<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Management Risks of Dependence on Key Employees: Identification of Personnel</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Yurii</forename><surname>Khlaponin</surname></persName>
							<email>y.khlaponin@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Kyiv National University of Construction and Architecture</orgName>
								<address>
									<addrLine>31 Povitroflotskiy ave</addrLine>
									<postCode>03680</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Olha</forename><surname>Izmailova</surname></persName>
							<email>olga.v.izmailova@gmail.com</email>
						</author>
						<author>
							<persName><forename type="first">Hashim</forename><surname>Qasim</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution" key="instit1">AL</orgName>
								<orgName type="institution" key="instit2">Qalam University College Kirkuk</orgName>
								<address>
									<postCode>36004</postCode>
									<settlement>Kirkuk</settlement>
									<country key="IQ">Iraq</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Hanna</forename><surname>Krasovska</surname></persName>
							<email>annavkrasovska@gmail.com</email>
							<affiliation key="aff2">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>60 Volodymyrska str</addrLine>
									<postCode>01033</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Kateryna</forename><surname>Krasovska</surname></persName>
							<email>katerina.krasovska@gmail.com</email>
							<affiliation key="aff2">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>60 Volodymyrska str</addrLine>
									<postCode>01033</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff3">
								<orgName type="department">Cybersecurity Providing in Information and Telecommunication Systems</orgName>
								<address>
									<addrLine>January 28</addrLine>
									<postCode>2021</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Management Risks of Dependence on Key Employees: Identification of Personnel</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">D491260A397FDDE916501FF81EB9A0D9</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T10:33+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The approach to the realization of one of the most essential stages of information technology risk management in the personnel security system of the company was studied. Information technology aims to ensure the sustainability and success of the company by anticipating, exploiting the benefits, and minimizing vulnerabilities to potential threats to work with such categories of personnel as key employees. The stage that is the subject of the study is related to the identification of personnel. It is carried out on the basis of the analysis of conformity of possibilities of the respondent to requirements to various groups of competencies defined by the profile of key employees formed in the company. In this study, the stage of identification of key employees is considered as a human-machine toolkit, built on a system-linked base of peer review models using modern capabilities of decision support systems in a weak process structuring and conceptual uncertainty. Its information result -an indicator of identification and a database of diverse assessments of employee competence -is considered as one of the basic in assessing potential threats to company assets, their vulnerabilities, expected costs, finding ways to minimize them in the next stages of information technology risk management of key employees.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Keywords 1</head><p>Key employee, profile and identification of personnel, risk of dependence, index of authentication, group and criteria of competencies, weight of criteria.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The main task of skilled safety to the company is providing maximal stability of work, prevention, and removal of threats and risks that is related to the human factor-work of personnel.</p><p>According to resource conception of business management, which formed the theoretical basis of a ground of behavior of company on modern markets, set one of major having special-purpose options is possession and management application of unique resources of a different type, that needed for the realization of its strategies. It gives the company special value, uniqueness, and competitiveness. To their number the taken and human resources. The professionalism of the worker, his knowledge, skills, structural flexibility, thinking level determine the key competencies of an organization, stipulate its uniqueness and value. In these terms to the important questions of improvement of the system of safety of the company, there is providing of firmness of its work with foresight and use of possible advantages and potential problems with such categories of personnel as key employees.</p><p>Subjects of improvement of skilled safety in sense of managing risks as dependence on key employees especially actual in spheres in those business successes, first of all, depend on an intellectual human capital. In these terms the role of key employees rises as a base constituent of the success of the company, and, the second party, the level of risks that arise up the independence of success of the company on key employees rises. The measure of expenditures for compensating risks is varied and depends on different factors. The first factor is the loss of key employees as an important human asset of the company. For example, is unforeseen liberation of key employees. It can lead to substantial expenditures that connected with the inevitability of postponement of possibilities of implementation of strategic plans of the company, the loss of connections in the state authorities, logistic companies, in an informative environment, with the decline of the skilled potential of the company, to require additional charges on the preparation of skilled replacement. The second factor is related to the actions of the key employee as the real or potential source of realization of threatswork on a competitor during work in the company or after liberation, creation of the personal company-a competitor with bringing in and use of resources of company-technologies, workers, information and others like that.</p><p>Therefore, for today one of the actual tasks of skilled security of company service, there is the determination of problems and analysis of risks that is related to dependence on key employees.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Analysis of Literary Data, Raising of Problem, Aim, and Research Tasks</head><p>At this time among theoretical and practically-oriented publications, there is a far of works that examine the problems of management key employees in sense of differentiation of personnel depending on their payments in development of business and companies on the whole <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref>, there are materials of empiric researches that is executed within the framework of international research projects and work round table <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b6">7]</ref>. In works certain interpretation of term "key employee," investigational approaches to forming of the profile of key employee that determines typical quality properties of personnel, the different variants of the structure of quality properties (criteria of competence) of the profile, accordance of employee are argued to his requirements and the offered methodologies of identification of this accordance. They are based on the methods of the questionnaire, expert discussion without formalization or partial formalization of these procedures. The worked-out algorithmic charts of estimation of payment of key employee are in the development of company taking into account weight of criteria of competence. The number of publications that examine the problem of increase of skilled strength security due to management risks grew lately, that the dependences related to the factor are on key employees <ref type="bibr" target="#b6">[7]</ref><ref type="bibr" target="#b7">[8]</ref><ref type="bibr" target="#b8">[9]</ref><ref type="bibr" target="#b9">[10]</ref><ref type="bibr" target="#b10">[11]</ref>. In the problem of dependence is substantially justified and relevance of further works of it solving is defined, the partly formalized vehicle of determination of the expected threats and approach to risks and potential charges is offered.