Informatica Economica

Published by Bucharest University of Economic Studies
Online ISSN: 1453-1305
Publications
Formularul de introducere a datelor iniţiale În partea de jos a formularului apare calculul cursului forward la vânzare şi cumpărare. Câmpurile au fost calculate cu ajutorul utilitarului Expression Builder. Un exemplu de calcul este ilustrat în figura 2. Aplicaţiile construite cu ajutorul bazelor de date au ca produs final, în general un raport. După cum se ştie în Access raportul este un tip de afişare continuă a datelor şi este destinat în mod special tipăririi. Cu ajutorul unui raport pot fi obţinute datele centralizate (figura 3.).  
Exemplu de câmp calculat cu ajutorul utilitarului Expression Builder  
Raport pe datele iniţiale Facilitatea de raportare permite şi un export de date direct de pe interfaţă cu posibilitate de specificare grupări, formatări şi funcţii matematice simple. Acest export se poate realiza şi în Word, aşa cum se vede în figura 4. De asemenea există şi un sistem de avertizare care poate fi asociat evenimentelor definite de utilizator şi posibilitatea definirii unor profiluri şi a unor drepturi de acces pe nivele diferite de utilizare. În figura 5 am exemplificat un grafic creat pe datele rezultate cu ajutorul aplicaţiei Chart Wizard.  
Article
The exchange rate set the present rate for a foreign currency transaction with payment or delivery at some future date. Forward rates are calculated by using the current exchange rate for the currency pair and the interest rates for the two currencies and allow you to lock in rate now for a future. This paper describes the formulas which determinate the forward exchange rate and how can we implement them in a short, but efficient informatics application.
 
Article
Due to increased demand for qualified human resources, for 'new & rare skills', for software solutions, reliable products and services in the field of applied informatics, there are large available financial funds that can be accessed by Informatics and Cybernetics schools. Edu-cational and research departments must capitalize funds provided by the Europe-an/international institutions and private companies, by supporting the creation of spin-off en-tities that will conduct technology transfer projects. These funds must be used to increase the quality of teaching and to improve research results by assuring the financial needs and tech-nical resources of teachers (project based payments), students (scholarships projects) and the community (public available projects). The presented strategy, University 4.4 describes four development directions for a four years period. It has been developed by Catalin Boja, Razvan Bologa, Marius Popa and Cristian Toma and since November 2011 it represents the assumed development strategy of The Department of Economic Informatics and Cybernetics (DICE) from The Bucharest University of Economic Studies.
 
Article
In this paper we are using UML (Unified Modeling Language) which is the blueprint language between the programmers, analysts, and designer’s for easy representation of pictures or diagrammatic notation with some textual data. Here we are using UML 5.0 to show “prototype of the Intrusion Detection Model†and by explaining it by combining various parts by drawing various UML diagrams such as Use cases and Activity diagrams and Class Diagram using which we show forward engineering using the class diagram of the IDM( Intrusion Detection Model). IDM is a device or software that works on detecting malicious activities by unauthorized users that can cause breach to the security policy within a network.
 
Article
The implementation of an efficient university knowledge management system involves the de-velopment of several software tools that assist the decision making process for the three main activities of a university: teaching, research, and management. Artificial intelligence provides a variety of techniques that can be used by such tools: machine learning, data mining, text mining, knowledge based systems, expert systems, case-based reasoning, decision support systems, intelligent agents etc. In this paper it is proposed a generic structure of a university knowledge management system, and it is presented an expert system, ACDI_UPG, developed for academic research activity evaluation, that can be used as a decision support tool by the university knowledge management system for planning future research activities according to the main objectives of the university and of the national / international academic research funding organizations.
 
Article
Continuation and development of the research in Adaptable Programming Initialization [Tod-05.1,2,3] is presented. As continuation of [Tod-05.2,3] in this paper metalinguistic tools used in the process of introduction of new constructions (data, operations, instructions and controls) are developed. The generalization schemes of evaluation of adaptable languages and systems are discussed. These results analogically with [Tod-05.2,3] are obtained by the team, composed from the researchers D. Todoroi [Tod-05.4], Z. Todoroi [ZTod-05], and D. Micusa [Mic-03]. Presented results will be included in the book [Tod-06].
 
