Journal of Information and Organizational Sciences https://jios.foi.hr/index.php/jios en-US dijana.oreski@foi.hr (Dijana Oreški) darko.grabar@foi.hr (Darko Grabar) Wed, 27 Jun 2018 13:25:00 +0200 OJS 3.1.1.4 http://blogs.law.harvard.edu/tech/rss 60 From the Editor https://jios.foi.hr/index.php/jios/article/view/200 <p>Dear authors, readers and future authors,<br />It is my pleasure to present you the 1st number of the 35th volume of the Journal of Information and Organizational Sciences – JIOS.</p><p>In this issue a selection of 6 original scientific papers, 2 preliminary communications and 2 survey papers have been included, all of which have undergone a rigorous double-blind review process.</p><p>Some of the papers published here were already presented at the CECIIS 2010 Conference held in Varaždin between 22nd and 24th September 2010. These papers were nominated for publishing in JIOS by the chairs of the conference tracks they were presented at on the account of their research quality.</p><p>As in prior issues of the Journal, this one also comprises papers that cover themes from various ICT fields: databases, programming, IT supported learning, and other topics in the field of applied information sciences. We hope that the variety of themes will draw the attention of researchers in different ICT fields and motivate potential authors to expand the Journal’s thematic scope by other themes that may be of interest to the wider ICT research community.</p><p>I would like to use this opportunity to encourage prospective authors among you, dear readers, to submit papers at jios.foi.hr. You are also invited to share with us your comments or critical remarks regarding the papers previously published in the Journal. Further, we would appreciate your willingness to become a peer-reviewed for submitted papers and thus contribute significantly to the rising quality of JIOS.</p><p>So far JIOS has been indexed in seven well known databases and now this number has risen to nine, adding “SCOPUS” and “Library, Information Science &amp; Technology Abstracts” to the database list. We are continuously investing a lot of effort to extend the list of databases where JIOS would be cited, in order to make the published papers available to a larger readers’ audience, and give your research a greater impact factor.</p> Neven Vrček ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/200 From the Editor https://jios.foi.hr/index.php/jios/article/view/178 <div>Dear authors, readers and future authors,</div><div><br /></div><div>I proudly introduce to you a new issue of JIOS, the Journal of Information and Organizational&nbsp;Sciences, volume 34, Issue 2. The Journal&rsquo;s primary goal is to present current research in the field of&nbsp;information and organizational sciences, as well as on theoretical developments in the fields that&nbsp;impact information, computer and organizational sciences.</div><div><br /></div><div>The importance of JIOS is rising and it is being increasingly seen as a relevant journal in the eld of&nbsp;information sciences and applied information and communication technology. Speaking in favour&nbsp;of this statement is the fact that JIOS has been included into two new databases: Scopus and EBSCO.&nbsp;We are particularly satised with the Journal&rsquo;s inclusion in Scopus since it is the largest abstract and&nbsp;citation database containing both peer-reviewed research literature and quality web sources.</div><div><br /></div><div>In this issue of JIOS a selection of four original scientic papers and one preliminary communication&nbsp;paper have been included that cover the following topics: approach to optical network design using a&nbsp;general heuristic optimization framework (Lackovic, M.), improving e-learning e€ciency, intelligence&nbsp;and adapted teaching materials (Kalpic, D. &amp; Zuc, J.), online privacy (Mekovec, R.) and social network&nbsp;analysis of Eureka project partnership in Central and South-Eastern European regions (Divjak, B.,&nbsp;Peharda P., Begicevic N.). We hope you will nd these papers interesting and challenging for your own&nbsp;research.</div><div><br /></div><div>I would hereby invite all the interested colleagues to submit a paper and hence contribute to the&nbsp;improvement and development of JIOS. You can submit your papers at jios.foi.hr, where you can&nbsp;also express your comments, recommendations or critical remarks regarding the papers published in&nbsp;previous issues.</div> Neven Vrček ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/178 Cover pages https://jios.foi.hr/index.php/jios/article/view/179 <span style="font-size: 11px;">Here you can download journal cover pages.</span> Neven Vrček ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/179 COLOR MANAGEMENT IMPLEMENTATION IN DIGITAL PHOTOGRAPHY https://jios.foi.hr/index.php/jios/article/view/47 Digital cameras on the market today have a great potential to become the powerful tool for capturing images for use in all demanding fields (such as artwork digitalization), so many professionals started using digital technology. But, it is often the case, that it is necessary to spend a lot of time for visual editing and making color corrections in various software applications. In this research, some ICC color management techniques were used and tested to investigate the quicker ways to achieve digital images with improved color reproduction accuracy, without visual editing. A testing procedure for characterizing digital camera is described. This procedure is target-based, thus providing objective measurement of quality. The special color reference target for digital camera characterization was developed, applied and tested. The results show that using proposed methodology, the workflow efficiency and color accuracy can be improved. Maja Strgar Kurečić, Darko Agić, Lidija Mandić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/47 ICT IN DEVELOPING COUNTRIES: CONDITION AND IMPROVEMENT BY QMS - SERBIAN CASE STUDY https://jios.foi.hr/index.php/jios/article/view/46 This paper evaluates the level of Information and Communication Technology (ICT) in the Serbian metal processing sector. This research uses data from the entire metal processing sector in Serbia (Sample: 20 large companies, 27 medium companies, and 247 small companies, overall with 33,057 workers). Data from the Serbian metal processing sector were compared to the relevant data from EU. In this paper, we present problems and steps for improvement of ICT in the Serbian metal processing industry. We will also present development of quality infrastructure necessary for support and improvement of Serbian ICT industry and improvement of ITC sectors in Serbian metal processing industry. Miladin Stefanović, Milan Matijević, Goran Devedžić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/46 BUSINESS OPERATIONS BETWEEN EFFICIENCY AND EFFECTIVENESS https://jios.foi.hr/index.php/jios/article/view/21 The existence and development of organizations depends on achievement of requisite holistic efficiency and effectiveness of their operations and bahaviour. But in theory (of organization and management) and business practice do not exist common understanding of efficiency and effectiveness, their relations and sinergies. When we try to investigate their definitions and relations we must take into account problems of many conflicts, which reflect their “different non-optimalty (unsuitability, inapproapriateness)”. This contribution discusses three theses: 1) how to more (requisitely) holistically understand relations between efficiency and effectiveness in the frame of business (its working and functioning), 2) how to understand their relations from the viewpoint of conflicts, and 3) one can create solution to remove a problem of different conflicts between efficiency and effectiveness in business. Vojko Potočan ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/21 ENHANCING LEAN SUPPLY CHAIN MATURITY WITH BUSINESS PROCESS MANAGEMENT https://jios.foi.hr/index.php/jios/article/view/18 In today’s global market the main focus of competition is not only between different companies but also between supply chains. Technological changes and organizational improvements are important for effective supply chain management (SCM), however, the main cause of SCM improvements is not the implementation of an information system (IS) itself, but rather a change and an integration of business processes. The paper summarizes the most important concepts of SCM and specifically concentrates on the importance of business process management (BPM) in supply chains, because full advantages can be realized when business processes in the supply chain are well defined, integrated and managed. The main purpose of this paper is to show that successful SCM calls for the maturity of supply chain processes in all involved companies and at the supply chain level, which can be realized by using effective BPM methods. A necessary condition for growing of SCM in terms of supply chain process maturity levels is an inter-organizational information system development and process renovation. Yet, BPM should not be considered as a one-time project of IS implementation and process change, but as a permanent process performance measurement, analysis and continuous improvement of the supply chain processes. The concepts are illustrated with a case study of fuel supply process. Jurij Jaklic, Peter Trkman, Ales Groznik, Mojca Indihar Stemberger ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/18 BUSINESS PROCESS MODELLING: A FOUNDATION FOR KNOWLEDGE MANAGEMENT https://jios.foi.hr/index.php/jios/article/view/16 Knowledge management (KM) is increasingly recognised as a strategic practice of knowledge-intensive companies, becoming an integral part of an organisation's strategy to improve business performance. This paper provides an overview of business process modelling applications and analyses the relationship between business process modelling and knowledge management projects. It presents the case study of Croatian leading banks and the insurance company, discussing its practical experience in conducting business process modelling projects and investigating the opportunity for integrating business process repository and organisational knowledge as the foundation for knowledge management system development. Vesna Bosilj-Vukšić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/16 MODEL-BASED VALIDATION AND VERIFICATION OF ANOMALIES IN LEGISLATION https://jios.foi.hr/index.php/jios/article/view/24 An anomaly in legislation is absence of completeness, consistency and other desirable properties, caused by different semantic, syntactic or pragmatic reasons. In general, the detection of anomalies in legislation comprises validation and verification. The basic idea of research, as presented in this paper, is modelling legislation by capturing domain knowledge of legislation and specifying it in a generic way by using commonly agreed and understandable modelling concepts of the Unified Modelling Language (UML). Models of legislation enable to understand the system better, support the detection of anomalies and help to improve the quality of legislation by validation and verification. By implementing model-based approach, the object of validation and verification moves from legislation to its model. The business domain of legislation has two distinct aspects: a structural or static aspect (functionality, business data etc.), and a behavioural or dynamic part (states, transitions, activities, sequences etc.). Because anomalism can occur on two different levels, on the level of a model, or on the level of legislation itself, a framework for validation and verification of legal regulation and its model is discussed. The presented framework includes some significant types of semantic and syntactic anomalies. Some ideas for assessment of pragmatic anomalies of models were found in the field of software quality metrics. Thus pragmatic features and attributes can be determined that could be relevant for evaluation purposes of models. Based on analogue standards for the evaluation of software, a qualitative and quantitative scale can be applied to determine the value of some feature for a specific model. Vjeran Strahonja ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/24 FACTORS WHICH HAVE FATAL INFLUENCE ON ERP IMPLEMENTATION ON SLOVENIAN ORGANIZATIONS https://jios.foi.hr/index.php/jios/article/view/23 A lot of ERP implementations are failure, because organizations which bought ERP systems thought that this was all what they should do. But failure cases of ERP implementation showed, that organizations have to do extensive work on implementation. Because of that, organizations have to create conditions, in which they can implement chosen solution in expected time, scope and evaluated costs. That means that organizations should be aware of what most critical factors for success (CSF) in ERP implementations are. The high failure rate of ERP implementations call for better understanding of critical success factors (CSFs). In the paper we will research the CSFs in ERP implementation by studying published prior research on the field of ERP implementation. We will build a model of CSFs for ERP implementation, discuss in depth some most important factors and present preliminary results of importance CSFs of ERP implementation in Slovenian organizations. Simona Sternad, Samo Bobek ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/23 HOW TO CALCULATE INFORMATION VALUE FOR EFFECTIVE SECURITY RISK ASSESSMENT https://jios.foi.hr/index.php/jios/article/view/22 The actual problem of information security (infosec) risk assessment is determining the value of information property or asset. This is particularly manifested through the use of quantitative methodology in which it is necessary to state the information value in quantitative sizes. The aim of this paper is to describe the evaluation possibilities of business information values, and the criteria needed for determining importance of information. For this purpose, the dimensions of information values will be determined and the ways used to present the importance of information contents will be studied. There are two basic approaches that can be used in evaluation: qualitative and quantitative. Often they are combined to determine forms of information content. The proposed criterion is the three-dimension model, which combines the existing experiences (i.e. possible solutions for information value assessment) with our own criteria. An attempt for structuring information value in a business environment will be made as well. Mario Sajko, Kornelije Rabuzin, Miroslav Bača ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/22 RETHINKING OF ENTREPRENEURSHIP: TOWARDS SOCIAL RESPONSIBILITY https://jios.foi.hr/index.php/jios/article/view/17 Social entrepreneurship is highlighted as a result of general entrepreneurship development because the traditional entrepreneurial factors are accomplished with the social aspects of common good. Entrepreneur's responsibility in choosing the main business activity within an industry increases if the way he conducts his activities is considered. Institutional support for social entrepreneurship is achieved by generating many business activities in order to fulfil different kinds of social needs. Social entrepreneurship is possible if both entrepreneur’s initiative and institutional support for small and medium sized enterprises (SME) are included in performing for traditionally non-profit activities. Allowing private initiative to fulfil the