首页 > 最新文献

Journal of Information and Organizational Sciences最新文献

英文 中文
A Study on Recommendation Systems in Location Based Social Networking 基于位置的社交网络推荐系统研究
IF 0.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2017-12-13 DOI: 10.31341/jios.41.2.6
Lakshmi Shree Kullappa, Ranganath Ashok Kumar, Rajeshwari Kullappa
Smart devices in the hands of people are revolutionizing the social lifestyle of one's self. Everyone across the world are using smart devices linked to their social networking activities one such activity is to share location data by uploading the tagged media content like photos, videos. The data is of surroundings, events attended/attending and travel experiences. Users share their experiences at a given location through localization techniques.  Using such data from social networks an attempt is made to analyse tagged media content to acquire information on user context, individual’s interests, tastes, behaviours and derive meaningful relationships amongst them are referred to as Location Based Social Networks (LBSNs). The resulting information can be used to market a product and to improve business, as well recommend a travel and plan an itinerary. This paper presents a comprehensive survey of recommended systems for LBSNs covering the concepts of LBSNs, terminologies of LBSN and various recommendation systems.
人们手中的智能设备正在彻底改变自己的社会生活方式。世界各地的每个人都在使用与他们的社交网络活动相关联的智能设备,其中一种活动是通过上传标记的媒体内容(如照片、视频)来共享位置数据。这些数据包括周围环境、参加的活动和旅行经历。用户通过本地化技术分享他们在给定位置的体验。利用这些来自社交网络的数据,试图分析标记的媒体内容,以获取有关用户背景、个人兴趣、品味、行为的信息,并在它们之间获得有意义的关系,这被称为基于位置的社交网络(LBSNs)。由此产生的信息可用于推销产品和改善业务,以及推荐旅行和计划行程。本文对LBSNs的推荐系统进行了全面的综述,涵盖了LBSNs的概念、LBSNs的术语和各种推荐系统。
{"title":"A Study on Recommendation Systems in Location Based Social Networking","authors":"Lakshmi Shree Kullappa, Ranganath Ashok Kumar, Rajeshwari Kullappa","doi":"10.31341/jios.41.2.6","DOIUrl":"https://doi.org/10.31341/jios.41.2.6","url":null,"abstract":"Smart devices in the hands of people are revolutionizing the social lifestyle of one's self. Everyone across the world are using smart devices linked to their social networking activities one such activity is to share location data by uploading the tagged media content like photos, videos. The data is of surroundings, events attended/attending and travel experiences. Users share their experiences at a given location through localization techniques.  Using such data from social networks an attempt is made to analyse tagged media content to acquire information on user context, individual’s interests, tastes, behaviours and derive meaningful relationships amongst them are referred to as Location Based Social Networks (LBSNs). The resulting information can be used to market a product and to improve business, as well recommend a travel and plan an itinerary. This paper presents a comprehensive survey of recommended systems for LBSNs covering the concepts of LBSNs, terminologies of LBSN and various recommendation systems.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"41 1","pages":"213-229"},"PeriodicalIF":0.6,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.31341/jios.41.2.6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43192262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prestige and Collaboration Among Researchers in the Field of Education and Career Development of ICT Graduates: Is There a Cross-Fertilization of Research and Knowledge? ICT毕业生教育和职业发展领域研究人员的声望和合作:研究和知识是否交叉融合?
IF 0.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2017-12-13 DOI: 10.31341/JIOS.41.2.7
K. Aničić, B. Divjak, K. Arbanas
This paper analyzes state of the art of the research regarding the education and career development of ICT graduates based on a comprehensive literature review. Analysis presented in this paper includes 155 papers in two research areas – one related to the education of ICT graduates (101 papers) and the other to their career development (54 papers). The most prestigious papers, most influential journals and groupings of authors in the abovementioned fields are identified by using the citation analysis and Social Network Analysis (SNA). Results show that the most influential papers related to ICT career are research papers dealing with ICT job skills requirements, and related to ICT education are ICT association’s related reports and recommendations on curriculum development. In general, results show that there is a lack of cross-fertilization of knowledge in both areas which means that the mixing of ideas that can lead to better research results is missing.