</p><p>The conducted researches allowed the authors to draw conclusions basing necessity on managing risks that connected with dependence on key employees, on the generated scientific ideas, accumulated experience, and practical recommendations of many both home and foreign scientists and researchers in the industry of analysis of risks and counteraction to their threats <ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref><ref type="bibr" target="#b13">[14]</ref>. At this time the great number of various methods and models that are sent to the determination of constituents of the mathematical vehicle of estimation of risks in the conditions of incomplete definiteness of data on the basis of methods of expert evaluation is used <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b8">9,</ref><ref type="bibr" target="#b14">15]</ref>. They foresee the evaluation of the level of losses and probability of realization of risk on a quality scale, as a rule, without her quantitative interpretation. It was drawn the conclusion that by the substantial lever of increase of efficiency of management risks, that the dependences related to the factors are on key employees, in the real terms of weak structurization of processes of management and conceptual vagueness, there will be passing to the application of information technology that is based on possibilities and advantages of the modern systems of support of making the decision (SSMD). The base of models of SSMD must include the aggregate of statistical methods and methods of expert evaluation <ref type="bibr" target="#b15">[16,</ref><ref type="bibr" target="#b16">17]</ref> and to be sent to the determination of the risk of dependence of company from key employees.</p><p>Will describe the general going near the construction of information technology of managing the risks of dependence on key employees. In Fig. <ref type="figure">1</ref>  </p><formula xml:id="formula_0">𝐾𝑅 𝑖 = 𝑉 𝐼 × ∑ 𝑅 𝑖𝑗 𝑛 𝑗=1<label>(1)</label></formula><p>× 𝐵 𝑖𝑗 × 𝑃 𝑖𝑗 , (2) Where 𝑉 𝐼 𝑉 𝐼 is an index of identification of key specialists that is determined in a range [0. 5 ÷ 1]; 𝑅 𝑖𝑗 is the probability of realization of the offensive of j th threat of dependence is on key employees that are determined in a range [0 ÷ 1]; ∑ 𝑅 𝑖𝑗 = 1; 𝑛 𝑗=1 𝐵 𝑖𝑗 is the vulnerability of company is during realization of the offensive of j th threat of dependence on key employees that is determined in a range [0 ÷ 1];</p><p>Pij is multivariable charges that are expected during realization of j th threat of dependence on key employees, determined in the set scale of measuring.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 1: Information technology of managing the risks of dependence is on key employees</head><p>Becomes separated from authors for considered one of the substantial stages of information technology, that related to identification of key employee, and the task of presentation of it results is put as a corresponding quantitative index of authentication V I . To represent the setting measure of accordance of i th respondent to the requirements of the profile of key specialist both complex and from the point of view of his separate properties. They got the value of this index and database of identification formed in the system become the informative basis of realization of the further stages of management to the risks of dependence on key employees.</p><p>The aim of the research of authors is a search and analysis of ways of the decision of compromise task that requires, from one side, to provide the evaluation system taking into account variety of requirements to the competence of specialist, distribution of measure of formalization of processes and improving on the other hand, taking into account the discrepancy between the real conditions of the unstructured problem of decision-making and conceptual uncertainty. An attempt to assist the partial decision of this problem will be realized in this research.</p><p>The article aims to analyze the approach of realization of the stage of identification of key employees on the basis of system linked bases of models of expert evaluation with the use of modern possibilities of the systems of support of making the decision. For gaining end such tasks were put: to define the base of models of identification of key employee; to conduct research of base models and methods of their realization.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Base of Models of Identification of Key Employee</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Principles of Construction of the Base of Models</head><p>Forming of the base of models is conducted on the basis of analysis of steps of realization of the stage of identification and research of possibilities of existent methods of solving tasks of such class. At forming of the base of models, following the having a special purpose setting of achievement of desirable levels of authenticity and validity of results of authentication, to realize the gradual removal of problems of conceptual vagueness due to basing on next principles:</p><p>Forming of human-machine technology of expert evaluation is on the basis of the set base of models of SSMD.</p><p>Realization of the idea of system coordination of vehicle of formalization, mathematical providing, and rules of receipt of quality information is from a person, that makes the decision (PMD), and experts. As PMD and expert's certain guidance companies are examined representatives of skilled security and management a personnel service.</p><p>Use of methods of qualitative analysis with its interpretation in the quantitative measuring. Account of efficiency of "human factor"-making the decision must be based on professionalism, being informed, intuition, the intellect of PMD and experts, that is why reasonable requirements must be certain in the complement of the expert group.</p><p>Application of the method of individual questioning is on the basis of the absence of exchange information between experts. Every expert must have an individual password of access to the server for implementation of expert evaluation and receipt of initial information about the object of evaluation, but can`t exchange information with other experts. Dependence of evaluation results is eliminated these on prevailing of opinions of the most active and authoritative specialists and "anonymity" of opinions of experts is provided.</p><p>Providing is at a concordance and grouping of end-point of the real compromise taking into account ideas and level of competence of every expert.</p><p>Application of vehicle of the unclear questioning is with a grant to the possibility to conduct the expert questioning with an orientation on the interpretation of interval of vagueness as a structure of his scale.</p><p>To take into the accountability of man to recognize and form the estimations within the framework of the recommended limitations of the number of Miller (7 ± 2) at the construction of structures of evaluation scales.