Please use this identifier to cite or link to this item: https://dspace.ncfu.ru/handle/123456789/32405
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMandritsa, I. V.-
dc.contributor.authorМандрица, И. В.-
dc.contributor.authorPetrenko, V. I.-
dc.contributor.authorПетренко, В. И.-
dc.contributor.authorMakarov, I. V.-
dc.contributor.authorМакаров, И. В.-
dc.contributor.authorSokolovskii, M. L.-
dc.contributor.authorСоколовский, М. Л.-
dc.date.accessioned2025-12-12T08:46:12Z-
dc.date.available2025-12-12T08:46:12Z-
dc.date.issued2026-
dc.identifier.citationMandritsa, I., Petrenko, V., Makarov, I., Sokolovskij, M., Mandritsa, O. The Concept of a Methodology for Calculating the Deviation of an Employee’s Psychological Profile from the Actual Average Norm of Tolerant Ethics of Behavior for Information Protection in Small Businesses // Lecture Notes in Networks and Systems. - 2026. - 1456 LNNS. - pp. 310 - 322. - DOI: 10.1007/978-3-032-07275-7_29ru
dc.identifier.urihttps://dspace.ncfu.ru/handle/123456789/32405-
dc.description.abstractTolerant behavior of an employee for the purposes of the administration in the field of information security must comply with the adopted information security policy. Leakage of trade secrets and other valuable information should not be allowed. However, the number of leaks is growing, and companies (as well as government organizations) are forced to reconsider the techniques and methods of countering information leaks. Among the standard methods of information protection, a firewall (ViPNet TIAS – Threat Intelligence Analytics System) occupies a special place for automatic detection of information security incidents in the event of increased anomalous activity of individual employees. The authors of this article see one of the solutions to combat leaks in the form of mathematical prediction of the level of deviance in the behavior of each employee in the form of a change in the psycho-emotional state, which is a dynamic category and changes depending on the factors of the external and internal environment of the employee, both inside and outside the organization. A stable “state” is replaced by a problematic “unstable” state, and, most likely, leads to information threats to the organization, in the form of information leaks, or irreversible information threats. This digital “footprint” fills the deviation detector model with metadata for the mathematical model of the organization’s information security, where exceeding the level of the calculated probability directly determines the “access” (or denial of access) of this employee to the business process and commercial information of the organization.ru
dc.language.isoenru
dc.publisherSpringer Science and Business Media Deutschland GmbHru
dc.relation.ispartofseriesLecture Notes in Networks and Systems-
dc.subjectCollection and processing of metadata about the employeeru
dc.subjectDeviant state of the employeeru
dc.subjectEmployee reflectionru
dc.subjectInformation security from an insiderru
dc.subjectNeural networksru
dc.titleThe Concept of a Methodology for Calculating the Deviation of an Employee’s Psychological Profile from the Actual Average Norm of Tolerant Ethics of Behavior for Information Protection in Small Businessesru
dc.typeСтатьяru
vkr.instПсихолого-педагогический факультетru
vkr.instФакультет пищевой инженерии и биотехнологийru
Appears in Collections:Статьи, проиндексированные в SCOPUS, WOS

Files in This Item:
File SizeFormat 
scopusresults 3816.pdf
  Restricted Access
129.5 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.