Мошенничество в сфере компьютерной информации как новый состав преступления
Business Informatics. 2013. № 2(24). С. 70-77.
The article discloses special features of composition novellas of the Russian legislation Computer-related fraud taking into account the socio-dangerous act, the socio-dangerous result, the specifics of information relations in the sphere of storage, handling or transmission of computer information, of work of information-telecommunication of networks. In the article are offered recommendations on changing the dispositions of this article in order to improve the fight with cybercrime.
Research target: Computer Science
Priority areas: business informatics
, Право и жизнь 2015 Т. 1 № 199 С. 146-165
In article the concept of information crimes reveals, the place and information role as a part of a crime is defined, information characteristic as object and a crime subject is given. In article various approaches to classification of information crimes are analyzed, classification of information crimes, including in connection with categories information, and also on ...
Added: March 4, 2016
, Вестник Академии права и управления 2016 № 3 (44) С. 78-84
The peculiarities of information security in the implementation of cloud services in the Russian Federation in view of the legal characteristics of cloud services providers, status information as an object of legal regulation, the characteristics of restricted information and specifi conclusion of civil law contracts. ...
Added: November 17, 2016
, Проблемы теории и практики управления 2014 № 1 С. 64-70
The questions of info-logical modeling of integrated systems for information support of strategic management are considered. The positioning of applied modeling methods regarding the enterprise architecture methodology, which is aimed to description of structure of an organization is presented. ...
Added: February 3, 2014
, Информационное право 2017 № 4 (54) С. 28-33
Purpose: the article analyzes the organizational and legal mechanisms of the European Union in the sphere of ensuring information security in terms of cloud computing technology, revealed a number of aspects of regulation of informational relations in connection with the growing practice of cloud services and identified key problems of legal regulation of this sphere ...
Added: February 1, 2018
, Вестник машиностроения, СТИН 2013 № 3 С. 74-78
Рассмотрены составляющие документации промышленных предприятии и основы внедрения лексикологического синтеза документов. Исследованы структура документационного обеспечения предприятий, состав, информативность и содержание документов ...
Added: April 15, 2013
М. : Территория лизинга, 2013
Added: May 16, 2014
Пермь : Пермский государственный национальный исследовательский университет, 2018
В сборник включены статьи, относящиеся к следующим направлениям научной работы: моделирование и анализ процессов и систем; разработка, анализ и тестирование программных систем, методы и инструментальные средства разработки программных систем. Представлены результаты выполнения проектов, поддержанных грантами РФФИ (проекты № 18-01-00359, № 18-37-00070) и научного фонда НИУ ВШЭ (проект № 17-05-0020). Материалы сборника могут представлять интерес для научных работников, специалистов ...
Added: December 16, 2018
NY : IEEE Computer Society, 2018
WF-IoT 2018, the 4th IEEE World Forum on Internet of Things, is the premier IEEE Forum for the Internet of Things. It is where conference attendees, from around the globe - including research institutes, academia, industry and the public sector -- share their knowledge, expertise and experiences about IoT technologies, applications, economic impacts, and social ...
Added: February 14, 2018
МОШЕННИЧЕСТВО В СФЕРЕ КОМПЬЮТЕРНОЙ ИНФОРМАЦИИ: УГОЛОВНО-ПРАВОВАЯ И КРИМИНАЛИСТИЧЕСКАЯ ХАРАКТЕРИСТИКА
, Всероссийский криминологический журнал 2015
Abstract is created ny the Journal editors. ...
Added: October 5, 2015
, , et al., IEEE Computer Society, 2020
The 22nd IEEE International Conference on Business Informatics (IEEE CBI 2020) was held June 22–24, 2020. This time, the conference was hosted by the University of Antwerp, Belgium but due to the COVID-19 pandemic, the conference was organized online. While this is not the preferred format of an academic conference, it provided the opportunity to ...
Added: July 13, 2020
, , , SN Computer Science 2020 Vol. 1 No. 2 P. 1-9
The paper examines the choice problem when the total number of observations and criteria is too large. There are many different procedures, which are used for decision-making process under multiple criteria; however, most of them cannot be applied to large datasets due to their computational complexity while others provide sufficient accuracy. To solve the problem, ...
Added: February 20, 2020
, Системный администратор 2018 № 6 С. 24-28
CentOS 7 was released in 2014, but many system administrators still use the old CentOS 6.x. The more so since updates for CentOS 6 are going to be released till the year 2020. There are a lot of reasons to use the old version, but one of the major ones is significants of functional changes ...