</p><p>An acceptance of final decision is the prerogative of man-to the collective of specialists, accountable for the policy of the company that is the initiators of development and interested in the achievement of a quality result.</p><p>To the base of models, it is suggested to include: Model 1. Profile of key employees. The base of models is divided into two component groups that are certain as two components of the spiral approach of creation of the system: a group of models, that will realize the processes of work of separate experts (models 1-3, model 5), is the first iteration of the development of the system; a group of models, that will realize the processes of generalization of opinions of different experts (model 3, model 4), is the second iteration of development.</p><p>Within the framework of the article the put task of research of models of the first group.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Model of the Profile of Key Employee</head><p>The model of the profile of key specialist prepares by PMD-the corresponding structures of personnel management and the system of company safety. At forming the profile of PMD we will consider two hypostases of dependence on key employees. From one side, an employee is examined as a valuable asset of the company (human resource) of the present time and taking into account the terms of long-term development of the company, from another party, as a possible source of the potential threat that determines the risk of dependence. Clear that profile of key employee this empiric set concept, he must be built depending on the reality of terms of work of the corresponding company, and to guarantee his model possibility of varying of the profile structure. Stopped up the hierarchical model of the profile of key employees, rich in content authenticity of that is reasonable in-process <ref type="bibr" target="#b4">[5]</ref>. She is built on the basis of results of questioning of experts that work in intellectually capacious companies and have an experience both for authentications of key employees and application of these results at a management risks by the unformalized or partly formalized way. At the first level of hierarchy certain groups of competencies of key employees, on the second are criteria of competence for every group (Table <ref type="table" target="#tab_1">1</ref>, columns 1,2). </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">Estimation Model of the Weight of Criteria of Competence of Different Levels of Hierarchy</head><p>Application of this model gives the formalized mathematical vehicle of transformation of quality estimations of the expert of comparative meaningfulness of criteria in the quantitative expression of their weight. An estimation is formed for two levels of the hierarchy of profile model: at the level of groups of competence {(β g ) ̅̅̅̅ |g = 1, . . G}, of criteria of competence of every group {(β g m )|g ∈ G; m = 1, M ̅̅̅̅̅ } and for determining the weight of the generalized influence of every criterion of competence on the large-sized index of identification of key specialist</p><formula xml:id="formula_1">{(β gm R )|g ∈ G; m = 1, M ̅̅̅̅̅ } (see Table 1, columns 3-5).</formula><p>The construction of the model is based on the application of possibilities of the method of analysis of hierarchies (MAH) <ref type="bibr" target="#b17">[18]</ref><ref type="bibr" target="#b18">[19]</ref><ref type="bibr" target="#b19">[20]</ref><ref type="bibr" target="#b20">[21]</ref>. According to this method, an expert gradually carries out the comparative estimation of meaningfulness of groups of competencies and criteria of every group based on the recommended scale of estimation of advantages. An estimation that is conducted by an expert in verbal and grows into a model in the quantitative description. The expediency of application of МАІ a base tool of construction of the model was grounded by the next possibilities of the method, that substantially influence on authenticity of evaluation results.</p><p>The flexible hierarchical structure of presentation of objects of evaluation that gives the possibility to the user, in accordance with the situational terms of work of the company, to make alteration both in the complement of groups of competence, criteria of their evaluation and levels of decomposition of criteria.</p><p>Expansion of evaluation interval. If most methods of expert comparative evaluation (for example, pair comparisons and ranging) give the possibility to the expert to set only the fact of advantage of one object above other, МАІ allows taking into account the different levels of advantages.</p><p>Assumes violation of condition of complete co-ordination of estimations of expert, that in the conditions of implementation of the set limitations, distributes an evaluation scale and specifies the results of estimations.</p><p>On the set profile in our example as a result of the questioning of experts, it must be six matrices of pair comparisons are built. One for comparison of the weight of groups of competenсe, five-for comparison of weight criteria of every group of competences. A typical view of these matrices is driven to Table <ref type="table">2</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 2.</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Matrix of pair comparisons Group of criteria of competence</head><p>Group of criteria of competence</p><formula xml:id="formula_2">S1 … Sq … Sn S1 a11 … a1q … a1n … … … … … … Sm am1 … amq … amn … … … … … … Sn An1 … Anq … Ann</formula><p>The results of the verbal questioning of experts about the advantages of evaluation objects grow into a numerical presentation on the basis of the classic scale of МАH. She has 5 base levels (recommended a minimum of the number of Miller) and 9 levels at the application of terms of intermediate evaluation (recommended a maximum of number of Miller): 1 does not advantage (criteria are identically important); 3 is a weak advantage (the first criteria has an insignificant advantage as compared to the second); 5 is a substantial advantage (the first criteria is substantially major than second); 7 is a very strong advantage (the first criteria is considerably major than second); 9 is an absolute advantage (the first criteria are absolutely major than second; 2.4.6.8 are intermediate estimations of levels of advantage.</p><p>If the criteria of m prevail above q, then the cage of column m, filled by a reverse to his number (by a shot). If the criteria of m do not prevail above q, then there is a reverse. If it is considered that criteria of m and q are identically important, then the unit belongs in both positions. This matrix must own the property of reverse symmetry: amq=1/aqm.</p><p>Principles of construction of matrix and rule of her treatment are identical for every matrix. Will illustrate the stated on the basis of construction and processing of data of comparative estimation the expert of meaningfulness of criteria of a group of competence "Professionalism" (Table <ref type="table" target="#tab_2">3</ref>). The further processing of data of matrix consists in the estimation of the weight of criteria on the basis of determination of values of the personal vector of the matrix:</p><formula xml:id="formula_3">𝑎 𝑔𝑚 = √ ∏ 𝑎 𝑚𝑞 𝑛 𝑞=1 𝑛 .<label>(3)</label></formula><p>Size is determined on the basis of normalization of values of the personal vector and equals:</p><formula xml:id="formula_4">𝛽 𝑔𝑚 = 𝑎 𝑔𝑚 ∑ 𝑎 𝑔𝑚 𝑛 𝑚=1 . (<label>4</label></formula><formula xml:id="formula_5">)</formula><p>An analogical method is determining the weight of every group of criteria of competence:</p><formula xml:id="formula_6">𝑎 𝑔 = √ ∏ 𝑎 𝑔 𝑛 𝑞=1 𝑞 𝑛 ;<label>(5)</label></formula><formula xml:id="formula_7">𝛽 𝑔 = 𝑎 𝑔 ∑ 𝑎 𝑔 𝐺 𝑔=1 . (<label>6</label></formula><formula xml:id="formula_8">)</formula><p>The weight of the generalized influence of every criterion of competence on the index of identification of employees is determined as follows:</p><formula xml:id="formula_9">𝛽 𝑔𝑚 𝑅 = 𝛽 𝑔 × 𝛽 𝑔𝑚 .