2,918 research outputs found

    SMART CARDS - UTILITY, APPLICATIONS AND VULNERABILITIES

    Get PDF
    The Internet has taken its place beside the telephone and television as an important part of people’s lives. Consumers use the Internet to shop, bank and invest online. Most consumers use credit or debit cards to pay for online purchases, but other payment methods, like “e-wallets,” are becoming more common. But not all the payments are safe there are a lot of fake sites, hackers, viruses.smart cards, e-payment, vulnerabilities, security

    Audit for Information Systems Security

    Get PDF
    The information and communication technologies advances made available enormous and vast amounts of information. This availability generates also significant risks to computer systems, information and to the critical operations and infrastructures they support. In spite of significant advances in the information security area many information systems are still vulnerable to inside or outside attacks. The existence of an internal audit for information system security increases the probability of adopting adequate security measures and preventing these attacks or lowering the negative consequences. The paper presents an exploratory study on informatics audit for information systems security.Information System Risks, Audit, Security

    Exploring Multimedia Web Conferencing

    Get PDF
    Internet changed the perspective on meetings and also on decision making processes. Virtualization of meetings has become a common way for collaboration among employees, customers, partners, trainees and trainers, etc. Web conferencing allows the collaboration between teams' members to achieve common goals. Without the need of travelling and meeting organization, the web conferencing applications permit the participation of people from different location. Web conferencing applications are multimedia systems that allow various remote collaborations with multiple types of resources. The paper presents an exploratory study on multimedia web conferencing systems, its advantages and disadvantages and also a use case, meant to highlight several of this technology benefits and problems.multimedia web conferencing, web collaboration, virtual teams, decision support

    Evolution of Decision Support Systems Research Field in Numbers

    Get PDF
    The scientific production in a certain field shows, in great extent, the research interests in that field. Decision Support Systems are a particular class of information systems which are gaining more popularity in various domains. In order to identify the evolution in time of the publications number, authors, subjects, publications in the Decision Support Systems (DSS) field, and therefore the scientific world interest for this field, in November 2010 there have been organized a series of queries on three major international scientific databases: ScienceDirect, IEEE Xplore Digital Library and ACM Digital Library. The results presented in this paper shows that, even the decision support systems research field started in 1960s, the interests for this type of systems grew exponentially with each year in the last decades.DSS, Numbers, Research, Materials

    AN ECONOMETRICAL MODEL FOR CALCULATING THE ROMANIAN GROSS DOMESTIC PRODUCT

    Get PDF
    This article analyzes the possibility of determining the Romanian Gross Domestic Product on the basis of a linear model, based on macroeconomic indicators such as unemployment, inflation, exchange rate. The proposed solution allows forecasting the Gross Domestic Product for the following period of time based on equation determined from the model in order to develop scenarios for improving the macroeconomic situation of Romania. The article also can be a starting point in the field of strategic investments, both at macro and micro level. Any foreign investor, before starting a business in another country, calculated and also made predictions about the economic situation of that country, in order not to lose the investment made.regression, GDP, inflation, unemployment, forecast

    CLASSIFICATION OF EUROPEAN UNION COUNTRIES FROM DATA MINING POINT OF VIEW, USING SAS ENTERPRISE GUIDE

    Get PDF
    With the development of computers and the increasing the amount of data it appeared the need of identifying new acquaintances, unknown until that moment in a relatively short time. The term of data mining involves the analysis of data from different views (aspects) in order to extract the knowledge to use them further in the foundation of decisions at microeconomic or macroeconomic levels. In this article we apply data analysis techniques such as principal component analysis and cluster analysis in order to group the countries of the European Union based on the financial indicators registered at the end of 2009 year.classification, cluster, data mining, European Union, financial indicators

    Logistic kinetic model for dichlorinated polyaromatic hydrocarbons (PAHs) activity in cancer signaling

    Get PDF
    The logistic kinetics model of quantitative structure-activity relationships was here implemented for modeling the depletion of the CIPAHs in MCF-7 cells; it was found that the best statistical performances are given by polarizability, electronegativity and hydrophobicity within density functional framework, through a mono-linear Spectra-SAR analysis

    The competition between tourist destinations and its influence upon the tourism development level of the county-seat cities of the North-East Development Region

    Get PDF
    oai:ojs.85.122.19.241:article/383The need to identify the tourism development level of a destination lies in the desire to become aware of its position in the evolutionary stage and to determine the aspects to be exploited in order to increase its performance. The model of the tourism area lifecycle developed by Butler supports this idea. However, there are difficulties in correctly assessing the stage of evolution in the comparative analysis of several destinations characterized by different economic development levels, despite the similar tourist potential. The paper aims to determine a method of assessing the current life cycle of the 6 analysed destinations on the basis of synthetic indicators, as well as assessing the extent to which the potential competition between the 6 destinations considered may be a factor of influence on the life cycle stage. The result of the study highlights the ability of competition to represent an impulsive advancement factor to a higher level of development. However, the level of competition between the 6 analyzed cities is not strong enough to influence the life cycle of the destinations under the conditions of an early stage of their tourist development. It has been distinguished three levels of competition between the 6 tourist destinations, which have proved to have a different impact on their position as a stage of the life cycle. Also, as a final result, the positioning of the 6 destinations in the corresponding stages of Butler's model is noted, having considered a series of  performance indicators as a reference point

    Audit for Information Systems Security

    Get PDF
    The information and communication technologies advances made available enormous and vast amounts of information. This availability generates also significant risks to computer systems, information and to the critical operations and infrastructures they support. In spite of significant advances in the information security area many information systems are still vulnerable to inside or outside attacks. The existence of an internal audit for information system security increases the probability of adopting adequate security measures and preventing these attacks or lowering the negative consequences. The paper presents an exploratory study on informatics audit for information systems security
    • …
    corecore