Informatologia最新文献

筛选
英文 中文
Predškolska ustanova 学校机构
Informatologia Pub Date : 2019-06-30 DOI: 10.32914/I.52.1-2.9
Slavoljub Hilčenko
{"title":"Predškolska ustanova","authors":"Slavoljub Hilčenko","doi":"10.32914/I.52.1-2.9","DOIUrl":"https://doi.org/10.32914/I.52.1-2.9","url":null,"abstract":"Na\u0000Akademiji Obrazovno-zdravstvenih strukovnih studija u Subotici, studenti pored\u0000informacijsko i komunikacijsko-tehnoloških (IKT) saznanja, stječu i potrebna\u0000metodičko-didaktička iskustva (= instrukcijski dizajn) koja u edukaciji djece\u0000imaju najveći značaj. \"Jednom\u0000pogrešno naučeno, teško se ispravlja!\" Kada su u pitanju usvajanja\u0000apstraktnih matematičkih pojmova (npr. mjerenje zapremine ili mase tijela ...),\u0000IKT nisu od presudnog značaja. Sva naša osjetila i eksperimentalan rad su u\u0000procesu usvajanja ovakvih saznanja nezamjenjiva. IKT mogu poslužiti u procesu\u0000provjere i utvrđivanja ovih tema, kao dopunsko nastavno sredstvo, a nikako kao\u0000primarni izvor za stjecanje znanja/vještina! Cilj rada jeste predstavljanje\u0000primjera teme JEDINICA ZA MJERENJE TEKUĆINA – LITRA u kojoj metodika rada, čula\u0000djece i eksperimetalan rad, moraju biti ispred IKT.","PeriodicalId":35333,"journal":{"name":"Informatologia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.32914/I.52.1-2.9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41745646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Issues of information technology crime control in the Republic of Turkey 土耳其共和国信息技术犯罪控制问题
Informatologia Pub Date : 2019-06-30 DOI: 10.32914/I.52.1-2.7
Aliya Shukan, Aitugan Abdizhami, G. Ospanova, D. Abdakimova
{"title":"Issues of information technology crime control in the Republic of Turkey","authors":"Aliya Shukan, Aitugan Abdizhami, G. Ospanova, D. Abdakimova","doi":"10.32914/I.52.1-2.7","DOIUrl":"https://doi.org/10.32914/I.52.1-2.7","url":null,"abstract":"The problem of cybercrime is a problem not only of domestic character but also of the whole world. Therefore, we decided to consider the experience of other countries in combating cybercrime. The article discusses the policy issues of the Turkish Republic in the field of combating the cybercrime. And also it was considered the experience of the police organizations work in this field in Turkey. The article analyzed the legislative framework of the Turkish Republic on the fight against cybercrime. The history of the development of police organizations and their work in this area was investigated and described in detail. The article also contains information about the policy of continuous education of employees on the fight against cybercrime and there was shown a scheme of work in the field of education. According to the results of the study we can confidently say that Turkey is currently doing effective work in combating cybercrime. The experience in this field can be used in the CIS countries and other countries to effectively combat crime in the field of information technology","PeriodicalId":35333,"journal":{"name":"Informatologia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.32914/I.52.1-2.7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46019662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Utjecaj proračunskog zakona na upravljanje državom u uvjetima razvoja digitalnog gospodarstva 预算法对数字经济发展中的国家治理的影响
Informatologia Pub Date : 2019-06-30 DOI: 10.32914/i.52.1-2.3
Imeda Tsindeliani, Olga Gorbunova, Elena Matyanova, Kirill Pisenko, Oksana Palozyan, Vitaly Kikavets, Tatiana Vershilo
{"title":"Utjecaj proračunskog zakona na upravljanje državom u uvjetima razvoja digitalnog gospodarstva","authors":"Imeda Tsindeliani, Olga Gorbunova, Elena Matyanova, Kirill Pisenko, Oksana Palozyan, Vitaly Kikavets, Tatiana Vershilo","doi":"10.32914/i.52.1-2.3","DOIUrl":"https://doi.org/10.32914/i.52.1-2.3","url":null,"abstract":"The subjects of this study are the effectiveness of budget innovations in the field budgetary rule making and the role of the government in shaping fiscal policy in a digital economy. The article makes a case for new approaches to budget formation, for the enhanced use of budgetary levers to boost socio-economic development in the context of global digitalization. In order to make the influence of social informatization on economic development more effective, the economy has to move to a flat (network) management model. The problems of budget control are analyzed","PeriodicalId":35333,"journal":{"name":"Informatologia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.32914/i.52.1-2.3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47802503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Digital competences of teachers and associates at higher educational instiutions in the Republic of Croatia 克罗地亚共和国高等教育机构教师和同事的数字能力
Informatologia Pub Date : 2019-06-30 DOI: 10.32914/I.52.1-2.4
Mirela Müller, M. Varga
{"title":"Digital competences of teachers and associates at higher educational instiutions in the Republic of Croatia","authors":"Mirela Müller, M. Varga","doi":"10.32914/I.52.1-2.4","DOIUrl":"https://doi.org/10.32914/I.52.1-2.4","url":null,"abstract":"One of the basic competences for lifelong learning is the development of digital competence, and especially at higher education institutions. There are long-term goals in economic and social progress in form of initiatives related to the ensuring the multiple information education. Due to the fact that there is not sufficient research aimed at assessing the initial state of information literacy within higher education institutions in Croatia, the goal of the present research is to determine the level of knowledge, more precisely the digital competence of teachers and educators in higher education institutions in the Republic of Croatia, the frequency of their usage of modern