Major Information Systems Concepts - ut

Post on 15-Jan-2022

1 views 0 download

Transcript of Major Information Systems Concepts - ut

Major Information Systems Concepts

Lecture 1

Dr. Raimundas Matulevi!ius University of Tartu, Estonia

1

Lecture 13

!"#$%&%'(&)*&+#$,-(&•  .#$,-(&/("-0%(&

–  '12344+#$,-(-5+-5$%5((4678740-4&•  9(+%$,(&:#%(-&;<=<0><">(&#:&/("-0%(?&

–  *>0@(-&–  *(>A&-%$@B&

•  C0>>&"(&$-(@&<%&%'(&+#$,-(&>(+%$,(-&•  C0>>&"(&$-(@&0:&%'(&(D(,+0-(&&

•  E#@<>0F(-&<:@&<--(--G(:%&–  !+%$<>&2<,F+02<F#:&0-&A$:@<G(:%<>&–  HD<G&;I7&J&#A&%'(&K:<>&<--(--G(:%?&

–  HD(,+0-(-&;I7&J&#A&%'(&K:<>&<--(--G(:%?& 2

*+'(@$>(&

•  !"#$%&"'())– E#:@<B&8638IL8M377N&&–  O##G&M7I&

•  *&+#,#+-)-"+&./.0()–  P,#$2&83&&

•  C(@:(-@<B&8M38IL8Q377&

•  O##G&R8I&

–  P,#$2&63&&•  S'$,-@<B&8738IL86377&•  O##G&67Q&

–  P,#$2&R3&&•  T,0@<B&8638IL8M377&•  O##G&R8I&

3

.#$,-(&#"U(+F=(-&

•  HD<G0:(&%'(&-%<%(&#A&%'(&<,%&#A&)*&,(-(<,+'&<:@&2,<+F+(&–  Introduce the major IS types and principles –  Learn the principles of IS development –  Master essential techniques to develop IS system

requirements with an emphasis on security requirements

4

.#$,-(&#$%>0:(&I PART: Introduction to IS

1.  Major IS concepts 2.  IS infrastructure 3.  Enterprise systems 4.  Knowledge management and decision support systems 5.  Economics and acquisition of IS

II PART: IS modelling 6.  IS modelling methodologies and perspectives 7.  Process- and object-oriented methodologies 8.  Holistic, data and process modelling 9.  Project and organisational management 10.  IS requirements engineering 11.  IS quality 12.  IS in practice

III PART: Secure IS Development 13. Introduction to IS security 14. Organisational and regulation modelling 15. UML and Security 5

E<%(,0<>&

•  Main books of the course: –  Turban E., Volonino L., Information Technology for Management:

Transforming Organisations in the Digital Economy, the seventh International student edition, 2010

–  Avison D., Fitzgeral G., Information Systems Development. Methodologies, Techniques and Tools, the fourth edition, McGraw Hill Education, 2006

•  Selected chapters of –  Krogstie J., Solvberg A., Information Systems Engineering. Conceptual

Modeling in a Quality Perspective, unpublished, 2000. –  Loucopoulos P., Karakostas, System Requirements Engineering,

McGraw-Hill Book Company, 1995 –  Kotonya G. & Sommerville I. (1998). Requirements Engineering.

Processes and Techniques. John Wiley & Sons&

6

E<%(,0<>&

•  Collection of the articles –  V#'>&W5&;8XXQ?5&!"#$%&&'(%)*"%+',%-./"%0%)*&'1)2/)%%"/)23',%&%4"$5'!"%&&'6*78'9#5)':/;%<'='>#)&'?)$'–  T0,(-G0%'&Y5&P53&.#GG#:&.#:+(2%-&Z:@(,>B0:[&*<A(%BN&*(+$,0%BN&<:@&*$,=0=<"0>0%B&H:[0:((,0:[N&

S(+':0+<>&\#%(&.EZ4*H)L677RLS\L7RR&&–  Y$"#0-&H5N&](BG<:-&V5N&E<B(,&\5N&E<%$>(=0^0$-&O5N&!&*B-%(G<F+&!22,#<+'&%#&Y(K:(&%'(&Y#G<0:&#A&

):A#,G<F#:&*B-%(G&*(+$,0%B&O0-_&E<:<[(G(:%N&@$$%A*%+'4*'*5%'B##C'+%+/$4*%+'*#'(3',#;4)+N&6787N&*2,0:[(,5&&

–  Mouratidis, H., Giorgini, P., Manson, G.A.: When Security Meets Software Engineering: a Case of Modelling Secure Information Systems. Information Systems 30(8) (2005) 609-629

