This paper focuses on the dynamic capabilities theory and foresight theory in whole to the problem of the human capital in education and its management. The main channel for building up dynamic abilities and foresight competencies of educational enterprises and specialists, as well as the focus of foresight research in modern science and management practice is working with human resources, with the human capital of firms, communities, and countries. This work also includes work with social and cultural capital, focused on improving the culture of relationships in communities, including the culture of the state, society and business. The orientation of the world social development to increase the innovation component in the economic, social and spiritual spheres of society and in its education, led to the recognition of human capital as a leading and decisive factor in the socio-economic development of systems of various scales and levels. Scientists notes that in modern conditions of globalization of markets and transnationalization of economic relations, as well as a significant level of intellectualization of modern business processes, human capital and education in business and in other spheres is a decisive factor in the compe-titiveness of national economy on the different levels. This moment is especially noticeable in the studies of the dynamic abilities of educational enterprises and the management of educational enterprises. This moment is also especially noticeable in foresight studies and other reconstructions of the past, present and future development of organizations. Dynamic capabilities are required if the firm is to sustain itself as markets and technologies change, although some firms will be stronger than others in performing some or all of these tasks. Foresight is a system of methods of transformation of priorities in the sphere of economy and production, social and cultural development, and in education. Human resource management in education is an important part of the problem of the dynamic abilities of educational enterprises. The management of selection, training, retraining and personnel development, the formation and enrichment of technologies for managing professional and career development are naturally part of a dynamically and steadily developing enterprise. Foresight of the development of the educational enterprise as a leading aspect includes a general assessment of the professional and career potential of the organization’s employees, as well as the dynamic abilities of the organization’s manager (his ability and willingness to diversify activities, training and retraining, etc.) and other specialists. The purpose of the study – analysis of foresight competence as a component of dynamic capabilities (competences) of the educational enterprises and specialists of educational enterprises in context of the human capital problems. Foresight involves the use and transformation meta-technology ("routines") of enterprise and innovation in the field of production and relations of production. It is aimed at the allocation and use of markers of change – weak and strong signals of future and probable changes. Active and accurate identification of these markers changes in education, including application and modification of routine or meta-technology of enterprise management, not only allows to predict "unpredictable", but also to intervene in the process flow, correcting them with the least expenditure of forces, material, mental and spiritual resources. In addition, it allows you to influence the markets themselves and the surrounding enterprise reality in general. Thanks to the foresight competence and ability, the specialist in education and his company productively adapt to changes in environment (market and society), but also participate in changing it.
The purpose of the article is a brief description of the experience of analyzing the conceptual foun-dations of governance in education and other spheres in post-Soviet Russia in comparison with developed democracies; a description of typical approaches to the implementation (imitation) of strategic planning in management, as well as the consequences and specific traits of contextual, a-strategic management. Conceptual management in education and in the context of others is oppose to contextual management. Modern management concepts are externally presented in Russian education and in other areas of management discourse and practice. The system of professional standards developed in the country is designed to solve a number of managerial tasks. However, the non-conceptual use of professional standards leads to an imbalance in subject-object interaction and in organization in whole. This article lists two categories of workers. Non-compliance with the professional requirements is typical to the first category of workers. Failure to comply with professional standards also take part to the professional, partners and personal deformations. These deformations are illustrated by the text of management strategies. Having strategies is an incentive for development. However, the lack of an algorithm for the compilation and evaluation of such documents, the analysis of the importance of this aspect in the process of evaluating the activities of authorities leads to the fact that this strategic management remains unclaimed in the territorial and organizational management system. The authors consider two leading aspects of the problem of territorial strategization: (1) substantiation of the reasons for poor-quality strategic developments; (2) the search for errors in the conceptual management methodology. The roots of the first problem should be found in the imbalances in the formation and development of the subject of management, starting with the problem of improper selection and de-professionalization of managerial personnel. To solve the second problem, the authors propose SEO analysis tools as a methodology for evaluating strategy texts. This tool solves the problem of audit of regional strategies in the context of administrative, socio-psychological and linguistic aspects of public servants in the field of education. The data obtained can also be disseminated to non-governmental educational institutions: in particular, in additional or global education it is extremely important to know its subject, object, purpose and objectives, etc. Otherwise, as in the case of state educational institutions, imitations will arise that are more likely to harm education and society than support it.