本文在全面文献综述的基础上,分析了ICT毕业生教育和职业发展的研究现状。本文的分析包括两个研究领域的155篇论文——一篇与信息通信技术毕业生的教育有关(101篇论文),另一篇与他们的职业发展有关(54篇论文)。通过引用分析和社会网络分析(SNA)确定了上述领域中最负盛名的论文、最具影响力的期刊和作者群体。结果显示,与信通技术职业相关的最具影响力的论文是关于信通技术工作技能要求的研究论文,而与信通技术教育相关的论文是信通技术协会关于课程开发的相关报告和建议。总的来说,研究结果表明,这两个领域都缺乏知识的交叉融合,这意味着缺乏能够带来更好研究结果的思想融合。
{"title":"Prestige and Collaboration Among Researchers in the Field of Education and Career Development of ICT Graduates: Is There a Cross-Fertilization of Research and Knowledge?","authors":"K. Aničić, B. Divjak, K. Arbanas","doi":"10.31341/JIOS.41.2.7","DOIUrl":"https://doi.org/10.31341/JIOS.41.2.7","url":null,"abstract":"This paper analyzes state of the art of the research regarding the education and career development of ICT graduates based on a comprehensive literature review. Analysis presented in this paper includes 155 papers in two research areas – one related to the education of ICT graduates (101 papers) and the other to their career development (54 papers). The most prestigious papers, most influential journals and groupings of authors in the abovementioned fields are identified by using the citation analysis and Social Network Analysis (SNA). Results show that the most influential papers related to ICT career are research papers dealing with ICT job skills requirements, and related to ICT education are ICT association’s related reports and recommendations on curriculum development. In general, results show that there is a lack of cross-fertilization of knowledge in both areas which means that the mixing of ideas that can lead to better research results is missing.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"41 1","pages":"231-262"},"PeriodicalIF":0.6,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44684436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Knowledge Management Systems in the Polish Private, State and Foreign Owned Companies 波兰私营、国有和外资公司的知识管理系统
IF 0.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2017-12-13 DOI: 10.31341/JIOS.41.2.8
Marcin Soniewicki, Łukasz Wawrowski
The importance of knowledge management for enterprises increased significantly in the recent years. In this paper one element of knowledge management will be considered, namely knowledge management systems (KMS). The main purpose of this paper is to compare the level of use of KMS between Polish private and state owned companies as well as foreign owned enterprises of different size. To measure intensity of use of particular KMS technologies research questionnaire has been created. The sample was selected from Kompass Poland database and more than 1200 questionnaires have been collected. Statistical analysis of differences between target sections was conducted by Mann-Whitney U test. Overall analysis of results showed that foreign owned companies feature greater intensity of use of KMS functions than Polish state owned and private owned enterprises. Detailed results indicated that small and medium Polish private companies utilize discussed systems to a far lesser extent. Nevertheless, large private companies feature higher intensity of use of 4 out of 5 examined KMS than large state owned enterprises.