–  van Lamsweerde, A.: Elaborating Security Requirements by Construction of Intentional Anti-models. Proceedings of the 26th International Conference ICSE’04, (2004) 148-157

–  Sindre, G., Opdahl, A.L.: Eliciting Security Requirements with Misuse Cases. Requirements Engineering Journal 10(1), 2005, 34-44

–  Sindre, G.: Mal-activity Diagrams for Capturing Attacks on Business Processes, Proceedings of the Working Conference REFSQ’07, 2007, 355-366

–  Lodderstedt, T., Basin, D.A., Doser, J.: SecureUML: A UML-based Modeling Language for Model-driven Security, Proceedings of the 5th International Conference UML’02, 2002, 426-441

–  Jurjens, J.: UMLsec: Extending UML for Secure Systems Development, Proceedings of the 5th International Conference UML’02, 2002, 412-425

7

HD(,+0-(-&

•  12"&#/'")3&;6IJ?3&–  *(>AL-%$@B&<:@&2,(-(:%<F#:&

•  12"&#/'")4);R7J?3&–  )*&@<%<&<:@&2,#+(--&G#@(>>0:[&

•  12"&#/'")5);87J?3&– E#@(>&`$<>0%B&(=<>$<F#:&

•  12"&#/'")6&;RIJ?3&– E#@(>>0:[&)*&*(+$,0%B&

–  V,(-(:%<F#:&#A&%'(&-#>$F#:&&

8

!"#$%&")3(&E<U#,&)*&+#:+(2%-)

!"#$%&")7+$"&/+-)

•  8&%9+.)+.:);<-<./.<)=4>3>?, Information Technology for Management: Transforming Organizations in the Digital Economy. The 7th International student edition, Chapter 2.

9

9(+%$,(&#$%>0:(&

•  C'<%&0-&)*a&&– b<-0+&%(,G0:#>#[B&

•  )*&+><--0K+<F#:&<:@&%B2(-&•  )*&A#,&2(#2>(&•  ):A,<-%,$+%$,(N&<,+'0%(+%$,(&<:@&+#G2$F:[&(:=0,#:G(:%-&

10

E<U#,&+#:+(2%-&;8?&

•  *@".<7".<.)–  *#G(%'0:[&<-&0%&<22(<,-&0:&%'(&G0:@&#A&<&2(,-#:&

•  AB'$"7))–  !&-(%&#A&+#,,(><%(@&2'(:#G(:#:&

11

E<U#,&+#:+(2%-&;6?&

•  C.<D-":0")–  S'(&U$-FK(@&%,$(&"(>0(A&#A&<&2(,-#:5&W:#/>(@[(&0-&>0:_(@&%#&%'(&0:@0=0@$<>&2(,-#:&

•  E.F<&7+,<.)–  HD%(,:<>0-(@&(D2>0+0%&C)#D;%+2%&/'0+'&<,(&:#%&_:#/:&"B&%'(&2(,-#:&/'#&,(+(0=(-&0%&

•  G+$+&&–  *BG"#>-&%'<%&+<:&"(&2,(-(,=(@N&%,<:-A#,G(@&<:@&%,<:-2#,%(@&"B&<&+#G2$%(,5&Y<%<&+<:&"(&0:%(,:<>0-(@&<-&C)#D;%+2%'

12

O(><F#:-'02&<G#:[&&

Y<%<N&):A#,G<F#:&<:@&W:#/>(@[(&

13

Raw data Information New data

Knowledge

processing

processing processing

processing

processing

processing

*#+0<>&.#:-%,$+F#:&

14

E<U#,&+#:+(2%-&;R?&

•  E.F<&7+,<.)'B'$"7)=EA?)–  !&-B-%(G&A#,&@0--(G0:<F#:&#A&@<%<&"(%/((:&2(,-#:-&c&2#%(:F<>>BN&%#&0:+,(<-(&%'(0,&_:#/>(@[(&

