The main features of creating of models of companies’ information security


  • S. O. Lysenko Інститут права ім. Володимира Великого МАУП
Keywords: modeling, structure of the models, types of the models, main components of the models, using of the models, regulations in the forming of the models

Abstract

In the article the main features of models and modeling in the whole were analyzed. It is stated that modeling has special logic of building which consists from four main components: setting of the problem, choosing the type of the model, research of the model and getting the information, evaluation of the results and transferring the information to the original. Some directions of the formation of the models in the sphere of commercial secret were proposed

References

1. Shutenko S.M., Modelyuvannya / Mizhnarodna politseys'ka entsyklopediya – Dovidkove vydannya u 10 tomakh T.VI. K.: Atika, 2010. – 1127 s.
2. Tsekhmister, Ya. (2014). Paradigm analysis of the personality sociogenesis. Fundamental and applied researches in practice of leading scientific schools, 6, 169-173.
3. Marushchak A.I. Informatsiyne pravo: Dostup do informatsiyi. Navchal'nyy posibnyk. K.: KNT, 2007. – 532 s.
4. Эkonomycheskaya ynformatyka . Uchebnyk /pod red. V.P. Kosareva // M. Fynansы y statystyka, 2004. – 592 s.
5. Smyrnova I.V. Model' natsional'noyi systemy protydiyi narkobiznesu / Mizhnarodna politseys'ka entsyklopediya – Dovidkove vydannya u 10 tomakh T.VI. K.: Atika, 2010. – 1127 s.
6. Hubaniv A.A. Model' munitsypal'noyi politsiyi Velykobrytaniyi narkobiznesu / Mizhnarodna politseys'ka entsyklopediya – Dovidkove vydannya u 10 tomakh T.III. K.: Atika, 2006. – 1187 s.
7. Nesteruk H. F., Fakhrutdynov R. Sh., Nesteruk F. H. K voprosu o razrabote ynstrumental'nыkh sposobov dlya monytorynha zashchyshchennosty korporatyvnoy sety: Sbornyk dokladov VIII Mezhdunar. konf. SCM'2005. - SPb.: SPHETU, 2005. – S. 377-387

Abstract views: 67
PDF Downloads: 36
Published
2017-02-13
How to Cite
Lysenko, S. (2017). The main features of creating of models of companies’ information security. Fundamental and Applied Researches in Practice of Leading Scientific Schools, 19(1), 49-53. Retrieved from https://farplss.org/index.php/journal/article/view/113