3a-chemical-andbiochemical-reactors-and-reaction-engineering-r-ravi/

Advances in Computational and Bio-Engineering: Proceeding of the International Conference on Computational and Bio Engineering, 2019, Volume 1 S. Jyothi

https://textbookfull.com/product/advances-in-computational-andbio-engineering-proceeding-of-the-international-conference-oncomputational-and-bio-engineering-2019-volume-1-s-jyothi/

International Scientific Conference Energy Management of Municipal Facilities and Sustainable Energy Technologies EMMFT 2018: Volume 1 Vera Murgul

https://textbookfull.com/product/international-scientificconference-energy-management-of-municipal-facilities-andsustainable-energy-technologies-emmft-2018-volume-1-vera-murgul/

Smart Innovations in Engineering and Technology Ryszard Klempous

https://textbookfull.com/product/smart-innovations-inengineering-and-technology-ryszard-klempous/

Proceedings of the Future Technologies Conference FTC 2018 Volume 1 Kohei Arai

https://textbookfull.com/product/proceedings-of-the-futuretechnologies-conference-ftc-2018-volume-1-kohei-arai/

Smart

Intelligent Computing and Applications

Proceedings of the Third International Conference on Smart Computing and Informatics Volume 1 Suresh Chandra Satapathy

https://textbookfull.com/product/smart-intelligent-computing-andapplications-proceedings-of-the-third-international-conferenceon-smart-computing-and-informatics-volume-1-suresh-chandrasatapathy/

Emerging Research in Electronics Computer Science and Technology Proceedings of International Conference ICERECT 2018 V. Sridhar

https://textbookfull.com/product/emerging-research-inelectronics-computer-science-and-technology-proceedings-ofinternational-conference-icerect-2018-v-sridhar/

Techno-Societal 2018 : Proceedings of the 2nd International Conference on Advanced Technologies for Societal Applications - Volume 1 Prashant M. Pawar

https://textbookfull.com/product/technosocietal-2018-proceedings-of-the-2nd-international-conference-onadvanced-technologies-for-societal-applicationsvolume-1-prashant-m-pawar/

Smart Technologies and Innovations in Design for Control of Technological Processes and Objects: Economy and Production

Proceeding of the International Science and Technology Conference “FarEastСon-2018” Volume 1

SmartInnovation,SystemsandTechnologies

Volume138

SeriesEditors

RobertJamesHowlett,BournemouthUniversityandKESInternational, Shoreham-by-sea,UK

LakhmiC.JainFacultyofEngineeringandInformationTechnology, CentreforArti ficialIntelligence,UniversityofTechnologySydney Broadway,NSW,Australia

TheSmartInnovation,SystemsandTechnologiesbookseriesencompassesthe topicsofknowledge,intelligence,innovationandsustainability.Theaimofthe seriesistomakeavailableaplatformforthepublicationofbooksonallaspectsof singleandmulti-disciplinaryresearchonthesethemesinordertomakethelatest resultsavailableinareadily-accessibleform.Volumesoninterdisciplinaryresearch combiningtwoormoreoftheseareasisparticularlysought.

Theseriescoverssystemsandparadigmsthatemployknowledgeandintelligence inabroadsense.Itsscopeissystemshavingembeddedknowledgeandintelligence, whichmaybeappliedtothesolutionofworldproblemsinindustry,theenvironment andthecommunity.Italsofocussesontheknowledge-transfermethodologiesand innovationstrategiesemployedtomakethishappeneffectively.Thecombinationof intelligentsystemstoolsandabroadrangeofapplicationsintroducesaneedfora synergyofdisciplinesfromscience,technology,businessandthehumanities.The serieswillincludeconferenceproceedings,editedcollections,monographs,handbooks,referencebooks,andotherrelevanttypesofbookinareasofscienceand technologywheresmartsystemsandtechnologiescanofferinnovativesolutions.

Highqualitycontentisanessentialfeatureforallbookproposalsacceptedforthe series.Itisexpectedthateditorsofallacceptedvolumeswillensurethat contributionsaresubjectedtoanappropriatelevelofreviewingprocessandadhere toKESqualityprinciples.

**Indexing:ThebooksofthisseriesaresubmittedtoISIProceedings, EI-Compendex,SCOPUS,GoogleScholarandSpringerlink**

Moreinformationaboutthisseriesat http://www.springer.com/series/8767

SmartTechnologies andInnovationsinDesign forControlofTechnological ProcessesandObjects: EconomyandProduction

ProceedingoftheInternationalScience andTechnologyConference “FarEastСon-2018” Volume1

FarEasternFederalUniversity(FEFU)

Vladivostok,Russia

ISSN2190-3018ISSN2190-3026(electronic)

SmartInnovation,SystemsandTechnologies

ISBN978-3-030-15576-6ISBN978-3-030-15577-3(eBook) https://doi.org/10.1007/978-3-030-15577-3

LibraryofCongressControlNumber:2019934741

© SpringerNatureSwitzerlandAG2020

Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpart ofthematerialisconcerned,specificallytherightsoftranslation,reprinting,reuseofillustrations, recitation,broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,andtransmission orinformationstorageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilar methodologynowknownorhereafterdeveloped.

Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthis publicationdoesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfrom therelevantprotectivelawsandregulationsandthereforefreeforgeneraluse.

Thepublisher,theauthorsandtheeditorsaresafetoassumethattheadviceandinformationinthis bookarebelievedtobetrueandaccurateatthedateofpublication.Neitherthepublishernorthe authorsortheeditorsgiveawarranty,expressedorimplied,withrespecttothematerialcontained hereinorforanyerrorsoromissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregard tojurisdictionalclaimsinpublishedmapsandinstitutionalaffiliations.

ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland

Editorial

TheInternationalScienti ficConference “FarEastCon” tookplaceonOctober2–4, 2018,inVladivostok,RussianFederation.Theconferencewasorganizedby10 universities FarEasternFederalUniversity(FEFU,Vladivostok),North-Eastern FederalUniversity(Yakutsk),AmurStateUniversityofHumanitiesandPedagogy (Komsomolsk-on-Amur),FarEasternStateTransportUniversity(Khabarovsk), Komsomolsk-on-AmurStateTechnicalUniversity(Komsomolsk-on-Amur),Amur StateUniversity(Blagoveshchensk),VladivostokStateUniversityofEconomics andService(Vladivostok),ResearchInstituteofBuildingPhysicsandFencing ConstructionsoftheAcademyofConstructionandArchitecture(Moscow), EconomicResearchInstituteofFarEasternBranchoftheRussianAcademyof Sciences(Khabarovsk),andPaci ficNationalUniversity(Khabarovsk).

Theconferencewascarriedoutunder financialsupportoftheFarEastern FederalUniversity,theRussianFoundationforBasicResearchaswellasat informationalsupportoftheInstituteofElectricalandElectronicsEngineers (Russian(FarEastern)SubsectionofIEEE).

Theconferencerepresentsaninformationalplatformforaccumulationofexpert opiniononprojectsandinitiativesthatareaimedatimplementationoffarsighted scientificresearchanddevelopment;itallowstopresentscientificandpractical achievementstoawidecircleofresearchers.

Sectionsoftheconferenceareofinterestforthebroadrangeofexpertsinthe sphereofdevelopmentofinnovativesolutionsandorganizingeventsthatincrease theefficiencyofeconomicandinnovativeactivities.

Theinternationalprogramcommitteehasselectedsomepapersforpublishingin theSmartTechnologiesandInnovationsinDesignforControlofTechnological ProcessesandObjects:EconomyandProduction ProceedingoftheInternational ScienceandTechnologyconference “FarEastCon-2018”

FarEastConisahigh-qualityconferencewithacompetitivesubmissionprocess. Forexample,in2018,FarEastCononlyaccepted30%ofsubmittedpapers. FarEastConhasarigorousreviewingprocessthatissimilartotheprocessesusedby IEEE.Everysubmittedpaperandposterissubjectedtothisprocess.

Themaincriterionisajudgmentofthedegreetowhichthesubmittedpaper contributestosubstantialnewresearch.

Reviewersratethepaperusinga10-pointrankingscaleandprovideawritten evaluation.Thewrittenevaluationneedstosupportthereasoningbehindthe numericranking.

Afterthereviewperiod,thereisadiscussionperiod,whereallreviewerscansee theotherreviews.

Organizingcommitteewouldliketoexpressoursincereappreciationtoeverybodywhohascontributedtotheconference.Heartfeltthanksareduetoauthors, reviewers,andparticipantsandtoalltheteamoforganizersfortheirsupportand enthusiasmwhichgrantedsuccesstotheconference.

Organization

Chairperson

DenisSolovevFarEasternFederalUniversity,Russia

Co-chairpersons

ValeryPetukhovFarEasternFederalUniversity,Russia

SergeiBelyhKomsomolsk-on-AmurStateTechnical University,Russia

AleksandrGotnogaAmurStateUniversityofHumanitiesand Pedagogy,Russia

AleksandrGoryunovEconomicResearchInstituteofFarEastern BranchoftheRussianAcademyofSciences, Russia

KonstantinKrivoshapkinNorth-EasternFederalUniversityinYakutsk, Russia

SergeiKudryavcevFarEasternStateTransportUniversity,Russia

AndreyLeyfaAmurStateUniversity,Russia

Igor ’ PugachevPaci ficNationalUniversity,Russia

Igor ’ ShubinNIISFRAASN,Russia

InternationalProgramCommittee

AleksandrAgoshkovFarEasternFederalUniversity,Russia

OlegAmosovKomsomolsk-on-AmurStateTechnical University,Russia

AlexeyZhirabokFarEasternFederalUniversity,Russia

NinaZemlyanayaEconomicResearchInstituteofFarEastern BranchoftheRussianAcademyofSciences, Russia

AleksandrZinkovNIISFRAASN,Russia

KonstantinZmeuFarEasternFederalUniversity,Russia

AlexeyLevenetsPaci ficNationalUniversity,Russia

SergeyLeonovAmurStateUniversity,Russia

YuriyLikhanskiyEconomicResearchInstituteofFarEastern BranchoftheRussianAcademyofSciences, Russia

