Political Science and Security Studies Journal
http://psssj.eu/index.php/ojsdata
<p>The <em data-start="188" data-end="236">Political Science and Security Studies Journal</em> is an international, peer-reviewed academic journal that provides a pluralistic platform for advancing theoretical and empirical research in security studies, defense policy, and geopolitics. The journal focuses on contemporary challenges to national, regional, and global security, including military strategy, defense governance, international security architectures, hybrid and asymmetric threats, and the political economy of security. In support of interdisciplinary inquiry, the journal also welcomes contributions from related fields such as political science, international relations, economics, law, sociology, and data-driven security analysis.</p>High School of the Social and Economicen-USPolitical Science and Security Studies Journal2719-6410<p>The authors agree with the following conditions:</p> <p>1. Authors retain copyright and grant the journal right of first publication (<strong>Download agreement</strong>) with the work simultaneously licensed under a <a href="http://creativecommons.org/licenses/by/3.0/" target="_new">Creative Commons Attribution License</a> that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.</p> <p>2. Authors have the right to complete individual additional agreements for the non-exclusive spreading of the journal’s published version of the work (for example, to post work in the electronic repository of the institution or to publish it as part of a monograph), with the reference to the first publication of the work in this journal.</p> <p>3. Journal’s politics allows and encourages the placement on the Internet (for example, in the repositories of institutions, personal websites, <a href="https://www.ssrn.com/en/" target="_blank" rel="noopener">SSRN</a>, <a href="https://www.researchgate.net/" target="_blank" rel="noopener">ResearchGate</a>, <a href="https://mpra.ub.uni-muenchen.de/" target="_blank" rel="noopener">MPRA</a>, <a href="https://www.gesis.org/ssoar/home/" target="_blank" rel="noopener">SSOAR</a>, etc.) manuscript of the work by the authors, before and during the process of viewing it by this journal, because it can lead to a productive research discussion and positively affect the efficiency and dynamics of citing the published work (see <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4837983/" target="_blank" rel="noopener">The Effect of Open Access</a>).</p>Key Aspects of Spreading and Creating Disinformation Using Artificial Intelligence
http://psssj.eu/index.php/ojsdata/article/view/227
<p>The article examines the transformation of mechanisms for the creation and dissemination of disinformation under conditions of the active integration of artificial intelligence technologies into the information and communication space. It substantiates that the development of generative models, particularly large language models and deep learning systems, significantly increases the scale, speed, and persuasiveness of information and psychological influence. It is established that artificial intelligence not only automates the production of fake content but also enables its personalization, adaptation to the characteristics of target audiences, and integration into social media through bots and algorithmic systems.</p> <p>The study analyzes key artificial intelligence tools used for disinformation (language models, deepfake technologies, and systems for voice and image synthesis), as well as their functional capabilities in the context of cognitive warfare. It is determined that the critical factors intensifying disinformation include the accessibility of technologies, reduced costs of information operations, and the phenomenon of “truth decay,” which erodes trust in all sources of information.</p> <p>Based on the analysis of empirical studies, it is demonstrated that artificial intelligence -generated content can match or even surpass traditional propaganda in terms of persuasiveness. At the same time, a potential negative impact of AI on human cognitive abilities is identified, particularly a decline in critical thinking.</p> <p>It is concluded that the use of artificial intelligence in disinformation constitutes a systemic threat to information security and requires the development of comprehensive interdisciplinary countermeasures, including legal regulation, technological solutions, and the enhancement of media literacy.</p>Oleksandr Kin
Copyright (c) 2026 Oleksandr Kin
https://creativecommons.org/licenses/by/4.0/
2026-03-312026-03-31711810.33445/psssj.2026.7.1.1Efficiency and Effectiveness of Western Nigeria Security Network (Amotekun) and Insecurity in Southwest, Nigeria
http://psssj.eu/index.php/ojsdata/article/view/221
<p>The study aims to assess the efficiency and effectiveness of the Western Nigeria Security Network (WNSN), known as “Amotekun,” in addressing insecurity in Southwest Nigeria. The research is grounded in the social contract theory, which provides a theoretical framework for understanding the relationship between the state and citizens in ensuring security. A survey research design was employed. Primary data were collected using a structured questionnaire, and a multi-stage sampling technique was employed to select respondents. The study population comprised 16,131,900 individuals across three states (Ogun, Osun, and Ondo), and the sample size (n = 400) was determined using the Taro Yamane formula at a 5% level of precision (e = 0.05).Data analysis involved descriptive statistics and chi-square (χ²) tests for hypothesis testing at a 0.05 significance level, while secondary data were analysed using content analysis. The findings reveal a statistically significant relationship between WNSN activities and perceived changes in insecurity in Southwest Nigeria. However, the effectiveness of WNSN is assessed as partial, indicating that its capacity to fully address security challenges remains limited. The study recommends increased funding, enhanced inter-agency collaboration, and continuous training and retraining of personnel to improve the operational effectiveness of WNSN in addressing security challenges in the region.</p>Ayodeji AwopejuOdeyemi AbimbolaKayode Olamiji Rasheed
