首页 > 最新文献

Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces最新文献

英文 中文
Computer-aided OSPF network design tool 计算机辅助OSPF网络设计工具
Pavel Kríz, Filip Malý
This article deals with an experimental version of the software used to visualize the network, provide the possibility to simulate topological and configuration changes, analyze and redesign the network. This tool was successfully deployed in the HKFree community wireless network, consisting of a large number of routers that use the OSPF routing protocol. Its primary purpose is to assist the network administrators in solving problems, creating and maintaining documentation and designing future changes.
本文讨论了一个实验版本的软件,用于可视化网络,提供了模拟拓扑和配置变化,分析和重新设计网络的可能性。此工具已成功部署在HKFree社区无线网络中,该网络由大量使用OSPF路由协议的路由器组成。它的主要目的是帮助网络管理员解决问题、创建和维护文档以及设计未来的更改。
{"title":"Computer-aided OSPF network design tool","authors":"Pavel Kríz, Filip Malý","doi":"10.2498/iti.2012.0371","DOIUrl":"https://doi.org/10.2498/iti.2012.0371","url":null,"abstract":"This article deals with an experimental version of the software used to visualize the network, provide the possibility to simulate topological and configuration changes, analyze and redesign the network. This tool was successfully deployed in the HKFree community wireless network, consisting of a large number of routers that use the OSPF routing protocol. Its primary purpose is to assist the network administrators in solving problems, creating and maintaining documentation and designing future changes.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127845013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cross-lingual document similarity 跨语言文档相似度
A. Muhic, Jan Rupnik, P. Skraba
In this paper we investigated how to compute similarities between documents written in different languages based on a weekly aligned multi-lingual collection of documents. Computing the cross-lingual similarities is based on an aligned set of basis vectors obtained by either latent semantic indexing or the k-means algorithm on an aligned multi-lingual corpus. We evaluated the methods on two data sets: Wikipedia and European Parliament Proceedings Parallel Corpus.
在本文中,我们研究了如何基于每周对齐的多语言文档集合计算用不同语言编写的文档之间的相似性。跨语言相似度的计算基于一组对齐的基向量,这些基向量是通过潜在语义索引或k-means算法在对齐的多语言语料库上获得的。我们在两个数据集上评估了这些方法:维基百科和欧洲议会会议并行语料库。
{"title":"Cross-lingual document similarity","authors":"A. Muhic, Jan Rupnik, P. Skraba","doi":"10.2498/iti.2012.0467","DOIUrl":"https://doi.org/10.2498/iti.2012.0467","url":null,"abstract":"In this paper we investigated how to compute similarities between documents written in different languages based on a weekly aligned multi-lingual collection of documents. Computing the cross-lingual similarities is based on an aligned set of basis vectors obtained by either latent semantic indexing or the k-means algorithm on an aligned multi-lingual corpus. We evaluated the methods on two data sets: Wikipedia and European Parliament Proceedings Parallel Corpus.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115928617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
E-learning participation in higher education: A study of Scottish and Croatian students 高等教育中的电子学习参与:对苏格兰和克罗地亚学生的研究
K. Penny, D. Dukic
E-learning is becoming increasingly important in higher education. Information was gathered on students' usage of e-learning activities in Scotland and in Croatia. An exploratory factor analysis reveals four underlying factors which may be used to classify the different types of e-learning activities, and logistic regression modelling was used to identify which student characteristics were associated with each of the different classifications of e-learning. These findings provide an insight into the different usages of e-learning activities, each of which should be considered individually in terms of design and management of e-learning systems, and in the provision of training for staff and students.
网络学习在高等教育中变得越来越重要。收集了关于苏格兰和克罗地亚学生使用电子学习活动的信息。探索性因素分析揭示了可用于对不同类型的电子学习活动进行分类的四个潜在因素,并使用逻辑回归模型来确定哪些学生特征与每种不同类型的电子学习相关。这些发现提供了对电子学习活动的不同用法的见解,在电子学习系统的设计和管理以及为员工和学生提供培训方面,每种用法都应该单独考虑。
{"title":"E-learning participation in higher education: A study of Scottish and Croatian students","authors":"K. Penny, D. Dukic","doi":"10.2498/cit.1002095","DOIUrl":"https://doi.org/10.2498/cit.1002095","url":null,"abstract":"E-learning is becoming increasingly important in higher education. Information was gathered on students' usage of e-learning activities in Scotland and in Croatia. An exploratory factor analysis reveals four underlying factors which may be used to classify the different types of e-learning activities, and logistic regression modelling was used to identify which student characteristics were associated with each of the different classifications of e-learning. These findings provide an insight into the different usages of e-learning activities, each of which should be considered individually in terms of design and management of e-learning systems, and in the provision of training for staff and students.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115588823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Mixnets: Implementation and performance evaluation of decryption and re-encryption types Mixnets:解密和再加密类型的实现和性能评估
Pance Ribarski, Ljupcho Antovski
The anonymous channels have been the essence of numerous protocols that include anonymous message passing between peers. The mixnet structure is one way to accomplish the anonymity. Since the publication of the Chaumian mixnet, there have been many practical implementations. There are two main approaches to implement mixnets: the decryption (Chaumian) and the re-encryption mixnets. In this paper we analyze four types of mixnets, from which one decryption and three re-encryption types. They were implemented in the Java programing language and evaluated on several criterias as: the number of messages, the total number of nodes, the number of threshold nodes, and the key length of underlying crypto system. In the results section we compare the results from the practical tests to answer the research question, which type of mixnets has better features.
