RUS  ENG
Full version
JOURNALS // Informatika i Ee Primeneniya [Informatics and its Applications] // Archive

Inform. Primen., 2022 Volume 16, Issue 2, Pages 68–74 (Mi ia788)

This article is cited in 2 papers

Cause-and-effect chain analysis

A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, A. A. Zatsarinny, E. E. Timonina, S. Ya. Shorgin

Federal Research Center “Computer Science and Control” of the Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119333, Russian Federation

Abstract: The paper is devoted to the analysis of the possibilities of using cause-and-effect relationships in the control of the realization of information technologies in distributed information systems. To carry out this analysis, the simple example of a fragment of some fixed information technology has been built which examines situations where control can rely on cause-and-effect relationships between actions in information technologies and when alleged cause-and-effect relationships simply do not exist. The paper shows the limitations of using cause-and-effect relationships to increase confidence in the results of complex computer calculations. This limitation is based on the fact that in order to get causal relationships in waiting of the certain result, it is often impossible to control the relationships of characteristics that are mandatory for the desired consequence to be obtained from actions that are assumed to be its cause. To use cause-and-effect relationships in information technology, it is necessary to supplement the actions of information technology with actions to control the relationships between characteristics. Without this condition, the properly constructed sequence of information technology actions is a necessary but insufficient condition of the expected consequence.

Keywords: information security, cause-and-effect relations, monitoring of information technologies.

Received: 17.04.2022

DOI: 10.14357/19922264220209



© Steklov Math. Inst. of RAS, 2025