<label>(7)</label></formula><p>At a construction to the model, the next situational terms of realization are taken into account.</p><p>Canvassing of experts can be realized in the asynchronous mode (in comfortable for an expert time) and the conditions of the asynchronous questioning as means of the organization of the group meeting with the parallel analysis of PMD of results questioning, to their discussions and realization of iterations of improvement.</p><p>Canvassing can be organized both for the exposure of all spectrum of groups and criteria of competence and gradually with the limitation for to the groups of competencies or for to the levels of hierarchy.</p><p>For pair comparisons to the expert possibility of the use of two modes of evaluation is given: 1. To apply the chain of comparative evaluation of criteria of the first diagonal of the matrix. This approach allows to bring down a volume to estimate an evaluation and to annul the risk of errors in the coordination of estimations of the expert. Application of corresponding algorithm taking into account transitive dependence of 𝑎 𝑚𝑞 • 𝑎 𝑠𝑘 = 𝑎 𝑚𝑘 evaluations give the possibility of filling of all matrix, the sign of complete co-ordination of matrix is here kept and guaranteed logic of results:</p><formula xml:id="formula_10">𝑎 𝑚𝑞 = 𝛽 𝑚 𝛽 𝑞 ⁄ . (<label>8</label></formula><formula xml:id="formula_11">)</formula><p>2. To apply the comparative pair-wise evaluation of all criteria of the reverse-symmetric matrix. From one side, this approach has a risk to bring к over to the impermissible change of co-ordination of estimations of expert but, on the other hand, and to render the large preference of additional compensation of terms of conceptual vagueness -an expert in the change of the estimations can take into account the additional nuances of comparative estimation and conduct them quality clarification. So in an example that is given in Table <ref type="table" target="#tab_2">3</ref>, the questioning of expert passed in the second mode. An expert at questioning identically estimated insignificant advantage of criteria 2.2 (really manages business, company) above criteria 2.3 (locks on itself the acceptance of important administrative decisions) and estimated it a 2.2 2.3 = 2. Advantage of criteria 2.1 (owns unique knowledge) above criteria 2.4 (owns unique skills, technologies) he also estimated a 2.1 2.4 = 2. Treatment of results of estimation finds a violation of the integrity of full co-ordination of matrix: But this "negative" result can work on the improvement of results, namely -clarification of advantages of expert. In the first comparison, the estimation of the advantage of the first criteria is corrected and certainly less than 2, in the second-anymore. In a model, a mathematical vehicle is used for diagnostics of cause and effects of the inconsistency of estimations of experts and control of admission of results <ref type="bibr" target="#b20">[21]</ref>. Verification confirmed the possible level of "anomaly" of estimations of experts in our example. In the opposite case evaluation results are spoiled, reasons are determined and the new iteration of evaluation is conducted.</p><formula xml:id="formula_12">𝑎 2.</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4.">Model of the Establishment of Values of Criteria of Competence of Key Employees</head><p>A model is built with an aim to give to the expert of the possibility of application of the formalized mathematical vehicle of identification of employee on the basis of determination of index 𝑣 𝑖 𝑔 𝑚 , that represents the measure of accordance of i th respondent to the requirements of the profile of specialist on m th criteria of g th group of competences. At an evaluation, an expert follows existing in the company of information about respondent, that answers the criteria of competence that is examined, by the personal impressions from the real his job performances, by the results of intuitional analysis his potential possibilities. The last is determined on the basis of unformalized interview, interviewing, intuitional generalization of the impressions-that is, appears the unstructured problem of making the decision of estimation of the employee in the conditions of conceptual vagueness. In these terms the mathematical vehicle of model it is suggested to build on the basis of rules of unclear evaluation with the establishment of the interval of vagueness <ref type="bibr" target="#b21">[22]</ref>, which is examined as a substantial lever of increase of clearness and authenticity of estimations, and the following provides for:</p><p>An expert gets the possibility to define a result, not on the basis of synonymous estimation of accordance of the respondent of competence (for example, answers the requirements of criteria "owns unique knowledge"-or does not answer), but to take into account at an evaluation, at what level (as far as) he answers these requirements, following existent divergences of the personal impressions. It is suggested to apply five levels (minimum value of the number of Miller) of estimation of accordance of the respondent to the certain criteria of competence on the basis of such correlations:</p><p>𝑣 𝑖 𝑔 𝑚 = {𝑣 𝑖 𝑔 𝑚 𝑤 ̅̅̅̅̅̅̅|𝑖 ∈ 𝐼; 𝑚 ∈ 𝑀; 𝑔 ∈ 𝐺; 𝑤 = 1, 𝑊 ⃐ }.</p><p>Where 𝑣 𝑖 𝑔 𝑚 𝑤 determines the result of the evaluation of a measure of accordance of i th respondent an expert to the requirements of the profile of specialist on m th criteria of g th group of competenсes on w-level of accordances. The results of the evaluation of expert it is suggested to examine as discrete distribution of the casual size of evaluation. The scale of classification levels of accordance is given in Table <ref type="table" target="#tab_4">4</ref> (columns 1-4). </p><p>Where Y i g m w is a degree of confidence of expert in his estimation, 0.9≤ Y i g m w ≤ 1 (see Table <ref type="table" target="#tab_4">4</ref>, column 7):</p><p>1 means the complete confidence of an expert, that accordance of i th respondent to the requirements to m th criteria of g th group of competence at the level of w answers to the maximal value in the range of evaluation, 0.9 is on a verge the set level and answers a minimum value. A base for further calculations value𝑣 𝑖𝑚𝑔𝑤 is determined within the framework of certain intervals (Table <ref type="table" target="#tab_4">4</ref>, column 9):</p><formula xml:id="formula_15">𝑣 𝑖 𝑔 𝑚 𝑤 = 𝑔 𝑚 𝑤 𝑚𝑎𝑥 × 𝑌 𝑖𝑔 𝑚 𝑤 . (<label>11</label></formula><formula xml:id="formula_16">)</formula><p>Taking into account, that the results of estimation of the expert of size 𝑣 𝑖 𝑔 𝑚 𝑤 are examined as discrete distribution of casual size further treatment of evaluation results it is suggested to conduct on the basis of next correlations:</p><formula xml:id="formula_17">𝑣 𝑖 𝑔 𝑚 𝑤 = {(𝑣̅ 𝑖𝑔 𝑚 𝑤 ; 𝜗 ̅ 𝑖𝑔 𝑚 𝑤 ; 𝛾̅ і𝑔 𝑚 𝑤 ) |𝑖 ∈ 𝐼; 𝑚 ∈ 𝑀; 𝑔 ∈ 𝐺; 𝑤 = 1, 𝑊 ⃐ }.<label>(12)</label></formula><p>Where ϑ ig m w is certainly an expert probability of the truth of his estimation of accordance of i th respondent m th criteria of g th group of competence at the level of w (Table <ref type="table" target="#tab_4">4</ref>, column 5). Certainly, remains probability of 1-ϑ ig m w , that a truth value is outside his estimation. For example, in the truth of the estimation of separate precedents of the very high level of competence he is sure with probability 0.9, and at middle level -0.4).