Degree
|
Dr of Economics, Professor, St. Petersburg Polytechnic University of Peter the Great |
---|---|
E-mail
|
yurev@fem.spbstu.ru |
Location
|
Saint Petersburg |
Articles
|
The approach to creation of the automated intelligence system for instrument-making firmFor the intelligence system automated choice it is necessary to fulfill survey of the corporation, at first. Further it is necessary to detect out the control systems essential functions, demanding automation in a maximum degree. The outcome of the given stage should become constructional basis of a functional part of an intelligence system.
Read more...
History and perspectives of informatics and directions of training «Applied informatics»This paper presents a historical overview of the process of formation and development of informatics, as well as the formation of concepts. Considered several options for treatment of the concept of «informatics» as a field of scientific knowledge. Recommendations are given for the construction of training programs for bachelor’s and master’s degrees in information technology, in particular, for periodic updating according with the development of concepts and technologies.
Read more...
Evaluation of software quality and marketabilityA method of assessing the quality and marketability of modern software using desirability functions is given in the article. The experiments validate the performance of the developed procedure and its suitability for the objective evaluation of the marketability of other products. Read more...The game approach to evaluation of risks and formation of information security budget of an enterpriseInformation security risk management includes periodic evaluation of the quality of practice giving
reduce to risks and returning risks for an acceptable level. Generally quantitative and qualitative indicators
of detected risks are used in forming enterprise information security budget. It is suggested to
solve the problem of forming information security budget by evaluation of the enterprise information
assets and using game theory and strategic approach. The probabilities of reflection of unauthorized
access to enterprise information resources became the elements of the payoff matrix of two-player
antagonistic game. The probability of reflection of the attacks to information assets is described by
the function with two arguments: 1) average probability of attack in a certain economic field; 2) value
of invested funds to improve the information asset security. This approach allows distributing the
total amount of funds allocated to provide enterprise information security in selected information assets
areas. It is offered to find the solution of the antagonistic game with the use of linear optimization
methods. The mixed strategies obtained by solving the antagonistic game are used to determine
the amount of funds invested in security of different information assets. The model developed in this
paper represents the combination of strategic two-player antagonistic game and a game of a single
player against nature in terms of risk, which is solved by using the Bayesian information criterion.
Read more...
Classification of information technologiesInformation technology (IT) is a set of methods, processes, tools and hardware that provide for
the decision makers in the various fields of activity the ability to access any required information.
Currently, there is no established classification IT. A variety of technologies are studied in different
disciplines. At the same time, in order to help to navigate the variety of information technologies they
need to be ordered in some way. This paper offers a multi-level classification of the IT based on the
allocation to strata from the bottom up techniques, tools and equipment to the work with information
depending on their degree of complexity — from the means of communication human with a
computer, collection, storage, retrieval, different ways of processing information to the IT for extract
the knowledge and to the emergence of new information as a result of the complex methods. The
paper uses the information models of F. E. Temnikov and A. A. Denisov to describe the principles
of the proposed classification. The hierarchical structure of the IT in this paper is presented within
two levels of itemization — a general one which comprises the whole specter of the existing IT and
a detailed one which consists of the second level technologies that are specific for every particular
general technology branch.
Read more...
|