Copyright (c) 2026 Ayodeji Awopeju, Odeyemi Abimbola, Kayode Olamiji Rasheed
https://creativecommons.org/licenses/by/4.0/
2026-03-312026-03-317192010.33445/psssj.2026.7.1.2Agents of Influence as an Important Tool in Promoting State’s National Interests
http://psssj.eu/index.php/ojsdata/article/view/226
<p>This study examines the concept, functions, and strategic significance of agents of influence as an instrument of promoting state national interests within the framework of contemporary influence operations. Based on a combination of historical-comparative analysis and review of existing scholarly approaches, the paper systematizes the definitional interpretations of “agent of influence” and identifies their role in the intelligence activities of leading states. The research demonstrates that agents of influence differ from traditional intelligence assets by operating predominantly within legal frameworks and targeting decision-making processes and public opinion rather than acquiring classified information. Particular attention is paid to professional categories most susceptible to recruitment, including political elites, media representatives, academics, and public figures. Empirical evidence from historical cases (World Wars, post-colonial Africa) and contemporary examples illustrates the dual nature of influence agents, whose activities may either stabilize or destabilize political systems depending on strategic objectives. The study highlights the extensive use of such agents by the Russian Federation as part of hybrid warfare against Ukraine, including pre-2014 infiltration into political, economic, and security institutions. The findings confirm that agents of influence constitute a critical element of modern influence operations, enabling adversaries to shape narratives, undermine institutional resilience, and facilitate strategic objectives without direct military engagement. The paper concludes that countering such threats requires not only intelligence measures but also institutional resilience, regulatory adaptation, and societal awareness.</p>Oleh KorobeinykDenys PantitovHeorgii Samarets
Copyright (c) 2026 Oleh Korobeinyk, Denys Pantitov, Heorgii Samarets
https://creativecommons.org/licenses/by/4.0/
2026-03-312026-03-3171212710.33445/psssj.2026.7.1.3Transformation of Intelligence Activities in Contemporary Conditions
http://psssj.eu/index.php/ojsdata/article/view/228
<p>The article examines the transformation of intelligence activities in the context of contemporary global security changes driven by intensified geopolitical competition, digitalization, and the impact of the full-scale war in Ukraine. The purpose of the article is to clarify the essence of intelligence activities under modern conditions and to identify the key directions of their transformation. The methodological framework is based on systemic, comparative, and structural-functional approaches, as well as methods of analysis and synthesis, which enabled a comprehensive assessment of the impact of current challenges on intelligence structures. It is substantiated that the modern security environment is characterized by increasing uncertainty, rapid information dissemination, and the growing complexity of strategic forecasting, which necessitates a revision of traditional approaches to intelligence activities. The key trends in shaping a new international security architecture are identified, including the strengthening role of the United States and China, the intensification of transnational threats, and the emergence of new formats of security alliances. The results of the study reveal the main directions of intelligence transformation: integration of artificial intelligence and big data technologies; use of autonomous systems and satellite-drone complexes; increased cooperation with the private sector; expansion of open-source intelligence; application of strategic declassification tools; development of partnership networks among intelligence agencies; investment in human capital and the formation of new competencies. It is demonstrated that modern intelligence is evolving into a complex, multidisciplinary system focused on integrating diverse data sources and supporting decision-making under time constraints. It is concluded that the transformation of intelligence activities is systemic in nature and encompasses organizational, technological, and cognitive dimensions, requiring the formation of a new paradigm capable of adequately responding to contemporary challenges and threats.</p>Yurii Semeniuk
Copyright (c) 2026 Yurii Semeniuk
https://creativecommons.org/licenses/by/4.0/
2026-04-012026-04-0171283410.33445/psssj.2026.7.1.4Procedure and Criteria for Distribution of Duties Between Personnel of Small Analytical Groups
http://psssj.eu/index.php/ojsdata/article/view/229
<p>The article analyzes Belbin’s model of team roles and the criteria for the allocation of responsibilities, including competence, personal and motivational qualities, and workload. Belbin’s model was applied to examine the specified criteria, and the results made it possible to determine the procedure for distributing responsibilities among members of small analytical groups. It was established that, in order to ensure an effective allocation of responsibilities, a RACI matrix should be developed for a small analytical group in which roles intersect.</p>Serhii StrilchukVolodymyr TaranovOleh Matsovityi
Copyright (c) 2026 Serhii Strilchuk, Volodymyr Taranov, Oleh Matsovityi
https://creativecommons.org/licenses/by/4.0/
2026-03-312026-03-31713510.33445/psssj.2026.7.1.5