•  H&0+./'+,<.))–  !&:#:L(G2%B&-(%&#A&2(#2>(&<:@&#%'(,&2'(:#G(:#:&

•  2'(:#G(:#:&/'(,(&[#<>L#,0(:%(@&<:@&+##,@0:<%(@&<+F#:-&0-&<0G(@&<%&

•  H&0+./'+,<.+-)/.F<&7+,<.)'B'$"7)–  !:&)*&A#,&%'(&@0--(G0:<F#:&#A&@<%<&/0%'0:&#,[<:0-<F#:&

15

):A#,G<F#:&*B-%(G&

16

INPUT Business processes Data Information Instructions Opportunities

PROCESSING Programs People Equipment Storage

OUTPUT Solutions Reports Graphics Calculations Recommendations Tactics

CONTROL Decision makers Auto-control

17

.#G2$%(,0-(@&):A#,G<F#:&*B-%(G&

•  I<7J%$"&/'":)/.F<&7+,<.)'B'$"7)–  !:&)*&/'0+'&0-&"<-(@&#:&%'(&$-(&#A&+#G2$%(,-&A#,&@0--(G0:<F#:&#A&@<%<&

Information System

Hardware Software Data, Information Procedures

User interface

.><--0K+<F#:&#A&)*&

;"&B)!+&0")+.:)

AJ"#/+-)AB'$"7')

K-<9+-)AB'$"7')

E.$"&<&0+./'+,<.+-)AB'$"7')

1.$"&J&/'")AB'$"7')

L%.#,<.+-)+.:)M+.+0"7".$)EA)

8&+.'+#,<.)*&<#"''/.0)AB'$"7')

*"&'<.+-)+.:)*&<:%#,N/$B)AB'$"7')

18

)*&+><--0K+<F#:&"B&&

d,[<:0-<F#:<>&>(=(>-&;8?&

•  *"&'<.+-)J&<:%#,N/$B)'B'$"7')–  V(,-#:<>&@0[0%<>&<--0-%<:%&

•  .<>(:@<,N&+<>+$><%#,N&-+'(@$>(,&

•  8&+.'+#,<.)J&<#"''/.0)'B'$"7')–  V(,0#@0+&K:<:+0<>N&<++#$:F:[N&2$,+'<-(&#,@(,-&

•  V#0:%&#A&-<>(-&;V#*?&%(,G0:<>-N&@(2#-0%-&<:@&,(L@,</<>-&

19

)*&+><--0K+<F#:&"B&&

d,[<:0-<F#:<>&>(=(>-&;6?&•  L%.#,<.+-)+.:)M+.+0"7".$)EA)

–  *$22#,%&/#,_&#A&0:@0=0@$<>&@(2<,%G(:%&0:&<:&#,[<:0-<F#:&

20

Marketing Finance Accounting

Human Resources Production Other

IT and Information Systems

Accounts Payment billing

Inventory

Reports Performance Records

Market Research

Advertisement Budget

information Investment

analysis

Budget Performance Reports

Training plans Labor Requirements

Quality Control plans

Labor scheduling Labor Performance

)*&+><--0K+<F#:&"B&&

d,[<:0-<F#:<>&>(=(>-&;R?&•  M+.+0"7".$)EA)

–  *$22#,%&A$:+F#:<>&G<:<[(,-&•  V,#=0@(&2(,0#@0+<>&,(2#,%-N&-$GG<,0(-N&+#G2<,0-#:-N&#%'(,&-%<F-F+-&

•  V><::0:[N&G#:0%#,0:[&<:@&+#:%,#>&

–  ]$G<:&,(-#$,+(-&2><::0:[&)*&•  V(,+(:%<[(&#A&2(#2>(&/'#&<,(&#:&=#+<F#:N&+<>>(@&A#,&-0+_&•  V(#2>(&:((@(@&%#&@#&%'(&U#"&

21

)*&+><--0K+<F#:&"B&&

d,[<:0-<F#:<>&>(=(>-&;M?&•  1.$"&J&/'")EA)

–  *$22#,%&"$-0:(--&2,#+(--(-&%'<%&<,(&2(,A#,G(@&"B&-(=(,<>&@(2<,%G(:%-&0:&<:&#,[<:0-<F#:&

•  HOV&

22

Executive administrator Our supplier and our partners

Our customers

Finance Accounting

Marketing Other areas Production Human resources

Process A

Process B

Process C

Process D

)*&+><--0K+<F#:&"B&&

d,[<:0-<F#:<>&>(=(>-&;I?&•  E.$"&<&0+./'+,<.+-)'B'$"7')

–  )*&%'<%&+#::(+%&%/#&#,&G#,(&#,[<:0-<F#:-&•  *(>>(,-&<:@&"$B(,-&c&(5[5N&(>(+%,#:0+&"0>>&

