Smart devices in the hands of people are revolutionizing the social lifestyle of one's self. Everyone across the world are using smart devices linked to their social networking activities one such activity is to share location data by uploading the tagged media content like photos, videos. The data is of surroundings, events attended/attending and travel experiences. Users share their experiences at a given location through localization techniques. Using such data from social networks an attempt is made to analyse tagged media content to acquire information on user context, individual’s interests, tastes, behaviours and derive meaningful relationships amongst them are referred to as Location Based Social Networks (LBSNs). The resulting information can be used to market a product and to improve business, as well recommend a travel and plan an itinerary. This paper presents a comprehensive survey of recommended systems for LBSNs covering the concepts of LBSNs, terminologies of LBSN and various recommendation systems.
{"title":"A Study on Recommendation Systems in Location Based Social Networking","authors":"Lakshmi Shree Kullappa, Ranganath Ashok Kumar, Rajeshwari Kullappa","doi":"10.31341/jios.41.2.6","DOIUrl":"https://doi.org/10.31341/jios.41.2.6","url":null,"abstract":"Smart devices in the hands of people are revolutionizing the social lifestyle of one's self. Everyone across the world are using smart devices linked to their social networking activities one such activity is to share location data by uploading the tagged media content like photos, videos. The data is of surroundings, events attended/attending and travel experiences. Users share their experiences at a given location through localization techniques. Using such data from social networks an attempt is made to analyse tagged media content to acquire information on user context, individual’s interests, tastes, behaviours and derive meaningful relationships amongst them are referred to as Location Based Social Networks (LBSNs). The resulting information can be used to market a product and to improve business, as well recommend a travel and plan an itinerary. This paper presents a comprehensive survey of recommended systems for LBSNs covering the concepts of LBSNs, terminologies of LBSN and various recommendation systems.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"41 1","pages":"213-229"},"PeriodicalIF":0.6,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.31341/jios.41.2.6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43192262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper analyzes state of the art of the research regarding the education and career development of ICT graduates based on a comprehensive literature review. Analysis presented in this paper includes 155 papers in two research areas – one related to the education of ICT graduates (101 papers) and the other to their career development (54 papers). The most prestigious papers, most influential journals and groupings of authors in the abovementioned fields are identified by using the citation analysis and Social Network Analysis (SNA). Results show that the most influential papers related to ICT career are research papers dealing with ICT job skills requirements, and related to ICT education are ICT association’s related reports and recommendations on curriculum development. In general, results show that there is a lack of cross-fertilization of knowledge in both areas which means that the mixing of ideas that can lead to better research results is missing.
{"title":"Prestige and Collaboration Among Researchers in the Field of Education and Career Development of ICT Graduates: Is There a Cross-Fertilization of Research and Knowledge?","authors":"K. Aničić, B. Divjak, K. Arbanas","doi":"10.31341/JIOS.41.2.7","DOIUrl":"https://doi.org/10.31341/JIOS.41.2.7","url":null,"abstract":"This paper analyzes state of the art of the research regarding the education and career development of ICT graduates based on a comprehensive literature review. Analysis presented in this paper includes 155 papers in two research areas – one related to the education of ICT graduates (101 papers) and the other to their career development (54 papers). The most prestigious papers, most influential journals and groupings of authors in the abovementioned fields are identified by using the citation analysis and Social Network Analysis (SNA). Results show that the most influential papers related to ICT career are research papers dealing with ICT job skills requirements, and related to ICT education are ICT association’s related reports and recommendations on curriculum development. In general, results show that there is a lack of cross-fertilization of knowledge in both areas which means that the mixing of ideas that can lead to better research results is missing.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"41 1","pages":"231-262"},"PeriodicalIF":0.6,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44684436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The importance of knowledge management for enterprises increased significantly in the recent years. In this paper one element of knowledge management will be considered, namely knowledge management systems (KMS). The main purpose of this paper is to compare the level of use of KMS between Polish private and state owned companies as well as foreign owned enterprises of different size. To measure intensity of use of particular KMS technologies research questionnaire has been created. The sample was selected from Kompass Poland database and more than 1200 questionnaires have been collected. Statistical analysis of differences between target sections was conducted by Mann-Whitney U test. Overall analysis of results showed that foreign owned companies feature greater intensity of use of KMS functions than Polish state owned and private owned enterprises. Detailed results indicated that small and medium Polish private companies utilize discussed systems to a far lesser extent. Nevertheless, large private companies feature higher intensity of use of 4 out of 5 examined KMS than large state owned enterprises.
