corporate network
Recently Published Documents


TOTAL DOCUMENTS

219
(FIVE YEARS 65)

H-INDEX

10
(FIVE YEARS 1)

2022 ◽  
Vol 1 (15) ◽  
pp. 122-126
Author(s):  
Aleksandr Chernigovskiy ◽  
Maksim Krivov

In this paper we discuss the phenomenon of mining and the problems associated with it. In particular, much attention is considered to the problem of information security. Special at-tention is paid to the problem of cryptojacking in a corporate network. The existing methods of its solution are considered. It was revealed that the most promising in this regard will be a centralized solution based on machine learning methods


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Justyna Światowiec-Szczepańska ◽  
Beata Stępień

Purpose The purpose of this study is to investigate the links between a company’s position in a corporate network with its financial performance and strategic risk in the context of the largest Central European stock market. Design/methodology/approach This study integrates the theory of social network analysis (SNA) with corporate governance theory with a special focus on resource dependence theory. Using the framework of network social analysis, the authors use network measures of social capital and embeddedness. Findings The results of studying companies listed on the Polish stock exchange indicate that a company’s corporate network position has a significant negative impact on strategic risk while having no influence on its financial performance. The research also highlights the importance of a firm’s corporate governance model for both performance and strategic risk. Research limitations/implications The data collected, and SNA measures used made it possible to conduct a cross-sectional study. Compared to longitudinal studies, this type of study has a couple of disadvantages addressed in the paper. In the future, the dependencies observed in this study should be tested using longer-term data. Originality/value To the best of the author’s knowledge, this is the first paper integrating the corporate personal and capital networks to test risk and performance dependencies in the context of Poland’s corporate governance model. The findings and conclusions can also be applied to analyzing Central and Eastern Europe stock markets.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Manxi Wang ◽  
Jie Sun

Based on the actor network theory, this paper collects 20 representative corporate public opinion data through microblogs, uses the qualitative comparative analysis method to analyze these typical cases from the configuration perspective, identifies the elements and condition combination paths of corporate online public opinion hotness generation from four dimensions: enterprises, netizens, media, and government, and explores the generation mechanism of corporate network public opinion hotness. The results show three modes with high hotness of corporate network public opinion generation, which are internal and external linkage, internal leading, and external restriction. The public opinion hotness generation modes of consumers’ rights and interests and managers’ problems are different. Therefore, different measures should be taken to reduce the hotness of negative public opinion for different causes of corporate public opinion. Based on this, this paper puts forward some guidance suggestions, including strengthening the identification and contact with opinion leaders, strengthening the cooperation with the government and authoritative media, and strengthening the feedback response level of corporate network public opinion. This study helps to prevent and resolve public opinion crisis and provides reference for corporate public opinion governance.


Author(s):  
Ricardo Giglio ◽  
Thomas Lux

AbstractWe investigate the network topology of a comprehensive data set of the world-wide population of corporate entities. In particular, we have extracted information on the boards of all companies listed in Bloomberg’s archive of company profiles in October, 2015, a total of almost 100,000 firms. We provide information on board membership overlaps at various levels, and, in particular, show that there exists a core of directors who accumulate a large number of seats and are highly connected among themselves both at the level of national networks and at the worldwide aggregated level.


Author(s):  
Е.Е. Истратова ◽  
Е.Н. Антонянц ◽  
А.О. Амельченко

В статье представлены результаты модернизации ранее разработанного клиент-серверного приложения для исследования характеристик корпоративной сети. Результаты проведенных исследований позволили сделать вывод о том, что усовершенствованный программный продукт можно применять для сбора статистических данных о характеристиках сетевого подключения при передаче информации в корпоративной сети компании. The article presents the results of the modernization of a previously developed client-server application for the study of the characteristics of the corporate network. The results of the conducted research allowed us to conclude that the improved software product can be used to collect statistical data on the characteristics of the network connection when transmitting information in the corporate network of the company.


Author(s):  
Alexander Bajic ◽  
Georg T. Becker

AbstractWith numbers of exploitable vulnerabilities and attacks on networks constantly increasing, it is important to employ defensive techniques to protect one’s systems. A wide range of defenses are available and new paradigms such as Moving Target Defense (MTD) rise in popularity. But to make informed decisions on which defenses to implement, it is necessary to evaluate their effectiveness first. In many cases, the full impact these techniques have on security is not well understood yet. In this paper we propose network defense evaluation based on detailed attack simulation. Using a flexible modeling language, networks, attacks, and defenses are described in high detail, yielding a fine-grained scenario definition. Based on this, an automated instantiator generates a wide range of realistic benchmark networks. These serve to perform simulations, allowing to evaluate the security impact of different defenses, both quantitatively and qualitatively. A case study based on a mid-sized corporate network scenario and different Moving Target Defenses illustrates the usefulness of this approach. Results show that virtual machine migration, a frequently suggested MTD technique, more often degrades than improves security. Hence, we argue that evaluation based on realistic attack simulation is a qualified approach to examine and verify claims of newly proposed defense techniques.


2021 ◽  
Vol 6 ◽  
pp. 67-69
Author(s):  
Olga A. Dvornikova ◽  
Gleb V. Popkov

At the moment, using a VPN connection is popular among Internet users. 2020 showed the need to create a corporate remote network for organizations of all spheres. VPN technology allows using special programs to unite individual computers and local networks to protect the transmitted information. When connecting to a server located in the VPN public access network, the technology forms a channel that is protected by information using encryption algorithms.


Author(s):  
И. Смазневич ◽  
Ф. Краснов

Создание эффективной системы поиска в информационных ресурсах организации невозможно без учета специфики корпоративной сети, не позволяющей применять популярные в Интернете алгоритмы поиска без потери быстродействия и точности поиска. Creating an effective search system in an organization’s informational resources is impossible without taking into account the specifics of the corporate network, which does not allow using popular Internet search algorithms without losing the speed and accuracy of the search.


Sign in / Sign up

Export Citation Format

Share Document