real needs of different users in social, educational, cultural and other non-profit fields is a good way to support SMEs. However, the institutional control should still remain in place in order to protect the minimum performing standards.The development of social entrepreneurship in transition countries is important for general economic development, but also for the supporting values of ethics in business activities. Marina Klačmer Čalopa, Marijan Cingula ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/17 VALIDATION OF THEORETICAL MODEL FOR DECISION MAKING ABOUT E-LEARNING IMPLEMENTATION https://jios.foi.hr/index.php/jios/article/view/15 In the paper the possibility to use mathematical models and statistical techniques in strategic planning and decision making about e-learning is presented. Strategic planning and decision making has been covered as consisting of four phases: (1) intelligence, (2) design, (3) choice and (4) implementation. Each of the phases will be described in this paper, but the accent will be put on the statistical evaluation of the results of the questionnaire which was based on the developed theoretical model for decision making about e-learning implementation in the higher education sector. In general, the main objectives of this paper are: (1) validation of the first theoretical model for decision making about e-learning implementation in the higher education sector, by means of factor analysis and (2) reduction of a large number of variables to a smaller number of factors, i.e. designing the improved theoretical model, for modelling purposes (developing AHP & ANP models). Nina Begičević, Blaženka Divjak ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/15 FORMAL MODELLING OF BUSINESS RULES: WHAT KIND OF TOOL TO USE? https://jios.foi.hr/index.php/jios/article/view/19 Business rules are today essential parts of a business system model. But presently, there are still various approaches to, definitions and classifications of this concept. Similarly, there are also different approaches in business rules formalization and implementation. This paper investigates formalization using formal language in association with easy domain modelling. Two of the tools that enable such approach are described and compared according to several factors. They represent ontology modelling and UML, nowadays widely used standard for object-oriented modelling. A simple example is also presented. Sandra Lovrenčić, Kornelije Rabuzin, Ruben Picek ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/19 REASONING ABOUT THE GAME „CLUE“ BY USING OTTER https://jios.foi.hr/index.php/jios/article/view/20 In this article the possibilities of reasoning about the card version of the game Clue by using OTTER - system for automatic theorem proving have been presented. The game Clue, as game based on knowledge have been modelled by PVETO logic - propositional multi-modal epistemic logic with temporal parameter adapted for reasoning with OTTER. PVETO logic is an extension of S5m logic and it’s most important characteristics are the introduction of special derivation predicates for every participant in the card game and introduction of temporal parameter. Temporal parameter refers to the moment of time in which we follow the truthfulness of the epistemic formulae. Marko Maliković ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/20 A MODEL OF HETEROGENEOUS DISTRIBUTED SYSTEM FOR FOREIGN EXCHANGE PORTFOLIO ANALYSIS https://jios.foi.hr/index.php/jios/article/view/9 The paper investigates the design of heterogeneous distributed system for foreign exchange portfolio analysis. The proposed model includes few separated and dislocated but connected parts through distributed mechanisms. Making system distributed brings new perspectives to performance busting where software based load balancer gets very important role. Desired system should spread over multiple, heterogeneous platforms in order to fulfil open platform goal. Building such a model incorporates different patterns from GOF design patterns, business patterns, J2EE patterns, integration patterns, enterprise patterns, distributed design patterns to Web services patterns. The authors try to find as much as possible appropriate patterns for planned tasks in order to capture best modelling and programming practices. Dragutin Kermek, Neven Vrček, Tomislav Jakupić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/9 THE MODEL OF THE DOCUMENT MANAGEMENT SYSTEM IN THE PUBLIC SECTOR https://jios.foi.hr/index.php/jios/article/view/6 Modern solutions regarding the use of unstructured information are based on the concept of Content Management (CM), [08] and [09]. This is a good solution for those document contents that will be generated once the CM is in place, but the question remains of what to do with hundreds of millions of documents that have been generated over the course of many years in the public sector. This article analyzes some of the features of the existing document systems in the public sector, and then discusses the needs of business processes reengineering, which are concerned with generating official decisions of relevance for both individual and business end-users. Furthermore, we propose a practically feasible model for the Document Management Systems (DMS) design, based on modern information and communication technologies that can manage and support the use of documents already in the system. In the end, this article takes a look at a general model for the calculation of costs and benefits associated with an introducton of a new DMS. Josip Brumec, Željko Dobrović, Martina Tomičić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/6 A SURVEY OF THE PROPERTIES OF AGENTS https://jios.foi.hr/index.php/jios/article/view/14 In the past decade agent systems were considered to be as one of the major fields of study in Artificial Intelligence (AI) field. Many different definitions of agents were presented and several different approaches describing agency can be distinguished. While some authors have tried to define “what” an agent really is, others have tried to identify agents by means of properties which they should possess. Most authors agree on these properties (at least basic set of properties) which are intrinsic to agents. Since agent's definitions are not consistent, we are going to give an overview and list the properties intrinsic to an agent. Many different adjectives were attached to the term agent as well and many different kinds of agents and different architectures emerged too. The aim of this paper it go give an overview of what was going on in the field while taking into consideration main streams and projects. We will also present some guidelines important when modelling agent systems and say something about security issues. Also, some existing problems which restrict the wider usage of agents will be mentioned too. Kornelije Rabuzin, Mirko Maleković, Miroslav Bača ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/14 THE ROLE OF INFORMATION COMUNICATION TECHNOLOGY IN SIX SIGMA APPROACH IMPLEMENTATION https://jios.foi.hr/index.php/jios/article/view/11 The article discusses Six Sigma Methodology as business philosophy assuring excellent product or service quality and continuous process improving to realise highest customer satisfaction level. There are analysed methodology advantages allowing defects and costs reduction and customer satisfaction improvement. Also, authors discuss methodology successful implementation according to gathering data on business processes regulation indicators values variation, and issued products or services performances. The results of implementation process of the Six Sigma Methodology in business system depend on prompt and correct data needed for statistical analysis, and its accessibility via organisation’ information system. Correlation between implementation of Six Sigma Methodology and information system development is so strong that non-conformances could cause the Six Sigma Methodology implementation fall. Živko Kondić, Vesna Dušak ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/11 PRIORITISATION OF E-LEARNING FORMS BASED ON PAIR-WISE COMPARISONS https://jios.foi.hr/index.php/jios/article/view/7 There are different forms of teaching using ICT, and they differ according to the level of technological support, the role and tasks of the participants, the level of students’ participation, the physical location of the participants and their interaction. Distance learning is the common name for the process of obtaining knowledge and skills with the assistance of ICT and other forms of distance study. E-learning is a special form of such teaching. In terms of the teaching materials’ specific qualities, and the recommendation of teaching methods for successful teaching, there are different options for applying e-learning in teaching. E-learning can be used either as an independent form of teaching, or as a support to the already established systems of education, or even as their addition. The problem that is being solved in this paper is the prioritisation of e-learning forms for the specific teaching unit, subject, group of subjects, or the whole teaching programme. All this should be done regarding the context, which is characterised by the quality and innovative teaching, available professionals, equipment, possibility of students’ approach to technology, organization of teaching, and rules and regulations. This problem was solved with the assistance of AHP models developed in the process of group decision making supported by sw TeamEC2000. Tihomir Hunjak, Nina Begičević ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/7 SELECTING NEURAL NETWORK ARCHITECTURE FOR INVESTMENT PROFITABILITY PREDICTIONS https://jios.foi.hr/index.php/jios/article/view/10 In this paper we present a modified neural network architecture and an algorithm that enables neural networks to learn vectors in accordance to user designed sequences or graph structures. This enables us to use the modified network algorithm to identify, generate or complete specified patterns that are learned in the training phase. The algorithm is based on the idea that neural networks in the human neurocortex represent a distributed memory of sequences that are stored in invariant hierarchical form with associative access. The algorithm was tested on our custom built simulator that supports the usage of our ADT neural network with standard backpropagation and our custom built training algorithms, and it proved to be useful and successful in modelling graphs. Tonimir Kišasondi, Alen Lovrenčić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/10 EVALUATION OF ARIS AND ZACHMAN FRAMEWORKS AS ENTERPRISE ARCHITECTURES https://jios.foi.hr/index.php/jios/article/view/12 The significance of integral business systems based on closer alignment of information technology to business processes has grown over the last ten years. Comprehensive business frameworks are necessary to capture the entire complexity of such systems. These frameworks called enterprise architectures can provide the conceptual foundation necessary for building and managing the integral business system and all its components. The goal of this paper was to analyze the Architecture of Integrated Information Systems (ARIS) and the Zachman frameworks, to define the criteria for comparison and evaluation of these approaches, and determine their level of complement. Furthermore, the contents of the paper define the generic model of business system management supported by said concepts (frameworks) and analyzes their orientation towards value. Melita Kozina ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/12 IMPROVED VIRTUAL CIRCUIT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORKS UNDER THE ASPECT OF POWER AWARENESS https://jios.foi.hr/index.php/jios/article/view/13 Routing algorithms have shown their importance in the power aware wireless micro-sensor networks. In this paper first we present virtual circuit algorithm (VCRA), a routing algorithm for wireless sensor networks. We analyze the power utilized by nodes to lengthen the battery life and thus improving the lifetime of wireless sensor network. We discuss VCRA in comparison with the Multihoprouter, an algorithm developed by UC Berkeley. Then we present Improved Virtual Circuit Routing Algorithm (IVCRA) which is an improved form of VCRA. In IVCRA node failure detection and path repairing scheme has been implemented. We also present the energy analysis of IVCRA and prove that IVCRA is the best choice. We first implement our routing algorithms in simulator TOSSIM and then on real hardware of mica2 mote-sensor network platform and prove the reliable routing of the data packets from different nodes to the base station. The motes used as nodes in our mote-sensor network are from Berkeley USA. By using simulator POWERTOSSIM, we estimate and present the energy utilized by different nodes of the network. At the end we present a comparison of our work with the network layer of Zigbee/IEEE 802.15.4, which is an emerging standard for wireless sensor networks and then compare its energy efficiency with the packet size chosen for our algorithm. Abid Ali Minhas, Thomas Trathnigg, Christian Steger, Reinhold Weiß ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/13 IDENTIFICATION OF THE FREQUENCY AND THE INTENSITY OF THE THREATS IN THE FUNCTION OF DEVELOPMENT OF THE INFORMATION SYSTEM https://jios.foi.hr/index.php/jios/article/view/8 In the process of development of the security system of the information system, the risk assessment is the foundation for selection of the security measures. The reduction of the level of risk and the amount of costs depend upon the adequate selection of the security measures. The quality of the risk assessment depends upon the adequate assessment of the form and the intensity of the threats. If the forms of threats are not monitored in the business system, it should make its own threat assessment, or use experience of others. The best, but also the most time-consuming solution is to develop own security system, while the fastest way is to use experience of others. However, there is the problem of migration of some other solution to our own system. Depending upon the question whether we are adopting the experiences of domestic or foreign business systems, the question of the applicability to the system from the different business environment becomes relevant. This happens because of the significant differences in the form and intensity of threats in certain local environments or different branches of industry. Željko Hutinski, Miran Zlatović, Igor Balaban ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/8 Cover pages https://jios.foi.hr/index.php/jios/article/view/136 Here you can download journal cover pages. Neven Vrček ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/136 From the Editor https://jios.foi.hr/index.php/jios/article/view/135 <p>Dear readers,</p><p>I proudly welcome you to Issue 2 of Volume 33 of the Journal of Information and Organizational Sciences.</p><p>Let me remind you that JIOS is published on the two-issues-per-volume basis, with one volume published annually. One issue of the volume is usually dedicated to CECIIS, the international scientific conference organized and hosted by the Faculty of Organization and Informatics. These special issues of JIOS normally contain a selection of best scientific papers presented at the Conference. The second issue is reserved for scientific papers in the fields of information sciences as well as a range of scientific fields related with information sciences, particularly applied ICT in economics and business.