Sergii Kavun

Sergii Kavun
Interregional Academy of Personnel Management · Computer Information Systems and Technologies

Prof., PhD, Hab.Dr. (Dr.Sc.)

About

74
Publications
17,082
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
454
Citations
Introduction
I have got his Ph.D. in Computer Science in 2000. I awarded with the Habilitation Degree (Dr. Sc.) in Economics in 2014. I elevated to the rank of Associate Professor in 2005. I'm an accredited specialist of Management of Information Security by standard ISO 27002:2005. I have published more than 210 manuscripts, and is an owner of 3 patents. The manuscripts were prepared on the topic of information and economic security. My full CV - https://bit.ly/36CDeWv
Additional affiliations
March 2020 - May 2020
CodeIT LLC
Position
  • Head of Department
February 2020 - present
Interregional Academy of Personnel Management
Position
  • Head of Department
February 2018 - December 2019
Kharkiv University of Technology "STEP"
Position
  • RECTOR
Education
September 2014 - April 2016
Kharkiv Educational and Scientific Institute of Banking of the University of Banking
Field of study
  • Financial and Economic Security Management
September 1996 - November 2000
Kharkiv Military University, Ukraine
Field of study
  • Military Cybernetics, Control System and Intercommunications
September 1990 - August 1995
Kharkiv Military University, Ukraine
Field of study
  • Master of Science in Mathematical maintenance of Automatic Control System

