The model and metrics of awareness in~confidential information. Part 2. Actual awareness
Prikladnaâ diskretnaâ matematika, no. 4 (2023), pp. 55-70.

Voir la notice de l'article provenant de la source Math-Net.Ru

The actual awareness of users in confidential information is considered as the possession of relevant information, characterized by the degree of perception (assimilation) and the possibility of using information (“extraction” from memory). Within the subject-object class of access control models in computer systems, the concept of awareness is formalized as a result of user access to objects containing confidential information. Access to the object (by reading), having a time frame (duration), forms the user's awareness of the confidential information of the corresponding object, the value of which is proportional to the volume of confidential information of the object, the index of complexity (readability) of the text of the object, the duration of access and and also depends on the user's individual ability to perceive (reading speed) and master (understanding, processing) information. At the same time, the volume of confidential information of an object is defined as a value proportional to the number of words in the text and the coefficient of informativeness of the object. Over time, according to the Ebbinghaus forgetting curve, the user's awareness of sensitive information decreases. The degree of decrease in awareness depends on the individual characteristics of the user and the level of confidentiality of the information. Subsequent accesses to the object can restore the degree of awareness depending on the duration of the accesses and the time elapsed since the previous access. The type and parameters of the function of reducing/restoring awareness over time and depending on the access history are considered. The user's awareness of all confidential information contained (processed) in a computer system consists of awareness of all access objects, taking into account the synergetic effect, which can be either positive (knowledge about the system of objects is greater than the sum of knowledge about objects) or negative. The nature and features of users' actual awareness in confidential information are illustrated by examples with various parameters of access objects, access history and individual characteristics of users.
Keywords: confidential information, awareness, actual awareness, awareness model, awareness metrics, informativeness of the access object, complexity of the access object text, understanding of the access object text, duration of access, information forgetting curve, access history, synergy effect in awareness.
@article{PDM_2023_4_a4,
     author = {N. A. Gaydamakin},
     title = {The model and metrics of awareness in~confidential information. {Part} 2. {Actual} awareness},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {55--70},
     publisher = {mathdoc},
     number = {4},
     year = {2023},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2023_4_a4/}
}
TY  - JOUR
AU  - N. A. Gaydamakin
TI  - The model and metrics of awareness in~confidential information. Part 2. Actual awareness
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2023
SP  - 55
EP  - 70
IS  - 4
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDM_2023_4_a4/
LA  - ru
ID  - PDM_2023_4_a4
ER  - 
%0 Journal Article
%A N. A. Gaydamakin
%T The model and metrics of awareness in~confidential information. Part 2. Actual awareness
%J Prikladnaâ diskretnaâ matematika
%D 2023
%P 55-70
%N 4
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDM_2023_4_a4/
%G ru
%F PDM_2023_4_a4
N. A. Gaydamakin. The model and metrics of awareness in~confidential information. Part 2. Actual awareness. Prikladnaâ diskretnaâ matematika, no. 4 (2023), pp. 55-70. http://geodesic.mathdoc.fr/item/PDM_2023_4_a4/

[1] Gaydamakin N. A., “The model and metrics of awareness in confidential information. Part 1. Potential awareness”, Prikladnaya Diskretnaya Matematika, 2023, no. 61, 86–103 (in Russian)

[2] Devyanin P. N., Security models of computer systems. Access and information flow management, Goryachaya liniya — Telekom, M., 2020, 352 pp. (in Russian)

[3] Gaydamakin N. A., Differentiation of access to information in computer systems, UrFU Publ., Ekaterinburg, 2003, 328 pp. (in Russian) | MR

[4] Chalmers D., The Conscious Mind: In Search of a Fundamental Theory, Oxford University Press, Oxford, 1996, 225 pp. | Zbl

[5] Schutz A., The Phenomenology of the Social World, Northwestern University Press, 1972, 255 pp.