匿名通道一直是许多协议的本质,这些协议包括在对等点之间传递匿名消息。mixnet结构是实现匿名的一种方法。自从Chaumian mixnet发布以来,已经有了许多实际的实现。有两种实现mixnets的主要方法:解密(Chaumian)和重新加密mixnets。本文分析了四种类型的混合网络,其中有一种解密类型和三种再加密类型。它们是用Java编程语言实现的,并根据以下几个标准进行评估:消息数量、节点总数、阈值节点数量和底层加密系统的密钥长度。在结果部分,我们比较了实际测试的结果,以回答研究问题,哪种类型的mixnets具有更好的功能。
{"title":"Mixnets: Implementation and performance evaluation of decryption and re-encryption types","authors":"Pance Ribarski, Ljupcho Antovski","doi":"10.2498/cit.1002101","DOIUrl":"https://doi.org/10.2498/cit.1002101","url":null,"abstract":"The anonymous channels have been the essence of numerous protocols that include anonymous message passing between peers. The mixnet structure is one way to accomplish the anonymity. Since the publication of the Chaumian mixnet, there have been many practical implementations. There are two main approaches to implement mixnets: the decryption (Chaumian) and the re-encryption mixnets. In this paper we analyze four types of mixnets, from which one decryption and three re-encryption types. They were implemented in the Java programing language and evaluated on several criterias as: the number of messages, the total number of nodes, the number of threshold nodes, and the key length of underlying crypto system. In the results section we compare the results from the practical tests to answer the research question, which type of mixnets has better features.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115844062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Proactive personalized mobile multi-blogging service on smart-M3 smart-M3主动个性化移动多博客服务
D. Korzun, I. Galov, S. Balandin
This paper discusses the project targeted in development of proactive, personalized and composite services for the blogosphere. By applying the smart spaces paradigm we have developed an approach for composition of blog spaces. We contribute formal technique for construction of proactive and personalized service for bloggers as well as for its integration with external applications. The proposed technique is implemented in SmartScribo application on top of the Smart-M3 platform. The developed prototype solution has confirmed that the approach results in services with the next quality level.
本文讨论了为博客圈开发主动、个性化和复合服务的项目。通过应用智能空间范例,我们开发了一种博客空间组合的方法。我们提供正式的技术来构建主动的、个性化的博客服务,以及与外部应用程序的集成。该技术在Smart-M3平台上的SmartScribo应用程序中实现。开发的原型解决方案已经证实,该方法产生了具有下一个质量级别的服务。
{"title":"Proactive personalized mobile multi-blogging service on smart-M3","authors":"D. Korzun, I. Galov, S. Balandin","doi":"10.2498/cit.1002094","DOIUrl":"https://doi.org/10.2498/cit.1002094","url":null,"abstract":"This paper discusses the project targeted in development of proactive, personalized and composite services for the blogosphere. By applying the smart spaces paradigm we have developed an approach for composition of blog spaces. We contribute formal technique for construction of proactive and personalized service for bloggers as well as for its integration with external applications. The proposed technique is implemented in SmartScribo application on top of the Smart-M3 platform. The developed prototype solution has confirmed that the approach results in services with the next quality level.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125087564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Analysis of EAP-FAST protocol EAP-FAST协议分析
Bakytbek Eshmurzaev, G. Dalkılıç
One of the core security concepts of Wireless LAN is the authentication. An 802.1X/EAP framework allows a variety of specific methods to be used for the authentication. Certificate-based authentication methods provide strong security as well as allow shared key-based methods to be used. This paper analyzes wide deployed TLS-based EAP protocols defined in RFCs, used in WLAN. We mainly focus on the EAP-FAST protocol because it differs from other TLS-based EAP types on using shared secret keys instead of certificates, thus significantly increasing performance. We validated different authentication scenarios of EAP-FAST protocol using AVISPA model checker.