Article
As continuation of the research results [Tod-05.3] in this paper metalinguistic tools used in the process of introduction of new constructions (data, operations, instructions and controls) are developed. It was done the overview of extensible languages according used extension mechanisms, presented by different types of extenders. Extensions in languages and systems are defined according different phases of translation such as lexical analysis, syntactical control, semantic analysis, translation into intermediate language, and link phase. It was presented a lot of extensible languages and systems and examples of usage of different types of extenders. The generalization schemes of evaluation of adaptable languages and systems are discussed. Development of the research in Adaptable Programming Basis [Tod-05.1,2,3] is presented. These results analogically with [Tod-05.2,3] are obtained by the team, composed from the researchers D. Todoroi [Tod-05.4], Z. Todoroi [ZTod-05], and D. Micusa [Mic-03]. Present results are included in the book [Tod-06]
 
Structura logică a S.S.D Componentele unui S.S.D. sunt următoarele: Informaţii/date despre organizaţie. Această componentă conţine cele mai relevante informaţii despre concordanţa şi potenţialul telelucrului şi ar trebui să conţină cel puţin următoarele trei aspecte: -angajaţii: date personale de contact, vârsta, funcţia şi nivelul ierarhic în organizaţie, nivelul de educaţie, dorinţa de educaţie continuă, absenteism, dorinţa de telelucru, loialitate faţă de angajator; analize ale satisfacţiei postului de lucru; opinia proprie despre telelucru; opinia proprie despre sprijinul organizaţiei; opinia proprie despre metodele de evaluare şi recompensare a performanţei; distanţele dintre promovările ierarhice. -posturile: informaţii relevante despre sarcinile pe care telelucrătorii ar trebui să le rea- lizeze; -identificarea şi prioritizarea importanţei diferitelor posturi cu potenţial ridicat de organizare în forma telelucrului; -evaluarea rezultatelor analizei funcţiilor posturilor: gradul de încărcare a posturilor, evaluat pe perioade calendaristice sau cicluri tehnologice; sarcini ale posturilor cu performanţă scăzută în configuraţia clasică; sarcini ale posturilor cu performanţă ridicată în configuraţia clasică; -costurile şi informaţiile relevante despre nivelul costurilor pentru menţinerea unui nivel dorit al performanţelor/realizărilor: costul salarial pe niveluri ierarhice; costurile administrative pe niveluri ierarhice şi categorii de posturi cu asigurările spaţiilor, cu întreţinerea spaţiilor şi cu cheltuielile indirecte; costurile viitoare privind echipamentele necesare telenavetei; costurile viitoare privind instruirile şi educaţia telelucrătorilor; costurile  
Article
The following considerations present a possible work model for the study of feasibility of adopting telework and present a systematic approach for the purpose of telework opportunity evaluation by the managers. The main objective is to develop a conceptual framework and a decision support system for the managers responsible with implementing telework within their own organizations.
 
Article
The impact of introducing a tax on tobacco consumption can be studied trough an adverse selection model. The objective of the model presented in the following is to characterize the optimal contractual relationship between the governmental authorities and the two type employees: smokers and non-smokers, taking into account that the consumers’ decision to smoke or not represents an element of risk and uncertainty. Two scenarios are run using the General Algebraic Modeling Systems software: one without taxes set on tobacco consumption and another one with taxes set on tobacco consumption, based on an adverse selection model described previously. The results of the two scenarios are compared in the end of the paper: the wage earnings levels and the social welfare in case of a smoking agent and in case of a non-smoking agent.
 
