scholarly journals The essence and structure of the concept "information competence of future navigation and ship handling specialists"

Author(s):  
Viktoria KRAMARENKO ◽  

The article highlights the essence and structure of the concept of "information competence of future specialists in navigation and ship handling". It is proved that information competence of a specialist in navigation and ship handling involves the ability to work with large volumes of information to solve complex problems of professional activity and is an important factor in the success of professional activity. Taking into account the scientific works on the formation of information competence and peculiarities of the professional activity of a specialist in navigation and ship handling their information competence can be defined as an integrative personal quality, encompassing motivation for information activity, conscious attitude and interest in navigational information, knowledge of the types of information activities of a navigator, assignment and composition of the navigation information system, the ability to search for necessary information, understand information flows and communications, make optimal use of all navigational data, to carry out information and analytical processing of information relating to ship handling systems, navigation information resources and information security systems. The components of information competence of a specialist in navigation and ship handling service are motivational-personal, information-cognitive and activity-operational. Motivational and personal component concerns motivation to information activity, conscious attitude and interest in navigation information, readiness to work with different types of navigation information and to constantly improve the level of information competence. The information-cognitive component of information competence of a navigation and ship handling specialist covers the knowledge of types of information activities of a navigator, assignment and composition of navigation information system, formalized methods of analytical-synthetic information processing, peculiarities of various objects analysis, work with electronic format of information representation, information on methods and algorithms of electronic databases and data banks creation, distribution and acquisition of information in a group. The activity-operational component of information competence of future navigation and ship handling specialists concerns the most important abilities and skills of working with information, i.e. the ability of a navigator to perform information-analytical processing of information related to ship handling systems, management of navigation information resources, information security systems. Key words: information competence, cadet, navigation and ship handling specialist, motivational-personal, information-cognitive and activity-operational components.

2020 ◽  
pp. 57-70
Author(s):  
L.H. Rudenko ◽  
◽  
A.I. Bochkovska ◽  
K.A. Polyvach ◽  
V.S. Chabaniuk ◽  
...  

The purpose of the publication is to highlight the main results of the development of the first Ukrainian interactive atlas “Population of Ukraine and its natural and cultural heritage”. It was created in accordance with the Memorandum of Cooperation between the NAS of Ukraine and the Ministry of Culture and Information Policy of Ukraine. According to analysis of previous researches, there have been no attempts to map the complex and long-term processes of interaction between the population and its natural and cultural heritage so far in Ukraine and abroad. The Atlas provides knowledge and information about the historical stages of development of the population of Ukraine and the formation of its cultural and natural heritage in the following sections: 1. Ukraine in the European space - 3 maps; 2. Population - the subject of heritage formation - 57 maps; 3. Natural and cultural heritage - 28 maps; 4. Protection, preservation, restoration and using of natural and cultural heritage - 9 maps. The Atlas was developed using the updated AtlasSF Atlas Solutions Framework, one of the previous versions of which was used to create the Electronic version of the National Atlas of Ukraine. The modern architecture of AtlasSF allows integrating the developed atlas both in the atlas information system, and in the atlas geoinformation system of cultural heritage. All types of information resources were used to create the Atlas: maps, texts, photos, statistics. The interactive atlas contains 97 vector maps, texts, photos and tables.


Author(s):  
S. Voronkova

The article discusses ways to obtain information about risk factors and the health status of the population. The article describes a new information system «labor Medicine», which allows to organize the collection of a wide range of data for further analysis and application in the activities of various Executive authorities, public organizations, foundations, legal entities and citizens. It is proposed to improve this system by expanding the types of information collected, creating a passport for health promotion organizations, as well as integration with systems that are being implemented in the Russian Federation for managing the health of the working-age population in the context of state policy in the field of Informatization.


Author(s):  
Bogdan Korniyenko ◽  
Lilia Galata

In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluation of the vulnerabilities for the automated system, their advantages and disadvantages, for the possibility of further comparison of the spent resources and the security of the information system, the conclusion was made regarding the deter­ mi­ nation of the optimal method of testing the information security system in the context of the simulated polygon for the protection of critical information resources. A simula­ tion ground for the protection of critical information resources based on GNS3 application software has been developed and implemented. Among the considered methods of testing and risk analysis of the automated system, the optimal iRisk methodology was identified for testing the information security system on the basis of the simulated. The quantitative method Risk for security estimation is considered. Generalized iRisk risk assessment is calculated taking into account the following parameters: Vulnerabili­ ty  — vulnerability assessment, Threat — threat assessment, Control — assessment of security measures. The methodology includes a common CVSS vul­ nerability assessment system, which allows you to use constantly relevant coefficients for the calculation of vulnerabilities, as well as have a list of all major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known software and hardware vulnerabilities of the ground are considered and the resistance of the built network to specific threats by the iRisk method is calculated.


