Articles

Technology for determining weight coefficients of components of information security

User Rating:  / 0
PoorBest 

Authors:


S.Onyshchenko, orcid.org/0000-0002-6173-4361, National University “Yuri Kondratyuk Poltava Polytechnic”, Poltava, Ukraine, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

A.Hlushko, orcid.org/0000-0002-4086-1513, National University “Yuri Kondratyuk Poltava Polytechnic”, Poltava, Ukraine, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

O.Laktionov*, orcid.org/0000-0002-5230-524X, National University “Yuri Kondratyuk Poltava Polytechnic”, Poltava, Ukraine, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

S.Bilko, orcid.org/0000-0003-0259-4482, National University “Yuri Kondratyuk Poltava Polytechnic”, Poltava, Ukraine, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

* Corresponding author e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.


повний текст / full article



Naukovyi Visnyk Natsionalnoho Hirnychoho Universytetu. 2025, (1): 096 - 103

https://doi.org/10.33271/nvngu/2025-1/096



Abstract:



Purpose.
Development of a technology for determining weighting coefficients based on an improved methodology to ensure the accuracy of determining the level of information security, taking into account its components.


Methodology.
The process of creating and conducting an experiment on the technology for determining weight coefficients of components of information security at the macro level is studied. The proposed technology utilizes two comprehensive assessments that consolidate information into a single score. One comprehensive indicator is based on considering the human factor, while the other excludes the human factor through the use of artificial intelligence. Arrays of resulting assessments are used to determine the level of information security, which allows improving the efficiency of the information security diagnostic process.


Findings.
The proposed technology, by utilizing a comprehensive indicator, demonstrates more effective diagnostic results, as determined by the standard deviation criterion. The integrated indicator that considers the human factor demonstrates a standard deviation value of 0.0195, while the comprehensive indicator without considering the human factor shows a value of 0.0047.


Originality.
The proposed technology differs from the existing ones by employing a comprehensive indicator that takes into account a six-digit interaction of integrated indicators, with weight coefficients determined using artificial intelligence tools.


Practical value.
The developed approach provides a more accurate result of integral assessment of the level of information security. This will allow the development of effective state instruments to enhance the level of information security, considering its current value, and to justify strategic directions for strengthening the state’s information security.



Keywords:
linear model, integrated indicator, artificial intelligence, information security

References.


1. Onyshchenko, S., Yanko, A., Hlushko, A., & Maslii, O. (2023). Economic cybersecurity of business in Ukraine: strategic directions and implementation mechanism. Economic and cyber security. Kharkiv: PC TECHNOLOGY CENTER, (pp. 30-58). https://doi.org/10.15587/978-617-7319-98-5.ch2.

2. Onyshchenko, S., Yanko, A., & Hlushko, А. (2023). Improving the efficiency of diagnosing errors in computer devices for processing economic data functioning in the class of residuals. Eastern-European Journal of Enterprise Technologies, 5(4(125)), 63-73. https://doi.org/10.15587/1729-4061.2023.289185.

3. Krasnobayev, V., Yanko, A., & Hlushko, A. (2023). Information Security of the National Economy Based on an Effective Data Control Method. Journal of International Commerce, Economics and Policy, article no. 2350021. https://doi.org/10.1142/S1793993323500217.

4. Laktionov, A. (2019). Application of index estimates for improving accuracy during selection of machine operators. Eastern-European Journal of Enterprise Technologies3(1(99)), 18-26. https://doi.org/10.15587/1729-4061.2019.165884.

5. Kuzior, A., Yarovenko, H., Brożek, P., Sidelnyk, N., Boyko, A., & Vasilyeva, T. (2023). Company Cybersecurity System: Assessment, Risks and Expectations. Production Engineering Archives, 29(4), 379-392. https://doi.org/10.30657/pea.2023.29.43.

6. Onyshchenko, S., Zhyvylo, Y., Cherviak, A., & Bilko, S. (2023). Determination of the peculiarities peculiarities of using information security systems in financial institutions in order to increase the financial security level. Eastern-European Journal of Enterprise Technologies, 5(13(125)), 65-76. https://doi.org/10.15587/1729-4061.2023.288175.

7. Onyshchenko, S., Yanko, A., Hlushko, A., Maslii, O., & Cher­viak, A. (2023). Cybersecurity And Improvement Of The Information Security System. Journal of the Balkan Tribological Association, 29(5), 818-835.

8. Wang, A., Hu, S., & Li, J. (2021). Does economic development help achieve the goals of environmental regulation? Evidence from partially linear functional-coefficient model. Energy Economics103, 105618. https://doi.org/10.1016/j.eneco.2021.105618.

9. Kara, K., Yalçın, G. C., Simic, V., Polat, M., & Pamucar, D. (2024). An integrated neutrosophic Schweizer-Sklar-based model for evaluating economic activities in organized industrial zones. Engineering Applications of Artificial Intelligence130, 107722. https://doi.org/10.1016/j.engappai.2023.107722.

10. Atchadé, M. N., Mahoudjro, C., & De-Dravo, H. H. (2024). A new index to assess economic diplomacy in emerging countries. Research in Globalization8, 100205. https://doi.org/10.1016/j.resglo.2024.100205.

11. Sun, J., Li, Z., Li, J., Wu, G., & Xia, Y. (2023). Hybrid power system with adaptive adjustment of weight coefficients multi-objective model predictive control. International Journal of Electrical Power & Energy Systems153, 109296. https://doi.org/10.1016/j.ijepes.2023.109296.

12. Carmen, R.-C., Lasarte-Navamuel, E., & Geoffrey, J.D.H. (2023). Some considerations on assessing the importance of a coefficient. Socio-Economic Planning Sciences, 101765. https://doi.org/10.1016/j.seps.2023.101765.