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>𝛾 𝑖𝑔 𝑚 𝑤</head><p>is the probability of serving of every level of evaluation that is determined on the basis of correlation:</p><formula xml:id="formula_18">𝛾 𝑖𝑔 𝑚 𝑤 = 𝜗 𝑖𝑔 𝑚 𝑤 ∑ 𝜗 𝑖𝑔 𝑚 𝑤 𝑊 𝑤=1 . (<label>13</label></formula><formula xml:id="formula_19">)</formula><p>An index v i g m is considered as the justified unbiased estimation for general average meaning, that is determined as a mathematical expectation of this value, where a value v i g m w is defined as casual, for what probabilities of compensation 𝛾 𝑖𝑔 𝑚 𝑤 are set:</p><formula xml:id="formula_20">𝑣 𝑖 𝑔 𝑚 = ∑ 𝑣 𝑖 𝑔 𝑚 𝑤 × 𝑊 𝑤=1 𝛾 𝑖𝑔 𝑚 𝑤 . (<label>14</label></formula><formula xml:id="formula_21">)</formula><p>Will give an example application of model at an estimation the expert of index𝑣 𝑖 2 2 , that represents the measure of accordance of i th respondent to the requirements of the profile of specialist on a criteria 1 "owns unique knowledge" of the group of competence 2 "Professionalism" (see Table <ref type="table" target="#tab_4">4</ref>). Will comment on the data of this table. An expert-defined that an employee had answered requirements to the criteria that determine possessing unique knowledge on different levels: there are precedents of confirmation of the very high level of knowledge of the respondent, an expert determines the truth of the estimation (probability of truth)-0.9, feet of confidence of expert in that an employee answers the maximal value of this level-1; there are precedents of the high level of accordance, an expert fully reposes in it to the estimation (probability of truth)-1, degree of confidence of expert in that an employee answers maximal value of this level-0.9; there are precedents of the middle level of accordance, the confidence of expert in it to the estimation (probability of truth)-1, degree of confidence of expert in that an employee answers maximal value of this level-0.95.</p><p>Based on the formula <ref type="bibr" target="#b10">(11)</ref> the values of the base index v i g m w are determined for every level of accordance: 𝑣 𝑖2 </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.5.">Model of Determination of the Index of Identification of Key Employee</head><p>Decision-making about the identification of respondents as key employees is the prerogative of PMD. A model that is examined is built with the aim of the grant of the help of PMD in making the decision on the basis of the formalized tool. He is based on the mathematical vehicle of identification of key employees on the basis of determination of index that represents the measure of accordance of i th respondent to the requirements of the profile of specialist and is used as one of the base estimations at a risk of dependence (1) assessment. In a model is used scales of classification of levels of accordance that is certain in Table <ref type="table" target="#tab_4">4</ref> (columns 1-4). By the formalized sign. conforming to the requirements of key employees are that the value of the index belongs to the level of w1 or w2. A determination in a model taken into account:  analysis of the measure of accordance of the worker to all complex of requirements to the different groups of competence taking into account their comparative meaningfulness;  analysis of the measure of possessing a respondent by unique properties from the point of view of the concrete group of competence or separate criteria.</p><p>It is suggested to define an index 𝑉 𝑖 on the basis of the next correlation:</p><formula xml:id="formula_22">𝑉 𝑖 = 𝑉 𝑖 𝐶 × 𝛿 𝐶 + 𝑉 𝑖 𝑀𝑎𝑥 (𝑔) × 𝛿 𝑚𝑎𝑥 . (<label>15</label></formula><formula xml:id="formula_23">)</formula><p>Where 𝑉 𝑖 𝐶 𝑉 𝑖 𝐶 is a complex index of identification that determines accordance of the respondent to all complex of requirements to the different groups of competence; δ C is coefficient that determines the measure of the personal interest of PMD in the complex estimation of respondent 0 ≤ δ C ≤ 1. If 𝛿 𝐶 = 1, it means that PMD is interested only in the scalene estimation of the respondent in accordance with the requirements of the profile, if, it means that PMD examines at an estimation only the aspects of competence, that have maximal values and prevailing unique possibilities determine him.</p><p>δ max is coefficient that determines the measure of the personal interest of PMD in the estimation of the respondent from the point of view of competencies, that have a maximal value and unique properties determine it, 0 ≤ δ max ≤ 1, δ max = 1-δ C .</p><p>V i Max (g)index of identification that estimates an employee from the point of view of maximal value of his competence for to the set groups.</p><p>A complex index is determined on the basis of the application of the method of linear convolution of criteria:</p><formula xml:id="formula_24">𝑉 𝑖 𝐶 = ∑ 𝑣 𝑖 𝑔 𝐺 𝑔=1 × 𝛽 𝑔 . (<label>16</label></formula><formula xml:id="formula_25">)</formula><p>where v i g 𝑣 𝑖 𝑔 is a complex index of identification of i th employee for g th group of competence; 𝛽 𝑔 is the weight of g th group of competence, see formula <ref type="bibr" target="#b5">(6)</ref>. The index of identification 𝑉 𝑖 𝑀𝑎𝑥 (𝑔) is determined on the basis of correlations:</p><formula xml:id="formula_26">𝑉 𝑖 𝑀𝑎𝑥 (𝑔) = max 𝑔 {𝑣 𝑖 𝑔 }, 𝑔 = 1, 𝐺 ̅̅̅̅̅ .<label>(17)</label></formula><p>In accordance with argumentation that was applied at descriptions of going near the evaluation of index of identification <ref type="bibr" target="#b14">(15)</ref>, at an estimation 𝑣 𝑖 𝑔 are taken into account the results of it complex evaluation on g th group of competences 𝑣 𝑖 𝑔 с 𝑣 𝑖 𝑔 с and index 𝑣 𝑖 𝑔 𝑚𝑎𝑥 (𝑚)of maximal value of criteria on the set group of competenсe:</p><formula xml:id="formula_27">𝑣 𝑖 𝑔 = 𝑣 𝑖 𝑔 с × 𝜑 𝑔 𝑐 + 𝑣 𝑖 𝑔 𝑚𝑎𝑥 (𝑚) × 𝜑 𝑚𝑎𝑥 𝑔 . (<label>18</label></formula><formula xml:id="formula_28">)</formula><p>Where 𝜑 𝑔 𝑐 𝜑 𝑔 𝑐 a coefficient that determines the measure of the personal interest of PMD in the complex estimation of the respondent in g th to the group of competencies, 0 ≤ φ g c ≤ 1. If φ g c = 1, it means that PMD is interested only in the versatile estimation of properties of workers, if φ g c = 0, it means that PMD examines at an estimation only the aspects of competence, that have maximal values and determine his prevailing unique possibilities.</p><p>𝜑 𝑚𝑎𝑥 𝑔 𝑚𝑎𝑥 is coefficient that determines the measure of the personal interest of PMD in the estimation of the respondent from the point of view of criteria of competencies, that have a maximal value and determine his unique properties 0 ≤ 𝜑 𝑚𝑎𝑥 𝑔 ≤ 1, 𝜑 𝑚𝑎𝑥 𝑔 = 1 − 𝜑 𝑔 𝑐 . A complex index v i g с is determined:</p><formula xml:id="formula_29">𝑣 𝑖 𝑔 с = ∑ 𝑣 𝑖 𝑔 𝑚 𝑀 𝑚=1 × 𝛽 𝑔 𝑚 . (<label>19</label></formula><formula xml:id="formula_30">)</formula><p>Where 𝑣 𝑖 𝑔 𝑚 a value of m th criteria of g th group of competence of i th worker, see formula <ref type="bibr" target="#b13">(14)</ref>; 𝛽 𝑔 𝑚 is the weight of m th criteria of g th group of competence, see formula (4).</p><p>The index of identification is determined on the basis of correlations:</p><formula xml:id="formula_31">𝑣 𝑖 𝑔 𝑚𝑎𝑥 = max 𝑔 𝑚 {𝑣 𝑖 𝑔 𝑚𝑎𝑥 } , 𝑚 = 1, 𝑀 ̅̅̅̅̅̅ . (<label>20</label></formula><formula xml:id="formula_32">)</formula><p>Possibility of consideration of results of identification with difference fluctuation of correlations of coefficients 𝛿 𝐶 , 𝛿 𝑚𝑎𝑥 , 𝜑 𝑔 𝑐 and 𝜑 𝑚𝑎𝑥 𝑔 gives PMD the vehicle of imitation design with the aim of analysis of alternative variants of evaluation of an employee from the point of view of the set aims of authentication.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Discussion of Results of Research of Approach of Realization of the Stage of Identification of Key Employee</head><p>The got results of the research to testify that approaches, models, and methods that fold only information technology of authentication, create the effective tool of influence on the quality decision of one of the major and actual problems of minimization of risks of dependence on key employees. The universality of the built models allows lightness to apply the got tool in any organization. Taking into account the problem of conceptual vagueness and weak structured of data, that they are characterized, application of the system constrained models is offered that are based on: to the dominant role of expert opinion; principles of maximally possible formalization of processes; the validity of application and expansion of possibilities of mathematical-logical methods of expert evaluation; to the comfort for specialist interactive office hours with a tool.