SvetlanaMakashevaFarEasternStateTransportUniversity,Russia

ValeryMakishinFarEasternFederalUniversity,Russia

YulbarskhonMansurovFarEasternFederalUniversity,Russia

AlexanderMinaevFarEasternFederalUniversity,Russia

LeonidMitnikV.I.Il’ichevPacifi cOceanologicalInstitute, Russia

ValeryMoorFarEasternFederalUniversity,Russia

SvetlanaNaidenAmurStateUniversity,Russia

PavelPinchukovFarEasternStateTransportUniversity,Russia

VladimirRimshinNIISFRAASN,Russia

KhristoRadevTechnicalUniversity,Sofi a,Bulgaria

ViktorSavaleyFarEasternFederalUniversity,Russia

NikolaySilinFarEasternFederalUniversity,Russia

LyubovStatsenkoFarEasternFederalUniversity,Russia

NikolayTereshchenkoFarEasternFederalUniversity,Russia

SergeyUgayFarEasternFederalUniversity,Russia

ViacheslavFedorovNorth-EasternFederalUniversityinYakutsk, Russia

VladimirFilaretovFarEasternFederalUniversity,Russia

IvanKhristoforovNorth-EasternFederalUniversityinYakutsk, Russia

NikitaTsimbelmanFarEasternFederalUniversity,Russia

VladimirChernenkovPaci ficNationalUniversity,Russia

NikolayShestakovKomsomolsk-on-AmurStateTechnical University,Russia

KonstantinShtymFarEasternFederalUniversity,Russia

AllaShtymFarEasternFederalUniversity,Russia

AmitKonarJadavpurUniversity,ETCEDepartment,India

ChiduralaSrinivasVaageswariCollegeofEngineering,Karimnagar, India

EmilBashkanskyORTBraudeCollegeofEngineering,Israel

ErkkiLahderantaLappeenrannanTeknillinenYliopisto,Finland

FrancoPaveseIstitutoNazionalediRicercaMetrologica,Italy

GerasimosRigatosIndustrialSystemsInstitute,Greece

JuanVelasquezUniversidaddeChile,Chile

KaraliPatraIndianInstituteofTechnologyPatna,India MattheosSantamourisUniversityofNewSouthWales(UNSW), Australia

MarinaRestaUniversità degliStudidiGenova,Italy MohsenAssadiUniversityofStavanger,Norway

MonicaCarvalhoFederalUniversityofParaíba,Brazil

NikolayNikolovInstituteofMathematicsandInformatics BulgarianAcademyofSciences,Bulgaria QinHongwuChangchunUniversity,China

LubomirDimitrovBulgarianAcademyofSciences,Bulgaria

RainerNiewaUniversitätStuttgart,Germany

RonghouLiuShanghaiJiaoTongUniversity,China RushanZiatdinovKeimyungUniversity,SouthKorea

RyszardStrzeleckiGdańskUniversityofTechnology,Poland ShakeelAhmedKingFahdUniversityofPetroleumandMinerals, SaudiArabia

Toufi cMezherKhalifaUniversityofScienceandTechnology, UnitedArabEmirates

VinhNguyenQuangVietnameseAcademyofScienceand Technology,Vietnam WananShengUniversityCollegeCork,Ireland

SvetlanaBabkinaMoscowPolytechnicUniversity,Russia

ValeriiMutinAmurStateUniversityofHumanitiesand Pedagogy,Russia

SvetlanaYaremchukEconomicResearchInstituteofFarEastern BranchoftheRussianAcademyofSciences, Russia

MohamedOmarWardDamascusUniversity,Syria RustamHamitovOmskStateTechnicalUniversity,Russia

Singapore’sCybersecurityAct2018:ANewGenerationStandard forCriticalInformationInfrastructureProtection 1 E.Gorian

ModernDevelopmentsinBehavioralEconomics 10 V.TerzievandD.Kanev

ProvisionofIntegratedEmploymentandSocialAssistanceServices inBulgaria ............................................... 24 V.Terziev

PacificArctic:TheSystem-FormingRoleofInfrastructure intheSustainableDevelopmentoftheRegion .................... 40 B.H.Krasnopolski

TaxPolicyoftheStateinOilIndustryasOneoftheFactorsEnsuring FinancialSecurityoftheRussianFederation 48 E.Gorbunova

ImportSubstitutioninAgriculture:CrisesofOverproduction, ChoiceofInstitutionalPolicy,ApplicationofBehavioralEconomics 56 N.G.Sidorova,V.S.Osipov,andA.G.Zeldner

WesternSanctionsandTheirConsequencesforRussia ............. 65 V.F.Nitsevich,V.V.Moiseev,S.N.Glagole,andO.A.Sudorgin FormationofStudentProfessionallyOrientedSkillsUsing thePotentialofNetworkInteraction ........................... 80 N.A.KuzminaandD.Workman

TheInfluenceofSchoolontheTransformationoftheFamily InstitutionofIndigenousPeoplesoftheFarEastinthe1920s–1930s 92 S.V.BobyshevandA.V.Akhmetova

TheFarEasternMensheviksandOctober1917

V.L.KuzminandYu.N.Tsipkin

CyclicalNatureofFinancialCrisesandTheirImpact ontheStockMarket

J.A.Konopleva,O.N.Pakova,andS.V.Zenchenko

FormationofRegulatoryEnvironmentforReturnedLeasingTaxation inRussianFederation .......................................

N.A.Vakutin,Y.U.Savina,andO.S.Salkova

TheStudyoftheActivitiesoftheFarEasternRevolutionary Committee(1922–1926)inRussianHistoricalScience ..............

M.A.KovalchukandL.T.Sikorskaya

BackwardLinkageValueChainsasaToolforSelectingPromising ProductionTechnologiesinKuzbassCoalIndustry

E.V.Goosen,E.S.Kagan,S.M.Nikitenko,andE.O.Pakhomova

TheMaterialandFinancialSituationoftheRussianOrthodoxChurch intheXIX-EarlyXXCenturies

I.A.Ashmarov,B.A.Ershov,R.V.Bulavin,S.N.Shkarubo, andS.L.Danilchenko

ConceptualApproachestoTerritorialStructuringStudies ofaRegion ...............................................

E.S.KoshevayaandA.A.Tushkov

Cross-CulturalDialogue:Historical-CulturalHeritage andBasicValues(ontheExampleoftheCityofMurom)

N.Romanova

T.A.Lushkina

LeadershipandManagementStyles:TypologicalApproach toPersonalResourcesofChangeManagement

V.G.Gryazeva-DobshinskayaandY.A.Dmitrieva

ModernizationoftheRussianEconomyontheBasisofResource RecyclingandEco-economicBalanceofBusiness

L.Kamenik

InnovativeApproachestoSolvingModernChallengesofWater Supply(asExemplifi edbySt.Petersburg) .......................

A.FurtatovaandL.Kamenik

MethodologicalApproachestotheInclusionofEnvironmentalFactors inHumanDevelopmentIndex 232

M.V.KuznetsovaandN.S.Ivashina

BehavioralEngineeringModeltoIdentifyRisksofLosses intheConstructionIndustry ................................. 243

V.G.BorkovskayaandD.Passmore

SustainabilityRiskManagement:TheCaseforUsingInteractive MethodologiesforTeaching,TrainingandPracticeinEnvironmental EngineeringandOtherFields ................................ 251

V.G.Borkovskaya,R.Roe,andW.Bardenwerper

TheInfluenceofaLargeFamilyontheDevelopment ofHumanCapital 261

G.Bannykh,S.Kostina,andA.Kuzmin

RegionalPeculiaritiesandDifferentiationofSocio-Economic DevelopmentoftheNorth-EastofRussia 272

T.EgorovaandA.Delakhova

MigrationfromUzbekistantoRussia:Push-PullFactorAnalysis 283

E.Bedrina,Y.Tukhtarova,andN.Neklyudova

AdaptiveArchitectureoftheEnterpriseAccounting andAnalyticalSystem ...................................... 297

V.V.Lesnyak

AlgorithmofDevelopmentofMotivationSystemofIndustrial EnterprisePersonnel ....................................... 307

N.V.Predeus,N.A.Baryshnikova,andA.L.Altukhov

TheStudyofLinkageQualityofLifeIndicatorsWithinRegional DemographicParameters 316

M.I.PlutovaandI.A.Kulkova

ReadinessofRussianRegionsforIntegratedDevelopmentofMineral Resources:QuantitativeAssessment 326

K.S.Sablin,E.S.Kagan,andE.V.Goosen

SpatialDevelopmentConceptoftheFarEastofRussia ............ 337

V.A.Andreev,M.N.Arnaut,andE.V.Sultanova

OrganizationalandFinancialProblemsofFunctioningoftheFree PortofVladivostok ........................................ 348

E.V.Konvisarova,A.A.Uksumenko,E.E.Churakov,V.A.Polonskaya, andI.S.Starovoytov

AProposedApproachinEstimatingtheProfitofCoalMines UnderFluctuatingPrices 357

N.S.Batugina,V.L.Gavrilov,andE.A.Khoiutanov

QualityoftheHumanCapitalandStateSupportofDevelopment ofRegionalInfrastructure ................................... 367

I.KapkaevandI.Nurmukhametov

InformationOpacityandInvestmentAttractivenessofEnterprises .... 381

I.Kapkaev,D.Sorokin,andV.Leshinina

ThePeculiaritiesofInter-confessionalRelationsinMulticultural SpaceoftheTyumenRegion ................................. 390 E.SharipovaandA.Panova

InfluenceStrategicCompetitiveAdvantageInternationalBusiness CooperationintheFrameofFinancialCrisis 399

N.N.ReshetnikovaandM.G.Magomedov

TheConceptofImportSubstitutioninAgriculturalIndustry: ThreatsandOpportunitiestoImprovetheCompetitiveness ofNationalCertifiedAgriculturalProducers 409

M.S.Agababayev,A.A.Drevalev,andG.S.Timokhina

FromInformationCitytoSmartCity:RussianExperience ofStateEntrepreneurship ................................... 419

E.I.Ruzina

OntheIdenti ficationofFinancialInstrumentsintheAspect ofIndicatorsofFinancializationoftheEconomicLife ofEconomicEntities 431

O.ZhitlukhinaandE.Kiselevskaia

FinancialProvisionofInnovativeActivityintheRussianEconomy 444 S.P.Kyurdzhiev,E.P.Peshkova,andA.A.Mambetova

OptimizationofLogisticsBusinessProcessesBased ontheImplementationofCognitiveInformationTechnology 455 E.V.Volodina,P.A.Kudryashova,andE.A.Studentova

PsychologicalFactorsofMotivatedReadinesstoLaborintheForest ManufacturingIndustryoftheFarEast ........................ 465

I.U.Makhova,E.V.Ilinykh,andE.V.Dobrunova

PsychologicalReadinesstoEntrepreneurship ofEconomicsStudents ......................................

