APPLICATION OF GAME-THEORETIC MODELING IN MODERN BUSINESS PROCESSES AND ECONOMICS

2021 ◽  
Vol 1 (1) ◽  
pp. 77-88
Author(s):  
S. V. Zaytsev ◽  

Executives and managers who use business intelligence tools can benefit by using the available information from a game theory perspective to develop a game that is appropriate for their organizations. The results can be much more useful than when the organization maintains the current state of affairs. No particular game theory strategy is perfect, because different situations or problems within an organization must be solved in different unique ways. The bottom line is that game theory can be used very effectively as a decisionmaking tool in political, psychological, economic, personal, or business settings. However, this should not be used as a substitute for common sense when making strategic decisions; it is simply a tool for critical thinking. Game theory only sheds light on why companies behave the way they do, and why they use specific strategies that are accessible through transparency.

2015 ◽  
Vol 12 (2) ◽  
pp. 509-539 ◽  
Author(s):  
Mateja Kocbek ◽  
Gregor Jost ◽  
Marjan Hericko ◽  
Gregor Polancic

Context: With business process modelling, companies and organizations can gain explicit control over their processes. Currently, there are many notations in the area of business process modelling, where Business Process Model and Notation (BPMN) is denoted as the de facto standard. Aims: The aim of this research is to provide the state-of-the-art results addressing the acceptance of BPMN, while also examining the purposes of its usage. Furthermore, the advantages, disadvantages and other interests related to BPMN were also investigated. Method: To achieve these objectives, a Systematic Literature Review (SLR) and a semantic examination of articles? citations was conducted. Results: After completing SLR, out of a total of 852 articles, 31 were deemed relevant. The majority of the articles analyzed the notation and compared it with other modelling techniques. The remainder evaluated general aspects of the notation, e.g. history and versions of the standard, usage of the notation or tools. Conclusion: Our findings demonstrate that there are empirical insights about the level of BPMN acceptance. They suggest that BPMN is still widely perceived as the de facto standard in the process modelling domain and its usage is everincreasing. However, many studies report that only a limited set of elements are commonly used and to this end, several extensions were proposed. The main purpose of BPMN remains the description of business processes.


2019 ◽  
Vol 7 (6) ◽  
pp. 35-40
Author(s):  
Dmitriy Vlasov

The purpose of article is representation of results of construction and a research of model of development of strategic decisions of producers of the electronic educational resources having essential value for formation of the uniform educational environment and digitalization of education. The presented ideas in the field of creation of game-theoretic models and also mechanisms of use Wolfram-of technologies game-theoretic models can be useful to managers in the field of risk to a research, to experts, economists and managers. From the methodical point of view, the presented possibilities of modeling of decisions of producers of electronic educational resources are of interest to improvement of quality of applied mathematical training of future bachelor of economy.


2019 ◽  
Vol 290 ◽  
pp. 07001
Author(s):  
Alexander Aleksakhin ◽  
Ivan Zaytsev ◽  
Evgeniya Eliseeva ◽  
Angelina Petergova ◽  
Luydmila Kostygova

In today markets conditions, the company independently determines their goals and tasks, and chooses the most effective management methods depending on current economic situation. For achieving a stable position in the market, the company needs to improve approaches related to strategic management, in particular, to develop a competitive strategy for providing resources using special economic mechanisms. One of the areas for improving the strategy can be the application of a scientifically based management system to ensure the process of rational procurement of raw materials, which will enable detailed planning of the business processes of the enterprise. Managing the process of rational procurement of raw materials of the necessary components is expedient to implement, using elements of game theory. The models described in this paper allow us to formalize the behavior of companies on the oligopolistic market. It helps to develop recommendations for making strategic decisions for providing raw materials with the necessary components in conditions of uncertainty.


