<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>October</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Machine-Learning-Based Model for Indicators of the Resource-Based Security of Interests in High-Level Organizational Systems⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Sergiy Skybyk</string-name>
          <email>sskybyk@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anatoliy Doroshenko</string-name>
          <email>doroshenkoanatoliy2@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olena Ilyina</string-name>
          <email>ilyina.elena1@ukr.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Igor Sinitsyn</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Software Systems NAS of Ukraine</institution>
          ,
          <addr-line>Glushkov 40, 03187 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”</institution>
          ,
          <addr-line>Beresteiskyi 37, 03056 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>01</volume>
      <issue>2025</issue>
      <abstract>
        <p>Reliable situational awareness of resource sufficiency is vital for macro-level organizational systems that face deep uncertainty, multi-level decision chains and tight resource constraints. We present an end-to-end framework for a Composite Multi-functional System of Resource-based Security Indicators (RSI) that supports strategic and operational decisions in Multidimensional Management (MDM); the defense domain was considered as its notable representative. At the conceptual layer we formalize the management domain by a twolevel network of decision centers governed by Reference Concepts of Management (RCM). Each RCM represents either a strategic goal, a strategic capability, a crisis management task, or an activity ledger. For each RCM we derive individual indicators of performance well-being and resource well-being. Predicate relations between RCM types enable both direct and indirect (integrated or statistically inferred) estimates. Four functional indicators: express resource-risk diagnosis, vulnerability ranking, external-impact criticality and strategic-adaptation diagnosis - are produced by tailored aggregations of individual indicators and context data. We detail the machine-learning pipeline for the first, time-critical function. A heterogeneous ensemble of five classifiers (Bayes, SVM, Random Forest, kNN, Logistic Regression) is trained on historic ledgers and expert audits. To account for the NFL theorem, each classifier is weighted by a model-conformity coefficient (reflects data assumption violations) and by a quality index robust to class imbalance. Forecasting supports a single priority model or a weighted-voting ensemble. Future work will deliver prototypes, quantitative validation, N-ary classification and hybrid time-series forecasting, extending RSI support for high-stakes organizational decisions.</p>
      </abstract>
      <kwd-group>
        <kwd>Machine-learning classification</kwd>
        <kwd>Resource-based security metrics</kwd>
        <kwd>weighted voting ensemble</kwd>
        <kwd>trategic decision support</kwd>
        <kwd>KPI monitoring 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Problem Statement</title>
      <p>An integrated presentation of information on the current state of objects and processes — tailored to
the needs of decision-makers — is a key element of digital governance. At higher managerial tiers
within large-scale Organizational systems (OS) and, especially, national and international projects,
this requirement is commonly satisfied by indicator frameworks.</p>
      <p>Numerous, largely complementary definitions of an indicator [1–3] describe it as a quantitative
measure derived from a series of observed facts that characterizes the position of an object within a
given domain, including its state of sufficiency or deficiency. Indicators are employed across many
domains and serve diverse analytical purposes. For example, the widely used set of international
indices of countries’ economic and political development [4] aggregates a large number of regularly
documented variables, enabling progress tracking, identification of leverage points, and early
diagnostics or forecasting.</p>
      <p>Indicators for complex systems are typically composite [1, 5, 6]. Their constituent indicators often
form a hierarchy in which successive levels refine specific properties, while the composite value is
obtained by aggregating constituent scores with weighting coefficients [6]. In high-risk Problem areas
(PAs), indicator structures become even more intricate [5, 7]; within the PA of national security, for
instance, a composite indicator has been proposed that measures the system’s response to deviations
from a homeostatic state once critical thresholds of individual components are exceeded [8].</p>
      <p>Experience in social-welfare analysis shows the advantages of a composite-indicator system that
combines not only various sub-domains but also metrics that differ in their management roles: social
context (conditions), social status (desired outcomes), and social responsibility (interventions).
Indicators of social well-being likewise integrate characteristics reflecting distinct sufficiency perspectives
embedded in alternative definitions of quality of life [9].</p>
      <p>A prominent subclass of indicators in management is Key Performance Indicators (KPIs). KPIs are
commonly categorized into:
• high-level and low-level KPIs, linked hierarchically, and
• lagging (performance-outcome) and leading (operational) KPIs, where the latter guide actions
aimed at improving the former [10].</p>
      <p>In decision support, an indicator serves a wide range of analytical needs. Typical examples include
comparing different objects — or the same object at different points in time — identifying bottlenecks
in development processes, and diagnosing whether the current state of the system is acceptable or
satisfactory.</p>
      <p>The current indicator value becomes a decision criterion when its deviation from threshold levels
(ideal, required, critical, etc.) or from baseline values associated with benchmark objects or situations
exceeds a specified limit. Such trigger values may be defined on the basis of (i) aggregated direct
observations of the indicator’s components or (ii) forecast- and classification-based estimates.</p>
      <p>A number of pressing challenges in indicator design and use arise when supporting decisions that
concern the resource-based security of interests in the management of Organizational systems (OS)
and in projects of national or international scale. Such decisions are tightly linked to limited — and
often unstable — resource inflows, as well as to specialized resource categories whose availability
depends on external interactions and innovation aimed at creating the necessary resource base [11].</p>
      <p>The most demanding requirements for relevant and effective indicators of resource-based security
of interests (RSIs) are set by OS whose Problem area (PA) exhibits the following properties:
• coexistence of distributed interest-security mechanisms with hierarchical operational control;
• planning under uncertainty (including deep uncertainty);
• simultaneous evaluation of the resource state with respect to both planned and crisis
management capabilities and to norms of routine activities.</p>
      <p>These complexities stem, on the one hand, from the OS structure — whose organizational elements
retain their own internal management mechanisms — and, on the other hand, from a highly dynamic
environment that demands flexible interaction in the face of new threats and opportunities affecting
the OS’s strategic interests.</p>
      <p>A characteristic representative of this PA multidimensional management class, hereafter denoted
MDM, is activity in the military domain of national security. Developing adequate RSIs for decision
support in MDM faces further specifics:
• two distinct tiers of interest security — a global decision center and an internal hierarchy of
implementation centers;
• multi-faceted (goal-oriented) and multi-criteria (performance-oriented) interest systems held
by stakeholders in the decision centers, which engage in diverse management interactions;
• high uncertainty of both current and future decision contexts, driven by interdependencies
with other PAs, environmental volatility, and shifting internal priorities;
• the PA still lacks any a priori PA-specific model that formally relates interest-attainment KPIs
to resource-availability indicators, even though empirical evidence leaves no doubt that this
relationship is substantial.</p>
      <p>Building on the above requirements and current trends in indicator design, we posit that effective
resource-based security indicators (RSIs) must satisfy three design principles:
• Compositeness – each RSI should integrate components that are relevant to the different
interest systems operating within the OS;
• Informational sufficiency – the model must rely solely on data that can be extracted from
the OS business-process information environment, ensuring practical deployability;
• Adaptivity – the model should detect triggers in the current OS state that call for method
selection and parameter adjustment, and respond accordingly.</p>
      <p>A promising paradigm for constructing an RSI model is to treat resource situations as a
classification problem and apply machine-learning methodology [12]. This choice offers the following
advantages:
• the model is learned from documented operational history rather than from a priori theoretical</p>
      <p>PA knowledge;
• classes are defined by the stakeholder-accepted gradations of interest well-being that are
already employed in expert decision making;
• the same information space — routine resource monitoring, post-operation assessments, and
scheduled expert audits — supports parallel evaluation of resource favourability from multiple
decision-center viewpoints;
• the RSI remains adaptive through incremental retraining and robust through dynamic
selection and tuning of methods according to the statistical properties of observed resource states.</p>
      <p>
        The study therefore aims to create conceptual knowledge models for the MDM PA that enable RSI
construction with the above properties and to embed them in a composite, multi-functional indicator
system for PA state assessment. Within that system the machine-learning RSI is developed to provide
express diagnosis of resource risk to strategic interests.