Publications

Publications (74)
Article
Full-text available
The proliferation of blockchain technology heralds transformative impacts across various sectors, offering decentralization, transparency, and enhanced security. This paper explores the unique case of Cosmos, a scalable blockchain ecosystem designed to address the challenges of isolation and interoperability among existing blockchains. With its imp...
Article
Full-text available
This publication is devoted to substantiating the feasibility of introducing information security into the organizational and economic mechanism of project management to ensure the financial and budgetary capacity of the national economy through the filling of the state budget. The relevance of the chosen topic for research is determined by the com...
Article
Full-text available
To determine the necessary conditions for creating a safe environment for the embryo exposed to a laser beam and increasing cell viability, we researched to calculate the optimal technical parameters and temperature indicators of laser exposure to the embryo. For this purpose, we controlled the temperature conditions of laser action on the embryo....
Article
In the recent years, a large amount of literature on the computational aspects of critical infrastructures security has emerged, much of it focusing on cryptography, cyber, informational and economical security, theory, methods, approaches and algorithms associated with certain classes of such problems. The topic proposed to treat in this special i...
Chapter
Active usage of information technologies in every field of human activity nowadays is not a matter of choice. So any higher education institution as well as any other organization is forced to use information systems in order to be in the flow. So, it should be noted that real pace of changes in global education sector (especially its private part)...
Article
Full-text available
The study aims at developing an approach to determining the bank connectivity level. This will contribute to implementing a risk-oriented approach to counteracting money laundering, terrorist financing and the proliferation of mass destruction weapons. The article proposes to assess the degree of bank connectivity and determine the impact of these...
Article
Full-text available
In this article, heuristic methods of hill climbing for cryptographic Boolean functions satisfying the required properties of balance, nonlinearity, autocorrelation, and other stability indicators are considered. A technique for estimating the computational efficiency of gradient search methods, based on the construction of selective (empirical) di...
Conference Paper
Full-text available
The structure and features of the construction for intrusion detection and prevention network systems, as well as methods for the correlation analysis of telecommunication traffic in computer systems and networks are considered. Method for detecting malicious software based on the correlation analysis of network traffic is proposed. In particular,...
Article
Full-text available
In recent years, a large literature on bilevel programming in finite-dimensional spaces has emerged, much of it focusing on optimality conditions, theory, and algorithms associated with certain classes of such problems. The topic proposed to treat in this special issue goes one step further in attempting to deal with bilevel programming problems ex...
Article
The complex of models of metallurgical enterprises competitiveness management in unstable currency environment is built based on the metallurgical enterprises competitiveness level evaluation and industry trends of their development. The degree of the exchange rates impact on the metallurgical enterprises competitiveness by the methods of reduction...
Article
Full-text available
The purpose of this paper is to develop a scientific and methodical approach for determination of the comprehensive social responsibility indicator in this paper based on estimation of influence degree for the economical, ecological, social and labour, standard and legal components. There is allowance for determining of some level of enterprise soc...
Article
Full-text available
Results of analysis of topicality of researches in the cash flow area by the tools of Internet-analysis are presented. Selected definitions used for analysis are introduced. Mathematical description of the tools of the Internet- analysis and results of demand distribution are presented. Distributions of topicality of researches for each of select...
Article
Full-text available
Presented by the author's indicative-geometric method (IGM) is a new method for estimating the significance or any properties or features of business entities. This method can help to choose the best (or worst) business entity from some set based on its aggregate indicator. In addition, this method can be used for estimation, when the studied objec...
Article
Full-text available
Social responsibility strategy of the enterprise based on the «Social responsibility – Productivity of activity» matrix have been proved in the article. This matrix provided quadrants (І «Leaders of trust» – progressive adaptant; ІІ. «Skeptical businessmen» – progressive dezadaptant; ІІІ. «Imprudent organizers» – regressive dezadaptant; IV. «Inexpe...
Article
Full-text available
The article has studied the dynamics of world trade market testifying, that is not taking into consideration its regeneration, the market development is connected with a sharp increase of uncertainty both at developed markets and in developing ones. The authors concluded that the dynamics of different segments of the world stock market depends not...
Article
Full-text available
The main purpose of this paper is to show some conceptual fundamentals for a new theory of mathematical interpretation (TMI), which can be used for solving the non-formalised and heavy-formalised tasks in different areas of science. This theory has all principal factors, which are inherent to any theory. Foremost, this theory has the historical, th...
Article
Full-text available
Stock market is an integral and important part of the financial system of any country. The recent security transaction development entered into wide use, which in turn determines the number of problems faced by securities market participants. However, given the trend in the stock market and changes in the financial system of Ukraine in its security...
Article
Full-text available
Although a wide range of applications fit the bilevel programming framework, real-life implementations are scarce, due mainly to the lack of efficient algorithms for tackling medium-and large-scale bilevel programming problems. Solving a bilevel (more generally, hierarchical) optimization problem, even in its simplest form, is a difficult task. A l...
Article
Full-text available
In this paper have been proposed a method of estimating the results and identify opportunities for businesses to ensure balanced performance of this business. Matrices are refining business enterprise hospitality. Estimated results of the hospitality business enterprise are using the matrix method, which can generate field performance. It is a syst...
Article
Full-text available
Presented by the author's clipping method is a modify method for unpromising variants at solving the problem of the integer linear programming with Boolean variables. This method can help to improve, i.e. to decrease a calculated complexity of an algorithm of a solution of the integer linear programming problem with Boolean variables based on the p...
Article
Full-text available
The method of calculation of a generalizing indicator of a productivity of the enterprise activity based on the matrix-rank approach is presented in this paper. The value of the generalizing indicator of productivity of any enterprise activity due to use of the geometrical interpretation can be defined based on the matrix-rank approach. Intermediat...
Article
Full-text available
In this paper a synthesis concept of information and analytical support for bank security sys- tem is proposed. In addition, its structure under the ITIL and IDEF0 standards is defined, basic principles, classification attributes, and synthesis specific features are grounded. A classification of decision makers in accordance with international stan...
Article
Full-text available
