Abstract:
The article contains one of the approaches to quantitative maleficent actions secrecy evaluation. The paper shows a method to form a multitude of potentially implemented maleficent actions. The article also explains the term «sign of action» and includes measurement of positive and negative effects when choosing the specific action mechanism.
Keywords:operating system; mobile personal device; ranking; coefficients factoring.