23

Corporate A

System

Corporate B

System

Corporate C

System

Electronic Market

Human Resources Accounting IS

Finance IS

Marketing IS

Production IS

Administrative IS

)*&+><--0K+<F#:&"B&&

d,[<:0-<F#:<>&>(=(>-&;Q?&

•  K-<9+-)EA)–  )*&%'<%&+#::(+%&+#G2<:0(-&0:&%/#&#,&G#,(&+#$:%,0(-&

•  HL+#GG(,+(&-B-%(G-&

•  *$22>0(-&#=(,-(<-&

•  ;"&B)!+&0")+.:)AJ"#/+-)AB'$"7')–  e(,B&><,[(&<:@&[>#"<>&"B&:<%$,(&

•  !0,>0:(-&,(-(,=<F#:&-B-%(G&•  Z:0=(,-0%B&<@G0:0-%,<F=(&-B-%(G&

•  \<F#:<>&'(<>%'L+<,(&-B-%(G&

)*&+><--0K+<F#:&"B&%'(&&SB2(&#A&*$22#,%&

25

AB'$"7') 17J-<B""')'%JJ<&$":)

G"'#&/J,<.))

M+.+0"7".$)/.F<&7+,<.)'B'$"7')

E0@@>(&G<:<[(,-& O#$F:(&0:A#,G<F#:&A#,&2><::0:[N&#,[<:0-0:[N&<:@&+#:%,#>>0:[&#2(,<F#:-&

I<77%./#+,<.)+.:)#<--+9<&+,<.)'B'$"7')

!>>&(G2>#B((-& H:<">(-&%#&0:%(,<+%&<:@&/#,_&%#[(%'(,&

G"'O$<J)J%9-/'@/.0)'B'$"7')

df+(&/#,_(,-& .#G"0:(-&%(D%N&2'#%#-N&[,<2'0+-&

G<#%7".$)7+.+0"7".$)'B'$"7')

df+(&/#,_(,-& !$%#G<%(-&g#/&#A&(>(+%,#:0+&@#+$G(:%-&

G"#/'/<.)'%JJ<&$)'B'$"7')

Y(+0-0#:&G<_(,-N&G<:<[(,-&

.#G"0:(-&G#@(>-&<:@&@<%<&%#&-#>=(&-(G0-%,$+%$,(@&2,#">(G-&/0%'&(D%(:-0=(&$-(,&0:=#>=(G(:%&

K&<%J)'%JJ<&$)'B'$"7') V(#2>(&/#,_0:[&0:&[,#$2-&

*$22#,%-&/#,_0:[&2,#+(--(-&#A&2(#2>(&#A&[,#$2-&0:+>$@0:[&%'(&#:(-&/#,_0:[&0:&@0h(,(:%&>#+<F#:-&

12J"&$)'B'$"7') W:#/>(@[(&/#,_(,-N&:#:(D2(,%-&

V,#=0@(-&-%#,(@&_:#/>(@[(&<:@&@(+0-0#:&,(+#GG(:@<F#:-&&

C.<D-":0")7+.+0"7".$)'B'$"7')

E<:<[(,-N&_:#/>(@[(&/#,_(,-&

*$22#,%-&[<%'(,0:[N&#,[<:0-0:[&<:@&$-(&#A&<:&#,[<:0-<F#:i-&_:#/>(@[(&

O(><F#:-'02&"(%/((:&-B-%(G-&

26

Transaction Processes

Internet and External

Information

Management ISX

Data Warehouses

Enterprise Systems

Business Intelligence

Inter-organisational

systems

Internet, Other

Computer Systems

Non-computer systems

d,[<:0-<F#:<>&<+F=0F(-&•  HJ"&+,<.+-)+#,N/,"')

–  Y<%<L%#L@<B&<+F=0F(-&•  !--0[:&(G2>#B((-N&,(+#,@&%'(&:$G"(,&#A&'#$,-N&2><+(&<&2$,+'<-(&#,@(,&

–  *'#,%&%(,G&0:&:<%$,(&–  *$2(,=0-#,-N&#2(,<%#,-N&K(>@&(G2>#B((-N&+>(,0+<>&(G2>#B((-&

•  M+.+0"&/+-)+#,N/,"')–  Y(+0-0#:-N&%<+F+<>&<+F=0F(-&

•  *'#,%&%(,G&2><::0:[N&#,[<:0-0:[N&+#:%,#>&

–  E0@@>(&G<:<[(G(:%&

•  A$&+$"0/#)+#,N/,"')–  Y(<>&/0%'&-0%$<F#:-&%'<%&G0['%&-0[:0K+<:%>B&+'<:[(&%'(&G<::(,&0:&/'0+'&

"$-0:(--&0-&@#:(&•  <+`$0-0F#:&@(+0-0#:-N&#$%-#$,+0:[&-#>$F#:-&

–  O(`$0,(&(><"#,<F=(&,(-(<,+'&–  S#2&G<:<[(G(:%&

27

E<:<[(,0<>&!+F=0%B&*$22#,%&

8+'O) A%JJ<&$)

