Shifting liability for trust. Literacy research. Feature of vertical and side reading. Impact of fake news on the audience. Using web search during a validation task. Applying of lateral reading by respondents with a high level of information literacy.
Suggestion information model of environment of computer-aided design, consisting of a сontrol processor, thematic coprocessors and executing processors. The scheme of processors control in the information model. Interaction of thematic coprocessors.
Research tasks for the modernization of the site of the enterprise. Determination of critical areas in the development of the enterprise as a diversified structure. Methodical support of high-tech business management in the field of information portal.
The use firewalls to create a demilitarized zone to protect the servers from unauthorized access. The versions of creation of virtual private networks that can combine some geographically distant networks in one network using global information space.
- 635. Information provision, accounting and analysis of food losses and waste: eu experience for Ukraine
The theoretical, methodological and methodical foundations for the formation of the system of accounting, analysis and information base of food losses and waste. The need to introduce in Ukraine the accounting methodology for food losses and waste.
After our country regained its independence, as a result of successive reforms carried out in all spheres of social life the creation of qualitatively new conditions in the education system led to the emergence of a new perspective on philosophy teaching.
The role of intermediaries in search the information of private. Revealed to uninformed parties. Strategic manipulation of certification. The choice a monopoly intermediary. Capture a large share of the surplus. The competition among intermediaries.
Finding Boolean functions with maximum algebraic immunity based on univariate polynomial representation. Algebraic techniques in differential cryptanalysis revisited. An efficient rational secret sharing scheme based on the chinese remainder theorem.
The importance and role of information security in the context of ensuring the national security of the state. Analysis of the main threats to information security, such as cyber attacks, consideration of strategic approaches to their neutralization.
The structure of an information security program. Creation and implementation of policies and standards. Activity of federal sentencing guidelines for criminal convictions. System and network access control. Conducting a business impact analysis.
Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.
The need for management decisions to ensure information security. Consideration of the comprehensive policy aimed at preventing and combating cybercrime. Implementation of the official line of information security in the context of digitalization.
Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.
It was the determined that the definition of the management process, mode of operation and monitoring of the relevant industry is also relevant to the issue of information openness in the field of civil protection. The latter should be based on.
The impact of the information revolution on the development of society. Development of new, deepening of existing developments in the field of studying global problems of the present day, in particular, related to the formation of the information society.
To develop the methods of creating new knowledge to increase the quantity of innovative goods and services. The use of patent information in terms of the modern information society. Ensuring the competitiveness of technical patents on world markets.
Сomparative analyse of contemporary information society development in Poland and Republic of Moldova. The information society development process of European Union, Poland – as a member of the Union and Republic of Moldova – as nonEuropean member.
The problem of information sovereignty of the state in modern scientific research as a component of ensuring the country's national security and a system-forming factor of state formation. The structure of the spiritual sovereignty of the state.
The category of "information space of controlling". Such an approach made it possible to identify the main centres of its production and specific features of different types of controlling information, their role in the process of enterprise management.
Comparison - a means to overload, confuse and puzzle the recipient in order to block easy ways to solve the riddle. Analysis of the main reasons for violation of the canonical principle of information structure in comparisons of old english riddles.
Principles of construction of a monitoring system. Appearance of the reflectometer ALIMP. Application of the complex modulated signals. Algorithms of processing of the information. Block scheme of power lines monitoring on the basis of the devices ALIMP.
The peculiarities of the implementation of information and communication technologies in the disciplines of physical education in the USA. The information provision of educational institutions regarding the education of students' physical culture.
Complete assessment of demand in the labor market. Laying down the results of the workforce survey. Structuring indicators according to socio-demographic characteristics of respondents and organizational and economic characteristics of production units.
The state of information support of strategic management in the conditions of the formation of Society 5.0. and the directions. It is noted that at the current stage of the development of society. The target orientation of strategic accounting.
Study of the model of information support for the analysis of the development potential of a tourist enterprise in anti-sipative management from the point of view of human and investment potential. Analysis of management preparation and decision making.
Text description of the main processes running in the dealer. Overview of Incadea enterprise software solutions at the global automotive retail market. Analysis of the information system correspondence to existed business-processes in the company.
Analysis of the mobile banking information system based on biometric authentication. A function is proposed that ensures the closure of biometric template data in information networks. Estimation of the number of customer requests to the payment system.
Functional-purpose approach to the formation of the enterprise information system. The concept and classification of IP, their components, components and elements. Complementary scheme of the procedure for the creation and operation of enterprise IP.
Analysis of models of determining the market value of a business. Research on the pricing of financial assets. Ways to increase the reliability of the accuracy of monetary valuation results. The search for the optimal ratio of equity and debt capital.
The key financial and economic land value factors have been determined and classified. A robust land price system model that is part of a greater digital information system, with focus on urban and suburban land areas was researched and constructed.