| | SLO | ENG | Cookies and privacy

Bigger font | Smaller font

Search the digital library catalog Help

Query: search in
search in
search in
search in
* old and bologna study programme

Options:
  Reset


1 - 10 / 108
First pagePrevious page12345678910Next pageLast page
1.
A Comparison of Traditional and Modern Data Warehouse Architectures
Rok Virant, 2021, undergraduate thesis

Abstract: Data has never been as desired or valued as it is today. The value of data and information over the past decade has not only changed trends in business and the IT industry but has also changed the dynamic of work. Enormous amounts of aggregate data offer companies and other corporations the option to explore and study data samples. Data collection and information processing are new dynamic factors, not only for individuals but also for corporations. Companies and corporations who are able to process large amounts of data in the shortest possible time can place themselves in a leading position in certain professions. In this bachelor’s thesis we will describe the basic concepts and factors that have shaped new, cloud-based data warehouse technologies. At the same time, we also emphasize why and how these technologies are used. We focus on how the changing technology influenced the users and their consumption of data, the changing dynamics of work as well as the changes of data itself. In the practical part, we created two DWH environments (on-premises and cloud) that we compare with each other. In the experiment, we underlined the fact that CDWHs are in certain situations not always faster than TDWH.
Keywords: Data Warehouses, Cloud Computing, Outsourcing, Data, Information
Published: 18.10.2021; Views: 21; Downloads: 2
.pdf Full text (3,58 MB)

2.
Proceedings of the 2021 7th Student Computer Science Research Conference (StuCoSReC)
2021, proceedings

Abstract: The 7th Student Computer Science Research Conference is an answer to the fact that modern PhD and already Master level Computer Science programs foster early research activity among the students. The prime goal of the conference is to become a place for students to present their research work and hence further encourage students for an early research. Besides the conference also wants to establish an environment where students from different institutions meet, let know each other, exchange the ideas, and nonetheless make friends and research colleagues. At last but not least, the conference is also meant to be meeting place for students with senior researchers from institutions others than their own.
Keywords: student conference, computer and information science, artificial intelligence, data science, data mining
Published: 13.09.2021; Views: 101; Downloads: 11
.pdf Full text (11,87 MB)
This document has many files! More...

3.
4.
Internetni memes kot nova oblika komuniciranja
Atena Bošnjak, 2020, undergraduate thesis

Abstract: The diploma thesis is theoretical and empirical research on Internet memes as a new form of communication. In the beginning, viral communication and the concept of a meme, which originally comes from genetics, are presented. The thesis presents a new communication model, designed to understand the spread of virus information on social networks, and can also be connected to Internet memes. For a better knowledge of the channels through which memes are spread, some websites that are partly or entirely dedicated to such humorous content are presented in the diploma work. The empirical part consists of the methodology and course of the research and later, the results obtained during the analysis. The thesis includes a causal - non - experimental method by which the research questions are answered. The concluding chapter closes with a presentation on the finding.
Keywords: internet, memes, information, humour, communication
Published: 12.11.2020; Views: 545; Downloads: 193
.pdf Full text (2,31 MB)

5.
Unlimited access to information systems with mobile devices
Igor Bernik, Blaž Markelj, 2011, review article

Abstract: Purpose: Mobile devices have become an indispensible part of modern communications; they enable easy access to the Internet and also remote manipulation of data stored in corporate information systems. The number of mobile device users is on the rise, but most of them don’t comprehend completely the less obvious functions of these devices. Users also have almost no control over background computer programs, because they run without their knowledge and volition. From the standpoint of information security, a lack of awareness of the risks can seriously compromise the integrity of corporate networks and information systems. The weakest links are users, but also the technology itself. To ensure the functioning and security of information systems, corporations and individual users should learn about protective mechanisms. It is also important that users adhere to implemented (internal) safety regulations. Design/Methods/Approach: We used descriptive and comparative methods, and made an overview of published literature, as well as processes pertaining to the use of mobile devices and related security issues. We compared general elements of information security in regard to the use of mobile devices. Findings: At present mobile devices are more and more frequently used to access information systems. The majority of users are concerned almost exclusively with the question, how to get uninterrupted remote access to data, but far less with security issues. This paper presents some guidelines for achieving and maintaining information security. Research limitations/implications: It has been noted, that this is a time of turbulent development and evolution in the field of mobile devices, and also related security issues, so best practices haven’t been defined yet. Corporations and other organizations have just recently begun defining guidelines to eliminate security breaches through mobile devices, therefore a comparison of their implemented solutions is practically impossible. VS_ Practical implications: We propose guidelines, which can be used to: minimize information security risks posed by mobile devices; evaluate the current state of information security; and implement protective measures against cyber threats encountered by corporations and individual users of mobile devices. Originality/Value: Information security is a relatively new field because mobile devices and remote access to the Internet and data have just recently come into wider use. At the same time security issues and protective measures have stayed largely overlooked. Security threats are many, so it is impervious that users learn more about them and adopt some necessary security measures.
Keywords: information security, blended threats, mobile devices, corporate information systems, business integrity
Published: 12.05.2020; Views: 494; Downloads: 29
.pdf Full text (884,10 KB)
This document has many files! More...