A.N.Zakharova,G.S.Dulina,andT.V.Talanova

475

Identi ficationofKeyGlobalTrendsinResearchintheField ofGovernmentServiceEconomy 489

YuliyaSunaeva

IntegrationApproachtoSolvingProblemsofInterdisciplinaryNature intheConditionsofPost-industrialEducation .................... 501

A.P.Suhodimtseva,N.I.Vorozheikina,andJ.B.Eremina

EstimatingtheEffectsofFreeTradeAgreementsonTradeFlows inEastAsia .............................................. 511

D.V.Suslov

ModelingtheRuinProbabilityofaNon-statePensionFundTaking intoAccountRiskyInvestments 528

O.N.YarkovaandA.G.Renner

TheConceptofHealthProtectioninInternationalLaw 539

E.V.VorontsovaandA.L.Vorontsov

FeaturesofLegalSecuringFundamentalHumanRightsintheField ofHealthintheRussianFederation 548

E.V.VorontsovaandA.L.Vorontsov

MethodicalApproachestoClassificationofMegaProjectsofSocial andEconomicDevelopment .................................. 558

T.Y.Kalavriy

TheWorldOilMarketandItsInfl uenceonRussianEconomy ....... 568

E.V.Bokareva,A.A.Silaeva,A.P.Sokolova,M.A.Atamanova, andS.A.Zudenkova

Russia’sAgroIndustrialComplex:EconomicandPoliticalInfl uence FactorsandStateSupport 579

V.P.Samarina,T.P.Skufina,A.V.Samarin,andS.V.Baranov

Road-BuildingEnterpriseinaRiskyEnvironment: EfficiencyofManagement 594

M.A.ogluFeizullaevandR.J.ogluJavadov

GovernmentofImportSubstitutionasaFactorofRussian EconomyDevelopment ...................................... 604

V.V.Moiseev,O.A.Sudorgin,V.F.Nitsevich,andV.B.Slatinov

ProblemsofManagementofthePublicSectorasDifficultSystem ..... 621

S.V.Belousova

ProblemsofDevelopmentofTaxIncentivesinSpatialAspect ........ 632

S.V.Belousova

TrendsandProspectsfortheSmallandMedium-SizedBusinesses DevelopmentintheNorthernRegionsofRussia 642

S.Farakhutdinov,E.Akvazba,andM.Deneko

Russian-JapaneseEconomicCooperationinHistoricalRetrospective andPerspective ........................................... 654

Z.V.Petrunina,G.A.Shusharina,andD.V.Kiba

DidacticSupportofResourceComponentforEducational EnvironmentofHigherLearningInstitutionforDevelopment ofStudents’ InformationLiteracy ............................. 664

T.E.NalivaykoandN.M.Granina

ForecastingthePrimeCostofMilkProduction inanUncertainEnvironment 678

T.Yureneva,O.Barinova,andS.Golubeva

StatePolicyofDecreasingtheEffectivenessofWesternSanctions 694

V.V.Moiseev,O.A.Sudorgin,V.F.Nitsevich,andV.V.Stroev

SocialPolicyofRussiaastheFactorofDevelopment ofHumanCapital 706

V.V.Moiseev,O.A.Sudorgin,V.F.Nitsevich,andV.V.Stroev

ActualProblemsofInvestmentsinRussia ....................... 717

V.F.Nitsevich,V.V.Stroev,V.V.Moiseev,andO.A.Sudorgin

DevaluationoftheRuble:LossesandBenefi ts ....................

V.F.Nitsevich,S.N.Glagolev,V.V.Moiseev,andO.A.Sudorgin

TheDevelopmentofSociologyinRussia: MethodologicalPositionsandPraxeologicalMeanings 739 N.BaidakovaandO.Tarasova

PensionPracticesofRussianYoungerGeneration 749 O.Vlasova,I.Chebykina,andV.Kuimov

ManagingElementsoftheServiceSectorastheBasisforImproving theQualityofLifeofthePopulation 759

A.T.Petrova,O.N.Vladimirova,andA.S.Shchitnikov

HighTechnologiesIstheDriverofEconomicGrowth oftheRussianEconomy ..................................... 770

T.M.Gerashchenkova,N.W.Glushak,andO.V.Glushak

OrganizationalandMethodologicalProvidingofFinancial andEconomicActivityofNon-profitOrganizationsintheSphere ofHousingServices ........................................ 782

O.ZhitlukhinaandM.Iashchuk

WillCarbonTaxConstrainOilProductioninCanada? 793

I.Kopytin,A.Maslennikov,M.Sinitsyn,S.Zhukov,andS.Zolina

MethodicalApproachtoExtractionResultsDiagnosticsofInnovation andResourcePotentialintheRussianFederationTerritories 804

O.M.Golembiovskaya,M.A.Gundorova,andZ.V.Mishchenko

ActualProblemsofBusinessinRussia .......................... 815

V.F.Nitsevich,V.V.Moiseev,V.V.Stroev,andO.A.Sudorgin

AnOptimalandQuasi-optimalAlternativesDetermination intheMulticriteriaMarketingResearches ....................... 826

A.M.Shikhalev,D.P.Vorontsov,G.R.Khamidullina,andD.B.Solovev

PrognosticCompetenceandSocializationofJuniorSchoolchildren withHealthLimitations 834

A.I.Akhmetzyanova,I.A.Nigmatullina,andA.T.Kurbanova

TheImpactofChangesinWorkingCapitalonFirmValue inBursaMalaysia 846

T.Kokodey,M.Namkhanova,andN.Alesina

EvaluationoftheInnovativeActivityEfficiencyWhileDeveloping theSectoralTechnologyPolicyintheRegion ..................... 858

N.V.MalcevandL.F.Shaybakova

Up-to-DateEnglishLanguageCourseasaMeansofDeveloping theCommunicativeandProfessionalSkillsofITStudents ........... 869

O.N.VolobuevaandL.I.Stepanova

DeterminacyvsRandomnicityinSocio-EconomicProcesses: EpistemologicalConcept 880

M.Y.KussyandO.L.Korolyov

ProspectsfortheDevelopmentofInternationalTrade inLiquefiedNaturalGas 892

L.V.Vazhenina

IntegrationAssessmentoftheConditionofAgrarianandIndustrial ComplexoftheRepublicofCrimeaintheContextofSustainable DevelopmentoftheRegion ................................... 903

N.Yu.Anisimova

Bene fitAssessmentasaToolofPublicPolicy-Making intheDevelopmentandImplementationofStatePrograms oftheRussianFederation .................................... 913

S.KolerovandN.Sedova

UsingofInstrumentsoftheStateSupportforIntegrationofScience andBusinessontheExampleofFarEasternFederalUniversity 923

D.B.Solovev

AuthorIndex 935

Singapore’sCybersecurityAct2018:

ANewGenerationStandardforCritical InformationInfrastructureProtection

VladivostokStateUniversityofEconomicsandService, 41,GogolStreet,Vladivostok690014,RussianFederation ella.goryan@vvsu.ru

Abstract. Nationalmechanismsofcriticalinformationinfrastructure (CII)protectiondifferdependingontheinformationassets,authorities’ powers, methodsofregulation,etc.Singaporeimplementsthestate-drivenapproachfor CIIprotectionthatisbalancedandcalibratedinordertoharmonizetheefficient powersofauthoritieswiththeburdensimposedonITindustryparties.Singapore’sCybersecurityAct2018(CSA)establishesasolidandpreciseframework fortheCIIprotectionspecifyingthreecoreaspects:constantcooperationof publicauthoritiesandprivatesectorinenvisagingaCIIsystem;broadauthoritiesforprevention,managementandresponsetocybersecuritythreatsand incidentsinSingapore,andcompulsorylicensingofcybersecurityservices.It emphasizescompliancewithpromulgatedcodesofpracticeandexpresses designationofCIIandcybersecuritythreats.Thedistinctivefeatureoftheactis itssignificantreductionofthecomplianceburdenoncybersecurityprofessionals andCIIowners.AsfortheCIIprotectionit’simportantthatcomputersystemsin thesupplychainsupportingtheoperationofaCII(i.e.datacentreownersand cloudservicesoperators)willnotbedesignatedasCIIs.ThustheCSAillustrates thenarrowapproachoflawmakersinenvisagingitsjurisdiction – itimpliesjust CIIownersandnotanynetworkoperators.Singaporeisa firstjurisdictionin South-Eastregionthathasdevelopeditscybersecuritylegislationtoimpose requirementsoncertainbusinessestoimplementprotectionsagainstcybersecurityrisksintotheircomputersystems.

Keywords: Cybersecurity Criticalinformationinfrastructure CIIprotection Jurisdiction

1Introduction

Communicationnetworksareasignificantelementofthemodernlife.Thevast majorityofliaisonswithinthecommunities,thebusinessenvironment,thestateorthe internationalcommunityareallocatedexclusivelyinsuchnetworks.Theyarethe pillarsoftheinformationsocietyandanessentialpartofthesingledigitalmarket. Someofthemarecriticallyimportantforthenationalsecurityreasonsastheyprovide vitallyimportantresourcesorsupporttheirmovement.Suchinformationinfrastructures arecriticalforthepeople’sconvenienceandevenexistence[1]andthereforetheyare

© SpringerNatureSwitzerlandAG2020

D.B.Solovev(Ed.):FarEastCon2018,SIST138,pp.1–9,2020. https://doi.org/10.1007/978-3-030-15577-3_1

consideredascriticalinformationinfrastructures(CIIs).CIIsarethefrequenttargetsfor cyber-attackssothestatestrytocopewiththesethreatsandtosearchfortheadequate structuresandprocessesthatcouldoptimallytacklethenewcyberriskwhileprotecting corecivilrights[2].IngeneralthesituationwithCIIsprotectiononthenationallevel soundslikesatisfying.Themaintrendofdelegatingresponsibilitytocybersecurity authorities,emergencyagenciesornationalregulatorswhichareresponsiblefor operationaltasksisbeingobserved.Manyofthoseauthoritiesareresponsiblefor additionaltasksonthestrategicorpoliticallevel,suchasthedevelopmentofstrategy papers,supervisionofthenationalcomputersecurityincidentresponseteamorthe proposinglegislation.Stillthehalfofthenationalmechanismshaveestablished institutionalizedformsofcooperationinformsofpublic-privatepartnershipsinspiteof thefactthattheprivatesectorbearsresponsibilityforensuringnetworkresilienceand moreoveritparticipatesintheregulationofnationalinformationsecuritybyproviding technicalexpertise[3].Forallstatesthecriticalsectorswiththestrongestregulations arethetelecommunications, financeandenergysectors.Notallthestatesconductarisk assessmentonanationallevel.Theyimplythepolicyofimposingtheresponsibilityfor theriskassessmentonsector-specificagenciesorontheindividualoperators[4]. ThereforenationalstandardsofCIIsprotectiondifferfromthesimplesttotheadvanced ones.Itisafactthatstatesthatplayaleadingroleininternationaleconomicrelations anddigitalmarketsareconstantlydevelopingtheirnationalstandardsofCIIsprotection inordertoensurenotonlytheinteriorbusinessandcommunityliaisonsbutalsoa globalsupplychain.

