Academy of Economic Studies

Displaying 1-40 of 67 results

  • White Papers // Sep 2013

    Security Solutions for Privacy Preserving Improved Data Mining

    Approaches of data analysis in the context of Business Intelligence solutions are presented, when the data is scarce with respect to the needs of performing an analysis. Several scenarios are presented: usage of an initial dataset obtained from primary data as a reference for the quality of the results, enriching...

    Provided By Academy of Economic Studies

  • White Papers // Feb 2013

    Managing Information Technology Security in the Context of Cyber Crime Trends

    Cyber-attacks can significantly hurt an organization's IT environment, leading to serious operational disruptions, from simply damaging the first layers of IT security up to identity theft, data leakage and breaking down networks. Moreover, the dangers through which current cybercrimes practices affect organizations present a tendency of developing more rapidly that...

    Provided By Academy of Economic Studies

  • White Papers // Jan 2013

    Grid and Data Analyzing and Security

    In this paper, the author examines the importance of secure structures in the process of analyzing and distributing information with aid of Grid-based technologies. The advent of distributed network has provided many practical opportunities for detecting and recording the time of events, and made efforts to identify the events and...

    Provided By Academy of Economic Studies

  • White Papers // Jan 2013

    Real-Time Business Intelligence for the Utilities Industry

    In today's competitive environment with rapid innovation in smart metering and smart grids, there is an increased need for Real-Time Business Intelligence (RTBI) in the utilities industry. Giving the fact that this industry is an environment where decisions are time sensitive, RTBI solutions will help utilities improve customer experiences and...

    Provided By Academy of Economic Studies

  • White Papers // Jan 2013

    Open Source Security Tools

    In this paper, the authors trying to provide a better understanding about how open source community enriched the wealth of Information System and even developed the Internet as it is today. The paper gradually presents the main aspects of open source software and highlights the security issues that are part...

    Provided By Academy of Economic Studies

  • White Papers // Jan 2013

    Reengineering Systems' Architecture for Service Oriented Businesses

    Service oriented technology and management have captured the attention of researchers and systems developers on the last few years for the purpose of finding methods to increase the companies' agility, to provide flexible business processes that would increase the value of services provided to customers. The orientation on services appears...

    Provided By Academy of Economic Studies

  • White Papers // Dec 2012

    Analysis of Return on Investment in Different Types of Agile Software Development Project Teams

    This paper investigates how the choice of agile methods in different development project teams affects the Return-On-Investment (ROI). In this paper different types of software project teams are analyzed in order to examine and identify the business-value of using agile methods. In various software development project teams, the ROI of...

    Provided By Academy of Economic Studies

  • White Papers // Oct 2012

    Cloud Computing and Smart Grids

    Increasing concern about energy consumption is leading to infrastructure that supports real-time, two-way communication between utilities and consumers, and allows software systems at both ends to control and manage power use. To manage communications to millions of endpoints in a secure, scalable and highly-available environment and to achieve these twin...

    Provided By Academy of Economic Studies

  • White Papers // Oct 2012

    Pentaho Business Analytics: A Business Intelligence Open Source Alternative

    Most organizations strive to obtain fast, interactive and insightful analytics in order to fundament the most effective and profitable decisions. They need to incorporate huge amounts of data in order to run analysis based on queries and reports with collaborative capabilities. The large variety of Business Intelligence solutions on the...

    Provided By Academy of Economic Studies

  • White Papers // Oct 2012

    ERP and e-Business Application Deployment in Open Source Distributed Cloud Systems

    In this paper, the authors present the way in which they combine SlapOS, the fist open source operating system for distributed cloud computing, and Enterprise Resource Modeling (ERP) to provide a simple, unified API for E-Business Applications based on Iaas, PaaS and SaaS models. SlapOS is based on a grid...

    Provided By Academy of Economic Studies

  • White Papers // Oct 2012

    Issues in WiFi Networks

    The WiFi is common name for wireless local area networks technology complying with IEEE 802.11 standards and owned by WiFi Alliance. The WiFi Alliance promotes standards with the aim of improving the interoperability of wireless local area network products based on the IEEE 802.11 standards. The paper has four sections....