technologies in teaching, and to explain the necessity of implementing the multimedia and e-learning training programmes at different faculties. The research was conducted on a representative sample (N = 1800) of teachers and associates at higher education institutions in the Republic of Croatia working in different departments in Osijek, Split and Zagreb. An online questionnaire was used to examine the level of their digital competence, and the frequency and the method of using modern technologies in teaching. The results of the research show that teachers and associates working at technical faculties are more competent in conducting their research scientific work and use the modern technologies significantly more than teachers and associates working in the area of social sciences and humanities. The results show that more than 70% of teachers and associates are assessing themselves as being digitally competent in the use of computers and new technologies, and over 60% of them regularly use media in their teaching practice","PeriodicalId":35333,"journal":{"name":"Informatologia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.32914/I.52.1-2.4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42138516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conflict of laws issues related to securities transactions 与证券交易有关的法律冲突问题
Informatologia Pub Date : 2019-03-31 DOI: 10.32914/I.52.1-2.5
O. Vygovskyy
{"title":"Conflict of laws issues related to securities transactions","authors":"O. Vygovskyy","doi":"10.32914/I.52.1-2.5","DOIUrl":"https://doi.org/10.32914/I.52.1-2.5","url":null,"abstract":"In this article we examine the conflict of laws issues of cross-border securities transactions. It deals with the problems of attributing lex situs to securities held under direct holding system and conflict of laws problems related to intermediated securities. We analyze possible variants of the conflict of laws rule for the securities and formulate our own attitude towards identification of the most efficient solutions of conflict of laws issues","PeriodicalId":35333,"journal":{"name":"Informatologia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.32914/I.52.1-2.5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48998684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preventive measures against computer related crimes 预防与电脑有关罪行的措施
Informatologia Pub Date : 2018-12-30 DOI: 10.32914/I.51.3-4.7
Roman Veresha
{"title":"Preventive measures against computer related crimes","authors":"Roman Veresha","doi":"10.32914/I.51.3-4.7","DOIUrl":"https://doi.org/10.32914/I.51.3-4.7","url":null,"abstract":"Cybercrime\u0000is a combination of information, financial and personal security threats. The\u0000purpose of this research is to\u0000target statistical data to allocate the most effective preventive measures\u0000against cybercrime that would contribute to the combat at the level of\u0000potential (or real) cyber victims and cyber criminals. Brining the so-called Cyberethics\u0000into the life of people will be preventive against cybercrimes, as it will add\u0000to their culture of cyberspace through educational and popular science projects\u0000(such-like program that was put into action in Nigeria stroke positively). With\u0000the rapid spread of cybercrime, preventive measures geared towards individuals\u0000such as anti-criminalization, anti-bullying and anti-phishing propaganda, the\u0000practice of shaping negative attitude towards crimes, and discovery of\u0000responsibility for committing cybercrimes gain in importance. Society\u0000improvement as a counter-move to cut out criminal factors provoking a positive\u0000or neutral attitude to cybercrimes should be geared towards better living, as\u0000the higher is the standard the lower is the level of cybercrime. Taking individualized\u0000preventing measures to people prone to commit cybercrimes will prevent against\u0000such even before they take place (with cyber extortion and ransomware threats,\u0000such actions gain in relevance). For the fight against cybercrime, special\u0000programs are to level down victimization in the field of cybersecurity by\u0000fostering a shielding attitude in persons who can become victims. The path of\u0000designing such programs will lead to a drop cybercrime activity. Specific\u0000public authorities and non-governmental organizations should take part in the\u0000preventive process. All-encompassing preventive measures against cybercrime\u0000approaching individual at the international level will allow designing specific\u0000pilot programs for individualized prevention","PeriodicalId":35333,"journal":{"name":"Informatologia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.32914/I.51.3-4.7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41631398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Strengthsand weaknesses of the church media in Slovakia 斯洛伐克教会媒体的优势与劣势
Informatologia Pub Date : 2018-12-30 DOI: 10.32914/I.51.3-4.9
Terézia Rončáková