Beingamostconnectednationinaworld,Singaporeisalsoaninternationalcentre ofexchangeandcommerce.Thatmakesitaperfecttargettocyberthreatsandattacks withmoresevereconsequencesforthepublicorderandeconomicsofSingaporethen foranyotherstate.ThereforeSingaporelegislaturepresentedaCybersecurityAct (CSA)in2018followingtheharshandproductivepublicdebateswithprivatesector involved.ItisconsideredasanewgenerationstandardforprotectionofCIIsthat makesitanobjectofcloseattentionofprofessionalsfromdifferentspheres.

2MethodologyandLiteratureReview

Pleasenotethatthe firstparagraphofasectionorsubsectionisnotindented.The fi rst Themethodologyforthisstudycomprisesoftwogroupsofmethods:thegeneral scientificones(system-structural,formal-logicalandhermeneuticalmethods)andthe speciallegalmethodsofcognition(comparativelegalanalysesandformal-legal method).Inordertoobtainthemostreliablescientifi cresultstheywereusedincomplex.

CIIprotectionsystemdemandsincludingstakeholdersfromthepublicandthe privatesectors.InmanystatesCIIisoperatedbyprivateentitieswhichareconnected internationallythroughtheparticipationintheentiresupplychain.Häyhtiö andZaerens (Häyhtiö andZaerens2017)introduceamanagementmodelwhichenablesanetwork wideprotectionforcriticalinfrastructureinacontractualenvironmentbetweenthe actorswithdifferentbusinessdomainsandfunctionsinasupplychain[5].Such managementmodelcanbeusedtoassess fi nancialdifferencesbetweencentralizedand decentralizedprotectionofcriticalinfrastructure.

Becauseofitsoperativecapacity,theprivatesectorhascometobeunderstoodas theexpertinnetworkandinformationsystemssecurity,whoseknowledgeiscrucialfor theregulationofthe field.FarrandandCarrapico(FarrandandCarrapico2018)identify theshiftingroleoftheprivatesectorintheCIIfromoneofavictiminneedof protectioninthe firstphase,toacommercialactorbearingresponsibilityforensuring networkresilienceinthesecond,toanactivepolicyshaperinthethird,participatingin theregulationofNISbyprovidingtechnicalexpertise[3].

EverystatedevelopsitsownmodelforCIIprotection(thephysicaloneprimarily) anditrequiresthemethodologicalapproachestobeused.Ithelpstoestimatehazards andthreatstotheinfrastructureobjects.Bobro(Bobro2018)emphasizesthenecessity ofallhazardsapproach(consideringthethreatsofanyoriginanddirectionality).The threatsmodelmustusenotonlytheviolator ’smodel,butalsotheobject’smodeland themodelofsocio-politicalsituation[6].

Thenatureofcyberspaceanditsconstantevolutionarethekeyfactorsofdevelopmenttheadequatestructuresandmechanismswithinthestatemachine.Matania, YoffeandGoldstein(Mataniaetal.2017)outlinethenecessityinthenextphaseof evolutionofgovernmentalstructures – theformationofasinglecivilianentitywith concreteoperationalcapabilities,responsiblefordefendingthenationalcyberspaceand leadingnationalcybersecurityefforts[2].

3Hypothesis

Singaporeisa fi rstjurisdictioninSouth-Eastregionthathasdevelopeditscybersecuritylegislationtoimposerequirementsoncertainbusinessestoimplementprotectionsagainstcybersecurityrisksintotheircomputersystems.Takingintoaccountits leadingroleinregionalandinternationaleconomicrelationsanddigitalizationprocessestheCSAclausesshouldbethoroughlyconsideredandpositiveexperiencein regulationofthementionedsphereapplied.

4ResultsandDiscussion

Theinternationallyrecognizeddefinitionofthecriticalinformationinfrastructureis verybroad,suchasEuropeanCommissioninitsDirective2008/114/ECof8December 2008ontheidenti ficationanddesignationofEuropeanCriticalInfrastructuresandthe assessmentoftheneedtoimprovetheirprotectionconsidersinformationandcommunicationtechnologiessystemsthatarecriticalinfrastructuresforthemselvesorthat areessentialfortheoperationofcriticalinfrastructures(telecommunications, computers/software,Internet,satellites,etc.)[7].IntheGreenPaperonaEuropean ProgrammeforCriticalInfrastructureProtection[8]theEuropeanCommissionprovidesanindicativelistof11criticalsectors:Energy,Information,Communication Technologies(ICT),Water,Food,Health,Financial,Public&LegalOrderandSafety, CivilAdministration,Transport,ChemicalandNuclearIndustry,SpaceandResearch.

Thereforeeverystatesetsthecriteriaforthedeclarationofanydata,database, network,communicationsinfrastructure,(orpartthereof),oranythingassociatedwith themastheCII.NationalauthoritieshavetoidentifytheCIIandinthisprocessof identi ficationtheyhavelauncheddifferentinitiativesregardingthistopicwhileothers arestartingnowtodeveloptheirownapproaches[9].Thatleadstothedifferenceinthe nationalmechanismsofCIIprotectiondependingontheinformationassets,authorities ’ powers,methodsofregulation,etc.WithintheEUMemberStateshavehighlighted theirownlistofcriticalsectorsbasedonthespecialcharacteristicsandpeculiaritiesof eachcountry,addingwithsomenew:e.g.AustriaexcludedChemicalandNuclear Industry,FranceexcludedChemicalandNuclearIndustrybutincludedIndustry;Italy andGreeceexcludedalmostallsectorsexceptEnergyandTransport;UKexcluded Public&LegalOrder,ChemicalandNuclearIndustry,SpaceandResearchbut includedEmergencyservices[9].

AnalystsobservefourdifferentmaturitylevelswithregardstoCIIactivitiesacross thestates.Level1isbeingcharacterizedwiththeabsenceofactivitiesrelatedtothe protectionofCII;stateshaveidentifiedonlytransportandenergyascriticalsectors.At maturitylevel2thestateidenti fiestheinformationandcommunicationstechnology sectorasoneofcriticalsectorsthatshouldbeaddressed.Atthelevel3statesdevelopa generalmethodologicalframeworkfortheidenti ficationofcriticalinformationassets withspeci ficstepsandresponsibilitiesassignedtoinvolvedstakeholders.Andthe highestmaturitylevel4outlinesthedevelopmentofadefi nitionforCIIandestablishmentofspeci ficcriteriafortheidentificationofCIIassets.Atthislevelstatesare beingconsideredasthemostlyadvancedintheareaoftheCIIprotectionandhave takenspeci ficmeasuresfortheidentificationandprotectionofCIIassets[9].

ThecrucialfactorfortheCIIprotectionistheeffectivecollaborationbetween publicsector(Government&mandatedAgencies)andtheprivatesector,whichoften controlsnumerouscriticalinfrastructures.Itisacommonpracticethattheservice providersaredefinedbythemandatedagencyasoperatorsofCIIs:theyoffercertain criticalservicestopublic,supportthelargescopeofthepopulationandtheterritory, theirrisksmaybecomethenationalones.Theyareresponsiblefordeterminingthecore processes,therespectiveapplicationsand,asalaststep,thenetworkassetsandservices (connectivitysolutions)whichareusedtooperatetherespectiveapplications.Anasset canbecriticalrelatedto(a)thebusinessvalue,(b)thescopeofthepopulationservedor (c)thetechnicaldependenceofcriticalapplicationsandthisclassi ficationdependson thesectorandtheroleoftheCII[9].

Therearetwodifferentapproachesforanidentificationofcriticalservices dependingontheleadingroleforsuchidentification.Thestate-drivenapproach assumestheleadingroleofthegovernmentagenciesthathavethemandatetoidentify andprotectCIIandtheoperator-drivenapproachassumestheleadingroleoftheCII operators.ThelatterisperformedinFrance,wherethestateidentifiesalistofoperators (calledalso ‘vitaloperators’),whoareresponsibletoidentifytheindividualcritical servicesandassetsthatcomplywithanumberofriskanalysesandriskmanagement directives.Then,theresponsibleministriesreviewtheselectedservicesandassets alongwiththedraftedCIIprotectionplans.Thisisapragmaticapproachgiventhe currentstateoftheartofCIIidenti ficationsinceoperatorshaveabetterknowledgeof

theirinfrastructures.Italsorepresentsashiftoftheeffortneededtotheoperatorto whichisdelegatedtheaccountability[9].

TheessenceofstandardsfortheCIIprotectionimplementedbytheCSAinSingaporeemphasizescybersecurityasadefaultconsideration,whichmeansthatdevelopersofSmartCityeco-systemswillneedtoprovidethereassuranceandsecurity requiredwithininterconnectednetworksanddevicesinorderforsucheco-systemsto flourish.TheSingapore’semphasisofprotectingCIImirrorsthepositiontakeninother countriesandregions,notablyinEuropeanUnionandinChina,emphasizingtheneed forpartieswhoareinterconnectedwithintheeco-systeminwhichCIIownersand operatorsoperatetoadoptaharmonizedapproach[10].

