+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

Authors

Yuriev V. N.

Degree
Dr of Economics, Professor, St. Petersburg Polytechnic University of Peter the Great
E-mail
yurev@fem.spbstu.ru
Location
Saint Petersburg
Articles

The approach to creation of the automated intelligence system for instrument-making firm

For the intelligence system automated choice it is necessary to fulfill survey of the corporation, at first. Further it is necessary to detect out the control systems essential functions, demanding automation in a maximum degree. The outcome of the given stage should become constructional basis of a functional part of an intelligence system.
Read more...

History and perspectives of informatics and directions of training «Applied informatics»

This paper presents a historical overview of the process of formation and development of informatics, as well as the formation of concepts. Considered several options for treatment of the concept of «informatics» as a field of scientific knowledge. Recommendations are given for the construction of training programs for bachelor’s and master’s degrees in information technology, in particular, for periodic updating according with the development of concepts and technologies.
Read more...

Evaluation of software quality and marketability

A method of assessing the quality and marketability of modern software using desirability functions is given in the article. The experiments validate the performance of the developed procedure and its suitability for the objective evaluation of the marketability of other products.

Read more...

The game approach to evaluation of risks and formation of information security budget of an enterprise

Information security risk management includes periodic evaluation of the quality of practice giving reduce to risks and returning risks for an acceptable level. Generally quantitative and qualitative indicators of detected risks are used in forming enterprise information security budget. It is suggested to solve the problem of forming information security budget by evaluation of the enterprise information assets and using game theory and strategic approach. The probabilities of reflection of unauthorized access to enterprise information resources became the elements of the payoff matrix of two-player antagonistic game. The probability of reflection of the attacks to information assets is described by the function with two arguments: 1) average probability of attack in a certain economic field; 2) value of invested funds to improve the information asset security. This approach allows distributing the total amount of funds allocated to provide enterprise information security in selected information assets areas. It is offered to find the solution of the antagonistic game with the use of linear optimization methods. The mixed strategies obtained by solving the antagonistic game are used to determine the amount of funds invested in security of different information assets. The model developed in this paper represents the combination of strategic two-player antagonistic game and a game of a single player against nature in terms of risk, which is solved by using the Bayesian information criterion.
Read more...

Classification of information technologies

Information technology (IT) is a set of methods, processes, tools and hardware that provide for the decision makers in the various fields of activity the ability to access any required information. Currently, there is no established classification IT. A variety of technologies are studied in different disciplines. At the same time, in order to help to navigate the variety of information technologies they need to be ordered in some way. This paper offers a multi-level classification of the IT based on the allocation to strata from the bottom up techniques, tools and equipment to the work with information depending on their degree of complexity — from the means of communication human with a computer, collection, storage, retrieval, different ways of processing information to the IT for extract the knowledge and to the emergence of new information as a result of the complex methods. The paper uses the information models of F. E. Temnikov and A. A. Denisov to describe the principles of the proposed classification. The hierarchical structure of the IT in this paper is presented within two levels of itemization — a general one which comprises the whole specter of the existing IT and a detailed one which consists of the second level technologies that are specific for every particular general technology branch.
Read more...