Skip to Content

Instrukcja korzystania z Biblioteki


Ukryty Internet | Wyszukiwarki specjalistyczne tekstów i źródeł naukowych | Translatory online | Encyklopedie i słowniki online


Astronomia Astrofizyka

Sztuka dawna i współczesna, muzea i kolekcje

Metodologia nauk, Matematyka, Filozofia, Miary i wagi, Pomiary

Substancje, reakcje, energia
Fizyka, chemia i inżynieria materiałowa

Antropologia kulturowa Socjologia Psychologia Zdrowie i medycyna

Przewidywania Kosmologia Religie Ideologia Polityka

Geologia, geofizyka, geochemia, środowisko przyrodnicze

Biologia, biologia molekularna i genetyka

Technologia cyberprzestrzeni, cyberkultura, media i komunikacja

Wiadomości | Gospodarka, biznes, zarządzanie, ekonomia

Budownictwo, energetyka, transport, wytwarzanie, technologie informacyjne

Journal of Information and Organizational Sciences

Information technologies are an integral part of a contemporary society which bases its progress on knowledge being one goal of education. Beside acquiring knowledge, skills and routines, the goal of education is to create a complete individual who can rationally and timely make decisions, purposefully react in new situations and be trained for life-long learning. In order to accomplish all this, it is necessary to make educational process more creative, contemporary and adjusted to new generations of computer literate pupils who demand quicker and more frequent interactions, a lot of information at the same time, generations who quickly acquire rules of computer games. Computer games meeting pedagogical criteria should become an integral part of learning. Teaching with mathematical computer games, which fulfil pedagogical criteria, influences pupils’ motivation, learning, retention and forgetting. This paper provides a review of literature in this field and determines whether the use of mathematical computer games contributes to more efficient realisation of educational goals at all level of education. Furthermore, considering prior research we have attempted to establish whether the use of mathematical games for teaching has an impact on the formation of a positive attitude of pupils of different ages toward the subject of mathematics, their motivation and knowledge acquisition when compared to learning without computer games. Finally, we have analysed different research methods concerning this issue and assessed the impact of pedagogically designed mathematical computer games on the realisation of educational goals and quality improvement of teaching and learning. 2011/06/29 - 22:06

Chain of custody of digital evidence in digital forensic field are today essential part of digital investigation process. In order the evidence to be accepted by the court as valid, chain of custody for digital evidence must be kept, or it must be known who exactly, when, where, why and how came into contact with evidence in each stage of the digital investigations process. This paper deals with digital evidence and chain of custody of digital evidence. Authors definetaxonomy and use an ontological approach to manage chain of custody of digital evidence. The aim of this paper was to develop ontology to provide a new approach to study and better understand chain of custody of digital evidence . Additionally, developed ontology can be used as a method to further develop a set of standard and procedures for secure management with digital evidence. 2011/06/29 - 22:06

Dear authors, readers and future authors,I proudly introduce to you a new issue of JIOS, the Journal of Information and Organizational Sciences, volume 34, Issue 2. The Journal’s primary goal is to present current research in the field of information and organizational sciences, as well as on theoretical developments in the fields that impact information, computer and organizational sciences.The importance of JIOS is rising and it is being increasingly seen as a relevant journal in the eld of information sciences and applied information and communication technology. Speaking in favour of this statement is the fact that JIOS has been included into two new databases: Scopus and EBSCO. We are particularly satised with the Journal’s inclusion in Scopus since it is the largest abstract and citation database containing both peer-reviewed research literature and quality web sources.In this issue of JIOS a selection of four original scientic papers and one preliminary communication paper have been included that cover the following topics: approach to optical network design using a general heuristic optimization framework (Lackovic, M.), improving e-learning e€ciency, intelligence and adapted teaching materials (Kalpic, D. & Zuc, J.), online privacy (Mekovec, R.) and social network analysis of Eureka project partnership in Central and South-Eastern European regions (Divjak, B., Peharda P., Begicevic N.). We hope you will nd these papers interesting and challenging for your own research.I would hereby invite all the interested colleagues to submit a paper and hence contribute to the improvement and development of JIOS. You can submit your papers at, where you can also express your comments, recommendations or critical remarks regarding the papers published in previous issues. 2011/02/15 - 11:41