近年来,知识管理对企业的重要性显著增加。本文将考虑知识管理的一个要素,即知识管理系统(KMS)。本文的主要目的是比较波兰私营企业和国有企业以及不同规模的外资企业对知识管理体系的使用水平。为了测量特定KMS技术的使用强度,研究问卷已经创建。样本取自波兰Kompass数据库,共收集问卷1200余份。采用Mann-Whitney U检验对目标截面间的差异进行统计分析。对结果的整体分析表明,外资企业比波兰国有企业和私营企业更密集地使用KMS功能。详细的结果表明,波兰中小型私营公司使用所讨论的系统的程度要小得多。然而,大型私营企业在5个被调查的KMS中有4个的使用强度高于大型国有企业。
{"title":"Knowledge Management Systems in the Polish Private, State and Foreign Owned Companies","authors":"Marcin Soniewicki, Łukasz Wawrowski","doi":"10.31341/JIOS.41.2.8","DOIUrl":"https://doi.org/10.31341/JIOS.41.2.8","url":null,"abstract":"The importance of knowledge management for enterprises increased significantly in the recent years. In this paper one element of knowledge management will be considered, namely knowledge management systems (KMS). The main purpose of this paper is to compare the level of use of KMS between Polish private and state owned companies as well as foreign owned enterprises of different size. To measure intensity of use of particular KMS technologies research questionnaire has been created. The sample was selected from Kompass Poland database and more than 1200 questionnaires have been collected. Statistical analysis of differences between target sections was conducted by Mann-Whitney U test. Overall analysis of results showed that foreign owned companies feature greater intensity of use of KMS functions than Polish state owned and private owned enterprises. Detailed results indicated that small and medium Polish private companies utilize discussed systems to a far lesser extent. Nevertheless, large private companies feature higher intensity of use of 4 out of 5 examined KMS than large state owned enterprises.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"41 1","pages":"263-282"},"PeriodicalIF":0.6,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46069257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using AHP Method for Making a Decision on How the Management of Sewage Sludge in the Northern Croatia 运用层次分析法对克罗地亚北部污水污泥治理进行决策
IF 0.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2017-12-13 DOI: 10.31341/JIOS.41.2.2
V. Dušak, L. G. Dmitrovic, R. Bagnall
By 2018, in Croatia, the agglomerations for collecting the sewage and water treatment systems are going to be constructed. All devices will be based on the mechanical-biological method of purification. However, the work of water treatment system produces a problem of sludge management. The paper presents the challenges of wastewater sludge handling and makes a decision on further sludge management. The hierarchical model of the decision making problem by defining the goal, criteria and alternative solutions is developed. On each level of the hierarchical model the elements of the model are compared with each other in pairs, and the preferences are expressed by using the Saaty’s scale. Moreover, the APH model compares the alternative pairs (thermal processing, deposition on agricultural land, disposal to waste repositories and composting) among each others. The intensities and weight preferences of one alternative over another are selected within the required criteria (economic, environmental, organisational and sociological).
到2018年,克罗地亚将建设污水收集和水处理系统的聚集区。所有设备都将基于机械生物净化方法。然而,水处理系统的工作产生了污泥管理问题。本文介绍了污水污泥处理面临的挑战,并就进一步的污泥管理做出了决定。通过定义目标、标准和备选方案,建立了决策问题的层次模型。在层次模型的每个级别上,模型的元素被成对地相互比较,并且通过使用萨蒂量表来表达偏好。此外,APH模型将替代对(热处理、农业土地上的沉积、废物库的处理和堆肥)相互比较。一种替代方案的强度和重量偏好是在所需标准(经济、环境、组织和社会学)内选择的。
{"title":"Using AHP Method for Making a Decision on How the Management of Sewage Sludge in the Northern Croatia","authors":"V. Dušak, L. G. Dmitrovic, R. Bagnall","doi":"10.31341/JIOS.41.2.2","DOIUrl":"https://doi.org/10.31341/JIOS.41.2.2","url":null,"abstract":"By 2018, in Croatia, the agglomerations for collecting the sewage and water treatment systems are going to be constructed. All devices will be based on the mechanical-biological method of purification. However, the work of water treatment system produces a problem of sludge management. The paper presents the challenges of wastewater sludge handling and makes a decision on further sludge management. The hierarchical model of the decision making problem by defining the goal, criteria and alternative solutions is developed. On each level of the hierarchical model the elements of the model are compared with each other in pairs, and the preferences are expressed by using the Saaty’s scale. Moreover, the APH model compares the alternative pairs (thermal processing, deposition on agricultural land, disposal to waste repositories and composting) among each others. The intensities and weight preferences of one alternative over another are selected within the required criteria (economic, environmental, organisational and sociological).","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"41 1","pages":"161-170"},"PeriodicalIF":0.6,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47041815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Merkle-Damgård Construction Method and Alternatives: A Review Merkle-Damgård施工方法和备选方案:综述
IF 0.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2017-12-13 DOI: 10.31341/JIOS.41.2.9
Harshvardhan Tiwari
Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgard construction method with constant initialization vector. Merkle-Damgard construction showed that the security of hash function depends on the security of the compression function. Several attacks on Merkle-Damgard construction based hash functions motivated researchers to propose different cryptographic constructions to enhance the security of hash functions against the differential and generic attacks. Cryptographic community had been looking for replacements for these weak hash functions and they have proposed new hash functions based on different variants of Merkle-Damgard construction. As a result of an open competition NIST announced Keccak as a SHA-3 standard. This paper provides a review of cryptographic hash function, its security requirements and different design methods of compression function.
