The main purpose of the study is to model the process of public administration system for ensuring cybersecurity. The research methodology involves the use of method of decomposition modeling IDEF0 to the achievement of the goals. As a result of the use of this methodology, a model of the implementation of methods and measures of the public administration system was formed in the context of ensuring the cyber security of the information space of its functioning. The use of this methodology made it possible to fully graphically depict the process of achieving the final goal. A significant advantage of this model is the clarity and systematic display of stages, resources and results. The study has limitations, considering that this model was formed for a separate province of Canada, all elements of the model were selected in accordance with the specifics of the public administration of this country, as well as methods for ensuring cybersecurity. In subsequent studies, the authors plan to adapt this model to the realities of other public administration systems.
The main purpose of the study is to rank certain threats in order to establish further costs for ensuring the protecting of information in the cybersecurity system. Research methodology is a set of methods that form a methodological approach. The main ones are the ranking method through the theory of fuzzy relations and the expert-step method. As a result, due to the ranking of the threats of the selected object, the permissible intensity of the decrease in the level of security and the costs of its provision were determined using the proposed methodology. The results obtained implied the use of modern ranking methods according to the given parameters. In our case, the results obtained allowed us to rank the existing list of threats in the cybersecurity system. The benefit of such results lies in the formation of an information basis for the adoption and implementation of management decisions.The study is limited by selecting only one socio-economic system and its information. The results obtained out in the article have practical and scientific value through a methodical approach to form requirements for the security of the cybersecurity system itself and information of a single object. In the future, more complex socio-economic systems and their cybersecurity should be chosen to apply the methodological approach proposed in the article.
The main purpose of the study is to plan the process of ensuring the security of sustainable development of the socio-economic system. The research methodology involves the use of the IDEF0 modeling technique, which made it possible to achieve all the goals. As a result of the study, a model was formed that will allow planning a system for ensuring the security of sustainable development of the socio-economic system. The focus of the article falls on the problems of planning to ensure the security of socio-economic systems. The theoretical contribution of the results obtained is presented by mapping the process of applying a methodical approach to the selected issue. The practical significance of the article is characterized by modeling for a specific socio-economic system. The innovations of the results obtained are presented in the form of a contextual model.The study has limitations, despite the fact that the model we have developed includes more unified elements, the vector of the study is limited to a specific socio-economic system Lidl, therefore, in subsequent studies, it is planned to adapt this model to other socio-economic systems.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.