scholarly journals FORMALIZATION OF SAFETY ASSESSMENT AND MANAGEMENT

Author(s):  
Boris Bandurian ◽  
Volodymyr Kovalevskyj ◽  
Denis Tsvaigov

The article is the first in a series of articles, united by a single theme of improving the organization of the country's security management system. The article is limited to the general principles of the organization of security management of the country. It is proposed to divide all activities and values of the country into three types of potentials, which are characterized by quantitative or objective formal parameters and provide for different types of management influences; describe with potentials the current, target, forecast state of the country and allowable limitations of potentials. It is proposed to divide the components of complex parameters into three groups: positive potentials, which should be increased, negative potentials, which should be reduced, and passive potentials, which are not formalized or the relation to which is not defined. Of these components, positive and negative components have an impact on decision-making. The passive component can eventually be transformed into a positive or negative component. Examples of application of the offered approach are resulted.

2014 ◽  
Vol 1010-1012 ◽  
pp. 305-310
Author(s):  
He Xi Zhang ◽  
Yong Tao Wang ◽  
Mao Xi Jiang ◽  
Chong Ju Shang

Drought is an important factor that affects economic and social development in our province. Therefore, put forward a systematic construction for drought relief ideas and principles, engineering and non-engineering drought relief measures in Guizhou is of important reality and necessity. Thus provides decision-making basis for managers to formulate drought relief measures and reduce the loss caused by drought disasters to a minimum.


Author(s):  
Manoj Kumar Srivastav

Security of information is always a challenging domain for any computer network organization. An organization always sets different types of policies with the course of time so that no information can be leaked. Some external or some internal factors of an organization play important roles in revealing the information. An organization mainly depends on its employees. An employee manages the data and information and there exists some chance among employees to reveal the data. There is need to study and set policies for employees so that no full information can be revealed. Information security management system (ISMS) has collection of different types of policies and procedures for systematically managing organizationally sensitive data. ISMSs have to deal with management of employees of an organization to minimize the risk of revealing information. This chapter studies employee management so that an organization can continue its business securely.


2017 ◽  
Vol 76 (3) ◽  
pp. 107-116 ◽  
Author(s):  
Klea Faniko ◽  
Till Burckhardt ◽  
Oriane Sarrasin ◽  
Fabio Lorenzi-Cioldi ◽  
Siri Øyslebø Sørensen ◽  
...  

Abstract. Two studies carried out among Albanian public-sector employees examined the impact of different types of affirmative action policies (AAPs) on (counter)stereotypical perceptions of women in decision-making positions. Study 1 (N = 178) revealed that participants – especially women – perceived women in decision-making positions as more masculine (i.e., agentic) than feminine (i.e., communal). Study 2 (N = 239) showed that different types of AA had different effects on the attribution of gender stereotypes to AAP beneficiaries: Women benefiting from a quota policy were perceived as being more communal than agentic, while those benefiting from weak preferential treatment were perceived as being more agentic than communal. Furthermore, we examined how the belief that AAPs threaten men’s access to decision-making positions influenced the attribution of these traits to AAP beneficiaries. The results showed that men who reported high levels of perceived threat, as compared to men who reported low levels of perceived threat, attributed more communal than agentic traits to the beneficiaries of quotas. These findings suggest that AAPs may have created a backlash against its beneficiaries by emphasizing gender-stereotypical or counterstereotypical traits. Thus, the framing of AAPs, for instance, as a matter of enhancing organizational performance, in the process of policy making and implementation, may be a crucial tool to countering potential backlash.


Author(s):  
Nataliia Tsymbalenko

The subject of research-theoretical concepts of economic security managementof universities. The purpose of the article. The study of the essence of the economicsecurity management system of the university and the definition of its main tasks,the formulation of principles of economic security management of the university.Methodology. The dialectical method, methods of analysis and synthesis, methodsof structural-logical and semantic analysis were used to study and summarizescientific papers on the research topic. The results of the work. The essence of theuniversity’s economic security management system has been reviewed. The maintasks of the control system have been identified. A definition of the university’seconomic security system has been proposed. Principles of management of economicsecurity of the university have been formulated. These are: scientific andorganizational and social principles. Conclusions. The proposed principles allow totake into account the economic role and social mission of universities in managingeconomic security.


2020 ◽  
Vol 13 (5) ◽  
pp. 884-892
Author(s):  
Sartaj Ahmad ◽  
Ashutosh Gupta ◽  
Neeraj Kumar Gupta

Background: In recent time, people love online shopping but before any shopping feedbacks or reviews always required. These feedbacks help customers in decision making for buying any product or availing any service. In the country like India this trend of online shopping is increasing very rapidly because awareness and the use of internet which is increasing day by day. As result numbers of customers and their feedbacks are also increasing. It is creating a problem that how to read all reviews manually. So there should be some computerized mechanism that provides customers a summary without spending time in reading feedbacks. Besides big number of reviews another problem is that reviews are not structured. Objective: In this paper, we try to design, implement and compare two algorithms with manual approach for the crossed domain Product’s reviews. Methods: Lexicon based model is used and different types of reviews are tested and analyzed to check the performance of these algorithms. Results: Algorithm based on opinions and feature based opinions are designed, implemented, applied and compared with the manual results and it is found that algorithm # 2 is performing better than algorithm # 1 and near to manual results. Conclusion: Algorithm # 2 is found better on the different product’s reviews and still to be applied on other product’s reviews to enhance its scope. Finally, it will be helpful to automate existing manual process.


2021 ◽  
pp. 1-21
Author(s):  
Muhammad Shabir ◽  
Rimsha Mushtaq ◽  
Munazza Naz

In this paper, we focus on two main objectives. Firstly, we define some binary and unary operations on N-soft sets and study their algebraic properties. In unary operations, three different types of complements are studied. We prove De Morgan’s laws concerning top complements and for bottom complements for N-soft sets where N is fixed and provide a counterexample to show that De Morgan’s laws do not hold if we take different N. Then, we study different collections of N-soft sets which become idempotent commutative monoids and consequently show, that, these monoids give rise to hemirings of N-soft sets. Some of these hemirings are turned out as lattices. Finally, we show that the collection of all N-soft sets with full parameter set E and collection of all N-soft sets with parameter subset A are Stone Algebras. The second objective is to integrate the well-known technique of TOPSIS and N-soft set-based mathematical models from the real world. We discuss a hybrid model of multi-criteria decision-making combining the TOPSIS and N-soft sets and present an algorithm with implementation on the selection of the best model of laptop.


Sign in / Sign up

Export Citation Format

Share Document