密码哈希函数是信息安全领域中重要的密码工具。MD5和SHA-1等最广泛使用的哈希函数的设计是基于压缩函数的迭代,采用不变初始化向量的Merkle-Damgard构造方法。Merkle-Damgard构造表明哈希函数的安全性取决于压缩函数的安全性。针对基于Merkle-Damgard构造的哈希函数的几次攻击促使研究人员提出了不同的密码结构,以增强哈希函数对差分和泛型攻击的安全性。密码学社区一直在寻找这些弱哈希函数的替代品,他们提出了基于Merkle-Damgard构造的不同变体的新哈希函数。作为公开竞争的结果,NIST宣布Keccak为SHA-3标准。本文综述了加密哈希函数、其安全性要求以及不同的压缩函数设计方法。
{"title":"Merkle-Damgård Construction Method and Alternatives: A Review","authors":"Harshvardhan Tiwari","doi":"10.31341/JIOS.41.2.9","DOIUrl":"https://doi.org/10.31341/JIOS.41.2.9","url":null,"abstract":"Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgard construction method with constant initialization vector. Merkle-Damgard construction showed that the security of hash function depends on the security of the compression function. Several attacks on Merkle-Damgard construction based hash functions motivated researchers to propose different cryptographic constructions to enhance the security of hash functions against the differential and generic attacks. Cryptographic community had been looking for replacements for these weak hash functions and they have proposed new hash functions based on different variants of Merkle-Damgard construction. As a result of an open competition NIST announced Keccak as a SHA-3 standard. This paper provides a review of cryptographic hash function, its security requirements and different design methods of compression function.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"41 1","pages":"283-304"},"PeriodicalIF":0.6,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42166514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Detecting Source Code Plagiarism on .NET Programming Languages using Low-level Representation and Adaptive Local Alignment 使用低级表示和自适应局部对齐检测。net编程语言的源代码抄袭
IF 0.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2017-06-16 DOI: 10.31341/JIOS.41.1.7
Faqih Salban Rabbani, Oscar Karnalim
Even though there are various source code plagiarism detection approaches, only a few works which are focused on low-level representation for deducting similarity. Most of them are only focused on lexical token sequence extracted from source code. In our point of view, low-level representation is more beneficial than lexical token since its form is more compact than the source code itself. It only considers semantic-preserving instructions and ignores many source code delimiter tokens. This paper proposes a source code plagiarism detection which rely on low-level representation. For a case study, we focus our work on .NET programming languages with Common Intermediate Language as its low-level representation. In addition, we also incorporate Adaptive Local Alignment for detecting similarity. According to Lim et al, this algorithm outperforms code similarity state-of-the-art algorithm (i.e. Greedy String Tiling) in term of effectiveness. According to our evaluation which involves various plagiarism attacks, our approach is more effective and efficient when compared with standard lexical-token approach.