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
      </p>
      <sec id="sec-1-1">
        <title>2. Conceptual Model of Domain Si within the MDM Problem Area</title>
        <sec id="sec-1-1-1">
          <title>The conceptual model is organized in two levels</title>
          <p>{Lk} k =1,2
where L1 – management of interest security;
L2 – management of internal activities that support those interests.</p>
          <p>Each level is specified by a structural-and-functional model:</p>
          <p>SFMk = (DCk , ВСk , MBk , IBk , RCMk , ERCMk)
where DC – decision centers (DCs);
BC – advisory and situational communications that support distributed decision making;
MB – hierarchical management links;
IB – regulatory information links;
RCM – types of reference concepts of management;</p>
          <p>ERCM – reference concepts of management.</p>
          <p>Decision-center model</p>
          <p>
            Every DC denoted dckl ∈ DCk (see (
            <xref ref-type="bibr" rid="ref2">2</xref>
            )) is described by
          </p>
          <p>Mdckl =(T, RT, A, SUB, {(MI, idc, ircm)}, hrcm)
where T – functional type;
RT – role type;
A – set of activity types;
SUB ∈ ERCM – closest higher-level DC;
MI – management impact on another center idc by means of the impact concept ircm ∈ ERCM;
hrcm ∈ ERCM – concept that represents OS interests in domain Si for this DC.</p>
          <p>The scheme supports the coexistence of hierarchical cascading [13], distributed [14] and
deliberative [15] decision processes, and allows combining agile strategic planning [16] with capability-based
planning [17].</p>
          <p>
            Within each structural-and-functional model SFMk in (
            <xref ref-type="bibr" rid="ref2">2</xref>
            ) the set ERCMk captures the reference
concepts of management. An individual concept rcm ∈ ERCM:
• formalizes a specific aspect of OS stakeholder interests,
• serves as the basic object of activity for a decision center of the corresponding functional type
          </p>
          <p>
            T in model (
            <xref ref-type="bibr" rid="ref3">3</xref>
            ),
• provides the information schema used to monitor domain Si, and
• acts, depending on the DC level, either as a planning target at L1 (strategic tier) or as the
operationalized output of strategy at L2 (operational tier).
          </p>
          <p>
            Thus, ERCMk links the decision-center model Mdckl in (
            <xref ref-type="bibr" rid="ref3">3</xref>
            ) to the higher -level structure of SFMk in
(
            <xref ref-type="bibr" rid="ref2">2</xref>
            ), supplying the conceptual “glue” that harmonizes hierarchical, distributed and deliberative decision
processes.
          </p>
          <p>RCM element types
1. Strategic goal
where GO – target object;
К – number of objects;
GC – condition for desired state;
MG – progress metric.
2.</p>
          <p>Strategic capability</p>
          <p>
            CAPi=(MTi, MCi,OCi,{RESik ,NRik }k=1,K),MCAPi,SSGi) (
            <xref ref-type="bibr" rid="ref5">5</xref>
            )
where MT – task whose execution capability is evaluated;
MC – execution conditions;
OC – set of key DCs to which the capability is delegated (see model (
            <xref ref-type="bibr" rid="ref3">3</xref>
            ));
          </p>
          <p>
            RESk, NRk – resource type and norm (number of resource types K in (
            <xref ref-type="bibr" rid="ref5">5</xref>
            ) depends on the chosen
resource model [17]);
          </p>
          <p>MCAP – metric that evaluates the current level at which the CAP is being realized by the task
performers;</p>
          <p>SSG ⊆ {SGi} – subset of strategic goals that can be achieved through this CAP.</p>
          <p>
            SGi =({GOik}k=1,…,K , GC i, MGi)
(
            <xref ref-type="bibr" rid="ref4">4</xref>
            )
          </p>
          <p>Crisis management task
where PS – problem situation;
TCAP – capabilities to be employed;
PT ∈ DC – performer DCs;
TR – operational resource plan;
TF – deadline;
ET – performance evaluations.</p>
          <p>TAi =(PSi, TCAPi, PTi, TRi, TFi, ETi)</p>
          <p>Activity ledger for an L2 DC</p>
          <p>DCATi =(DCTi{(CTAik ,Rik, RSik)}k=1,…,3)
where DCT – set of delegated capabilities;
CTA – activity category: 1 - routine, 2 - capability support, 3 - crisis;
R – performance rating;
RS – resource support of the activity.</p>
          <p>RSikl={TRSikl , NRSikl, MRSikl}l=1,…,L
where TRS – resource type;
NRS – norm or plan;
MRS – current supply level;
L – number of resource types.</p>
          <p>Below in Table 1 we specify, for every DC type and level, its functional role, activity portfolio,
managerial impacts, and the reference concept of management (RCM) that represents the center’s
interests (strategic goal, capability, crisis-management task, etc.). This structure captures both
hierarchical and distributed management schemes, records resource- and information flows among centers,
and links the realization of the strategic interests of Si to ongoing operational activity at level L2.</p>
          <p>
            This table enables precise mapping of resources, activities, and interests across both levels of the
OS while supporting agile integration of hierarchical and distributed decision-making processes.
(
            <xref ref-type="bibr" rid="ref6">6</xref>
            )
(
            <xref ref-type="bibr" rid="ref7">7</xref>
            )
(
            <xref ref-type="bibr" rid="ref8">8</xref>
            )
          </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>3. Composite Multi-Functional Indicator System for the PA</title>
      <p>To provide expert-analytic support for decision making in the Organizational system (OS) described
in the previous section, we introduce an Indicator System for Interest Well-Being (SI) that follows
three design principles drawn from modern composite-indicator research (see Sect. 1):
1. Each constituent indicator must quantify the well-being level of a specific reference
concept of management (RCM), which serves as the constructive representation of an interest.
2. Multiple decision-support functions imply that constituent indicators must be
compositely integrated into several resulting indicators, each oriented toward a distinct function.
3. Inter-interest dependencies — expressed through relevance relations REL(tk1, tk2) among
RCM types tk1, tk2 — govern whether an RCM of one type can influence, or supply data to, an
RCM of another type.</p>
      <p>
        Using the RCM models defined in (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) –(
        <xref ref-type="bibr" rid="ref8">8</xref>
        ) we formalize relation predicate REL(Or, Os). These
relations determine whether an RCM of one type can influence an RCM of another type or serve as an
information source for integration. An RCM of a given type is referred to by the identifier introduced
in (
        <xref ref-type="bibr" rid="ref4">4</xref>
        )–(
        <xref ref-type="bibr" rid="ref8">8</xref>
        ), and an element A of the model of the s-th concept is denoted As.