Added: October 19, 2018
, , , Вопросы оборонной техники. Серия 16: Технические средства противодействия терроризму 2016 № 7-8 С. 139-145
The paper examines the main problems of ensuring information security of cloud technologies, technical and legislative. It discussed the ways to improve the security of cloud computing: the choice of the most secure cloud model, legal ways to improve the security of cloud. ...
Added: October 16, 2016
Wien : DAAAM International Vienna, 2017
The use of cloud computing to ensure interaction between the state and citizens allows to speed up information interaction, to realize state services, to reduce the costs of providing such interaction, but at the same time this interaction raises important questions about the reliability of the cloud provider and security of interaction. Providers of the ...
Added: February 1, 2018
L. : IEEE, 2016
IntelliSys 2016 conference will focus on areas of intelligent systems and artificial intelligence and how it applies to the real world. It is an opportunity for researchers in this field to meet and discuss solutions, scientific results, and methods in solving important problems in this field. Conference Topics include, but are not limited to: Artificial ...
Added: February 25, 2017
, М. : ИНФРА-М, РИОР, 2013
Пособие предназначено для студентов высших учебных заведений, обучающихся по специальности «Прикладная информатика (в экономике)». Оно также содержит методический материал для ряда инновационных курсов лекций по профилю «Информационная безопасность» и может быть использовано и для блока дисциплин этого профиля. Ряд представленных результатов полезен специалистам и аспирантам, специализирующихся в указанной области. ...
Added: January 14, 2014
Agent-based modelling of interactions between air pollutants and greenery using a case study of Yerevan, Armenia
, , , Environmental Modelling and Software 2019 Vol. 116 P. 7-25
Urban greenery such as trees can effectively reduce air pollution in a natural and eco-friendly way. However, how to spatially locate and arrange greenery in an optimal way remains as a challenging task. We developed an agent-based model of air pollution dynamics to support the optimal allocation and configuration of tree clusters in a city. The Pareto ...
Added: February 24, 2019
, , , Проблемы информационной безопасности. Компьютерные системы 2014 № 4 С. 176-186
The main threats to the reliability and information security data centers are designated and systematized. In first there are the technical threat of failure of the life support systems of various DC: server nodes, power system, air-conditioning, fire-fighting, provider's lines, cable systems, etc. In second there are external threats: in particular, the threat of DDoS-attacks ...
Added: February 19, 2015
Каз. : КГУ, 2011
Added: April 10, 2013
, , , International Journal "Information Theories and Applications" 2015 Т. 22 № 2 С. 169-182
In this paper we continue the investigation related to the develpoment of tools for the design and implementation of computer business games, aimed at creating a certain level of competence in the process of realization of the scenarios defined by models of applied domain. ...
Added: July 15, 2015
, , , International Journal of Technology and Human Interaction 2018
In such a socially significant sphere as healthcare industry, innovation activity has become vital especially in such areas as automation of physician working place, creation of unified electronic medical record, distribution of intelligent decision support systems for medical solutions, application and wide dissemination of new medical technologies, telemedicine development. The intersection of medicine and ICT ...
Added: March 15, 2018
Распределенная эволюционная сеть для решения многокритериальных оптимизационных задач в системах имитационного моделирования
, , Бизнес-информатика 2013 № 3(25) С. 35-41
In the article is presented a novel approach to the solution of multi-objective optimizing problems of large-scale dimension systems realized, in particular, in the simulation systems of the class AnyLogic through distributed calculations. A new concept of creation of the distributed evolutionary network is suggested, based on splitting of space of required variables into clusters ...
Added: October 3, 2013
Проектные риски подготовительных процессов при создании IT-сервиса централизованного управления правами доступа пользователей
, Системы высокой доступности 2014 № 4 С. 94-98
During creation of a centralized identity management IT-service the IT-project's management division faces necessity of making a number of decisions that influence the project as a whole and could be crucial for its overall success. These decisions include: automation processes' selection (creation, modification, removal of user identities, user rights' reconciliation), managed IT-systems' user rights role ...
Added: February 11, 2015
, , et al., IEEE Network 2019 Vol. 33 No. 2 P. 126-131
Distinguishing outliers from normal data in wireless sensor networks has been a big challenge in the anomaly detection domain, mostly due to the nature of the anomalies, such as software or hardware failures, reading errors or malicious attacks, just to name a few. In this article, we introduce an anomaly detection-based OPF classifier in the ...
Added: December 19, 2018