{"title":"Knowledge Management Systems in the Polish Private, State and Foreign Owned Companies","authors":"Marcin Soniewicki, Łukasz Wawrowski","doi":"10.31341/JIOS.41.2.8","DOIUrl":"https://doi.org/10.31341/JIOS.41.2.8","url":null,"abstract":"The importance of knowledge management for enterprises increased significantly in the recent years. In this paper one element of knowledge management will be considered, namely knowledge management systems (KMS). The main purpose of this paper is to compare the level of use of KMS between Polish private and state owned companies as well as foreign owned enterprises of different size. To measure intensity of use of particular KMS technologies research questionnaire has been created. The sample was selected from Kompass Poland database and more than 1200 questionnaires have been collected. Statistical analysis of differences between target sections was conducted by Mann-Whitney U test. Overall analysis of results showed that foreign owned companies feature greater intensity of use of KMS functions than Polish state owned and private owned enterprises. Detailed results indicated that small and medium Polish private companies utilize discussed systems to a far lesser extent. Nevertheless, large private companies feature higher intensity of use of 4 out of 5 examined KMS than large state owned enterprises.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"41 1","pages":"263-282"},"PeriodicalIF":0.6,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46069257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
By 2018, in Croatia, the agglomerations for collecting the sewage and water treatment systems are going to be constructed. All devices will be based on the mechanical-biological method of purification. However, the work of water treatment system produces a problem of sludge management. The paper presents the challenges of wastewater sludge handling and makes a decision on further sludge management. The hierarchical model of the decision making problem by defining the goal, criteria and alternative solutions is developed. On each level of the hierarchical model the elements of the model are compared with each other in pairs, and the preferences are expressed by using the Saaty’s scale. Moreover, the APH model compares the alternative pairs (thermal processing, deposition on agricultural land, disposal to waste repositories and composting) among each others. The intensities and weight preferences of one alternative over another are selected within the required criteria (economic, environmental, organisational and sociological).
{"title":"Using AHP Method for Making a Decision on How the Management of Sewage Sludge in the Northern Croatia","authors":"V. Dušak, L. G. Dmitrovic, R. Bagnall","doi":"10.31341/JIOS.41.2.2","DOIUrl":"https://doi.org/10.31341/JIOS.41.2.2","url":null,"abstract":"By 2018, in Croatia, the agglomerations for collecting the sewage and water treatment systems are going to be constructed. All devices will be based on the mechanical-biological method of purification. However, the work of water treatment system produces a problem of sludge management. The paper presents the challenges of wastewater sludge handling and makes a decision on further sludge management. The hierarchical model of the decision making problem by defining the goal, criteria and alternative solutions is developed. On each level of the hierarchical model the elements of the model are compared with each other in pairs, and the preferences are expressed by using the Saaty’s scale. Moreover, the APH model compares the alternative pairs (thermal processing, deposition on agricultural land, disposal to waste repositories and composting) among each others. The intensities and weight preferences of one alternative over another are selected within the required criteria (economic, environmental, organisational and sociological).","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"41 1","pages":"161-170"},"PeriodicalIF":0.6,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47041815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgard construction method with constant initialization vector. Merkle-Damgard construction showed that the security of hash function depends on the security of the compression function. Several attacks on Merkle-Damgard construction based hash functions motivated researchers to propose different cryptographic constructions to enhance the security of hash functions against the differential and generic attacks. Cryptographic community had been looking for replacements for these weak hash functions and they have proposed new hash functions based on different variants of Merkle-Damgard construction. As a result of an open competition NIST announced Keccak as a SHA-3 standard. This paper provides a review of cryptographic hash function, its security requirements and different design methods of compression function.
{"title":"Merkle-Damgård Construction Method and Alternatives: A Review","authors":"Harshvardhan Tiwari","doi":"10.31341/JIOS.41.2.9","DOIUrl":"https://doi.org/10.31341/JIOS.41.2.9","url":null,"abstract":"Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgard construction method with constant initialization vector. Merkle-Damgard construction showed that the security of hash function depends on the security of the compression function. Several attacks on Merkle-Damgard construction based hash functions motivated researchers to propose different cryptographic constructions to enhance the security of hash functions against the differential and generic attacks. Cryptographic community had been looking for replacements for these weak hash functions and they have proposed new hash functions based on different variants of Merkle-Damgard construction. As a result of an open competition NIST announced Keccak as a SHA-3 standard. This paper provides a review of cryptographic hash function, its security requirements and different design methods of compression function.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"41 1","pages":"283-304"},"PeriodicalIF":0.6,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42166514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Even though there are various source code plagiarism detection approaches, only a few works which are focused on low-level representation for deducting similarity. Most of them are only focused on lexical token sequence extracted from source code. In our point of view, low-level representation is more beneficial than lexical token since its form is more compact than the source code itself. It only considers semantic-preserving instructions and ignores many source code delimiter tokens. This paper proposes a source code plagiarism detection which rely on low-level representation. For a case study, we focus our work on .NET programming languages with Common Intermediate Language as its low-level representation. In addition, we also incorporate Adaptive Local Alignment for detecting similarity. According to Lim et al, this algorithm outperforms code similarity state-of-the-art algorithm (i.e. Greedy String Tiling) in term of effectiveness. According to our evaluation which involves various plagiarism attacks, our approach is more effective and efficient when compared with standard lexical-token approach.
