Informatica economica最新文献

筛选
英文 中文
Modeling the Impact of Information System on Organizational Culture and Business-IT Strategic Alignment 信息系统对组织文化和业务- it战略一致性的影响建模
Informatica economica Pub Date : 2019-09-30 DOI: 10.12948/issn14531305/23.3.2019.02
I. Smeureanu, Bassel Diab
{"title":"Modeling the Impact of Information System on Organizational Culture and Business-IT Strategic Alignment","authors":"I. Smeureanu, Bassel Diab","doi":"10.12948/issn14531305/23.3.2019.02","DOIUrl":"https://doi.org/10.12948/issn14531305/23.3.2019.02","url":null,"abstract":"This paper proposes a model which explores how enterprises in Lebanon recognize the role of information system in fostering the quality of knowledge and information shared among its organizational members. Principally, it seeks to investigate the significance of organizational culture in promoting the main attributes of information, the impact of cultural factors and info system factors on the level of info sharing, and the leading enablers of Business-IT Strategic Alignment in SMEs compared to Large Enterprises.","PeriodicalId":53248,"journal":{"name":"Informatica economica","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83396846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Integration of a Human Risk Module into a Risk Management Software 将人为风险模块集成到风险管理软件中
Informatica economica Pub Date : 2019-09-30 DOI: 10.12948/issn14531305/23.3.2019.01
M. Dubosson, E. Fragnière, Nathalie Junod, S. Meier, Sacha C. Varone, Arnaud Fournier
{"title":"Integration of a Human Risk Module into a Risk Management Software","authors":"M. Dubosson, E. Fragnière, Nathalie Junod, S. Meier, Sacha C. Varone, Arnaud Fournier","doi":"10.12948/issn14531305/23.3.2019.01","DOIUrl":"https://doi.org/10.12948/issn14531305/23.3.2019.01","url":null,"abstract":"In the scientific literature and in practice, many questionnaires based on a myriad of measures have been designed and tested to measure and evaluate perceived work stress or employee involvement. The objective of our research is to identify the most significant elements of human risks and to combine them into a single score at the level of teams and departments. Indeed, for companies, what really matters are the stress or dissatisfaction factors that lead to harmful behavior that prevent managers and their teams from achieving their objectives. Based on this research, we are developing a module that will be incorporated into the Oxial software and will also be available as a stand-alone module. This module will collect and analyze the data to calculate a single score measuring the level of human risk. This aspect is very innovative, because no risk management software currently includes a module dedicated to human risks.","PeriodicalId":53248,"journal":{"name":"Informatica economica","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83102346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Model of Achieving Safe Interoperability of Medical Data in the Private Sector of Health Care in Romania 罗马尼亚私营卫生保健部门实现医疗数据安全互操作性的模型
Informatica economica Pub Date : 2019-09-30 DOI: 10.12948/issn14531305/23.3.2019.08
M. Rac-Albu, Marius Rac-Albu
{"title":"A Model of Achieving Safe Interoperability of Medical Data in the Private Sector of Health Care in Romania","authors":"M. Rac-Albu, Marius Rac-Albu","doi":"10.12948/issn14531305/23.3.2019.08","DOIUrl":"https://doi.org/10.12948/issn14531305/23.3.2019.08","url":null,"abstract":"The lack of interoperability in the private sector of medical services in Romania represents a big gap in completing a medical file for a patient who uses both private and public medical services. In this article is presented a model of an interoperable medical system in private medical services. This system has standardized medical documents (in conceptions) and interoperable medical documents (using documents interoperability standards). These are two different items, the first ones are referring to gathering the same medical records for all the patients for every medical field (e.g.: cardiology, dermatology etc.) and the second ones are referring to transport standards like HL7/CDA (Health Level 7/Digital Imaging and Communications in Medicine). This new designed system has a big focus on protecting the personal data of the patients by respecting the European Law about personal data sharing (General Data Protection Regulation-GDPR) specially article no. 26 which requires pseudonymization and anonymization of personal da and medical records. [1]","PeriodicalId":53248,"journal":{"name":"Informatica economica","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74550891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An IoT, Virtual Machines and Cloud Computing-based Framework for an Optimal Management of Healthcare Data Collected from a Smart Environment. A Case Study: RO-Smart Ageing Project 基于物联网、虚拟机和云计算的框架,用于从智能环境中收集的医疗保健数据的最佳管理。个案研究:反智能老化计划
Informatica economica Pub Date : 2019-09-30 DOI: 10.12948/issn14531305/23.3.2019.07
Dragos Nicolau, A. Alexandru, M. Ianculescu