    Provided By Academy of Economic Studies

  • White Papers // Oct 2012

    Secure Single Sign-On using CAS and OpenID

    As the number of connected applications increases, user convenience makes them use the same password, which can create vulnerabilities in an organization's infrastructure. Therefore, those with security concerns regarding these activities, conducted in the electronic environment, came to support the idea of Single Sign-On systems, having the user in mind....

    Provided By Academy of Economic Studies

  • White Papers // Jul 2012

    Perspectives on the Role of Business Rules in Database Design

    Business rules are at the foundation of every information system as they drive and offer guidelines for managing and conducting all activities within an organizations. They are important both for operational systems and for analytical ones, as they can serve as data quality rules. Several business rules implementation solutions are...

    Provided By Academy of Economic Studies

  • White Papers // Jul 2012

    Cyber Security Policy. A Methodology for Determining a National Cyber-Security Alert Level

    Now-a-days, assuring the security of the national cyber-space has become a big issue that can only be tackled through collaborative approaches. Threats cannot be confined to a single computer system just as much as computer systems are rendered useless without being connected to a supporting network. The authors of this...

    Provided By Academy of Economic Studies

  • White Papers // Mar 2012

    E-Readiness of Romanian SMEs

    It is undeniable the importance of SMEs in economic growth since they play their proper role in the emerging digital economy. But also have to consider the electronic preparation of these, their ability to absorb knowledge and to profit from their use, the e-accessibility and value added goods/services through ICT....

    Provided By Academy of Economic Studies

  • White Papers // Feb 2012

    BWS Open System Architecture Security Assessment

    Business process management systems play a central role in supporting the business operations of medium and large organizations. Because of this the security characteristics of these systems are becoming very important. The present paper describes the BWS architecture used to implement the open process aware information system DocuMentor. Using the...

    Provided By Academy of Economic Studies

  • White Papers // Jan 2012

    Business Intelligence using Software Agents

    This paper presents some ideas about business intelligence today and the importance of developing real time business solutions. The authors make an exploration of links between business intelligence and artificial intelligence and focuses specifically on the implementation of software agents-based systems in business intelligence. There are briefly presented some of...

    Provided By Academy of Economic Studies

  • White Papers // Dec 2011

    Information Security Standards

    The use of standards is unanimously accepted and gives the possibility of comparing a personal security system with a given frame of reference adopted at an international level. A good example is the ISO 9000 set of standards regarding the quality management system, which is a common reference regardless of...

    Provided By Academy of Economic Studies

  • White Papers // Dec 2011

    OpenID, a Single Sign-On Solution for E-learning Applications

    The e-learning applications of today require a special focus on security. Distributed e-learning applications have several modules user can access using different clients (desktop or mobile). The same user has several accounts with different credentials. In this context, the SSO (Single Sign-On) solutions become very attractive since the user has...

    Provided By Academy of Economic Studies

  • White Papers // Dec 2011

    A Perspective on the Benefits of Data Virtualization Technology

    Providing a unified enterprise-wide data platform that feeds into consumer applications and meets the integration, analysis and reporting users' requirements is a wish that often involves significant time and resource consumption. As an alternative to developing a data warehouse for physical integration of enterprise data, the article presents data virtualization...

    Provided By Academy of Economic Studies

  • White Papers // Dec 2011

    The BWS Open Business Enterprise System Architecture

    Business process management systems play a central role in supporting the business operations of medium and large organizations. This paper analyses the properties current business enterprise systems and proposes a new application type called Open Business Enterprise System. A new open system architecture called Business Workflow System is proposed. This...

    Provided By Academy of Economic Studies

  • White Papers // Dec 2011

    Vulnerability Analysis in Web Distributed Applications

    In this paper, the authors analyze vulnerabilities found on web based distributed applications from different perspectives. Classes of vulnerabilities types are identified in order to cope with their different characteristics that each one develops. Methods for analyzing vulnerabilities of an authentication process are developed and solutions are proposed. A model...

    Provided By Academy of Economic Studies

  • White Papers // Nov 2011

    Requirements for Development of an Assessment System for IT&C Security Audit

    IT&C security audit processes are carried out to implement information security management. The audit processes are included in an audit program as decision of the management staff to establish the organization situation against to the planned or expected one. The audit processes require evidence to highlight the above issues. The...