Article
This paper links communications and media usage to social and household economics boundaries. It highlights that in present day society, communications and media are a necessity, but not always affordable, and that they furthermore open up for addictive behaviors which raise additional financial and social risks. A simple and efficient methodology compatible with state-of-the-art social and communications business statistics is developed, which produces the residual communications and media affordability budget and ultimately the value-at-risk in terms of usage and tariffs. Sensitivity analysis provides precious information on bottom-up communications and media adoption on the basis of affordability. This approach differs from the regulated but often ineffective Universal service obligation, which instead of catering for individual needs mostly addresses macro-measures helping geographical access coverage (e.g. in rural areas). It is proposed to requalify the Universal service obligations on operators into concrete measures, allowing, with unchanged funding, the needy to adopt mobile services based on their affordability constraints by bridging the gap to a standard tariff. Case data are surveyed from various countries. ICT policy recommendations are made to support widespread and socially responsible communications access.
 
Article
This paper emphasizes the importance of intelligent agents in e-commerce, with a particular focus on the B2C and B2B context. From the consumer buying behaviour perspective, agents can be used to assist the following stages: need identification, product brokering, buyer coalition formation, merchant brokering and negotiation. Related to B2B commerce, intelligent agents are involved in partnership formation, brokering and negotiation.
 
Valorile de intrare şi spaţiile de negociere posibile
(a)Utilitatea totală; (b) Distribuţia utilităţii Cel mai înalt nivel de utilitate totală pe pieţele cu un singur tip de agenţi a fost obţinut de agenţii competitivi, care încearcă maximizarea utilităţii proprii (şi converg spre o soluţie optimală), şi respectiv cei colaborativi, care urmăresc maximizarea utilităţii totale. Agenţii de compromis au încercat pentru ambele atribute valori care să fie la mijlocul intervalului , fără a ţine cont de ratele de compensare , şi ca urmare valorile obţinute sunt suboptimale . Agenţii de acomodare în încercarea de a maximiza utilitatea altor agenţi au cedat prea mult, obţinând de asemenea soluţii suboptimale . După cum era de aşteptat, agenţii cu strategie de evitare au obţinut utilitatea  
Article
We intended to analyze the behavior of an agent-based market where agents apply various negotiation strategies: competitive, collaborative, compromising, accommodating, avoiding. A feedback mechanism was introduced in order to take somehow into consideration the importance of inter-agent relationships. The experimental results where evaluated based on the total utility and on the distribution of utility among agents and they proved that competitive agents got the best utilities, not only for themselves, but also for the total utility of the negotiation in which they were involved.
 
Article
The heterogeneous tables are most used in the problem of aggregation. A solution for this problem is to standardize these tables of figures. In this paper, we proposed some methods of aggregation based on the hierarchical algorithms.
 
Article
Businesses, like people, are continuously evolving and as such face rapid and continual change. As markets and customer needs evolve, enterprises must respond with new ways to attract and retain customers and partners, increase operational efficiency, and achieve greater visibility into their business processes. IT staff see business processes through the lens of the low-level parts of the flow, rather than at the business level. As a result, they aren't capable of implementing the processes so that they will meet continuously changing business requirements, thus impeding business agility. Business users are increasingly demanding that they have control over their own business processes - and so, are requiring systems that put control of the flow and logic into their hands, not those of IT. An Enterprise Service Bus based on a Service Oriented Architecture could be a solution and tie together the notions of service oriented process, service oriented integration and event-driven, message based interaction into a single environment that enables users to combine their assets and information from multiple points of view.
 
Article
In this paper I present several novel, efficient, algorithmic techniques for solving some multidimensional geometric data management and analysis problems. The techniques are based on several data structures from computational geometry (e.g. segment tree and range tree) and on the well-known sweep-line method.
 
Article
The rapid development of wireless networks has brought more and more attention to topics related to fair allocation of resources, creation of suitable algorithms, taking into account the special characteristics of wireless environment and insurance fair access to the transmission channel, with delay bound and throughput guaranteed. Fair allocation of resources in wireless networks requires significant challenges, because of errors that occur only in these networks, such as location-dependent and bursty channel errors. In wireless networks, frequently hap-pens, because interference of radio waves, that a user experiencing bad radio conditions during a period of time, not to receive resources in that period. This paper analyzes some resource allocation algorithms for wireless networks with location dependent errors, specifying the base idea for each algorithm and the way how it works. The analyzed fair queuing algorithms differ by the way they treat the following aspects: how to select the flows which should receive additional services, how to allocate these resources, which is the proportion received by error free flows and how the flows affected by errors are compensated.
 
