International Journal of Information Technology and Computer Science(IJITCS)

ISSN: 2074-9007 (Print), ISSN: 2074-9015 (Online)

Published By: MECS Press

IJITCS Vol.13, No.5, Oct. 2021

Risk-based Decision-making System for Information Processing Systems

Full Text (PDF, 813KB), PP.1-18

Views:0   Downloads:0


Serhii Zybin, Yana Bielozorova

Index Terms

Information system;decision support system;efficiency;information security;quantitative criterion;process modeling;information impact


The article is dedicated to using the methodology of building a decision support system under threats and risks. This method has been developed by modifying the methods of targeted evaluation of options and is used for constructing a scheme of the decision support system. Decision support systems help to make correct and effective solution to shortage of time, incompleteness, uncertainty and unreliability of information, and taking into account the risks. When we are making decisions taking into account the risks, it is necessary to solve the following tasks: determination of quantitative characteristics of risk; determination of quantitative indicators for the effectiveness of decisions in the presence of risks; distribution of resources between means of countering threats, and means that are aimed at improving information security. The known methods for solving the first problem provide for the identification of risks (qualitative analysis), as well as the assessment of the probabilities and the extent of possible damage (quantitative analysis). However, at the same time, the task of assessing the effectiveness of decisions taking into account risks is not solved and remains at the discretion of the expert. The suggesting method of decision support under threats and risks has been developed by modifying the methods of targeted evaluation of options. The relative efficiency in supporting measures to develop measures has been calculated as a function of time given on a time interval. The main idea of the proposed approach to the analysis of the impact of threats and risks in decision-making is that events that cause threats or risks are considered as a part of the decision support system. Therefore, such models of threats or risks are included in the hierarchy of goals, their links with other system's parts and goals are established. The main functional modules that ensure the continuous and efficient operation of the decision support system are the following subsystems: subsystem for analysing problems, risks and threats; subsystem for the formation of goals and criteria; decision-making subsystem; subsystem of formation of the decisive rule and analysis of alternatives. Structural schemes of functioning are constructed for each subsystem. The given block diagram provides a full-fledged decision-making process.

Cite This Paper

Serhii Zybin, Yana Bielozorova, "Risk-based Decision-making System for Information Processing Systems", International Journal of Information Technology and Computer Science(IJITCS), Vol.13, No.5, pp.1-18, 2021. DOI: 10.5815/ijitcs.2021.05.01


[1]Thomas L. Saaty: Fundamentals of Decision Making and Priority Theory With the Analytic Hierarchy Process. RWS Publications. – p. 478. (2000).

[2]Thomas L. Saaty, Kirti Peniwati: Group Decision Making: Drawing Out and Reconciling Differences. RWS Publications. – p. 385. (2013).

[3]Thomas L. Creative Thinking, Problem Solving and Decision Making. RWS Publications; Fourth Printing edition. – p. 267. (2004).

[4]Bidiuk O. P. Kompiuterni systemy pidtrymky pryiniattia rishen: [navchalnyi posibnyk] / O. P. Bidiuk, O. P. Hozhyi, L. O. Korshevniuk. – Mykolaiv: Vyd-vo ChDU im. Petra Mohyly, 2012. – 380 s. [In Ukrainian]

[5]Romanov V.P. Intellektual'nye informacionnye sistemy v jekonomike: Uchebnoe posobie / M: "Jekzamen", 2003. – 496 s. [In Russian]

[6]Bryan Hosack, Dianne J Hall, David B. Paradice, James F. Courtney. A Look Toward the Future: Decision Support Systems Research is Alive and Well. Journal of the Association for Information Systems 13(5):315-340. (2012). doi: 10.17705/1jais.00297. Available at:

[7]Fraud detection: A systematic literature review of graph-based anomaly detection approaches.