2011 ◽  
Vol 56 ◽  
pp. 73-84
Author(s):  
Jolanta Miliauskaitė ◽  
Albertas Čaplinskas

Straipsnyje aptariami, analizuojami ir vertinami svarbiausi pasiūlymai, kaip spręsti pasaulinio saityno paslaugų kompozicijų skaidymo į modulius uždavinį. Tai yra vienas iš aktualiausių e. verslo sistemų kūrimo uždavinių, kurio neišsprendus neįmanoma adekvačiai apdoroti vykdymo meto įvykių, dinamiškai perplanuoti verslo procesų, atsižvelgti į paslaugų kokybės charakteristikas ir įgyvendinti daugelį kitų svarbių e. verslo sistemos funkcijų. Straipsnyje pateiktas esamos padėties vertinimas ir išryškintos svarbiausios dar neišspręstos problemos, su kuriomis susiduriama skaidant į modulius pasaulinio saityno paslaugų kompozicijas. Tikimasi, kad atlikta analizė bus naudinga visiems šioje srityje dirbantiems mokslininkams ir padės jiems planuoti savo tolesnius tyrimus.Modularization of Web Service CompositionJolanta Miliauskaitė, Albertas Čaplinskas SummaryThe paper discusses, analyzes and evaluates the most important scientific propositions on how to solve the problem of web service composition modularization. This problem is very important in the context of eBusiness systems because it is impossible in such systems to process the run-time events in a flexible way, reconfigure business processes dynamically, to take into account in the service discovery process the quality of services, and to implement effectively many other eBusiness system features without knowing an efficient solution of this problem. The paper discusses the current state of affairs and highlights most important open issues. The authors hope that it will be useful for all researchers involved in the web service studies and helpful when planning their further research.> 


2021 ◽  
Vol 14 (3) ◽  
pp. 305-319
Author(s):  
Marek Kuźmicki ◽  
Kinga Linkiewicz

Abstract Subject and purpose of work: The aim of the article is to define the current state of modern business services sector in Lublin and prospects for development against the background of the largest centers in the country. Materials and methods: Pursuing the main goal, the authors based their study on the literature on the subject, research reports on the market of modern business services and content from industry websites. The analysis covered several modern business service centers operating on the market, the structure of business processes, the level of employment and the level of local specialization of selected cities. Results: The sector of modern business services is developing intensively throughout Poland. Dynamic development is also taking place in Lublin. The city has the largest number of BPO, SSC, IT and R&D centers in eastern Poland. The workplaces in the sector is constantly growing. IT services currently have a particularly large share in the sales structure of Lublin centers. Conclusions: The development of modern business services sector in Lublin is an opportunity for a dynamic economic development of the city and the region.


Chelovek RU ◽  
2020 ◽  
pp. 217-220
Author(s):  
Natalia Rostova ◽  

The article analyzes the current state of affairs in philosophy in relation to the question «What is hu-man?». In this regard, the author identifies two strategies – post-humanism and post-cosmism. The strat-egy of post-humanism is to deny the idea of human exceptionalism. Humanity becomes something that can be thought of out of touch with human and understood as a right that extends to the non-human world. Post-cosmism, on the contrary, advocated the idea of ontological otherness of the human. Re-sponding to the challenges of anthropological catastrophe, its representatives propose a number of new anthropological projects.


2010 ◽  
Vol 27 (4) ◽  
pp. 45-67
Author(s):  
Sayed Sikandar Shah ◽  
Mek Wok Mahmud

As an intellectual process, critical thinking plays a dynamic role in reconstructing human thought. In Islamic legal thought, this intellectual tool was pivotal in building a full-fledged jurisprudential system during the golden age of Islamic civilization. With the solidification of the science of Islamic legal theory and the entrenchment of classical Islamic jurisprudence, this process abated somewhat. Recent Islamic revival movements have engendered a great zeal for reinstituting this process. The current state of affairs in constructing and reconstructing Islamic jurisprudence by and large do not, however, reflect the dynamic feature of intellectual thought in this particular discipline. Thus this article attempts to briefly delineate this concept, unveil the reality on the ground, and identify some hands-on strategies for applying critical thinking in contemporary ijtihad.