Here you can download journal cover pages. 2011/02/15 - 11:41

In this article we present research on the social network structure of project partnership in the Eureka network in order to understand country performance in the network. The main method used in our research is the Social Network Analysis (SNA). Research questions were set and examined on the set of the Central and South-Eastern European countries. We investigated regionally based partnerships, relation between central position in the network and country’s level of development and, finally, in order to analyze relation between number of project partners and project success, Eureka success stories were investigated as well. 2011/02/15 - 11:41

Modelling is the basis for research and development of IT systems. Graphical models and graphic representations of models originally built in non-graphic languages and formalisms are often used. In modelling IT systems a need exists for comparing graphical models which can represent different variations of the same or similar modelled content or graphical models which, with certain revisions, could be applied in various domains. Graphical model in the latter case first needs to be translated into another form of predicate expressions or formal languages of modelled content representation. The lack of translation of the model for comparison is a time-consuming venture and may result in the loss of modelled relations due to differences in the "language" and representation symbols. The goal of the paper is to explore and propose methods and procedures for determining similarities of IT systems based on the comparison of their graphical data models. The procedure of determining the similarities of graphical data models of the same type shall at the end of my research be based on semantic and structural similarity of models. In this article procedures for determining semantic similarity and their application is discussed together with examples and the procedure for determining structural similarity is proposed in roughly as it is in the finishing state of current research activities. 2011/02/15 - 11:41

The globalization phenomena strongly stresses western countries’ economies. Especially in industrial districts, companies are reacting with continuous innovations in product and process, based mainly on the introduction of ICT. This continuous organizational change process forces employees to keep in touch with the working environment in an endless learning process. Therefore, the introduction of new ICT seems to bring a cultural development for individuals. Is this always true? Our conviction is that the strong ICT impact generates a new form of digital-divide, a “High-Level Digital Divide” (HLDD): an increasing cultural distance between people able to follow the enterprise ICT evolution and complexity, and people with a lower cultural growth ability. An uncontrolled growth of HLDD may limit the evolution capacity of the enterprise and drop out people from labor market. 2011/02/15 - 11:40

REFII1 model is an authorial mathematical model for time series data mining. The main purpose of that model is to automate time series analysis, through a unique transformation model of time series. An advantage of this approach of time series analysis is the linkage of different methods for time series analysis, linking traditional data mining tools in time series, and constructing new algorithms for analyzing time series. It is worth mentioning that REFII model is not a closed system, which means that we have a finite set of methods. At first, this is a model for transformation of values of time series, which prepares data used by different sets of methods based on the same model of transformation in a domain of problem space. REFII model gives a new approach in time series analysis based on a unique model of transformation, which is a base for all kind of time series analysis. The advantage of REFII model is its possible application in many different areas such as finance, medicine, voice recognition, face recognition and text mining. 2011/02/15 - 11:40

History of information systems development was driven by business system's functions automation and mergers and acquisitions - business subjects integration into a whole. Modern business requires business processes integration through their dynamics and thus enterprise application integration (EAI) as well. In this connection it is necessary to find ways and means of application integration and interaction in a consistent and reliable way. The real-time enterprise (RTE) monitors, captures and analyzes root causes and overt events that are critical to its success the instant those events occur [6]. EAI is determined by business needs and business requirements. It must be based on business process repository and models, business integration methodology (BIM) and information flow as well. Decisions concerning technology must be in function of successful application integration. In this paper EAI methodological framework and technological concepts for its achievements are introduced. 2011/02/15 - 11:40