Singapore’sCybersecurityStrategydistinguishesfourcorepillars.The firstoneis tostrengthentheresilienceofCIIsbymobilizingbusinessesandthecommunity.The secondpillaristhesafetyofcyberspace,whereallcyberthreatsarecountered; cybercrimeiscombatedandpersonaldataareprotected.Thethirdpillarisadeveloped vibrantcybersecurityecosystemcomprisingaskilledworkforce,technologicallyadvancedcompaniesandstrongresearchcollaborations,sothatitcansupportSingapore’scybersecurityneedsandbeasourceofneweconomicgrowth.Andthelastbut nottheleastpillaristheforgingofstronginternationalpartnerships[11].

In2016Singaporehasidenti fiedalistofCIIsectorswhichareservices(governmentandemergencyservices,healthcare,media,andbankingand financialservices), utilities(power,waterandtelecommunications),andtransport(landtransport,maritime andport,civilaviation)[11].In2018theCSAscopedtheCIIsectorswithinaterm “essentialservice”,whichmeansanyserviceessentialtothenationalsecurity,defense, foreignrelations,economy,publichealth,publicsafetyorpublicorderofSingapore, andspecifi edthemintheFirstSchedule(46inalist):servicesrelatingtoenergy,infocommunications,water,healthcare,bankingand finance,securityandemergency services,aviation,landtransport,maritime,media,andservicesrelatingtofunctioning ofGovernment[12].

TheCSAdefines “criticalinformationinfrastructure” asacomputeroracomputer systemthatisnecessaryforthecontinuousdeliveryofanessentialservice,andtheloss orcompromiseofthecomputerorcomputersystemwillhaveadebilitatingeffecton theavailabilityoftheessentialserviceinSingapore;andislocatedwhollyorpartlyin Singapore(section2,section7(1)).

ThedesignedframeworkfortheCIIprotectionisbeingheadedbyCommissioner ofCybersecurity(Commissioner).DeputyCommissionerandoneormoreAssistant CommissionersofCybersecurityassisttheCommissionerinthedischargeofthe Commissioner ’sdutiesandfunctions(section4).DutiesandfunctionsofCommissionerarestatedinaClause5oftheCSA.Theycompriseamongmanyotherssuch dutiesasidentifi cationanddesignationofCII,regulationofownersofCIIwithregard tothecybersecurityoftheCII(section5(e));establishmentofcybersecuritycodesof practiceandstandardsofperformanceforimplementationbyownersofCII(section5 (f));licensingandestablishmentofstandardsinrelationtocybersecurityserviceproviders(section5(j));establishmentofstandardswithinSingaporeinrelationto cybersecurityproductsorservices,andtherecommendedlevelofcybersecurityof computerhardwareorsoftware,includingcerti ficationoraccreditationschemes(section5(k)).

ThemostsufficientpartsoftheCSAareparts3,4and5.Part3providesforthe designationofCIIandtheregulationofownersofCIIwithregardtothecybersecurity oftheCII.Part4providesforthetakingofmeasurestoprevent,manageandrespondto cybersecuritythreatsandincidentsinSingapore.Part5providesforthelicensingof providersoflicensablecybersecurityservices.TheCommissionerofCybersecurity officeisresponsibleforimplementingtheprovisionsofabove-mentionedparts.

AsforthedesignationofCIItheCommissionermay,bywrittennoticetotheowner ofacomputerorcomputersystem,designatethecomputerorcomputersystemasa CII.ToascertainifcomputerorcomputersystemfulfilscriteriaofCIItheCommissionerhasapowertoobtainthenecessaryinformationfromtheownerofsuchcomputerorcomputersystemandtorequiretheownerofaCIItofurnishinformation relatingtoCII.TheCSAgrantsarighttowithholdsuchinformationinacaseitis protectedbylaw,contract,ortherulesofprofessionalconduct(section8(5)).However,acontractualobligationremainsaninvalidexcuseforrefusingtodisclose informationinthecontextof(i)aninformationrequestpertainingtoaknownCIIor (ii)investigationsofcybersecurityincidents(section19(6)).UndertheCSA,theCII ownerwillnotbetreatedasbeinginbreachofanysuchcontractualobligationifthe disclosurewasdonewithreasonablecareandingoodfaithforthepurposeofcomplyingwithsuchaninformationrequest.However,theseprovisionsstillriskraising concernswithbusinessesaboutprotectionoftheircommerciallysensitiveinformation. TheCSArequiresownersofCIItoreport “prescribed” cybersecurityincidentsorany otherincidentsspecifi edbytheCommissioner.Previously,theDraftBillrequiredthe reportingofall “signi ficant” cybersecurityincidents.Prescribedcybersecurityincidents requiringnotificationwillbesetbytheCommissioner[13].

TheCommissionerisalsoempoweredtoissuewrittendirectionswhichmayrelate to(a)theactiontobetakenbytheownerorownersinrelationtoacybersecuritythreat; (b)compliancewithanycodeofpracticeorstandardofperformanceapplicabletothe owner;(c)theappointmentofanauditorapprovedbytheCommissionertoauditthe ownerorownersontheircompliancewiththisActoranycodeofpracticeorstandard ofperformanceapplicabletotheownerorowners;(d)suchothermattersasthe Commissionermayconsidernecessaryorexpedienttoensurethecybersecurityofthe criticalinformationinfrastructure(section12).

TheCSArequiresauditsatleastonceeverytwoyearsandriskassessmentsoncea yearfortheaffirmationofcomplianceoftheCIIwiththisActandtheapplicablecodes ofpracticeandstandardsofperformance,tobecarriedoutbyanauditorapprovedor appointedbytheCommissioner(section15).Clause15impliessevereconsequencesin acaseofviolationofthisprovision – theowneroftheCIIshallbeguiltyofanoffence andshallbeliableonconvictiontoa finenotexceeding$100,000ortoimprisonment foratermnotexceeding2yearsortobothand,inthecaseofacontinuingoffence,toa further finenotexceeding$5,000foreverydayorpartofadayduringwhichthe offencecontinuesafterconviction.

Thepreventionofcybersecurityincidentsisfulfi lledbyconductingcompulsory cybersecurityexercisesforthepurposeoftestingthestateofreadinessofownersof differentCIIinrespondingtosigni ficantcybersecurityincidents.TheCommissioner writesadirectionandanypersonwho,withoutreasonableexcuse,failstocomplyit

shallbeguiltyofanoffenceandshallbeliableonconvictiontoa finenotexceeding $100,000(section16).

OnrespondtocybersecuritythreatsandincidentstheCommissionerempoweredto investigateandpreventcybersecurityincidentsincludingtheseriousonesby(1)receivingsignedstatements,physicalorelectronicrecordsanddocuments;(2)examining orallyanypersonwhoappearstobeacquaintedwiththefactsandcircumstances relatingtothecybersecuritythreatorincident;(3)appointingcybersecuritytechnical expertsetc.(sections19,20,22).

Clause23empowerstheMinistertoauthorizeordirectanypersonororganization totakeemergencycybersecuritymeasuresandcomplywithnecessaryrequirements, forthepurposesofpreventing,detectingorcounteringanyseriousandimminentthreat totheCII.Thosemeasuresorrequirements(a)donotconferanyrighttotheproduction of,orofaccessto,informationsubjecttolegalprivilege;and(b)haveeffectdespiteany obligationorlimitationimposedorright,privilegeorimmunityconferredbyorunder anylaw,contractorrulesofprofessionalconduct,includinganyrestrictiononthe disclosureofinformationimposedbylaw,contractorrulesofprofessionalconduct. TheCSAobligesanypersontomeettherequirementsofthespecifi edpersonotherwise heorsheshallbeguiltyofanoffenceandshallbeliableonconvictiontoa finenot exceeding$50,000ortoimprisonmentforatermnotexceeding10yearsortoboth. Clause23comprisesdetailedspecifi cationsondifferentaspectsofmeetingtheemergencymeasuresandrequirements.

AnotherspecificfeatureoftheCSAthatmakesitanewgenerationstandardisa licensingframeworkforcybersecurityserviceproviders.Itisaimedtoassureasafety andsecuritytoconsumersofcybersecurityservices,toaddressinformationasymmetry intheindustryandtoprovidetheimprovementofthestandardsofcybersecurity serviceprovidersandprofessionals.Section24detailsthemainprincipleoftheCSAnopersontoprovidelicensablecybersecurityservicewithoutlicense.Licensing functionsareassignedtotheCommissionerwhoisresponsiblefortheadministrationof thatframework.Thelicensablecybersecurityservicesare(a)managedsecurityoperationscentre(SOC)monitoringservice;and(b)penetrationtestingservice.

Managedsecurityoperationscentre(SOC)monitoringserviceisaserviceforthe monitoringofthelevelofcybersecurityofacomputerorcomputersystemofanother personbyacquiring,identifyingandscanninginformationthatisstoredin,processed by,ortransmittedthroughthecomputerorcomputersystemforthepurposeofidentifyingcybersecuritythreatstothecomputerorcomputersystem.

Penetrationtestingserviceisaserviceforassessing,testingorevaluatingthelevel ofcybersecurityofacomputerorcomputersystem,bysearchingforvulnerabilitiesin, andcompromising,thecybersecuritydefensesofthecomputerorcomputersystem, andincludesanyofthefollowingactivities:(a)determiningthecybersecurityvulnerabilitiesofacomputerorcomputersystem,anddemonstratinghowsuchvulnerabilitiesmaybeexploitedandtakenadvantageof;(b)determiningortestingthe organization’sabilitytoidentifyandrespondtocybersecurityincidentsthroughsimulationofattemptstopenetratethecybersecuritydefensesofthecomputerorcomputer system;(c)identifyingandquantifyingthecybersecurityvulnerabilitiesofacomputer orcomputersystem,indicatingvulnerabilitiesandprovidingappropriatemitigation proceduresrequiredtoeliminatevulnerabilitiesortoreducevulnerabilitiestoan

acceptablelevelofrisk;(d)utilizingsocialengineeringtoassessthelevelofvulnerabilityofanorganizationtocybersecuritythreats(SecondSchedule).