</p><p>Owing to the efforts of the Editorial Board aimed at including JIOS in a number of relevant databases, JIOS has been steadily increasing its visibility with every new volume. As a result, JIOS is currently being cited in seven databases that cover a variety of scientific topics connected to information sciences, computing and applied ICT.</p><p>In this issue you will find a selection of several original scientific papers, two preliminary communications and one review paper. We hope that the variety of themes reflects some of your own research interests, thus making the papers inspirational for your future work.</p><p>As in all my letters addressed to the respected readership of JIOS, I would like to use this opportunity to motivate prospective authors among you, dear readers, to submit papers at www.jios.foi.hr. You are also invited to share with us your comments or critical remarks regarding the papers previously published in the Journal. Your willingness to become a peer-reviewer for submitted papers would be much appreciated as by choosing to do so you would contribute significantly to the rising quality of JIOS.</p> Neven Vrček ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/135 From the Editor https://jios.foi.hr/index.php/jios/article/view/73 The Journal of Information and Organizational Sciences – JIOS – is an interdisciplinary scientific journal with focus on application of information sciences and advances in organizational sciences, as well as on theoretical contemplations in the fields that impact information sciences, computer sciences and organizational sciences. JIOS is published twice a year. This issue comprises submitted papers along with those chosen among papers presented at the IIS 2007 Conference (recently renamed CECIIS) organized by the Faculty of Organization and Informatics.<br />JIOS has already undergone several changes of its name and layout. With this issue we introduce a new visual identity of the Journal as well as modified instructions to authors, to make it more aligned with contemporary standards in scientific journal publication. Further, the Journal has changed its web address and is managed by Open Journal System, where all communication from submitting the paper to reviewing and publishing is conducted on-line.<br />In this issue of JIOS a selection of six original scientific papers has been included covering the following topics: organizational design, digital divide in enterprises, management software and web portals evaluation, m-marketing and m-advertising, as well as the introduction of a shot boundary detection algorithm for soccer video. We hope you will find the papers interesting and challenging for your own research.<br />We are looking forward to new papers to be submitted in the future and comments of papers already published. Neven Vrček ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/73 Cover Pages https://jios.foi.hr/index.php/jios/article/view/120 Here you can download journal cover pages. Neven Vrcek ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/120 From the Editor https://jios.foi.hr/index.php/jios/article/view/119 <p>Dear readers,</p><p>I am happy&nbsp; to present you a new&nbsp; issue of&nbsp; the Journal of&nbsp; Information and Organizational Sciences, volume 33, number 1.<br /><br />JIOS is being increasingly seen as a relevant journal in the field of information sciences and applied information and communication technology. Speaking in favour of this statement is the fact that JIOS has been&nbsp; included&nbsp; into several new databases &ndash; DOAJ (Directory of Open Access Journals), OAIster and Referativny Žurnal &ndash; which is information of interest to all our future authors. At present, we are cited in 7 diferent databases, which signifcantly enhances the visibility of the Journal. <br /><br />In&nbsp; this&nbsp; issue a&nbsp; selection of 9 original&nbsp; scientific papers, 3 preliminary communication articles and 1 review paper has been&nbsp; included, all of which have undergone rigorous double-blind review. Some of the papers published here were already presented at the CECIIS 2008 conference. The papers&nbsp; in the current&nbsp; issue cover a broad area of topics, from programming and web related topics, through algorithm and method proposals,&nbsp; to economics and applied&nbsp; linguistics. We hope you will find the papers interesting and challenging for your own research. <br /><br />We encourage you to submit your papers at www.jios.foi.hr, where you can also share with us your <br />recommendations, comments or critical remarks regarding the papers published in previous issues. <br />Your&nbsp; papers&nbsp; and&nbsp; feedback may&nbsp; prove&nbsp; invaluable&nbsp; in&nbsp; fulfilling&nbsp; our&nbsp; ambitions, which&nbsp; are&nbsp; very&nbsp; high indeed, as we have set out to enter some new databases. We would also appreciate your willingness to become a peer-reviewer for submitted papers, and thus give your contribution to the rising quality of JIOS.</p> Neven Vrcek ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/119 INTERNET ENABLED PUBLIC SERVICES AS A DRIVER OF ECONOMIC GROWTH -CASE STUDY ECROATIA 2006 - https://jios.foi.hr/index.php/jios/article/view/36 The Barcelona European Council called on the European Commission to draw up an eEurope Action Plan in order to widespread penetration of ICT, as powerful driver of growth and employment. Availability of modern on-line public services through e-Government, e-Learning, e-Health and e-Business is to be secured by the Action Plan. The eEurope 2005 is succeeding eEurope 2002 Action Plan which comprises four separate but interlinked tools: policy measures, exchange of good practices, monitoring and benchmarking and overall co ordination of existing policies. Croatia is candidate for accession to EU by 2009, which means that Croatian Government has to implement eEurope Action plan 2005 and Commission's new strategic framework, i2010 - European Information Society 2010. In first part of the paper authors are presenting overall framework of eEurope Action Plan 2005 as well i2010 strategic framework. For the purposes of the paper, authors have conducted a research availability of on-line public services through government, e-Learning, e-Health and e-Business in Croatia 2006.The results of the survey has been benchmarked to the results of similar surveys in New Europe countries. Damir Novotny, Zvonimir Sabati ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/36 GENERATION OF A SET OF KEY TERMS CHARACTERISING TEXT DOCUMENTS https://jios.foi.hr/index.php/jios/article/view/33 The presented paper describes statistical methods (information gain, mutual X^2 statistics, and TF-IDF method) for key words generation from a text document collection. These key words should characterise the content of text documents and can be used to retrieve relevant documents from a document collection. Term relations were detected on the base of conditional probability of term occurrences. The focus is on the detection of those words, which occur together very often. Thus, key words, which consist from two terms were generated additionally. Several tests were carried out using the 20 News Groups collection of text documents. Kristina Machova, Andrea Szaboova, Peter Bednar ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/33 RESOLVING DATABASE CONSTRAINT COLLISIONS USING IIS*CASE TOOL https://jios.foi.hr/index.php/jios/article/view/39 Integrated Information Systems*Case (IIS*Case) R.6.21 is a CASE tool that we developed to support automated database (db) schema design, based on a methodology of gradual integration of independently designed subschemas into a database schema. It provides complete intelligent support for developing db schemas and enables designers to work together and cooperate reaching the most appropriate solutions. The process of independent design of subschemas may lead to collisions in expressing the real world constraints and business rules. IIS*Case uses specialized algorithms for checking the consistency of constraints embedded in the database schema and the subschemas. IIS*Case supports designers in reviewing and validating results obtained after each step of the design process. The paper outlines the process of resolving collisions. A case study based on an imaginary production system is used to illustrate the application of IIS*Case. Different outcomes and their consequences are presented. Sonja Ristić, Ivan Luković, Jelena Pavićević, Pavle Mogin ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/39 DEVELOPMENT OF AHP BASED MODEL FOR DECISION MAKING ON E-LEARNING IMPLEMENTATION https://jios.foi.hr/index.php/jios/article/view/26 Strategic planning of e-learning implementation includes decision making about the most suitable form of implementing e-learning on different levels. Decision making about e-learning implementation has been covered as consisting of four phases: (1) intelligence, (2) design, (3) choice and (4) implementation. During the Intelligence phase we have precisely identified our central decision problem and have conducted situation analysis. In the Design phase we have developed alternatives and established criteria and subcriteria. Then, we have created the questionnaire about the importance of the advantages and goals of e-learning implementation and about criteria and subcriteria essential for decision making. The survey has been conducted on the sample of 90 elearning experts in Croatia. Further, we connected these findings with the results of the factor analysis which was performed on the complete survey. The results of the factor analysis have served as input in the multicriteria decision model (AHP) that we have developed in the Choice phase. The AHP model will be presented in the article and qualitative and quantitative evaluation of the model will be indicated. Nina Begičević, Blaženka Divjak, Tihomir Hunjak ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/26 WEATHER FORECAST DATA SEMANTIC ANALYSIS IN F-LOGIC https://jios.foi.hr/index.php/jios/article/view/34 This paper addresses the semantic analysis problem in a spoken dialog system developed for the domain of weather forecasts. The main goal of semantic analysis is to extract the meaning from the spoken utterances and to transform it into a domain database format. In this work a semantic database for the domain of weather forecasts is represented using the F-logic formalism. Semantic knowledge is captured through semantic categories a semantic dictionary using phrases and output templates. Procedures for semantic analysis of Croatian weather data combine parsing techniques for Croatian language and slot filling approach. Semantic analysis is conducted in three phases. In the first phase the main semantic category for the input utterance is determined. The lattices are used for hierarchical semantic relation representation and main category derivation. In the second phase semantic units are analyzed and knowledge slots in the database are filled. Since some slot values of input data are missing in the third phase, incomplete data is updated with missing values. All rules for semantic analysis are defined in the F-logic and implemented using the FLORA-2 system. The results of semantic analysis evaluation in terms of frame and slot error rates are presented. Ana Meštrović, Sanda Martinčić-Ipšić, Mirko Čubrilo ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/34 METHODOLOGY FRAMEWORK FOR PROCESS INTEGRATION AND SERVICE MANAGEMENT https://jios.foi.hr/index.php/jios/article/view/28 History of information systems development was driven by business system's functions automation and mergers and acquisitions - business subjects integration into a whole. Modern business requires business processes integration through their dynamics and thus enterprise application integration (EAI) as well. In this connection it is necessary to find ways and means of application integration and interaction in a consistent and reliable way. The real-time enterprise (RTE) monitors, captures and analyzes root causes and overt events that are critical to its success the instant those events occur [6]. EAI is determined by business needs and business requirements. It must be based on business process repository and models, business integration methodology (BIM) and information flow as well. Decisions concerning technology must be in function of successful application integration. In this paper EAI methodological framework and technological concepts for its achievements are introduced. Darko Galinec, Slavko Vidović ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/28 BIOMETRIC CRYPTOGRAPHY AND NETWORK AUTHENTICATION https://jios.foi.hr/index.php/jios/article/view/32 In this paper we will present some schemes for strengthening network authentification over insecure channels with biometric concepts or how to securely transfer or use biometric characteristics as cryptographic keys. We will show why some current authentification schemes are insufficient and we will present our concepts of biometric hashes and authentification that rely on unimodal and multimodal biometrics. Our concept can be applied on any biometric authentification scheme and is universal for all systems. Tonimir Kišasondi, Miroslav Bača, Alen Lovrenčić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/32 AN AUTOMATIC AND METHODOLOGICAL APPROACH FOR ACCESSIBLE WEB APPLICATIONS https://jios.foi.hr/index.php/jios/article/view/35 Semantic Web approaches try to get the interoperability and communication among technologies and organizations. Nevertheless, sometimes it is forgotten that the Web must be useful for every user, consequently it is necessary to include tools and techniques doing Semantic Web be accessible. Accessibility and usability are two usually joined concepts widely used in web application development, however their meaning are different. Usability means the way to make easy the use but accessibility is referred to the access possibility. For the first one, there are many well proved approaches in real cases. However, accessibility field requires a deeper research that will make feasible the access to disable people and also the access to novel non-disable people due to the cost to automate and maintain accessible applications. In this paper, we propose one architecture to achieve the accessibility in web-environments dealing with the WAI accessibility standard and the Universal Design paradigm. This architecture tries to control the accessibility in web applications development life-cycle following a methodology starting from a semantic conceptual model and leans on description languages and controlled vocabularies. Lourdes Moreno, Elena Castro, Paloma Martinez ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/35 IMPLEMENTATION OF ICT AND THE ISO 9001:2000 STANDARD CAN IMPROVE THE QUALITY OF STUDYING IN CROATIA https://jios.foi.hr/index.php/jios/article/view/42 The process of integrating the Republic of Croatia in the EU calls for an adaptation and improvement of many of the Croatian society elements, among which there is also the education system as a foundation for creating of a generation who will, by their knowledge and a world view, easily embed into the European virtues. The conformation of the high education system has been consolidated under the term "the Bologna process". Although the basic accent of this process has been put to conformation in order to form a unique European education system, the efficiency of knowledge acquiring process within