      </p>
      <p>
        REL(SGr, CAPs) ⇔ SGr ∈ SSGs (
        <xref ref-type="bibr" rid="ref9">9</xref>
        )
REL(TAr, CAPs) ⇔ CAPs ∈ TCAPr (
        <xref ref-type="bibr" rid="ref10">10</xref>
        )
REL(DCATr, TAs) ⇔ DCATr ∈ PTs (
        <xref ref-type="bibr" rid="ref11">11</xref>
        )
      </p>
      <p>
        REL(SGr, TAs) ⇔ SGr ∈ PSs (
        <xref ref-type="bibr" rid="ref12">12</xref>
        )
REL(SGr, DCATs) ⇔ (∃ TAk : REL(DCATs, TAk) ∧ REL(SGr,TAk) (
        <xref ref-type="bibr" rid="ref13">13</xref>
        )
      </p>
      <p>
        REL(CAPr, DCATs) ⇔ CAPr ∈ DCs (
        <xref ref-type="bibr" rid="ref14">14</xref>
        )
      </p>
      <p>
        Model (
        <xref ref-type="bibr" rid="ref16">16</xref>
        ) interprets the attained performance well-being as the degree to which stakeholder needs
are satisfied, using expert ratings on a verbal–numeric scale [18] that matches their business practice.
Thus
      </p>
      <p>
        EWBR(oc,t) = FIA(ER1, ER2, ER3) (
        <xref ref-type="bibr" rid="ref17">17</xref>
        )
is the direct estimate of the performance-aspect well-being of the interest represented by RCM oc.
Interest well-being in the performance aspect: indirect estimates
      </p>
      <p>
        An alternative to the direct score (
        <xref ref-type="bibr" rid="ref17">17</xref>
        ) is a pair of indirect estimate sets
      </p>
      <p>
        ({EMRI}, {EMRS})
where EMRI – integration-based estimates;
EMRS – statistically derived estimates.
(
        <xref ref-type="bibr" rid="ref18">18</xref>
        )
(
        <xref ref-type="bibr" rid="ref20">20</xref>
        )
      </p>
      <p>The integration estimate EMRIk(oc,t) is obtained by aggregating the direct scores EWBR of all RCMs
of the k-th type that are relevant to oc but differ from its own type TK.</p>
      <p>
        EMRIk(oc,t) = FIMRk({EWBR(rckj,t)}j=1...J) (
        <xref ref-type="bibr" rid="ref19">19</xref>
        )
where ∀ j ∈ (1,…,J) REL(oc, rckj);
FIMR – denotes the score-integration function.
      </p>
      <p>Statistically derived estimates are built on a mass-observation array that records (i) the states of
every RCM in the OS and (ii) the behaviorof the external environment. The procedure constructs and
applies machine-learning models that capture the relationship between performance well-being of a
given target interest and the resource-support well-being that is observed or inferred for other RCMs
— either formally relevant to the target or hypothetically exerting an influence on it.</p>
      <p>We formalize this data as an observation array MAOBS(TT), which spans the entire observation
period TT = (TT1, TT2).</p>
      <p>First, we introduce several special time sub-intervals inside the overall window TT:
• T1 – the constant span between the j-th and (j + 1)-st scheduled audits of strategic-level RCMs
(SG and CAP). The concrete instance of this span is denoted (TT1j1, TT1j2) ⊂ TT;
• {{T2ij}i=1,…N}j=1,…M – the set of durations of those crisis-management tasks taij, that are carried
out within the interval (TT1j1, TT1j2);
• T3 – the regulatory update period for each activity ledger DCAT its j-th occurrence is the
interval (TT3j1, TT3j2).</p>
      <p>With these notations the observation array is expressed as</p>
      <p>MAOBS(TT) = ({EWBRjk(SOk,TT1kj1)}k=1,K}j=1...J1, {{EWBRjl(OTAl,TT2lj1)}l=1...L}j=1...J2,
{EWBRjm(DCATm,TT3mj1)}m=1...M}j=1...J3, {EWBSjk(SOk,TT3kj1)}k=1...K}j=1...J3,</p>
      <p>{{EWBSjl(OTAl,TT2lj1)}l=1...L}j=1...J2,
{EWBSjm(DCATm,TT3mj1)}m=1...M}j=1...J3, {{Rjr}r=1...NF}j=1...J1)
where EWBR – direct performance-aspect well-being score;
EWBS – resource-support well-being score;
SOk – strategic-level RCM;
OTAl – crisis-management task;
DCATm – activity ledger of the m-th L2 decision center;
J1 – number of audits;
J2 – number of crisis tasks executed;
J3 – number of DCAT content updates.</p>
      <p>As an observation element for external-environment factors in the MAOBS model, we include the
risk produced by the r-th external factor {Fr}r=1…N during the interval (TT1j1, TT1j2). This risk is evaluated
by</p>
      <p>
        Rjr = (Lri/Tj)∙Prj (
        <xref ref-type="bibr" rid="ref21">21</xref>
        )
where Lrі – duration of the action caused by Fr within the i-th audit interval;
Prj – estimate of the factor’s intensity in that interval.
      </p>
      <p>
        The statistically derived estimate EMRS (see (
        <xref ref-type="bibr" rid="ref18">18</xref>
        )) uses the elements of (
        <xref ref-type="bibr" rid="ref20">20</xref>
        ) as input data and is
specified as
      </p>
      <p>
        MEMRS(oc,t) = (MF, MT, {MMLj}j=1…J, {CRr}r=1…N, FIE)
where MF – feature model;
MT – target-variable model;
{MMLj} – set of machine-learning models employed;
CR – statistical criterion used to assess the quality of the results produced by the chosen MML;
FIE – function that integrates the individual model outputs.
(
        <xref ref-type="bibr" rid="ref22">22</xref>
        )
MF = {Fi, {SOij}j=1…Ji, CO(t), {SCik}k=1...Ki}i=1…N
(
        <xref ref-type="bibr" rid="ref23">23</xref>
        )
where Fi – feature;
      </p>
      <p>
        SOij ∈ MAOBS (see (
        <xref ref-type="bibr" rid="ref20">20</xref>
        )) – an observation-array element that can serve as a source for the feature
value;
      </p>
      <p>
        CO(t) – a predicate that specifies how SOij values are selected in time, depending on the position of
moment t relative to the baseline time-intervals defined in (
        <xref ref-type="bibr" rid="ref20">20</xref>
        );
      </p>
      <p>SCik – admissible scales for feature;
N – total number of features.</p>
      <p>Target-variable model can be defined as</p>
      <p>
        MT = (TV, {SOTi}i=1…M,{SYN(t, Fi)}i=1…N, {SCTj}j=1…J) (
        <xref ref-type="bibr" rid="ref24">24</xref>
        )
where TV – target variable;
      </p>
      <p>SOTi – an element of the observation array that corresponds to the EWBR evaluations of the RCM
representing the target interest;</p>
      <p>SYN(t, Fi) – rule for time-synchronizing the target and feature observations;
SCTj – the j-th candidate scale applicable to the values of the target variable.</p>
      <p>Constructing an EMRS-class well-being estimate allows the system to handle the following sources
of uncertainty:
• the evaluation moment t lies inside an audit interval that has not yet been completed;
• one or more scheduled audits were skipped in several preceding planning intervals;
• the direct score EWBR(oc,t) conflicts with the integration-based score EMRIk(oc,t) determined
for t=TT1j1 or t=TT1j2.</p>
      <p>Interest well-being in the resource-support aspect: evaluation</p>
      <p>
        The resource-support aspect in (
        <xref ref-type="bibr" rid="ref15">15</xref>
        ) treats well-being as the closeness of the actually available
amount of a given resource at time t to its normative (planned) level.
