{"title":"Modeling the Impact of Information System on Organizational Culture and Business-IT Strategic Alignment","authors":"I. Smeureanu, Bassel Diab","doi":"10.12948/issn14531305/23.3.2019.02","DOIUrl":"https://doi.org/10.12948/issn14531305/23.3.2019.02","url":null,"abstract":"This paper proposes a model which explores how enterprises in Lebanon recognize the role of information system in fostering the quality of knowledge and information shared among its organizational members. Principally, it seeks to investigate the significance of organizational culture in promoting the main attributes of information, the impact of cultural factors and info system factors on the level of info sharing, and the leading enablers of Business-IT Strategic Alignment in SMEs compared to Large Enterprises.","PeriodicalId":53248,"journal":{"name":"Informatica economica","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83396846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Dubosson, E. Fragnière, Nathalie Junod, S. Meier, Sacha C. Varone, Arnaud Fournier
{"title":"Integration of a Human Risk Module into a Risk Management Software","authors":"M. Dubosson, E. Fragnière, Nathalie Junod, S. Meier, Sacha C. Varone, Arnaud Fournier","doi":"10.12948/issn14531305/23.3.2019.01","DOIUrl":"https://doi.org/10.12948/issn14531305/23.3.2019.01","url":null,"abstract":"In the scientific literature and in practice, many questionnaires based on a myriad of measures have been designed and tested to measure and evaluate perceived work stress or employee involvement. The objective of our research is to identify the most significant elements of human risks and to combine them into a single score at the level of teams and departments. Indeed, for companies, what really matters are the stress or dissatisfaction factors that lead to harmful behavior that prevent managers and their teams from achieving their objectives. Based on this research, we are developing a module that will be incorporated into the Oxial software and will also be available as a stand-alone module. This module will collect and analyze the data to calculate a single score measuring the level of human risk. This aspect is very innovative, because no risk management software currently includes a module dedicated to human risks.","PeriodicalId":53248,"journal":{"name":"Informatica economica","volume":"37 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83102346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Model of Achieving Safe Interoperability of Medical Data in the Private Sector of Health Care in Romania","authors":"M. Rac-Albu, Marius Rac-Albu","doi":"10.12948/issn14531305/23.3.2019.08","DOIUrl":"https://doi.org/10.12948/issn14531305/23.3.2019.08","url":null,"abstract":"The lack of interoperability in the private sector of medical services in Romania represents a big gap in completing a medical file for a patient who uses both private and public medical services. In this article is presented a model of an interoperable medical system in private medical services. This system has standardized medical documents (in conceptions) and interoperable medical documents (using documents interoperability standards). These are two different items, the first ones are referring to gathering the same medical records for all the patients for every medical field (e.g.: cardiology, dermatology etc.) and the second ones are referring to transport standards like HL7/CDA (Health Level 7/Digital Imaging and Communications in Medicine). This new designed system has a big focus on protecting the personal data of the patients by respecting the European Law about personal data sharing (General Data Protection Regulation-GDPR) specially article no. 26 which requires pseudonymization and anonymization of personal da and medical records. [1]","PeriodicalId":53248,"journal":{"name":"Informatica economica","volume":"80 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74550891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An IoT, Virtual Machines and Cloud Computing-based Framework for an Optimal Management of Healthcare Data Collected from a Smart Environment. A Case Study: RO-Smart Ageing Project","authors":"Dragos Nicolau, A. Alexandru, M. Ianculescu","doi":"10.12948/issn14531305/23.3.2019.07","DOIUrl":"https://doi.org/10.12948/issn14531305/23.3.2019.07","url":null,"abstract":"Globally, the population is ageing and the number of older people is increasing dramatically. These are challenges for healthcare systems because an increased need for medical assistance is related to ageing. The availability of health-related data and information is a main issue for assessing the health status of seniors, having an important impact on their quality of life. Due to Internet of Things (IoT), cloud computing, smart environment, and virtual machines, the traditional healthcare approaches are replaced by up-to-date (remote) health monitoring systems in smart environments. The paper presents the opportunities provided by such solutions for an appropriate management of older people health related information. RO-SmartAgeing, a remote health monitoring system based on IoT, is presented as a case study with the intention of revealing the rise of the efficiency and the decease of the response time in seniors remote monitoring systems.","PeriodicalId":53248,"journal":{"name":"Informatica economica","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81474556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Mobile Solutions in Romania's Education System","authors":"R. Ciobanu","doi":"10.12948/issn14531305/23.2.2019.08","DOIUrl":"https://doi.org/10.12948/issn14531305/23.2.2019.08","url":null,"abstract":"In the light of the technology development nowadays, the society and more specific, the education area is facing new challenges in meeting the learners’ demands. The continuously changing expectations and the ubiquity of the mobile devices in everyday life has led to the apparition of a new modern learning method, the m-learning, whose theoretical approaches will be further analysed, followed by an examination of the advantages and disadvantages for the mobile learners. This paper also investigates the implementation status of mobile solutions on the Romania`s education systems.","PeriodicalId":53248,"journal":{"name":"Informatica economica","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81541592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparative Assessment of Obfuscated Ransomware Detection Methods","authors":"Sergiu Sechel","doi":"10.12948/issn14531305/23.2.2019.05","DOIUrl":"https://doi.org/10.12948/issn14531305/23.2.2019.05","url":null,"abstract":"Ransomware represents a class of malicious applications that encrypts the files of infected system and demands from victims a payment in cryptocurrency in order to receive the decryption key. The mainstream adoption of cryptocurrencies increased the number of ransomware attack. The outbreaks had risen in complexity and received mass-media attention in 2017 when two destructive campaigns crippled companies and institutions around the world. These outbreaks continue at an accelerated pace even though efforts are made to improve the detection and mitigation of ransomware. The purpose of this research is to assess the efficiency of current malware analysis methods and technologies in the detection of ransomware. The experiments presented here were performed using antivirus engines and dynamic malware analysis against live obfuscated ransomware samples.","PeriodicalId":53248,"journal":{"name":"Informatica economica","volume":"248 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74912335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eduard-Florin Predescu, A. Stefan, Alexis-Valentin Zaharia