认证是无线局域网安全的核心概念之一。802.1X/EAP框架允许使用各种特定方法进行身份验证。基于证书的身份验证方法提供了强大的安全性,并允许使用基于共享密钥的方法。本文分析了在无线局域网中广泛使用的rfc中定义的基于tls的EAP协议。我们主要关注EAP- fast协议,因为它与其他基于tls的EAP类型不同,它使用共享密钥而不是证书,从而显著提高了性能。利用AVISPA模型检查器对EAP-FAST协议的不同认证场景进行了验证。
{"title":"Analysis of EAP-FAST protocol","authors":"Bakytbek Eshmurzaev, G. Dalkılıç","doi":"10.2498/iti.2012.0429","DOIUrl":"https://doi.org/10.2498/iti.2012.0429","url":null,"abstract":"One of the core security concepts of Wireless LAN is the authentication. An 802.1X/EAP framework allows a variety of specific methods to be used for the authentication. Certificate-based authentication methods provide strong security as well as allow shared key-based methods to be used. This paper analyzes wide deployed TLS-based EAP protocols defined in RFCs, used in WLAN. We mainly focus on the EAP-FAST protocol because it differs from other TLS-based EAP types on using shared secret keys instead of certificates, thus significantly increasing performance. We validated different authentication scenarios of EAP-FAST protocol using AVISPA model checker.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115041842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A framework for semantic enrichment of sensor data 传感器数据语义丰富的框架
Alexandra Moraru, D. Mladenić
The increased interest in sensing the environment in which we live has led to the deployment of thousands of sensors which can measure and report its status. In order to raise the impact that sensor networks can have, improving the usability and accessibility of the measurements they provide is an important step. The problem addressed in this paper is that of enrichment of sensor descriptions and measurements in order to provide richer data, i.e., data containing more meaning. We propose a framework for automatizing the process of semantically enriching sensor descriptions and measurements with the purpose of improving the usability and accessibility of sensor data.
人们对感知我们所生活的环境越来越感兴趣,这导致了数千个传感器的部署,这些传感器可以测量和报告环境的状态。为了提高传感器网络的影响,提高它们提供的测量的可用性和可访问性是重要的一步。本文解决的问题是丰富传感器的描述和测量,以提供更丰富的数据,即数据包含更多的含义。我们提出了一个框架,用于自动化语义丰富的传感器描述和测量过程,以提高传感器数据的可用性和可访问性。
{"title":"A framework for semantic enrichment of sensor data","authors":"Alexandra Moraru, D. Mladenić","doi":"10.2498/cit.1002093","DOIUrl":"https://doi.org/10.2498/cit.1002093","url":null,"abstract":"The increased interest in sensing the environment in which we live has led to the deployment of thousands of sensors which can measure and report its status. In order to raise the impact that sensor networks can have, improving the usability and accessibility of the measurements they provide is an important step. The problem addressed in this paper is that of enrichment of sensor descriptions and measurements in order to provide richer data, i.e., data containing more meaning. We propose a framework for automatizing the process of semantically enriching sensor descriptions and measurements with the purpose of improving the usability and accessibility of sensor data.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"50 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130168104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Corporate IT Risk Management model: A holistic view at managing information system security risks 企业IT风险管理模型:管理信息系统安全风险的整体视图
M. Spremić
Most organizations in all sectors of industry, commerce and government are fundamentally dependent on their information systems (IS) and would quickly cease to function should the technology (preferably information technology - IT) that underpins their activities ever come to halt [15]. IS and IT may contribute towards efficiency, productivity and competitiveness improvements of both inter-organizational and intra-organizational systems [1]. Successful organizations manage IT function in much the same way that they manage their other strategic functions and processes. This in particular means that they understand and manage risks associated with growing IT opportunities as well as critical dependence of many business processes on IT and vice-versa. IT risk management issues are not only any more marginal or `technical' problems and become more and more a `business problem'. Therefore, in this paper a Corporate IT Risk Management model is proposed and contemporary frameworks of IT Governance and IS Audit is shown and explained.