      </p>
      <p>Direct evaluation is made only for Activity-ledger RCMs, (TK=DCAT).</p>
      <p>
        In this case (see (
        <xref ref-type="bibr" rid="ref8">8</xref>
        ))
      </p>
      <p>EWBS(oc,t)=FIA(ES1,ES2,ES3)
where FIA – is the integration function for the category-specific scores ES.</p>
      <p>
        ESi=FIS({(NRSij-CRSij)/NRSij}j=1…J) (
        <xref ref-type="bibr" rid="ref26">26</xref>
        )
where NRSij, CRSij – are, respectively, the normative and current resource supply;
FIS – integrates the adequacy levels across the J resource types.
      </p>
      <p>For any TK≠DCAT the resource well-being of oc is obtained by integrating the direct scores of all
relevant ledgers:</p>
      <p>
        EMWBSi(oc,t)=FIMS({EWBS(ork)}k=1…K)
where each ork – is a DCAT type RCM such that REL(oc,ork) holds (cf.(
        <xref ref-type="bibr" rid="ref9">9</xref>
        )-(
        <xref ref-type="bibr" rid="ref14">14</xref>
        ));
FIMS – the integration function over the K corresponding activity-ledger scores.
(
        <xref ref-type="bibr" rid="ref25">25</xref>
        )
(
        <xref ref-type="bibr" rid="ref27">27</xref>
        )
Structure and composition of the indicator system
      </p>
      <p>Building a composite, multifunctional Indicator System for Interest Well-Being (SI) for an
Organizational System (OS) operating in an MDM problem area rests on the constructive combination of:
•
individual indicators IC , each describing the state of a single interest (these are the
constituent indicators of the composite model discussed in Sect. 1);
• several composite functional indicators ICF that characterize the entire interest system
and are defined as specific compositions of the individual indicators.</p>
      <p>An individual indicator ICi(SOj,t)} represents the state of an RSM SOj according to evaluation type
i — direct (eqs. 17, 25) or integration-based (eqs. 19, 27).</p>
      <p>Hence the overall indicator system is</p>
      <p>SI(t)=({ICi(SOj,t)}j=1,…,N}i=1,…,M, {ICFk}k=1,…4)
where ICi – individual indicator for RCM SOj under evaluation type i;
ICFk – one of the four basic composite functional indicators.</p>
      <p>The core decision-support functions relevant to the PA activity model described in Sect. 2 comprise
the following:
1. Rapid diagnosis of problematic situations;
2. Compilation of a vulnerability ranking;
3. Identification of threatening external factors and their potential targets within the PA;
4. Assessment of current strategy elements for consistency with up-to-date needs.</p>
      <p>For direction k the functional indicator IFk may rely on individual indicators and additional data.
Formally, its model can be represented as</p>
      <p>MICFk(t)=(BICk(t), ADk, PROCk(BICk,ADk),Rk)
where BICk(t) ⊆ {{ICi(SOj,t)}j=1,…,N}i=1,…,M — the subset of individual indicators used;</p>
      <p>
        ADk – additional information, including formalized knowledge about relationships between PA
elements or observations not captured by any IC but present in dataset (
        <xref ref-type="bibr" rid="ref20">20</xref>
        );
      </p>
      <p>
        PROCk – the procedure that calculates the indicator values;
Rk – the output vector (with defined scales) intended for use in decision making.
(
        <xref ref-type="bibr" rid="ref28">28</xref>
        )
(
        <xref ref-type="bibr" rid="ref29">29</xref>
        )
In Table 2, four functional indicators are described in accordance with structure (
        <xref ref-type="bibr" rid="ref29">29</xref>
        ).
      </p>
      <p>
        The functional indicator Express diagnosis of resource risk to strategic interests — detailed in the next
section — returns as its output an indirect performance well-being estimate of the given RCM so at
time t, computed in the EMRS class (see (
        <xref ref-type="bibr" rid="ref22">22</xref>
        )).
      </p>
      <p>
        The elements of its model (
        <xref ref-type="bibr" rid="ref22">22</xref>
        ) are specified below.
      </p>
      <p>
        Feature model MF (cf. (
        <xref ref-type="bibr" rid="ref23">23</xref>
        )) comprises:
• features Fi, each is, as an element of MAOBS (
        <xref ref-type="bibr" rid="ref20">20</xref>
        ), the direct resource-support well-being score
EWBS(rso,to) drawn from the DC’s Activity ledger of the operational-level rso and fixed for a
particular activity category and resource type;
• predicate CO(t) selecting EWBS(rso,to) values under the condition
      </p>
      <p>
        REL(so,rso) ∧ (to ∈ (TT1,t)) (
        <xref ref-type="bibr" rid="ref30">30</xref>
        )
      </p>
      <p>
        Within MF the candidate scales SC include both (i) the standard continuous scale for EWBS on (
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        )
and (ii) a scale of absolute resource quantities, the latter being used when the adopted normative
values are deemed unreliable.
      </p>
      <p>
        The target-variable model MT (
        <xref ref-type="bibr" rid="ref24">24</xref>
        ) permits only a binary scale, enabling indicator construction
even when expert assessments are produced under deep uncertainty [20].
      </p>
      <p>
        The temporal synchronization condition SYN for aligning target values TV with feature
observations Fi in (
        <xref ref-type="bibr" rid="ref24">24</xref>
        ) is
      </p>
      <p>
        ∀(tok ∈ (TT1j1, TT1j2)) TV(so,tok)=TV(so,TT1j2) (
        <xref ref-type="bibr" rid="ref31">31</xref>
        )
      </p>
      <p>Thus, every target-variable observation whose feature values fall within the window ending at
moment is assigned the direct performance well-being score produced by experts at the close of the
corresponding well-being audit of so.</p>
      <p>
        The procedure PROC specified in (
        <xref ref-type="bibr" rid="ref29">29</xref>
        ) for this indicator is presented in Section 4.
4. Construction of the Express Diagnosis of Resource Risk to Strategic
      </p>
      <sec id="sec-2-1">
        <title>Interests Indicator</title>
        <p>This section presents the algorithm used to build and to forecast the resource-based security state of
strategic goals. The task is solved with binary-classification models. The workflow comprises two
major phases: model building (training) and forecasting.
4.1 Model-building (training) phase
Step 1. Preparation of the training set</p>
        <p>
          A. Period selection and data synchronization
The training set is formed according to the feature model (
          <xref ref-type="bibr" rid="ref23">23</xref>
          ). Each input feature Fi is a numerical
score of resource support EWBS for the corresponding Decision Center (DC) over the interval between
two scheduled audits of the strategic goal. The predicate CO(t) aligns the time-stamp of EWBS with
the moment of the expert performance well-being score ESG(Ta), which serves as the binary target
variable (1 = satisfactory, 0 = unsatisfactory).
        </p>
        <p>
          Every feature Fi can be represented in several alternative scales SCi. For resource indicators we
employ at least two:
• normalized EWBS ∈ (
          <xref ref-type="bibr" rid="ref1">0,1</xref>
          );
• absolute resource quantity.