the sole endeavour to ensure the quality, also represents one of the main objectives. The article hereto points to the possible advantages of implementing the ICT and the international ISO 9000 standards as a base for an efficient increase of the quality of studying in the Republic of Croatia. Giorgio Sinković, Jusuf Šehanović ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/42 TOWARDS AN OPEN BIOMETRIC ONTOLOGY https://jios.foi.hr/index.php/jios/article/view/25 Over the last decade we faced a great number of publications in the field of biometrics. Many new biometric methods, techniques, models, metrics and characteristics were proposed. Due to this explosion of research, scientific and professional papers certain inconsistencies in terminology. What some authors call a biometric method, others call model, system or even characteristic. There wasn't enough effort in creating a unique systematization and categorization which would approach the stated issues and open new areas of research. We argue that it is possible to approach biometrics in a narrower and in a broader perspective. We observed biometrics in the narrower perspecive and created a unique framework for the systematization and categorization of biometric methods, models, characteristics and patterns based on a general biometric system. This systematization is a fundamental step forward towards the creation of an open biometrics ontology. Miroslav Bača, Markus Schatten, Kornelije Rabuzin ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/25 FABASOFT BEST PRACTICES AND TEST METRICS MODEL https://jios.foi.hr/index.php/jios/article/view/31 Software companies have to face serious problems about how to measure the progress of test activities and quality of software products in order to estimate test completion criteria, and if the shipment milestone will be reached on time. Measurement is a key activity in testing life cycle and requires established, managed and well documented test process, defined software quality attributes, quantitative measures, and using of test management and bug tracking tools. Test metrics are a subset of software metrics (product metrics, process metrics) and enable the measurement and quality improvement of test process and/or software product. The goal of this paper is to briefly present Fabasoft best practices and lessons learned during functional and system testing of big complex software products, and to describe a simple test metrics model applied to the software test process with the purpose to better control software projects, measure and increase software quality. Nadica Hrgarek ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/31 PROACTIVE APPROACH TO THE INCIDENT AND PROBLEM MANAGEMENT IN COMMUNICATION NETWORKS https://jios.foi.hr/index.php/jios/article/view/43 Proactive approach to communication network maintenance has the capability of enhancing the integrity and reliability of communication networks, as well as of reducing maintenance costs and overall number of incidents. This paper presents approaches to problem and incident prevention with the help of root-cause analysis, aligning that with the goal to foresee software performance. Implementation of proactive approach requires recognition of enterprise's current level of maintenance better insights into available approaches and tools, as well as their comparison, interoperability, integration and further development. The approach we are proposing and elaborating in this paper lies on the construction of a metamodel of the problem management of information technology, particularly the proactive problem management. The metamodel is derived from the original ITIL specification and presented in an object-oriented fashion by using structure (class) diagrams conform to UML notation. Based on current research, appropriate metrics based on the concept of Key Performance Indicators is suggested. Vjeran Strahonja, Kristijan Saletović ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/43 SOME APPROACHES TO TEXT MINING AND THEIR POTENTIAL FOR SEMANTIC WEB APPLICATIONS https://jios.foi.hr/index.php/jios/article/view/37 In this paper we describe some approaches to text mining, which are supported by an original software system developed in Java for support of information retrieval and text mining (JBowl), as well as its possible use in a distributed environment. The system JBowl1 is being developed as an open source software with the intention to provide an easily extensible, modular framework for pre-processing, indexing and further exploration of large text collections. The overall architecture of the system is described, followed by some typical use case scenarios, which have been used in some previous projects. Then, basic principles and technologies used for service-oriented computing, web services and semantic web services are presented. We further discuss how the JBowl system can be adopted into a distributed environment via technologies available already and what benefits can bring such an adaptation. This is in particular important in the context of a new integrated EU-funded project KP-Lab2 (Knowledge Practices Laboratory) that is briefly presented as well as the role of the proposed text mining services, which are currently being designed and developed there. Jan Paralič, Marek Paralič ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/37 DECISION SUPPORT SYSTEM TO SUPPORT DECISION PROCESSES WITH DATA MINING https://jios.foi.hr/index.php/jios/article/view/41 Traditional techniques of data analysis do not enable the solution of all kind of problems and for that reason they have become insufficient. This caused a newinterdisciplinary field of data mining to arise, encompassing both classical statistical, and modern machine learning techniques to support the data analysis and knowledge discovery from data. Data mining methods are powerful in dealing with large quantities of data, but on the other hand they are difficult to master by business users to facilitate decision support. In this paper we introduce our approach to integration of decision support system with data mining. We discuss the role of data mining to facilitate decision support, the use of data mining methods in decision support systems, discuss applied approaches and introduce a data mining decision support system called DMDSS - Data Mining Decision Support System. We also present some obtained results and plans for future development. Rok Rupnik, Matjaž Kukar ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/41 ROLE OF UML SEQUENCE DIAGRAM CONSTRUCTS IN OBJECT LIFECYCLE CONCEPT https://jios.foi.hr/index.php/jios/article/view/30 When modeling systems and using UML concepts, a real system can be viewed in several ways. The RUP (Rational Unified Process) defines the "4 + 1 view": 1. Logical view (class diagram (CD), object diagram (OD), sequence diagram (SD), collaboration diagram (COD), state chart diagram (SCD), activity diagram (AD)), 2.Process view (use case diagram, CD, OD, SD, COD, SCD, AD), 3. Development view (package diagram, component diagram), 4. Physical view (deployment diagram), and 5. Use case view (use case diagram, OD, SD, COD, SCD, AD) which combines the four mentioned above. With sequence diagram constructs we are describing object behavior in scope of one use case and their interaction. Each object in system goes through a so called lifecycle (create, supplement object with data, use object, decommission object). The concept of the object lifecycle is used to understand and formalize the behavior of objects from creation to deletion. With help of sequence diagram concepts our paper will describe the way of interaction modeling between objects through lifeline of each of them, and their importance in software development. Miroslav Grgec, Robert Mužar ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/30 SUCCESS AND IMPACT FACTORS OF CARD-BASED LOYALTY SYSTEMS - AN EMPIRICAL ANALYSIS IN THE GERMAN RETAIL SECTOR https://jios.foi.hr/index.php/jios/article/view/40 The retail sector in Germany has also been badly hit by intensifying international competition. Confronted with lowering margins and the movement of customers to the most favourable provider in each case, it became increasingly more difficult for companies to reach such goals as turnover and market share inputs. With the introduction of Card-based Loyalty Systems (CBLS), an instrument appears to have been found which increases customer retention through the evaluation of purchasing information and enables the companies to realize their goals even under difficult market conditions. The provision for this, however, is the permanent acceptance of the customer with regard to these systems.<br />This paper first gives an overview of the connections between CBLS and increased customer retention before their impact factors are empirically analyzed for consumer utility. If these factors flow into a cost-benefit analysis, it appears that privacy of the consumers is endangered in the long term and an added value and consequently the preconditional permanent acceptance of the customer is not necessarily given. The resulting question ";Why do customers make use of CBLS anyway?"; can be answered using the approach of hyperbolic utility-discounting. Markus Ruch ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/40 DEVELOPING SYSTEM DYNAMICS MODELS WITH "STEP-BY-STEP" APPROACH https://jios.foi.hr/index.php/jios/article/view/38 System dynamics is a powerful tool that enhances learning about company, market and competitors; portrays the cognitive limitations on the information gathering and processing power of human mind; facilitates the practice of considering opinions; and supports building of ";What if"; scenarios. Although the literature on system dynamics modeling is very rich with applications in many fields, not many papers on developing system dynamics models were published so far. In this paper we portray current approaches to the development of system dynamics models. These are (1) model development based on influence diagram, (2) model development based on the identification of resources and their states, (3) usage of generic structures for specific domain field, and (4) component strategy for the formulation of system dynamics models. Validation is an important issue that none of these approaches tackles. We propose a ";step-by-step"; approach that integrates validation with developing process of system dynamics models. This approach will be demonstrated on the example of development of a simple inventory model. Mirjana Pejić-Bach, Vlatko Čerić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/38 LEARNING PHENOMENA IN MANUFACTURING AND ARTIFICIAL NEURAL NETWORK https://jios.foi.hr/index.php/jios/article/view/27 In the industrially advanced countries, that are different from our ex and present countries, to learning phenomena has been dedicated a significant attention for the last 60 years. One of more basic reasons is multiple purposes of results. Until now, there have been applied various approaches, methods and procedures for empirical data approximation, and in this articles some possibilities of artificial neural network application are researched. Miroslav Car ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/27 INFORMATION SYSTEM SECURITY THREATS CLASSIFICATIONS https://jios.foi.hr/index.php/jios/article/view/29 Information systems are exposed to different types of security risks. Theconsequences of information systems security (ISS) breaches can vary from e.g. damaging the data base integrity to physical "destruction" of entire information system facilities, and can result with minor disruptions in less important segments of information systems, or with significant interruptions in information systems functionality. The sources of security risks are different, and can origin from inside or outside of information system facility, and can be intentional or unintentional. The precise calculation of loses caused by such incidents is often not possible because a number of small scale ISS incidents are never detected, or detected with a significant time delay, a part of incidents are interpreted as an accidental mistakes, and all that results with an underestimation of ISS risks. This paper addresses the different types and criteria of information system security risks (threats) classification and gives an overview of most common classifications used in literature and in practice. We define a common set of criteria that can be used for information system security threats classification, which will enable the comparison and evaluation of different security threats from different security threats classifications. Sandro Gerić, Željko Hutinski ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/29 From the Editor https://jios.foi.hr/index.php/jios/article/view/167 <div>Dear authors, readers and future authors,</div><div>It is my pleasure to present you the 1st number of the 34th volume of the Journal of Information and Organizational Sciences &ndash; JIOS.</div><div><br /></div><div>In this issue a selection of 11 original scientific papers and 2 preliminary communications has been included, all of which have undergone a rigourous double-blind review process. Some of the papers published here were already presented at the CECIIS 2009 Conference held in Varaždin between 23rd and 25th September 2009. These papers were nominated for publishing in JIOS by the chairs of the conference tracks they were presented at on the account of their research quality.</div><div>As in prior issues of the Journal, this one also comprises papers that cover themes from various ICT fields: semantic web, social networks analysis, LMS interoperability, effective learning environment, game theory, model driven architecture, and other topics in the field of applied information sciences. We hope that the variety of themes will draw the attention of researchers in different ICT fields and motivate potential authors to expand the Journal&rsquo;s thematic scope by other themes that may be of interest to the wider ICT research community.</div><div><br /></div><div>I would like to use this opportunity to encourage prospective authors among you, dear readers, to submit papers at jios.foi.hr. You are also invited to share with us your comments or critical remarks regarding the papers previously published in the Journal. Further, we would appreciate your willingness to become a peer-reviewer for submitted papers and thus contribute significantly to the rising quality of JIOS.</div><div>So far JIOS has been indexed in seven well known databases. We are continuously investing a lot of effort to extend the list of databases where JIOS would be cited, in order to make the published papers available to a larger readers&rsquo; audience, and give your research a greater impact factor.