TheCSAenvisagesthreetypesoflicensesdependingontheirconditionsspeci fied: (a)general(conditionsareapplicabletoalllicensees);(b)specific(conditionsare applicabletoaspeci fiedclassoflicensees);and(c)individual(conditionsareapplicabletoaspecifi edlicenseeonly).Alicenseisinforceforsuchperiod(notexceeding5 years)asthelicensingoffi cermayspecifyinthelicense,startingfromthedateofits issue.SuchadiscretionaryauthorityoftheCommissionerprovidesfortheoptimal protectionoftheCII.Alicenseeisobligedtofulfi lltherequirementsimposedbythe CSA(firstofallit’sadutytokeeprecordsoftheinformationnecessaryfortheCII protectionforthreeyears)andisasubjectof financialpenaltyiffailstocomplywithit (a finenotexceeding$10,000orimprisonmentforatermnotexceeding12monthsor both).

TheappealauthorityinalicensingframeworkisaMinisterandtheClause35 providesforanavenueofappealtotheMinisteragainstdecisionsmadebythe licensingofficer.ThedecisionoftheMinisteronanappealis final(section35(7)).

5Conclusions

Singaporeimplementsthestate-drivenapproachfortheCIIprotection.Atthesame timethisapproachiswell-balancedandcalibrated.Thelegislaturehastriedtoharmonizetheefficientpowersofauthoritieswiththeburdensimposedoncompaniesand privateindividualsintheITindustry.TheCSAestablishesasolidandprecise frameworkfortheCIIprotectionspecifyingthreecoreaspects:(1)constantcooperation ofpublicauthoritiesandprivatesectorinenvisagingtheCIIsystem;(2)broad authoritiesforprevention,managementandresponsetocybersecuritythreatsand incidentsinSingapore,and(3)compulsorylicensingofcybersecurityservices.It emphasizesoncompliancewithpromulgatedcodesofpracticeandexpressesdesignationofCIIandcybersecuritythreats.ThedistinctivefeatureoftheCSAisits signifi cantreductionofthecomplianceburdenoncybersecurityprofessionalsandCII owners.AsfortheCIIprotectionit’simportantthatcomputersystemsinthesupply chainsupportingtheoperationofaCII(i.e.datacentreownersandcloudservices operators)willnotbedesignatedasCIIs.ThustheCSAillustratesthenarrowapproach oflawmakersinenvisagingtheCSAjurisdiction – itimpliesjustCIIownersandnot anynetworkoperators.AtthesametimetheCSAhascreatedsometemporary uncertainties,forexample,itcontainsaterm “debilitatingeffect” (section7(1))referringtoavailabilityofanessentialservice.Itisexpectedtobe fixedintheupcoming CybersecurityAct’sRegulationscontainingdetailedprescriptionsrelatingtothe practicaloperationoftheCSA:theprocessforthedesignationofCII,thestandardsto bemaintainedbyanownerofCII,theresponsibilitiesanddutiesofanownerofaCII andthetypeofchangesthatareconsideredmaterialchangestothedesign,configuration,securityoroperationsofCIItobereportedbyanownerofCII[13, 14].All above-mentionedcharacterizestheCSAasanewgenerationstandardfortheCII protectioninamodernhigh-riskdigitalworld.

References

1.Buldyrev,S.V.,Parshani,R.,Paul,G.,Stanley,H.E.,Havlin,S.:Catastrophiccascadeof failuresininterdependentnetworks.Nature 464(7291),1025–1028(2010)

2.Matania,E.,Yoffe,L.,Goldstein,T.:Structuringthenationalcyberdefence:inevolution towardsaCentralCyberAuthority.J.CyberPolicy 2(1),16–25(2017)

3.Farrand,B.,Carrapico,H.:Blurringpublicandprivate:cybersecurityintheageofregulatory capitalism.In:SecurityPrivatization:HowNon-Security-RelatedPrivateBusinessesShape SecurityGovernance,pp.197–217.SpringerInternationalPublishingAG,Basel(2018)

4.Sarri,A.,Moulinos,K.:Stocktaking,AnalysisandRecommendationsontheProtectionof CIIs.EuropeanUnionAgencyforNetworkandInformationSecurity(ENISA),Heraklion (2015)

5.Häyhtiö,M.,Zaerens,K.:Acomprehensiveassessmentmodelforcriticalinfrastructure protection.Manag.Prod.Eng.Rev. 8(4),42–53(2017)

6.Bobro,D.:Methodologicalaspectsofcriticalinfrastructureprotection(2018).ResearchGate Homepage. https://www.researchgate.net/publication/322715607_The_National_Institute_ for_Strategic_Studies_methodological_aspects_of_critical_infrastructure_protection .Accessed21May2018

7.CouncilDirective2008/114/ECof8December2008ontheidentificationanddesignationof EuropeanCriticalInfrastructuresandtheassessmentoftheneedtoimprovetheirprotection. OfficialJ.L, 345(23),12(2008)

8.GreenPaperonaEuropeanProgrammeforCriticalInfrastructureProtection.COM576 final (2005)

9.Mattioli,R.,Levy-Bencheton,C.:Methodologiesfortheidentificationofcriticalinformation infrastructureassetsandservices:guidelinesforchartingelectronicdatacommunication networks.EuropeanUnionAgencyforNetworkandInformationSecurity(ENISA), Heraklion(2014)

10.Wun,R.,Tan,M.:CybersecurityinSingaporeandChina(2018).LexologyHomepage. https://www.lexology.com/library/detail.aspx?g=cae1ecf3-8228-4f89-a30e-6587fd592da4 . Accessed21May2018

11.Singapore’sCybersecurityStrategy.CyberSecurityAgencyofSingapore,Singapore(2016)

12.CybersecurityAct:CyberSecurityAgencyofSingapore,Singapore(2018)

13.Singapore’sNewCybersecurityAct-AReliefandLeadingtheWayforOthers? BakerMcKenzieHomepage. https://www.bakermckenzie.com/en/insight/publications/2018/ 02/singapores-new-cybersecurity-act .Accessed21May2018

14.Hashim,H.M.,Sokolova,E.,Derevianko,O.,Solovev,D.B.:Coolingloadcalculations.In: IOPConferenceSeries:MaterialsScienceandEngineering,vol.463,Part2,Paper № 032030(2018). https://doi.org/10.1088/1757-899X/463/3/032030

ModernDevelopmentsinBehavioral Economics

1 RussianAcademyofNaturalHistory,Moscow,Russia terziev@skmat.com

2 VasilLevskiNationalMilitaryUniversity,VelikoTarnovo,Bulgaria

3 UniversityofRousse,Rousse,Bulgaria

4 NavalAcademy,Varna,Bulgaria

Abstract. Thestudyexaminestheplaceofbehaviouraleconomicsinthe structureofeconomicscienceandthepracticeofstateregulating.Thethesisthat neoclassicismisanappropriatenormativeapproachforanalysinghuman behaviourisdefendedbutthecomparativeadvantagesareonthesideof behaviouraleconomicsintheanswersofdescriptive,diagnostic,prognosticand perspectivequestions.Ittracksthehistoricalroots,theideasofbehavioural economicsforthelimitedrationality,willandegoismarepresentedinshortas wellasthecontributionofbehaviouralapproachtothestateintervention’s ideologyandpractice.Thelibertarianpaternalismideaanditsroleforthe transformationof “stateofwealth” intothegainingclearerandcleareroutlines “newpaternalisticstate” arepresented.

Keywords: Behaviouraleconomics Libertarianpaternalism Nudge

1Introduction

Thereisconsensusexistinginthebehaviouralsciencesthatthreetypesofquestions needtheoreticalexplanation.The firstisthenormativequestion “Howshouldpeople act”.Thesecondtypeofquestionsaredirectedtowardsthreeproblems:thedescriptive “Howdopeopleactuallyact”,thediagnostic “Whytheyactthisway” andtheprognosis “Whatresultstheirbehaviourwouldleadto”.Thethirdtypeofquestionsisthe perspectivequestion “Howtoachievethatthepeopleactthewaytheyshouldact” . Althoughdesirable,atheoreticalconstructionisnotabletogiveanswertoallthree typesofquestions.

Undoubtedly,theneoclassicalideafor “HomoEconomicus” issuccessfulin finding normativeanswersfortheidealweshouldstrivefor. “HomoEconomicus” isrational, possessesunlimitedpossibilitiestoacquireandprocessnecessaryinformation,reactsin apredictablewaytothestimulicreatedbythemarketandpublicinstitutions,pursues hisowninterestandhasthewilltorealizehisgoals.Theassumptionforrationalityis altogethersimplifi ed,powerfulandpreciseenoughtool,withwhichonecanquestfor descriptiveanswersandprognosticatewiderangeofeconomicalphenomena.However, therearephenomenaandfactsthatareincontradictionwiththefundamental assumptionsforrationality.

© SpringerNatureSwitzerlandAG2020 D.B.Solovev(Ed.):FarEastCon2018,SIST138,pp.10–23,2020. https://doi.org/10.1007/978-3-030-15577-3_2

Wediffi cultlyestimatethepossibleoutcomesandtheprobabilityoftheiroccurrence.Weoverestimateourselvesandactwithprejudicetowardstheothers.Our optimismisundulyhighandatthesametime,weexaggeratethedamageofpossible losses.Weusementalmodelsthatframeinformationthewayweofteninterpretit incompletelyandwrongly.Ourchoicesdependonthecontextandweshowtendency foranchoringtouselessandunspeci fiedinformation.Westicktothestatusquo,follow ourpreviousbehaviourortheothers,showconservatismandavoidchanges,even whentheyareurgent.Weareledbyreciprocityandoftenturnourbacktoourown interests:wearereadytoallocateresourcesandeffortstoencouragethose,who behavedfairly,andtopenalizeinjustice.

Ingeneral,mostofthepeopledonotsucceedinmaximizingtheexpectedusefulnessandapplysimpli fiedbutwrongstrategiesfordecision-makingandmakebetter choiceswhenhavinglimitednumberofalternatives.Theyoftenactagainsttheirown interest:theypostponeimportantthingssuchasprophylacticexaminations,quali ficationandsavingforretirement,theysticktotheoptionimplicitlyevenifitisnotthebest choiceoftheirs,investunreasonably,tendtoaccepttrickyadvicesandtovotefor unreasonablepoliticalprojects,etc.