{"title":"Strengths\u0000and weaknesses of the church media in Slovakia","authors":"Terézia Rončáková","doi":"10.32914/I.51.3-4.9","DOIUrl":"https://doi.org/10.32914/I.51.3-4.9","url":null,"abstract":"The author analyses strong and weak points of the\u0000Church media in Slovakia. Her conclusions are based on more than ten previous\u0000researches in the field of Church and media, realized on the Catholic\u0000University in Ruzomberok, Slovakia. She states, that Slovak\u0000church media are exclusively pastoral, wilfully resigning to the evangelization\u0000function. Marginal evangelization attempts (such as in Radio Lumen in the late 1990s) have failed. This means, inter alia,\u0000that they do not do journalism in its original sense. They act as public\u0000relations bodies of the bishop’s conferences and as an extension of spiritual\u0000service of the church to the believers. The competent decision-makers (i.e.\u0000church hierarchy) are not willing to subsidize evangelization medium, because\u0000the currently accepted doctrine is to use ‘their own’ media space to spread\u0000‘their own’ messages. Thus, opening complex topics, covering opinion plurality\u0000and encouraging discussion, is regarded as harmful. This function is, in the\u0000last years, substituted by the commercial project of the Conservative daily Postoj, but this is neither a church nor\u0000religious medium. As the researches show, also the request of believing audience\u0000for independent critical Church medium is disputable. The audience is –\u0000disregarding age – divided between the audience of the official church media\u0000and decent secular media. Between these two groups exists a relatively strong\u0000antagonism","PeriodicalId":35333,"journal":{"name":"Informatologia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47818561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The effects of media displays regardingterrorist attacks on attitudes concerning tourist destination planning 关于恐怖袭击的媒体展示对旅游目的地规划态度的影响
Informatologia Pub Date : 2018-12-30 DOI: 10.32914/I.51.3-4.1
B. Pavlakovič, M. Knežević, M. Koščak, T. O’Rourke, B. Prevolšek, B. Brumen
{"title":"The effects of media displays regarding\u0000terrorist attacks on attitudes concerning tourist destination planning","authors":"B. Pavlakovič, M. Knežević, M. Koščak, T. O’Rourke, B. Prevolšek, B. Brumen","doi":"10.32914/I.51.3-4.1","DOIUrl":"https://doi.org/10.32914/I.51.3-4.1","url":null,"abstract":"Designing and presenting a destination as a tourist product is a process, which is influenced by different issues. Among them are perceptions of destination and attitudes towards a destination. In this study we have examined how media representation of destination safety and security affects attitudes about tourism destinations. Safety and security are important questions in the field of tourism and therefore we initially present\u0000differing aspects of this topic. This research question was addressed as an experiment among students of tourism, who are future tourism product designers. The independent variable was the projection of terrorist attack films on observed destinations. The experiment used different questionnaires – among them was a nonverbal semantic differential. The results of these questionnaires showed that the perception of different destinations is lower than before the experiment and therefore that the safety and security issues are important factors when designing a tourist product","PeriodicalId":35333,"journal":{"name":"Informatologia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46295498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Access control scheme in cloud services based on different user roles 云服务中基于不同用户角色的访问控制方案
Informatologia Pub Date : 2018-12-30 DOI: 10.32914/I.51.3-4.6
S. Singaravelan, R. Arun, D. A. Shunmugam, R. Vivek, D. Murugan
{"title":"Access control scheme in cloud services based on different user roles","authors":"S. Singaravelan, R. Arun, D. A. Shunmugam, R. Vivek, D. Murugan","doi":"10.32914/I.51.3-4.6","DOIUrl":"https://doi.org/10.32914/I.51.3-4.6","url":null,"abstract":"The rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection (PS-ACS). In the PS-ACS scheme, we divide users into private domain (PRD) and public domain (PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption (KAE) and the Improved Attribute-based Signature (IABS) respectively. In PUD, we construct new multi-authority cipher text policy attribute-based encryption (CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users’ privacy in cloud-based services","PeriodicalId":35333,"journal":{"name":"Informatologia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.32914/I.51.3-4.6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46979801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Communicative factors associated with assertiveness in slovenian nursing staff in clinical practice 斯洛文尼亚护理人员在临床实践中与自信相关的交际因素
Informatologia Pub Date : 2018-12-30 DOI: 10.32914/I.51.3-4.3
Silva Roncelli Vaupot, D. Železnik
{"title":"Communicative factors associated with assertiveness in slovenian nursing staff in clinical practice","authors":"Silva Roncelli Vaupot, D. Železnik","doi":"10.32914/I.51.3-4.3","DOIUrl":"https://doi.org/10.32914/I.51.3-4.3","url":null,"abstract":"The objective of this research was to investigate the\u0000assertiveness of nursing staff members in their everyday practice. The\u0000secondary goal was to investigate whether assertiveness is related to sex, age,\u0000years of working experience, education and self-esteem. Nursing staff\u0000members are expected to have a high level of assertiveness to establish optimal\u0000professional communication and working performance. A cross-sectional study design and convenience sampling were\u0000applied. Altogether, 303 nursing staff members (88.8% female and 11.2% male;\u0000aged between 21 and 58 years) from the northeastern part of Slovenia were\u0000enrolled in the study. The participants were asked to complete an anonymous\u0000questionnaire, which consisted of the Rathus Assertiveness Schedule and the\u0000Rosenberg Self-Esteem Scale. The sample included 44.6% registered nurses and\u000055.4% nursing assistants with mean = 15.9 (SD 10.1) years of working\u0000experience. In general, the level of assertiveness by Rathus scale was low at\u0000mean = +4.0 (SD 17.2) points.","PeriodicalId":35333,"journal":{"name":"Informatologia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.32914/I.51.3-4.3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46861526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信