Showing 1 - 10 of 11
It is presented the concept of cyber crime. There are detailed the vulnerabilities of IT applications. There are listed the types of Internet fraud. There are analyzed the predisposing factors of cyber crime. There are identified the deficiencies of the security systems. It is build a model for...
Persistent link: https://www.econbiz.de/10011004805
Depending on the time of solving a received task the users are categorized in many categories. In the paper structures of time intervals are determined for establishing types of users and models to determinate the users’ collectivities according to the time needed for solving the users’ tasks.
Persistent link: https://www.econbiz.de/10011004827
There will be presented the types of distributed applications. The quality characteristics for distributed applications will be analyzed. There will be established the ways to assign access rights. The authentication category will be analyzed. We will propose an algorithm for the optimization of...
Persistent link: https://www.econbiz.de/10005154571
Defining citizen-oriented software. Detailing technical issues regarding update process in this kind of software. Presenting different effects triggered by types of update. Building model for update costs estimation, including producer-side and consumer-side effects. Analyzing model...
Persistent link: https://www.econbiz.de/10005154629
Online applications are presented in the context of information society. Online applications characteristics are analyzed. Quality characteristics are presented in relation to online applications users. Types of users for AVIO application are presented. Use cases for AVIO application are...
Persistent link: https://www.econbiz.de/10009275910
There are defined the objectives, the means, the principles and the directions that must be followed by a strategy for the education and research system in Romania. There are identified the system components and the stages that must be accomplished, in order to obtain an adequate behaviour that...
Persistent link: https://www.econbiz.de/10005581625
In this material electronic market are defined. How they are structured. Security in E-Commerce applications is very important both at the administrative level and from the user perspective. The new trend in the field is the M-commerce that involves making purchases through mobile devices. And...
Persistent link: https://www.econbiz.de/10010681049
The objective, necessity, means and estimated efficiency of information security cost modeling are presented. The security requirements of distributed informatics applications are determined. Aspects regarding design, development and implementation are established. Influence factors for...
Persistent link: https://www.econbiz.de/10008763605
The context of the knowledge based society is presented. The new user requirements in the context of the new society are analyzed. Basic concepts regarding the citizen oriented applications are presented. Issues specific to the citizen oriented applications are presented. The development cycle...
Persistent link: https://www.econbiz.de/10008763672
It is defined the concept of similar software. There are established conditions of archiving the software components. It is carried out the orthogonality evaluation and the correlation between the orthogonality and the complexity of the homogenous software components is analyzed. Shall proceed...
Persistent link: https://www.econbiz.de/10008763674