        </p>
        <p>When required, the normalized EWBS may be discretized into categorical levels; this eases expert
interpretation and broadens the family of machine-learning models that can be applied. The absolute
scale is preferable when the planned norms are considered potentially outdated, so that comparing
against the raw values is more reliable. Maintaining several scales SCi increases model flexibility and
ensures proper comparison of resource metrics under heterogeneous conditions.</p>
        <p>B. Exploratory data analysis
a) Sample size and completeness
The dataset is examined for sufficiency with respect to the requirements of the intended model
families. Missing values are handled either by deletion or by an appropriate imputation strategy, chosen
after assessing both feasibility and impact on data integrity.</p>
        <p>b) Distributional form and feature independence
For every variable we test compliance with theoretical distributions assumed later in the pipeline (e.g.,
normal, log-normal) and identify pairs of highly correlated features. Whenever the detected
correlation exceeds an admissible threshold, the offending features are either decorrelated (by
transformation) or removed.</p>
        <p>c) Balance of the target variable
The ratio of satisfactory to unsatisfactory cases for ESG(Ta) is computed. If a pronounced skew is
observed, the training set is rebalanced through oversampling/undersampling or by using class-weighted
loss functions to prevent majority-class bias. Because most machine-learning algorithms are sensitive
to imbalance, subsequent classification-quality metrics are calculated in a way so that unequal class
distributions are properly reflected.</p>
        <p>Step 2. Training the full set of candidate classifiers and generating base
classifications
Because no single learning algorithm is universally optimal (the No-Free-Lunch theorem (NFL) [21])
the indicator is built on a heterogeneous ensemble of learners. Candidate models were selected from
the families surveyed in [22] according to four criteria:
• representation of the main classification paradigms (statistical, geometric and logical);
• compatibility between the algorithm’s data-volume requirements and the size of the available
resource dataset;
• documented evidence of successful practical use;
• availability of efficient software implementations.</p>
        <p>The resulting set PC = { MCi } comprises five classifiers: Bayesian classifier, Support-Vector
Machines (SVM), Random Forests, k-Nearest-Neighbours (kNN) and Logistic Regression.</p>
        <p>For every classifier MCi ∈ PC an expert characterization of the criticality of four data requirements
was compiled from an extensive literature review [12, 23–53]:</p>
        <p>
          KDi = {kdij}j=1,…,4
(
          <xref ref-type="bibr" rid="ref32">32</xref>
          )
where j = 1 – feature-distribution;
j = 2 – feature independence;
j = 3 – observation data balance;
j = 4 – measurement scale.
        </p>
        <p>Each requirement is graded on a three-level expert scale ekdij ∈ {0, 0.5, 1}, where 0 – no requirement,
0.5 – violations admissible, 1 – requirement critical. Table 3 summarizes the resulting scores and
provides the supporting rationale. For every criterion j, four argumentation aspects Aaj are documented
(with a = 1,2,3,4): 1 – existence of a primary limitation; 2 – available robustness techniques; 3 –
availability of software implementing these techniques; 4 – potential risks associated with their application.</p>
        <sec id="sec-2-1-1">
          <title>Measurement scale Aa4</title>
          <p>The argumentative ratings presented in Table 3 enable subsequent steps of the algorithm to deploy
each classifier within an adaptive ensemble model that reflects the problem area’s specific
characteristics across the four assessed dimensions. These ratings support (i) the use of the indicator ensemble
when the statistical properties of incoming data are still uncertain, and (ii) timely detection of the need
0
None</p>
          <p>None
Not required Random feature sampling at
splits mitigates correlation
impact
R packages randomForest, ranger, randomForestSRC, imbalanced
None None Possible loss of
discrimina</p>
          <p>tive power
k-Nearest Neighbours (kNN)
0 0.5 0.5
None Feature dependencies distort Bias toward the majority</p>
          <p>distance-based results class
Not required Dimensionality reduction Class weights, resampling</p>
          <p>(PCA, t-SNE) techniques
R packages caret, ROSE, DMwR, kknn
Minimal Potential loss of
discriminative power</p>
          <p>Logistic Regression
0 0.5 0.5
None; non-normality can Multicollinearity among pre- Bias toward the majority
weaken reliability dictors class
Transformations (logs, roots) Remove correlated features, Class weights, resampling
to handle outliers PCA, L1/L2 regularization
Base R stats::glm(); package caret
Minimal Possible loss of
discriminative power</p>
          <p>Possible loss of
discriminative power
0</p>
          <p>Random Forest</p>
          <p>0.5
Bias toward the majority
class
Class weights, resampling</p>
          <p>None
Not required
None
0
0.5
Distance metric is
scale-sensitive
Normalization,
standardization
0.5
Requires correct encoding of
categorical variables
fect coding, ordinal encoding
Incorrect encoding may
reduce accuracy
for retraining — triggered when the current weight coefficients assigned to the ensemble’s classifiers
deviate significantly from those learned earlier.</p>
          <p>Step 3. Computing the trust degree of classifier
For every classifier i a model-data conformity coefficient KDRi is calculated</p>
          <p>
            KDRi = 1
4
4
 =1
   ⋅   
where IVij ∈{0,1} — Incidence Variable denoting whether requirement j is violated (
            <xref ref-type="bibr" rid="ref1">1</xref>
            ) or not (0) for
the current data set.
for the given data.
          </p>
          <p>A larger KDRi signals more severe violations of the classifier’s underlying assumptions and
therefore lower suitability. Conversely, the value (1− KDRi) is interpreted as the trust degree of classifier i
Step 4. Integral classification-quality assessment
For every classifier an aggregated quality score KQi is computed. It combines several metrics that are
robust to class-imbalance — Cohen’s Kappa, F1-score and MCC. A higher KQi indicates that the model
reproduces the true state labels more accurately and consistently, even when the class distribution is
highly skewed.</p>
          <p>Step 5. Weighted voting</p>
        </sec>
        <sec id="sec-2-1-2">
          <title>For every classifier an aggregated quality score</title>
          <p>CMR = ⟨
 , 
  ,</p>
          <p>5
 ⟩ =1
where i — indexes the five base classifiers in the pool PC;</p>
          <p>∈{0,1} — is the class label returned by the i-th classifier at Step 2.</p>
          <p>The CMR array is partitioned into two subsets according to the class predicted by each model
A weighted evidence index is then calculated for each subset:</p>
          <p>
            SP = {CMRi | RCi = 1}, SN = {CMRi | RCi = 0}, SP ∪ SN = CMR
where IP corresponds to the positive class (
            <xref ref-type="bibr" rid="ref1">1</xref>
            ) and IN to the negative class (0);
∣CMR∣ — is the total number of classifiers that cast a vote.
          </p>
          <p>
            IP =
IN =
|
|
1
1
| | = |1(1 −    ) ∙   , CMRi ∈ 
∑
| ∑| = 1|(1 −    ) ∙ 
 , CMRi ∈ 
 
bility.
(
            <xref ref-type="bibr" rid="ref33">33</xref>
            )
(
            <xref ref-type="bibr" rid="ref34">34</xref>
            )
(
            <xref ref-type="bibr" rid="ref35">35</xref>
            )
(
            <xref ref-type="bibr" rid="ref36">36</xref>
            )
(
            <xref ref-type="bibr" rid="ref37">37</xref>
            )
(
            <xref ref-type="bibr" rid="ref38">38</xref>
            )
(
            <xref ref-type="bibr" rid="ref39">39</xref>
            )
Step 6. Generating the final prediction
          </p>
          <p>Single-model (priority) mode
judgment.
4.2 Forecasting phase
After model training (Section 4.1) the forecasting phase repeats the same synchronization, verification,
and feature-transformation procedures, then produces the class labels and maintains system
adaptaThe prediction phase supports two modes:</p>
          <p>
            Single-model (priority) mode. A single classifier, selected by (
            <xref ref-type="bibr" rid="ref38">38</xref>
            ), is applied.
          </p>
          <p>
            Weighted-voting ensemble mode. The outputs of the five classifiers are integrated according
to (
            <xref ref-type="bibr" rid="ref39">39</xref>
            ).
          </p>
          <p>The classifier with the highest combined weight is selected
and its binary output is taken as the final decision.