{"title":"An IoT, Virtual Machines and Cloud Computing-based Framework for an Optimal Management of Healthcare Data Collected from a Smart Environment. A Case Study: RO-Smart Ageing Project","authors":"Dragos Nicolau, A. Alexandru, M. Ianculescu","doi":"10.12948/issn14531305/23.3.2019.07","DOIUrl":"https://doi.org/10.12948/issn14531305/23.3.2019.07","url":null,"abstract":"Globally, the population is ageing and the number of older people is increasing dramatically. These are challenges for healthcare systems because an increased need for medical assistance is related to ageing. The availability of health-related data and information is a main issue for assessing the health status of seniors, having an important impact on their quality of life. Due to Internet of Things (IoT), cloud computing, smart environment, and virtual machines, the traditional healthcare approaches are replaced by up-to-date (remote) health monitoring systems in smart environments. The paper presents the opportunities provided by such solutions for an appropriate management of older people health related information. RO-SmartAgeing, a remote health monitoring system based on IoT, is presented as a case study with the intention of revealing the rise of the efficiency and the decease of the response time in seniors remote monitoring systems.","PeriodicalId":53248,"journal":{"name":"Informatica economica","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81474556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implementation of Mobile Solutions in Romania's Education System 罗马尼亚教育系统中移动解决方案的实施
Informatica economica Pub Date : 2019-06-30 DOI: 10.12948/issn14531305/23.2.2019.08
R. Ciobanu
{"title":"Implementation of Mobile Solutions in Romania's Education System","authors":"R. Ciobanu","doi":"10.12948/issn14531305/23.2.2019.08","DOIUrl":"https://doi.org/10.12948/issn14531305/23.2.2019.08","url":null,"abstract":"In the light of the technology development nowadays, the society and more specific, the education area is facing new challenges in meeting the learners’ demands. The continuously changing expectations and the ubiquity of the mobile devices in everyday life has led to the apparition of a new modern learning method, the m-learning, whose theoretical approaches will be further analysed, followed by an examination of the advantages and disadvantages for the mobile learners. This paper also investigates the implementation status of mobile solutions on the Romania`s education systems.","PeriodicalId":53248,"journal":{"name":"Informatica economica","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81541592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Comparative Assessment of Obfuscated Ransomware Detection Methods 混淆勒索软件检测方法的比较评估
Informatica economica Pub Date : 2019-06-30 DOI: 10.12948/issn14531305/23.2.2019.05
Sergiu Sechel
{"title":"A Comparative Assessment of Obfuscated Ransomware Detection Methods","authors":"Sergiu Sechel","doi":"10.12948/issn14531305/23.2.2019.05","DOIUrl":"https://doi.org/10.12948/issn14531305/23.2.2019.05","url":null,"abstract":"Ransomware represents a class of malicious applications that encrypts the files of infected system and demands from victims a payment in cryptocurrency in order to receive the decryption key. The mainstream adoption of cryptocurrencies increased the number of ransomware attack. The outbreaks had risen in complexity and received mass-media attention in 2017 when two destructive campaigns crippled companies and institutions around the world. These outbreaks continue at an accelerated pace even though efforts are made to improve the detection and mitigation of ransomware. The purpose of this research is to assess the efficiency of current malware analysis methods and technologies in the detection of ransomware. The experiments presented here were performed using antivirus engines and dynamic malware analysis against live obfuscated ransomware samples.","PeriodicalId":53248,"journal":{"name":"Informatica economica","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74912335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Software Effort Estimation Using Multilayer Perceptron and Long Short Term Memory 基于多层感知器和长短期记忆的软件工作量估计
Informatica economica Pub Date : 2019-06-30 DOI: 10.12948/issn14531305/23.2.2019.07
Eduard-Florin Predescu, A. Stefan, Alexis-Valentin Zaharia
{"title":"Software Effort Estimation Using Multilayer Perceptron and Long Short Term Memory","authors":"Eduard-Florin Predescu, A. Stefan, Alexis-Valentin Zaharia","doi":"10.12948/issn14531305/23.2.2019.07","DOIUrl":"https://doi.org/10.12948/issn14531305/23.2.2019.07","url":null,"abstract":"Software effort estimation is a hot topic for study in the last decades. The biggest challenge for project managers is to meet their goals within the given time limit. Machine learning software can take project management software to a whole new level. The objective of this paper is to show the applicability of using neural network algorithms in software effort estimation for project management. To prove the concept we are using two machine learning algorithms: Multilayer Perceptron (MLP) and Long Short-Term Memory (LSTM). To train and test these machine learning algorithms we are using the Desharnais dataset. The dataset consists of 77 sample projects. From our results we have seen that Multilayer Perceptron algorithm has better performance than Long Short-Term Memory, by having a better determination coefficient for software effort estimation. Our success in implementing a machine learning that can estimate the software effort brings real benefits in the field of project management assisted by computer, further enhancing the ability of a manager to organize the tasks within the time limit of the project. Although, we need to take into consideration that we had a limited dataset that we could use so a real advancement would be to implement and test these algorithms using a real life company as a subject of testing.","PeriodicalId":53248,"journal":{"name":"Informatica economica","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79521125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Web Crawler for Indexing Video e-Learning Resources: A YouTube Case Study 索引视频电子学习资源的网络爬虫:YouTube案例研究