{"title":"Software Effort Estimation Using Multilayer Perceptron and Long Short Term Memory","authors":"Eduard-Florin Predescu, A. Stefan, Alexis-Valentin Zaharia","doi":"10.12948/issn14531305/23.2.2019.07","DOIUrl":"https://doi.org/10.12948/issn14531305/23.2.2019.07","url":null,"abstract":"Software effort estimation is a hot topic for study in the last decades. The biggest challenge for project managers is to meet their goals within the given time limit. Machine learning software can take project management software to a whole new level. The objective of this paper is to show the applicability of using neural network algorithms in software effort estimation for project management. To prove the concept we are using two machine learning algorithms: Multilayer Perceptron (MLP) and Long Short-Term Memory (LSTM). To train and test these machine learning algorithms we are using the Desharnais dataset. The dataset consists of 77 sample projects. From our results we have seen that Multilayer Perceptron algorithm has better performance than Long Short-Term Memory, by having a better determination coefficient for software effort estimation. Our success in implementing a machine learning that can estimate the software effort brings real benefits in the field of project management assisted by computer, further enhancing the ability of a manager to organize the tasks within the time limit of the project. Although, we need to take into consideration that we had a limited dataset that we could use so a real advancement would be to implement and test these algorithms using a real life company as a subject of testing.","PeriodicalId":53248,"journal":{"name":"Informatica economica","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79521125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web Crawler for Indexing Video e-Learning Resources: A YouTube Case Study","authors":"B. Iancu","doi":"10.12948/issn14531305/23.2.2019.02","DOIUrl":"https://doi.org/10.12948/issn14531305/23.2.2019.02","url":null,"abstract":"The main objective of the current paper is to develop and validate an algorithm focused on automatically indexing YouTube e-learning resources about a certain domain of interest. After identifying the keywords specific to the desired domain, a web crawler is developed for evaluating video resources (from the YouTube platform) in terms of relevance for that domain. Once the most relevant video resources are found, they are indexed with the usage of a NER engine applied on their transcripts. In this manner, semantic queries can be used further in order to find exactly the needed information inside these multimedia resources. The crawler will repeat the indexing process daily in order to maintain the repository of semantically indexed videos up to date. The final chapter presents the obtained results together with the validation of the model.","PeriodicalId":53248,"journal":{"name":"Informatica economica","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83308852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smartphones and IoT Security","authors":"Ioan Adăscăliţei","doi":"10.12948/issn14531305/23.2.2019.06","DOIUrl":"https://doi.org/10.12948/issn14531305/23.2.2019.06","url":null,"abstract":"Mobile devices (smartphones or IoT devices) threats are all over and come in many ways. Nowadays the number of mobile devices is extremely high and we use them to cover many personal needs like ordering food, buying plane tickets, controlling our home from distance (using IoT devices) and so on. But all of this comes with a cost and that cost is that we have to give personal data to some devices which lead to threats. This paper contains a classification for the threats and vulnerabilities for smartphones and tablets and a short one for IoT devices. Here are described some attack scenarios for IoT and a few representative attacks. As method of research was used a qualitative one by documenting from articles related to this theme, reports realized by companies which operates in this field and other resources.","PeriodicalId":53248,"journal":{"name":"Informatica economica","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87948283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Additional Limit Conditions for Breakout Trading Strategies","authors":"Cristian Păuna","doi":"10.12948/issn14531305/23.2.2019.03","DOIUrl":"https://doi.org/10.12948/issn14531305/23.2.2019.03","url":null,"abstract":"One of the most popular trading methods used in financial markets is the Turtle strategy. Long time passed since the middle of 1983 when Richard Dennis and Bill Eckhardt disputed about whether great traders were born or made. To decide the matter, they recruited and trained some traders (the Turtles) and give them real accounts and a complete trading strategy to see which idea is right. That was a breakout trading strategy, meaning they bought when the price exceeded the maximum 20 or 50 days value, and sold when the price fell below the minimum of the same interval. Since then many changes have occurred in financial markets. Electronic trading was widespread released and financial trading has become accessible to everyone. Algorithmic trading became the significant part of the trading decision systems and highfrequency trading pushed the volatility of the financial markets to new and incredible limits nowadays. The orders are built and sent almost instantly by smart computers using advanced mathematical algorithms. With all these changes there are many questions today regarding the breakouts strategies. Are the Turtle rules still functional? How can the Turtle strategy be automated for algorithmic trading? Are the results comparable with other modern trading strategies? After a short display of the history and the system’s rules, this paper will find some answers to all these questions. We will reveal a method to automate a breakout strategy. More different trading strategies originating from the Turtle rules will be presented. A mathematical model to build the trading signals will be described in order to automate the trading process. It was found that all of these rules have a positive expectancy when they are combined with modern limit conditions. The paper will also include trading results obtained with the methods presented in order to compare and to analyze this capital investment methodology adapted especially for algorithmic trading.","PeriodicalId":53248,"journal":{"name":"Informatica economica","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78483150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}