= МСі|</p>
          <p>∈ 1,5((1 −    ) ∙   )</p>
          <p>
            Weighted-voting ensemble mode
Using the evidence indices IP and IN defined in (
            <xref ref-type="bibr" rid="ref36">36</xref>
            )–(
            <xref ref-type="bibr" rid="ref37">37</xref>
            ), the final class label is determined as
ICL =

1,  
0,  
 
&gt;  
&lt;  
,  
=  
If IP = IN, the system returns undecided or, according to the operating protocol, requests an expert
This two-level design permits flexible integration of heterogeneous algorithms and delivers
robustness to shifts in the distribution of input data. The resulting estimates can feed both automated
monitoring services and strategic management decision support.
          </p>
          <p>The forecasting pipeline is governed by the learning paradigm of each classifier. Parameter-based
models — Bayesian classifier, SVM, logistic regression, and Random Forest — are applied directly with
their stored parameters; retraining is required only if the exploratory data analysis (EDA) performed
at inference time reveals substantial divergence from the data characteristics observed during initial
training.</p>
          <p>The non-parametric kNN classifier belongs to the lazy-learning family: for every incoming query
it searches the full training set for the nearest neighbors and therefore needs no separate training
stage [54, 55].</p>
          <p>Algorithmic adaptability is maintained through continuous monitoring of the aggregate quality
metric KQi. When the running average over the last N predictions drops by more than δ%, the system
automatically triggers retraining of the parametric models and refreshes the instance base used by
kNN. This mechanism preserves the stability and accuracy of the indicator system under shifting data
distributions and emerging feature dependencies.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>5. Conclusions</title>
      <p>The composite, multi-purpose resource-based security indicator system (RSI) presented in this paper
provides decision support for resource-driven choices in a macro-level organizational system that
features multi-tier governance and a high uncertainty — both in the hostile external environment and in
rapidly shifting internal priorities.</p>
      <p>The RSI framework classifies resource situations with machine-learning methods trained on
historical observations and expert judgements, while clearly representing stakeholder needs and
environmental changes. For every strategic or operational interest, a set of alternative well-being
estimates acts as an individual indicator; well-being is analyzed in two complementary aspects:
• Performance aspect — the degree to which the interest is achieved from the stakeholder
perspective.
• Resource aspect — the degree to which available resources meet the normative and planned
levels defined by the hybrid management schemes in use.</p>
      <p>Four composite functional indicators are produced by integrating individual indicators and cross
relating the well-being of different interests. They support resource-conditioned decision making in
the following directions:
1. Express diagnosis of resource risk to strategic interests (rapid detection of problem situations);
2. Vulnerability ranking (prioritizing interests and resources at risk);
3. Criticality of external factors (assessing the impact of threats from the environment);
4. Diagnostic of strategic adaptation needs (identifying elements of the current strategy that may
require realignment).</p>
      <p>The algorithm for the first indicator — express diagnosis of problem situations — forecasts the
performance well-being of strategic goals on the basis of routine resource monitoring, interim
assessments of crisis-management tasks, and capability status. A heterogeneous ensemble of binary
classifiers is employed; their outputs are merged through weighted voting, where the weight equals
the argumentation index that combines (i) the data-conformity coefficient — how well the classifier’s
statistical assumptions match the observed data — and (ii) an aggregate quality score compiled from
imbalance-robust metrics. This mechanism yields a robust indicator under prior uncertainty about
data distributions and automatically triggers model retraining when conformity degrades.</p>
      <p>Machine learning therefore becomes not merely a technical means of constructing the RSI but a
core component of an intelligent decision-support platform for problem areas (PA) of the MDM class.
Future work will extend the approach to the other composite indicators, employing multi-class
classification and hybrid time-series forecasting, and will equip the indicator algorithm with a dedicated
multi-criteria evaluation module that combines several imbalance-robust metrics into the aggregated
quality score KQi. A concrete application is foreseen in the analytic integration of defense-resource
information for decision support within the national-security domain.</p>
    </sec>
    <sec id="sec-4">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the authors used OpenAI ChatGPT to translate text from
Ukrainian into English and to rephrase sentences for improved clarity, conciseness, and style. After using
this tool, the authors reviewed and edited the content as needed and take full responsibility for the
publication’s content.
[48] R. Akbani, S. Kwek, N. Japkowicz, Applying support vector machines to imbalanced datasets. In:</p>
      <p>Proc. ECML 2004, LNCS 3201, Springer, 2004, pp. 39–50.
[49] J. Weston, S. Mukherjee, O. Chapelle, M. Pontil, T. Poggio, V. Vapnik, Feature selection for SVMs.</p>
      <p>
        Advances in Neural Information Processing Systems 13 (2001), 668–674.
[50] C. Cortes, V. Vapnik, Support‑vector networks. Machine Learning 20 (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) (1995), 273–297.
[51] H. He, E. A. Garcia, Learning from imbalanced data. IEEE TKDE 21 (
        <xref ref-type="bibr" rid="ref9">9</xref>
        ) (2009), 1263–1284.
[52] H. He, Y. Ma (eds.). Imbalanced Learning: Foundations, Algorithms, and Applications. Wiley,
2013. ISBN 978‑1‑118‑07462‑6.
[53] J. M. Johnson, T. M. Khoshgoftaar, Survey on deep learning with class imbalance. Journal of Big
      </p>
      <p>
        Data 6 (2019), Article 27. DOI: 10.1186/s40537‑019‑0192‑5.
[54] D. Wettschereck, D. W. Aha, T. Mohri, A review and empirical evaluation of feature‑weighting
methods for a class of lazy‑learning algorithms. Artificial Intelligence Review 11 (
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5">1 – 5</xref>
        )
(1997), 273–314.
[55] T. M. Cover, P. Hart, Nearest‑neighbor pattern classification. IEEE Transactions on Information
Theory 13 (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) (1967), 21–27.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>[1] Handbook on Constructing Composite Indicators: Methodology and User Guide</article-title>
          .
          <source>OECD Publishing</source>
          ,
          <year>2008</year>
          . ISBN 978‑92‑64‑04345‑9.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>U. C.</given-names>
            <surname>Schroeder</surname>
          </string-name>
          ,
          <article-title>Measuring Security‑Sector Governance - A Guide to Relevant Indicators</article-title>
          .
          <source>DCAF Occasional Paper</source>
          <volume>20</volume>
          ,
          <year>2010</year>
          , 61 pp.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <article-title>[3] UNAIDS. Monitoring and Evaluation Fundamentals: An Introduction to Indicators</article-title>
          . UNAIDS,
          <year>2010</year>
          , 98 pp.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>D.</given-names>
            <surname>Kaufmann</surname>
          </string-name>
          , A. Kraay,
          <source>The Worldwide Governance Indicators: Methodology and 2024 Update. World Bank Policy Research</source>
          Working Paper, World Bank Group, Washington D.C.,
          <year>2024</year>
          . URL: http://documents.worldbank.org/curated/en/099005210162424110.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>C.</given-names>
            <surname>Cavicchia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Sarnacchiaro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Vichi</surname>
          </string-name>
          ,
          <string-name>
            <surname>G. Zaccaria,</surname>
          </string-name>
          <article-title>An ultrametric model to build a composite‑indicators system</article-title>
          .
          <source>Book of Short Papers, IES</source>
          <year>2022</year>
          , pp.
          <fpage>208</fpage>
          -
          <lpage>211</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>O. I.</given-names>
            <surname>Cherniak</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. I. Shumayeva</surname>
          </string-name>
          ,
          <article-title>Methodology for constructing composite indicators</article-title>
          . Visnyk of Zaporizhzhia National University.