Informatica economica Pub Date : 2019-06-30 DOI: 10.12948/issn14531305/23.2.2019.02
B. Iancu
{"title":"Web Crawler for Indexing Video e-Learning Resources: A YouTube Case Study","authors":"B. Iancu","doi":"10.12948/issn14531305/23.2.2019.02","DOIUrl":"https://doi.org/10.12948/issn14531305/23.2.2019.02","url":null,"abstract":"The main objective of the current paper is to develop and validate an algorithm focused on automatically indexing YouTube e-learning resources about a certain domain of interest. After identifying the keywords specific to the desired domain, a web crawler is developed for evaluating video resources (from the YouTube platform) in terms of relevance for that domain. Once the most relevant video resources are found, they are indexed with the usage of a NER engine applied on their transcripts. In this manner, semantic queries can be used further in order to find exactly the needed information inside these multimedia resources. The crawler will repeat the indexing process daily in order to maintain the repository of semantically indexed videos up to date. The final chapter presents the obtained results together with the validation of the model.","PeriodicalId":53248,"journal":{"name":"Informatica economica","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83308852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smartphones and IoT Security 智能手机和物联网安全
Informatica economica Pub Date : 2019-06-30 DOI: 10.12948/issn14531305/23.2.2019.06
Ioan Adăscăliţei
{"title":"Smartphones and IoT Security","authors":"Ioan Adăscăliţei","doi":"10.12948/issn14531305/23.2.2019.06","DOIUrl":"https://doi.org/10.12948/issn14531305/23.2.2019.06","url":null,"abstract":"Mobile devices (smartphones or IoT devices) threats are all over and come in many ways. Nowadays the number of mobile devices is extremely high and we use them to cover many personal needs like ordering food, buying plane tickets, controlling our home from distance (using IoT devices) and so on. But all of this comes with a cost and that cost is that we have to give personal data to some devices which lead to threats. This paper contains a classification for the threats and vulnerabilities for smartphones and tablets and a short one for IoT devices. Here are described some attack scenarios for IoT and a few representative attacks. As method of research was used a qualitative one by documenting from articles related to this theme, reports realized by companies which operates in this field and other resources.","PeriodicalId":53248,"journal":{"name":"Informatica economica","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87948283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Additional Limit Conditions for Breakout Trading Strategies 突破交易策略的附加限制条件
Informatica economica Pub Date : 2019-06-30 DOI: 10.12948/issn14531305/23.2.2019.03
Cristian Păuna
{"title":"Additional Limit Conditions for Breakout Trading Strategies","authors":"Cristian Păuna","doi":"10.12948/issn14531305/23.2.2019.03","DOIUrl":"https://doi.org/10.12948/issn14531305/23.2.2019.03","url":null,"abstract":"One of the most popular trading methods used in financial markets is the Turtle strategy. Long time passed since the middle of 1983 when Richard Dennis and Bill Eckhardt disputed about whether great traders were born or made. To decide the matter, they recruited and trained some traders (the Turtles) and give them real accounts and a complete trading strategy to see which idea is right. That was a breakout trading strategy, meaning they bought when the price exceeded the maximum 20 or 50 days value, and sold when the price fell below the minimum of the same interval. Since then many changes have occurred in financial markets. Electronic trading was widespread released and financial trading has become accessible to everyone. Algorithmic trading became the significant part of the trading decision systems and highfrequency trading pushed the volatility of the financial markets to new and incredible limits nowadays. The orders are built and sent almost instantly by smart computers using advanced mathematical algorithms. With all these changes there are many questions today regarding the breakouts strategies. Are the Turtle rules still functional? How can the Turtle strategy be automated for algorithmic trading? Are the results comparable with other modern trading strategies? After a short display of the history and the system’s rules, this paper will find some answers to all these questions. We will reveal a method to automate a breakout strategy. More different trading strategies originating from the Turtle rules will be presented. A mathematical model to build the trading signals will be described in order to automate the trading process. It was found that all of these rules have a positive expectancy when they are combined with modern limit conditions. The paper will also include trading results obtained with the methods presented in order to compare and to analyze this capital investment methodology adapted especially for algorithmic trading.","PeriodicalId":53248,"journal":{"name":"Informatica economica","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78483150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信