Alltheseareexamplesofbehaviouralfailures,whichcannotbeintegratedinthe pictureofneoclassicaleconomics.Theyaremanifestedparticularlystronglyat:time discrepancybetweendecisions’ benefi tsandlosses(savingsandinsurances,consumptionofalcoholorotherproblemsofself-control);needofexpertknowledge (choosingaleasingplanoranother financialproduct);lowrepetitionofdecisionsand impossibilitytolearnfromexperience(familybinding,purchaseofhomeandcar,how manychildrentohaveandthechoiceofacareer);badfeedback(healthcare,education andsavings);choosingamongunknownalternatives(workingplace,medicalprocedure,schoolorvacationpackage);experienceaccumulationisdamaging(thenegative dependences).Thelistpracticallymeansthattherearebehaviouralfailuresinalmostall situationsandactivities,excepttherepeatingsimpledeals.Besides,theyareuniversal. Despitehisintelligence,education,experience,wealthorinfluence,atcertaincircumstancesandregardingcertainissues,eachoneofusislimitedwithinhisrationality, self-controlandegoism.

Notconsideringthelimitationofrationality,self-controlandegoismandthe resultingbehaviouralfailurespreventsneoclassicaleconomicsfrompresentingcorrect descriptivepictureofhumanbehaviourandforcesforitsidealizedunderstandingfor “HomoEconomicus” tobecorrected.Anewstreaminthetheoryofeconomicsthat becamepopularasbehaviouraleconomicstriestoputtherealhumanandthebehaviouralfailuresinthecentreoftheeconomicanalysisattentioninthelastfortyyears. Itsgoalistoimprovetherealityandqualityofeconomicanalysis,whichwouldresult inbetterprognosisoftherealhumans’ behaviourandinformulatingbetterrecommendationsforthefollowedpolicy.

Thepresentarticleaimstosummarizetheachievementsandchallengesaheadof behaviouraleconomicsinachievingitspurposes.Itwouldtrackthesourcesandthe logicofitsdevelopment,wouldpresentitsmainachievementsworldwideandathome andwouldoutlineitsroleandperspectiveswithintheframeofmoderneconomic sciencesandthestategoverningpractice.

Another random document with no related content on Scribd:

been so much approved, that we can recommend it with some confidence, as it stands. Modern taste would perhaps be rather in favour of rich brown gravy and thick tomata sauce, or sauce poivrade.

82. A deep oblong dish of suitable size seems better adapted to this purpose.

In dishing the pig lay the body flat in the middle, and the head and ears at the ends and sides. When very pure oil can be obtained, it is preferable to butter for the basting: it should be laid on with a bunch of feathers. A pig of three weeks old is considered as best suited to the table, and it should always be dressed if possible the day it is killed.

1-1/4 to 1-3/4 hour.

BAKED PIG.

Prepare the pig exactly as for roasting; truss, and place it in the dish in which it is to be sent to the oven, and anoint it thickly in every part with white of egg which has been slightly beaten; it will require no basting, nor further attention of any kind, and will be well crisped by this process.

PIG À LA TARTARE

When the shoulders of a cold roast pig are left entire, take them off with care, remove the skin, trim them into good form, dip them into clarified butter or very pure salad oil, then into fine crumbs highly seasoned with cayenne and mixed with about a half-teaspoonful of salt. Broil them over a clear brisk fire, and send them quickly to table, as soon as they are heated through and equally browned, with tomata sauce, or sauce Robert. Curried crumbs and a currie-sauce will give an excellent variety of this dish; and savoury herbs with two or three eschalots chopped small together, and mixed with the bread-crumbs, and brown eschalot sauce to accompany the broil, will likewise be an acceptable one to many tastes.

SUCKING PIG EN BLANQUETTE. (ENTRÉE.)

Raise the flesh from the bones of a cold roast pig, free it from the crisp outer skin or crackling, and cut it down into small handsome slices. Dissolve a bit of butter the size of an egg, and throw in a handful of button-mushrooms, cleaned and sliced; shake these over the fire for three or four minutes, then stir to them a dessertspoonful of flour and continue to shake or toss them gently, but do not allow them to brown. Add a small bunch of parsley, a bay-leaf, a middlingsized blade of mace, some salt, a small quantity of cayenne or white pepper, half a pint of good veal or beef broth, and from two to three glasses of light white wine. Let these boil gently until reduced nearly one third; take out the parsley and mace, lay in the meat, and bring it slowly to the point of simmering; stir to it the beaten yolks of three fresh eggs, and the strained juice of half a lemon Serve the blanquette very hot.

TO ROAST PORK.

When the skin is left on the joint which is to be roasted, it must be scored in narrow strips of equal width, before it is put to the fire, and laid at a considerable distance from it at first, that the meat may be heated through before the skin hardens or begins to brown; it must never stand still for an instant, and the basting should be constant. Pork is not at the present day much served at very good tables, particularly in this form; and it is so still less with the old savoury stuffing of sage and onions, though some eaters like it always with the leg: when it is ordered for this joint, therefore prepare it as directed for a goose, at page 160, and after having loosened the skin from the knuckle, insert as much as can well be secured in it. A little clarified butter or salad oil may be brushed over the skin quite at first, particularly should the meat not be very fat, but unless remarkably lean, it will speedily yield sufficient dripping to baste it with. Joints from which the fat has been pared, will require of course far less roasting than those on which the crackling is retained. Brown gravy, and apple or tomata sauce, are the usual accompaniments to all roasts of pork except a sucking pig; they should always be thoroughly cooked.

Leg of pork of 8 lbs., 3 hours; loin of from 5 to 6 lbs., with the skin on, 2 to 2-1/2 hours; spare rib of 6 to 7 lbs., 1-1/2 hour.

TO ROAST A SADDLE OF PORK.

The skin of this joint may be removed entirely, but if left on it must be scored lengthwise, or in the direction in which it will be carved. The pork should be young, of fine quality, and of moderate size. Roast it very carefully, either by the directions given in the preceding receipt, or when the skin is taken off, by those for a saddle of mutton, allowing in the latter case from three quarters of an hour to a full hour more of the fire for it in proportion to its weight. Serve it with good brown gravy and tomata sauce, or sauce Robert; or with apple sauce should it be preferred. 20 minutes to the pound, quite [TN: text missing.]

TO BROIL OR FRY PORK CUTLETS.

Cut them about half an inch thick from a delicate loin of pork, trim them into neat form, and take off part of the fat, or the whole of it when it is not liked; dredge a little pepper or cayenne upon them, and broil them over a clear and moderate fire from fifteen to eighteen minutes: sprinkle a little fine salt upon them just before they are dished. They may be dipped into egg and then into bread-crumbs mixed with minced sage, and finished in the usual way.[83] When fried, flour them well, and season them with salt and pepper first. Serve them with gravy in the pan, or with sauce Robert.

83 If broiled, with the addition of these a little clarified butter must be added to the egg, or sprinkled on the cutlets

COBBETT’S RECEIPT FOR CURING BACON.

“All other parts being taken away, the two sides that remain, and which are called flitches, are to be cured for bacon. They are first rubbed with salt on their inside, or flesh sides, then placed one on the other, the flesh sides uppermost in a salting trough, which has a gutter round its edges to drain away the brine; for to have sweet and fine bacon, the flitches must not be sopping in brine, which gives it the sort of taste that barrel-pork and sea-junk have, and than which is nothing more villainous. Everyone knows how different is the taste of fresh dry salt from that of salt in a dissolved state. Therefore, change the salt often; once in four or five days. Let it melt and sink in, but let it not lie too long. Change the flitches, put that at the bottom which was first on the top. Do this a couple of times. This mode will cost you a great deal more in salt than the sopping mode; but without it your bacon will not be so sweet and fine, nor keep so well. As to the time required for making the flitches sufficiently salt, it depends on circumstances; the thickness of the flitch, the state of the weather, the place wherein the salting is going on. It takes a longer time for a thick than for a thin flitch; it takes longer in dry than in damp weather, it takes longer in a dry than in a damp place. But for the flitches of a hog of five score, in weather not very dry or very damp, about six weeks may do; and as yours is to be fat, which receives little injury from over-salting, give time enough; for you are to have bacon till Christmas comes again. The place for salting should, like a dairy, always be cool, but always admit of a free circulation of air; confined air, though cool, will taint meat sooner than the midday sun accompanied with a breeze. With regard to smoking the bacon, two precautions are necessary: first to hang the flitches where no rain comes down upon them, and next, that the smoke must proceed from wood, not peat, turf, nor coal. As to the time that it requires to smoke a flitch, it must depend a good deal upon whether there be a constant fire beneath, and whether the fire be large or small. A month will do if the fire be pretty constant, and such as a farm house fire usually is. But oversmoking, or rather, too

long hanging in the air, makes the bacon rust Great attention should, therefore, be paid to this matter. The flitch ought not to be dried up to the hardness of a board, and yet it ought to be perfectly dry. Before you hang it up, lay it on the floor, scatter the flesh-side pretty thickly over with bran or with some fine saw-dust, not of deal or fir. Rub it on the flesh, or pat it well down upon it. This keeps the smoke from getting into the little openings, and makes a sort of crust to be dried on.

“To keep the bacon sweet and good, and free from hoppers, sift fine some clean and dry wood-ashes. Put some at the bottom of a box or chest long enough to hold a flitch of bacon. Lay in one flitch; and then put in more ashes, then another flitch, and cover this with six or eight inches of the ashes. The place where the box or chest is kept ought to be dry, and should the ashes become damp they should be put in the fire-place to dry, and when cold, put back again. With these precautions the bacon will be as good at the end of the year as on the first day.”

Obs.—Although the preceding directions for curing the bacon are a little vague as regards the proportions of salt and pork, we think those for its after-management will be acceptable to many of our readers, as in our damp climate it is often a matter of great difficulty to preserve hams and bacon through the year from rust.

A GENUINE YORKSHIRE RECEIPT FOR CURING HAMS AND BACON.

“Let the swine be put up to fast for twenty-four hours before they are killed (and observe that neither a time of severe frost, nor very damp weather, is favourable for curing bacon). After a pig has been killed and scalded, let it hang twelve hours before it is cut up, then for every stone or fourteen pounds’ weight of the meat, take one pound of salt, an ounce and a quarter of saltpeter, and half an ounce of coarse sugar. Rub the sugar and saltpetre first into the fleshy parts of the pork, and remove carefully with a fork any extravasated blood that may appear on it, together with the broken vessels adjoining; apply the salt especially to those parts, as well as to the shank-ends of the hams, and any other portions of the flesh that are more particularly exposed. Before the salt is added to the meat, warm it a little before the fire, and use only a part of it in the first instance; then, as it dissolves, or is absorbed by the meat, add the remainder at several different times. Let the meat in the meanwhile lie either on clean straw, or on a cold brick or stone floor: it will require from a fortnight to three weeks’ curing, according to the state of the atmosphere. When done, hang it in a cool dry place, where there is a thorough current of air, and let it remain there until it is perfectly dry, when the salt will be found to have crystallized upon the surface. The meat may then be removed to your store, and kept in a close chest, surrounded with clean outer straw. If very large, the hams will not be in perfection in less than twelve months from the time of their being stored.”