[8]F. Burstein, C. Holsapple. Handbook on Decision Support Systems 1. Springer-Verlag Berlin Heidelberg. p. 854. (2008). doi:10.1007/978-3-540-48713-5

[9]Zhengbing Hu, Viktor Gnatyuk, Viktoriia Sydorenko, Roman Odarchenko, Sergiy Gnatyuk,"Method for Cyberincidents Network-Centric Monitoring in Critical Information Infrastructure", International Journal of Computer Network and Information Security (IJCNIS), Vol.9, No.6, pp.30-43, 2017.DOI: 10.5815/ijcnis.2017.06.04

[10]Zhengbing Hu, Sergiy Gnatyuk, Tetiana Okhrimenko, Sakhybay Tynymbayev, Maksim Iavich, "High-Speed and Secure PRNG for Cryptographic Applications", International Journal of Computer Network and Information Security (IJCNIS), Vol.12, No.3, pp.1-10, 2020.DOI: 10.5815/ijcnis.2020.03.01

[11]Zhengbing Hu, Roman Odarchenko, Sergiy Gnatyuk, Maksym Zaliskyi, Anastasia Chaplits, Sergiy Bondar, Vadim Borovik, "Statistical Techniques for Detecting Cyberattacks on Computer Networks Based on an Analysis of Abnormal Traffic Behavior", International Journal of Computer Network and Information Security (IJCNIS), Vol.12, No.6, pp.1-13, 2020.DOI: 10.5815/ijcnis.2020.06.01

[12]Schuff D., Paradice D., Burstein F., Power D.J., Sharda R. (Eds.). Decision Support. Springer-Verlag New York. P. 224. (2011). doi: 10.1007/978-1-4419-6181-5

[13]Robert E. Shannon. Systems Simulation: The Art and Science. Prentice-Hall. p. 387. (1975).

[14]Gerasimov, B. M. Cheloveko-mashinnye sistemy prinjatija reshenij s jelementami iskusstvennogo intellekta / B. M. Gerasimov, V. A. Tarasov, I. V. Tokarev, Akad. nauk USSR. In-t kibernetiki im. V.M. Glushkova . – Kiev: Naukova dumka, 1993. – 183 s. [In Russian]

[15]Wayne T. Graybeal, Udo W. Pooch. Simulation, Principles and Methods. Winthrop Publishers, p. 249. (1980)

[16]V.O. Khoroshko, S.V. Zybin. Otsinka yakosti funktsionuvannia kompleksnykh system tekhnichnoho zakhystu y system pidtrymky ukhvalennia rishennia v yikhnomu skladi. // Pravove, normatyvne ta metrolohichne zabezpechennia systemy zakhystu informatsii v Ukraini, vyp. 2 (24), 2012 r. – S. 7-15. [In Ukrainian]

[17]Charles S. Wasson. System Engineering Analysis, Design, and Development. Wiley; 2nd edition. P.880. (2015)

[18]Ostrouh A.V., Nikolaev A.B.  Intellektual'nye informacionnye sistemy i tehnologii. - Izdatel'stvo "Lan'". – 2019. – 308 s. [In Russian]

[19]Trahtengerc Je.A. Komp'juternaja podderzhka formirovanija celej i strategij. Serija "Sistemy i problemy upravlenija". – M.: SINTEG, 2005. –  224 s. [In Russian]

[20]Eom S.B. Desicion support systems research: reference disci¬plines and a cumulative tradition // The International Journal of Management Science, - 1995. - Vol. 23. N 5. - P. 511-523.

[21]Smart Choices. A Practical Guide to Making Better Decisions. With John S. Broadway Books, New York, p. 256. (2002).

[22]Keeney, R.L. Developing Objectives and Attributes, Advances in Decision Analysis, W. Edwards, R.F. Miles, Jr., and D. von Winterfeldt, eds., Cambridge University Press, New York. (2007).

[23]Ralph L. Keeney. Applying Value-Focused Thinking. Military Operations Research Volume 13 Number 2. (2008). DOI: 10.5711/morj.13.2.7

[24]Acceptable Risk.With B. Fischhoff, S. Lichtenstein, P. Slovic, and S. Derby, Cambridge University Press, New York. p. 202. (2010).

[25]Clyde W. Holsapple, Andrew B. Whinston / Decision support systems: a knowledge-based approach. p. 716 p. (1996).