|
2015. No. 4 (34)
|
Internet technologies
|
7–14
|
Peter MAJOR -Vice-Chairman, United Nations Commission on Science and Technology for Development (CSTD) Address: Palais des Nations, 8-14, Av. de la Paix, 1211 Geneva 10, Switzerland E-mail: pmajor@bluewin.ch
Internet Governance is one of the global governance issues that emerged at the end of the 1990s. As the Internet is taking on an important role in every aspect of our lives, it has been recognized that its governance needs to involve all stakeholders and institutions to allow global access, foster development and contribute to the global economy, education, information. Security and privacy concerns should also be addressed in the policy dialogues. This paper outlines the global nature of the Internet Governance. It argues that in addition to dialogues and negotiations formal approaches should be explored to handle global issues in a global way. In its conclusion a mechanism is proposed to address Internet related global public policy issues. The views expressed in this paper are solely those of the author in his private capacity and do not in any way represent the views of the UN Commission on Science and Technology for Development. |
Information systems and technologies in business
|
15–23
|
Dmitrij V. Koznov - Associate Professor, Department of Software Engineering, Saint Petersburg State University Address: 28, Universitetsky Prospect, Stary Peterhof, St. Petersburg, 198504, Russian Federation E-mail: st008149@spbu.ru
Maxim Yu. Arzumanyan- Assistant Professor, Department of Information Technologies in Economics,The Bonch-Bruevich Saint Petersburg State University of Telecommunications;Smart Architects Ltd. Address: 22, Prospect Bolshevikov, St. Petersburg, 193232, Russian Federation E-mail: maxim.arzumanyan@gmail.com
Yury V. Orlov - General Director, Smart Architects Ltd. Address: 61A, Moyka, St. Petersburg, 191186, Russian Federation E-mail: yury.orlov@smartarchitects.ru
Maxim A. Derevyanko - Engineer, Department of Information Technologies in Economics, The Bonch-Bruevich Saint Petersburg State University of Telecommunications; Smart Architects Ltd. Address: 22, Prospect Bolshevikov, St. Petersburg, 193232, Russian Federation E-mail: maxim.derevyanko@gmail.com
Konstantin Yu. Romanovsky - Senior Lecturer, Department of Software Engineering, Saint Petersburg State University Address: 28, Universitetsky Prospect, Stary Peterhof, St. Petersburg, 198504, Russian Federation E-mail: k.romanovsky@spbu.ru
Anastasia A. Sidorina -Student, Department of Computer Science, Saint Petersburg State University Address: 28, Universitetsky Prospect, Stary Peterhof, St. Petersburg, 198504, Russian Federation E-mail: sidorina-nastia@mail.ru
Enterprise Architecture (EA) is a discipline for business and IT system management, describing the fundamental artifacts of business and IT. Introducing EA activities in a company is done via special projects (referred to as EAMprojects). While much research focuses on EA as is, EAM projects are not yet considered properly. This paper deals with EAM projects as a special kind of IT project. The definition of an EAM project is suggested using the IT solution concept ofthe Microsoft Solution Framework. This is justified, since the EAM-software introduced in a company is the main result of a typical EAM project. Based on the definition of a work product in CMMI, this paper introduces the final delivery of an EAM project. In addition, domain specific modeling is used to describe EAM project delivery, since the most important partof EA is concepts and terms for describing business and IT in a company. To implement the language formed by these termsand concepts, an EAM tool is selected and customized (Mega, IBM System Architects, Aris, etc.), and additional software (i.e. Web-portal, integration scripts, etc.) is implemented. All of the EA principles and methods could be considered as guidelines for this software (EAM tool and additional software). Final delivery of an EAM project is divided into the following parts: method (domain specific language, EA method, EA process, integration, modeling results), technology (EAM tool, additional software, documentation), support and training. Using the concepts introduced in this paper, four EAM projects are analyzed. Lack of support of the EA method is identified as a common problem of these projects.
