This paper presents a DSDEVS-based model “Dynamic Structure Discrete Event System specification” for modeling and simulating business processes with dynamic structure regarding to different contexts. Consequently, this model, formally, improves the reuse of configurable business processes. Thus, the proposed model allows the analysts to personalize their configurable business processes in a sound manner by verifying a set of structure properties, such as, the lack of synchronization and the deadlock by means of simulation. The implementation was done in DEVS-Suite simulator, which is based on DEVSJAVA models.
{"title":"A DSDEVS-Based Model for Verifying Structural Constraints in Dynamic Business Processes","authors":"Sofiane Boukelkoul, R. Maamri","doi":"10.31341/jios.44.2.4","DOIUrl":"https://doi.org/10.31341/jios.44.2.4","url":null,"abstract":"This paper presents a DSDEVS-based model “Dynamic Structure Discrete Event System specification” for modeling and simulating business processes with dynamic structure regarding to different contexts. Consequently, this model, formally, improves the reuse of configurable business processes. Thus, the proposed model allows the analysts to personalize their configurable business processes in a sound manner by verifying a set of structure properties, such as, the lack of synchronization and the deadlock by means of simulation. The implementation was done in DEVS-Suite simulator, which is based on DEVSJAVA models.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"44 1","pages":"257-273"},"PeriodicalIF":0.6,"publicationDate":"2020-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41430527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper focuses on design, background and experimental results of real environment of DDoS attacks. The experimental testbed is based on employment of a tool for IT automation to perform DDoS attacks under monitoring. DDoS attacks are still serious threat in both IPv4 and IPv6 networks and creation of simple tool to test the network for DDoS attack and to allow evaluation of vulnerabilities and DDoS countermeasures of the networks is necessary. In proposed testbed, Ansible orchestration tool is employed to perform and coordinate DDoS attacks. Ansible is a powerful tool and simplifies the implementation of the test environment. Moreover, no special hardware is required for the attacks execution, the testbed uses existing infrastructure in an organization. The case study of implementation of this environment shows straightforwardness to create a testbed comparable with a botnet with ten thousand bots. Furthermore, the experimental results demonstrate the potential of the proposed environment and present the impact of the attacks on particular target servers in IPv4 and IPv6 networks.
{"title":"Controlled DDoS Attack on IPv4/IPv6 Network Using Distributed Computing Infrastructure","authors":"M. Cernanský, L. Huraj, M. Šimon","doi":"10.31341/jios.44.2.6","DOIUrl":"https://doi.org/10.31341/jios.44.2.6","url":null,"abstract":"The paper focuses on design, background and experimental results of real environment of DDoS attacks. The experimental testbed is based on employment of a tool for IT automation to perform DDoS attacks under monitoring. DDoS attacks are still serious threat in both IPv4 and IPv6 networks and creation of simple tool to test the network for DDoS attack and to allow evaluation of vulnerabilities and DDoS countermeasures of the networks is necessary. In proposed testbed, Ansible orchestration tool is employed to perform and coordinate DDoS attacks. Ansible is a powerful tool and simplifies the implementation of the test environment. Moreover, no special hardware is required for the attacks execution, the testbed uses existing infrastructure in an organization. The case study of implementation of this environment shows straightforwardness to create a testbed comparable with a botnet with ten thousand bots. Furthermore, the experimental results demonstrate the potential of the proposed environment and present the impact of the attacks on particular target servers in IPv4 and IPv6 networks.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"44 1","pages":"297-316"},"PeriodicalIF":0.6,"publicationDate":"2020-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46686157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Ayub, Oscar Karnalim, Laurentius Risal, M. Wijanto
A study shows that pair programming can help slow-paced students in completing Introductory Programming assessment. This paper replicates the study on Data Structure course, in which the completion of the assessments does not only rely on logic but also theoretical knowledge. The aim is to check whether pair programming is still helpful on such new assessment characteristics. Three classes of Data Structure course with 14 teaching weeks and a total of 72 undergraduate students are considered in this study. Two of the classes are about Basic Data Structure while another one is the advanced one. Our evaluation shows that pair programming can help slow-paced students in both pair and individual academic performance. It also increases overall academic performance if the tasks are more logic oriented. Nevertheless, no benefits provided for fast-paced students paired to the slow-paced ones, even though all students appreciate the use of pair programming.