</div> Neven Vrček ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/167 TIME SERIES ANALYSIS USING A UNIQUE MODEL OF TRANSFORMATION https://jios.foi.hr/index.php/jios/article/view/44 REFII1 model is an authorial mathematical model for time series data mining. The main purpose of that model is to automate time series analysis, through a unique transformation model of time series. An advantage of this approach of time series analysis is the linkage of different methods for time series analysis, linking traditional data mining tools in time series, and constructing new algorithms for analyzing time series. It is worth mentioning that REFII model is not a closed system, which means that we have a finite set of methods. At first, this is a model for transformation of values of time series, which prepares data used by different sets of methods based on the same model of transformation in a domain of problem space. REFII model gives a new approach in time series analysis based on a unique model of transformation, which is a base for all kind of time series analysis. The advantage of REFII model is its possible application in many different areas such as finance, medicine, voice recognition, face recognition and text mining. Goran Klepac ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/44 FEASIBILITY OF INVESTMENT IN BUSINESS ANALYTICS https://jios.foi.hr/index.php/jios/article/view/48 Trends in data processing for decision support show that business users need business analytics, i.e. analytical applications which incorporate a variety of business oriented data analysis techniques and task-specific knowledge. The paper discusses the feasibility of investment in two models of implementing business analytics: custom development and packed analytical applications. The consequences of both models are shown on two models of business analytics implementation in Croatia. Mladen Varga, Miljenko Vuković ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/48 Cover pages https://jios.foi.hr/index.php/jios/article/view/168 Here you can download journal cover pages. Neven Vrček ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/168 A METHOD FOR IMPROVEMENT OF OBJECTIVITY OF E-SERVICE QUALITY EVALUATION https://jios.foi.hr/index.php/jios/article/view/45 Measurement and improvement of e-service quality is important for sustaining competitive advantage of an e-commerce web site. A number of e-service quality measures have recently been developed that predominantly rely on the subjective evaluation of diverse quality attributes. To increase the objectivity of e-service quality measurement a recently developed measure of e-service quality has been adapted in a way that replaces its Likert type scales for evaluation of specific attributes with check-lists that include specific observable elements for appraisal and a scoring procedure. The consistency of scoring with this adaptation of an e-service quality measure was investigated in comparison to the use of the standard measure with Likert type scales and by the use of untrained and trained evaluators. The results of the empirical evaluation indicate a greater inter-rater consistency when the adapted/objective measure is used for evaluation of the efficiency dimension of e-service quality. Renata Mekovec, Goran Bubaš, Neven Vrček ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/45 ERP Implementation and Interoperability Growth as Organization Improvement Agents in Public Administration Further Development https://jios.foi.hr/index.php/jios/article/view/1093 <p style="margin: 0cm 14.2pt 0pt;"><span lang="EN-US"><span style="font-family: Times New Roman; font-size: small;">Further public administration development depends on numerous various influences - stakeholders' and public needs, so when planned to be developed, implemented or improved, they have to be carefully considered. ERP and/or other system need to be incorporated according to specific conditions. Interoperability represents strong support for implementation, integration or further development for public administration. This paper aims for contribution to awareness growth and platform for further work. Considering various case studies, ERP implementation, interoperability, critical success factors and contingency approach, paper aims for further development in this area. ERP becomes a platform for further ICT development towards quantum computing.</span></span></p> Darko Lugonja ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1093 Wed, 27 Jun 2018 13:25:00 +0200 An Iterative Automatic Final Alignment Method in the Ontology Matching System https://jios.foi.hr/index.php/jios/article/view/1098 Ontology matching plays an important role in the integration of heterogeneous data sources that are described by ontologies. In order to determine correspondences between ontologies, a set of matchers can be used. After the execution of these matchers and the aggregation of the results obtained by these matchers, a final alignment method is executed in order to select appropriate correspondences between entities of compared ontologies. The final alignment method is an important part of the ontology matching process because it directly determines the output result of this process. In this paper we improve our iterative final alignment method by introducing an automatic adjustment of final alignment threshold as well as a new rule for determining false correspondences with similarity values greater than adjusted threshold. An evaluation of the method is performed on the test ontologies of the OAEI evaluation contest and a comparison with other final alignment methods is given. Marko Gulić, Boris Vrdoljak, Marin Vuković ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1098 Wed, 27 Jun 2018 13:24:59 +0200 Methodology of Evaluating the Sufficiency of Information for Software Quality Assessment According to ISO 25010 https://jios.foi.hr/index.php/jios/article/view/1113 <p>The research is devoted to the development of the formalized and ontological models of the software quality according to ISO 25010. These models provide the possibility of the formalization of the software quality assessment according to ISO 25010. This standard would benefit from a formal description. The paper proves that information sufficiency is a critical aspect of software quality assessment. The methods and system of evaluating the sufficiency of the information for software quality assessment according to ISO 25010 are developed. The developed methods and tools provide the increasing the veracity of software quality assessment. The conducted experiments confirm that the developed methodology of evaluating the sufficiency of information for software quality assessment increased the veracity of the software quality assessment in 12% for the automated system for large-format photo print.</p> Tetiana Oleksandrivna Hovorushchenko ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1113 Wed, 27 Jun 2018 13:24:59 +0200 The Use of Support Vector Machines When Designing a User-Defined Niche Search Engine https://jios.foi.hr/index.php/jios/article/view/1081 <p><strong>Abstract:</strong> This study presents the construction of a niche search engine, whose search topic domain is to be user-defined.  The specific focus of this study is the investigation of the role that a Support Vector Machine plays when classifying textual data from web pages. Furthermore, the aim is to establish whether this niche search engine can return results that are more relevant to a user than when compared to those returned by a commercial search engine Through the conduction of various experiments across a number of appropriate datasets, the suitability of the SVM to classify web pages has been proven to meet the needs of a niche search engine. A subset of the most useful webpage-specific features has been discovered, with the best performing feature being a web pages’ Text &amp; Title component. The user defined niche search engine was successfully designed and an experiment showed that it returned more relevant results than a commercial search engine.</p> Maria Jakovljevic, Howard Sommerfeld, Alfred Coleman ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1081 Wed, 27 Jun 2018 13:24:59 +0200 Cover pages https://jios.foi.hr/index.php/jios/article/view/1237 <span>Here you can download journal cover pages.</span> Alen Lovrenčić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1237 Wed, 27 Jun 2018 13:24:58 +0200 Key factors of an organization’s environment for the acquisition and assimilation of an innovation https://jios.foi.hr/index.php/jios/article/view/1101 <p>The paper deals with influential factors of an organization’s environment in the initial phase of diffusion of innovations (DOI) within the organization. A qualitative research was carried out with two expert groups: one for the diffusion of e-learning as an innovation in a higher education institution and the other for the diffusion of the Building Information Modelling (BIM) in a Construction Industry. The research disclosed 20 common factors. The internal environment group covers management support, the attitude towards innovation, strategic planning and communication, motivation and expertize of employers, available resources and IT maturity level of an organization. The group of business environment factors consists of competitors, clients and partners, supply and demand balance on the specific market for goods and services. In the social environment group, three factors are recognized on the national level and two on the global levels. The holistic model combines the theory of DOI and the concept of absorption capacity.</p> Sanjana Buć, Blaženka Divjak ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1101 Wed, 27 Jun 2018 13:24:58 +0200 Emotion-Based Content Personalization in Social Networks https://jios.foi.hr/index.php/jios/article/view/1107 <p class="Abstract">Personalization is the process of customizing social network pages of users according to their needs and personal interests. It can also be used for filtering unwanted information from an individual's page received from other users, in case this information is unpleasant or unacceptable. To avoid unwanted information from a particular user in current social networks, the user needs to be denied accessibility by blocking them. However, instead of blocking the user, it would be preferable to have a mechanism that prevents the undesirable content in a user's social network page. Thus, this paper presents a model that determine the emotions shared in the content of a social network page by the user. The model determines the dominant emotions for a period of time and uses these to filter the content using the user's dominant emotions. Using the developed model, a novel system based on item based collaborative filtering process to personalize the user's social network page has been developed. A user study involving 5000 Twitter messages shows that the developed system performs satisfactory with a correctness in the filtering process of 87%.</p> Anthoniraj Amalanathan, S Margret Anouncia, Uffe Kock Wiil ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1107 Wed, 27 Jun 2018 13:24:58 +0200 Publication Ethics; List of Reviewers; Instructions for Authors https://jios.foi.hr/index.php/jios/article/view/1236 <span>Full text available in PDF.</span> Alen Lovrenčić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1236 Wed, 27 Jun 2018 13:24:58 +0200 From the Editor https://jios.foi.hr/index.php/jios/article/view/1235 <p>Dear readers and authors,</p><p>It is the last time I am addressing you as the editor of the Journal. From the next issue the job of the editor will be taken over by Dr. Dijana Oreški. I am sure that the new editor will bring new ideas and new quality to the Journal and that she will keep good praxis that was introduced during my mandate.</p><p>In four years I tried to increase the quality of articles and reviews. That opened the door of the Web of Science to the Journal as it is now in the Web of Science Emerging Sources. I am sure that, if Journal only keep the same quality, it will in very short time be in other Web of Science databases, but I am sure that new editor will increase further both main quality parameters mentioned afore.</p><p>At the end of my mandate I want to thank all authors who published their articles in the Journal, all reviewers who employ their knowledge to defend the quality of the Journal with their opinions and remarks. My special thanks go to the people who worked hard with me to keep the quality of the Journal in every aspect, people from the publishing board: Bernarda Kos whose participation was crucial in the including the Journal into different scientific bases, Dr. Goran Hajdin who was in charge of technical review and preparation of the papers for the printing, Dr. Marcel Maretić and Dr. Vladimir Kovšca.</p><p>In this last issue as the editor I proudly present six original scientific papers from different fields of the information science, and I hope readers will find them interesting and useful to their own research. At the end of this addressing I would like to say to all authors, reviewers and readers that it was an honor to work with you on the promotion of the Journal of Information and Organizational Sciences, and if there were any mistakes in my work I hope you will accept my deep apology.</p> Alen Lovrenčić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1235 Wed, 27 Jun 2018 13:24:57 +0200 Merkle-Damgård Construction Method and Alternatives: A Review https://jios.foi.hr/index.php/jios/article/view/1070 <p class="Abstract">Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction method with constant initialization vector. Merkle-Damgård construction showed that the security of hash function depends on the security of the compression function. Several attacks on Merkle-Damgård construction based hash functions motivated researchers to propose different cryptographic constructions to enhance the security of hash functions against the differential and generic attacks. Cryptographic community had been looking for replacements for these weak hash functions and they have proposed new hash functions based on different variants of Merkle-Damgård construction. As a result of an open competition NIST announced Keccak as a SHA-3 standard. This paper provides a review of cryptographic hash function, its security requirements and different design methods of compression function.</p> Harshvardhan Tiwari ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1070 Wed, 13 Dec 2017 21:15:32 +0100 Knowledge Management Systems in the Polish Private, State and Foreign Owned Companies https://jios.foi.hr/index.php/jios/article/view/989 <p>The importance of knowledge management for enterprises increased significantly in the recent years. In this paper one element of knowledge management will be considered, namely knowledge management systems (KMS). The main purpose of this paper is to compare the level of use of KMS between Polish private and state owned companies as well as foreign owned enterprises of different size. To measure intensity of use of particular KMS technologies research questionnaire has been created. The sample was selected from Kompass Poland database and more than 1200 questionnaires have been collected. Statistical analysis of differences between target sections was conducted by Mann-Whitney U test. Overall analysis of results showed that foreign owned companies feature greater intensity of use of KMS functions than Polish state owned and private owned enterprises. Detailed results indicated that small and medium Polish private companies utilize discussed systems to a far lesser extent. Nevertheless, large private companies feature higher intensity of use of 4 out of 5 examined KMS than large state owned enterprises.</p> Marcin Soniewicki, Łukasz Wawrowski ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/989 Wed, 13 Dec 2017 21:15:32 +0100 A Study on Recommendation Systems in Location Based Social Networking https://jios.foi.hr/index.php/jios/article/view/1071 <p class="BodyA"><span lang="EN-US">Smart devices in the hands of people are revolutionizing the social lifestyle of one's self. Everyone across the world are using smart devices linked to their social networking activities one such activity is to share location data by uploading the tagged media content like photos, videos. The data is of surroundings, events attended/attending and travel experiences. Users share their experiences at a given location through localization techniques.  