|
|
24–31
|
Svetlana V. MALTSEVA - Professor, Department of Innovation and Business in Information Technologies, National Research University Higher School of Economics Address: 20, Myasnitskaya Street, Moscow, 101000, Russian Federation E-mail: smaltseva@hse.ru Polina V. KOTELNIKOVA - Post-graduate Student, Department of Innovation and Business in Information Technologies, National Research University Higher School of Economics; Chief Inspector, Russian Accounts Chamber Address: 20, Myasnitskaya Street, Moscow, 101000, Russian Federation E-mail: kotelnikovapolina@gmail.com This article presents an investment project model in the telecommunications sector using public-private partnership (PPP), making it possible to link the main project parameters (duration, volume of investments, fare, request) with the expected indexes of effectiveness. When considering the project parameters and indexes of effectiveness, interests of both the state and private company are taken into account. The modeling algorithm and criteria of performance evaluation are developed based on the standards approved for evaluation of investment projects with state participation, namely the Guidelines on performance evaluation of the investment projects approved by the Ministry of Economy, Ministry of Finance, State Construction Committee of the Russian Federation on June 21, 1999, No. VK 477. This paper assumes that the most important criterion for evaluation of project effectiveness of a private company is the maximum of the net present value of the project, meaning the excess of the total cash receipts over the total cost for the project with regard to disparity of the effects (costs and benefits) related to different moments in time. Therefore, the higher this index, the greater is the interest of a private company to participate in the project. It seems that from the standpoint of the state two factors are most important: the social significance of the project and minimum expenses of the state for implementation of the investment project under conditions of a limited capacity of spending budget funds. The social significance of the project is defined by expert study as the impact of the operational results on at least one of the domestic or foreign markets: financial markets, product and service markets, labor market, etc., as well as the ecological and social environment. The model makes it possible to calculate various scenarios to determine optimal project parameters ensuring maximum efficiency for a given limit on the amount of budget investments. The calculation results for the proposed model can be used to make decisions to participate in the project by the authorities or public development finance institutions. It is proposed to document the model used and its evaluation criteria in the rules of granting subsidies for such projects. |
|
32–37
|
Dmitry V. Isaev - Associate Professor, Department of Business Analytics, National Research University Higher School of Economics Address: 20, Myasnitskaya Street, Moscow, 101000, Russian Federation. E-mail: disaev@hse.ru
The paper focuses on the questions of infological modeling of performance management systems (PMS), which represent the means of information support of strategic management and help to eliminate the gaps between strategic and operational management levels. Infological models of performance management systems include such elements as information flows, external information objects, functional blocks, functional modules, analytical functions, as well as methods, information systems and processes of management information processing. It is preferable to develop individual infological models for particular organizations relying on reference models, by individualizing them and detailed elaboration. Among the reference models, there is a basic (generic) infological model that represents the most common characteristics of all the enterprises and organizations, regardless their types and industry affiliation. The procedure of transition from the basic infological model to an individual model includes four stages. In the first stage, detailed elaboration of enlarged information flows is performed: each of the enlarged information flows is subdivided into more detailed flows, taking into consideration the peculiaritiesof a concrete organization. The detailing is provided taking into account types and sources of information, as well its affiliation with particular divisions, business segments and geographical segments. In the second stage, relationships between inputs and outputs of functional modules are discovered. Relying on such relations, preliminary (necessitating additional specification) analytical functions are established. In the third stage, the processes of collection, storage and processing of management information that are available within preliminary analytical functions are defined. Finally, in the fourth stage, the final versions of analytical functions are created by detailing and re-organization of previously defined preliminary functions. The paper also indicates the possibility of an alternative approach, where developing an individual model starts with the definition of analytical functions.