In this article the possibilities of reasoning about the card version of the game Clue by using OTTER - system for automatic theorem proving have been presented. The game Clue, as game based on knowledge have been modelled by PVETO logic - propositional multi-modal epistemic logic with temporal parameter adapted for reasoning with OTTER. PVETO logic is an extension of S5m logic and it’s most important characteristics are the introduction of special derivation predicates for every participant in the card game and introduction of temporal parameter. Temporal parameter refers to the moment of time in which we follow the truthfulness of the epistemic formulae. 2011/02/15 - 11:40

Modern solutions regarding the use of unstructured information are based on the concept of Content Management (CM), [08] and [09]. This is a good solution for those document contents that will be generated once the CM is in place, but the question remains of what to do with hundreds of millions of documents that have been generated over the course of many years in the public sector. This article analyzes some of the features of the existing document systems in the public sector, and then discusses the needs of business processes reengineering, which are concerned with generating official decisions of relevance for both individual and business end-users. Furthermore, we propose a practically feasible model for the Document Management Systems (DMS) design, based on modern information and communication technologies that can manage and support the use of documents already in the system. In the end, this article takes a look at a general model for the calculation of costs and benefits associated with an introducton of a new DMS. 2011/02/15 - 11:40

Strategic planning of e-learning implementation includes decision making about the most suitable form of implementing e-learning on different levels. Decision making about e-learning implementation has been covered as consisting of four phases: (1) intelligence, (2) design, (3) choice and (4) implementation. During the Intelligence phase we have precisely identified our central decision problem and have conducted situation analysis. In the Design phase we have developed alternatives and established criteria and subcriteria. Then, we have created the questionnaire about the importance of the advantages and goals of e-learning implementation and about criteria and subcriteria essential for decision making. The survey has been conducted on the sample of 90 elearning experts in Croatia. Further, we connected these findings with the results of the factor analysis which was performed on the complete survey. The results of the factor analysis have served as input in the multicriteria decision model (AHP) that we have developed in the Choice phase. The AHP model will be presented in the article and qualitative and quantitative evaluation of the model will be indicated. 2011/02/15 - 11:40

This article focuses on an application of the Triandis Model in researching Internet usage and the intention to use Internet. Unlike other TAM-based studies undertaken to date, the Triandis Model offers a sociological account of interaction between the various factors, particularly attitude, intention, and behavior. The technique of Structural Equation Modeling was used to assess the impact those factors have on intention to use the Internet in accordance with the relationships posited by the Triandis Model. The survey was administered to Croatian undergraduate students at and employed individuals. The survey results are compared to the results of a similar survey that was carried out by two universities in Hong Kong. 2011/02/15 - 11:40

Semantic Web approaches try to get the interoperability and communication among technologies and organizations. Nevertheless, sometimes it is forgotten that the Web must be useful for every user, consequently it is necessary to include tools and techniques doing Semantic Web be accessible. Accessibility and usability are two usually joined concepts widely used in web application development, however their meaning are different. Usability means the way to make easy the use but accessibility is referred to the access possibility. For the first one, there are many well proved approaches in real cases. However, accessibility field requires a deeper research that will make feasible the access to disable people and also the access to novel non-disable people due to the cost to automate and maintain accessible applications. In this paper, we propose one architecture to achieve the accessibility in web-environments dealing with the WAI accessibility standard and the Universal Design paradigm. This architecture tries to control the accessibility in web applications development life-cycle following a methodology starting from a semantic conceptual model and leans on description languages and controlled vocabularies. 2011/02/15 - 11:40

Traditional techniques of data analysis do not enable the solution of all kind of problems and for that reason they have become insufficient. This caused a newinterdisciplinary field of data mining to arise, encompassing both classical statistical, and modern machine learning techniques to support the data analysis and knowledge discovery from data. Data mining methods are powerful in dealing with large quantities of data, but on the other hand they are difficult to master by business users to facilitate decision support. In this paper we introduce our approach to integration of decision support system with data mining. We discuss the role of data mining to facilitate decision support, the use of data mining methods in decision support systems, discuss applied approaches and introduce a data mining decision support system called DMDSS - Data Mining Decision Support System. We also present some obtained results and plans for future development. 2011/02/15 - 11:40

