{"title":"IMPLEMENTATION OF DIGITAL MANAGEMENT IN THE SECURITY FIELD","authors":"V. Begun","doi":"10.17721/2706-9699.2022.2.04","DOIUrl":null,"url":null,"abstract":"The implementation of information technologies in Ukraine in the field of security and the state of education in this direction were studied. A comparison of the degree of informatization in this field and education in this field with developed countries in the nuclear field is made. The problems and tasks of teaching the direction of digital management in the field of security and the main method of modeling dangerous systems and processes — probabilistic structural and logical models — are analyzed. Conclusions were made about the need for more widespread education in the applied field of security, formulation and solution of actual problems, creation of special software.","PeriodicalId":40347,"journal":{"name":"Journal of Numerical and Applied Mathematics","volume":"2003 1","pages":""},"PeriodicalIF":0.1000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Numerical and Applied Mathematics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17721/2706-9699.2022.2.04","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The implementation of information technologies in Ukraine in the field of security and the state of education in this direction were studied. A comparison of the degree of informatization in this field and education in this field with developed countries in the nuclear field is made. The problems and tasks of teaching the direction of digital management in the field of security and the main method of modeling dangerous systems and processes — probabilistic structural and logical models — are analyzed. Conclusions were made about the need for more widespread education in the applied field of security, formulation and solution of actual problems, creation of special software.