<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="article">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">jssi</journal-id>
      <journal-title-group>
        <journal-title>Journal of Security and Sustainability Issues</journal-title>
      </journal-title-group>
      <issn pub-type="epub">2029-7017</issn>
      <issn pub-type="ppub">2029-7017</issn>
      <publisher>
        <publisher-name>LKA</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">JSSI837</article-id>
      <article-id pub-id-type="doi">10.9770/jssi.2019.8.3(7)</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Article</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Assessment of Information Technologies Influence on Financial Security of Economy</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <name>
            <surname>Tkachenko</surname>
            <given-names>Volodymyr</given-names>
          </name>
          <xref ref-type="aff" rid="j_jssi_aff_000"/>
        </contrib>
        <aff id="j_jssi_aff_000">Kyiv National University of Construction and Architecture, 31, Povitroflotsky Avenue, Kyiv, 03680, Ukraine</aff>
        <contrib contrib-type="author">
          <name>
            <surname>Kwilinski</surname>
            <given-names>Aleksy</given-names>
          </name>
          <email xlink:href="mailto:koaduep@gmail.com">koaduep@gmail.com</email>
          <xref ref-type="aff" rid="j_jssi_aff_001"/>
          <xref ref-type="corresp" rid="cor2">∗∗</xref>
        </contrib>
        <aff id="j_jssi_aff_001">The London Academy of Science and Business, 3rd Floor, 120, Baker Street, London W1U 6TU, England</aff>
        <contrib contrib-type="author">
          <name>
            <surname>Korystin</surname>
            <given-names>Oleksandr</given-names>
          </name>
          <xref ref-type="aff" rid="j_jssi_aff_002"/>
        </contrib>
        <aff id="j_jssi_aff_002">State Research Institute of the Ministry of Internal Affairs of Ukraine,4a, Y. Gutsalo Lane, Kyiv, 01011, Ukraine</aff>
        <contrib contrib-type="author">
          <name>
            <surname>Svyrydiuk</surname>
            <given-names>Natalia</given-names>
          </name>
          <xref ref-type="aff" rid="j_jssi_aff_003"/>
        </contrib>
        <aff id="j_jssi_aff_003">State Research Institute of the Ministry of Internal Affairs of Ukraine,4a, Y. Gutsalo Lane, Kyiv, 01011, Ukraine</aff>
        <contrib contrib-type="author">
          <name>
            <surname>Tkachenko</surname>
            <given-names>Iryna</given-names>
          </name>
          <xref ref-type="aff" rid="j_jssi_aff_004"/>
        </contrib>
        <aff id="j_jssi_aff_004">Academy of the State Penitentiary Service, 34, Honcha Street, Chernihiv, 14000, Ukraine</aff>
      </contrib-group>
      <author-notes>
        <corresp id="cor2"><label>∗∗</label>Corresponding author.</corresp>
      </author-notes>
      <volume>8</volume>
      <issue>3</issue>
      <fpage>375</fpage>
      <lpage>385</lpage>
      <pub-date pub-type="ppub">
        <day>30</day>
        <month>03</month>
        <year>2019</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>30</day>
        <month>03</month>
        <year>2019</year>
      </pub-date>
      <permissions>
        <ali:free_to_read xmlns:ali="http://www.niso.org/schemas/ali/1.0/"/>
      </permissions>
      <abstract>
        <p>The behavior of agents to ensure financial security on the basis of game theory was analyzed, the winning strategy taking into account risk and uncertainty was determined. Using Data Mining the useful functions of this technology were identified to ensure financial security: suspicious transactions determination, credit risks analysis, client account reliability analysis, financial indicators predicting and risks control. A comparison was made of the assessment of the effectiveness of various data mining algorithms on the nature of financial transactions and decision-making procedures in the financial security system. It was proved that the development of information technology has created a whole range of vulnerabilities in the financial system, in particular, has transformed the form of money in modern conditions - the emergence of a cryptocurrency. The influence of the formation and development of cryptocurrency on financial security at all levels of the economy: micro and macro was analyzed.</p>
      </abstract>
      <kwd-group>
        <label>Keywords</label>
        <kwd>financial security</kwd>
        <kwd>game theory</kwd>
        <kwd>hawala system</kwd>
        <kwd>prisoner’s dilemma</kwd>
        <kwd>Data Mining</kwd>
        <kwd>cryptocurrency</kwd>
        <kwd>Bitcoin</kwd>
      </kwd-group>
      <kwd-group kwd-group-type="JEL">
        <label>JEL</label>
        <kwd>F52</kwd>
        <kwd>O39</kwd>
      </kwd-group>
    </article-meta>
  </front>
</article>
