Issue #4 (Volume 16 2018)
-
ReleasedApril 12, 2019
-
Articles8
-
16 Authors
-
19 Tables
-
32 Figures
- actor
- agricultural enterprises
- bank lending
- budget process
- cognitive modeling
- collection and analysis of results
- computer testing
- control of residual knowledge
- credit unions
- elliptic codes
- factor analysis
- financial companies
- financial resources
- fixed assets
- forms of testing and evaluation of knowledge
- hybrid crypto-code designs
- industrial enterprise management
- information sequence
- information support
- input control
- interference-protected code
- intergovernmental transfers
- intermediate and final control
- irreducible and primitive polynomials
- leasing
- level of connectivity
- local budgets
- management information process
- McAlias’ crypto-code designs
- mechanism of formation
- modified elliptical codes
- Mono model
- Niederreiter’s crypto-code designs
- output
- Pareto principle
- preventive tests
- risk-oriented approach to anti-money laundering
- scenario approach
- self-control
- shift registers
- signature analysis
- social control
- social networking services
- software system for providing and conducting computer testing
- state information security
- state support
- synergetical management
- taxation
- technical diagnostics
- technological aspects
- terrorist financing and proliferation of weapons of mass destruction
- test control
- testing of knowledge
- types of tests
-
The mechanism of synergetically controlled self-organization of actors in social networking services
Today social networking services are one of the most popular virtual platforms for implementing social communication in the information space. In this case, social networking services provide the basic needs of actors in communication, belonging to virtual communities, new knowledge, self-realization, security, etc. At the same time, social networking services can be used by the world leading countries to achieve one-sided advantages in the national information space and influence on social and political processes in the state, public opinion, social exacerbation, interethnic and interreligious conflicts, etc. That’s why providing the state’s information security in social networking services is one of the most acute problems in Ukraine and around the world. It is established that the most promising direction of counteracting the threats to state information security in social networking services and managing the dynamics of interaction between the actors is the use of the concept of synergetic management. However, currently there are no practical recommendations for the implementation of synergistic management with the use of social control for self-organization in social networking services. The article systematizes the basic components of social control in social networking services. It is established that they are divided into social norms and social sanctions. The structure of each component of social control in social networking services and the peculiarities of their implementation are revealed. The synergetic model of interaction between the actors in social networking services is synthesized, which will ensure the formation of a stable virtual community. Such a virtual community is capable of counteracting the threats to the state’s information security in the information space of services through the implementation of social control over the members of the virtual community and the dissemination of a strategic narrative to counteract the content of destructive nature. The experimental research of the proposed model of synergetic control for a hidden artificially controlled transition of the virtual community of actors in social networking services to the state of state information security is performed. It is proved that the effectiveness of such a management compared to the unmanaged processes of the formation of stable virtual communities increases 3.3 times and allows to attract a greater number of actors of social networking services.
-
Introduction of electronic test tools with the aim of increasing the effectiveness of the knowledge test
Yuriy Skorin , Oleksandr Shcherbakov doi: http://dx.doi.org/10.21511/dm.4(4).2018.02In article as the direction of improvement of educational process, increase of efficiency of use of perspective forms of check and an assessment of knowledge introduction in educational process of electronic means of computer testing is defined.
The study is based on the analysis of existing forms of verification and evaluation of knowledge and the main types of control measures in the study of the discipline, the allocation of advantages and disadvantages of the main forms of knowledge testing, the rationale for the choice of testing as the most effective means of testing and evaluation of students' knowledge, the allocation of the main types of tests, the prospects of the use of electronic tests conducted using computer technology, the definition of the function of computer testing, comparative analysis of software products, providing the implementation of computer testing and selection of the most promising of them, capable, on the one hand, to simplify the testing process, and on the other hand, significantly improve the efficiency of testing and evaluation of students' knowledge. The study suggests: first, analysis, generalization and understanding In article as the direction of improvement of educational process, increase of efficiency of use of perspective forms of check and an assessment of knowledge introduction in educational process of electronic means of computer testing is defined. The study is based on the analysis of existing forms of verification and evaluation of knowledge and the main types of control measures in the study of the discipline, the allocation of advantages and disadvantages of the main forms of knowledge testing, the rationale for the choice of testing as the most effective means of testing and evaluation of students' knowledge, the allocation of the main types of tests, the prospects of the use of electronic tests conducted using computer technology, the definition of the function of computer testing, comparative analysis of software products, providing the implementation of computer testing and selection of the most promising of them, capable, on the one hand, to simplify the testing process, and on the other hand, significantly improve the efficiency of testing and evaluation of students' knowledge.
