Abstract

The segmentation of the stationery market, analyzes the demand, the main trends, the prospects for development and the existing problems are considered in the work. It has been established that the main two segments over the past years are office supplies and educationproducts. Modeling of business processes of the office supply store network was carried out, IDEF0, DFD, IDEF3 diagrams were constructed using the IDEF methodology for the AS-IS variant. The conclusion is that re-engineering requires wholesale business processes related to theevaluation of suppliers, which is currently determined by subjective judgments about their activities of the store director. The main criteria for evaluation of office supply store suppliers are analyzedand their classification is given. The main criteria for selecting suppliers, such as security of supply, price of goods, average lead time and financial position, are determined. It is revealed thatthe most promising method of supplier evaluation is the method of expert evaluation. The methodology of complex supplier evaluation, based on the matrix implementation of the method ofexpert assessments, as well as the algorithm for calculating the reliability of one supplier's supply, is presented. Measures to reengineer the modeling of business processes of the office supply stores'shopping network based on the mathematical model are proposed. IDEF3 diagrams were constructed using the IDEF methodology for the TO-BE variant, and a comparative analysis of the original and post-reengineering diagrams was performed. The conclusion is made about the prospects of re-engineering other wholesale business processes as such, which provides the main revenue for the stationery store.

Highlights

  • У роботі розглянуто сегментацію ринку канцелярських товарів, проаналізовано попит, основні тенденції, перспективи розвитку та наявні проблеми

  • The main categories of information security threats for an enterprise and theories that can form the basis of an information security system are considered in the work

  • their decomposition according to the IDEF methodology is performed

Read more

Summary

Інформаційні технології

Contextual and functional diagrams of the processes for ensuring the information system of an enterprise in notations IDEF0, IDEF3, DFD, as well as diagrams of individual subprocesses are constructed, their decomposition according to the IDEF methodology is performed. The main measures of reengineering the process of developing an information security system are identified. The diagram of the subprocess of developing an information security system in the IDEF0 notation is analyzed, taking into account the improved mathematical model of an enterprise information security system. It is concluded that it is necessary to study the effectiveness of reengineering using a risk-based model, which will allow us to assess the risks from the implementation of information security threats and make the best decision to minimize risks and introduce new means of protecting the information security of the enterprise.

АЛГОРИТМУ ВИЗНАЧЕННЯ НАДІЙНОСТІ ПОСТАЧАЛЬНИКІВ
Список використаних джерел
АЛГОРИТМА ОПРЕДЕЛЕНИЯ НАДЕЖНОСТИ ПОСТАВЩИКОВ
DETERMINATION ALGORITHM
ТЕХНОЛОГІЇ BIG DATA
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.