28 research outputs found

    Digitalization: The New Digital Consumer and the Change of Companies Value Chain

    Get PDF
    The world has changed dramatically within the last 10 years; it has changed much more in the past decade than in the last 70 years all together. The Internethype in the years 2000/ 2001 has already been a sign for a fundamental change and the impact of new media on our lives. Anyway the Internet exploded as the time has not been ready. Today companies are faced with a completely different environment: global competition, global communication, and global information transparency and last but not least: an end consumer that behaves completely different than 10 years ago which basically impacts on all companies, if operating globally or locally. Digital media and channels are dominating the search behavior and even online purchase is becoming much more important, depending on the product category. This should be the topic of the thesis: Digitalization: Chances and Risks for multinational companies with B2B focu

    Application of a risk-based approach using reflexive risk models in building information security systems

    Get PDF
    The risk-based approach (RBA) provides certain advantages in the construction and operation of information security management systems, therefore, the most frequently applied standards in this area are based on it. But the practical application of RBA for protection against cyber threats is fraught with a number of difficulties and limits. It is shown that application of a detailed risk assessment to assess the information security in organization intensively using the Internet and other IT in its activities, require a lengthy work to investigate vulnerabilities, calculating the private risks, reducing them into risks of threat. Taking into account the extremely high labor costs of this procedure, it is relevant to solve the problem by assessing high-level risks. Four verbal specifications of the attacker are introduced, describing various aspects of his behavior and skills, the socio-psychological context of his actions, the target settings of these actions, affecting the choice of the attacker's strategy, methods and ways to implement information threats. On the basis of these specifications reflexive risk models are formed. These are mathematical models whose structure and parameters reflect the characteristics of the attacker contained in its specification. Each of these models can be tailored to its own security policy to minimize losses to the organization. The study of reflexive models in a number of cases made it possible to determine the maximum volume of investments in the information security system and reveal the limitations in the application of the RBA to the construction of the information security system

    On the Oscillatory Behavior of Certain Third Order Nonlinear Differential Equation

    No full text
    . In this paper we shall study some oscillatory and nonoscillatory properties of solutions of a nonlinear third order differential equation, using the results and methods of the linear differential equation of the third order. The aim of this paper is to study the oscillatory or nonoscillatory properties of solutions of the nonlinear differential equation (1) u 000 + q(t)u 0 + p(t) h(u) = 0 where q 0 (t) and p(t) are continuous function of t 2 (a; 1), \Gamma1 ! a ! 1; h(u) is continuous function of u 2 (\Gamma1; 1) and (i) h(u)u ? 0 for u 6= 0, (ii) lim u!0 h(u) u = \Theta, 0 \Theta ! 1. In this paper, a solution of equation (1) we will understand a nontrivial solution of (1) defined on the interval [T; 1], T ? a. A nontrivial solution of (1) is said to be oscillatory if it has zeros for arbitrarily large values of (the independent variable) t. Otherwise a solution is called nonoscillatory. The object of generalization are the results of the paper [1] concerning oscillatory ..

    Agile information business: exploring managerial implications

    No full text

    Real-Time High-Load Infrastructure Transaction Status Output Prediction Using Operational Intelligence and Big Data Technologies

    No full text
    An approach to use Operational Intelligence with mathematical modeling and Machine Learning to solve industrial technology projects problems are very crucial for today’s IT (information technology) processes and operations, taking into account the exponential growth of information and the growing trend of Big Data-based projects. Monitoring and managing high-load data projects require new approaches to infrastructure, risk management, and data-driven decision support. Key difficulties that might arise when performing IT Operations are high error rates, unplanned downtimes, poor infrastructure KPIs and metrics. The methods used in the study include machine learning models, data preprocessing, missing data imputation, SRE (site reliability engineering) indicators computation, quantitative research, and a qualitative study of data project demands. A requirements analysis for the implementation of an Operational Intelligence solution with Machine learning capabilities has been conducted and represented in the study. A model based on machine learning algorithms for transaction status code and output predictions, in order to execute system load testing, risks identification and, to avoid downtimes, is developed. Metrics and indicators for determining infrastructure load are given in the paper to obtain Operational intelligence and Site reliability insights. It turned out that data mining among the set of Operational Big Data simplifies the task of getting an understanding of what is happening with requests within the data acquisition pipeline and helps identify errors before a user faces them. Transaction tracing in a distributed environment has been enhanced using machine learning and mathematical modelling. Additionally, a step-by-step algorithm for applying the application monitoring solution in a data-based project, especially when it is dealing with Big Data is described and proposed within the study

    Model of Smart Locating Application for Small Businesses

    No full text
    This paper presents a solution for small businesses to gather statistics on the presence of their customers in and around their institutions, using Bluetooth technology. The solution includes a model of a mobile system based on Bluetooth technology that can provide information about the detectable devices’ relative position to create statistics on users’ presence in a specific timeframe. The research conducted shows that Bluetooth technology can be efficiently used to log the user’s relative position. This paper proposes a two-component system, which includes a mobile application and a cloud-based database with a simple online query interface. The prototype was implemented for the Android operating system and confirms the feasibility of the proposed solution. The developed prototype application was designed as a foundation for further commercial development. The proposed solution provides small businesses with an accessible way of collecting data on the presence of people without having to buy specialized equipment

    Modeling a session of subject-system interaction in a wireless communication infrastructure with a mixed resource

    No full text
    The article examines the subject-system interaction session, where the system is understood as a base station, and the subject is understood as a mobile communication device. The peculiarity of the study is taking into account the phenomenon relevant to modern communication infrastructures, which is that the base station supports the division of information traffic into a subspace of guaranteed personalized traffic and a subspace of general-purpose traffic. The study considers a highly critical empirical emergency when the general-purpose traffic subspace may cease to be available at any time. The presented mathematical apparatus describes the impact of such an emergency on the active communication sessions supported by the system in receiving new incoming requests of increasing intensity. To characterize this emergency situation, expressions adapted for practical application are presented to calculate such qualitative parameters as the probability of stability, the probability of failure, and unavailability

    Enterprise environment modeling for penetration testing on the OpenStack virtualization platform

    No full text
    The article presents the design of a model environment for penetration testing of an organization using virtualization. The need for this model was based on the constantly increasing requirements for the security of information systems, both in legal terms and in accordance with international security standards. The model was created based on a specific team from the unnamed company. The virtual working environment offered the same functions as the physical environment. The virtual working environment was created in OpenStack and tested with a Linux distribution Kali Linux. We demonstrated that the virtual environment is functional and its security testable. Virtualizing the work environment simplified the organization’s security testing, increased resource efficiency, and reduced the total cost of ownership of certain devices
    corecore