Author(s):  
Farhan Zahid

Pakistan remains a country of vital importance for Al-Qaeda. It is primarily because of Al-Qaeda’s advent, rise and shelter and not to mention the support the terrorist organization found at the landscape of Pakistan during the last two decades. The emergence of in Pakistan can be traced back to the Afghan War (1979-89), with a brief sabbatical in Sudan the Islamist terrorist group rose to gain prominence after shifting back to Afghanistan. It then became a global ‘Islamist’ terrorist entity while based in neighboring Afghanistan and found safe havens in the erstwhile tribal areas of Pakistan in the aftermath of the US invasion of Afghanistan in 2001. Prior to its formation in 1988 in Peshawar (Pakistan), it had worked as Maktab al-Khidmat (Services Bureau) during the Afghan War.2 It had its roots in Pakistan, which had become a transit point of extremists en route to Afghanistan during the War. All high profile Al-Qaeda leaders, later becoming high-value targets, and members of its central Shura had lived in Pakistan at one point in their lives. That is the very reason the Al-Qaeda in Pakistan is termed as Al-Qaeda Core or Central among law enforcement practitioners and intelligence communities. Without going into details of Al-Qaeda’s past in Pakistan the aim of this article is to focus on its current state of affairs and what future lies ahead of it in Pakistan.


2021 ◽  
Vol 13 (2) ◽  
pp. 703
Author(s):  
Megan Drewniak ◽  
Dimitrios Dalaklis ◽  
Anastasia Christodoulou ◽  
Rebecca Sheehan

In recent years, a continuous decline of ice-coverage in the Arctic has been recorded, but these high latitudes are still dominated by earth’s polar ice cap. Therefore, safe and sustainable shipping operations in this still frozen region have as a precondition the availability of ice-breaking support. The analysis in hand provides an assessment of the United States’ and Canada’s polar ice-breaking program with the purpose of examining to what extent these countries’ relevant resources are able to meet the facilitated growth of industrial interests in the High North. This assessment will specifically focus on the maritime transportation sector along the Northwest Passage and consists of four main sections. The first provides a very brief description of the main Arctic passages. The second section specifically explores the current situation of the Northwest Passage, including the relevant navigational challenges, lack of infrastructure, available routes that may be used for transit, potential choke points, and current state of vessel activity along these routes. The third one examines the economic viability of the Northwest Passage compared to that of the Panama Canal; the fourth and final section is investigating the current and future capabilities of the United States’ and Canada’s ice-breaking fleet. Unfortunately, both countries were found to be lacking the necessary assets with ice-breaking capabilities and will need to accelerate their efforts in order to effectively respond to the growing needs of the Arctic. The total number of available ice-breaking assets is impacting negatively the level of support by the marine transportation system of both the United States and Canada; these two countries are facing the possibility to be unable to effectively meet the expected future needs because of the lengthy acquisition and production process required for new ice-breaking fleets.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5300
Author(s):  
Antonia Nisioti ◽  
George Loukas ◽  
Stefan Rass ◽  
Emmanouil Panaousis

The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy to minimise their traces and make the investigation of an incident harder by evading detection and attribution. In this paper, we study the interaction between a cyber forensic Investigator and a strategic Attacker using a game-theoretic framework. This is based on a Bayesian game of incomplete information played on a multi-host cyber forensics investigation graph of actions traversed by both players. The edges of the graph represent players’ actions across different hosts in a network. In alignment with the concept of Bayesian games, we define two Attacker types to represent their ability of deploying anti-forensic techniques to conceal their activities. In this way, our model allows the Investigator to identify the optimal investigating policy taking into consideration the cost and impact of the available actions, while coping with the uncertainty of the Attacker’s type and strategic decisions. To evaluate our model, we construct a realistic case study based on threat reports and data extracted from the MITRE ATT&CK STIX repository, Common Vulnerability Scoring System (CVSS), and interviews with cyber-security practitioners. We use the case study to compare the performance of the proposed method against two other investigative methods and three different types of Attackers.


Sign in / Sign up

Export Citation Format

Share Document