The first step in generic video processing is temporal segmentation, i.e. shot boundary detection. Camera shot transitions can be either abrupt (e.g. cuts) or gradual (e.g. fades, dissolves, wipes). Sports video is one of the most challenging domains for robust shot boundary detection. We proposed a shot boundary detection algorithm for soccer video based on the twin-comparison method and the absolute difference between frames in their ratios of dominant colored pixels to total number of pixels. With this approach the detection of gradual transitions is improved by decreasing the number of false positives caused by some camera operations. We also compared performances of our algorithm and the standard twin-comparison method. 2011/02/15 - 11:40

A lot of ERP implementations are failure, because organizations which bought ERP systems thought that this was all what they should do. But failure cases of ERP implementation showed, that organizations have to do extensive work on implementation. Because of that, organizations have to create conditions, in which they can implement chosen solution in expected time, scope and evaluated costs. That means that organizations should be aware of what most critical factors for success (CSF) in ERP implementations are. The high failure rate of ERP implementations call for better understanding of critical success factors (CSFs). In the paper we will research the CSFs in ERP implementation by studying published prior research on the field of ERP implementation. We will build a model of CSFs for ERP implementation, discuss in depth some most important factors and present preliminary results of importance CSFs of ERP implementation in Slovenian organizations. 2011/02/15 - 11:40

Minutiae classification and fingerprint classification in fingerprint evaluating process are very important. Fingerprint image contains about 150 minutiae’s. When we compare two fingerprint images, we compare latent and non latent fingerprint and we try to find 12 minutiae’s placed on the same position on latent and non latent fingerprint images. After fingerprint image pre-processing we can perform classification or we can try to find minutiae. In this paper we describe the process of minutiae classification for comparison purposes. For that purpose we use Walsh function and Walsh transforms. Paper describes minutiae classification which is relatively new in recognition systems and gives contribution for development of practical fingerprint recognition systems. Paper also gives contribution in the theoretical part due to the fact that Walsh functions were not implemented in fingerprint pre-processing systems so far. The new symbolic database model for fingerprint storage gives multifunctional foundations for future research. 2011/02/15 - 11:40

There are different forms of teaching using ICT, and they differ according to the level of technological support, the role and tasks of the participants, the level of students’ participation, the physical location of the participants and their interaction. Distance learning is the common name for the process of obtaining knowledge and skills with the assistance of ICT and other forms of distance study. E-learning is a special form of such teaching. In terms of the teaching materials’ specific qualities, and the recommendation of teaching methods for successful teaching, there are different options for applying e-learning in teaching. E-learning can be used either as an independent form of teaching, or as a support to the already established systems of education, or even as their addition. The problem that is being solved in this paper is the prioritisation of e-learning forms for the specific teaching unit, subject, group of subjects, or the whole teaching programme. All this should be done regarding the context, which is characterised by the quality and innovative teaching, available professionals, equipment, possibility of students’ approach to technology, organization of teaching, and rules and regulations. This problem was solved with the assistance of AHP models developed in the process of group decision making supported by sw TeamEC2000. 2011/02/15 - 11:40

When modeling systems and using UML concepts, a real system can be viewed in several ways. The RUP (Rational Unified Process) defines the "4 + 1 view": 1. Logical view (class diagram (CD), object diagram (OD), sequence diagram (SD), collaboration diagram (COD), state chart diagram (SCD), activity diagram (AD)), 2.Process view (use case diagram, CD, OD, SD, COD, SCD, AD), 3. Development view (package diagram, component diagram), 4. Physical view (deployment diagram), and 5. Use case view (use case diagram, OD, SD, COD, SCD, AD) which combines the four mentioned above. With sequence diagram constructs we are describing object behavior in scope of one use case and their interaction. Each object in system goes through a so called lifecycle (create, supplement object with data, use object, decommission object). The concept of the object lifecycle is used to understand and formalize the behavior of objects from creation to deletion. With help of sequence diagram concepts our paper will describe the way of interaction modeling between objects through lifeline of each of them, and their importance in software development. 2011/02/15 - 11:40