Article
In this paper we are presenting state of the art information methods and techniques that can be applied in the development of efficient tutorial systems and also the possibility to use genetic algorithms and fuzzy systems in the construction of such systems. All this topics have been studied during the development of the research project INFOSOC entitled "Tutorial System based on Eduknowledge for Work Security and Health in SMEs According to the European Union Directives" accomplished by a teaching stuff from the Academy of Economic Studies, Bucharest, in collaboration with the National Institute for Research and Development in Work Security, the National Institute for Small and Middle Enterprises and SC Q’NET International srl.
 
Article
The use of smartphones worldwide is growing very fast and also the malicious attacks have increased. The mobile security applications development keeps the pace with this trend. The paper presents the vulnerabilities of mobile applications. The Android applications and devices are analyzed through the security perspective. The usage of restricted API is also presented. The paper also focuses on how users can prevent these malicious attacks and propose some prevention measures, including the architecture of a mobile security system for Android devices.
 
Article
This paper presents a solution for using complex Win32API data structures and functions in Visual C# .NET applications. We built DLL (Dynamic Link Library) to manage the API functions and data structures and we used DLL modules in a C# application. This is an easier working way compared with the traditional way of importing and managing API’s functions in C# programs.
 
Usage of business rules and process engines in SOA [adapted after [17]] 
Steps of the reasoning process for the exemplified RuleML rules 
Article
As part of the Service Oriented Computing (SOC), Service Oriented Architecture (SOA) is a technology that has been developing for almost a decade and during this time there have been published many studies, papers and surveys that are referring to the advantages of projects using it. In this article we discuss some ways of using SOA in the business environment, as a result of the need to reengineer the internal business processes with the scope of moving forward towards providing and using standardized services and achieving enterprise interoperability.
 
Article
In the development process of electronic business theory, we attributed a very important role to technologies of business projection on the Internet. Starting with this idea, in the following article we will compare the most used technologies in the development of electronic business application like ASP and PHP.
 
Article
Applying the Arbitrage Pricing Theory model (APT), there can be identified the major factors of influence for a BVB’ portfolio stocks’ trend. There were taken into consideration two of the APT theory models, establishing influences upon portfolio’s yield: given to macroeconomic environment and to some stochastic factors. The research’s results certify that, on the long term, what influences the stocks’ movement in the stock market is mostly the action of specific short-term factors, without general covering, like the ones that are classified in the research area of behavioral finance (investors’ preference towards risk and towards time).
 
Article
The aim of this paper is to outline the requirements and main architecture for a useful tool for determining the nutrition facts of food for people having Type 2 Diabetes. This diabetes is used only to establish the target audience, a “mass of people†having, maybe, to less in common regarding the computer usage skills. The characteristics of the target audience (huge number, diversity of habits and behaviors, computer usage skills) requires a solution based on web services delivered at least partly as a standalone/ portable application, build from Web services and provided with means for domain knowledge dissemination and usage.
 
Article
The generic business architecture offers an efficient solution for the business engineering and re-engineering processes. This approach strengthen the cooperation between the main actors involved in the business architecture design and implementation, aiming at including all the significant views in a integrated model. The main goal of the development of generic business architectures is to offer a standard model for the integration of the internal processes and for a better management of the technological and informational resources of the enterprise. Such standardization has as main benefits the increase of the management quality and the efficiency in the business engineering processes.
 