    Provided By Academy of Economic Studies

  • White Papers // Nov 2011

    Integrating E-Payment Services with RIA Applications

    In the area of web technologies, RIA brings a new perspective regarding user experience. The authors have arrived at a point in which the initial visible distinctions between classical desktop applications and web applications can be overcome. The classic development approach for web applications has determined a lack of expressivity...

    Provided By Academy of Economic Studies

  • White Papers // Nov 2011

    Implementing Graphic Passwords in Directory Services Systems

    The need to increase the security level of multimedia systems led them to consider the implementation of a graphical password within the system itself. This paper presents the necessary steps for the implementation of multimedia password support within Directory Services. The trend of using multimedia mechanisms is quite new and...

    Provided By Academy of Economic Studies

  • White Papers // Nov 2011

    The Cost Influence on Reliability and Security of the Software Systems

    Introduce the software engineering reliability into organizations have a strong role which relieve the maturity degree of these organizations. Although, direct economic information's are, in general, difficult to obtain through reason connected of confidentialities. Currently is observe the relation cost-benefit in the case of the using the software engineering reliability...

    Provided By Academy of Economic Studies

  • White Papers // Nov 2011

    WiMAX Security Issues in E-learning Systems

    WiMAX (Worldwide Interoperability for Microwave Access) is a point-to-multipoint wireless network based on IEEE 802.16 standard. The WiMAX signal is broadcasted from a base station to the wide-geographically spread receivers. WiMAX enabled mobile devices become very popular due to the fact the network connections can be easily maintained on move....

    Provided By Academy of Economic Studies

  • White Papers // Nov 2011

    Security in SPGBP - Simulation of Protein Generation Bioinformatic Project

    Bioinformatics has known a rapid growth in the last decade, along with the development of the genomic projects worldwide. The Human Genome Project alone offers the sequences for 70 000 - 100 000 genes, as terra bytes of information. The major challenge now-a-days is to process this huge amount of...

    Provided By Academy of Economic Studies

  • White Papers // Nov 2011

    An Adaptive Authorization Model Based on RBAC

    In the area of access control mechanisms, there are two well known classical models: Mandatory Access Control (MAC) and Discretionary Access Control (DAC). In this paper, the authors present a data model and a possible implementation suited to allow proper access control in a system. In order to do that,...

    Provided By Academy of Economic Studies

  • White Papers // Oct 2011

    Approaches Regarding Business Logic Modeling in Service Oriented Architecture

    As part of the Service Oriented Computing (SOC), Service Oriented Architecture (SOA) is a technology that has been developing for almost a decade and during this time there have been published many studies, papers and surveys that are referring to the advantages of projects using it. In this paper, the...

    Provided By Academy of Economic Studies

  • White Papers // Jul 2011

    A Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Applications

    This paper present and implement a Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Application. In the developing process is used a Windows Phone 7 application that interact with a WCF Web Service and a database. The types of Business Intelligence Mobile Applications are presented. The Windows mobile...

    Provided By Academy of Economic Studies

  • White Papers // Jul 2011

    Considerations Regarding Designing and Administrating SOA Solutions

    Solutions like SOA, Cloud, SaaS, Iaas or PaaS are not only buzzwords, they became a business reality because they are relative cheap and easy to use. SOA and Cloud are tightly linked because most cloud solutions are being defined using SOA making them feasible from the business perspective, because it's...

    Provided By Academy of Economic Studies

  • White Papers // Jul 2011

    Grid Database - Management, OGSA and Integration

    The problem description of data models and types of databases has generated and gives rise to extensive controversy generated by their complexity, the many factors involved in the actual process of implementation. Grids encourage and promote the publication, sharing and integration of scientific data, distributed across Virtual Organizations. Scientists and...

    Provided By Academy of Economic Studies

  • White Papers // Jul 2011

    A Grid Architecture for Manufacturing Database System

    Before the enterprise resource planning concepts business functions within enterprises were supported by small and isolated applications, most of them developed internally. Yet today ERP platforms are not by themselves the answer to all organizations needs especially in times of differentiated and diversified demands among end customers. ERP platforms were...