Using such data from social networks an attempt is made to analyse tagged media content to acquire information on user context, individual’s interests, tastes, behaviours and derive meaningful relationships amongst them are referred to as Location Based Social Networks (LBSNs). The resulting information can be used to market a product and to improve business, as well recommend a travel and plan an itinerary. This paper presents a comprehensive survey of recommended systems for LBSNs covering the concepts of LBSNs, terminologies of LBSN and various recommendation systems.</span></p><p class="BodyA"><span lang="EN-US"> </span></p> Lakshmi Shree Kullappa, Ranganath Ashok Kumar, Rajeshwari Kullappa ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1071 Wed, 13 Dec 2017 21:15:31 +0100 Prestige and Collaboration Among Researchers in the Field of Education and Career Development of ICT Graduates: Is There a Cross-Fertilization of Research and Knowledge? https://jios.foi.hr/index.php/jios/article/view/1042 <p class="Abstract"><span lang="EN-US">This paper analyzes state of the art of the research regarding the education and career development of ICT graduates based on a comprehensive literature review. Analysis presented in this paper includes 155 papers in two research areas – one related to the education of ICT graduates (101 papers) and the other to their career development (54 papers). The most prestigious papers, most influential journals and groupings of authors in the abovementioned fields are identified by using the citation analysis and Social Network Analysis (SNA). Results show that the most influential papers related to ICT career are research papers dealing with ICT job skills requirements, and related to ICT education are ICT association’s related reports and recommendations on curriculum development. In general, results show that there is a lack of cross-fertilization of knowledge in both areas which means that the mixing of ideas that can lead to better research results is missing.</span></p> Katarina Pažur Aničić, Blaženka Divjak, Krunoslav Arbanas ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1042 Wed, 13 Dec 2017 21:15:31 +0100 Computer Games as Virtual Environments for Safety-Critical Software Validation https://jios.foi.hr/index.php/jios/article/view/1064 <p class="Abstract">Computer games became an inseparable part of everyday life in modern society and the time people spend playing them every day is increasing. This trend caused a noticeable research activity focused on utilizing the time spent playing in a meaningful way, for example to help solving scientific problems or tasks related to computer systems development. In this paper we present one contribution to this activity, a software system consisting of a modified version of the Open Rails train simulator and an application called <span lang="EN-US">TS2JavaConn</span>, which allows to use separately developed software controllers with the simulator. The system is intended for validation of controllers developed by formal methods. The paper describes the overall architecture of the system and operation of its components. It also compares the system with other approaches to purposeful utilization of computer games, specifies suitable formal methods and illustrates its intended use on an example.</p> Štefan Korečko, Branislav Sobota ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1064 Wed, 13 Dec 2017 21:15:30 +0100 Comparison of DPSK and RZ-DPSK Modulations in Optical Channel with Speed of 10 Gbps https://jios.foi.hr/index.php/jios/article/view/1011 <p class="Abstract">This article is devoted to the problematic of error rate and modulations in optical communication. Optic waveguide shows insufficiencies in high speed transfers manifested by corrupted transfer. Although modern technological processes contributed to lowering these insufficiencies, it would be uneconomical to completely reconstruct the optical network infrastructure. The solution is only partial so we approach more economical methods, such as modulations. The article works with a 10 Gbps channel with two modulation types, namely DPSK (Differential Phase Shift Keyed) and RZ-DPSK (Return to Zero-Differential Phase Shift Keyed). These modulations are evaluated and compared according to BER (Bit Error Rate) and Q-factor.</p> Petr Ivaniga, Tomáš Ivaniga ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1011 Wed, 13 Dec 2017 21:15:30 +0100 On Simulation of the Young Measures – Comparison of Random-Number Generators https://jios.foi.hr/index.php/jios/article/view/1051 "Young measure" is an abstract notion from mathematical measure theory.  Originally, the notion appeared in the context of some variational problems related to the analysis of sequences of “fast” oscillating of functions.  From the formal point of view the Young measure  may be treated as a continuous linear functional defined on the space of Carathéodory integrands satisfying certain regularity conditions. Calculating an explicit form of specific Young measure is a very important task.  However, from a strictly mathematical standpoint  it is a very difficult problem not solved as yet in general. Even more difficult would be the problem of calculating Lebasque’s integrals with respect to such measures. Based on known formal results it can be done only in the most simple cases.  On the other hand in many real-world applications it would be enough to learn only some of the most important probabilistic  characteristics  of the Young distribution or learn only approximate values of the appropriate integrals. In such a case a possible solution is to adopt Monte Carlo techniques. In the presentation we propose three different algorithms designed for simulating random variables distributed according to the Young measures  associated with piecewise functions.  Next with the help of computer simulations we compare their statistical performance via some benchmarking problems. In this study we focus on the accurateness of the distribution of the generated sample. Andrzej Z. Grzybowski, Piotr Puchała ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1051 Wed, 13 Dec 2017 21:15:29 +0100 Using AHP Method for Making a Decision on How the Management of Sewage Sludge in the Northern Croatia https://jios.foi.hr/index.php/jios/article/view/1029 <p class="Abstract"><span lang="EN-GB">By 2018, in Croatia, the agglomerations for collecting the sewage and water treatment systems are going to be constructed. All devices will be based on the mechanical-biological method of purification. However, the work of water treatment system produces a problem of sludge management. </span></p><p class="Abstract"><span lang="EN-GB">The paper presents the challenges of wastewater sludge handling and makes a decision on further sludge management. The hierarchical model of the decision making problem by defining the goal, criteria and alternative solutions is developed. On each level of the hierarchical model the elements of the model are compared with each other in pairs, and the preferences are expressed by using the Saaty’s scale. </span></p><p class="Abstract"><span lang="EN-GB">Moreover, the APH model compares the alternative pairs (thermal processing, deposition on agricultural land, disposal to waste repositories and composting) among each others. The intensities and weight preferences of one alternative over another are selected within the required criteria (economic, environmental, organisational and sociological).</span></p> Vesna Dušak, Lovorka Gotal Dmitrović, Renata Bagnall ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1029 Wed, 13 Dec 2017 21:15:29 +0100 From the Editor https://jios.foi.hr/index.php/jios/article/view/1193 <p>Dear readers and authors,</p><p>We are constantly striving to increase both quality and quantity of papers published in our Journal. Also, we are constantly endeavor to include the Journal in new scientific databases. In the meantime Journal of Information and Organizational Sciences is included in the Web of Science Core Collection - Emerging Sources Citation Index (ESCI) and we are hoping that we will become the full member of the Web of Science database in short time.</p><p>In this issue of the Journal we are presenting nine high quality papers from authors from Europe, Africa and Asia, consisting of four survey papers, one preliminary communication and four original scientific papers.</p><p>We hope that this issue will satisfy all your requests, and that you will find included papers interesting and scientifically challenging.</p> Alen Lovrenčić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1193 Wed, 13 Dec 2017 21:15:28 +0100 Publication Ethics; List of Reviewers; Instructions for Authors https://jios.foi.hr/index.php/jios/article/view/1194 <span>Full text available in PDF.</span> Alen Lovrenčić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1194 Wed, 13 Dec 2017 21:15:28 +0100 Cover pages https://jios.foi.hr/index.php/jios/article/view/1195 <span>Here you can download journal cover pages.</span> Alen Lovrenčić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1195 Wed, 13 Dec 2017 21:15:28 +0100 Utilization of Discrete Event Simulation in Business Processes Management Projects: a Literature Review https://jios.foi.hr/index.php/jios/article/view/1104 Discrete event simulation (DES) software is often used in business process management (BPM) projects, in order to support modeling, change and automatization of process modeling. However, the current research lacks systematic overview of the benefits and pitfalls of using DES software for BPM. The goal of this paper is to provide a systematic analysis of research paper related to the operations research, computer science, business and management that report the usage of DES in BPM projects, in order to shed some light in this area. Results of this analysis could be useful to academics and business practitioners in their projects. Vesna Bosilj Vukšić, Mirjana Pejić Bach, Katarina Tomičić-Pupek ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1104 Wed, 13 Dec 2017 21:15:28 +0100 Detecting Source Code Plagiarism on .NET Programming Languages using Low-level Representation and Adaptive Local Alignment https://jios.foi.hr/index.php/jios/article/view/1086 <p class="Abstract">Even though there are various source code plagiarism detection approaches, only a few works which are focused on low-level representation for deducting similarity. Most of them are only focused on lexical token sequence extracted from source code. In our point of view, low-level representation is more beneficial than lexical token since its form is more compact than the source code itself. It only considers semantic-preserving instructions and ignores many source code delimiter tokens. This paper proposes a source code plagiarism detection which rely on low-level representation. For a case study, we focus our work on .NET programming languages with Common Intermediate Language as its low-level representation. In addition, we also incorporate Adaptive Local Alignment for detecting similarity. According to Lim et al, this algorithm outperforms code similarity state-of-the-art algorithm (i.e. Greedy String Tiling) in term of effectiveness. According to our evaluation which involves various plagiarism attacks, our approach is more effective and efficient when compared with standard lexical-token approach.</p> Faqih Salban Rabbani, Oscar Karnalim ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1086 Fri, 16 Jun 2017 13:41:27 +0200 Information Technology in Small Medium Enterprise: Logistic and Production Processes https://jios.foi.hr/index.php/jios/article/view/956 <p>This paper presents and discuss a survey which describes how small-medium<br />enterprises (SMEs) implement and use their information system with respect to their<br />logistic and production processes.<br />The study first describes the rationale of the research, then it identifies the<br />characteristics of the companies and detects their general attitude towards information<br />technology (IT). In the following section the paper presents a set of detailed processes<br />to verify the structure and workflow of companies and how IT supports their<br />processes. In the last part we study the influence of some company characteristics to<br />effective use of processes and to different technological approaches, to support<br />defined logistic and production processes.<br />The novelty of the study and its interest, both in academic and institutional context as<br />in the real world, resides in the opportunity to verify and understand the different<br />attitudes of SMEs towards information technology in defining, organizing, planning<br />and control their processes.</p> Maurizio Pighin ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/956 Fri, 16 Jun 2017 13:41:26 +0200 The Elaboration of Strategic Decisions in the Socio-Economic Systems https://jios.foi.hr/index.php/jios/article/view/1068 The article deals with socio-economic strategic management, which implemented on the basis of Balanced Scorecard, multidimensional modeling and its set-theoretic representation. The main idea of the article is using of modern information technology to assist in decision-making. Much attention is given to formalization of SCIPEO-modeling and integration of its sub-model. The process of developing of management decisions is considered. The integration of these tools will improve the management of the system in a situation of total or partial indeterminacy Anna Alexseevna Khanova, Oleg Miroslavovich Protalinskiy, Kristina Igorevna Averianova ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1068 Fri, 16 Jun 2017 13:41:25 +0200 Comparisons of Bitcoin Cryptosystem with Other Common Internet Transaction Systems by AHP Technique https://jios.foi.hr/index.php/jios/article/view/1025 <p class="Abstract">This paper describes proposed methodology for evaluation of critical systems and prioritization of critical risks and assets identified in highly secured information systems. For different types of information assets or security environments it is necessary to apply different techniques and methods for their prioritization and evaluation. In this article, VECTOR matrix method for prioritization of critical assets and critical risks is explained and integrated into AHP (Analytic Hierarchy Process) technique as a set of fixed criteria for evaluation of defined alternatives. Bitcoin cryptocurrency was compared and evaluated along with other common Internet transaction systems by information security professionals according to defined VECTOR criteria. Also, the newly proposed hybrid AHP model is presented with potential case studies for future research. This article tries to discover security posture of Bitcoin cryptocurrency in the context of information security risks related to the existing most common online payment systems like e-banking, m-banking, and e-commerce.