system, accompanied in some cases by unauthorized
access attempts.
The third criterion is the availability of the
possibility of further growth and expansion, within
the framework of which the subsequent
implementation is expected in all structural divisions
of the organization, including the possibility of
developing additional modules by developers if such
a need arises.
The fourth criterion is the level of automation of
functional structural units, including automation of
various types of activities, and not only the
preparation and maintenance of accounting and
reporting.
The fifth criterion is the clarity and accessibility
of the interface, according to which any user who has
access to the information system should be able to
understand the specifics of its operation without
describing the stages of its operation.
The sixth criterion is the possibility of integration
with electronic document management. Within the
framework of the presented criterion, it is assumed
that there are mandatory opportunities for organizing
electronic document management on the basis of a
paper counterpart, not only within the organization
itself, but also with external counterparties.
The seventh criterion is the adjustment to the
specifics of the customer's activities, taking into
account the construction of relations of its interaction
with suppliers and contractors, not only within the
framework of mutual settlements, but also within the
framework of contractual relations in general.
The eighth criterion is a flexible pricing policy by
the suppliers of the modernization implementer
(Crick and Chew, 2020).
Based on all the above, it becomes obvious that in
the process of choosing the path and direction of
modernization of the information security system,
special attention should be paid to the informatization
of management, which is currently the key to
ensuring the effectiveness of management decisions.
REFERENCES
Barlow, J.B., Giboney, J.S., Schuetzler, R.M., Keith, M.J.,
Wilson, D.W., Lowry, P.B. and Vance, A. (2011).
Overview and guidance on agile development in large
organizations. Communications of the Association for
Information Systems, 29(1): 25-44.
DOI: 10.17705/1CAIS. 02902
Crick, C. and Chew, E.K. (2020). Microfoundations of
organizational agility: a socio-technical perspective.
Communications of the Association for Information
Systems, 46: 273-295. DOI: 10.17705/1CAIS.04612
He, J. and Freeman, L.A. (2010). Understanding the
formation of general computer self-efficacy.
Communications of the Association for Information
Systems, 26(1): 225-244. DOI: 10.17705/1CAIS.02612
Krasnova, H., Veltri, N.F. and El Garah, W. (2014).
Effectiveness of justice-based measures in managing
trust and privacy concerns on social networking sites:
an intercultural perspective. Communications of the
Association for Information Systems, 35: 83-108.
DOI: 10.17705/1CAIS.03504
Mendling, J., Decker, G., Reijers, H.A., Hull, R. and
Weber, I. (2018). How do machine learning, robotic
process automation, and blockchains affect the human
factor in business process management?
Communications of the Association for Information
Systems, 43(1): 297-320. DOI: 10.17705/1CAIS.04319
Müller, S.D. and Ulrich, F. (2013). Creativity and
information systems in a hypercompetitive
environment: a literature review. Communications of
the Association for Information Systems, 32(1): 175-
200. DOI: 10.17705/1CAIS.03207
Scheibe, K.P. and Gupta, M. (2017). The effect of
socializing via computer-mediated communication on
the relationship between organizational culture and
organizational creativity. Communications of the
Association for Information Systems, 40(1): 294-314.
DOI: 10.1111/j.1467-6486.1994.tb00640.x
Shevkunov, N. and Zhigunova, A. (2018). Methodological
foundations for assessing the effectiveness of
information security. Science and Education: Economy
and Economics; entrepreneurship; Law and
Management, 2(93): 33-36.
Sobotta, N. (2016). Why forwarded email threads are hard
to read: the email format as an antecedent of email
overload. Communications of the Association for
Information Systems, 39(1): 16-31.
DOI: 10.17705/1CAIS.03902
Zhigunova, A. (2016). Information security of business
activity. Economic and legal aspects of the
development of the sovereignty of the Russian
Federation at the present stage: Materials of the
International Scientific and Practical Conference,
pages 25-29.
INFSEC 2021 - International Scientific and Practical Conference on Computer and Information Security