{"title":"Detecting Source Code Plagiarism on .NET Programming Languages using Low-level Representation and Adaptive Local Alignment","authors":"Faqih Salban Rabbani, Oscar Karnalim","doi":"10.31341/JIOS.41.1.7","DOIUrl":"https://doi.org/10.31341/JIOS.41.1.7","url":null,"abstract":"Even though there are various source code plagiarism detection approaches, only a few works which are focused on low-level representation for deducting similarity. Most of them are only focused on lexical token sequence extracted from source code. In our point of view, low-level representation is more beneficial than lexical token since its form is more compact than the source code itself. It only considers semantic-preserving instructions and ignores many source code delimiter tokens. This paper proposes a source code plagiarism detection which rely on low-level representation. For a case study, we focus our work on .NET programming languages with Common Intermediate Language as its low-level representation. In addition, we also incorporate Adaptive Local Alignment for detecting similarity. According to Lim et al, this algorithm outperforms code similarity state-of-the-art algorithm (i.e. Greedy String Tiling) in term of effectiveness. According to our evaluation which involves various plagiarism attacks, our approach is more effective and efficient when compared with standard lexical-token approach.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"41 1","pages":"105-123"},"PeriodicalIF":0.6,"publicationDate":"2017-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.31341/JIOS.41.1.7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43351844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Based on the degree of information sharing between buyers and suppliers as well as the level of supplier power, we suggested a framework that can be useful for classifying types of business to business (B2B) electronic commerce (EC) in the manufacturing firms. According to this framework, four kinds of B2B EC were theoretically proposed, classified, and empirically confirmed. These four are: an electronic marketplace, electronic procurement, electronic partnerships, and electronic distribution. Many prior studies have investigated and proposed some kinds of B2B EC. However, these studies focused mostly on one or two types of B2B EC, and did not develop or suggest a framework for the classification of forms of B2B EC. The framework constructed in this research can be utilized variously. Specifically, when a firm wants to initiate B2B EC with its suppliers, this framework can help a firm to decide and select an appropriate kind of B2B EC. This framework can also be applied to evaluate whether the proper form of B2B EC has been adopted or not.
{"title":"The Classification of Types of Business-to-Business Electronic Commerce: A Framework Construction","authors":"Jong-min Choe","doi":"10.31341/JIOS.41.1.1","DOIUrl":"https://doi.org/10.31341/JIOS.41.1.1","url":null,"abstract":"Based on the degree of information sharing between buyers and suppliers as well as the level of supplier power, we suggested a framework that can be useful for classifying types of business to business (B2B) electronic commerce (EC) in the manufacturing firms. According to this framework, four kinds of B2B EC were theoretically proposed, classified, and empirically confirmed. These four are: an electronic marketplace, electronic procurement, electronic partnerships, and electronic distribution. Many prior studies have investigated and proposed some kinds of B2B EC. However, these studies focused mostly on one or two types of B2B EC, and did not develop or suggest a framework for the classification of forms of B2B EC. The framework constructed in this research can be utilized variously. Specifically, when a firm wants to initiate B2B EC with its suppliers, this framework can help a firm to decide and select an appropriate kind of B2B EC. This framework can also be applied to evaluate whether the proper form of B2B EC has been adopted or not.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"41 1","pages":"1-20"},"PeriodicalIF":0.6,"publicationDate":"2017-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.31341/JIOS.41.1.1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44664129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes proposed methodology for evaluation of critical systems and prioritization of critical risks and assets identified in highly secured information systems. For different types of information assets or security environments it is necessary to apply different techniques and methods for their prioritization and evaluation. In this article, VECTOR matrix method for prioritization of critical assets and critical risks is explained and integrated into AHP (Analytic Hierarchy Process) technique as a set of fixed criteria for evaluation of defined alternatives. Bitcoin cryptocurrency was compared and evaluated along with other common Internet transaction systems by information security professionals according to defined VECTOR criteria. Also, the newly proposed hybrid AHP model is presented with potential case studies for future research. This article tries to discover security posture of Bitcoin cryptocurrency in the context of information security risks related to the existing most common online payment systems like e-banking, m-banking, and e-commerce.
