The goal of this article is to investigate an approach to the organization of IT infrastructure manage- ment for a network of multifunctional complexes of roadside service on the basis of IT Service Man- agement (ITSM) best practices. IT Service Management refers to the implementation and manage- ment of quality information technology services. The network of multifunctional roadside complexes has a very complex IT infrastructure consisting of a large number of different components. Moreover, the company is planning to actively use IT outsourcing. Business continuity significantly depends on the quality of provided IT services, the availability and reliability of IT infrastructure. Firstly, the problems that the network of multifunctional complexes of roadside service faces due to the lack of proper IT infrastructure management and maintenance are identified. Then a system of management processes is developed using ITSM best practices and in compliance with the busi- ness goals and the role of IT in the network of multifunctional complexes of roadside service. A com- bination of several methodologies and techniques was used: COBIT 5 framework for information technology management and governance, The Information Technology Infrastructure Library (ITIL v. 3) — a set of practices for IT service management, and the first international standard for IT ser- vice management — ISO/IEC 20 000. The capability of the proposed solution to address the identified problems and to mitigate risk is justified.
In modern conditions of blurring the boundaries between the virtual and the real world, as well as the transition of virtual threats into reality, the issues of user security on the Internet are becoming increasingly important. This is especially true for children and adolescents who are at high risk because of their young age, lack of skills in safe behavior on the Internet, and lack of understanding of what moral and/or physical harm this or that information can cause. Therefore, parental control applications that extend and complement the capabilities of information security tools on the user's devices are in increasing demand. Basically, such applications provide: monitoring and limiting time of operation of the device, monitoring and restricting access to sites (by age restrictions, by type of sites, by forbidden words, black or white lists) and applications on the device, tracking the user's movements (for mobile devices), monitoring on-lineonline, generation of various reports and statistics on the use of the device and Internet resources, remote control of the device. The article provides a comparative analysis of such applications, discusses the functional features of some of them, provides recommendations for the selection of parental control applications based on user requests, as well as determines the prospects for their development.
Usage of automated informational systems in the daily activities of a financial institution is the basis of its successful existence and development. The most common ways of automation in the financial sector based on own development or standard of automated banking systems (ABS) are no longer able to meet the increasing needs. That is why the use of successfully operating in other industries ERP systems becomes very attractive. For today, many researches has been done on the existing market of banking systems. There are also works describing the advantages of using ERP systems for automation of economic activities of the bank. Nevertheless, it is quite difficult to make a choice about strategy of automation. The aim of the study is to identify and assess the strengths and weaknesses of each of the ways of automation and their ability to withstand the opportunities and threats of environmental factors. The method of quantitative SWOT analysis based on expert assessments was used for this study. The quantitative SWOT analysis matrices had been obtained because the study allow decision-makers in the field of IT strategy to have a more balanced approach to the choice of the development path. Comparison of SWOT matrices for analysis of automation paths allows making a conclusion about the preference of using ERP system as a basic system in the bank.
The task of determining information security state of objects using the information of signals of electromagnetic emissions of individual elements of devices of cyber-physical systems was investigated. We consider the main side channels of information with which it is possible to monitor the state of the system and analyze the software and hardware environment. Such «independent» methods of monitoring allow analyzing the state of the system based on external behavioral characteristics within the framework of conceptual models of autonomous agents. The statistical characteristics of signals allowing to identify changes in the state of local devices of systems are considered. Was described an experiment aimed at obtaining statistical information on the operation of individual elements of cyber-physical systems. The efficiency of the neural networks approach for solving the described classification problem, in particular, two-layer feed-forward neural networks with sigmoid hidden neurons was investigated. The results of the experiments showed that the proposed approach is superior to the quality of detection of anomalous states by classification based on internal indicators of the functioning of the system. With minimal time of accumulation of statistical information using the proposed approach based on neural networks, it becomes possible to identify the required state of the system with a probability close to 0.85. The proposed approach of the analysis of the statistical data based on neural networks can be used for definition of states of information safety of independent devices of cyber-physical systems.
Integration of information resources on the properties of semiconductor materials developed in different countries is necessary for creation of new materials with the required properties. Federated approach to autonomous data sources integration is suggested. The approach allows the integration of data storage and access of physically distributed data. The data flow model and functional models of autonomous data sources integration are developed.
The paper identifies the basics and features the «integration » technology that should be encouraged to organize to organize scientific research in the direction of «artificial intelligence ». The necessity of this integration technology is justified. The recommendations are based on the fact that the integration should guide and lead to the creation of algorithmic models of the subject, his intelligence and intelligent behavior.
In connection with reforming of social security in different economic levels, it’s interest to analysis data of tourism activity for current and perspective periods. This ways are connecting with the use of special information systems. The problem of engaging in the management of tourism activities for different levels have recently gained greater urgency. It's graduate the new level of development relations in budget sphere. Those analysis structure of budget cost for tourism is necessary for advance in connect with modern financial reforming.
The article highlights the importance of personnel training for digital economy. A list of the most demanded soft skills necessary for future jobs in industrial sector has been formed according to the results of foreign and Russian research. The list includes complex problem-solving, social, process and systems skills, and cognitive abilities. The research conducted by the authors is focused on the soft skills formation and development, which is relevant both for employers and universities which train specialists. For training of the skills mentioned above such interactive forms of learning as case study, round table and computer business simulator are suggested. The article studies the experience of practical usage of each of these forms in the discipline of "Business Informatics" in bachelor's and master's degrees programs, gives some examples and specifics of application. By modeling the processes of interactive classes, the link has been established between the activities performed by students and certain skills formation. The specification of interactive activities has made it possible to work out a differentiated approach for formation of soft skills of the future and recommend such interactive forms of training students for their further development. In this case soft skills are formed in line with acquisition by students of competences stipulated by the educational standards of higher professional education
This article represents different techniques for building fast recommender systems based on dimension reduction and classification of web-site usage data. Description of different web-site types that use recommender systems is provided.