{"title":"The Impact of Pair Programming on the Performance of Slow-Paced Students","authors":"M. Ayub, Oscar Karnalim, Laurentius Risal, M. Wijanto","doi":"10.31341/jios.44.2.1","DOIUrl":"https://doi.org/10.31341/jios.44.2.1","url":null,"abstract":"A study shows that pair programming can help slow-paced students in completing Introductory Programming assessment. This paper replicates the study on Data Structure course, in which the completion of the assessments does not only rely on logic but also theoretical knowledge. The aim is to check whether pair programming is still helpful on such new assessment characteristics. Three classes of Data Structure course with 14 teaching weeks and a total of 72 undergraduate students are considered in this study. Two of the classes are about Basic Data Structure while another one is the advanced one. Our evaluation shows that pair programming can help slow-paced students in both pair and individual academic performance. It also increases overall academic performance if the tasks are more logic oriented. Nevertheless, no benefits provided for fast-paced students paired to the slow-paced ones, even though all students appreciate the use of pair programming.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"44 1","pages":"211-229"},"PeriodicalIF":0.6,"publicationDate":"2020-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45714756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Karlo Babić, F. Guerra, Sanda Martinčić-Ipšić, A. Meštrović
Measuring the semantic similarity of texts has a vital role in various tasks from the field of natural language processing. In this paper, we describe a set of experiments we carried out to evaluate and compare the performance of different approaches for measuring the semantic similarity of short texts. We perform a comparison of four models based on word embeddings: two variants of Word2Vec (one based on Word2Vec trained on a specific dataset and the second extending it with embeddings of word senses), FastText, and TF-IDF. Since these models provide word vectors, we experiment with various methods that calculate the semantic similarity of short texts based on word vectors. More precisely, for each of these models, we test five methods for aggregating word embeddings into text embedding. We introduced three methods by making variations of two commonly used similarity measures. One method is an extension of the cosine similarity based on centroids, and the other two methods are variations of the Okapi BM25 function. We evaluate all approaches on the two publicly available datasets: SICK and Lee in terms of the Pearson and Spearman correlation. The results indicate that extended methods perform better from the original in most of the cases.
{"title":"A Comparison of Approaches for Measuring the Semantic Similarity of Short Texts Based on Word Embeddings","authors":"Karlo Babić, F. Guerra, Sanda Martinčić-Ipšić, A. Meštrović","doi":"10.31341/jios.44.2.2","DOIUrl":"https://doi.org/10.31341/jios.44.2.2","url":null,"abstract":"Measuring the semantic similarity of texts has a vital role in various tasks from the field of natural language processing. In this paper, we describe a set of experiments we carried out to evaluate and compare the performance of different approaches for measuring the semantic similarity of short texts. We perform a comparison of four models based on word embeddings: two variants of Word2Vec (one based on Word2Vec trained on a specific dataset and the second extending it with embeddings of word senses), FastText, and TF-IDF. Since these models provide word vectors, we experiment with various methods that calculate the semantic similarity of short texts based on word vectors. More precisely, for each of these models, we test five methods for aggregating word embeddings into text embedding. We introduced three methods by making variations of two commonly used similarity measures. One method is an extension of the cosine similarity based on centroids, and the other two methods are variations of the Okapi BM25 function. We evaluate all approaches on the two publicly available datasets: SICK and Lee in terms of the Pearson and Spearman correlation. The results indicate that extended methods perform better from the original in most of the cases.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"44 1","pages":"231-246"},"PeriodicalIF":0.6,"publicationDate":"2020-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46637142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nowadays the IT market is enriched with free Open Source Web Content Systems offers that are available to all users. No system is perfect, and some of them have better solutions in one segment but are more vulnerable in others and vice versa, all in order to be more user-friendly. The most common form of Content Management System (CMS) implemented on the Internet today is the Web Content Management System(WCMS). This solution includes numerous advantages for site administrators as well as communication with the site designer for all users in order to improve the content, through written remarks, opinions and evaluations of the site content, resulting in a more dynamic and interactive site. This modern approach offers users with a poor IT background the opportunity to be independent and creative in creating their own website. In this paper we present data collected from several websites monitored for various cyber-attacks. Moreover, we will describe and analyze security challenges that follow cyber-attacks. During the monitoring process we followed 15 web addresses over a period of nine months and collected 520 reports of various cyber-attacks. The following analysis presents the different kinds of attacks, their frequency and some of the ways to reduce cyber-attacks to the lowest possible level.