{"title":"Comparisons of Bitcoin Cryptosystem with Other Common Internet Transaction Systems by AHP Technique","authors":"D. Macek, D. Alagic","doi":"10.31341/JIOS.41.1.5","DOIUrl":"https://doi.org/10.31341/JIOS.41.1.5","url":null,"abstract":"This paper describes proposed methodology for evaluation of critical systems and prioritization of critical risks and assets identified in highly secured information systems. For different types of information assets or security environments it is necessary to apply different techniques and methods for their prioritization and evaluation. In this article, VECTOR matrix method for prioritization of critical assets and critical risks is explained and integrated into AHP (Analytic Hierarchy Process) technique as a set of fixed criteria for evaluation of defined alternatives. Bitcoin cryptocurrency was compared and evaluated along with other common Internet transaction systems by information security professionals according to defined VECTOR criteria. Also, the newly proposed hybrid AHP model is presented with potential case studies for future research. This article tries to discover security posture of Bitcoin cryptocurrency in the context of information security risks related to the existing most common online payment systems like e-banking, m-banking, and e-commerce.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"41 1","pages":"69-87"},"PeriodicalIF":0.6,"publicationDate":"2017-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.31341/JIOS.41.1.5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45589911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents and discuss a survey which describes how small-medium enterprises (SMEs) implement and use their information system with respect to their logistic and production processes. The study first describes the rationale of the research, then it identifies the characteristics of the companies and detects their general attitude towards information technology (IT). In the following section the paper presents a set of detailed processes to verify the structure and workflow of companies and how IT supports their processes. In the last part we study the influence of some company characteristics to effective use of processes and to different technological approaches, to support defined logistic and production processes. The novelty of the study and its interest, both in academic and institutional context as in the real world, resides in the opportunity to verify and understand the different attitudes of SMEs towards information technology in defining, organizing, planning and control their processes.
{"title":"Information Technology in Small Medium Enterprise: Logistic and Production Processes","authors":"M. Pighin","doi":"10.31341/JIOS.41.1.6","DOIUrl":"https://doi.org/10.31341/JIOS.41.1.6","url":null,"abstract":"This paper presents and discuss a survey which describes how small-medium enterprises (SMEs) implement and use their information system with respect to their logistic and production processes. The study first describes the rationale of the research, then it identifies the characteristics of the companies and detects their general attitude towards information technology (IT). In the following section the paper presents a set of detailed processes to verify the structure and workflow of companies and how IT supports their processes. In the last part we study the influence of some company characteristics to effective use of processes and to different technological approaches, to support defined logistic and production processes. The novelty of the study and its interest, both in academic and institutional context as in the real world, resides in the opportunity to verify and understand the different attitudes of SMEs towards information technology in defining, organizing, planning and control their processes.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"41 1","pages":"89-104"},"PeriodicalIF":0.6,"publicationDate":"2017-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46731473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Khanova, O. Protalinskiy, Kristina Igorevna Averianova
The article deals with socio-economic strategic management, which implemented on the basis of Balanced Scorecard, multidimensional modeling and its set-theoretic representation. The main idea of the article is using of modern information technology to assist in decision-making. Much attention is given to formalization of SCIPEO-modeling and integration of its sub-model. The process of developing of management decisions is considered. The integration of these tools will improve the management of the system in a situation of total or partial indeterminacy
{"title":"The Elaboration of Strategic Decisions in the Socio-Economic Systems","authors":"A. Khanova, O. Protalinskiy, Kristina Igorevna Averianova","doi":"10.31341/JIOS.41.1.4","DOIUrl":"https://doi.org/10.31341/JIOS.41.1.4","url":null,"abstract":"The article deals with socio-economic strategic management, which implemented on the basis of Balanced Scorecard, multidimensional modeling and its set-theoretic representation. The main idea of the article is using of modern information technology to assist in decision-making. Much attention is given to formalization of SCIPEO-modeling and integration of its sub-model. The process of developing of management decisions is considered. The integration of these tools will improve the management of the system in a situation of total or partial indeterminacy","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"41 1","pages":"57-67"},"PeriodicalIF":0.6,"publicationDate":"2017-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43617252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}