    Provided By Academy of Economic Studies

  • White Papers // Jul 2011

    Using Cloud Computing in Higher Education: A Strategy to Improve Agility in the Current Financial Crisis

    In the current financial crisis and being challenged by growing needs, universities are facing problems in providing necessary Information Technology (IT) support for educational, research and development activities. The objective of this paper is to find alternatives to the use of IT, while leading universities to improve agility and obtain...

    Provided By Academy of Economic Studies

  • White Papers // Jul 2011

    Data Security in M-Learning Messaging Services

    The m-learning field has been defined new educational services that deliver knowledge and content on mobile devices, highlighting a dreamed educational concept, anywhere, anytime. Education processes have evolved in the last decades by integrating new technology. Many m-learning services use SMS to deliver simple text content because it has a...

    Provided By Academy of Economic Studies

  • White Papers // May 2011

    Main Aspects of the Adoption of Cloud Solutions in Managing Service-Oriented Organizations - The Case of Higher Education

    The present day context of Information and Communications Technology (ICT) raises the need for better online products and services for users. Organizations that implement ICT on a large scale meet an important hurdle: the need to continuously configure and parameterize the computing systems. This arises from the limited storage space,...

    Provided By Academy of Economic Studies

  • White Papers // Mar 2011

    Agile Development for Service Oriented Business Intelligence Solutions

    Considering the evolution of information and communications technology, the necessity of alignment of public and private sectors to European Union requirements, the current economic crisis, and the global context, all organizations are trying to achieve major changes that would enable them to operate as intelligent organizations. For this purpose, agility...

    Provided By Academy of Economic Studies

  • White Papers // Mar 2011

    Security Risk Management - Approaches and Methodology

    In today's economic context, organizations are looking for ways to improve their business, to keep head of the competition and grow revenue. To stay competitive and consolidate their position on the market, the companies must use all the information they have and process their information for better support of their...

    Provided By Academy of Economic Studies

  • White Papers // Mar 2011

    Using Genetic Algorithms in Secured Business Intelligence Mobile Applications

    The paper aims to assess the use of genetic algorithms for training neural networks used in secured Business Intelligence Mobile Applications. A comparison is made between classic back-propagation method and a genetic algorithm based training. The design of these algorithms is presented. A comparative paper is realized for determining the...

    Provided By Academy of Economic Studies

  • White Papers // Oct 2012

    Cloud Computing and Smart Grids

    Increasing concern about energy consumption is leading to infrastructure that supports real-time, two-way communication between utilities and consumers, and allows software systems at both ends to control and manage power use. To manage communications to millions of endpoints in a secure, scalable and highly-available environment and to achieve these twin...

    Provided By Academy of Economic Studies

  • White Papers // Jan 2009

    Biometric Security for Cell Phones

    Cell phones are already prime targets for theft. The increasing functionality of cell phones is making them even more attractive. With the increase of cell phone functionality including personal digital assistance, banking, e-commerce, remote work, internet access and entertainment, more and more confidential data is stored on these devices. What...

    Provided By Academy of Economic Studies

  • White Papers // May 2010

    Underlying Factors Of Persistent Inflation In Romania

    Price stability has become the main focus of the monetary policy of the candidate countries to the European Monetary Union as the best way to ensure nominal convergence and to promote sustainable economic growth. In the analysis of the inflation evolution, the authors have considered the factors causing persistent inflation...

    Provided By Academy of Economic Studies

  • White Papers // Jul 2011

    Using Cloud Computing in Higher Education: A Strategy to Improve Agility in the Current Financial Crisis

    In the current financial crisis and being challenged by growing needs, universities are facing problems in providing necessary Information Technology (IT) support for educational, research and development activities. The objective of this paper is to find alternatives to the use of IT, while leading universities to improve agility and obtain...

    Provided By Academy of Economic Studies

  • White Papers // Jan 2010

    Measuring the Efficiency of Cloud Computing for E-learning Systems

    As with rapid growth of the cloud computing architecture usage, more and more industries move their focus from investing into processing power to renting processing power from a specialized vendor. Education field is no different. E-learning systems usually require many hardware and software resources. There are numerous educational institutions that...

    Provided By Academy of Economic Studies

  • White Papers // Jul 2011

    Data Security in M-Learning Messaging Services

    The m-learning field has been defined new educational services that deliver knowledge and content on mobile devices, highlighting a dreamed educational concept, anywhere, anytime. Education processes have evolved in the last decades by integrating new technology. Many m-learning services use SMS to deliver simple text content because it has a...

