Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ ZENODOarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Article . 2024
License: CC BY
Data sources: ZENODO
ZENODO
Article . 2024
License: CC BY
Data sources: Datacite
ZENODO
Article . 2024
License: CC BY
Data sources: Datacite
versions View all 2 versions
addClaim

Diversification of the risks of the implementation information and communication technologies

Authors: Kolodiychuk, Anatoliy;

Diversification of the risks of the implementation information and communication technologies

Abstract

communication technologies.The purpose of the study is to identify patterns of risks of information and communicationtechnology implementation.Research methods. The work uses the dialectical method of scientific knowledge, the method ofanalysis and synthesis, the comparative method, and the method of summarizing data.Work results. The article considers the diversification of ICT risks as a factor for ensuring thestability and sustainable development of the national economy, which allows to reduce the probability ofsignificant failures and losses. The risk diversification factor of ICT implementation comes down to theuse of different approaches and technologies to mitigate and reduce possible negative consequences.It involves the distribution of resources and tasks across different ICT and network infrastructures, aswell as the use of different service providers and equipment suppliers. This approach allows to reducedependence on one supplier or one system, which reduces the risk of data loss or system unavailability.Conclusions. The risk diversification factor of ICT implementation is an important aspect for ensuring thesecurity of information systems and networks. This approach makes it possible to reduce possible negativeconsequences and increase the organization’s stability in the field of information technologies. Its use requiresa systematic approach and constant monitoring, as well as adaptation to changing conditions and threats.The essence of the concept of risk diversification is the allocation of investments and resources to differentareas and instruments. This allows you to reduce exposure to threats and minimize possible negativeconsequences. In the context of the introduction of ICT into the national economy, diversification of risks involvesthe use of various technologies, software solutions and information systems. One of the main approaches todiversifying the risks of ICT implementation is the joint use of open and closed software. The integration ofopen solutions allows to improve the security of the system through mass testing and the participation ofthe community of developers. The use of closed software makes it possible to meet the security and dataprotection requirements that are specific to certain sectors of the economy. Another important aspect ofrisk diversification is the use of different types of equipment. To increase resistance to cyberattacks, it isnecessary to create a hybrid environment that combines cloud and local resources. Cloud technologies allowto increase the flexibility and scalability of the system, while local servers ensure the preservation and controlover data. Education and training of personnel is important in risk diversification. Taking into account the rapiddevelopment of ICT, it is necessary to provide specialists with the skills to effectively protect information andresist cyber threats. Personnel training, as well as cooperation with foreign experts and organizations, willhelp to strengthen national cyber security and develop strategies to diversify risks.

Keywords

diversification, international economic security, information and communication technologies, financial sector, risks, management, cyber threats, economic model

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average