2021 ◽  
Vol 30 (5) ◽  
pp. 444-453
Author(s):  
M. Teresa Bajo ◽  
Carlos J. Gómez-Ariza ◽  
Alejandra Marful

Knowledge in memory is vast and not always relevant to the task at hand. Recent views suggest that the human cognitive system has evolved so that it includes goal-driven control mechanisms to regulate the level of activation of specific pieces of knowledge and make distracting or unwanted information in memory less accessible. This operation is primarily directed to facilitate the use of task-relevant knowledge. However, these control processes may also have side effects on performance in a variety of situations when the task at hand partly relies on access to suppressed information. In this article, we show that various types of information to be used in a variety of different contexts (problem solving, decision making based on personal information, language production) may be the target of inhibitory control. We also show that the control process may leave a behavioral signature if suppressed information turns out to be relevant shortly after being suppressed.


2012 ◽  
Vol 446-449 ◽  
pp. 3529-3533
Author(s):  
Ruo Qi Xu ◽  
Hua Peng ◽  
Deng Rong Zhang ◽  
Chu Dong Huang ◽  
Ying Hao Li ◽  
...  

Ancient architectures have always been of great interest to a variety of studies. In this analysis, the distribution of ancient architectures in Taizhou, Zhejiang Province is investigated. In each area of the distribution, the characteristic of the ancient architectures are recorded, such as story number, building materials, construction time, etc. The various types of information are then input into a GIS (Geographic Information System) database, which also contains some typical images of the ancient architectures. Some of the data are from GoogleEarth or archived CAD (Computer Aided Design) files. Consequently, the distribution and characteristic of ancient architectures are analyzed consulting the GIS map and attribute table. Although the ancient architectures are similar in Taizhou, Zhejiang Province, there exist some notable differences. The commonness and differences would be significative for the preservation and planning for ancient architectures.


Author(s):  
J. Zhang ◽  
H. Zhang ◽  
C. Wang

TIANDITU (Map World) is the public version of the National Platform for Common Geospatial Information Service, and the travelling channel is TIANDITU-based geographic information platform for travelling service. With the development of tourism, traditional ways for providing travelling information cannot meet the needs of travelers. As such, the travelling channel of TIANDITU focuses on providing travel information abundantly and precisely, which integrated the geographic information data of TIANDITU Version 2.0 and the authoritative information resources from China National Tourism Administration. Furthermore, spatial positioning, category and information query of various travelling information were offered for the public in the travelling channel. This research mainly involves three important parts: the system design, key technologies of the system design and application examples. Firstly, this paper introduced the design of TIANDITU-based geographic information system for travelling service, and the general and database design were described in detail. The designs for general, database and travelling service above should consider lots of factors which illustrated in the paper in order to guarantee the efficient service. The process of system construction, the content of geographic information for travelling and system functions of geographic information for travelling are also proposed via diagram in this part. Then several key technologies were discussed, including the travelling information integration for main node and among nodes, general architecture design and management system for travelling channel, web portals and system interface. From the perspective of main technologies, this part describes how TIANDITU travelling channel can realize various functions and reach the requirements from different users. Finally, three application examples about travelling information query were listed shortly. The functions and search results are shown clearly in this part. In all, TIANDITU-based geographic information system for travelling service aimed to integrate the travelling information resources from national, provincial and municipal levels, and finally realized to provide "one stop" travelling service for users in the end.


Author(s):  
Hongbo Lv ◽  
Zhiying Zhou

With the wide use of smartphones, mobile cyber has become an indispensable part of our lives. While smartphones are used almost every aspect of our lives, awareness of personal information protection is underdeveloped, and information leak has become one particular problem on mobile cyber. At the same time, personal information resources have become more valuable than ever. This chapter investigates users' attitudes toward cyber information leakage and methods to protect personal information. The software SPSS 19 was used to analysis the relationship among cyber environment, applicability and practicability of protection methods, economic cost, and overall evaluation (satisfaction). A suggestion that may promote personal information awareness and promote cyber security from technical, legal, and social aspects is also provided.


Author(s):  
Judit Olah ◽  
Ole Axvig

In a modern enterprise environment, many information resources are available to people working to produce valuable output. Due to technology proliferation, remote work access, and multiple geographical locations generating their own solutions for local infrastructure challenges, as well as the fact that modern professionals are tasked to make decisions autonomously, it is not self-evident what types of information resources could or should be accessed in what order in order to move processes towards the desired product outcome. Our integrated model was developed using the results of an empirical study. The model puts a user-centered focus on business process model building by mapping all information interactions surrounding the business processes (i.e. creation, storage, management, retrieval of documents/ contents as well as information and data). The model characterizes the business processes by types of information interaction, analyzes process phases by those interactions and evaluates actual locations of information content extractions.


Sign in / Sign up

Export Citation Format

Share Document