The article discloses the problems of an Internet-crime (cybercrime) prevention that is a purpose of this article. As one of an approach for presenting of these some results is a show of currency and further events and actions, which can create a discuss for next considerations in this area. At one point, the Internet enabled to commit previous tra...
Article
Full-text available
Modern approaches to the development of a national economy are often characterized with an imbalanced inflation of some economic branches leading to a disproportional socioeconomic territories development (SETD). Such disproportions, together with other similar factors, frequently result in a lack of economic integrity, various regional crises, and...
Article
Full-text available
Evaluation of banking system stability is enough hard task and it has very limited approaches and methods for solving of this problem. At the same time, this task is staying in the first place in the most banking systems, because it is important for further decision making and forecasting for the next development of these systems. This method also...
Article
The article highlight the conceptual statements the model basis formation of the early prevention systems crisis forecasting. The base model is presented as complex interrelated module based on macroeconomic indicators forecasting module adjusted for cycle-formation factors; regional development indicators forecasting module adjusted for cycle-form...
Article
Full-text available
The problem of arithmetic operations performance in number fields is actively researched by many scientists, as evidenced by significant publications in this field. In this work, we offer some techniques to increase performance of software implementation of finite field multiplication algorithm, for both 32-bit and 64-bit platforms. The developed t...
Conference Paper
Full-text available
The article considers the importance of tourism branding of the country, proved the relationship between the country's tourist brand as an element of the customer relationship management, companies and travel services, analyzed the level of brand development of the world as a tourist destination. Also in this manuscript are shown different statisti...
Conference Paper
Full-text available
In this article was considered models complex of balanced regions development based on fiscal (or tax-budget) policy, which will be able to give a possible for conducting structural imbalances analysis of the territories (regions) development in perspective time period and parameters determination of this fiscal policy, which can providing their el...
Conference Paper
Full-text available
The article considers the importance of tourism branding of the country, proved the relationship between the country's tourist brand as an element of the customer relationship management, companies and travel services, analyzed the level of brand development of the world as a tourist destination. Also in this manuscript are shown different statisti...
Article
Full-text available
Economic security of the enterprise from a position of iterative approach is considered, namely its structure, functions, processes, the purposes and features of the microsphere, the macrosphere and the metasphere is investigated in the article. This approach also allowed allocating exogenous, endogenous and contextual components that promoted defi...
Article
Full-text available
Purpose – The main purpose of this study is a modelling of assessment processes for irregularity and cyclical of dynamic regions development, which used to reduce inter-regional contrasts, disruptions and variations in a socio-economic development on base an effective regional financial policy. Design/methodology/approach – The conceptual provision...
Article
Full-text available
The main purpose of this study is to show the possibility of estimating the effectiveness and functioning of a System of Economic Security (SES) for enterprises. This estimation will show examples of some of the activities of SES. The conceptual provisions and model basis are based on some of the real indicators of a functioning enterprise. This me...
Article
Full-text available
In this article, research of electricity market oligopolistic model, applied in Mexico, has been carried out and their results have been analyzed. Mexican electricity market is currently a monopoly regulated by the government (a competitive market has not been established yet). Thus, the given article can be evaluated as an empirical study of possi...
Article
Full-text available
The article studies the problems of improving the degree of information security in the distance learn-ing systems (DLS) at the expense of using innovative methods and technologies of information securi-ty systems (ISS). In this article are also considered the recommendations for improving existing DLS in training of the specialists at higher educa...
Article
Full-text available
The most significant problems of development of some national economies, including Ukraine, are the ensuring balanced economic development of territories (areas or regions). Strengthening unevenness socio-economic development of territories leads to an increase in the threat of disintegration, to the formation of crises, makes it impossible to full...
Article
Full-text available
The developed method and its interpretation as a graph model have demonstrated the possibility of the use of optimization methods and further analysis tools in the Internet-analysis. This method has been mathematically formalized and implemented with the aid of linear programming tools. Secondly, the practical implementation of the method has prove...
Article
Full-text available
The authors propose a new approach to the mathematical interpretation to overcome the problems associate with the identification (detect) of the unauthorized acquisition (intentional and accidental) of information by insiders within an enterprise of any industry. The approach is based on the use of mathematical tools based on integer programming. S...
Article
Full-text available
The article studies the problems of improving the degree of information security in the distance learning systems (DLS) at the expense of using innovative methods and technologies of information security systems (ISS). In this article are also considered the recommendations for improving existing DLS in training of the specialists at higher educati...
Article
Full-text available
This paper introduces a Co-Z approach to divisor scalar multiplication in Jacobian of genus 2 hyperelliptic curves over binary fields in projective and weighted coordinates. Approach based on improved addition formulae of weight 2 divisors in projective and weighted divisor representation in most frequent case that suit very well to exponentiation...
Article
Full-text available
In the present article there are grounds of model basis of discount basis system of regional devel-opment, which is presented as the complex of interrelated modules, mainly: the module of as-sessment and analysis of inequality of social-economic development (SED) of Ukrainian regions; the module of management of scenarios of social-economic develop...
Patent
Full-text available
http://uapatents.com/patents/34852-sposib-kriptografichnogo-peretvorennya-informaci-1.png
Patent
http://uapatents.com/patents/39676-sposib-kriptografichnogo-peretvorennya-informaci-1.png
Article
Full-text available
The article studies the problems of insider dealings under conditions of the Ukrainian economy reforming. The results of the statistical studies of the foreign companies are presented as well as the classification of the insider risks, types of the abusers and methods of their detection.
Article
Вміщено лабораторні роботи з основних розділів курсу, присвяченим вивченню методології та архітектури побудови систем інформаційної безпеки студентами факультету економічної інформатики. Роботи призначені для практичного засвоєння й використання основних методів та програмних засо- бів діагностики, лаштування, відновлення та використання систем і...
Article
Full-text available
The article studies the problems of improving the degree of information security in the distance learning systems (DLS) at the expense of using innovative methods and technologies of information security sys-tems (ISS). In this article are also considered the recommendations for improving existing DLS in training of the specialists at higher educat...

Network

Cited By