Конференції, семінари
Постійне посилання на розділhttps://repository.kpi.kharkov.ua/handle/KhPI-Press/360
Переглянути
3 результатів
Результати пошуку
Документ Features of information systems audit in the digital economy(Національний технічний університет "Харківський політехнічний інститут", 2024) Wang, Wei; Havrys, Olha O.In the context of the digital economy, information systems audit professionals must not only master basic theoretical knowledge of auditing, but also acquire professional knowledge of information technology, become interdisciplinary professionals who can skillfully use information technology to collect and analyze data, and have the ability and experience to evaluate data for information system management.Документ Trends in information technology development in China(Національний технічний університет "Харківський політехнічний інститут", 2024) Qian, Weiqian; Havrys, Olha O.By analyzing technological innovation, policy support, industry application, and market dynamics, the current status and future direction of information systems development in China is assessed. The focus is on the application of technologies such as cloud computing, big data, artificial intelligence (AI) and the Internet of Things (IoT) in information systems, and how these technologies contribute to the digital transformation of the Chinese economyДокумент Economic aspects of enterprise information security(Національний технічний університет "Харківський політехнічний інститут", 2023-05-17) Havrys, Olha O.; Pikalova, Yuliia Y.Masses of information contain personal, corporate and confidential information, so theft can lead to catastrophic consequences for an enterprise, both financially and in reputational terms. In addition to storage, modern archives allow timely reporting and analysis of their contents, and database hacking can be carried out both for information corruption and unauthorized access. Both aspects are extremely undesirable and cause a number of consequences. Information leakage is considered one of the main threats to the stability and competitiveness of the enterprise. In order to promptly take measures that reduce the level of risk, that is, the possibility of data loss or damage, it is necessary to study current threats, analyze the feasibility of countermeasures, and take a comprehensive approach to cyber protection of data warehouses.