The study suggests:
- first, analysis, generalization and understanding of the experience of using modern methods of knowledge control, analysis of existing forms of knowledge assessment and the main types of control measures, identification of advantages and disadvantages of the main forms of knowledge testing;
- secondly, the rationale for the choice of testing as the most effective means of testing and evaluation of knowledge, the allocation of the main types of tests, the rationale for the prospects of the use of electronic tests conducted using computer technology;
- third, the analysis of the conditions for the effective use of test control, the definition of the function of computer testing, comparative analysis of software products that provide the implementation of computer testing, the selection of the most promising of them that can improve the efficiency of testing and evaluation of students' knowledge.
-
Research of crypto-code designs construction for using in post quantum cryptography
Serhii Yevseiev , Alla Gavrilova , Bogdan Tomashevsky , Firuz Samadov doi: http://dx.doi.org/10.21511/dm.4(4).2018.03The article analyzes construction of crypto-code designs (CCDs) on the basis of asymmetric Mac-Alice and Niederreiter crypto-code systems on elliptical (EC) and modified elliptic codes (MEC), which, in the conditions of post-quantum cryptography, allow to provide a guaranteed level of crypto stability, to counteract the modern Attacks and attack by V. Sidelnikov on the theoretical code schemes of McAlias and Niederreiter. Schemes of hybrid crypto-code designs constraction the lossy codes are addressed. Methods of constructing mechanisms of confidentiality and integrity of banking information resources under hybrid threats to security components (information security, cybersecurity, information security) are proposed. Using of a lossy code is suggested to this end. Lossy Code allow you to increase the speed of code changes by reducing the power of the field when causing damage to open text and reducing the amount of data transferred by causing harm to the cipher text. The methods of constructing unprofitable codes and approaches for use in hybrid KKK of McAlias and Niederreiter on modified elliptic codes are considered. Practical algorithms for the use of the MV2 mechanism in McAlias’ CCD and Niederreiter’s modified elliptic codes are proposed, which allows the implementation of the CCD hybrid scheme. The comparative results of the study of stability and power capacity with respect to their practical use in automated banking systems are presented.
-
Money laundering risk management tools based on determining the level of co-ordination of financial companies and credit unions
Nataliya Vnukova , Daria Hontar , Mykhaylo Vorotyntsev doi: http://dx.doi.org/10.21511/dm.4(4).2018.04The article proposes a tool for managing money laundering risk based on the definition of the level of coherence of financial companies and credit unions, the application of which will contribute to introduction of a risk-based approach to anti-money laundering, terrorist financing and proliferation of weapons of mass destruction. It was revealed that among the investigated during 2010-2017 financial corporations and credit unions there are financial conglomerates. This confirms the existence of close ties between them. Associated financial companies and credit unions may form or join networks that can be used for possible money laundering. It was established that the share of connected credit unions and financial companies corresponds to the principle of Pareto – 20:80. The proposed methodological support allowed selecting a large number of independent credit unions and financial companies. This will help to prevent the impact of the risk of connected individuals on the high ability of the borrower to fulfill their loan obligations and not to be involved in processes for money laundering using networks. Meanwhile, dedicated joint financial institutions belong to a high-risk group for controlling their financial operations to prevent the legalization of proceeds from crime.