*%<F-F+<>&*$GG<,0(-& *$GG<,0(-&#A&:(/&@<%<&

HD+(2F#:&,(2#,%-& .#G2<,0-#:&#A&<+%$<>&2(,A#,G<:+(&%#&-%<:@<,@-5&]0['>0['%&#A&@(=0<F#:-&

V(,0#@0+&,(2#,%-& P(:(,<%(@&A#,&2,(@(K:(@&0:%(,=<>-&

!@L'#+&,(2#,%-& P(:(,<%(@&<-&:((@(@&#:&@(G<:@&

.#G2<,<F=(&<:<>B-0-& .#G2<,0-#:&#A&2(,A#,G<:+(&%#&G(%,0+-&#,&-%<:@<,@-5&!:<>B-0-N&-$+'&%,(:@-&<:@&(<,>B&@(%(+F#:&#A&+'<:[(-&

V,#U(+F#:N&A#,(+<-F:[& V,#U(+F#:&#A&A$%$,(&-<>(-N&+<-'&g#/-N&G<,_(%&-'<,(N&%,(:@&<:<>B-0-&

!$%#G<F#:&#A&,#$F:(&@(+0-0#:-&

*%<:@<,@&G#@(>>0:[&%(+':0`$(-&<22>0(@&%#&,#$F:(&@(+0-0#:-&-$+'&<-&/'(:&<:@&'#/&%#&#,@(,&#,&'#/&%#&-+'(@$>(&/#,_&

.#::(+F#:&<:@&+#>><"#,<F#:&

):%(,:<>&<:@&(D%(,:<>&C("L"<-(@&G(--<[0:[&-B-%(G-N&(LG<0>-N&=#0+(&G<0>-N&<:@&[,#$2/<,(&

28

)*&-$22#,%&A#,&2(#2>(&

29

):A,<-%,$+%$,(&

•  *@B'/#+-)F+#/-/,"'P)'"&N/#"'P)+.:)7+.+0"7".$)'%JJ<&$3&–  .#G2$%(,&'<,@/<,(&–  *#j/<,(&–  \(%/#,_-&<:@&+#GG$:0+<F#:&A<+0>0F(-&&

•  ):%,<:(%&<:@&):%(,:(%&–  Y<%<"<-(-&<:@&@<%<&/#,_(,-&–  ):A#,G<F#:&G<:<[(G(:%&2(,-#::(>&

30

b$-0:(--&<:@&)S&<,+'0%(+%$,(&

•  Q%'/."'')+&#@/$"#$%&")–  d,[<:0-<F#:<>&2><:-N&=0-0#:-N&#"U(+F=(-N&<:@&2,#">(G-&<:@&%'(&0:A#,G<F#:&,(`$0,(@&%#&-$22#,%&%'(G&

•  d:+(&0%&0-&K:0-'(@N&-%<,%&%'(&)S&<,+'0%(+%$,(&

•  E8)+&#@/$"#$%&")–  !&'0['&>(=(>&G<2&#,&2><:&#A&%'(&0:A#,G<F#:&<--(%-&0:&<:&#,[<:0-<F#:&0:+>$@0:[&2'B-0+<>&@(-0[:&#A&%'(&"$0>@0:[&%'<%&'#>@-&%'(&'<,@/<,(&

•  C("3&–  .#:%(:%&<:@&#,[<:0-<F#:&#A&%'(&-0%(&&–  ):%(,A<+(&A#,&",#/-0:[&<:@&-(<,+'0:[&

31

C("L"<-(@&-B-%(G-&

•  O(-0@(:%-&#:&<&-(,=(,&– !++(--0">(&$-0:[&C("&",#/-(,-&A,#G&<:B/'(,(&0:&%'(&/#,>@&• C("L"<-(@&(L+#GG(,+(&-B-%(G-&

•  H>(+%,#:0+&G<,_(%-&

32

R"9)4S>)

