Showing 51 - 60 of 84
It is presented the concept of cyber crime. There are detailed the vulnerabilities of IT applications. There are listed the types of Internet fraud. There are analyzed the predisposing factors of cyber crime. There are identified the deficiencies of the security systems. It is build a model for...
Persistent link: https://www.econbiz.de/10011004805
Depending on the time of solving a received task the users are categorized in many categories. In the paper structures of time intervals are determined for establishing types of users and models to determinate the users’ collectivities according to the time needed for solving the users’ tasks.
Persistent link: https://www.econbiz.de/10011004827
Defining citizen-oriented software. Detailing technical issues regarding update process in this kind of software. Presenting different effects triggered by types of update. Building model for update costs estimation, including producer-side and consumer-side effects. Analyzing model...
Persistent link: https://www.econbiz.de/10005154629
We define the concept of citizen-oriented computer application. Quality characteristics are set for computer applications developed in the conditions of citizen-oriented computing and outline the development cycle for these applications. It defines the conditions of existence for...
Persistent link: https://www.econbiz.de/10009416284
There are defined two optimum criteria for software analysis. For each criterion there are defined solutions in order to reach a minimum level. There are analyzed the effects of pursuing one objective over the other one. There is developed an aggregate function for which it is determined the two...
Persistent link: https://www.econbiz.de/10009416300
This analyses the Open source movement. Open source development process and management is seen different from the classical point of view. This focuses on characteristics and software market tendencies for the main Open source initiatives. It also points out the labor market future evolution for...
Persistent link: https://www.econbiz.de/10009416337
The informatics security concept is defined. For informatics applications which have a classical structure, the development, current use, maintenance, and reengineering particularities are described for distributed systems and m-applications. Metrics are built for the security of open...
Persistent link: https://www.econbiz.de/10009416380
The computational encryption is used intensively by different databases management systems for ensuring privacy and integrity of information that are physically stored in files. Also, the information is sent over network and is replicated on different distributed systems. It is proved that a...
Persistent link: https://www.econbiz.de/10009416412
It is presented the concept of applied informatics systems audit. Types of systems are identified, depending on specialization and location. There are given quality criteria considered when designing and building systems. In this paper are described modules and functions implemented by the...
Persistent link: https://www.econbiz.de/10009416474
There is defined the concept of digital content. The requirements of an efficient management of the digital content are established. There are listed the quality characteristics of digital content. Orthogonality indicators of digital content are built up. They are meant to measure the image, the...
Persistent link: https://www.econbiz.de/10009416510