-
Synthesis of information control devices which are transferred to diagnostic network with package composition
In the context of growing requirements for the reliability of information and a reduction in the time of data delivery, the urgent task is the development of simple and effective means of control as a process of transmission of information and equipment in distributed systems. The problem of diagnosing the efficiency of distributed systems in data exchange networks with packet switching is considered in the paper. The proposed approach to the synthesis of data control devices is most effective in verifying the transmission of a multitude of packet messages over a datagram channel in time division mode and can be used in digital test device diagnostic systems as an initialization analyzer. The practical implementation of the proposed approach allows you to create devices that have achieved a significant reduction in hardware costs and simplify the technical implementation of signature analyzers. In this case, it is not necessary to store the input information, which provides the possibility of using different characteristic of polynomials, by automatically generating this information in the device. Parallel processing of message packets or diagnostic information allows to increase the speed of analyzers, with reception of signatures that equal the signature of a single-channel analyzer. Examples of synthesis of multichannel signature analyzers that are capable of high-speed data reliably process information, localize errors in the information input sequence and determine the number of the false packet in the message or the device from the group of verifiable devices are given.
-
Technological aspects of the mechanism of formation of local budgets in Ukraine for 2018-2020 years
Larysa Gordiienko , Alina Zilinska doi: http://dx.doi.org/10.21511/dm.4(4).2018.06The article deals with the technological aspects of the mechanism of formation of local budgets in Ukraine, which is an important tool for state policy, the development of administrative and territorial units, and ensuring an adequate level of living standards. On the basis of the analysis carried out by the authors, it was revealed that the mechanism of formation of local budgets does not correspond to the current trends, therefore the components of legislative and regulatory support are systematized and the potential of their use for the changes of the existing mechanism is revealed. The technological aspects of the formation of local budgets are considered, namely, the composition of local budgets is determined, and at the expense of which the local budget is formed by the legislative base. The features of the mechanism of formation of local budgets and the main organizational and technological procedures for its development are determined. The authors highlighted the main shortcomings of the existing mechanism for the formation of local budgets, namely, the absence of a procedure for forming the income and expenditure part of local budgets. It is determined that local budgets of Ukraine are more dependent on intergovernmental transfers than local budgets of EU countries, the volume of transfers and their share in the organization of local budget revenues is constantly increasing. In this work, the authors proposed measures to eliminate the problems of the formation of local budgets.
-
Cognitive modeling of factors of influence on the processes of formation and reproduction of fixed assets of agricultural enterprises
The features of financial support for reproduction of fixed assets of agrarian enterprises are considered in the article. These include quantitative and qualitative differences in the basic assets of agrarian enterprises, seasonal production, long payback period of capital investments, the reproduction in agricultural enterprises of a significant part of fixed assets in kind, unsustainable financial condition of enterprises and lack of collateral for obtaining long-term loans, undervalued value of fixed assets, no accrual of depreciation on land. For the agricultural enterprises of Ukraine, a cognitive model of the situation "Fixed Assets" was developed, which allows us to investigate factors that determine the possibilities of expanding their reproduction in the light of unstable conditions of functioning. On the basis of cognitive modeling, studies of a possible scenario for the transformation of this system in accordance with the purpose of management have been carried out and modeling the dynamics of the levers of directing the management influences depending on the chosen behavior. It is established that the most significant factors influencing changes in the system of fixed assets are: net profit received by enterprises of the agrarian sector of Ukraine, state support of agricultural producers, foreign investments in agriculture and financing of fixed assets on the basis of leasing. Based on a correlation-regression analysis based on the estimation of stable cause-and-effect relationships, establishing quantitative relations between random variables of the investigated process, conditional forecasts of changes in the size of fixed assets of agricultural enterprises are constructed.
-
Determining factors to ensure the effective formation of the information process in the industrial enterprise management
The article presents comprehensive approach to ensuring the effective formation of the information process of industrial enterprise management. It is proposed to use scenario planning technology, which will allow considering the activity of an enterprise and its information processes in the context of several development scenarios. The paper substantiates the theoretical and methodological provisions for determining the factors ensuring the effectiveness of the formation of the information process of managing an industrial enterprise. The factors determining the effectiveness of the formation of the information process of managing an industrial enterprise are determined on the basis of the principal component method, which allows to determine the most informative indicators for further analysis and formation of the information array of the management process. It has been proved that regardless of the scenario of the development of an enterprise, the list of factors ensuring the effectiveness of the formation of information processes for managing an industrial enterprise (using the engineering industry as an example) remains unchanged, but depending on the development scenario, the priorities of the company’s management change.