    Provided By Academy of Economic Studies

  • White Papers // Mar 2009

    Enhancing Privacy for Biometric Identification Cards

    Most developed countries have started the implementation of biometric electronic identification cards, especially passports. The European Union and the United States of America struggle to introduce and standardize these electronic documents. Due to the personal nature of the biometric elements used for the generation of these cards, privacy issues were...

    Provided By Academy of Economic Studies

  • White Papers // Nov 2011

    Requirements for Development of an Assessment System for IT&C Security Audit

    IT&C security audit processes are carried out to implement information security management. The audit processes are included in an audit program as decision of the management staff to establish the organization situation against to the planned or expected one. The audit processes require evidence to highlight the above issues. The...

    Provided By Academy of Economic Studies

  • White Papers // Dec 2011

    Vulnerability Analysis in Web Distributed Applications

    In this paper, the authors analyze vulnerabilities found on web based distributed applications from different perspectives. Classes of vulnerabilities types are identified in order to cope with their different characteristics that each one develops. Methods for analyzing vulnerabilities of an authentication process are developed and solutions are proposed. A model...

    Provided By Academy of Economic Studies

  • White Papers // Feb 2012

    BWS Open System Architecture Security Assessment

    Business process management systems play a central role in supporting the business operations of medium and large organizations. Because of this the security characteristics of these systems are becoming very important. The present paper describes the BWS architecture used to implement the open process aware information system DocuMentor. Using the...

    Provided By Academy of Economic Studies

  • White Papers // Nov 2011

    An Adaptive Authorization Model Based on RBAC

    In the area of access control mechanisms, there are two well known classical models: Mandatory Access Control (MAC) and Discretionary Access Control (DAC). In this paper, the authors present a data model and a possible implementation suited to allow proper access control in a system. In order to do that,...

    Provided By Academy of Economic Studies

  • White Papers // Mar 2010

    The Audit of Business Intelligence Solutions

    Although in this period humanity passes through a relative economic crisis, the people all agree that their environment is that of a society of information and knowledge, based on communication and tele-activity, one that is also called information society. Every new form of activity in the information society has an...

    Provided By Academy of Economic Studies

  • White Papers // Mar 2011

    Agile Development for Service Oriented Business Intelligence Solutions

    Considering the evolution of information and communications technology, the necessity of alignment of public and private sectors to European Union requirements, the current economic crisis, and the global context, all organizations are trying to achieve major changes that would enable them to operate as intelligent organizations. For this purpose, agility...

    Provided By Academy of Economic Studies

  • White Papers // Feb 2011

    Ways to Increase the Efficiency of Information Systems

    Fractions of seconds can change a person's life or a company's destiny as the people live in a dynamic world, in a permanent move. Thus, the need of being informed, regardless of place or time, is very great. Therefore, the need for efficient information systems is very high. The efficiency...

    Provided By Academy of Economic Studies

  • White Papers // Jul 2011

    Considerations Regarding Designing and Administrating SOA Solutions

    Solutions like SOA, Cloud, SaaS, Iaas or PaaS are not only buzzwords, they became a business reality because they are relative cheap and easy to use. SOA and Cloud are tightly linked because most cloud solutions are being defined using SOA making them feasible from the business perspective, because it's...

    Provided By Academy of Economic Studies

  • White Papers // Jul 2011

    Grid Database - Management, OGSA and Integration

    The problem description of data models and types of databases has generated and gives rise to extensive controversy generated by their complexity, the many factors involved in the actual process of implementation. Grids encourage and promote the publication, sharing and integration of scientific data, distributed across Virtual Organizations. Scientists and...

    Provided By Academy of Economic Studies

  • White Papers // Jul 2011

    A Grid Architecture for Manufacturing Database System

    Before the enterprise resource planning concepts business functions within enterprises were supported by small and isolated applications, most of them developed internally. Yet today ERP platforms are not by themselves the answer to all organizations needs especially in times of differentiated and diversified demands among end customers. ERP platforms were...