</p><p>The got results of experimental calculations to testify that an expert gets comfortable enough interactive tool of transformation of quality estimations in the quantitative expression of their weight Considerably specify authenticity of estimation of е the expert of comparative meaningfulness of criteria of competence and their groups, that an expert gets the possibility to take into account the different degrees of advantage of levels that are based on the known scale of comparative estimations of the method of analysis of hierarchies. Got results of treatment of estimations of experts after offered by the system of equalizations (3)-( <ref type="formula" target="#formula_10">8</ref>) testify that determining the weight of criteria of competence and their groups (Table <ref type="table" target="#tab_2">3</ref>) is formalized and does not cause complications during work of the expert.</p><p>To the user, the mathematical vehicle of the establishment of values of criteria of competence of key employee that is built on the basis of rules of unclear evaluation with the establishment of the interval of vagueness was offered. He is examined as a substantial lever of increase of clearness and authenticity of results due to that possibility to conduct the evaluation of respondent an expert on the basis of existent divergences of the estimations due to application of five levels of accordance of the respondent to the certain criteria of competence (9) is given <ref type="bibr" target="#b13">(14)</ref>, gradual specification the estimations taking into account confidence in the exactness of the evaluation (10)- <ref type="bibr" target="#b10">(11)</ref> and task probabilities of accordance of properties of respondent to every level ( <ref type="formula" target="#formula_17">12</ref>)-( <ref type="formula" target="#formula_20">14</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusions</head><p>The approach of realization of the stage of identification of key employees is investigational on the basis of system linked bases of models of expert evaluation with the use of modern possibilities of the systems of support of making the decision. Models that are examined, grants of the help of PMD built with an aim in making the decision on the basis of the formalized tool. It is based on the mathematical vehicle of identification of key employees on the basis of determination of index 𝑉 𝑖 that represents the measure of accordance of i th respondent to the requirements of the profile of specialist and is used as one of the base estimations at risk of dependence assessment.</p><p>The got results of experimental calculations to testify that realization authentications of key employees, that is completed by determination of index, on the basis of the offered formalized vehicle does not cause inconveniences. He gives the possibility of PMD to be based in the estimations both on the analysis of the measure of accordance of the worker to all complex of requirements to the different groups of competence and to take into account or be based in the estimation only on the measure of possessing a respondent by separate unique properties.</p><p>It is necessary to mark, that herein investigational does not pay attention to the grouping of results of questioning of different experts that are the necessary component of information technology and mortgage of a considerable increase of efficiency and authenticity of results. Therefore, the question of selection of the group of experts on the basis of analysis, estimations and to the formalized account of the measure of their competence, creation of mathematical vehicle of the grouping of estimations of experts with control of sufficiency of measure of the logic of their ideas, measure of the dispersion of estimations of separate expert and accordance to the measure of co-ordination of opinions of different experts it is planned the set requirements to work at further researches.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Model 2 .</head><label>2</label><figDesc>Estimation of the weight of criteria of competence of different levels of the hierarchy of profile of key employees. Model 3. Establishment of values of criteria of competence of key employees. Model 4. Control of coordination of opinions of experts. Model 5. Generalization of evaluation results. Model 6. Determination of index of identification of key employees.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="3,72.18,193.72,451.00,329.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 1 .</head><label>1</label><figDesc>Profile</figDesc><table><row><cell></cell><cell>of key employee</cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>Groups and criteria of competencies of key employees</cell><cell cols="3">Weight of groups of</cell></row><row><cell>Code</cell><cell>Name</cell><cell cols="4">competencies and their</cell></row><row><cell></cell><cell></cell><cell></cell><cell>criteria</cell><cell></cell></row><row><cell></cell><cell></cell><cell>𝛽 𝑔</cell><cell>𝛽 𝑔𝑚</cell><cell>𝛽 𝑔𝑚</cell><cell>𝑅</cell></row><row><cell>1.</cell><cell>Group of competence "Ability to learning"</cell><cell>0.2</cell><cell>-</cell><cell>-</cell></row><row><cell>1.1</cell><cell>The permanent personal interest is in the acquisition of</cell><cell></cell><cell>0.1152</cell><cell cols="2">0.0230</cell></row><row><cell></cell><cell>new knowledge</cell><cell></cell><cell></cell><cell></cell></row><row><cell>1.2</cell><cell>Analysis of aim and maintenance of studies</cell><cell></cell><cell>0.1531</cell><cell cols="2">0.0307</cell></row><row><cell>1.3</cell><cell>Ability to apply new knowledge in practice</cell><cell></cell><cell>0.2234</cell><cell cols="2">0.0447</cell></row><row><cell>1.4</cell><cell>Ability to use stranger experience for own development</cell><cell></cell><cell>0.1453</cell><cell cols="2">0.0290</cell></row><row><cell>1.5</cell><cell>Ability independently to determine why it is necessary to</cell><cell></cell><cell>0.2630</cell><cell cols="2">0.0526</cell></row><row><cell></cell><cell>learn for the best implementation of work</cell><cell></cell><cell></cell><cell></cell></row><row><cell>1.6</cell><cell>Permanent perfection of abilities and skills</cell><cell></cell><cell>0.1000</cell><cell cols="2">0.0200</cell></row><row><cell></cell><cell>All on a group 1</cell><cell>0.2</cell><cell>1.0</cell><cell cols="2">0.2</cell></row><row><cell>2</cell><cell>Group of competence "Professionalism"</cell><cell>0.4</cell><cell>-</cell><cell>-</cell></row><row><cell>2.1</cell><cell>Owns unique knowledge</cell><cell></cell><cell>0.1751</cell><cell cols="2">0.0700</cell></row><row><cell>2.2</cell><cell>Really manages the business, company</cell><cell></cell><cell>0.1462</cell><cell cols="2">0.0584</cell></row><row><cell>2.3</cell><cell>Locks on itself the acceptance of important administrative</cell><cell></cell><cell>0.1223</cell><cell cols="2">0.0489</cell></row><row><cell></cell><cell>decisions</cell><cell></cell><cell></cell><cell></cell></row><row><cell>2.4</cell><cell>Owns unique skills, technologies</cell><cell></cell><cell>0.0790</cell><cell cols="2">0.0317</cell></row><row><cell>2.5</cell><cell>Able quickly to get along at the put tasks.</cell><cell></cell><cell>0.0790</cell><cell cols="2">0.0317</cell></row><row><cell>2.6</cell><cell>Ability to decide difficult tasks.