|
Mathematical methods and algorithms of business informatics
|
38–46
|
Mikhail V. Ulyanov - Leading Researcher, V.A.Trapeznikov Institute of Control Sciences, Russian Academy of Sciences; Professor, Software Management Department, National Research University Higher School of Economics. Address: 65, Profsouznaya Street, Moscow, 117997, Russian Federation. E-mail: muljanov@mail.ru
Mikhail I. Fomichev - Student, Software Engineering Program, National Research University Higher School of Economics. Address: 20, Myasnitskaya Street, Moscow, 101000, Russian Federation. E-mail: mikhail.fomichev94@gmail.com
The resource efficiency of different implementations of the branch-and-bound method for the classical traveling salesman problem depends, inter alia, on ways to organize a search decision tree generated by this method. The classic “time-memory” dilemma is realized herein either by an option of storing reduced matrices at the points of the decision tree, which leads to reduction in the complexity with additional capacity cost, or matrix recalculation for the current node, which leads to an increase in complexity while saving memory. The subject of this paper is an experimental study of temporal characteristics of solving the traveling salesman problem by the branch-and-bound method to identify a real reduction of span time using additional memory in a selected structure of a decision tree. The ultimate objective of the research is to formulate recommendations for implementing the method in practical problems encountered in logistics and business informatics. On the basis of experimental data, this paper shows that both considered options of the classic algorithm for the traveling salesman problem by the branch-and-bound method generate software implementations with an exponential dependence on the execution time of the input length. The experimental results permit us to suggest that the applicability of an additional memory capacity of no more than 1 GB results in a significant (up to five times) reduction of the time span. The estimate of the resulting trend makes it possible to recommend practical application of the software implementation of the branch-and-bound algorithm with storage of matrices - with a really available 16 GB random-access memory and with limitation of the expected average computation time of about one minute on modern personal computers whereby problems having a dimension no more than 70 can be solved exactly. |
|
47–54
|
Victor V. Marshirov - Associate Professor, Department of Information Systems and Technologies, National Research University Higher School of Economics. Address: 25/12, Bolshaya Pecherskaya Street, Nizhniy Novgorod, 603155, Russian Federation. E-mail: vmarshirov@hse.ru
Larisa E. Marshirova - Associate Professor, Department of Accounting, Analysis and Audit, National Research University Higher School of Economics. Address: 25/12, Bolshaya Pecherskaya Street, Nizhniy Novgorod, 603155, Russian Federation. E-mail: lmarshirova@hse.ru
This article is devoted to the problems of formalization of decision-making in the choice of development strategy in an organization and the ways to implement this strategy. A prioritization method is proposed that allows converting qualitative indicators into qualitative variables by means of pairwise comparison of the objects. As opposed to a simple summation of estimates preferences, this computational algorithm allows one to take into account indirect benefits of all the objects under consideration. The approaches to the ranking of experts and challenges an organization faces at various stages of its developmentare set forth. The algorithm is validated on the example of a particular company. The estimates of the priorities of experts are provided; the tree of tasks for which the comprehensive priorities are designed (taking into account the importance and relevance of expert tasks for each expert) is constructed; the analysis of the results for different conditions of the external and internal environment of the organization is made. Recommendations are given on the choice of the deviation values for matrix of pairwise comparisons of objects, as well as a reasonable number of iterations of the calculation of the integrated power of these objects. The practical significance of the work lies in the fact that the proposed algorithm and methodology for ranking of experts, tasks and subtasks may be used to prepare management accounting regulations to improve decision-making methods, taking into account the strategic and tactical objectives of the organization. |
|
55–62
|
Yuriy P. Yekhlakov - Professor, Head of Department of Data Processing Automation, Tomsk State University of Control Systems and Radioelectronics (TUSUR) Address: 40, Lenina ave., Tomsk, 634050, Russian Federation. E-mail: upe@tusur.ru
Dmitriy N. Baraksanov - Post-graduate Student, Department of Data Processing Automation, Tomsk State University of Control Systems and Radioelectronics (TUSUR) Address: 40, Lenina ave., Tomsk, 634050, Russian Federation. E-mail: upe@tusur.ru