6.
Perception of cyber crime in Slovenia
Maja Dimc, Bojan Dobovšek, 2010, original scientific article

Abstract: Purpose: The purpose of this article is to present the results of the pilot research regarding the perception of cybercrime in Slovenia. Design/Methods/Approach: The study focused on the research of the perception of cybercrime among the general public, as well as the members of the law enforcement agencies. Findings: The development of information and communication technologies critically influences all aspects of our lives, and consequently the characteristics of crime have adapted to the new form of operation in the virtual world. Cybercrime is the new way of breaking the law, and in order to implement successful preventive strategies it is of crucial importance to understand the perception of the general public, as well as the perception of the members of law enforcement agencies regarding cybercrime. The pilot study was performed on a smaller group of individuals (approximately half were the representatives of the general public, while the rest were the representatives of law enforcement agencies) in the form of in-depth interviews. The findings of the pilot research were alarming, since the majority of the interviewees greatly differentiate between certain forms of crime performed in the cyberspace as opposed to the same form of crime performed in real life i.e. the act of stealing, piracy in particular, is unacceptable in the real world and at the same time only natural in the virtual world. Furthermore, the pilot research displayed serious lack of awareness regarding different forms of cybercrime among the general public, as well as the members of law enforcement agencies, and consequently also poor understanding of legislation pertinent to cybercrime. Based on the results of the pilot research it is evident that it is of crucial importance to raise the awareness and understanding among the general public and increase the knowledge of the members of law enforcement agencies regarding cybercrime and its consequences in our everyday life. Research limitations/implications: The results are not generalizable due to the small group of interviewees. Consequently, future research will include a larger group of interviewees and will combine both in-depth interviews as well as questionnaires. Practical implications: The article represents a useful source of information for individuals working in this field as well as the general public. Furthermore, it represents the basis for further research of the field. Originality/Value: The article deals with the issue of the perception of cybercrime in Slovenia and exposes the critical issues related to the difference in the perception of a similar act of crime in the real life as opposed to the virtual world.
Keywords: computer-related crime, cybercrime, information and communication technologies, Slovenia
Published: 12.05.2020; Views: 405; Downloads: 23
URL Link to full text
This document has many files! More...

7.
The nature of security culture in a military organization
Denis Čaleta, Katja Rančigaj, Branko Lobnikar, 2011, original scientific article

Abstract: Purpose: The purpose of this research article is to define and explain the role of security culture as an important factor in the provision of effective preparedness of security organisation members for managing new types of security challenges, which are transnational, asymmetric and complex in form. It should be noted that, to a great extent, the internalisation of security awareness and the attitude towards security information depends on the organisational dynamics in an organisation. The article will complement theoretical findings with the analysis of the nature of security culture in a security (military) organisation, the priority of which is a high level of awareness of the effects of security culture and its integration in individual and organisational values. Design/Methods/Approach: The article presents views of the Slovenian Armed Forces’ (SAF) members on the perception of factors relevant for the operation of processes forming security culture. The research was carried out on a sample of SAF employees who use classified information in their work. Altogether 53 respondents participated in the survey. The security culture was measured with questions in the form of 31 statements. The respondents answered these statements with the help of a five-level scale. The Cronbach’s alpha coefficient for the listed statements was 0.932. Finally, the nature of security culture was established with the help of a factor analysis. Findings: A factor analysis, carried out at the beginning of the analysis, helped establish six factors of security culture which enabled us to explain 71.99 percent of the variance. The identified factors intended for explaining security culture in the context of a military organisation are as follows: personnel requirements for management of classified information, competence for maintenance of security culture, attitude towards the protection of classified information, procedures for ensuring protection of classified information, recording and elimination of violations in the protection of classified information and organisational measures for management of classified information. The results of the survey carried out among the SAF employees demonstrated that the respondents estimated marked all identified security culture sets of contents above average, with marks ranging between 3 and 4 in all statements. Research limitations: The survey covered those SAF members who use classified information in their work. Hence the results of the survey are primarily applicable to the military environment and could not be generalized for other security organisations. Practical implications: The results of the survey can be directly applied to the management of processes for the protection and management of classified information in the SAF. Furthermore, they also indicate the application of the theoretical understanding of security culture’s significance to the success of security organizations’ performance. Originality/Value: The survey introduces an original approach to the measurement of security culture in security organisations. It can serve as a valuable basis for further research on the interaction of security culture with other factors in security organisations, such as for instance organisational culture. Practicians of criminal justice and security, military science and other similar scientific disciplines can also find this article useful in their further study of standpoints and attitudes of security organisations’ members about their role in the processes of establishing an appropriate security culture, as a precondition for effective management of new challenges and threats that we witness in the contemporary security environment.
Keywords: security culture, armed forces, classified information, Slovenia
Published: 04.05.2020; Views: 302; Downloads: 8
URL Link to file
This document has many files! More...