[6] Lee S. J. and Reeves T. C., “Edgar Dale: A significant contributor to the field of educational technology”, Educational Technology, 47:6 (2007), 56–59

[7] Yu. B. Gippenreyter and V. Ya. Romanov (eds), Common Psychology reader. Memory Psychology, MSU Publ., M., 1979, 272 pp. (in Russian)

[8] Atkinson R., Human Memory and Learning Process, Progress Publ., M., 1980, 527 pp. (in Russian)

[9] Zinchenko T. P., Memory in experimental and cogitative psychology, Piter, Saint-Petersburg, 2002, 320 pp. (in Russian)

[10] Lange V. G., “About forgetting speed”, Voprosy Psikhologii, 1983, no. 4, 142–145 (in Russian)

[11] Wickelgren W. A., “Trace resistance and the decay of longterm memory”, J. Math. Psychology, 1972, no. 9, 418–455 | DOI

[12] Wickelgren W. A., “Single-trace fragility theory of memory dynamics”, Memory Cognition, 2:4 (1974), 775–780 | DOI

[13] A Brief History of the Mathematical Definition of Forgetting Curves, , 2023 http://www.ideationizing.com/2009/06/brief-history-of-mathematical.html

[14] Efimov A. N., Information: Price, Consenescence, Diffusion, Znanie, M., 1978, 64 pp.

[15] GOST R 53894-2016. Knowledge Management. Terms and Definitions, Standartinform, M., 2020, 24 pp. (in Russian)

[16] GOST R ISO/MEK 27002. Information Technology. Methods and Means of Ensuring Security. Information Security Management Norms and Rules, Standartinform, M., 2021, 74 pp. (in Russian)

[17] Building an Information Technology Security Awareness and Training Program, NIST Special Publication 800-50, 2003

[18] Astakhova L. V. and Ul'yanov N. L., “Model of control policy of awareness of the organization staff in the field of information security”, Proc. 67th Conf. SUSU (Chelyabinsk, April 14–17, 2015), 678–682 (in Russian)

[19] Grusho A. A., Primenko E. A., and Timonina E. E., Theoretical foundations of computer security, Akademiya Publ., M., 2009, 272 pp. (in Russian)

[20] Solnyshkina S. I. and Kisel'nikov A. S., “Text difficulty: learning stages in pratical homeland glossology”, Vestnik TSU. Filologiya, 2015, no. 6(38), 86–99 (in Russian)

[21] Chmykhova E. V., Davydov D. G., and Lavrova T. P., “Reading speed factors experimental study”, Psikhologiya Obucheniya, 2014, no. 9, 26–36 (in Russian)

[22] Buymov A. G., “Forgetting curves action patterns”, Doklady TUSURa, 20:4 (2017), 138–141 (in Russian)

[23] Thalheimer W., How Much Do People Forget?, , 2023 http://www.work-learning.com/catalog.html

[24] Shardakov M. N., Adoption and Saving in Learning, Scientific Notes of the Leningrad State Pedagogical University named after Herzen, 36, 1940, 195 pp. (in Russian)

[25] Gaydamakin N. A., “A model of thematic differentiation of access to information for the hierarchical classifier in automatic control systems”, Autom. Remote Control, 64:3 (2003), 505–516 | DOI | MR | Zbl

[26] Gaydamakin N. A., “Multilevel thematic-hierarchical access control (MLTHS-system)”, Prikladnaya Diskretnaya Matematika, 2018, no. 39, 42–57 (in Russian) | MR | Zbl

[27] Gaydamakin N. A. and Baranskiy V. A., “Algebra of multirubric on root trees of hierarchical thematic classifiers”, Siberian Electronic Math. Reports, 14 (2017), 1030–1040 (in Russian) | Zbl

[28] D. A. Pospelov (ed.), Illegible sets in artificial intelligence handling models, Nauka, M., 1986, 312 pp. (in Russian)

[29] Piegat A., Fuzzy Modeling and Control, Springer Verlag, Berlin–Heidelberg, 2001, 728 pp.