13. Altintaş, F. F. (2024). A novel method for assessing the weight coefficients of criteria within the framework of multi-criteria decision-making: Measurement relying on the impacts of an exponential curve function (MIEXCF). Gazi University Journal of Science Part A: Engineering and Innovationhttps://doi.org/10.54287/gujsa.1419551.

14. Pamučar, D., Stević, Ž., & Sremac, S. (2018). A New Model for Determining Weight Coefficients of Criteria in MCDM Models: Full Consistency Method (FUCOM). Symmetry10(9), 393. https://doi.org/10.3390/sym10090393.

15. Yuan, Q., Pi, Y., Kou, L., Zhang, F., & Ye, B. (2022). Quantitative Method for Security Situation of the Power Information Network Based on the Evolutionary Neural Network. Frontiers in Energy Research10https://doi.org/10.3389/fenrg.2022.885351.

16. Hryhorii Hnatiienko, Nikolay Kiktev, Tatiana Babenko, Alona Desiatko, & Larysa Myrutenko (2021). Prioritizing Cybersecurity Measures with Decision Support Methods Using Incomplete Data. XXI International Scientific and Practical Conference “Information Technologies and Security” (ITS-2021), (pр. 169-180).

17. Zhu, G., & Wang, Y. (2019). Research on Risk Assessment of Information System Based on Fuzzy Neural Network. Proceedings of the International Academic Conference on Frontiers in Social Sciences and Management Innovation (IAFSM 2018). Atlantis Press. https://doi.org/10.2991/iafsm-18.2019.8.

18. Yang, M. (2022). Information Security Risk Management Model for Big Data. Advances in Multimedia2022, 1-10. https://doi.org/10.1155/2022/3383251.

19. Randjelovic, D., Stanković, J., Jankovic-Mmilic, V., & Stanko­vic, J. (2013). Weight coefficients determination based on parameters in factor analysis. Metalurgia international, 18, 128-131.

20. Zhang, Z., & Pfister, T. (2021). Learning fast sample re-weighting without reward data. 2021 IEEE/CVF International Conference on Computer Vision (ICCV). https://doi.org/10.1109/iccv48922.2021.00076.

21. Huang, X., Wu, S., & Yang, B. (2022). A Hardy-Hilbert-type inequality involving modified weight coefficients and partial sums. AIMS Mathematics, 7(4), 6294-6310. https://doi.org/10.3934/math.2022350.

22. Nitsenko, V., Kotenko, S., Hanzhurenko, I., & Ingram, K. L. (2020). Determination of Weight Coefficients for Stochastic and Fuzzy Risks for Multimodal Transportation. Journal of Physics: Conference Series1529, 032007. https://doi.org/10.1088/1742-6596/1529/3/032007.

23. Zhao, M., Feng, A., Zhou, J., Jin, Z., & Fan, J. (2024). Optimization study of high-dimensional varying coefficient partially linear model based on elastic network. Engineering Science and Technology, an International Journal, 55, 101731. https://doi.org/10.1016/j.jestch.2024.101731.

24. Altanany, M. Y., Badawy, M., Ebrahim, G. A., & Ehab, A. (2024). Modeling and optimizing linear projects using LSM and Non-dominated Sorting Genetic Algorithm (NSGA-II). Automation in Construction, 165, 105567. https://doi.org/10.1016/j.autcon.2024.105567.

25. Yang, Y., Luo, C., & Yang, W. (2024). Double penalized variable selection for high-dimensional partial linear mixed effects models. Journal of Multivariate Analysis/Journal of Multivariate Analysis, 105345. https://doi.org/10.1016/j.jmva.2024.105345.

26. Alsolami, I., & Fukai, T. (2022). An Extension of Fisher’s Criterion: Theoretical Results with a Neural Network Realization. arXiv (Cornell University). https://doi.org/10.48550/arxiv.2212.09225.

27. Thaden, H., & Kneib, T. (2018b). Structural equation models for dealing with spatial confounding. The American Statistician, 72(3), 239-252. https://doi.org/10.1080/00031305.2017.1305290.

28. Maindonald, J. H., Braun, W. J., & Andrews, J. L. (2024). Multiple Linear Regression. A Practical Guide to Data Analysis Using R: An Example-Based Approach, (pp. 144-207). Chapter, Cambridge: Cambridge University Press.

29. Jagielski, M., Oprea, A., Biggio, B., Liu, C., Nita-Rotaru, C., & Li, B. (2018). Manipulating Machine Learning: Poisoning attacks and Countermeasures for regression learning. https://doi.org/10.1109/sp.2018.00057.

30. Svistun, L., Glushko, А., & Shtepenko, K. (2018). Organizational Aspects of Development Projects Implementation at the Real Estate Market in Ukraine. International Journal of Engineering & Technology, 7(3.2), 447-452. https://doi.org/10.14419/ijet.v7i3.2.14569.

31. Bashynska, I. O. (2015). Using the method of expert evaluation in economic calculations. Aktualʹni problemy ekonomiky, 7, 408-412.

 

Visitors

7944587
Today
This Month
All days
4337
250916
7944587

Guest Book

If you have questions, comments or suggestions, you can write them in our "Guest Book"

Registration data

ISSN (print) 2071-2227,
ISSN (online) 2223-2362.
Journal was registered by Ministry of Justice of Ukraine.
Registration number КВ No.17742-6592PR dated April 27, 2011.

Contacts

D.Yavornytskyi ave.,19, pavilion 3, room 24-а, Dnipro, 49005
Tel.: +38 (066) 379 72 44.
e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
You are here: Home