In this paper we describe some approaches to text mining, which are supported by an original software system developed in Java for support of information retrieval and text mining (JBowl), as well as its possible use in a distributed environment. The system JBowl1 is being developed as an open source software with the intention to provide an easily extensible, modular framework for pre-processing, indexing and further exploration of large text collections. The overall architecture of the system is described, followed by some typical use case scenarios, which have been used in some previous projects. Then, basic principles and technologies used for service-oriented computing, web services and semantic web services are presented. We further discuss how the JBowl system can be adopted into a distributed environment via technologies available already and what benefits can bring such an adaptation. This is in particular important in the context of a new integrated EU-funded project KP-Lab2 (Knowledge Practices Laboratory) that is briefly presented as well as the role of the proposed text mining services, which are currently being designed and developed there. 2011/02/15 - 11:40

The process of integrating the Republic of Croatia in the EU calls for an adaptation and improvement of many of the Croatian society elements, among which there is also the education system as a foundation for creating of a generation who will, by their knowledge and a world view, easily embed into the European virtues. The conformation of the high education system has been consolidated under the term "the Bologna process". Although the basic accent of this process has been put to conformation in order to form a unique European education system, the efficiency of knowledge acquiring process within the sole endeavour to ensure the quality, also represents one of the main objectives. The article hereto points to the possible advantages of implementing the ICT and the international ISO 9000 standards as a base for an efficient increase of the quality of studying in the Republic of Croatia. 2011/02/15 - 11:40

The Journal of Information and Organizational Sciences – JIOS – is an interdisciplinary scientific journal with focus on application of information sciences and advances in organizational sciences, as well as on theoretical contemplations in the fields that impact information sciences, computer sciences and organizational sciences. JIOS is published twice a year. This issue comprises submitted papers along with those chosen among papers presented at the IIS 2007 Conference (recently renamed CECIIS) organized by the Faculty of Organization and Informatics.JIOS has already undergone several changes of its name and layout. With this issue we introduce a new visual identity of the Journal as well as modified instructions to authors, to make it more aligned with contemporary standards in scientific journal publication. Further, the Journal has changed its web address and is managed by Open Journal System, where all communication from submitting the paper to reviewing and publishing is conducted on-line.In this issue of JIOS a selection of six original scientific papers has been included covering the following topics: organizational design, digital divide in enterprises, management software and web portals evaluation, m-marketing and m-advertising, as well as the introduction of a shot boundary detection algorithm for soccer video. We hope you will find the papers interesting and challenging for your own research.We are looking forward to new papers to be submitted in the future and comments of papers already published. 2011/02/15 - 11:40

In the process of development of the security system of the information system, the risk assessment is the foundation for selection of the security measures. The reduction of the level of risk and the amount of costs depend upon the adequate selection of the security measures. The quality of the risk assessment depends upon the adequate assessment of the form and the intensity of the threats. If the forms of threats are not monitored in the business system, it should make its own threat assessment, or use experience of others. The best, but also the most time-consuming solution is to develop own security system, while the fastest way is to use experience of others. However, there is the problem of migration of some other solution to our own system. Depending upon the question whether we are adopting the experiences of domestic or foreign business systems, the question of the applicability to the system from the different business environment becomes relevant. This happens because of the significant differences in the form and intensity of threats in certain local environments or different branches of industry. 2011/02/15 - 11:40