BWS Open System Processing service architecture 
Article
Business process management systems play a central role in supporting the business operations of medium and large organizations. This paper analyses the properties current business enterprise systems and proposes a new application type called Open Business Enterprise Sys-tem. A new open system architecture called Business Workflow System is proposed. This ar-chitecture combines the instruments for flexible data management, business process manage-ment and integration into a flexible system able to manage modern business operations. The architecture was validated by implementing it into the DocuMentor platform used by major companies in Romania and US. These implementations offered the necessary data to create and refine an enterprise integration methodology called DM-CPI. The final section of the paper presents the concepts, stages and techniques employed by the methodology.
 
Article
This paper present and implement a Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Application. In the developing process is used a Windows Phone 7 application that interact with a WCF Web Service and a database. The types of Business Intelligence Mobile Applications are presented. The Windows mobile devices security and restrictions are presented. The namespaces and security algorithms used in .NET Compact Framework for assuring the application security are presented. The proposed architecture is showed underlying the flows between the application and the web service.
 
Article
The generic software architecture offers a solution for the the information system's development and implementation. A generic software/non-software model could be developed by integrating the enterprise blueprint concept (Zachman) and the object oriented paradigm (Coad's archetype concept). The standardization of the generic software architecture for various specific software components could be a direction of crucial importance, offering the guarantee of the quality of the model and increasing the efficiency of the design, development and implementation of the software. This approach is also useful for the implementation of the ERP systems designed to fit the user’s particular requirements.
 
Article
In this paper we describe a layered software architecture in the management of a manufactur-ing company that intensively uses computer technology. Application tools, new and legacy, after the updating, operate in a context of an open web oriented architecture. The software architecture enables the integration and interoperability among all tools that support business processes. Manufacturing Executive System and Text Mining tools are excellent interfaces, the former both for internal production and management processes and the latter for external processes coming from the market. In this way, it is possible to implement, a computer integrated factory, flexible and agile, that immediately responds to customer requirements.
 
Article
Industry and in particular the manufacturing-oriented sector has always been researched and innovated as a result of technological progress, diversification and differentiation among consumers' demands. A company that provides to its customers products matching perfectly their demands at competitive prices has a great advantage over its competitors. Manufacturing-oriented information systems are becoming more flexible and configurable and they require integration with the entire organization. This can be done using efficient software architectures that will allow the coexistence between commercial solutions and open source components while sharing computing resources organized in grid infrastructures and under the governance of powerful management tools.
 
Article
This paper presents a model for an integrated security system, which can be implemented in any organization. It is based on security-specific standards and taxonomies as ISO 7498-2 and Common Criteria. The functionalities are derived from the classes proposed in the Common Criteria document. In the paper we present the process model for each functionality and also we focus on the specific components.
 
Article
Authors present in this paper a model that can be used to organize the data in an electronic archive. It will be explained, first of all, the archive concept, the electronic archive concept and the document management concept. It will be presented, afterwards, an object oriented model proposed by the authors of the storage data in an electronic archive.
 
Article
There are some significant theoretical and technological approaches on the issue of object-relational "impedance mismatch" between applications' abstract model and database structures. Two characteristics of those approaches we think that are questionable: first of all it is so called “flat†nature of relational systems and model, and then there is the drawback of the storage of (object oriented) semantics on the application level, thus severe limiting the data (object) sharing and, at the same time, virtually broking the data independence principle of database systems architecture. In this paper we will try to outline an approach to address to some in a concrete manner.
 
Article
It is known that the key properties of every computer system interface is to be very friendly. What is more natural than a communication between human and machine realized in natural language? Natural language is a medium for human-machine interaction that has several obvious and desirable properties: it provides a means of accessing information in the computer independently of its structure and encodings, it shields the user from the formal access language of the underlying system and it is available with a minimum of training. There are many approaches regarding natural language processing but in this study, I focus my attention to DCG grammar, and shortly, ATN grammar. I have tried to present the main analysis that must be performed while processing a text: syntactic analysis, morphologic analysis, semantic analysis and pragmatic analysis.
 