{"title":"Security Challenges Behind the Development and Increased Use of Open Source Web Content Management Systems","authors":"D. Viduka, V. Kraguljac, Igor Lavrnić","doi":"10.31341/jios.44.1.9","DOIUrl":"https://doi.org/10.31341/jios.44.1.9","url":null,"abstract":"Nowadays the IT market is enriched with free Open Source Web Content Systems offers that are available to all users. No system is perfect, and some of them have better solutions in one segment but are more vulnerable in others and vice versa, all in order to be more user-friendly. The most common form of Content Management System (CMS) implemented on the Internet today is the Web Content Management System(WCMS). This solution includes numerous advantages for site administrators as well as communication with the site designer for all users in order to improve the content, through written remarks, opinions and evaluations of the site content, resulting in a more dynamic and interactive site. This modern approach offers users with a poor IT background the opportunity to be independent and creative in creating their own website. In this paper we present data collected from several websites monitored for various cyber-attacks. Moreover, we will describe and analyze security challenges that follow cyber-attacks. During the monitoring process we followed 15 web addresses over a period of nine months and collected 520 reports of various cyber-attacks. The following analysis presents the different kinds of attacks, their frequency and some of the ways to reduce cyber-attacks to the lowest possible level.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"1 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44759249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Agile practices are activities or actions that are utilized during software development to improve the quality and productivity of the resulting software. Those practices are influenced by a set of factors that affect the realization of their objectives. The purpose of this study is to determine the influence of organizational factors and the personnel working on the software development project to the agile practices. To this end, a model has been proposed that is composed of six critical success factors derived from the theories of administrative and human behavior and four groups of agile practices, and resulted in identifying 13 factor-practice relationships. The results from 146 questionnaires addressed to individuals involved in the software development process show that the factors of Confidence, Perception of Self-efficacy, Integrity and Availability of the Information and Experiences Learned, and Media Used all have a noteworthy positive influence on teamwork agile practices.
{"title":"Identifying Factors Influencing on Agile Practices for Software Development","authors":"Gloria Arcos-Medina, D. Mauricio","doi":"10.31341/jios.44.1.1","DOIUrl":"https://doi.org/10.31341/jios.44.1.1","url":null,"abstract":"Agile practices are activities or actions that are utilized during software development to improve the quality and productivity of the resulting software. Those practices are influenced by a set of factors that affect the realization of their objectives. The purpose of this study is to determine the influence of organizational factors and the personnel working on the software development project to the agile practices. To this end, a model has been proposed that is composed of six critical success factors derived from the theories of administrative and human behavior and four groups of agile practices, and resulted in identifying 13 factor-practice relationships. The results from 146 questionnaires addressed to individuals involved in the software development process show that the factors of Confidence, Perception of Self-efficacy, Integrity and Availability of the Information and Experiences Learned, and Media Used all have a noteworthy positive influence on teamwork agile practices.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.31341/jios.44.1.1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48231455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Machine translation is increasingly becoming a hot research topic in information and communication sciences, computer science and computational lingui
机器翻译正日益成为信息与通信科学、计算机科学和计算语言学的研究热点
{"title":"Machine Translation System for the Industry Domain and Croatian Language","authors":"I. Dunđer","doi":"10.31341/jios.44.1.2","DOIUrl":"https://doi.org/10.31341/jios.44.1.2","url":null,"abstract":"Machine translation is increasingly becoming a hot research topic in information and communication sciences, computer science and computational lingui","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"44 1","pages":"33-50"},"PeriodicalIF":0.6,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48515322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Marwan, Abdelkarim Ait Temghart, Fatima Sifou, F. Alshahwan
Cloud computing is an easy-to-use, affordable solution to manage and analyze medical data. Therefore, this paradigm has gained wide acceptance in the healthcare sector as a cost-efficient way for a successful Electronic Medical Records (EMR) implementation. Cloud technology is, however, subject to increasing criticism because of the numerous security vulnerabilities. In this regard, we propose a framework to protect confidential data through the development of new security measures, including compression, secret share scheme and XOR operation. The primary objective of the proposal is to achieve the right balance between security and usability. To this aim, we divide an image into several blocks and then encrypt each piece separately with different cryptographic keys. To enhance privacy and performance, we suggest DepSky architecture to keep data on various storage nodes. Simulation experiments have been conducted to prove the effectiveness of the proposed methodology.