    Provided By Academy of Economic Studies

  • White Papers // Jan 2013

    Grid and Data Analyzing and Security

    In this paper, the author examines the importance of secure structures in the process of analyzing and distributing information with aid of Grid-based technologies. The advent of distributed network has provided many practical opportunities for detecting and recording the time of events, and made efforts to identify the events and...

    Provided By Academy of Economic Studies

  • White Papers // Jan 2013

    Real-Time Business Intelligence for the Utilities Industry

    In today's competitive environment with rapid innovation in smart metering and smart grids, there is an increased need for Real-Time Business Intelligence (RTBI) in the utilities industry. Giving the fact that this industry is an environment where decisions are time sensitive, RTBI solutions will help utilities improve customer experiences and...

    Provided By Academy of Economic Studies

  • White Papers // Oct 2012

    Pentaho Business Analytics: A Business Intelligence Open Source Alternative

    Most organizations strive to obtain fast, interactive and insightful analytics in order to fundament the most effective and profitable decisions. They need to incorporate huge amounts of data in order to run analysis based on queries and reports with collaborative capabilities. The large variety of Business Intelligence solutions on the...

    Provided By Academy of Economic Studies

  • White Papers // Oct 2012

    ERP and e-Business Application Deployment in Open Source Distributed Cloud Systems

    In this paper, the authors present the way in which they combine SlapOS, the fist open source operating system for distributed cloud computing, and Enterprise Resource Modeling (ERP) to provide a simple, unified API for E-Business Applications based on Iaas, PaaS and SaaS models. SlapOS is based on a grid...

    Provided By Academy of Economic Studies

  • White Papers // Mar 2012

    E-Readiness of Romanian SMEs

    It is undeniable the importance of SMEs in economic growth since they play their proper role in the emerging digital economy. But also have to consider the electronic preparation of these, their ability to absorb knowledge and to profit from their use, the e-accessibility and value added goods/services through ICT....

    Provided By Academy of Economic Studies

  • White Papers // Mar 2011

    Security Risk Management - Approaches and Methodology

    In today's economic context, organizations are looking for ways to improve their business, to keep head of the competition and grow revenue. To stay competitive and consolidate their position on the market, the companies must use all the information they have and process their information for better support of their...

    Provided By Academy of Economic Studies

  • White Papers // Dec 2012

    Analysis of Return on Investment in Different Types of Agile Software Development Project Teams

    This paper investigates how the choice of agile methods in different development project teams affects the Return-On-Investment (ROI). In this paper different types of software project teams are analyzed in order to examine and identify the business-value of using agile methods. In various software development project teams, the ROI of...

    Provided By Academy of Economic Studies

  • White Papers // Nov 2007

    Risk Management for e-Business

    In the new Internet economy, risk management plays a critical role to protect the organization and its ability to perform their business mission, not just its IT assets. Risk management is the process of identifying risk, assessing risk, and taking steps to reduce risk to an accept-able level. The risk...

    Provided By Academy of Economic Studies

  • White Papers // Dec 2011

    A Perspective on the Benefits of Data Virtualization Technology

    Providing a unified enterprise-wide data platform that feeds into consumer applications and meets the integration, analysis and reporting users' requirements is a wish that often involves significant time and resource consumption. As an alternative to developing a data warehouse for physical integration of enterprise data, the article presents data virtualization...

    Provided By Academy of Economic Studies

  • White Papers // May 2011

    Main Aspects of the Adoption of Cloud Solutions in Managing Service-Oriented Organizations - The Case of Higher Education

    The present day context of Information and Communications Technology (ICT) raises the need for better online products and services for users. Organizations that implement ICT on a large scale meet an important hurdle: the need to continuously configure and parameterize the computing systems. This arises from the limited storage space,...

    Provided By Academy of Economic Studies

  • White Papers // Jan 2013

    Open Source Security Tools

    In this paper, the authors trying to provide a better understanding about how open source community enriched the wealth of Information System and even developed the Internet as it is today. The paper gradually presents the main aspects of open source software and highlights the security issues that are part...

    Provided By Academy of Economic Studies

  • White Papers // Feb 2013

    Managing Information Technology Security in the Context of Cyber Crime Trends

    Cyber-attacks can significantly hurt an organization's IT environment, leading to serious operational disruptions, from simply damaging the first layers of IT security up to identity theft, data leakage and breaking down networks. Moreover, the dangers through which current cybercrimes practices affect organizations present a tendency of developing more rapidly that...

