Methodological Approaches to Military-Economic Assessment Creation of a Comprehensive Information Protection System Automated Control Systems
Abstract
Purpose. To improve the scientific and methodological framework of military-economic evaluation of managerial decisions in the process of designing and developing an integrated information security system, based on the proposed methodology, for advanced automated command and control systems.
Method. The study employs a systems approach and the method of military-economic evaluation to optimize the design of an integrated information security system in automated command and control systems.
Findings. An improved military-economic evaluation methodology is proposed, enabling a quantitative assessment of the effectiveness of alternative configurations of an integrated information security system, taking into account the cost of losses, system development expenditures, and the additional costs imposed on the adversary.
Theoretical implications. The results of the study contribute to a deeper understanding of the impact of armed conflicts on the national economy, particularly on macroeconomic indicators, the financial sector, foreign economic relations, the social sphere, and other key dimensions.
Practical implications. The proposed military-economic evaluation methodology can be applied to substantiate decisions related to the design, modernization, and implementation of integrated information security systems in automated command and control systems of the Armed Forces of Ukraine, with the aim of improving resource efficiency and enhancing the level of information security.
Value. The study introduces an integrated quantitative model for evaluating the effectiveness of an integrated information security system, taking into account the specific conditions of wartime and resource constraints.
Research limitations. The military-economic evaluation methodology is based on expert judgments and assumptions regarding threat parameters and the effectiveness of protective measures, which may reduce the accuracy of the results in situations characterized by limited or unavailable statistical data during active hostilities.
Papertype. Theoretical.
Downloads
References
Krainov, V., Lavrinchuk, O. and Hrozovskyi, R. (2023). Main approaches to the choice of the logical structure of the database for the automated information system of the military governance authority, Modern Information Technologies in the Sphere of Security and Defence. 46(1), pp. 73–77. https://doi.org/10.33099/2311-7249/2023-46-1-73-77
Belov, O. F. (2020). Methodological foundations of creating comprehensive information protection systems in military automated control systems. Science and Defense, (3), 45–52. https://nio.nuou.org.ua/article/view/13473
Verkhovna Rada of Ukraine. (2017, October 5). On the basic principles of ensuring cybersecurity of Ukraine (Law No. 2163-VIII). https://zakon.rada.gov.ua/laws/show/2163-19
Maslova, N. A. (2008). Methods for assessing the effectiveness of information systems protection systems. Artificial Intelligence, 4(42), 253–264. https://nasplib.isofts.kiev.ua/handle/123456789/7465
Tolyupa, S. V., Samokhvalov, Yu. Ya., & Tsiopa, N. V. (2014). Complex information protection systems of special facilities and methods for their assessment. Modern Information Protection, (1), 81–88. https://journals.dut.edu.ua/index.php/dataprotect/article/view/175
Pilkevych, I. A., Lobanchykova, N. M., & Molodetska, K. V. (Eds.). (2015). Zakhyst informatsii v avtomatyzovanykh systemakh upravlinnia [Information protection in automated control systems]. Zhytomyr: Zhytomyr Ivan Franko State University Press.
Levchenko, E. H., Prus, R. B., & Rabchun, A. O. (2009). Показники багатоступінчатих систем захисту інформації [Performance indicators of multilevel information protection systems]. Visnyk of the Engineering Academy of Ukraine, (1), 61–65.
Krainov, V. (2022). Methodology of military-economic assessment of the creation of a complex information protection system of automated information systems, Modern Information Technologies in the Sphere of Security and Defence. Київ, Україна, 44(2), pp. 38–42. https://doi.org/10.33099/2311-7249/2022-44-2-38-42
Kozyura, V. D., Khoroshko, V. O., Shelest, M. Ye., Tkach, Y. M., & Usov, Ya. Yu. (2019). Kompleksni systemy zakhystu informatsii v informatsiyno-telekomunikatsiynykh systemakh [Complex information protection systems in information and telecommunication systems]. Nizhyn, Ukraine: FOP Lukyanenko V. V., TPK “Orhideya”. ISBN 978-617-7609-30-7.
Bobylov, V., Melnyk, Y., & Kravchuk, A. (2019). Increasing the effectiveness of decision-making support in automated troop control systems by using simulation modeling of combat operations of troops (forces). Modern Information Technologies in the Sphere of Security and Defence, 34(1), 19–22. https://doi.org/10.33099/2311-7249/2019-34-1-19-22
Copyright (c) 2025 Valerii Kraynov, Yaroslav Melnyk

This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors agree with the following conditions:
1. Authors retain copyright and grant the journal right of first publication (Download agreement) with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors have the right to complete individual additional agreements for the non-exclusive spreading of the journal’s published version of the work (for example, to post work in the electronic repository of the institution or to publish it as part of a monograph), with the reference to the first publication of the work in this journal.
3. Journal’s politics allows and encourages the placement on the Internet (for example, in the repositories of institutions, personal websites, SSRN, ResearchGate, MPRA, SSOAR, etc.) manuscript of the work by the authors, before and during the process of viewing it by this journal, because it can lead to a productive research discussion and positively affect the efficiency and dynamics of citing the published work (see The Effect of Open Access).












