|
|
|
V. O. Piskovski,A. A. Grusho,M. I. Zabezhailo,A. V. Nikolaev,V. V. Senchilo,E. E. Timonina
Pág. 48 - 52
The article considers the task to protect information when an adversary uses methods of collecting valuable information on indirect signs in the information environment available to attackers. It is assumed that all personal data in the considered inform...
ver más
|
|
|
|
|
|
Julia Malieieva, Olga Malyeyeva, Anatolii Demchenko, Lidiia Piddubna
Pág. 34 - 42
The subject of the article is information technology to support the process of investing in real estate projects. Real estate projects need to find sources and forms of investment that would ensure a balance between project costs and financial resources....
ver más
|
|
|
|
|
|
Youness Zidoun,Rachid Dehbi,Mohamed Talea,Fatima-Zohra El Arroum
Pág. pp. 152 - 170
New technologies are rapidly changing mobile learning and making it difficult to control. In addition to educational factors and learning content, a modern mobile learning system must take into account the technical and personal aspects of learning, the ...
ver más
|
|
|
|
|
|
Varvara Piterska, Oleh Lohinov, Liliia Lohinova
Pág. 99 - 108
The subject matter of the article is the methods, models and mechanisms of forming a portfolio of research projects of higher education institutions. The goal of the work is to develop a mechanism for managing a portfolio of research projects of a higher...
ver más
|
|
|
|
|
|
klaus Solberg Söilen
It is often heard, and even more often seen written, for example on social media, that that there is nothing new in the competitive intelligence (CI) field. There are no new ideas, the ideas that are being expressed are the same old, there is no developm...
ver más
|
|
|