</cell><cell></cell><cell>0.0790</cell><cell cols="2">0.0317</cell></row><row><cell>2.7</cell><cell>Ability to make a decision in the situation of vagueness</cell><cell></cell><cell>0.3194</cell><cell cols="2">0.1276</cell></row><row><cell></cell><cell>All on a group 2</cell><cell>0.4</cell><cell>1.0</cell><cell cols="2">0.4</cell></row><row><cell>3</cell><cell>Group of competence "Integration"</cell><cell>0.2</cell><cell>-</cell><cell>-</cell></row><row><cell>3.1</cell><cell>Contacts with key clients</cell><cell></cell><cell>0.2501</cell><cell cols="2">0.0500</cell></row><row><cell>3.2</cell><cell>Turned out a copula in state structures</cell><cell></cell><cell>0.2501</cell><cell cols="2">0.0500</cell></row><row><cell>3.3</cell><cell>It is an informal leader</cell><cell></cell><cell>0.1002</cell><cell cols="2">0.0200</cell></row><row><cell>3.4</cell><cell>Ability to create and support confidence relations</cell><cell></cell><cell>0.0923</cell><cell cols="2">0.0181</cell></row><row><cell>3.5</cell><cell>Ability to forecast the most credible reactions of man</cell><cell></cell><cell>0.1133</cell><cell cols="2">0.0221</cell></row><row><cell>3.6</cell><cell>Ability for the decision of any task, quickly to find and</cell><cell></cell><cell>0.1240</cell><cell cols="2">0.0248</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 3 .</head><label>3</label><figDesc>Matrix of comparative estimation by the expert of the weight of criteria of the group of competence "Professionalism"</figDesc><table><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>Weight of</cell></row><row><cell>Criteria of group "Professionalism"</cell><cell cols="7">2.1 2.2 2.3 2.4 2.5 2.6 2.7</cell><cell>criteria</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>𝛽 𝑔𝑚</cell></row><row><cell>2.1. Owns unique knowledge</cell><cell>1</cell><cell>2</cell><cell>2</cell><cell>2</cell><cell>2</cell><cell>2</cell><cell>1/3</cell><cell>0.1751</cell></row><row><cell cols="2">2.2. Really manages business, company 1/2</cell><cell>1</cell><cell>2</cell><cell>2</cell><cell>2</cell><cell>2</cell><cell>1/3</cell><cell>0.1462</cell></row><row><cell>2.3. Locks on itself the acceptance of</cell><cell cols="2">1/2 1/2</cell><cell>1</cell><cell>2</cell><cell>2</cell><cell>2</cell><cell>1/3</cell><cell>0.1223</cell></row><row><cell>important administrative decisions</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>2.4. Owns unique skills, technologies</cell><cell cols="3">1/2 1/2 1/2</cell><cell>1</cell><cell>1</cell><cell>1</cell><cell>1/3</cell><cell>0.0790</cell></row><row><cell cols="4">2.5. Able quickly to get along at the put 1/2 1/2 1/2</cell><cell>1</cell><cell>1</cell><cell>1</cell><cell>1/3</cell><cell>0.0790</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_4"><head>Table 4 .</head><label>4</label><figDesc>Examples of estimation by the expert of index 𝒗 𝒊 𝟐 𝟐, that represents the measure of accordance of i th respondent to the requirements of the profile of specialist on a criteria 1 "Owns unique knowledge" of the group of competenсes of 2 "Proffesionalism"A scale is the classification of values of evaluation An expert gets the possibility of further specification the estimation (the estimation) within the framework of the set range of evaluation on the basis of the next correlation:</figDesc><table><row><cell>Estimations of expert</cell><cell>The expected is given</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_5"><head></head><label></label><figDesc>is set an index 𝑣 𝑖 𝑔 𝑚 that represents the measure of accordance of i th respondent to the requirements of the profile of specialist on a criteria 1 "owns unique knowledge" of the group of competencies 2 "Professionalism:"</figDesc><table><row><cell cols="4">evaluation level is determined: 𝛾 𝑖2 1 1</cell><cell>= 0.392; 𝛾 𝑖2 1 2</cell><cell>= 0.434; 𝛾 𝑖2 1 13</cell><cell>= 0.174; based on the formula</cell></row><row><cell cols="2">(14) 𝑣 𝑖 2 1</cell><cell cols="3">= 1 × 0.392 + 0.81 × 0.434 + 0.75 × 0.174 = 0.87404.</cell></row><row><cell>1 1</cell><cell cols="2">= 1; 𝑣 𝑖2 1 2</cell><cell cols="2">= 0.81; 𝑣 𝑖2 1 3</cell><cell>= 0.75, on basis (f.13) probability of serving of</cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Talent Management in the Era of the Aging Workforce: the Critical Role of Knowledge Transfer</title>
		<author>
			<persName><forename type="first">T</forename><surname>Calo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Public Personnel Management</title>
		<imprint>
			<biblScope unit="volume">37</biblScope>
			<biblScope unit="page" from="403" to="416" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Talent Management for the Twenty-first Century</title>
		<author>
			<persName><forename type="first">P</forename><surname>Cappelli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Harvard Business Review</title>
		<imprint>
			<biblScope unit="page" from="74" to="81" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Enhancing Creativity: Managing Work Context for The High Potential Employee</title>
		<author>
			<persName><forename type="first">A</forename><surname>Cummings</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Oldham</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">California Management Review</title>
		<imprint>
			<biblScope unit="volume">40</biblScope>
			<biblScope unit="page" from="22" to="38" />
			<date type="published" when="1997">1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Talent management: Issues of Focus and Fit</title>
		<author>
			<persName><forename type="first">V</forename><surname>Garrow</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Hirsh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Public Personnel Management</title>
		<imprint>
			<biblScope unit="volume">37</biblScope>
			<biblScope unit="page" from="389" to="402" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Trends and Challenges of developing human capital in India</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">V</forename><surname>Rao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Varghese</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Human Resource Development Internationa</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page" from="15" to="34" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<author>
			<persName><forename type="first">V</forename><surname>Minina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Krupskaja</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Zubenko</surname></persName>
		</author>
		<ptr target="https://hr-portal.ru/article/klyuchevye-sotrudniki-organizacii-podhody-k-identifikacii-i-problemy-upravleniya" />
		<title level="m">Kljuchevye sotrudniki organizacii: podhody k identifikacii i problemy upravlenija, Kadrovik. Kadrovyj menedzhment</title>
				<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="volume">1</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<author>
			<persName><forename type="first">V</forename><surname>Minina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Krupskaya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Dmitrienko</surname></persName>
		</author>
		<ptr target="http://portal.hamk.fi/portal/page/portal/HAMK/Tutkimusja_kehitys/Valtakunnalliset_verkostohankkeet/STROI_Network/Publications/STROI_Part2_%20SNi_2010.2.26.pdf" />
		<title level="m">Human Resource Management in Project-Based Firms: Core Employees Focus, STROI-NETWORK, Business Networks in Russia: Final Report</title>
				<imprint>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="29" to="49" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<author>
			<persName><surname>Je</surname></persName>
		</author>
		<author>
			<persName><surname>Narushev</surname></persName>