An anomaly in legislation is absence of completeness, consistency and other desirable properties, caused by different semantic, syntactic or pragmatic reasons. In general, the detection of anomalies in legislation comprises validation and verification. The basic idea of research, as presented in this paper, is modelling legislation by capturing domain knowledge of legislation and specifying it in a generic way by using commonly agreed and understandable modelling concepts of the Unified Modelling Language (UML). Models of legislation enable to understand the system better, support the detection of anomalies and help to improve the quality of legislation by validation and verification. By implementing model-based approach, the object of validation and verification moves from legislation to its model. The business domain of legislation has two distinct aspects: a structural or static aspect (functionality, business data etc.), and a behavioural or dynamic part (states, transitions, activities, sequences etc.). Because anomalism can occur on two different levels, on the level of a model, or on the level of legislation itself, a framework for validation and verification of legal regulation and its model is discussed. The presented framework includes some significant types of semantic and syntactic anomalies. Some ideas for assessment of pragmatic anomalies of models were found in the field of software quality metrics. Thus pragmatic features and attributes can be determined that could be relevant for evaluation purposes of models. Based on analogue standards for the evaluation of software, a qualitative and quantitative scale can be applied to determine the value of some feature for a specific model. 2011/02/15 - 11:40

The presented paper describes statistical methods (information gain, mutual X^2 statistics, and TF-IDF method) for key words generation from a text document collection. These key words should characterise the content of text documents and can be used to retrieve relevant documents from a document collection. Term relations were detected on the base of conditional probability of term occurrences. The focus is on the detection of those words, which occur together very often. Thus, key words, which consist from two terms were generated additionally. Several tests were carried out using the 20 News Groups collection of text documents. 2011/02/15 - 11:40

Integrated Information Systems*Case (IIS*Case) R.6.21 is a CASE tool that we developed to support automated database (db) schema design, based on a methodology of gradual integration of independently designed subschemas into a database schema. It provides complete intelligent support for developing db schemas and enables designers to work together and cooperate reaching the most appropriate solutions. The process of independent design of subschemas may lead to collisions in expressing the real world constraints and business rules. IIS*Case uses specialized algorithms for checking the consistency of constraints embedded in the database schema and the subschemas. IIS*Case supports designers in reviewing and validating results obtained after each step of the design process. The paper outlines the process of resolving collisions. A case study based on an imaginary production system is used to illustrate the application of IIS*Case. Different outcomes and their consequences are presented. 2011/02/15 - 11:40

The paper investigates the design of heterogeneous distributed system for foreign exchange portfolio analysis. The proposed model includes few separated and dislocated but connected parts through distributed mechanisms. Making system distributed brings new perspectives to performance busting where software based load balancer gets very important role. Desired system should spread over multiple, heterogeneous platforms in order to fulfil open platform goal. Building such a model incorporates different patterns from GOF design patterns, business patterns, J2EE patterns, integration patterns, enterprise patterns, distributed design patterns to Web services patterns. The authors try to find as much as possible appropriate patterns for planned tasks in order to capture best modelling and programming practices. 2011/02/15 - 11:40

Proactive approach to communication network maintenance has the capability of enhancing the integrity and reliability of communication networks, as well as of reducing maintenance costs and overall number of incidents. This paper presents approaches to problem and incident prevention with the help of root-cause analysis, aligning that with the goal to foresee software performance. Implementation of proactive approach requires recognition of enterprise's current level of maintenance better insights into available approaches and tools, as well as their comparison, interoperability, integration and further development. The approach we are proposing and elaborating in this paper lies on the construction of a metamodel of the problem management of information technology, particularly the proactive problem management. The metamodel is derived from the original ITIL specification and presented in an object-oriented fashion by using structure (class) diagrams conform to UML notation. Based on current research, appropriate metrics based on the concept of Key Performance Indicators is suggested. 2011/02/15 - 11:40

In this paper we present a modified neural network architecture and an algorithm that enables neural networks to learn vectors in accordance to user designed sequences or graph structures. This enables us to use the modified network algorithm to identify, generate or complete specified patterns that are learned in the training phase. The algorithm is based on the idea that neural networks in the human neurocortex represent a distributed memory of sequences that are stored in invariant hierarchical form with associative access. The algorithm was tested on our custom built simulator that supports the usage of our ADT neural network with standard backpropagation and our custom built training algorithms, and it proved to be useful and successful in modelling graphs. 2011/02/15 - 11:40