          <source>Economic Sciences</source>
          <volume>1</volume>
          (
          <issue>21</issue>
          ) (
          <year>2014</year>
          ),
          <fpage>81</fpage>
          -
          <lpage>91</lpage>
          (in Ukrainian).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Yu. M. Kharazishvili</surname>
          </string-name>
          ,
          <article-title>Methodological approaches to assessing a country's economic security level</article-title>
          .
          <source>Science and Science of Science</source>
          <volume>4</volume>
          (
          <year>2014</year>
          ),
          <fpage>44</fpage>
          -
          <lpage>57</lpage>
          (in Ukrainian).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A. B.</given-names>
            <surname>Kachynskyi</surname>
          </string-name>
          , Indicators of National Security:
          <article-title>Definition and Application of Threshold Values</article-title>
          . NISS, Kyiv,
          <year>2013</year>
          (in Ukrainian).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>E.</given-names>
            <surname>Diener</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. M.</given-names>
            <surname>Suh</surname>
          </string-name>
          ,
          <article-title>Measuring quality of life: Economic, social and subjective indicators</article-title>
          .
          <source>Social Indicators Research</source>
          <volume>40</volume>
          (
          <issue>1</issue>
          ) (
          <year>1997</year>
          ),
          <fpage>189</fpage>
          -
          <lpage>216</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>R.</given-names>
            <surname>Klimaitienė</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Derengovska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Rudzionienė</surname>
          </string-name>
          ,
          <article-title>Application of key performance indicators to improve the efficiency of monitoring of the organisation's activities: theoretical approach</article-title>
          .
          <source>Public Security and Public Order</source>
          <volume>25</volume>
          (
          <year>2020</year>
          ),
          <fpage>218</fpage>
          -
          <lpage>233</lpage>
          . DOI:
          <volume>10</volume>
          .13165/PSPO-20-25-20.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>I. P.</given-names>
            <surname>Sinitsyn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. L.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Yu</surname>
          </string-name>
          . Doroshenko,
          <string-name>
            <surname>R. M.</surname>
          </string-name>
          <article-title>Fedorenko: Models and Software Systems for Management of Defense Resources</article-title>
          .
          <source>Institute of Software Systems, NAS of Ukraine, Kyiv</source>
          ,
          <year>2024</year>
          (in Ukrainian),
          <volume>268</volume>
          pp.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>T.</given-names>
            <surname>Hastie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Tibshirani</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. Friedman,</surname>
          </string-name>
          <article-title>The Elements of Statistical Learning: Data Mining, Inference, and Prediction</article-title>
          . 2nd ed. Springer,
          <year>2009</year>
          . ISBN 978‑0‑
          <fpage>387</fpage>
          ‑84857‑0.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M.</given-names>
            <surname>Safari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. Z.</given-names>
            <surname>Mazdeh</surname>
          </string-name>
          ,
          <article-title>A conceptual framework of strategy cascading in mission‑based organisations: state‑of‑the‑art review and practical template</article-title>
          .
          <source>International Letters of Social and Humanistic Sciences</source>
          <volume>83</volume>
          (
          <year>2018</year>
          ),
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          . DOI:
          <volume>10</volume>
          .18052/www.scipress.
          <source>com/ILSHS.83.1.</source>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>C.</given-names>
            <surname>Wernz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Deshmukh</surname>
          </string-name>
          ,
          <article-title>Multiscale decision‑making: bridging organisational scales in systems with distributed decision‑makers</article-title>
          .
          <source>European Journal of Operational Research</source>
          <volume>202</volume>
          (
          <issue>3</issue>
          ) (
          <year>2010</year>
          ),
          <fpage>828</fpage>
          -
          <lpage>840</lpage>
          . DOI:
          <volume>10</volume>
          .1016/j.ejor.
          <year>2009</year>
          .
          <volume>06</volume>
          .022.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>O.</given-names>
            <surname>Renn</surname>
          </string-name>
          ,
          <article-title>Analytic-deliberative processes of decision making: linking expertise, stakeholder experience and public values</article-title>
          .
          <source>Research report Doc 847</source>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>L.</given-names>
            <surname>Agostini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nosella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. M.</given-names>
            <surname>Sarala</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Nikeng</surname>
          </string-name>
          ,
          <article-title>Emerging trends around strategic flexibility: a systematic review supported by bibliometric techniques</article-title>
          .
          <source>Management Decision</source>
          <volume>62</volume>
          (
          <issue>13</issue>
          ) (
          <year>2023</year>
          ). DOI:
          <volume>10</volume>
          .1108/MD-02
          <string-name>
            <surname>-</surname>
          </string-name>
          2023-0135.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>J.</given-names>
            <surname>Correia</surname>
          </string-name>
          ,
          <article-title>Military capabilities and the strategic‑planning conundrum</article-title>
          .
          <source>Security and Defence Quarterly</source>
          <volume>24</volume>
          (
          <issue>2</issue>
          ) (
          <year>2019</year>
          ),
          <fpage>21</fpage>
          -
          <lpage>48</lpage>
          . DOI:
          <volume>10</volume>
          .35467/sdq/108667.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>V. H.</given-names>
            <surname>Totsenko</surname>
          </string-name>
          ,
          <article-title>Methods and Systems for Decision Support: Algorithmic Aspect</article-title>
          . Naukova Dumka, Kyiv,
          <year>2002</year>
          , 381 pp.
          <article-title>(in Russian)</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>O. P.</given-names>
            <surname>Ilina</surname>
          </string-name>
          ,
          <article-title>Functions and methods supporting modern paradigms of the Delphi method</article-title>
          .
          <source>Problemy Programmirovaniya</source>
          <volume>1</volume>
          (
          <year>2009</year>
          ),
          <fpage>36</fpage>
          -
          <lpage>52</lpage>
          (in Russian).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>O.</given-names>
            <surname>Ilina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Sinitsyn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Slabospitska</surname>
          </string-name>
          ,
          <article-title>Models, methods and technological usage of expert‑knowledge formalisation for strategic decision making under deep uncertainty</article-title>
          .
          <source>Proceedings of the 13th International Scientific and Practical Conference 'Programming UkrPROG'</source>
          <year>2022</year>
          ,
          <string-name>
            <surname>CEUR-WS</surname>
          </string-name>
          Vol-
          <volume>3501</volume>
          ,
          <year>2022</year>
          , pp.
          <fpage>302</fpage>
          -
          <lpage>314</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>D. H.</given-names>
            <surname>Wolpert</surname>
          </string-name>
          , W. G.
          <article-title>Macready, No Free Lunch Theorems for Optimization</article-title>
          .