Article
Information societies involve the usage of information technology and communications (ITC) on a large scale. The dependence on ITC is an unquestionable problem in the present, because we assist to a generality of computers usage in all economic and social life activities. That is why organization information systems became accessible at the global level and there are permanently open for a quick exchange of information between different categories of users located by different geographical nods. The ITC usage involves the existing of some risks that should be known, evaluation and based on these, we must have information systems security measure. We consider that the risk is an indicator very important that must be permanently assess in the usage process of the information system based on ITC. Risk management suppose a permanently evaluation of these problems and also restrain by some practical actions who goes to the decrease of its effects. From the expose point of view, in this paper work it is presented the results of research based on specialty literature and current cases from practical activities, regarding the risks of ITC usage and their diminishing measure. There are distinguished the main factors (threat, vulnerability and impact) who affect the information risk and on the other way, diminishing measure of the action to these factors for optimum working of an economic and social organism who use ITC. We consider that through proposed measures we assume safety in design process, implement and usage of the informational systems based on ITC.
 
Schema bloc logica a sistemul de instruire  
Pagina de început a portalului platformei colaborative Prin structura lor, ariile definite pentru platforma Colaborativ evidenţiază distincţia  
Pagina de început a unui curs Capitolele cursului sunt organizate în pagini de conţinut dezvoltate în cadrul Sistemului de gestiune a conţinutului informaţional sau reprezentând site-uri publice în Internet, alte sisteme similare de instruire etc. De asemenea , este inclusă o legătură " Test " către componenta de testare a cursului care propune utilizatorului un sistem interactiv pentru evaluarea nivelului de cunoştinţe. Fiecare curs beneficiază de propriul site Web folosit drept depozitul central al informaţiilor folosite in cadrul cursului: documente, contacte , activităţi, discuţii şi multe altele. Formatul şablon al paginii de început (Home) al unui asemenea site este prezentată în figura 8. Un loc aparte în conţinutul cursurilor, din perspectiva managementului procesului instrucţional, îl reprezintă paginile de formulare (surveys). Lansarea unor chestionare specifice printre cursanţi, dar şi printre membrii echipelor de formatori, pot ghida managerii în definirea unor noi programe de instruire sau în reconsiderarea celor existente. Pagina New Survey, de definire a unei cercetări şi a chestionarului asociat se prezintă în figura 5.  
Exemplu de chestionar pentru testarea cunoştinţelor Pe lângă specificarea unui nume, a unei descrieri şi a unei soluţii de navigare, se remarcă o zonă de opţiuni (Survey Options), care îi permite utilizatorului care iniţiază cercetarea să stabilească o serie de condiţii în care se desfăşoară aceasta: dacă se specifică sau nu numele respondentului, dacă sunt permise răspunsuri multiple etc. De remarcat că, după înregistrarea primară a răspunsurilor, rezultate superioare în analiza acestora se pot obţine prin exportul şi prelucrarea datelor în foi de calcul Excel, cu folosirea de tabele şi diagrame pivot sau a altor tehnici de analiză şi sinteză a datelor, aşa cum apare în figura 6.  
Pagina cu cereri de conectare 3.1 Gestiunea utilizatorilor În forma actuală, orice persoană care doreşte să aibă cont pe site-ul sistemului, îşi poate adăuga datele intrând în secţiunea Înscrie-te aici, prezentată în figura 10, cu o parte din utilizatorii înregistraţi iniţial, la publicarea sistemului în vederea testării. Se selectează New Item şi se completează informaţiile în pagina prezentată în figura 7.  
Article
The world has entered the Knowledge Age. Information Technology is gradually turning the world into an Information Highway Network. The development of technology has greatly accelerated the international flow of information, capital and commodities and speeded the growth of economic integration. At the same time, the cycle of technological development and commercialization is becoming shorter and shorter [Zhouying, 1999]. Information technology is bringing rapid and profound changes to higher education, as it has to virtually every process in our society. Productivity often suffers because is difficult and timeconsuming to conduct a team effort. A portal solution base on SharePoint Portal Server can greatly facilitate the process of bringing knowledge teachers together as a team to achieve educational goals by providing a single point to access: automated essential day-to-day email communication, management of contacts, calendars, and instant messages, shared facilities to allow small teams of teachers to contribute to team and project-focused Web site, track tasks and events, shortened web-publishing cycles by linking collaboration and publishing processes.
 