The article discusses Six Sigma Methodology as business philosophy assuring excellent product or service quality and continuous process improving to realise highest customer satisfaction level. There are analysed methodology advantages allowing defects and costs reduction and customer satisfaction improvement. Also, authors discuss methodology successful implementation according to gathering data on business processes regulation indicators values variation, and issued products or services performances. The results of implementation process of the Six Sigma Methodology in business system depend on prompt and correct data needed for statistical analysis, and its accessibility via organisation’ information system. Correlation between implementation of Six Sigma Methodology and information system development is so strong that non-conformances could cause the Six Sigma Methodology implementation fall. 2011/02/15 - 11:40

System dynamics is a powerful tool that enhances learning about company, market and competitors; portrays the cognitive limitations on the information gathering and processing power of human mind; facilitates the practice of considering opinions; and supports building of ";What if"; scenarios. Although the literature on system dynamics modeling is very rich with applications in many fields, not many papers on developing system dynamics models were published so far. In this paper we portray current approaches to the development of system dynamics models. These are (1) model development based on influence diagram, (2) model development based on the identification of resources and their states, (3) usage of generic structures for specific domain field, and (4) component strategy for the formulation of system dynamics models. Validation is an important issue that none of these approaches tackles. We propose a ";step-by-step"; approach that integrates validation with developing process of system dynamics models. This approach will be demonstrated on the example of development of a simple inventory model. 2011/02/15 - 11:40

In today’s global market the main focus of competition is not only between different companies but also between supply chains. Technological changes and organizational improvements are important for effective supply chain management (SCM), however, the main cause of SCM improvements is not the implementation of an information system (IS) itself, but rather a change and an integration of business processes. The paper summarizes the most important concepts of SCM and specifically concentrates on the importance of business process management (BPM) in supply chains, because full advantages can be realized when business processes in the supply chain are well defined, integrated and managed. The main purpose of this paper is to show that successful SCM calls for the maturity of supply chain processes in all involved companies and at the supply chain level, which can be realized by using effective BPM methods. A necessary condition for growing of SCM in terms of supply chain process maturity levels is an inter-organizational information system development and process renovation. Yet, BPM should not be considered as a one-time project of IS implementation and process change, but as a permanent process performance measurement, analysis and continuous improvement of the supply chain processes. The concepts are illustrated with a case study of fuel supply process. 2011/02/15 - 11:40

The significance of integral business systems based on closer alignment of information technology to business processes has grown over the last ten years. Comprehensive business frameworks are necessary to capture the entire complexity of such systems. These frameworks called enterprise architectures can provide the conceptual foundation necessary for building and managing the integral business system and all its components. The goal of this paper was to analyze the Architecture of Integrated Information Systems (ARIS) and the Zachman frameworks, to define the criteria for comparison and evaluation of these approaches, and determine their level of complement. Furthermore, the contents of the paper define the generic model of business system management supported by said concepts (frameworks) and analyzes their orientation towards value. 2011/02/15 - 11:40

Information systems are exposed to different types of security risks. Theconsequences of information systems security (ISS) breaches can vary from e.g. damaging the data base integrity to physical "destruction" of entire information system facilities, and can result with minor disruptions in less important segments of information systems, or with significant interruptions in information systems functionality. The sources of security risks are different, and can origin from inside or outside of information system facility, and can be intentional or unintentional. The precise calculation of loses caused by such incidents is often not possible because a number of small scale ISS incidents are never detected, or detected with a significant time delay, a part of incidents are interpreted as an accidental mistakes, and all that results with an underestimation of ISS risks. This paper addresses the different types and criteria of information system security risks (threats) classification and gives an overview of most common classifications used in literature and in practice. We define a common set of criteria that can be used for information system security threats classification, which will enable the comparison and evaluation of different security threats from different security threats classifications. 2011/02/15 - 11:40

