Abstract
The developed method and its interpretation as a graph model have demonstrated the possibility of the use of optimization methods and further analysis tools in the Internet-analysis. This method has been mathematically formalized and implemented with the aid of linear programming tools. Secondly, the practical implementation of the method has proved that this method has mathematical base and allows a researcher to aggregate statistics [1]. Finally, this analysis can be used as a methodological basis for a preliminary study of the interests of young scientists and graduate students. This may likely provide an objective assessment of the relevance of ongoing or planned research in virtually some limited [1] areas of interest (science’s researches, science’s activity, and etc.).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Zipf, G.K.: Human Behavior and the Principle of Least Effort. Addison-Wesley, Cambridge (1949)
Kavun, S.: Informational security: textbook / Kavun, S., vol. 368. Pub. of INZHEK, Kharkiv (2009)
Ponomarenko, V.: Conceptual foundations of economic security: monograph / Ponomarenko, V., Kavun, S., vol. 256. Pub. INZHEK, Kharkiv (2008)
Landauer, T.K., Foltz, P.W., Laham, D.: An Introduction to Latent Semantic Analysis. Discourse Processes 25, 259–284 (1998)
Kavun, S.: Analysis of categorical apparatus in the field of economic and information security / Kavun S, Mikhalchuk I / Economic of development: Science magazine, vol. 3 (51), pp. 9–14. Pub. INZHEK, Kharkiv (2009)
Kavun, S.: Model of insiders in the company. In: Kavun, S., Sorbat, I. (eds.) Securitatea Informaţională: ed. a 5-a Jubiliară Conf. Intern., April 16-17, vol. 76, ASEM, Chişinău (2008)
Shkarlet, S.: The economic security of enterprise: innovation aspect: monograph / Shkarlet, S., vol. 436. Books view of the NAU, Kiev (2007)
Kurkin, N.: Managing the economic security of the enterprise: monograph/ Kurkin, N., vol. 452. Art-Press, Dnepropetrovsk (2004)
Senchagov, V.: Strategic objectives mechanism to ensure the economic security. In: Senchagov, V.: Problems of Theory and Practice of Management, vol. (3), pp. 18–23 (2009)
Ponomarenko, V., Klebanova, T., Chernov, N.: Economic security in the region: analysis, evaluation, and prediction: monograph, vol. 143. INZHEK, Kh (2004)
Geyets, V.: The modeling of economic security: power, region, enterprise: monograph / Geyets, V., Kizim, M., Klebanova, T., Chernyak, O., vol. 240. Pub. INZHEK, Kharkiv (2006)
Oleynikov, E.: Principles of Economic Security (State, region, company, person. In: Oleynikov, E. (ed.) Moscow: JSC "Business School" Intelligence-Synthesis, vol. 288 (1997)
Kavun, S.: Method for constructing a security policy organization. In: Kavun, S., Shubina, G.: Business-Inform., vol. (1-2), pp. 96–102 (2005)
Murdoch, C.: Economic factors as objects of security: Economics security & vulnerability. In: Knorr, K., Trager, F.: Economics Interests & National Security, vol. 867, Lawrence (2001)
Eric Johnson, M.: Managing Information Risk and the Economics of Security, 1st edn. Interperiodica distributed exclusively, vol. 347. Springer Science + Business Media LLC (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kavun, S.V., Mykhalchuk, I.V., Kalashnykova, N.I., Zyma, O.G. (2012). A Method of Internet-Analysis by the Tools of Graph Theory. In: Watada, J., Watanabe, T., Phillips-Wren, G., Howlett, R., Jain, L. (eds) Intelligent Decision Technologies. Smart Innovation, Systems and Technologies, vol 15. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29977-3_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-29977-3_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29976-6
Online ISBN: 978-3-642-29977-3
eBook Packages: EngineeringEngineering (R0)