{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:23:02Z","timestamp":1730193782082,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,15]]},"DOI":"10.1109\/acit52158.2021.9548126","type":"proceedings-article","created":{"date-parts":[[2021,10,2]],"date-time":"2021-10-02T03:29:27Z","timestamp":1633145367000},"page":"499-503","source":"Crossref","is-referenced-by-count":0,"title":["Methodology of the Integral Evaluation of Enterprise Information Security Level"],"prefix":"10.1109","author":[{"given":"Iryna","family":"Markina","sequence":"first","affiliation":[{"name":"Poltava State Agrarian Academy,Department of Management,Poltava,Ukraine"}]},{"given":"Dmytro","family":"Diachkov","sequence":"additional","affiliation":[{"name":"Poltava State Agrarian Academy,Department of Management,Poltava,Ukraine"}]},{"given":"Nataliia","family":"Chernikova","sequence":"additional","affiliation":[{"name":"Poltava State Agrarian Academy,Department of Management,Poltava,Ukraine"}]}],"member":"263","reference":[{"key":"ref10","first-page":"121","article-title":"Putting the Enterprise into the Enterprise System","volume":"76","author":"davenport","year":"1998","journal-title":"Harvard Business Review"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.36887\/2415-8453-2019-3-21"},{"volume":"9","journal-title":"Evaluating Information Security System Effectiveness for Risk Management Control and Corporate Governance Business and Economic Research","year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.02.036"},{"key":"ref14","first-page":"138","article-title":"Quantitative method for multicriteria analysis of the assets of a critical system in the management process of information security","author":"firoiu","year":"2019","journal-title":"Quality - Access to Success"},{"key":"ref15","first-page":"143","article-title":"Information security: indicators","volume":"1","author":"furashev","year":"2013","journal-title":"professional scientific journal &#x201C;Information and Law&#x201D;"},{"key":"ref16","first-page":"88","article-title":"NIST: National Institute of Standards and Technology. Managing information security risk organization, mission, and information system view","author":"gallagher","year":"2011","journal-title":"Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg"},{"key":"ref17","first-page":"246","article-title":"Modelling static and dynamic aspects of security: A socio-technical view on information security metrics","author":"kowalski","year":"2011","journal-title":"12th International Symposium on Models and Modeling Methodologies in Science and Engineering"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.1"},{"key":"ref19","article-title":"Entropy Model Management of Organization","author":"markina","year":"0","journal-title":"World Applied Sciences Journal 30 (Management Economics Technology & Tourism)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0163050"},{"key":"ref27","first-page":"118","article-title":"The use of Kakhonenko's maps to analyze the level of information security of countries taking into account their development: a collection of scientific papers &#x201C;Economic Space","author":"yarovenko","year":"2020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.11.004"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/508171.508187"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0163050"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1042091.1042094"},{"key":"ref2","first-page":"86","article-title":"Method of managing the general state of information security of the company by analyzing the cause-and-effect relationships by the method of Ishikawa","author":"arkhipov","year":"2021","journal-title":"a professional scientific journal &#x201C;Economics and State&#x201D;"},{"key":"ref9","article-title":"Evaluation of Information Security Approaches: A Defense Industry Organization Case","volume":"423","author":"\u00e7akmak","year":"0","journal-title":"Communications in Computer and Information Science"},{"key":"ref1","first-page":"33","article-title":"On the methodology of measuring synthetic categories of quality of life","volume":"39","author":"aivazyan","year":"2003","journal-title":"Economics Math Methods"},{"key":"ref20","article-title":"Defining the dimensions of national security, financial security and food supply chain in Ukraine","author":"markina","year":"0","journal-title":"International Journal of Supply Chain Management"},{"key":"ref22","first-page":"15","article-title":"Methodological aspects of modeling the information security system in the field of economic security of the region","author":"naumenko","year":"2019","journal-title":"Scientific bulletin of uzhgorod national university series International economic relations and the world economy"},{"journal-title":"TNTU Wiki","article-title":"Moving average method","year":"0","key":"ref21"},{"key":"ref24","first-page":"171","article-title":"Formation of a system of indicators for assessing the level of information security of the enterprise: Bulletin of economics, transport and industry","author":"polozova","year":"2011","journal-title":"Business Economics"},{"key":"ref23","first-page":"148","article-title":"System of evaluation of information support of the enterprise. Management of resource provision of economic activity of enterprises of the real sector of the economy: mater. III All-Ukrainian","author":"paskal","year":"2018","journal-title":"International Scientific-Practical Conference"},{"key":"ref26","first-page":"224","article-title":"Analytical planning. Organization of systems: lane","author":"saati","year":"1991","journal-title":"Trans With the English M Radio and Communication"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0238739"}],"event":{"name":"2021 11th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2021,9,15]]},"location":"Deggendorf, Germany","end":{"date-parts":[[2021,9,17]]}},"container-title":["2021 11th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9548321\/9548113\/09548126.pdf?arnumber=9548126","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T23:21:13Z","timestamp":1659482473000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9548126\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,15]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/acit52158.2021.9548126","relation":{},"subject":[],"published":{"date-parts":[[2021,9,15]]}}}