Strategy of provision of wireless future's security

6Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Purpose: The purpose of the article is to develop a strategy of provision of security of wireless future of digital economy. Methodology: The author determines, analyzes, and compares scenarios of wireless future of digital economy depending on completeness of provision of security, with the help of the methods of logical and problem analysis and imitation modeling. Results: As a result of modeling the wireless future of digital economy, the risks to security, causes of their emergence (factors that require management), and perspectives of risk management are determined. A strategy of provision of security of wireless future of digital economy is presented-it reflects the structure of risk management of this process through the prism of its subjects and performed functions, as well as the tools that include robototronics, cloud and blockchain technologies, and human monitoring of digital devices. Implementation of this strategy will allow reducing the risk component of functioning and development of digital economy, its quick growth and stimulation of social progress (increase of population's living standards)-i.e., implementation of the optimistic scenario. Recommendations: As a result, it is concluded that even in case of highly-effective risk management there preserves a rather high level of risk of provision of security of digital economy's wireless future. Thus, with digital modernization of modern socio-economic systems together with practical implementation of the offered strategy of provision of security of digital economy's wireless future, it is recommended to conduct measures for reducing the level of social tension and preventing the opposition to changes.

Cite

CITATION STYLE

APA

Bogoviz, A. V., Mishchenko, V. V., Zakharov, M. Y., Kurashova, A. A., & Suglobov, A. E. (2019). Strategy of provision of wireless future’s security. In Studies in Computational Intelligence (Vol. 826, pp. 941–947). Springer Verlag. https://doi.org/10.1007/978-3-030-13397-9_97

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free