		</author>
		<ptr target="https://blog.liga.net/user/enarushev/article/33724" />
		<title level="m">Minimizacija zavisimosti kompanii ot &quot;kljuchevyh sotrudnikov</title>
				<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><surname>Rudenko</surname></persName>
		</author>
		<ptr target="https://bru.in.ua/business-jurnal/upravlenie-personalom/ocenite-riski-uhoda-kljuchevogo/personalom/ocenite-riski-uhoda-kljuchevogo" />
		<title level="m">Ocenite riski uhoda kljuchevogo sotrudnika</title>
				<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
	<note>Skol&apos;ko poterjaet kompanija?</note>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Risk management: procedures, methods and experiences</title>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">P</forename><surname>Berg</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">RT&amp;A</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="79" to="95" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">A</forename><surname>Kravchenko</surname></persName>
		</author>
		<ptr target="http://ecobio.nau.edu.ua/index.php/EPSAE/article/view/4012" />
		<title level="m">Funktsionalnyi ta intehralnyi pidkhody do upravlinnia pidpryiemnytskymy ryzykamy: teoriia ta praktyka</title>
				<imprint>
			<date type="published" when="2008">2008</date>
			<biblScope unit="volume">2</biblScope>
		</imprint>
	</monogr>
	<note>Problemy systemnoho pidkhodu v ekonomitsi</note>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Online credit card fraud detection: A hybrid framework with big data technologies</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Dai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Yan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Tang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zhao</surname></persName>
		</author>
		<author>
			<persName><surname>Guo</surname></persName>
		</author>
		<idno type="DOI">10.1109/TrustCom.2016.0253</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Trust Com-Big DataSE-ISPA</title>
		<imprint>
			<biblScope unit="page" from="1644" to="1651" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Practical methods for information security risk management</title>
		<author>
			<persName><forename type="first">C</forename><surname>Amancei</surname></persName>
		</author>
		<ptr target="https://doaj.org/article/13c5c77f151d48ca91c628a37af70b3c" />
	</analytic>
	<monogr>
		<title level="j">Informatică economică</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page" from="151" to="159" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Pidkhid do zabezpechennia zakhystu korporatyvnykh informatsiinykh system v budivnytstvi</title>
		<author>
			<persName><forename type="middle">I</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">V</forename><surname>Khlaponin</surname></persName>
		</author>
		<author>
			<persName><surname>Izmailova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Upravlinnia rozvytkom skladnykh system</title>
		<imprint>
			<biblScope unit="volume">31</biblScope>
			<biblScope unit="page" from="126" to="131" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<author>
			<persName><forename type="first">Y</forename><surname>Khlaponin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Rudnitska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kondakova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kondakova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Ternavska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Vasiliu</surname></persName>
		</author>
		<ptr target="CEUR-WS.org,onlineCEUR-WS.ORG/Vol-2588/paper17.pdf" />
		<title level="m">The employer and employee reputation, in: the Ukrainian cyberspace and social internet-services</title>
				<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Prototyping of intellectual decision support system for organizational and technological trainings in construction</title>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">V</forename><surname>Krasovska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Izmailova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">K</forename><surname>Krasovska</surname></persName>
		</author>
		<ptr target="http://journals.uran.ua/eejet/article/view/3881/3557" />
	</analytic>
	<monogr>
		<title level="m">XII International scientific and practical conference</title>
				<imprint>
			<date type="published" when="2015">2015/2016</date>
			<biblScope unit="page" from="101" to="105" />
		</imprint>
	</monogr>
	<note>Areas of scientific thought</note>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Pidhid do pobudovy vidkrytoi&apos; bazy modelej SPPR po ocinci investycijnyh proektiv tehnogennoi&apos; bezpeky</title>
		<author>
			<persName><forename type="first">O</forename><surname>Izmailova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">V</forename><surname>Krasovska</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">rozvytkom skladnyh system</title>
		<imprint>
			<biblScope unit="volume">33</biblScope>
			<biblScope unit="page" from="118" to="124" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">T</forename><surname>Saati</surname></persName>
		</author>
		<author>
			<persName><surname>Prinjatie Reshenij</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Metod Analiza Ierarhij</surname></persName>
		</author>
		<author>
			<persName><surname>Radio I Svjaz</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1993">1993</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Applying AHP in Evaluation of Vietnamese Commercial Banks Applying AHP in Evaluation of Vietnamese Commercial Banks</title>
		<author>
			<persName><forename type="first">T. -T</forename><surname>Tran</surname></persName>
		</author>
		<ptr target="https://doaj.org/article/97e7d7788e814d4dbf419c6ff1657cf5" />
	</analytic>
	<monogr>
		<title level="j">International Journal of Analysis and Applications</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="page" from="132" to="166" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Application of Multi-Objective Optimization on the Basis of Ratio Analysis (MOORA) Method for Bank Branch Location Selection</title>
		<author>
			<persName><forename type="first">A</forename><surname>Gorener</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Dinçer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ü</forename><surname>Hacıoğlu</surname></persName>
		</author>
		<ptr target="https://doaj.org/article/3e467f7f09974abcae33d4c21be59d22" />
	</analytic>
	<monogr>
		<title level="j">International Journal of Finance&amp; Banking Studies</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="41" to="52" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Pidhid do pobudovy scenariju rozv&apos;jazannja zadachi pidtrymky pryjnjattja rishen&apos; po ocinci zhytlovyh ob&apos;jektiv neruhomosti</title>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">V</forename><surname>Izmailova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">V</forename><surname>Krasovska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Krasovska</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Upravlinnja rozvytkom skladnyh system</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="page" from="86" to="95" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Strategyja tehnologycheskogo predvydenyja v ynnovacyonnoj dejatel&apos;nosty</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">Z</forename><surname>Zgurovskyj</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">D</forename><surname>Pankratova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Systemni doslidzhennja ta informacijni tehnologii</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="7" to="24" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