{"title":"A Cloud Solution for Securing Medical Image Storage","authors":"M. Marwan, Abdelkarim Ait Temghart, Fatima Sifou, F. Alshahwan","doi":"10.31341/jios.44.1.5","DOIUrl":"https://doi.org/10.31341/jios.44.1.5","url":null,"abstract":"Cloud computing is an easy-to-use, affordable solution to manage and analyze medical data. Therefore, this paradigm has gained wide acceptance in the healthcare sector as a cost-efficient way for a successful Electronic Medical Records (EMR) implementation. Cloud technology is, however, subject to increasing criticism because of the numerous security vulnerabilities. In this regard, we propose a framework to protect confidential data through the development of new security measures, including compression, secret share scheme and XOR operation. The primary objective of the proposal is to achieve the right balance between security and usability. To this aim, we divide an image into several blocks and then encrypt each piece separately with different cryptographic keys. To enhance privacy and performance, we suggest DepSky architecture to keep data on various storage nodes. Simulation experiments have been conducted to prove the effectiveness of the proposed methodology.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"44 1","pages":"113-139"},"PeriodicalIF":0.6,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44166885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud technology is now becoming a valuable resource, as it provides cost-saving business technology. Businesses exist to earn a profit by keeping their capital and expenses low. In an attempt to address the issue, this study employs structural equation model to complement literature on users' technology acceptance behavior. The framework of the study was based on the technology acceptance model (TAM) to better understand the adoption of cloud computing by small businesses owners. This study looks at the perception and attitudes of small businesses (SMEs) towards cloud technology based accounting information systems, therefore, their intention to adopt the technology. Result support the view that perceived usefulness, ease of use and credibility positively influenced SMEs' attitudes towards cloud-based accounting information systems and therefore their intention to adopt the technology. The result enhances literature in the field of cloud-based accounting systems for small businesses.
{"title":"Does Cloud-Based Accounting Information System Harmonize the Small Business Needs?","authors":"B. Pramuka, Margani Pinasti","doi":"10.31341/jios.44.1.6","DOIUrl":"https://doi.org/10.31341/jios.44.1.6","url":null,"abstract":"Cloud technology is now becoming a valuable resource, as it provides cost-saving business technology. Businesses exist to earn a profit by keeping their capital and expenses low. In an attempt to address the issue, this study employs structural equation model to complement literature on users' technology acceptance behavior. The framework of the study was based on the technology acceptance model (TAM) to better understand the adoption of cloud computing by small businesses owners. This study looks at the perception and attitudes of small businesses (SMEs) towards cloud technology based accounting information systems, therefore, their intention to adopt the technology. Result support the view that perceived usefulness, ease of use and credibility positively influenced SMEs' attitudes towards cloud-based accounting information systems and therefore their intention to adopt the technology. The result enhances literature in the field of cloud-based accounting systems for small businesses.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49042739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper aims to examine the impact of TripAdvisor reviews on behavioural intentions, basing on travellers' trust towards the e-WOM reviews. Four factors are proposed for building travellers’ trust and behavioural intentions: information quality, credibility, adoption and usefulness. Trust is expected to mediate the relationship between eWOM attributes and travellers’ behavioural intention. Data from 410 travellers were analysed using Partial Least Square-Structural Equation Modeling (PLS-SEM), and the findings show that TripAdvisor e-WOM attributes (information credibility, adoption and usefulness) significantly influence the traveller's trust. Besides, traveller behavioural intention was influenced considerably by TripAdvisor eWOM information credibility and usefulness. Lastly, trust in e-WOM significantly mediates travellers' behavioural intention. This paper confirms the importance of eWOM in the context of the tourism industry and travellers' trust and behaviour towards online review, which altered how consumers behave before deciding to travel.
{"title":"Help Me TripAdvisor! Examining the Relationship between TripAdvisor e-WOM Attributes, Trusts towards Online Reviews and Travellers Behavioural Intentions","authors":"Nur Zarifah Dhabitah Mahat, M. Hanafiah","doi":"10.31341/jios.44.1.4","DOIUrl":"https://doi.org/10.31341/jios.44.1.4","url":null,"abstract":"This paper aims to examine the impact of TripAdvisor reviews on behavioural intentions, basing on travellers' trust towards the e-WOM reviews. Four factors are proposed for building travellers’ trust and behavioural intentions: information quality, credibility, adoption and usefulness. Trust is expected to mediate the relationship between eWOM attributes and travellers’ behavioural intention. Data from 410 travellers were analysed using Partial Least Square-Structural Equation Modeling (PLS-SEM), and the findings show that TripAdvisor e-WOM attributes (information credibility, adoption and usefulness) significantly influence the traveller's trust. Besides, traveller behavioural intention was influenced considerably by TripAdvisor eWOM information credibility and usefulness. Lastly, trust in e-WOM significantly mediates travellers' behavioural intention. This paper confirms the importance of eWOM in the context of the tourism industry and travellers' trust and behaviour towards online review, which altered how consumers behave before deciding to travel.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.31341/jios.44.1.4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45109808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}