Article
Technology determines new borders for knowledge domain while education reflects more complex activities. A solution in this context is to integrate technology in the educational system, extending it as e-Education.E-Education is a dynamic system and a conceptdeveloped on three kinds of infrastructure which are likely to emerge: technological infrastructure, conceptual infrastructure of the type ofthe study programmes, and cognitive infrastructure of all participants involved in the teaching-learning activities. The purpose of this paper is to provide a meaningful framework for contextual learning, developed on the idea that a personal computer can deliver many skills to a student, but only academic environment can connect those skills to a modern community where they belong. This approach is developed on the much known principle which sustain that the educational system becomes the engine of the learning society.
 
Overview for an integrated measurement programme, adapted from [16] 
Article
The paper presents how an assessment system is implemented to evaluate the IT&C audit process quality. Issues regarding theoretical and practical terms are presented together with a brief presentation of the metrics and indicators developed in previous researches. The implementation process of an indicator system is highlighted and linked to specification stated in international standards regarding the measurement process. Also, the effects of an assessment system on the IT&C audit process quality are emphasized to demonstrate the importance of such assessment system. The audit process quality is an iterative process consisting of repetitive improvements based on objective measures established on analytical models of the indicators.
 
Article
In the most important political, economical and technical forces that will act to production and service development in next decades are also counted the information and knowledge from the point of view of the all aspects. The information development imposes the use of adequate tools to assure a high-level quality of these ones, taking into account the costs. The paper approaches the data flow audit within small and medium enterprises as an useful tool in competitive increasing of these economical structures.
 
The net impact level on audited information system 
Methodology for performance evaluation, adapted from [12]
Performance assessment framework for audit processes 
Article
The paper defines an assessment system for performance of IT&C audit process. The analytical models of performance indicators are provided together with the interpretation of their results. Performance levels catch the quality characteristics of the audit processes carried out for distributed informatics systems. Also, the paper presents a performance assessment framework for audit processes and a performance audit methodology. The impact of performance indicators is defined as the organization’s income after performance audit recommendation implementing. Methods and techniques for performance assessment are provided for audit processes of the distributed informatics system. The impact levels of performance indicators are calculated before implementation of the performance recommendation and after that to establish whether the performance audit increases the quality of IT&C audit processes.
 
Article
In software engineering, several formal models and tools are proposed for defining system requirements and constraints formally. Such formal definitions can help in the automatic checking and verification for them. It can also help in the automatic test case generation, execution and verification. In this paper, we will demonstrate and evaluate the usage of Spec Explorer from Microsoft for defining and checking examples of software controlled system such as cruise control. Such formal requirements can be eventually embedded in the developed system or can help in exposing important elements to test in the testing stage or through the usage of the application
 
Article
In this article we give the mathematical theory of some credibility models. The first section describes the original credibility model of Bühlmann and we derive the best linearized credibility estimator for this model. His original model, involving only one contract, contains the basics of all further credibility models. Section 2 contains a description of the Hachemeister regression model allowing for effects like inflation.
 
Article
Internet Banking (known also as online banking) allows performing transactions and payments over the internet through a bank's secure website. This can be very useful, especially for banking outside bank hours (which tend to be very short) and banking from anywhere where internet access is available. In most cases a web browser such as Internet Explorer or Mozilla Firefox is utilized and any normal internet connection is suitable. No special software or hardware is usually needed.
 
Article
RAD as a methodology for implementing information systems has been used in a broad range of domains utilizing technology as an informational backbone but perhaps one of the main areas where this approach has been proven to be a natural fit has been in the investment banking (IB) industry, most notably when applied to trading systems. This paper introduces some of the main tenants of RAD development and focuses on a number of case studies where RAD has proven to be an extremely suitable method for implementing solutions required in the IB industry as well as explaining why RAD may be more successful than other classic de-velopment methods when applied to IB related solutions.
 