•  T>0+,_&•  b0%S#,,(:%&•  \<2-%(,&•  C0_02(@0<&

•  b>#[[0:[&•  *(<,+'&H:[0:(&

#2FG0-<F#:&

•  .#-%&2(,&+>0+_&•  C("&-(,=0+(-&•  V<,F+02<F#:&•  C0_0-&

•  S<[[0:[&

.#G2$F:[&(:=0,#:G(:%-&;8?&•  A"&N/#"T<&/".$":)+&#@/$"#$%&")=AHU?)–  *$22#,%&=<,0(%B&#A&"$-0:(--&:((@-&

–  O($-(&<:@&,(+#::(+%&(D0-F:[&)S&<--(%-&

–  b(:(K%-3&•  O(@$+(@&0:%([,<F#:&+#-%&•  )G2,#=(@&"$-0:(--4)S&<>0[:G(:%&

•  T<-%(,&FG(&%#&<--(G">(&:(/&<22>0+<F#:-&

•  9#/(,&)S&G<0:%(:<:+(&+#-%&

•  A<VD+&"T+'T+TA"&N/#")+.:)W,-/$B)#<7J%,.0)–  ):-%(<@&#A&"$B0:[N&<++(--&<22>0+<F#:-&=0<&:(%/#,_&

•  d:L@(G<:@&+#G2$F:[&•  ZF>0%B&+#G2$F:[&

•  ]#-%(@&-(,=0+(-&–  ZF>0%B&+#G2$F:[&

•  O(-#$,+(-&<=<0><">(&#:&@(G<:@&A,#G&2,#=0@(,-&<,#$:@&%'(&[>#"(&

•  YB:<G0+<>>B&-+<><">(&

•  *(>A&'(<>0:[&•  H<-B&%#&G<:<[(& 33

.#G2$F:[&(:=0,#:G(:%-&;6?&•  K&/:)#<7J%,.0&

–  Z:$-(@&2,#+(--0:[&+<2<"0>0F(-&#A&<>>&+#G2$%(,-&0:&<&:(%/#,_&+<:&"(&$F>0-(@&%#&+,(<%(&2#/(,A$>&+#G2$F:[&+<2<"0>0%(-&

•  I-<%:)#<7J%,.0)–  ):+#,2#,<%(-&$-(&#A&*<<*&–  )SL,(><%(@&+<2<"0>0F(-&2,#=0@(@&<-&-(,=0+(-&

–  !++(--&%(+':#>#[BL(:<">(@&-(,=0+(-&%',#$['&):%(,:(%&/0%'#$%&_:#/>(@[(&#AN&(D2(,F-(&/0%'N&#,&+#:%,#>&#=(,&%'(&%(+':#>#[B&0:A,<-%,$+%$,(&

34

E<:<[(,0<>&0--$(-&

•  8@")$&+.'/,<.)$<)+):/0/$+-)".$"&J&/'")–  .#G2>0+<%(@&2,#+(--&–  S(+':#>#[0+<>&<:@&K:<:+0<>&

@(+0-0#:-&

•  G"+-/.0)D/$@)<%$'<%&#/.0)+.:)%,-/$B)#<7J%,.0)

•  1$@/#+-)/''%"')–  S,<0:0:[&#A&#>@(,&(G2>#B((-&

–  T<0,&>##-0:[&%'(&U#"&

•  X/'O)<F)/.$&<:%#/.0)."D)$"#@.<-<0B)–  \(/&%(+':#>#[B&@#(-&:#%&

[$<,<:%B&-$++(--&

•  E7J<&$+.#")<F)9%'/."'')/.$"--/0".#")–  )A&B#$&,(<>>B&:((@&<&%##>&–  C'0+'&2,#@$+%-&<:@&=(:@#,-&&–  ]#/&%#&0:%([,<%(&%'(&%##>&/0%'&

%'(&(D0-F:[&-B-%(G&

–  ]#/&%#&$F>0-(&%'(&%##>&0:&%'(&G#-%&<22,#2,0<%(&/<B&

35

New IS are constantly developed!

C'<%&@0@&/(&>(<,:&%#@<Ba&

•  C'<%&0-&)*a&•  )*&+><--0K+<F#:&<:@&%B2(-&•  )*&A#,&2(#2>(&•  ):A,<-%,$+%$,(N&<,+'0%(+%$,(&<:@&+#G2$F:[&(:=0,#:G(:%-&

36