scholarly journals CONCEPT OF MANAGEMENT EFFECTIVENESS ESTIMATION IN CORPORATE INFORMATION SYSTEMS OF ENTERPRISES

2016 ◽  
Vol 2016 (1) ◽  
pp. 113-119 ◽  
Author(s):  
Анатолий Якимов ◽  
Anatoliy Yakimov ◽  
Сергей Крутолевич ◽  
Sergey Krutolevich ◽  
Владимир Аверченков ◽  
...  

The investigation concept of organization effectiveness in processes of a corporate information system (CIS) based on a simulation model of the abstract presentation of an industrial enterprise as an object of management, at the level of business-processes, an industrial process and computer network is offered

Author(s):  
Петр Юрьевич Филяк ◽  
Максим Константинович Постников ◽  
Семен Евгеньевич Федоров ◽  
Александр Григорьевич Остапенко ◽  
Андрей Петрович Преображенский

В условиях развития информационного общества (Knowledgeable society - KS) информационные системы стали неотъемлемой частью любой организации, даже самой малой, независимо от реализуемых ими бизнес-процессов. Такие информационные системы принято называть корпоративными информационными системами (КИС), или Corporate Information System (CIS). Особые требования при разработке КИС предъявляются к обеспечению их информационной безопасности, что может быть реализовано путем разработки КИС в защищенном исполнении. Технологии blockchain являются очень перспективными не только при применении их в традиционных сферах - производстве, сервисе, на транспорте, но и для решения проблем безопасности и информационной, в частности. Анализу данной проблемы и подходам к ее решению и посвящена данная статья. At present, in the context of the development of Knowledgeable society, information systems are at now an integral part of any organization, even the smallest, regardless of the business processes they implement. Such information systems are commonly referred to as Corporate Information Systems (CIS). Special requirements for the development of CIS are made to ensure their information security, which can be achieved by developing a protected version of the CIS. In this article is considered the analysis of this problem and approaches to its solution. Block Chain technologies are very promising not only when applying them in traditional spheres - manufacturing, service, transport, but also to solve security and information problems, in particular.


2021 ◽  
Vol 273 ◽  
pp. 07007
Author(s):  
Olesya Golubeva ◽  
Alina Pogorelova

Modern trends in the creation and development of corporate information systems (CIS) are largely determined by their consumer quality. A model of building a corporate information system (CIS) of a universal open architecture is presented. The possibility of using CIS for managing the production processes of a shoe organization is demonstrated.


2021 ◽  
Vol 46 (2) ◽  
Author(s):  
I. S. Galuzin ◽  
◽  
G. G. Naiman

The article analyzes the problem of cybersecurity of corporate information systems and defines the purpose and objectives of their protection. The analysis of technology of management of vulnerabilities of corporate information systems is carried out. Methods and tools for managing vulnerabilities of corporate information systems based on the Qualys solution are studied. The purpose, main functions and composition of Qualys solution software are defined. A variant of managing corporate information system vulnerabilities based on the Qualys solution has been developed.


2018 ◽  
Vol 178 ◽  
pp. 08002
Author(s):  
Andrey Plakhin ◽  
Igor Semenets ◽  
Ekaterina Ogorodnikova ◽  
Denis Mironov

Modern industrial enterprises require more qualitative and indepth approaches to the processing of accounting information and its subsequent use in operational activities. The study presents the research results of current situation over the problem that need to be solved by forming and improving the tools for decision support systems. According to the authors of the article, such a toolkit should be an integral part of the corporate information system along with other vital modules.


2018 ◽  
pp. 6-11 ◽  
Author(s):  
Aleksey Babenko ◽  
Svetlana Kozunova

The level of information security of corporate information systems depends on the security of information assets of the enterprise in which the enterprise information systems are implemented. To protect data processed in corporate information systems, it is advisable to ensure the information security of the system, to identify and predict threats to information security violations. Such measures will ensure effective management of information security and high-quality response to threats in corporate information systems in real time. Thus, the research of threats management and information security of corporate information systems allows the authors to develop a model of threat profile. The difference from the previously proposed models is that the present solution defines the actions that need to be taken when threats are detected and to prevent them. Application of the proposed model will allow implementing special procedures of information security management of the enterprise, using private information security policies for corporate information systems. The authors highlight the key aspects of managing threats to information security of corporate information systems. The vulnerabilities typical for corporate information systems have been allocated. The sources of threats have been formed, and the potential violators have been described. A unique model of the profile of threats to information security for corporate information system has been developed.


Author(s):  
E. A. Sobolev ◽  
A. R. Abdulgalimov ◽  
S. V. Razlivinskaya ◽  
V. F. Kornyushko

The article describes the main aspects concerning the development of the corporate information system for logistics management of petrochemical enterprises. The functional and conceptual models of petrochemical products supply management have been composed. The authors suggest using modular design of an information system based on ERP Galaktika. Advantages of applying the client/server architecture and object-relational data model to corporate information systems are outlined. The authors recommend using ABC/XYZ analysis as the method of classifying inventory by sales and products levels to determine the optimal inventory control strategy.


Author(s):  
А. С. Баканов

В статье предложен способ разработки и визуализации модели межгруппового взаимодействия. Описанный способ основан на использовании когнитивных карт. В настоящее время, благодаря развитию информационных технологий, появилось большое количество корпоративных информационных систем, позволяющих сотрудникам организации осуществлять свою трудовую деятельность удаленно. Однако для повышения эффективности удаленного взаимодействия целесообразно уделять большее внимание способам визуализации и представления удаленного взаимодействия. Предложенная модель межгруппового взаимодействия ориентирована на анализ эффективности трудовой деятельности сотрудников, работающих удаленно с корпоративной информационной системой. The article proposes a method for developing and visualizing a model of intergroup interaction. The described method is based on the use of cognitive maps. Currently, thanks to the development of information technologies, a large number of corporate information systems have appeared that allow employees of the organization to carry out their work remotely. However, to increase the effectiveness of remote interaction, it is advisable to pay more attention to the methods of visualization and presentation of remote interaction. The presented model of intergroup interaction is focused on the analysis of labor efficiency of employees working remotely with a corporate information system.


2021 ◽  
Vol 46 (2) ◽  
Author(s):  
M. V. Volkov ◽  
◽  
O. D. Shapovalenko

A study of the impact of spam messages and modern threats to the process of e-mail exchange of corporate information system. The role of spam and its impact in corporate information systems is studied. The peculiarities of counteraction directions and technologies of providing protection of e-mail against spam are investigated. Based on the research conducted in the work, recommendations for improving the secure e-mail exchange of the corporate information system have been developed.


2016 ◽  
Vol 13 (5) ◽  
pp. 625-628
Author(s):  
I. A. Filozova ◽  
M. V. Bashashin ◽  
V. V. Korenkov ◽  
S. V. Kuniaev ◽  
G. Musulmanbekov ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document