The aim of the study is to increase the effectiveness of information security management for state information systems (SIS) with terminal access devices by improving regulatory legal acts that should be logically interconnected and not contradict each other, as well as use a single professional thesaurus that allows understanding and describe information security processes.Currently, state information systems with terminal access devices are used to ensure the realization of the legitimate interests of citizens in information interaction with public authorities [1].One of the types of such systems are public systems [2]. They are designed to provide electronic services to citizens, such as paying taxes, obtaining certificates, filing of applications and other information. The processed personal data may belong to special, biometric, publicly available and other categories [3]. Various categories of personal data, concentrated in a large volume about a large number of citizens, can lead to significant damage as a result of their leakage, which means that this creates information risks.There are several basic types of architectures of state information systems: systems based on the “thin clientpeer-to-peer network systems; file server systems; data processing centers; systems with remote user access; the use of different types of operating systems (heterogeneity of the environment); use of applications independent of operating systems; use of dedicated communication channels [4]. Such diversity and heterogeneity of state information systems, on the one hand, and the need for high-quality state regulation in the field of information security in these systems, on the other hand, require the study and development of legal acts that take into account primarily the features of systems that have a typical modern architecture of “thin customer". Materials and research methods. The protection of the state information system is regulated by a large number of legal acts that are constantly being improved with changes and additions to the content. At the substantive level, it includes many stages, such as the formation of SIS requirements, the development of a security system, its implementation, and certification. The protected information is processed in order to enforce the law and ensure the functioning of the authorities. The need to protect confidential information is determined by the legislation of the Russian Federation [5, 6]. Therefore, to assess the quality of the regulatory framework of information security for terminal access devices of the state information system, the analysis of the main regulatory legal acts is carried out and on the basis of it, proposals are developed by analogy to improve existing regulatory documents in the field of information security.Results. The paper has developed proposals for improving the regulatory framework of information security for terminal access devices of the state information system- for uniformity and unification, the terms with corresponding definitions are justified for their establishment in the documents of the Federal Service for Technical and Export Control (FSTEC) or Rosstandart;- rules for the formation of requirements for terminals, which should be equivalent requirements for computer equipment in the “Concept for the protection of computer equipment and automated systems from unauthorized access to information ".Conclusion. General recommendations on information protection in state information systems using the “thin client" architecture are proposed, specific threats that are absent in the FSTEC threat bank are justified, and directions for further information security for the class of state information systems under consideration are identified. Due to the large number of stakeholders involved in the coordination and development of unified solutions, a more specific consideration of the problems and issues raised is possible only with the participation of representatives of authorized federal executive bodies and business representatives for discussion.
The objective of multi-level logic synthesis of FPGA is to find the "best" multi-level structure, where "best" in this case means an equivalent presentation that is optimal with respect to various parameters such as size, speed or power consumption... Five basic operations are used in order to reach this goal: decomposition, extraction, factoring, substitution and collapsing. In this paper we propose a novel application of Walsh spectral transformation to the evaluation of Boolean function autocorrelation. In particular, we present an algorithm with approach to solve the problems of covering based on the use of Walsh spectral presentation. The methods, operations in the transform domain has appeared to be more advantageous than traditional approaches, using operations in the Boolean domain, concerning both memory occupation and execution time on some classes of functions.
The purpose of this article is to develop students’ critical thinking for solving problems in the field of information security by using the method of problem learning in teaching the discipline “Information Security”. The role of this method in the development of critical thinking, research creativity of students and their achievement of a better understanding of educational material in the field of information security is emphasized.Materials and research methods. The main conditions for the effectiveness of problem learning in the study of the discipline “Information Security” are highlighted by the method of analysis of the subject area: motivation of students, the feasibility and significance of problem situations offered to students on various aspects of information security, dialogical friendly communication between lecturer and students. As research materials, an example of using the method of problem learning in solving the task of information protection in state information systems with terminal access devices is considered. The example presents the problem of increasing the efficiency of information protection in state information systems with terminal access devices, i.e. state information systems using the “thin client” architecture, as well as a way to solve it by assessing threats and improving the relevant mechanisms for ensuring information security, presented in the regulatory documents governing the requirements for information protection in state information systems with terminal access devices. Results. The paper considers the practical task of creating and resolving a problem situation for the protection of information in state information systems with terminal access devices, which can be used in the educational process to solve similar tasks by the method of problem learning.The creation of a problematic situation is based on the existing contradictions in the regulations governing the functioning and protection of information of this type of systems in which the protected information is processed in order to comply with legislation and ensure the functioning of authorities. As a result of using a systematic approach, which involves considering the process of information protection in the form of a set of stages in the formation of requirements for state information systems using the architecture of the “thin client”, improving the regulatory framework, the trainees form proposals for the protection of information in state information systems using the architecture of the “thin client” to ensure the design security of state information systems, taking into account the complex of urgent threats to information security. The presented solution to the problem situation in the considered task requires from the trainees general cultural competencies, such as: identifying contradictions, colliding opposing points of view, comparing facts, considering the problem from different points of view, generalizing, concretizing facts, etc.Conclusions. Thus, the paper substantiates the method of problem learning in the study of the discipline “Information Security” and presents an example of its use in solving the problem of information protection in state information systems with terminal access devices. As a result, the trainees must identify threats that are absent in the information security threat databank of the Federal Service for Technical and Export Control of the Russian Federation (FSTEC of Russia) and determine the directions for further development of information security and information protection in state information systems with terminal access devices. The practical solution of this problem by a group of students within the framework of the study of the discipline “Information Security” showed a high level of competence development.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.