Over the last decade we faced a great number of publications in the field of biometrics. Many new biometric methods, techniques, models, metrics and characteristics were proposed. Due to this explosion of research, scientific and professional papers certain inconsistencies in terminology. What some authors call a biometric method, others call model, system or even characteristic. There wasn't enough effort in creating a unique systematization and categorization which would approach the stated issues and open new areas of research. We argue that it is possible to approach biometrics in a narrower and in a broader perspective. We observed biometrics in the narrower perspecive and created a unique framework for the systematization and categorization of biometric methods, models, characteristics and patterns based on a general biometric system. This systematization is a fundamental step forward towards the creation of an open biometrics ontology. 2011/02/15 - 11:40

This paper addresses the semantic analysis problem in a spoken dialog system developed for the domain of weather forecasts. The main goal of semantic analysis is to extract the meaning from the spoken utterances and to transform it into a domain database format. In this work a semantic database for the domain of weather forecasts is represented using the F-logic formalism. Semantic knowledge is captured through semantic categories a semantic dictionary using phrases and output templates. Procedures for semantic analysis of Croatian weather data combine parsing techniques for Croatian language and slot filling approach. Semantic analysis is conducted in three phases. In the first phase the main semantic category for the input utterance is determined. The lattices are used for hierarchical semantic relation representation and main category derivation. In the second phase semantic units are analyzed and knowledge slots in the database are filled. Since some slot values of input data are missing in the third phase, incomplete data is updated with missing values. All rules for semantic analysis are defined in the F-logic and implemented using the FLORA-2 system. The results of semantic analysis evaluation in terms of frame and slot error rates are presented. 2011/02/15 - 11:40

The retail sector in Germany has also been badly hit by intensifying international competition. Confronted with lowering margins and the movement of customers to the most favourable provider in each case, it became increasingly more difficult for companies to reach such goals as turnover and market share inputs. With the introduction of Card-based Loyalty Systems (CBLS), an instrument appears to have been found which increases customer retention through the evaluation of purchasing information and enables the companies to realize their goals even under difficult market conditions. The provision for this, however, is the permanent acceptance of the customer with regard to these systems.This paper first gives an overview of the connections between CBLS and increased customer retention before their impact factors are empirically analyzed for consumer utility. If these factors flow into a cost-benefit analysis, it appears that privacy of the consumers is endangered in the long term and an added value and consequently the preconditional permanent acceptance of the customer is not necessarily given. The resulting question ";Why do customers make use of CBLS anyway?"; can be answered using the approach of hyperbolic utility-discounting. 2011/02/15 - 11:40

Identifying and specifying user requirements is an integral part of information systems design and is critical for the project success. More than 50% of the reasons for the project failure presented in the CHAOS report [36] and study of a US Air Force project by Sheldon et al. [33] are related to requirements. The goal of this paper is to assess the relevant user and software requirements which are the basis for an electronic quality management system selection in medical device companies. This paper describes the structured evaluation and selection process of different quality management software tools that shall support business processes. The purpose of this paper is to help the small to medium size medical device companies to choose the right quality management software which meets the company's business needs. 2011/02/15 - 11:40

Marketing activities supported by mobile devices offer great opportunities for direct communication with consumers without the barriers of time, place, location and other. This article explores opinions and expectations Croatian marketing experts have towards use of m-advertising and other available advertising media, where we take the perspective of marketing experts to predict the future of m-marketing and m-advertising in Croatia. The paper also discusses the relevance of m-advertising and investigates the future of m-marketing and m-advertising in Croatia. This research focuses mainly on understanding the potential and effectiveness of the use of mobile phones as a promotional medium, but we also try to recognize the level of concern of marketing experts associated with spam, relating to privacy intrusion and ethics components in m-advertising. Privacy and ethics concerns could create resistance to the adoption of m-advertising. Media selection becomes the most critical factor for the success of a promotional and advertising marketing campaign. Croatian experts still consider TV or newspapers the best way to reach a large number of potential consumers, but what are their expectations towards mobile advertising? To answer this question, we built a model that links attitudes towards advertising via classical media to the intention to use m-advertising. 2011/02/15 - 11:40