    Provided By Academy of Economic Studies

  • White Papers // Jul 2012

    Cyber Security Policy. A Methodology for Determining a National Cyber-Security Alert Level

    Now-a-days, assuring the security of the national cyber-space has become a big issue that can only be tackled through collaborative approaches. Threats cannot be confined to a single computer system just as much as computer systems are rendered useless without being connected to a supporting network. The authors of this...

    Provided By Academy of Economic Studies

  • White Papers // Jan 2011

    Database Replication

    Imagine a scenario in which the user has to develop an application that all the company's staff will use to perform different tasks. Each person has a laptop and will be connected to the company's network. For someone who has worked in an environment in which the same database is...

    Provided By Academy of Economic Studies

  • White Papers // Oct 2012

    Secure Single Sign-On using CAS and OpenID

    As the number of connected applications increases, user convenience makes them use the same password, which can create vulnerabilities in an organization's infrastructure. Therefore, those with security concerns regarding these activities, conducted in the electronic environment, came to support the idea of Single Sign-On systems, having the user in mind....

    Provided By Academy of Economic Studies

  • White Papers // Oct 2009

    Using Cloud Computing for e-Learning Systems

    Cloud computing is growing rapidly, with applications in almost any area, including education. E-learning systems usually require many hardware and software resources. There are many educational institutions that cannot afford such investments, and cloud computing is the best solution. This paper presents the positive impact of using cloud computing architectures...

    Provided By Academy of Economic Studies

  • White Papers // Jun 2009

    A Collaborative System Software Solution for Modeling Business Flows Based on Automated Semantic Web Service Composition

    Now-a-days, business interoperability is one of the key factors for assuring competitive advantage for the participant business partners. In order to implement business cooperation, scalable, distributed and portable collaborative systems have to be implemented. This paper presents some of the mostly used technologies in this field. Furthermore, it presents a...

    Provided By Academy of Economic Studies

  • White Papers // Jan 2012

    Business Intelligence using Software Agents

    This paper presents some ideas about business intelligence today and the importance of developing real time business solutions. The authors make an exploration of links between business intelligence and artificial intelligence and focuses specifically on the implementation of software agents-based systems in business intelligence. There are briefly presented some of...

    Provided By Academy of Economic Studies

  • White Papers // Oct 2008

    SOA, SoBI & EDA - Paradigms for Integration Capabilities of BI Platform

    A Business Intelligence (BI) provider may offer a basic solution, a packed application or a comprising BI platform which integrates components from individual technologies in a synergic system. The providers' tendency is to standardize the instruments offered on a single server platform. The paper analyzes the integration capabilities and problems...

    Provided By Academy of Economic Studies

  • White Papers // Jan 2013

    Reengineering Systems' Architecture for Service Oriented Businesses

    Service oriented technology and management have captured the attention of researchers and systems developers on the last few years for the purpose of finding methods to increase the companies' agility, to provide flexible business processes that would increase the value of services provided to customers. The orientation on services appears...

    Provided By Academy of Economic Studies

  • White Papers // Jun 2008

    How to Succeed in Business Intelligence Initiative: A Case Study for Acquisitions in Romania Public Institutions

    Considering the demands of knowledge society each organization must became an intelligence organization. Business Intelligence (BI) helps achieving this goal. The large variety of Business Intelligence solutions on the market, the difficult process to select one of them and evaluate the impact of the selected solution on the organization leads...

    Provided By Academy of Economic Studies

  • White Papers // Sep 2007

    The Impact Of Organization Changes On Business Intelligence Projects

    The paper approaches the subject of business intelligence in the context of ERP projects, and presents the experience of a real industry project, its development and the problems it faced. It offers an insight into the main three phases of the project and it analyses the impact of technical problems...

    Provided By Academy of Economic Studies

  • White Papers // Jul 2012

    Perspectives on the Role of Business Rules in Database Design

    Business rules are at the foundation of every information system as they drive and offer guidelines for managing and conducting all activities within an organizations. They are important both for operational systems and for analytical ones, as they can serve as data quality rules. Several business rules implementation solutions are...

    Provided By Academy of Economic Studies