          <source>IEEE Transactions on Evolutionary Computation</source>
          <volume>1</volume>
          (
          <issue>1</issue>
          ) (
          <year>1997</year>
          ),
          <fpage>67</fpage>
          -
          <lpage>82</lpage>
          . DOI:
          <volume>10</volume>
          .1109/4235.585893.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>M.</given-names>
            <surname>Fernández‑Delgado</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Cernadas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Barro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Amorim</surname>
          </string-name>
          ,
          <article-title>Do we need hundreds of classifiers to solve real‑world classification problems?</article-title>
          <source>Journal of Machine Learning Research</source>
          <volume>15</volume>
          (
          <year>2014</year>
          ),
          <fpage>3133</fpage>
          -
          <lpage>3181</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>J. M. Bernardo</surname>
            ,
            <given-names>A. F. M.</given-names>
          </string-name>
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>Bayesian</given-names>
          </string-name>
          <string-name>
            <surname>Theory</surname>
          </string-name>
          . Wiley,
          <year>1994</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>A.</given-names>
            <surname>Gelman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. B.</given-names>
            <surname>Carlin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. S.</given-names>
            <surname>Stern</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. B.</given-names>
            <surname>Dunson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Vehtari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. B.</given-names>
            <surname>Rubin</surname>
          </string-name>
          ,
          <article-title>Bayesian Data Analysis</article-title>
          . 3rd ed. CRC Press,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>C. M. Bishop</surname>
          </string-name>
          ,
          <source>Pattern Recognition and Machine Learning</source>
          . Springer, New York,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>B.</given-names>
            <surname>Schölkopf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. J.</given-names>
            <surname>Smola</surname>
          </string-name>
          ,
          <article-title>Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond</article-title>
          . MIT Press,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>N.</given-names>
            <surname>Cristianini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Shawe‑Taylor</surname>
          </string-name>
          ,
          <article-title>An Introduction to Support Vector Machines and Other Kernel‑Based Learning Methods</article-title>
          . Cambridge University Press,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Lin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>Wahba, Support vector machines for classification in nonstandard situations</article-title>
          .
          <source>Machine Learning</source>
          <volume>46</volume>
          (
          <issue>1 - 3</issue>
          ) (
          <year>2002</year>
          ),
          <fpage>191</fpage>
          -
          <lpage>202</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>L.</given-names>
            <surname>Breiman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Random</given-names>
            <surname>Forests</surname>
          </string-name>
          .
          <source>Machine Learning 45 (1)</source>
          (
          <year>2001</year>
          ),
          <fpage>5</fpage>
          -
          <lpage>32</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>C.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Breiman</surname>
          </string-name>
          ,
          <article-title>Using Random Forest to Learn Imbalanced Data</article-title>
          .
          <source>Univ. of California</source>
          , Berkeley, Tech. Rep.,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>C. C.</given-names>
            <surname>Aggarwal</surname>
          </string-name>
          , Data Mining: The Textbook. Springer,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>G.</given-names>
            <surname>James</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Witten</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Hastie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Tibshirani</surname>
          </string-name>
          ,
          <article-title>An Introduction to Statistical Learning with Applications in</article-title>
          R. Springer,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>D. W.</given-names>
            <surname>Hosmer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lemeshow</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. X.</given-names>
            <surname>Sturdivant</surname>
          </string-name>
          , Applied Logistic Regression. 3rd ed. Wiley,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <surname>Hair</surname>
            ,
            <given-names>J. F.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>R. E.</given-names>
            <surname>Anderson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. L.</given-names>
            <surname>Tatham</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W. C.</given-names>
            <surname>Black</surname>
          </string-name>
          ,
          <article-title>Multivariate Data Analysis</article-title>
          .
          <source>Prentice Hall</source>
          ,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>B. C.</given-names>
            <surname>Wallace</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Small</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. E.</given-names>
            <surname>Brodley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Trikalinos</surname>
          </string-name>
          ,
          <article-title>Class imbalance, redux</article-title>
          .
          <source>In: Proc. IEEE ICDM</source>
          <year>2011</year>
          , pp.
          <fpage>754</fpage>
          -
          <lpage>763</lpage>
          . DOI:
          <volume>10</volume>
          .1109/ICDM.
          <year>2011</year>
          .
          <volume>33</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>A.</given-names>
            <surname>Gelman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Hill</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Vehtari</surname>
          </string-name>
          , Regression and
          <string-name>
            <given-names>Other</given-names>
            <surname>Stories</surname>
          </string-name>
          . Cambridge University Press,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>D.</given-names>
            <surname>Koller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Friedman</surname>
          </string-name>
          ,
          <article-title>Probabilistic Graphical Models: Principles and Techniques</article-title>
          . MIT Press,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [38]
          <string-name>
            <surname>C. M. Bishop</surname>
          </string-name>
          ,
          <article-title>Neural Networks for Pattern Recognition</article-title>
          . Oxford University Press,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>M.</given-names>
            <surname>Buda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Maki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Mazurowski</surname>
          </string-name>
          ,
          <article-title>A systematic study of the class‑imbalance problem in convolutional neural networks</article-title>
          .
          <source>Neural Networks</source>
          <volume>106</volume>
          (
          <year>2018</year>
          ),
          <fpage>249</fpage>
          -
          <lpage>259</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [40]
          <string-name>
            <given-names>G.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. Y.</given-names>
            <surname>Chang</surname>
          </string-name>
          , KBA:
          <article-title>Kernel boundary alignment considering imbalanced data distribution</article-title>
          .
          <source>IEEE TKDE 17 (6)</source>
          (
          <year>2005</year>
          ),
          <fpage>786</fpage>
          -
          <lpage>795</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [41]
          <string-name>
            <given-names>V. N.</given-names>
            <surname>Vapnik</surname>
          </string-name>
          ,
          <source>The Nature of Statistical Learning Theory. Springer</source>
          ,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [42]
          <string-name>
            <surname>C.‑C. Chang</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.‑J. Lin</surname>
            ,
            <given-names>LIBSVM:</given-names>
          </string-name>
          <article-title>A library for support vector machines</article-title>
          .
          <source>ACM TIST 2</source>
          (
          <issue>3</issue>
          ) (
          <year>2011</year>
          ), Article 27.
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          [43]
          <string-name>
            <surname>C.‑W. Hsu</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.‑J. Lin</surname>
          </string-name>
          ,
          <article-title>A comparison of methods for multi‑class support vector machines</article-title>
          .
          <source>IEEE Trans. Neural Networks</source>
          <volume>13</volume>
          (
          <issue>2</issue>
          ) (
          <year>2002</year>
          ),
          <fpage>415</fpage>
          -
          <lpage>425</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          [44]
          <string-name>
            <given-names>P.</given-names>
            <surname>Flach</surname>
          </string-name>
          ,
          <source>Machine Learning: The Art and Science of Algorithms that Make Sense of Data</source>
          . Cambridge University Press,
          <year>2012</year>
          , chap. 5.
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          [45]
          <string-name>
            <given-names>L.</given-names>
            <surname>Rokach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Maimon</surname>
          </string-name>
          ,
          <article-title>Top‑down induction of decision‑tree classifiers - A survey</article-title>
          .
          <source>IEEE Trans. SMC‑C</source>
          <volume>35</volume>
          (
          <issue>4</issue>
          ) (
          <year>2005</year>
          ),
          <fpage>476</fpage>
          -
          <lpage>487</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          [46]
          <string-name>
            <given-names>C.</given-names>
            <surname>Strobl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.‑L.</given-names>
            <surname>Boulesteix</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Zeileis</surname>
          </string-name>
          , T. Hothorn,
          <article-title>Bias in random‑forest variable‑importance measures: Illustrations, sources and a solution</article-title>
          .
          <source>BMC Bioinformatics</source>
          <volume>8</volume>
          (
          <year>2007</year>
          ), Article 25.
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          [47]
          <string-name>
            <given-names>P.</given-names>
            <surname>Peduzzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Concato</surname>
          </string-name>
          , E. Kemper,
          <string-name>
            <given-names>T. R.</given-names>
            <surname>Holford</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. R.</given-names>
            <surname>Feinstein</surname>
          </string-name>
          ,
          <article-title>A simulation study of the number of events per variable in logistic‑regression analysis</article-title>
          .
          <source>Journal of Clinical Epidemiology</source>
          <volume>49</volume>
          (
          <issue>12</issue>
          ) (
          <year>1996</year>
          ),
          <fpage>1373</fpage>
          -
          <lpage>1379</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>