Pork 20 stone; salt, 20 lbs.; saltpetre, 20 oz.; sugar, 10 oz.; 14 to 21 days.

KENTISH MODE OF CUTTING UP AND CURING A PIG.

To a porker of sixteen stone Kentish weight (that is to say, eight pounds to the stone, or nine stone two pounds of common weight), allow two gallons of salt, two pounds of saltpetre, one pound of coarse sugar, and two pounds of bay-salt well dried and reduced to powder. Put aside the hams and cheeks to be cured by themselves; let the feet, ears, tail, and eye-parts of the head be salted for immediate eating; the blade-bones, and ends of the loins and ribs reserved for sausage-meat should it be wanted, and the loin and spare-ribs for roasting. Divide and salt the remainder thus: Mix well together the saltpetre, sugar, and bay-salt, and rub the pork gently with them in every part; cover the bottom of the pickling tub with salt, and pack in the pork as closely as possible, with a portion of the remaining salt between each layer. A very little water is sometimes sprinkled in to facilitate the dissolving of the salt into a brine, but this is always better avoided, and in damp weather will not be needed. If in a fortnight it should not have risen, so as almost entirely to cover the meat, boil a strong brine of salt, saltpetre, sugar, and bay-salt; let it remain until perfectly cold, and then pour it over the pork. A board, with a heavy stone weight upon it, should be kept upon the meat to force it down under the brine. In from three to four months it will be fit for table, and will be delicate and excellent pickled pork.

The pickling parts of a porker of sixteen stone (Kentish weight, or nine stone two pounds of common weight, or fourteen pounds to the stone); common salt, 2 gallons; saltpetre, 2 lbs.; coarse sugar, 1 lb.: bay-salt, 2 lbs.

FRENCH BACON FOR LARDING.

Cut the bacon from the pig with as little lean to it as possible. Rub it well in every part with salt which has been dried, reduced to powder, and sifted; put the layers of bacon close against and upon each other, in a shallow wooden trough, and set in a cool, but not a damp cellar; add more salt all round the bacon, and lay a board, with a very heavy weight upon it. Let it remain for six weeks, then hang it up in a dry and airy place.

Pork, 14 lbs.; salt, 14 oz.: 6 weeks.

TO PICKLE CHEEKS OF BACON AND HAMS.

One pound of common salt, one pound of the coarsest sugar, and one ounce of saltpetre, in fine powder, to each stone (fourteen pounds) of the meat will answer this purpose extremely well. An ounce of black pepper can be added, if liked, and when less sugar is preferred, the proportion can be diminished one half, and the quantity of salt as much increased. Bacon also may be cured by this receipt, or by the Bordyke one for hams. A month is sufficient time for the salting, unless the pork be very large, when five weeks must be allowed for a ham. The ingredients should be well mixed, and all applied at the same time.

To each 14 lbs. of pork, salt, 1 lb.; coarse sugar, 1 lb.; saltpetre, 1 oz.; pepper (if used), 1 oz.: 4 to 5 weeks.

MONSIEUR UDE’s RECEIPT, HAMS SUPERIOR TO WESTPHALIA.

(Excellent.)

“Take the hams as soon as the pig is sufficiently cold to be cut up, rub them well with common salt, and leave them for three days to drain; throw away the brine, and for a couple of hams of from fifteen to eighteen pounds weight, mix together two ounces of saltpetre, a pound of coarse sugar, and a pound of common salt; rub the hams in every part with these, lay them into deep pickling-pans with the rind downwards, and keep them for three days well covered with the salt and sugar; then pour over them a bottle of good vinegar, and turn them in the brine, and baste them with it daily for a month; drain them well, rub them with bran, and let them be hung for a month high in a chimney over a wood-fire to be smoked.”

Hams, of from 15 to 18 lbs. each, 2; to drain 3 days. Common salt, and coarse sugar, each 1 lb.; saltpetre, 2 oz.: 3 days. Vinegar, 1 bottle: 1 month. To be smoked 1 month.

Obs.—Such of our readers as shall make trial of this admirable receipt, will acknowledge, we doubt not, that the hams thus cured are in reality superior to those of Westphalia. It was originally given to the public by the celebrated French cook, Monsieur Ude. He directs that the hams when smoked should be hung as high as possible from the fire, that the fat may not be melted; a very necessary precaution, as the mode of their being cured renders it peculiarly liable to do so. This, indeed, is somewhat perceptible in the cooking, which ought, therefore, to be conducted with especial care. The hams should be very softly simmered,[84] and not overdone. They should be large, and of finely-fed pork, or the receipt will not answer. We give the result of our first trial of it, which was perfectly successful, the ham cured by it being of the finest possible flavour.

84 We have not had the trial made ourselves, but we think they would be even finer baked than boiled.

Leg of Suffolk farm-house pork, 14 to 15 lbs.; saltpetre, 1-1/4 oz.; strong coarse salt, 6 oz.; coarse sugar, 8 oz.: 3 days. Fine whitewine vinegar, 1 pint. In pickle, turned daily, 1 month. Smoked over wood, 1 month.

Obs.—“When two hams are pickled together, a smaller proportion of the ingredients is required for each, than for one which is cured by itself.”

SUPER-EXCELLENT BACON.

For several successive years, after first testing the above receipt, we had it adopted for curing bacon, with even more highly satisfactory results, as it was of incomparable flavour, and remained good for a great length of time, the vinegar preserving it entirely from becoming rusted. Well-fed pork of delicate size was always used for it, and excellent vinegar. The ingredients were added in the proportions given in the receipt for the Suffolk ham which preceeds this, and the same time was allowed for the salting and smoking.

HAMS.

(Bordyke Receipt.)

After the hams have been rubbed with salt, and well drained from the brine, according to our previous directions, take, for each fourteen pounds weight of the pork, one ounce of saltpetre in fine powder mixed with three ounces of very brown sugar; rub the meat in every part with these, and let it remain some hours, then cover it well with eight ounces of bay-salt, dried and pounded, and mixed with four ounces of common salt: in four days add one pound of treacle, and keep the hams turned daily, and well basted with the pickle for a month. Hang them up to drain for a night, fold them in brown paper, and send them to be smoked for a month. An ounce of ground black pepper is often mixed with the saltpetre in this receipt, and three ounces of bruised juniper-berries are rubbed on to the meat before the salt is added, when hams of a very high flavour are desired.

Ham, 14 lbs.; saltpetre, 1 oz.; coarse sugar, 3 oz.: 8 to 12 hours. Bay-salt, 1/2 lb.; common salt, 4 oz.: 4 days. Treacle, 1 lb.: 1 month. To heighten flavour, black pepper, 1 oz; juniper-berries, 3 oz.

TO BOIL A HAM.

The degree of soaking which must be given to a ham before it is boiled, must depend both on the manner in which it has been cured, and on its age. If highly salted, hard, and old, a day and night, or even longer, may be requisite to dilate the pores sufficiently, and to extract a portion of the salt. To do either effectually the water must be several times changed during the steeping. We generally find hams cured by any of the receipts which we have given in this chapter quite enough soaked in twelve hours; and they are more frequently laid into water only early in the morning of the day on which they are boiled. Those pickled by Monsieur Ude’s receipt need much less steeping than any others. After the ham has been scraped, or brushed, as clean as possible, pare away lightly any part which, from being blackened or rusty, would disfigure it; though it is better not to cut the flesh at all unless it be really requisite for the good appearance of the joint. Lay it into a ham-kettle, or into any other vessel of a similar form, and cover it plentifully with cold water; bring it very slowly to boil, and clear off carefully the scum which will be thrown up in great abundance. So soon as the water has been cleared from this, draw back the pan quite to the edge of the stove, that the ham may be simmered softly but steadily, until it is tender. On no account allow it to boil fast. A bunch of herbs and three or four carrots, thrown in directly after the water has been skimmed, will improve it. When it can be probed very easily with a sharp skewer, or larding-pin, lift it out, strip off the skin, and should there be an oven at hand, set it in for a few minutes after having laid it on a drainer; strew fine raspings over it, or grate a hard-toasted crust, or sift upon it the prepared bread of Chapter V., unless it is to be glazed, when neither of these must be used.

Small ham, 3-1/2 to 4 hours; moderate sized, 4 to 4-1/2 hours; very large, 5 to 5-1/2 hours.

Obs.—We have seen the following manner of boiling a ham recommended, but we have not tried it:—“Put into the water in which it is to be boiled, a quart of old cider and a pint of vinegar, a large

bunch of sweet herbs, and a bay leaf. When it is two-thirds done, skin, cover it with raspings, and set it in an oven until it is done enough: it will prove incomparably superior to a ham boiled in the usual way.”

TO GARNISH AND ORNAMENT HAMS IN VARIOUS WAYS.

When a ham has been carefully and delicately boiled, the rind while it is still warm, may be carved in various fanciful shapes to decorate it; and a portion of it left round the knuckle in a semicircular form of four or five inches deep, may at all times be easily scollopped at the edge or cut into points (vandykes). This, while preserving a character of complete simplicity for the dish, will give it an air of neatness and finish at a slight cost of time and trouble. A paper frill should be placed round the bone.

The Germans cut the ham-rind after it has been stripped from the joint, into small leaves and similar “prettinesses,”[85] and arrange them in a garland, or other approved device, upon its surface. In Ireland and elsewhere, bread evenly sliced, and stamped out with cutters much smaller than a fourpenny-piece, then carefully fried or coloured in the oven, is used to form designs upon hams after they are glazed. Large dice of clear firm savoury jelly form their most appropriate garnish, because they are intended to be eaten with them. For the manner of making this, and glaze also see Chapter IV.

85. This should be done with a confectionary or paste cutter.

The ham shown in Plate V., which follows the directions for “Carving,” is of very good appearance; but in common English kitchens generally, even the degree of artistic skill required to form its decorations well, is not often to be met with.

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.