The paper focuses on issues and tasks IT companies face with when promoting proprietary software products on consumer markets. It provides the description of the basic software product market represented as a combination of specific prospective customer groups, to which a software product line with relevant functionality can be offered using different delivery business models. The authors suggest three groups of market segment attractiveness: market attractiveness, competition level and a company’s performance in the segment. The authors developed a multi-objective mathematical model for selecting options of software product distribution in selected market segments. The following selection criteria for software distribution options in selected market segments are advanced: maximum of total profit, minimum of promotion expenses, minimum of target segments number and maximum of an integrated measure of segments attractiveness. Limitations of the model include the volume of human resources in each single-discipline group of specialists in an IT company and application of a single option of software product delivery for each of market segments. An algorithm for solution of the problem relies on successive concession method. However, suggested criteria of optimization are applicable for other methods of the multi-objective problem solution. The authors described the results of the model application for a real problem of selecting distribution options for the ‘Electronic Timetable’ software product for specialized secondary education and higher education institutions of Siberian Federal District in Russia. Twenty-four segments were selected for distribution, where two software distribution models were possible – “software as a service” (SaaS) and “application service provider” (ASP). Assessment of qualitative and quantitative parameters of the mathematical model was conducted by experts using optimistic, pessimistic and realistic scenarios. As a result of the problem solution, software product should be distributed as SaaS in 14 segments, and as ASP – in 3 segments. The results of the study may be useful for directors and managers of small IT companies when formulating strategies for proprietary software product distribution in certain target segments. |
Data analysis and intelligence systems
|
63–70
|
Dmitry S. Frolov - Post-graduate student, Department of Data Analysis and Artificial Intelligence, National Research University Higher School of Economics. Address: 20, Myasnitskaya Street, Moscow, 101000, Russian Federation. E-mail: dfrolov@hse.ru, dmitsf@gmail.com
A method for information retrieval based on annotated suffix trees (AST) is presented. The method is based on a string-to-document relevance score calculated using AST as well as fragment reverse indexing for improving performance. We developed a search engine based on the method. This engine is compared with some other popular text aggregating techniques: probabilistic latent semantic indexing (PLSA) and latent Dirichlet allocation (LDA). We used real data for computation experiments: an online store’s xml-catalogs and collections of web pages (both in Russian) and a real user’s queries from the Yandex.Wordstat service. As quality metrics, we used point quality estimations and graphical representations. Our AST-based method generally leads to results that are similar to those obtained by the other methods. However, in the case of inaccurate queries, AST-based results are superior. The speed of the AST-based method is slightly worse than the speed of the PLSA/LDA-based methods. Due to the observed correlation between the average query performing time and the string lengths at the AST construction phase, one can improve the performance of the algorithm by dividing the texts into smaller fragments at the preprocessing stage. However, the quality of search may suffer if the fragments are too short. Therefore, the applicability of annotated suffix tree techniques for text retrieval problems is demonstrated. Moreover, the AST-based method has significant advantages in the case of fuzzy search.
|
Information security
|
71–78
|
Petr A. Baranov - Associate Professor, Department of Innovations and Business in IT, National Research University Higher School of Economics Address: 20, Myasnitskaya Street, Moscow, 101000, Russian Federation. E-mail: pbaranov@hse.ru
Eldar R. Beybutov - MSc Program Student, Faculty of Business and Management, National Research University Higher School of Economics Address: 20, Myasnitskaya Street, Moscow, 101000, Russian Federation. E-mail: eldar.beybutov@gmail.com
This paper provides an overview of core technologies implemented by comparably new products on the information security market – web application firewalls. Web applications are a very widely-used and convenient way of presenting remote users with access to corporate information resources. They can, however, become single point of failure rendering all the information infrastructure inaccessible to legitimate clients. To prevent malicious access attempts to endpoint information resources and, intermediately, to web servers, a new class of information security solutions has been created. Web application firewalls function at the highest, seventh layer of the ISO/OSI model and serve as a controlling tunnel for all the traffic heading to and from a company’s web application server(s). To ensure decent levels of traffic monitoring and intrusion prevention, web application firewalls are equipped with various mechanisms of data exchange session “normality” control. These mechanisms include protocol check routines, machine learning techniques, traffic signature analysis and more dedicated means, such as denial of service, XSS injection and CRRF attack prevention. The ability to research and add user rules to be processed along with vendor-provided ones is important, since every company has its own security policy and, therefore, the web application firewall should provide security engineers with ways to tweak its rules to reflect the security policy more precisely. This research is based on broad practical experience of integrating web application firewalls into the security landscape of various organizations, their administration and customization. We illustrate our research into available filtering mechanisms and their implementations with exemplary product features by market leaders, diagrams and screenshots from real web application firewall systems. |
|
|