2021
DOI: 10.35774/visnyk2021.01.083
|View full text |Cite
|
Sign up to set email alerts
|

Classification of stakeholders (users) of accounting information for the enterprise cybersecurity purposes

Abstract: Introduction. The intensification of cyberrisks due to global hybrid conflicts, the COVID-19 pandemic, and economic imbalances threatens the accounting system as the main generator of economic information, which requires the organization of an effective system of enterprises cybersecurity. It is necessary to understand cyberthreats impact on the functioning of different types of stakeholders for development of the effective cybersecurity.Purpose. The main purpose is to research and improve the classification o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…There are advantages to these e-commerce solutions, and the best one will depend on the company and the target market (Hendra et al, 2021, Arun et al, 2022. Digital information and communication technologies can support and improve company operations under the umbrella of e-business (Muravskyi et al, 2021). When it comes to the online exchange of products and services, E-commerce is only a subset of e-business (Gosal et al, 2021).…”
Section: Overview Of the E-business Enterprisesmentioning
confidence: 99%
“…There are advantages to these e-commerce solutions, and the best one will depend on the company and the target market (Hendra et al, 2021, Arun et al, 2022. Digital information and communication technologies can support and improve company operations under the umbrella of e-business (Muravskyi et al, 2021). When it comes to the online exchange of products and services, E-commerce is only a subset of e-business (Gosal et al, 2021).…”
Section: Overview Of the E-business Enterprisesmentioning
confidence: 99%
“…Accounting data stored in various media may face security threats such as unauthorized access, modification, or deletion by unauthorized personnel. The main threat faced by accounting data in transmission is malicious intrusion by network hackers, who illegally alter, delete, or steal accounting data [5].…”
Section: Security Risks Of Network Accounting Informationmentioning
confidence: 99%
“…To establish a classification and regression tree for a learning set, there are the following steps: (1) using the entire training set as the root node; (2) segmenting nodes: If the samples included in the node belong to the same category, treat this node as a leaf node; If not, continue to split it; (3) scanning all the attributes contained in the node and calculate the Gini value for each attribute when divided into different situations; (4) finding the appropriate attributes and segmentation values, and determine whether the segmentation can minimize the Gini coefficient after segmentation; (5) dividing the nodes into two subsets: left subtree and right subtree; ( 6) repeating ( 2)-( 5) for the left subtree; ( 7) repeating ( 2)-( 5) for the right subtree. Due to the binary segmentation performed by the classification and regression tree, for multiple different partitions of the attributes in step 3 above, if the values are discrete values such as a, b and c, there are three situations in the partition: ab, ac, and bc.…”
Section: Classification and Regression Tree Algorithmmentioning
confidence: 99%