PROACTIVE MONITORING SYSTEM FOR INVESTMENT PROJECTS: MATHEMATICAL SUPPORT
AbstractInvestment projects evaluation is considered in the article. Authors offer using developed mathematical apparatus integrated into a proactive monitoring system for the benefit of investment projects assessment.Â Proactive monitoring systems have a great capacity for improving decision making on entering investment projects, which can be widely used by commercial companies, state bodies, banks, etc. Using mathematical based evaluation systems will help ranking investment projects to select the best and most promising among the available. Based on the study, the author sees it best to apply mathematical models and concentrate on conceptual investment projects for reducing monitoring and evaluation costs, as well as initial development costs. Optimal ways to form expert groups for investment project proactive monitoring is offered in conclusion.
Vilenskii, P.L, Livshits, V.N., and Smolyak, S.A., Otsenka effektivnosti investitsionnykh proektov: teoriya i praktika (Evaluation of Efficiency of Investment Projects: Theory and Practice), Moscow: Delo, 2001.
Kalugin, V.A., 2006. Criteria expert evaluation of investment projects. Issues of Theory and Projects, 2016, no. 7, pp. 4.
Vladimir A. Kalugin, Vadim A. Lomazov, Lilia A. Zimakova, Valeriy M. Nikitin and Elena A. Lavrinenko, 2016. Multi-Method Approach to Making Investment Decisions. International Business Management, 2016, No.10, pp. 6004-6008.
Kalugin, Vladimir. Models and methods of monitoring at the preinvestment stage investment project life cycle. Belgorod State University Scientific Bulletin, History Political science Economics Information technologies.2013, â„– 22 (165) Issue 28/1, pp.92).
Vladyka, M.V., Stryabkova, E.A. Kalugin, V.A., Veretennikova, I.I., Burdinskaya, D.M., 2017. Instrumental methods for cluster development in regions of the Russian federation, International Journal of Economic Perspectives, 11(3), pp. 595-602. Accessed from https://web.a.ebscohost.com/abstract?direct=true&profile=ehost&scope=site&authtype=crawler&jrnl=13071637&AN=135860552&h=W9PMtCVFtlmlWckIqKpUSO03Eq4KD8rsS3axV6x4zSb87TomHtAuRqYkO5sImdLkydmvet3owTckY%2brh1ChPFQ%3d%3d&crl=c&resultNs=AdminWebAuth&resultLocal=ErrCrlNotAuth&crlhashurl=login.aspx%3fdirect%3dtrue%26profile%3dehost%26scope%3dsite%26authtype%3dcrawler%26jrnl%3d13071637%26AN%3d135860552 Journal title is correct
Monakova, Ganna & D. Brucker, Achim & Schaad, Andreas. (2012). Security and safety of assets in business processes. Proceedings of the ACM Symposium on Applied Computing. 10.1145/2245276.2232045. accesses from https://www.brucker.ch/bibliography/download/2012/monakova.ea-securing-2012.pdf.
Au, Y.A. Rational expectations, optimal control and information technology adoption, Information Systems and e-Business Management, 2005, 3(1): 47-70.
Nigel Melville, Vijay Gurbaxani, Kenneth Kraemer. The productivity impact of information technology across competitive regimes: The role of industry concentration and dynamism IT business environment, Decision Support Systems, 2007, February, pp. 229â€‘242.
Farrell, D. 2002. How to IT growth, San Francisco: McKinsey Global Institute, 245 p.
Cost Control, Monitoring and Accounting [Electronic resource], Access mode: - http://pmbook.ce.cmu.edu (Accessed on 20.12.2018)
Lavrinenko E.A., Chmireva E.V., 2018. Instrumental support of the system of proactive monitoring of investment projects, Fundamental research, 4, p. 104-108; URL: http://fundamental-research.ru/ru/article/view?id=42126. (Accessed on 23.01.2019).
The submitter hereby warrants that the Work (collectively, the “Materials”) is original and that he/she is the author of the Materials. To the extent the Materials incorporate text passages, figures, data or other material from the works of others, the undersigned has obtained any necessary permissions. Where necessary, the undersigned has obtained all third party permissions and consents to grant the license above and has all copies of such permissions and consents.
The submitter represents that he/she has the power and authority to make and execute this assignment. The submitter agrees to indemnify and hold harmless the COMPUSOFT from any damage or expense that may arise in the event of a breach of any of the warranties set forth above. For authenticity, validity and originality of the research paper the author/authors will be totally responsible.