</p> Davor Maček, Dino Alagić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1025 Fri, 16 Jun 2017 13:41:25 +0200 A Guidance Based Approach for Enhancing the e-Government Interoperability https://jios.foi.hr/index.php/jios/article/view/1028 Developing e-Government interoperability in the government context is a complex task. As interoperability in government context is associated and hindered by many challenges and barriers connected to government nature of complexity. Interoperability is generally defined as the ability for two (or more) systems to exchange information and to use the information that has been exchanged. In this paper, we focus on computing systems interoperability across government ministries to achieve interoperable e-Government IT based solutions. In order to achieve e-Government interoperability in an organised and efficient way, this paper establishes a guidance-based approach for enhancing the e-Government Interoperability. This contribution is motivated by the limitations of the traditional software engineering methodologies in terms of analysis, design and development frameworks to a point that they can hardly cope with the growing issues of e-Government services interoperability. Yassine Jamoussi, Zuhoor Al-Khanjari, Naoufel Kraiem ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1028 Fri, 16 Jun 2017 13:41:24 +0200 Learning Analytics for Peer-assessment: (Dis)advantages, Reliability and Implementation https://jios.foi.hr/index.php/jios/article/view/1032 <p>Learning analytics deals with the data that occurs from students' interaction with ICT: collecting data, analyzing and reporting that can influence learning and teaching. Analysis of validity and reliability of assessment lags behind other applications of learning analytics. We present here mathematical modeling of learning analytics for assessment, especially for peer-assessment. In addition, we analyze and categorize students' recognition of advantages and disadvantages of peer-assessment. Finally implementations of reliability check of peer-assessment in Moodle Workshop module are explained.</p> Blaženka Divjak, Marcel Maretic ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1032 Fri, 16 Jun 2017 13:41:24 +0200 The Classification of Types of Business-to-Business Electronic Commerce: A Framework Construction https://jios.foi.hr/index.php/jios/article/view/992 <p>Based on the degree of information sharing between buyers and suppliers as well as the<br />level of supplier power, we suggested a framework that can be useful for classifying<br />types of business to business (B2B) electronic commerce (EC) in the manufacturing<br />firms. According to this framework, four kinds of B2B EC were theoretically proposed,<br />classified, and empirically confirmed. These four are: an electronic marketplace,<br />electronic procurement, electronic partnerships, and electronic distribution. Many prior<br />studies have investigated and proposed some kinds of B2B EC. However, these studies<br />focused mostly on one or two types of B2B EC, and did not develop or suggest a<br />framework for the classification of forms of B2B EC. The framework constructed in<br />this research can be utilized variously. Specifically, when a firm wants to initiate B2B<br />EC with its suppliers, this framework can help a firm to decide and select an appropriate<br />kind of B2B EC. This framework can also be applied to evaluate whether the proper<br />form of B2B EC has been adopted or not.</p> Jong-min Choe ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/992 Fri, 16 Jun 2017 13:41:23 +0200 Cover pages https://jios.foi.hr/index.php/jios/article/view/1138 <span>Here you can download journal cover pages.</span> Alen Lovrenčić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1138 Fri, 16 Jun 2017 13:41:23 +0200 Publication Ethics; List of Reviewers; Instructions for Authors https://jios.foi.hr/index.php/jios/article/view/1137 <span>Full text available in PDF.</span> Alen Lovrenčić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1137 Fri, 16 Jun 2017 13:41:23 +0200 From the Editor https://jios.foi.hr/index.php/jios/article/view/1136 <p>Dear readers,</p><p><br />In this issue of the Journal of Information and Organizational Sciences you will find seven high quality papers - three original scientific papers, two preliminary communications and two survey papers.</p><p>The papers have wide diapason of themes, from organization and e-commerce through e-learning to plagiarism detection and cryptography. For this reason I hope that the issue will be interesting for the readers with different interests.</p><p>I would like to thank to all reviewers and their useful comments on the papers as well as to the dear colleagues from the editorial board that are responsible for the final look of the papers and the journal<br />in whole. Special thanks, of course, goes to the authors without whose papers this journal would not be possible.</p><p>I hope that in this issue you will be able to find papers that meet your interests and that are useful for your scientific work.</p> Alen Lovrenčić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1136 Fri, 16 Jun 2017 13:41:22 +0200 Performance Measurement of Complex Event Platforms https://jios.foi.hr/index.php/jios/article/view/1055 <p>The aim of this paper is to find and compare existing solutions of complex event processing platforms (CEP). CEP platforms generally serve for processing and/or predicting of high frequency data. We intend to use CEP platform for processing of complex time series and integrate a solution for newly proposed method of decision making. The decision making process will be described by formal grammar. As there are lots of CEP solutions we will take the following characteristics under consideration - the processing in real time, possibility of processing of high volume data from multiple sources, platform independence, platform allowing integration with user solution and open license. At first we will talk about existing CEP tools and their specific way of use in praxis. Then we will mention the design of method for formalization of business rules used for decision making. Afterwards, we focus on two platforms which seem to be the best fit for integration of our solution and we will list the main pros and cons of each approach. Next part is devoted to benchmark platforms for CEP. Final part is devoted to experimental measurements of platform with integrated method for decision support.<strong></strong></p> Eva Zámečníková, Jitka Kreslíková ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1055 Fri, 09 Dec 2016 08:55:57 +0100 Enhancing Formal Methods Integration with ACP2Petri https://jios.foi.hr/index.php/jios/article/view/1063 The paper deals with the ACP2Petri tool, providing a transformation of process algebraic specification to equivalent Petri net-based specification. Long-term practical experiences with the tool revealed some suggestions for its update and extension. Shortcomings and limitations found are described and proposed solutions provided within the paper. Implemented extensions, simplifying the usage of the tool and providing more options for analysis of particular transformation, are also presented. One of the most evident extensions of the tool is its graphical user interface, which allows for convenient management and detailed control over the process of transformation. Slavomír Šimoňák, Martin Šolc ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1063 Fri, 09 Dec 2016 08:55:57 +0100 Categorical model of structural operational semantics for imperative language https://jios.foi.hr/index.php/jios/article/view/1012 Definition of programming languages consists of the formal definition of syntax and semantics. One of the most popular semantic methods used in various stages of software engineering is structural operational semantics. It describes program behavior in the form of state changes after execution of elementary steps of program. This feature makes structural operational semantics useful for implementation of programming languages and also for verification purposes. In our paper we present a new approach to structural operational semantics. We model behavior of programs in category of states, where objects are states, an abstraction of computer memory and morphisms model state changes, execution of a program in elementary steps. The advantage of using categorical model is its exact mathematical structure with many useful proved properties and its graphical illustration of program behavior as a path, i.e. a composition of morphisms. Our approach is able to accentuate dynamics of structural operational semantics. For simplicity, we assume that data are intuitively typed. Visualization and facility of our model is  not only  a  new model of structural operational semantics of imperative programming languages but it can also serve for education purposes. William Steingartner, Valerie Novitzká ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1012 Fri, 09 Dec 2016 08:55:56 +0100 Agent-Based Modelling applied to 5D model of the HIV infection https://jios.foi.hr/index.php/jios/article/view/1030 <p class="AbstractText"><span lang="EN-US">This paper proposes a Multi-Agents Model to simulate the phenomenon of the infection by the human immunodeficiency virus (HIV). Since the HIV was isolated in 1983 and found to be the cause of the </span><span lang="EN-US">Acquired Immune Deficiency Syndrome<span class="apple-converted-space"> </span>(AIDS)</span><span lang="EN-US">in 1984, lots of studies have been carried out to understand the complex dynamics between the HIV virus and the immune system.</span></p><p class="AbstractText"><span lang="EN-US">The simplest model was the 3D mathematical model. But the complexity of this phenomenon and the diversity of cells and actors which affect its evolution requires the use of new approaches such as multi-agents approach that we have applied in this paper. The results of our simulator on the 5D model are promising because they are consistent with biological knowledge’s. Therefore, the proposed approach is well appropriate to the study of population dynamics in general and could help to understand and predict the dynamics of HIV infection.</span></p> Toufik Laroum, Bornia Tiguiouart, Mohammed Redjimi ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1030 Fri, 09 Dec 2016 08:55:56 +0100 Cover pages https://jios.foi.hr/index.php/jios/article/view/1085 <span>Here you can download journal cover pages.</span> Alen Lovrenčić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1085 Fri, 09 Dec 2016 08:55:55 +0100 MATT: Multi Agents Testing Tool Based Nets within Nets https://jios.foi.hr/index.php/jios/article/view/1059 <p class="abstractCxSpFirst">Testing is a software development activity, devoted to evaluating product quality and improving it by identifying defects and problems. Concerning multi agent systems, testing is a challenging task, which asks for new testing techniques dealing with their specific nature. The techniques need to be effective and adequate to evaluate agent’s autonomous behaviors and build confidence in them.The "Model Based Testing" (MBT) is a technique particularly interested among  all existing  solutions  of   tests. This  latter is  based on a  system model, which produces  abstract  test cases. To run these last ones against systems under test,the abstract test cases have to be transformed to concrete ones.</p><p class="abstractCxSpFirst">As part of this effort, we propose a model based testing approach for multi agent systems based on such a model called Reference net, where a tool, which aims to providing a uniform and automated approach is developed. The feasibility and the advantage of the proposed approach are shown through a short case study.</p> Sara Kerraoui, Yacine Kissoum, Mohammed Redjimi, Moussa Saker ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1059 Fri, 09 Dec 2016 08:55:55 +0100 Publication Ethics; List of Reviewers; Instructions for Authors https://jios.foi.hr/index.php/jios/article/view/1084 <span>Full text available in PDF.</span> Alen Lovrenčić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1084 Fri, 09 Dec 2016 08:55:55 +0100 From the Editor https://jios.foi.hr/index.php/jios/article/view/1083 <p>Dear readers,</p><p>I am proud to present the new issue of Journal of Information and Organizational Sciences. This issue contains five high quality papers: three original scientific papers, and two preliminary communications, written by 13 authors from Europe and Africa. I am glad that all papers in this issue come from foreign countries. That proves that Journal of Information and Organizational Sciences is recognized journal in<br />the international scientific community.</p><p>I would like to thank all authors for the high quality of the papers and reviewers for their contribution in the selection of the papers as well as for suggestions that helped authors to improve their papers. Also, I would like to express my thanks to the colleagues from the publishing board for their efforts in the technical reviewing of the papers, technical editing, distribution and all the work they built in this issue.</p><p>Alen Lovrenčić<br />Editor</p> Alen Lovrenčić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1083 Fri, 09 Dec 2016 08:55:54 +0100 Cover pages https://jios.foi.hr/index.php/jios/article/view/1049 <span>Here you can download journal cover pages.</span> Alen Lovrencic ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1049 Thu, 16 Jun 2016 07:39:31 +0200 Publication Ethics; List of Reviewers; Instructions for Authors https://jios.foi.hr/index.php/jios/article/view/1048 Available in full text. Alen Lovrencic ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1048 Thu, 16 Jun 2016 07:35:14 +0200 From the Editor https://jios.foi.hr/index.php/jios/article/view/1047 <p><strong>40 Years of Publishing in Information and Organizational Sciences</strong></p><p>Dear readers,</p><p>I am honoured to serve as the Editor of the Journal of Information and Organizational Sciences. I proudly welcome you to the issue that marks the 40th year of continuous publication of the Journal in information and organizational sciences. As such, it has the distinction of one of the longest histories of publication in this field.</p><p>The Journal was inaugurated in 1977 as the journal of the University of Zagreb Faculty of Organization and Informatics under the title Zbornik radova. As the quality of the Journal grew and the number of foreign authors contributing papers in English increased, it was renamed as Zbornik radova: journal of information and organizational sciences in 1998. Following the changes in the publishing policy which defined that only papers written in English would be accepted for publication, in 2002 its name was changed again into Journal of Information and Organizational Sciences: JIOS. The Journal adopted its current name in 2008.</p><p>Today the Journal is referenced in 13 scientific referencing databases, including INSPEC, SCOPUS and EBSCO and is publishing papers by authors from Europe, Asia, South America and Africa. It boasts an international review board composed of scientists from all continents and a high quality double-blind review process. In all respects, it is a worldwide recognized scientific journal in the field of information and organizational sciences, and its quality is growing continuously.</p><p>In the last 40 years, we have published over 650 scientific and professional papers in the Journal, and, in my humble opinion, have influenced the development of the information and organizational sciences not only in Croatia, but also in Southwest Europe and beyond.