scholarly journals A mathematical model of information security for a mining company

2020 ◽  
Vol 174 ◽  
pp. 04012
Author(s):  
Aleksandr Kirenberg ◽  
Aleksey Medvedev ◽  
Evgeniya Prokopenko

The relationship between the concepts of information and economic security in terms of their use in assessing the efficiency of business planning in a company using standard efficiency indicators (NPV) is discussed in the article. The necessity of using optimization models and methods for solving problems of information and economic security in a company is substantiated. A mathematical model has been developed to minimize the information security risks of a cost-effective company in the form of a two-objective linear optimal control problem. The conclusion is drawn about the possibility of using a mathematical model of information and economic security, as a component in the analysis of the investment attractiveness of economic systems and, in particular, small and medium- sized businesses.

2018 ◽  
Vol 15 (5) ◽  
pp. 6-15
Author(s):  
E. V. Karanina ◽  
T. V. Makarova

The relevance of the regional management of the economic sphere due to the existing economic problems in the country, when the regions are responsible for the significant part of the socio- economic obligations to the population. Therefore, proper management of the economy of the region depends on the well-being of the population, development of regional infrastructure, the possibility of further economic growth and development, social stability in society. Sustainable development of regional socio-economic systems is impossible without an adequate level of economic security of the region. The level of economic security of the region is primarily assessment of the socio-economic processes that reflect the essence of economic security, consisting of a set of interrelated indicators. According to most economists, analyzing the economic security issues, forming the basis of this set of indicators acts as a close relationship with the concept of security risk category and category of threat.


Risks ◽  
2021 ◽  
Vol 9 (7) ◽  
pp. 133
Author(s):  
Andrey Koltays ◽  
Anton Konev ◽  
Alexander Shelupanov

The need to assess the risks of the trustworthiness of counterparties is increasing every year. The identification of increasing cases of unfair behavior among counterparties only confirms the relevance of this topic. The existing work in the field of information and economic security does not create a reasonable methodology that allows for a comprehensive study and an adequate assessment of a counterparty (for example, a developer company) in the field of software design and development. The purpose of this work is to assess the risks of a counterparty’s trustworthiness in the context of the digital transformation of the economy, which in turn will reduce the risk of offenses and crimes that constitute threats to the security of organizations. This article discusses the main methods used in the construction of a mathematical model for assessing the trustworthiness of a counterparty. The main difficulties in assessing the accuracy and completeness of the model are identified. The use of cross-validation to eliminate difficulties in building a model is described. The developed model, using machine learning methods, gives an accurate result with a small number of compared counterparties, which corresponds to the order of checking a counterparty in a real system. The results of calculations in this model show the possibility of using machine learning methods in assessing the risks of counterparty trustworthiness.


Author(s):  
Volodymyr Dubnytskyi ◽  
Nataliia Naumenko ◽  
Olha Ovcharenko

In modern conditions, the problems of structural transformations of regional economies in the context of digital transformation are one of the current problems. This lies on the fact that managing structural transformations, ensuring the economic component, informatization and introducing the requirements of professional competence into practice is also an important condition for improving the competitiveness of regional socio-economic systems (RSESs). It is shown that it is necessary to achieve a certain information competence at the level of regional socio-economic systems to ensure the training of qualified personnel for the needs of the regional economy and ensure the economic security of the region. The work formulates a list of requirements for the transition of regions to the digital economy. It is clarified that the basic version of the methodology for structural transformations of the region's economy should be supplemented by a list of elements. It is shown that it is necessary to adjust the content of structural transformations of the regional and national economy in the context of digital transformation, taking into account the requirements of the digital economy. The principles of structural transformation are highlighted. The main barriers that hinder structural transformations at the regional level are identified, taking into account the specifics of the structure of the economy of specific regions of Ukraine, and taking into account the requirements of the digital transformation process. The model of ensuring economic and information security of the economic complex of the region in conditions of digital transformation is presented. A variant of ranking of regions by the value of the general index of development of the regional digital innovation subsystem is proposed. A concept model for the formation of a regional innovation and information subsystem for adaptation to the requirements of the digital transformation of RSES is developed. A comprehensive logical model of the functioning of the digital platform of the RSES economic complex is also presented. The main directions of future research in solving the problem of structural transformations of the region's economy in the digital economy are highlighted.


2020 ◽  
Vol 1 (10) ◽  
pp. 36-44
Author(s):  
A. P. SOKOLOV ◽  
◽  
I. G. BOROK ◽  

The article examines aspects of economic security in a period of tough competition, political and economic instability. Enterprises have complete independence in making decisions on determining strategic development, sources of financing, and the choice of counterparties, therefore, it is of paramount importance to resolve issues of risk reduction. The research work analyzes the definitions of the concept of "security" of the territory, industry, enterprise from various points of view, from the standpoint of different scientific directions and disciplines. Economic security should be considered as the state of the economic system, which allows it to develop dynamically, efficiently and solve social problems, since the system is characterized by a set of elements and the peculiarities of the relationships between them. The functioning of economic systems is based on the relationship of various forms, structures and processes of activity in a constantly changing space of market factors.