8.
Self-assessment system
Mitja Kovač, Patricia Kotnik, 2015, original scientific article

Abstract: Efficient regulatory mechanisms that induce innovation, co-operation and deter competition law infringements have recently been the subject of growing attention. Competition is essential to the innovation process which in general terms enables entrepreneurship. But so too is co-operation between firms which requires an exchange of information and may lead to inefficient collusive behaviour. The optimal trade-off between the provision of stable entrepreneurial incentives and the new European competition law’s reform with the self-assessment system has been largely missing from the current scholarly debate. This paper identifies the unintended, harmful horizontal side effects of this new European self-assessment system upon the entrepreneurial activity, offers a legal evaluation of the optimal entrepreneurial incentive mechanisms and provides legal and entrepreneurial arguments for an improved regulatory response.
Keywords: Slovenia, pravo, insolvency, legislation, competition policy, information exchange, entrepreneurship, innovation, self-assessment system
Published: 02.08.2018; Views: 335; Downloads: 36
.pdf Full text (484,03 KB)
This document has many files! More...

9.
Scope of application of EU law in the judicial procedures of debt collection in civil and commercial matters
Mikael Berglund, 2010, original scientific article

Abstract: The aim of this paper is to demonstrate, that the interest of a more efficient, and proportionate access to civil justice in EU law requires some changes. Motivated changes are the abolishment of exequatur proceedings, the private creditor shall, as a service measure to him, be able to file an application for enforcement directly to the Member State of origin of the title of execution, instead of to the Member State of actual enforcement, decisions, on interim measures in ex parte proceedings shall be recognized, and access to information for enforcement purposes shall, after a title of execution, be improved in both the cross-border and national contexts.
Keywords: recognition, enforceability, mutuality, grounds for refusal, interim measures, damages, access to information for enforcement purposes
Published: 23.07.2018; Views: 354; Downloads: 23
.pdf Full text (130,18 KB)

10.
Geo-information technology for disaster risk assessment
Đorđe Ćosić, Sađan Popov, Dušan Sakulski, Ana Pavlović, 2011, original scientific article

Abstract: The Serbian territory (including the territory of the former Yugoslavia) has been continuously exposed to different hazards, often with tragic consequences. Earthquakes and floods, usually followed by landslides, are the most dominant hazards in that region. Disaster risk reduction, prevention and early warning, as an integral part of sustainable development, do not exist in Serbia. That is one of the main reasons why the disaster-related damage is high. Despite very long experience in engineering and resources management in Serbia, there are no scientifically supported and standardized disaster risk-assessment procedures. Expertise only exists in the field of engineering-based hazard assessment. The risk-assessment method proposed in this research includes, apart from hazards, parameters such as vulnerability, exposure and safety. It considers the environmental and social components of risk management. The proposed method, implementing combined mathematical and 3D GIS tools, was applied for the Danube River, Petrovaradin (the city of Novi Sad) area, for which data were available. The relationship between the risk parameters is calculated and graphically presented. Methods like this one should contribute to a shift from a passive disaster-related defense to a proactive disaster risk management, as well as from emergency management only, to disaster prevention, preparedness and mitigation activities, in Serbia and the Western Balkan Region.
Keywords: hazard, vulnerability, safety, resilience, coping capacity, risk assessment, risk management, geographic information systems, earthquake, landslide, flooding, exceedance
Published: 13.06.2018; Views: 444; Downloads: 41
.pdf Full text (418,04 KB)
This document has many files! More...

Search done in 0.16 sec.
Back to top
Logos of partners University of Maribor University of Ljubljana University of Primorska University of Nova Gorica