尽管有各种各样的源代码抄袭检测方法,但只有少数作品专注于低级表示来扣除相似度。它们大多只关注从源代码中提取的词法标记序列。在我们看来,低级表示比词法标记更有益,因为它的形式比源代码本身更紧凑。它只考虑保持语义的指令,而忽略许多源代码分隔符令牌。提出了一种基于底层表示的源代码抄袭检测方法。对于一个案例研究,我们将工作重点放在。net编程语言上,并将公共中间语言作为其低级表示形式。此外,我们还结合了自适应局部对齐来检测相似度。根据Lim等人的研究,该算法在有效性上优于代码相似最先进的算法(即贪心字符串拼接)。根据我们对各种抄袭攻击的评估,我们的方法比标准的词汇-令牌方法更有效。
{"title":"Detecting Source Code Plagiarism on .NET Programming Languages using Low-level Representation and Adaptive Local Alignment","authors":"Faqih Salban Rabbani, Oscar Karnalim","doi":"10.31341/JIOS.41.1.7","DOIUrl":"https://doi.org/10.31341/JIOS.41.1.7","url":null,"abstract":"Even though there are various source code plagiarism detection approaches, only a few works which are focused on low-level representation for deducting similarity. Most of them are only focused on lexical token sequence extracted from source code. In our point of view, low-level representation is more beneficial than lexical token since its form is more compact than the source code itself. It only considers semantic-preserving instructions and ignores many source code delimiter tokens. This paper proposes a source code plagiarism detection which rely on low-level representation. For a case study, we focus our work on .NET programming languages with Common Intermediate Language as its low-level representation. In addition, we also incorporate Adaptive Local Alignment for detecting similarity. According to Lim et al, this algorithm outperforms code similarity state-of-the-art algorithm (i.e. Greedy String Tiling) in term of effectiveness. According to our evaluation which involves various plagiarism attacks, our approach is more effective and efficient when compared with standard lexical-token approach.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"41 1","pages":"105-123"},"PeriodicalIF":0.6,"publicationDate":"2017-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.31341/JIOS.41.1.7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43351844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
The Classification of Types of Business-to-Business Electronic Commerce: A Framework Construction 企业对企业电子商务的类型分类:一个框架构建
IF 0.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2017-06-16 DOI: 10.31341/JIOS.41.1.1
Jong-min Choe
Based on the degree of information sharing between buyers and suppliers as well as the level of supplier power, we suggested a framework that can be useful for classifying types of business to business (B2B) electronic commerce (EC) in the manufacturing firms. According to this framework, four kinds of B2B EC were theoretically proposed, classified, and empirically confirmed. These four are: an electronic marketplace, electronic procurement, electronic partnerships, and electronic distribution. Many prior studies have investigated and proposed some kinds of B2B EC. However, these studies focused mostly on one or two types of B2B EC, and did not develop or suggest a framework for the classification of forms of B2B EC. The framework constructed in this research can be utilized variously. Specifically, when a firm wants to initiate B2B EC with its suppliers, this framework can help a firm to decide and select an appropriate kind of B2B EC. This framework can also be applied to evaluate whether the proper form of B2B EC has been adopted or not.
基于买方和供应商之间的信息共享程度以及供应商权力水平,我们提出了一个框架,该框架可用于对制造企业的企业对企业(B2B)电子商务(EC)类型进行分类。在此框架下,从理论上提出了四种B2B电子商务,并对其进行了分类和实证验证。这四个是:电子市场、电子采购、电子伙伴关系和电子分销。许多先前的研究已经调查并提出了一些类型的B2B电子商务。然而,这些研究主要集中在一种或两种B2B电子商务上,并且没有开发或提出B2B电子商务形式分类的框架。本研究构建的框架可以多种方式使用。具体来说,当一家企业想与其供应商发起B2B电子商务时,该框架可以帮助企业决定和选择合适的B2B电子商务。该框架还可以用于评估是否采用了合适的B2B EC形式。
{"title":"The Classification of Types of Business-to-Business Electronic Commerce: A Framework Construction","authors":"Jong-min Choe","doi":"10.31341/JIOS.41.1.1","DOIUrl":"https://doi.org/10.31341/JIOS.41.1.1","url":null,"abstract":"Based on the degree of information sharing between buyers and suppliers as well as the level of supplier power, we suggested a framework that can be useful for classifying types of business to business (B2B) electronic commerce (EC) in the manufacturing firms. According to this framework, four kinds of B2B EC were theoretically proposed, classified, and empirically confirmed. These four are: an electronic marketplace, electronic procurement, electronic partnerships, and electronic distribution. Many prior studies have investigated and proposed some kinds of B2B EC. However, these studies focused mostly on one or two types of B2B EC, and did not develop or suggest a framework for the classification of forms of B2B EC. The framework constructed in this research can be utilized variously. Specifically, when a firm wants to initiate B2B EC with its suppliers, this framework can help a firm to decide and select an appropriate kind of B2B EC. This framework can also be applied to evaluate whether the proper form of B2B EC has been adopted or not.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"41 1","pages":"1-20"},"PeriodicalIF":0.6,"publicationDate":"2017-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.31341/JIOS.41.1.1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44664129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparisons of Bitcoin Cryptosystem with Other Common Internet Transaction Systems by AHP Technique 基于AHP技术的比特币加密系统与其他常见互联网交易系统的比较