2021 ◽  
Vol 6 (2 (114)) ◽  
pp. 19-29
Author(s):  
Yuliia Tatarinova ◽  
Olga Sinelnikova

One of the key processes in software development and information security management is the evaluation of vulnerability risks. Analysis and evaluation of vulnerabilities are considered a resource-intensive process that requires high qualifications and a lot of technical information. The main opportunities and drawbacks of existing systems for evaluation of vulnerability risks in software, which include the lack of consideration of the impact of trends and the degree of popularity of vulnerability on the final evaluation, were analyzed. During the study, the following information was analyzed in the structured form: the vector of the general system of vulnerability evaluation, the threat type, the attack vector, the existence of the original code with patches, exploitation programs, and trends. The obtained result made it possible to determine the main independent characteristics, the existence of a correlation between the parameters, the order, and schemes of the relationships between the basic magnitudes that affect the final value of evaluation of vulnerability impact on a system. A dataset with formalized characteristics, as well as expert evaluation for further construction of a mathematical model, was generated. Analysis of various approaches and methods for machine learning for construction of a target model of dynamic risk evaluation was carried out: neuro-fuzzy logic, regression analysis algorithms, neuro-network modeling. A mathematical model of dynamic evaluation of vulnerability risk in software, based on the dynamics of spreading information about a vulnerability in open sources and a multidimensional model with an accuracy of 88.9 %, was developed. Using the obtained model makes it possible to reduce the analysis time from several hours to several minutes and to make a more effective decision regarding the establishment of the order of patch prioritization, to unify the actions of experts, to reduce the cost of managing information security risks


2019 ◽  
pp. 46-64 ◽  
Author(s):  
Vladimir V. Klimanov ◽  
Sofiya М. Kazakova ◽  
Anna A. Mikhaylova

The article examines the impact of various socio-economic and financial indicators on the resilience of Russian regions. For each region, the integral index of resilience is calculated, and its correlation dependence with the selected indicators is revealed. The study confirms the relationship between fiscal resilience and socio-economic resilience of the regions. The analysis of panel data for 75 regions from 2007 to 2016 shows that there are significant differences in the dynamics of indicators in different periods. In particular, the degree of exposure to the negative effects of the crises of 2008—2009 and 2014—2015 in non-resilient regions is higher than in resilient ones.


1998 ◽  
Vol 37 (4II) ◽  
pp. 873-882 ◽  
Author(s):  
Sarfaraz Khan Quershi

Growth in telecom infrastructure and provision of modern telecom services to consumers at a cost based tariff helps growth of national economy. Modern telecoms serve as the engine of growth of national economy. Following the global trends of liberalisation and deregulation in telecoms monopolies which have thus far been providing inefficient communication at a greedily high tariffs are falling apart. Mergers in telecoms are not for increasing the size of the monopoly but to provide more efficient and cost effective services to the consumers. In Pakistan the erstwhile T&T department played a needful role at its time. Conversion of the department into a corporation and then into a company were steps necessary for following the global trends. Need now is to continue this trend further, eliminate the monopolistic approach by allowing more players in the field thus permitting the market forces to decide the provision of better quality of modern services at competitive price.


1991 ◽  
Vol 24 (5) ◽  
pp. 85-96 ◽  
Author(s):  
Qingliang Zhao ◽  
Zijie Zhang

By means of simulated tests of a laboratory–scale oxidation pond model, the relationship between BOD5 and temperature fluctuation was researched. Mathematical modelling for the pond's performance and K1determination were systematically described. The calculation of T–K1–CeCe/Ci) was complex but the problem was solved by utilizing computer technique in the paper, and the mathematical model which could best simulate experiment data was developed. On the basis of experiment results,the concept of plug–ratio–coefficient is also presented. Finally the optimum model recommended here was verified with the field–scale pond data.


2015 ◽  
Vol 9 (1) ◽  
pp. 625-631
Author(s):  
Ma Xiaocheng ◽  
Zhang Haotian ◽  
Cheng Yiqing ◽  
Zhu Lina ◽  
Wu Dan

This paper introduces a mathematical model for Pulse-Width Modulated Amplifier for DC Servo Motor. The relationship between pulse-width modulated (PWM) signal and reference rotation speed is specified, and a general model of motor represented by transfer function is also put forward. When the input signal changes, the rotation speed of the servo motor will change accordingly. By changing zeros and poles, transient performance of this system is discussed in detail, and optimal ranges of the parameters is recommended at the end of discussion.


Sign in / Sign up

Export Citation Format

Share Document