Search citation statements
Paper Sections
Citation Types
Year Published
Publication Types
Relationship
Authors
Journals
The research relevance is determined by the ever-increasing threat of cyberattacks and the need to protect defence systems from these threats through the introduction of integrated computer technologies. The study aims to develop strategies for ensuring digital security in the defence sector, addressing the impact of information technology. The study analyses the impact of integrated computer technologies on information security in the military sphere, develops cybersecurity strategies and analyses examples of their application in the defence sector. The study determined that integrated computer technologies are substantial in improving cybersecurity in the defence sector. The analysis showed that they can effectively detect, analyse and respond to cyber threats, ensuring reliable protection of critical information resources. In addition, the digital security strategies developed addressed the specifics of the defence sector, helping to improve protection against cyberattacks and ensuring immediate action in the event of a threat. The resulting strategies for improving the digital security of the defence sector consider the specifics of the industry, contributing to increased resilience against cyber threats and ensuring prompt action in the event of potential attacks. The most significant examples of the introduction of these technologies, namely data mining, big data, distributed blockchain technology, analytical methods of cyber-analysis and cyber-physical systems, have demonstrated their effectiveness in real-world conditions, contributing to the security and resilience of defence systems. The results show the importance of information technology in improving cybersecurity in the defence sector. This confirms the need for systematic implementation of such technologies to ensure effective protection against modern cyber threats
The research relevance is determined by the ever-increasing threat of cyberattacks and the need to protect defence systems from these threats through the introduction of integrated computer technologies. The study aims to develop strategies for ensuring digital security in the defence sector, addressing the impact of information technology. The study analyses the impact of integrated computer technologies on information security in the military sphere, develops cybersecurity strategies and analyses examples of their application in the defence sector. The study determined that integrated computer technologies are substantial in improving cybersecurity in the defence sector. The analysis showed that they can effectively detect, analyse and respond to cyber threats, ensuring reliable protection of critical information resources. In addition, the digital security strategies developed addressed the specifics of the defence sector, helping to improve protection against cyberattacks and ensuring immediate action in the event of a threat. The resulting strategies for improving the digital security of the defence sector consider the specifics of the industry, contributing to increased resilience against cyber threats and ensuring prompt action in the event of potential attacks. The most significant examples of the introduction of these technologies, namely data mining, big data, distributed blockchain technology, analytical methods of cyber-analysis and cyber-physical systems, have demonstrated their effectiveness in real-world conditions, contributing to the security and resilience of defence systems. The results show the importance of information technology in improving cybersecurity in the defence sector. This confirms the need for systematic implementation of such technologies to ensure effective protection against modern cyber threats
The paper identifies the main positive aspects and risks of operations involving cryptocurrency after their legitimization and suggests ways to reduce the impact of risks and negative consequences. Analysis and synthesis techniques were utilized in the research in order to summarize the findings and draw conclusions in accordance with the paper’s structural divisions. The structural approach made it possible to structure the provisions on the potential spread of the impact of the existing state regulatory system on participants’ activities in the cryptocurrency market and determine which state executive authorities should be assigned the task of licensing cryptocurrency mining. The comparative legal method was used to search for advantages and disadvantages for various types of legal entities after legitimizing cryptocurrency. In order to examine the origins of human civilization and its recent acceleration of digitalization, the historical legal method was utilized. The authors have elaborated methods aimed at reducing the risks of operations with cryptocurrencies, as well as protecting the interests of the state and cryptocurrency market participants. It is proposed to establish a cryptocurrency exchange by citizens of Ukraine or business entities in agreement with the National Bank of Ukraine, the National Securities and Stock Market Commission or other central executive body. It is proposed to protect the interests of participants in the cryptocurrency market through the application of a group of measures characterized by the term “legal work at the enterprise”, and the LLC legal form can be used to prevent conflicts between founders and protection from encroachments of corporate raiders for small businesses
The purpose of this study was to theoretically elaborate the model of formation of customer experience of service organisations at the conceptual level and to conduct a study using the developed tools for its evaluation on the example of the hotel business. The main results were based on the principle of holistic personalism and are obtained using the methods of field marketing research, questionnaire survey of respondents, scoring and index method. The data were processed and analysed using statistical correlation analysis, graphical and matrix approaches. The Customer development methodology was used to form a chain of positive customer reactions. The article substantiates a conceptual model of formation of customer experience in service organizations based on the principles of behavioural theory. The article allocates 2 groups of factors on the example of hotels that form the customer experience: explicit and implicit, and includes 6 factor attributes. Three types of customer experience are distinguished: before the moment of consumption of the product – the expected experience (CX ex en.), at the moment of consumption – as the perceived customer experience (CX at the time), and intentions for future consumption of the service product (CX ex post). To assess them, 4 marketing metrics were proposed to evaluate each type of customer experience. To interpret the results, the values of the indicators are scaled. The carried out testing of the proposed methodology on a sample of 14 four-star hotels confirmed the hypotheses of the study. The proposed theoretical concept and evaluation tools can be further used to develop marketing programmes for Customer Experience Management (CXM)
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.