IF 0.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2017-06-16 DOI: 10.31341/JIOS.41.1.5
D. Macek, D. Alagic
This paper describes proposed methodology for evaluation of critical systems and prioritization of critical risks and assets identified in highly secured information systems. For different types of information assets or security environments it is necessary to apply different techniques and methods for their prioritization and evaluation. In this article, VECTOR matrix method for prioritization of critical assets and critical risks is explained and integrated into AHP (Analytic Hierarchy Process) technique as a set of fixed criteria for evaluation of defined alternatives. Bitcoin cryptocurrency was compared and evaluated along with other common Internet transaction systems by information security professionals according to defined VECTOR criteria. Also, the newly proposed hybrid AHP model is presented with potential case studies for future research. This article tries to discover security posture of Bitcoin cryptocurrency in the context of information security risks related to the existing most common online payment systems like e-banking, m-banking, and e-commerce.
本文描述了在高度安全的信息系统中评估关键系统和确定关键风险和资产优先级的拟议方法。对于不同类型的信息资产或安全环境,有必要应用不同的技术和方法来确定其优先级和评估。在本文中,对关键资产和关键风险排序的向量矩阵方法进行了解释,并将其集成到AHP(层次分析法)技术中,作为评估已定义替代方案的一套固定标准。信息安全专业人员根据定义的VECTOR标准对比特币加密货币与其他常见的互联网交易系统进行了比较和评估。此外,本文还提出了新提出的混合AHP模型,为未来的研究提供了潜在的案例研究。本文试图发现比特币加密货币在与现有最常见的在线支付系统(如电子银行、移动银行和电子商务)相关的信息安全风险背景下的安全态势。
{"title":"Comparisons of Bitcoin Cryptosystem with Other Common Internet Transaction Systems by AHP Technique","authors":"D. Macek, D. Alagic","doi":"10.31341/JIOS.41.1.5","DOIUrl":"https://doi.org/10.31341/JIOS.41.1.5","url":null,"abstract":"This paper describes proposed methodology for evaluation of critical systems and prioritization of critical risks and assets identified in highly secured information systems. For different types of information assets or security environments it is necessary to apply different techniques and methods for their prioritization and evaluation. In this article, VECTOR matrix method for prioritization of critical assets and critical risks is explained and integrated into AHP (Analytic Hierarchy Process) technique as a set of fixed criteria for evaluation of defined alternatives. Bitcoin cryptocurrency was compared and evaluated along with other common Internet transaction systems by information security professionals according to defined VECTOR criteria. Also, the newly proposed hybrid AHP model is presented with potential case studies for future research. This article tries to discover security posture of Bitcoin cryptocurrency in the context of information security risks related to the existing most common online payment systems like e-banking, m-banking, and e-commerce.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"41 1","pages":"69-87"},"PeriodicalIF":0.6,"publicationDate":"2017-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.31341/JIOS.41.1.5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45589911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Information Technology in Small Medium Enterprise: Logistic and Production Processes 中小企业的信息技术:物流和生产过程
IF 0.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2017-06-16 DOI: 10.31341/JIOS.41.1.6
M. Pighin
This paper presents and discuss a survey which describes how small-medium enterprises (SMEs) implement and use their information system with respect to their logistic and production processes. The study first describes the rationale of the research, then it identifies the characteristics of the companies and detects their general attitude towards information technology (IT). In the following section the paper presents a set of detailed processes to verify the structure and workflow of companies and how IT supports their processes. In the last part we study the influence of some company characteristics to effective use of processes and to different technological approaches, to support defined logistic and production processes. The novelty of the study and its interest, both in academic and institutional context as in the real world, resides in the opportunity to verify and understand the different attitudes of SMEs towards information technology in defining, organizing, planning and control their processes.