工业、商业和政府的所有部门中的大多数组织都从根本上依赖于它们的信息系统(IS),如果支撑它们活动的技术(最好是信息技术- IT)停止工作,它们将很快停止工作。信息系统和信息技术可能有助于提高组织间和组织内系统的效率、生产力和竞争力。成功的组织管理IT功能的方式与管理其他战略功能和过程的方式大致相同。这特别意味着他们理解并管理与不断增长的IT机会以及许多业务流程对IT的关键依赖相关的风险,反之亦然。IT风险管理问题不仅仅是一个边缘或“技术”问题,而且越来越成为一个“业务问题”。因此,本文提出了一个企业IT风险管理模型,并展示和解释了当代IT治理和IT审计框架。
{"title":"Corporate IT Risk Management model: A holistic view at managing information system security risks","authors":"M. Spremić","doi":"10.2498/iti.2012.0461","DOIUrl":"https://doi.org/10.2498/iti.2012.0461","url":null,"abstract":"Most organizations in all sectors of industry, commerce and government are fundamentally dependent on their information systems (IS) and would quickly cease to function should the technology (preferably information technology - IT) that underpins their activities ever come to halt [15]. IS and IT may contribute towards efficiency, productivity and competitiveness improvements of both inter-organizational and intra-organizational systems [1]. Successful organizations manage IT function in much the same way that they manage their other strategic functions and processes. This in particular means that they understand and manage risks associated with growing IT opportunities as well as critical dependence of many business processes on IT and vice-versa. IT risk management issues are not only any more marginal or `technical' problems and become more and more a `business problem'. Therefore, in this paper a Corporate IT Risk Management model is proposed and contemporary frameworks of IT Governance and IS Audit is shown and explained.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125101581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Prolonging the lifetime of wireless sensor networks by hierarchical organization of the system in clusters with unequal sizes 利用不等大小集群的分层组织方式延长无线传感器网络的生存期
P. Zahariev, Georgi V. Hristov, Ivanka D. Tsvetkova
Wireless sensor networks are a new type of telecommunication networks with many areas of implementation. These systems are known for their many advantages and few disadvantages. This paper investigates one of the biggest problems in this research field - the unequal energy dissipation and the unequal lifetime of the sensor motes. In order to solve this problem, first the standard approach for hierarchical organization of the networks is analyzed and then a solution for solving of this problem is proposed. Simulation models of wireless sensor networks are created using MatLAB, and the results of the evaluation of the new approach are compared to the results obtained by the standard one.
无线传感器网络是一种新型的通信网络,具有广泛的应用领域。这些系统以优点多缺点少而著称。本文研究了该研究领域中最大的问题之一——传感器粒子的能量耗散不均匀和寿命不均匀。为了解决这一问题,首先分析了网络分层组织的标准方法,然后提出了解决这一问题的方法。利用MatLAB建立了无线传感器网络的仿真模型,并将新方法的评价结果与标准方法的评价结果进行了比较。
{"title":"Prolonging the lifetime of wireless sensor networks by hierarchical organization of the system in clusters with unequal sizes","authors":"P. Zahariev, Georgi V. Hristov, Ivanka D. Tsvetkova","doi":"10.2498/iti.2012.0465","DOIUrl":"https://doi.org/10.2498/iti.2012.0465","url":null,"abstract":"Wireless sensor networks are a new type of telecommunication networks with many areas of implementation. These systems are known for their many advantages and few disadvantages. This paper investigates one of the biggest problems in this research field - the unequal energy dissipation and the unequal lifetime of the sensor motes. In order to solve this problem, first the standard approach for hierarchical organization of the networks is analyzed and then a solution for solving of this problem is proposed. Simulation models of wireless sensor networks are created using MatLAB, and the results of the evaluation of the new approach are compared to the results obtained by the standard one.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127111485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of on-line survey about need for presence of higher education institutions on social networks: A step towards creation of communication strategy 高等教育机构在社交网络上存在需求的在线调查分析:迈向传播策略制定的一步
Kruno Golubic, Jadranka Lasić-Lazić
The use of social networks among higher education institutions in Croatia is not widespread. An anonymous on-line survey about the importance of institutional presence on social networks was conducted during a ten-day period in May 2011 and included a questionnaire which was distributed to students and employees of two Zagreb based institutions. The results of the survey are interpreted and presented in this paper. These results can be used as a general guideline toward the creation of communication strategy for the presence of higher education institutions on web based social networks.
在克罗地亚的高等教育机构中,社会网络的使用并不普遍。2011年5月进行了为期十天的匿名在线调查,调查内容是机构在社交网络上存在的重要性,其中包括一份问卷,分发给萨格勒布两所机构的学生和雇员。本文对调查结果进行了解释和介绍。这些结果可以作为创建基于web的社交网络上高等教育机构存在的沟通策略的一般指导方针。
{"title":"Analysis of on-line survey about need for presence of higher education institutions on social networks: A step towards creation of communication strategy","authors":"Kruno Golubic, Jadranka Lasić-Lazić","doi":"10.2498/cit.1002096","DOIUrl":"https://doi.org/10.2498/cit.1002096","url":null,"abstract":"The use of social networks among higher education institutions in Croatia is not widespread. An anonymous on-line survey about the importance of institutional presence on social networks was conducted during a ten-day period in May 2011 and included a questionnaire which was distributed to students and employees of two Zagreb based institutions. The results of the survey are interpreted and presented in this paper. These results can be used as a general guideline toward the creation of communication strategy for the presence of higher education institutions on web based social networks.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130039128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1