Article
Database programming languages integrate concepts of databases and programming languages to provide both implementation tools for data-intensive applications and high-level user interfaces to databases. Frequently, database programs contain a large amount of application knowledge which is hidden in the procedural code and thus difficult to maintain with changing data and user views. This paper presents a first attempt to improve the situation by supporting the integrated definition and management of data and rules based on a setoriented and predicative approach. The use of database technology for integrated fact and rule base management is shown to have some important advantages in terms of fact and rule integrity, question-answering, and explanation of results.
 
Article
This article presents some aspects about a project integrated in a national research and development project "Information society" (INFOSOC) financed by Romanian Government. A iLab called LABVirt is available for use by Universities, college, high-school.The goal of this paper is to present the main components of LABVirt, Romanian solution for remote lab access.
 
Article
The present paper makes a short presentation of the Bayesian decions method, where extrainformation brings a great support to decision making process, but also attract new costs. In this situation, getting new information, generally experimentaly based, contributes to diminushing the uncertainty degree that influences decision making process. As a conclusion, in a large number of decision problems, there is the possibility that the decision makers will renew some decisions already taken because of the facilities offered by obtainig extrainformation.
 
Data virtualization tool vendors [8] 
Composite Data Virtualization Platform [9] 
Article
Providing a unified enterprise-wide data platform that feeds into consumer applications and meets the integration, analysis and reporting users’ requirements is a wish that often involves significant time and resource consumption. As an alternative to developing a data warehouse for physical integration of enterprise data, the article presents data virtualization technology. There are presented its main strengths, weaknesses and ways of combining it with classical data integration technologies. Current trends in data virtualization market reveal the great potential of growth of these solutions, which appear to have found a stable place in the portfolio of data integration tools in companies.
 
Article
All transformations of our society are the product of the large use of Information and Communications Technologies (ICT) and Internet. ICT are technologies which facilitate communication, processing, and transmission of information by electronic means. It is very important to use the new technologies to the correct value because this determinate an increase of global benefits. Portal provides a consistent way to select, evaluate, prioritize and plan the right information. In research we point the important costs and benefits for an informational portal. The portal for local administrative determinate for citizens the access to information of interest and on the other hand make easier for employer to manage the documents.
 
Article
Our knowledge society is quickly becoming a ‘transparent’ one. This transparency is acquired, among other means, by ’personalization’ or ‘profiling’: ICT tools gathering contextualized information about individuals in men–computers interactions. The paper begins with an overview of these ICT tools (behavioral targeting, recommendation engines, ‘personalization’ through social networking). Based on these developments the analysis focus a case study of developments in social network (Facebook) and the trade-offs between ‘personalization’ and privacy constrains. A deeper analysis will reveal unexpected challenges and the need to overcome the privacy paradigm. Finally a draft of possible normative solutions will be depicted, grounded in new forms of individual rights.
 
Article
One of the most used buzz-words in (e-)business literature of the last decade is virtual organization. The term "virtual" can be identified in all sorts of combinations regarding the business world. From virtual products to virtual processes or virtual teams, everything that is “touched†by the computer’s processing power instantly becomes virtual. Moreover, most of the literature treats virtual and network organizations as being synonyms. This paper aims to draw a much more distinctive line between the two concepts. Providing a more coherent description of what virtual organization might be is also one of our intentions.
 
Article
There are defined two optimum criteria for software analysis. For each criterion there are defined solutions in order to reach a minimum level. There are analyzed the effects of pursuing one objective over the other one. There is developed an aggregate function for which it is determined the two criteria composed level. Based on this value it is selected the optimum solution
 
Top-cited authors
Bogdan Ghilic-Micu
  • Bucharest Academy of Economic Studies
Marinela Mircea
  • Bucharest Academy of Economic Studies
Marian Stoica
  • Bucharest Academy of Economic Studies
Cristian Ciurea
  • Bucharest Academy of Economic Studies
Costin Pribeanu
  • Academy of Romanian Scientists