本文介绍并讨论了一项调查,该调查描述了中小企业如何在物流和生产过程中实施和使用其信息系统。该研究首先描述了研究的基本原理,然后确定了公司的特征,并检测了他们对信息技术的总体态度。在下一节中,本文介绍了一组详细的流程,以验证公司的结构和工作流程,以及IT如何支持其流程。在最后一部分中,我们研究了一些公司特征对有效使用流程和不同技术方法的影响,以支持定义的物流和生产流程。这项研究的新颖性及其在学术和机构背景下以及在现实世界中的兴趣,在于有机会核实和理解中小企业在定义、组织、规划和控制其流程方面对信息技术的不同态度。
{"title":"Information Technology in Small Medium Enterprise: Logistic and Production Processes","authors":"M. Pighin","doi":"10.31341/JIOS.41.1.6","DOIUrl":"https://doi.org/10.31341/JIOS.41.1.6","url":null,"abstract":"This paper presents and discuss a survey which describes how small-medium enterprises (SMEs) implement and use their information system with respect to their logistic and production processes. The study first describes the rationale of the research, then it identifies the characteristics of the companies and detects their general attitude towards information technology (IT). In the following section the paper presents a set of detailed processes to verify the structure and workflow of companies and how IT supports their processes. In the last part we study the influence of some company characteristics to effective use of processes and to different technological approaches, to support defined logistic and production processes. The novelty of the study and its interest, both in academic and institutional context as in the real world, resides in the opportunity to verify and understand the different attitudes of SMEs towards information technology in defining, organizing, planning and control their processes.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"41 1","pages":"89-104"},"PeriodicalIF":0.6,"publicationDate":"2017-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46731473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Elaboration of Strategic Decisions in the Socio-Economic Systems 在社会经济系统中制定战略决策
IF 0.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2017-06-16 DOI: 10.31341/JIOS.41.1.4
A. Khanova, O. Protalinskiy, Kristina Igorevna Averianova
The article deals with socio-economic strategic management, which implemented on the basis of Balanced Scorecard, multidimensional modeling and its set-theoretic representation. The main idea of the article is using of modern information technology to assist in decision-making. Much attention is given to formalization of SCIPEO-modeling and integration of its sub-model. The process of developing of management decisions is considered. The integration of these tools will improve the management of the system in a situation of total or partial indeterminacy
本文研究了基于平衡计分卡、多维建模及其集合论表示的社会经济战略管理。本文的主要思想是利用现代信息技术辅助决策。重点研究scipeo模型的形式化及其子模型的集成。制定管理决策的过程被考虑。这些工具的集成将在完全或部分不确定的情况下改善系统的管理
{"title":"The Elaboration of Strategic Decisions in the Socio-Economic Systems","authors":"A. Khanova, O. Protalinskiy, Kristina Igorevna Averianova","doi":"10.31341/JIOS.41.1.4","DOIUrl":"https://doi.org/10.31341/JIOS.41.1.4","url":null,"abstract":"The article deals with socio-economic strategic management, which implemented on the basis of Balanced Scorecard, multidimensional modeling and its set-theoretic representation. The main idea of the article is using of modern information technology to assist in decision-making. Much attention is given to formalization of SCIPEO-modeling and integration of its sub-model. The process of developing of management decisions is considered. The integration of these tools will improve the management of the system in a situation of total or partial indeterminacy","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"41 1","pages":"57-67"},"PeriodicalIF":0.6,"publicationDate":"2017-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43617252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Journal of Information and Organizational Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1