</p><p>For that I wish to thank all the previous Editors of the Journal: Dr. Ivan Abramović, Prof. Boris Aurer, Prof. Marijan Cingula, Prof. Mirko Čubrilo, Prof. Vesna Dušak, Prof. Benedikt Bojanić-Glavica, Prof. Tihomir Hunjak, Prof. Željko Hutinski, Prof. Slavko Kapustić, Prof. Božidar Kliček, Dr. Franjo Kuhanec, Prof. Ivan Lončar, Prof. Mirko Maleković, Prof. Miodrag Ređep, Prof. Franjo Ruža, Prof. Franjo Šulak, Dr. Stjepo Vojvoda, Prof. Neven Vrček, Prof. Boris Zver and Prof. Miroslav Žugaj; all the scientists from Croatia and abroad who have served as members of the Editorial Board; all the members of the Publishing Board dedicated to continual modernization of the Journal layout; all the reviewers, owing to whose effort the quality of the papers has been maintained and raised; finally, to all authors that have contributed their high quality contemporary papers to the Journal. The current Editor as well as the Advisory, Editorial and Publishing Boards are committed to follow in the footsteps of all the former Editors and Board members who have shaped the Journal’s development and reputation.</p><p>In this issue we are delighted to present two original scientific papers, four high quality survey papers and one preliminary communication. The papers cover a wide set of themes from the fields of information and organizational sciences, so I hope that you will enjoy the reading and find it helpful and inspiring for your future research.</p><p>Alen Lovrenčić<br />Editor</p> Alen Lovrencic ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1047 Thu, 16 Jun 2016 07:30:26 +0200 The Investigation of TLC Model Checker Properties https://jios.foi.hr/index.php/jios/article/view/991 This paper presents the investigation and comparison of TLC model checking method (TLA Checker) properties. There are two different approaches to method usage which are considered. The first one consists of a transition system states attendance by breadth-first search (BFS), and the second one by depth-first search (DFS). The Kripke structure has been chosen as a transition system model. A case study has been conducted, where composite web service usage scenario has been considered. Obtained experimental results are aimed at increasing the effectiveness of TLA+ specifications automated verification. Vadym Viktorovych Shkarupylo, Igor Tomicic, Kostiantyn Mykolaiovych Kasian ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/991 Thu, 16 Jun 2016 07:22:31 +0200 Sampling Individually Fundamental Simplexes as Sets of Players’ Mixed Strategies in Finite Noncooperative Game for Applicable Approximate Nash Equilibrium Situations with Possible Concessions https://jios.foi.hr/index.php/jios/article/view/988 In finite noncooperative game, a method for finding approximate Nash equilibrium situations is developed. The method is prior-based on sampling fundamental simplexes being the sets of players’ mixed strategies. Whereas the sampling is exercised, the sets of players’ mixed strategies are mapped into finite lattices. Sampling steps are envisaged dissimilar. Thus, each player within every dimension of its simplex selects and controls one’s sampling individually. For preventing approximation low quality, however, sampling steps are restricted. According to the restricted sampling steps, a player acting singly with minimal spacing over its lattice cannot change payoff of any player more than by some predetermined magnitude, being specific for each player. The finite lattice is explicitly built by the represented routine, where the player’s mixed strategies are calculated and arranged. The product of all the players’ finite lattices approximates the product of continuous fundamental simplexes. This re-defines the finite noncooperative game in its finite mixed extension on the finite lattices’ product. In such a finite-mixed-extension-defined game, the set of Nash equilibrium situations may be empty. Therefore, approximate Nash equilibrium situations are defined by the introduced possible payoff concessions. A routine for finding approximate equilibrium situations is represented. Approximate strong Nash equilibria with possible concessions are defined, and a routine for finding them is represented as well. Acceleration of finding approximate equilibria is argued also. Finally, the developed method is discussed to be a basis in stating a universal approach for the finite noncooperative game solution approximation implying unification of the game solvability, applicability, realizability, and adaptability. Vadim V. Romanuke ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/988 Thu, 16 Jun 2016 07:22:26 +0200 Estimation and Comparison of Underground Economy in Croatia and European Union Countries: Fuzzy Logic Approach https://jios.foi.hr/index.php/jios/article/view/936 <p>Underground economy (UE) is one of the undesired facts in every country. The size of the underground economy is an important parameter in determining the effectiveness of fiscal and monetary policy, the rate of economic growth, and income distribution. From a scientific point of view analysis of the UE is faced with severe data problems because underground activities are not recorded and anyone engaged in it has an incentive to hide them. Therefore, economists have developed a variety of methods to estimate the size of the underground economy. The aim of this paper is to estimate and compare the size of the Croatian underground economy with the underground economy of European Union (EU) countries in the period of 2004 till 2012.<br />The purpose of this paper is to address this issue in three ways. First, we review existing estimates of the size of the underground economy. Second, we apply a novel calculation method for estimation: fuzzy logic. Third, we calculated and compared underground economy index for 25 European Union countries and compared it, with special focus on Croatian underground economy index. Results indicated that Croatia has the thirteenth largest underground economy among measured members of the European Union. This study is the first of its kind with recent data to measure the size of underground economy in European Union countries by employing fuzzy logic approach.</p> Kristina Marsic, Dijana Oreski ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/936 Thu, 16 Jun 2016 07:22:19 +0200 Exploring Technostress: Results of a Large Sample Factor Analysis https://jios.foi.hr/index.php/jios/article/view/993 With reference to the results of a large sample factor analysis, the article aims to propose the frame examining technostress in a population. The survey and principal component analysis of the sample consisting of 1013 individuals who use ICT in their everyday work was implemented in the research. 13 factors combine 68 questions and explain 59.13 per cent of the answers dispersion. Based on the factor analysis, questionnaire was reframed and prepared to reasonably analyze the respondents’ answers, revealing technostress causes and consequences as well as technostress prevalence in the population in a statistically validated pattern. A key elements of technostress based on factor analysis can serve for the construction of technostress measurement scales in further research. Steponas Jonušauskas, Agota Giedre Raisiene ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/993 Thu, 16 Jun 2016 07:22:14 +0200 Performance Journey Mapping: Insights from a Methodological Triangulation https://jios.foi.hr/index.php/jios/article/view/970 <p class="Abstract">This paper presents the results of an evaluation of the Performance Journey Mapping (PJM) framework. PJM is a service performance assessment concept with accompanying tools tailored to the specific performance measurement needs of small and medium-sized service providers. The initial evaluation of PJM was performed from three different perspectives. The underlying evaluation framework applied methodological triangulation in order to (i) ensure valid and reliable results and to (ii) evaluate both the framework’s results and its process. Quantitative results were supplemented with insights gained through participant observation.</p> Angelika Höber, Doris Weitlaner, Elisabeth Pergler ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/970 Thu, 16 Jun 2016 07:22:04 +0200 Use of Informatics Textbooks in School Classroom https://jios.foi.hr/index.php/jios/article/view/933 Textbooks are an integral part of school classroom teaching. Their use has been researched for the past few decades with a focus on a wide variety of aspects. This paper is focused on the published literature relative to textbooks with a special focus on the pedagogical use of textbooks within school classroom of informatics. Sixty two papers of various topics related to textbooks have been analyzed. The focus was placed on a) identifying the most influential papers related to textbooks where we identified nine key papers; b) prevailing topics in research papers related to informatics’ textbooks where analysis showed that most papers related to textbooks and informatics are focused on textbook content; c) identifying which topics have been researched in other fields related to use of textbooks but have not been so far included in surveys related to informatics subject, where we identified five main categories of topics researched in other fields. Goran Hajdin, Blaženka Divjak ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/933 Thu, 16 Jun 2016 07:21:54 +0200 Established and Emerging Decision Constructs – A Taxonomic Perspective https://jios.foi.hr/index.php/jios/article/view/990 <p class="Abstract">One might assume information systems (IS) are developed so systems enhance the user experience and facilitate a satisfying, productive interaction. From prior research, the authors established this assumption was not safe and certain design features amongst some online retailers were atypical of ‘good’ design elsewhere. It was apparent the transactional process was being used to present consumers with optional extras (and other decisions) that not only slowed the process down, but also stressed and agitated users. The research identified some new and unusual decision constructs such as the ‘must-opt’. The objective of the research presented herein is two-fold: to make an incremental contribution in first theorising and then identifying and categorising into a taxonomy some new decision constructs alongside established ones encountered throughout on-line Business-to-Consumer (B2C) transactional processes followed by a preliminary study confirming their existence and examining their clarity.</p> Chris Barry, Mairéad Hogan, Ann M. Torres ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/990 Thu, 16 Jun 2016 07:21:46 +0200 From the Editor https://jios.foi.hr/index.php/jios/article/view/1002 <p>Dear authors, reviewers and readers,</p><p>you have 39 (2) issue of the Journal of Information and Organizational Sciences in front of you. In this issue you will find seven high quality papers: six original scientific papers and one survey paper. The papers in this issue again cover very different aspects of communication sciences and informatics.</p><p>I have to address thanks to the authors who have trust in the quality of our Journal and send their papers for publishing, to reviewers who incorporate their knowledge into the improvement of the papers, and to advisory, editorial and publishing boards who make the publishing of the journal<br />possible.</p><p>At the end I want to emphasize that from the next issue Journal will have new visual design, which is presented at the end of this issue. I hope that authors will have no problems to adapt their future papers in accordance to it.</p><p>I wish you a pleasant reading.</p><p>Alen Lovrenčić<br />Editor</p> Alen Lovrenčić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1002 Wed, 16 Dec 2015 14:58:22 +0100 Cover pages https://jios.foi.hr/index.php/jios/article/view/1001 Here you can download journal cover pages. Alen Lovrenčić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/1001 Wed, 16 Dec 2015 14:40:52 +0100 Two Stage Comparison of Classifier Performances for Highly Imbalanced Datasets https://jios.foi.hr/index.php/jios/article/view/937 During the process of knowledge discovery in data, imbalanced learning data often emerges and presents a significant challenge for data mining methods. In this paper, we investigate the influence of class imbalanced data on the classification results of artificial intelligence methods, i.e. neural networks and support vector machine, and on the classification results of classical classification methods represented by RIPPER and the Naïve Bayes classifier. All experiments are conducted on 30 different imbalanced datasets obtained from KEEL (Knowledge Extraction based on Evolutionary Learning) repository. With the purpose of measuring the quality of classification, the accuracy and the area under ROC curve (AUC) measures are used. The results of the research indicate that the neural network and support vector machine show improvement of the AUC measure when applied to balanced data, but at the same time, they show the deterioration of results from the aspect of classification accuracy. RIPPER results are also similar, but the changes are of a smaller magnitude, while the results of the Naïve Bayes classifier show overall deterioration of results on balanced distributions. The number of instances in the presented highly imbalanced datasets has significant additional impact on the classification performances of the SVM classifier. The results have shown the potential of the SVM classifier for the ensemble creation on imbalanced datasets. Goran Oreški, Stjepan Oreški ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/937 Wed, 16 Dec 2015 14:28:23 +0100 Measuring the Utilization of On-Page Search Engine Optimization in Selected Domain https://jios.foi.hr/index.php/jios/article/view/974 Search engine optimization (SEO) techniques involve „on-page“ and „off-page“ actions taken by web developers and SEO specialists with aim to increase the ranking of web pages in search engine results pages (SERP) by following recommendations from major search engine companies. In this paper we explore the possibility of creating a metric for evaluating on-page SEO of a website. A novel „k-rank“ metric is proposed which takes into account not only the presence of certain tags in HTML of a page, but how those tags are used with selected keywords in selected domain. The „k-rank“ is tested in domain of education by inspecting 20 university websites and comparing them with expert scores. The overview of results showed that „k-rank“ can be used as a metric for on-page SEO. Goran Matošević ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/974 Wed, 16 Dec 2015 14:28:19 +0100 Review of Data Mining Techniques for Churn Prediction in Telecom https://jios.foi.hr/index.php/jios/article/view/968 <p>Telecommunication sector generates a huge amount of data due to increasing number of subscribers, rapidly renewable technologies; data based applications and other value added<br />service. This data can be usefully mined for churn analysis and prediction. Significant research had been undertaken by researchers worldwide to understand the data mining practices that can be used for predicting customer churn. This paper provides a review of around 100 recent journal articles starting from year 2000 to present the various data mining techniques used in multiple customer based churn models. It then summarizes the existing telecom literature by highlighting the sample size used, churn variables employed and the findings of different DM techniques. Finally, we list the most popular techniques for churn prediction in telecom as decision trees, regression analysis and clustering, thereby providing a roadmap to new researchers to build upon novel churn management models.</p> Vishal Mahajan, Richa Misra, Renuka Mahajan ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/968 Wed, 16 Dec 2015 14:28:14 +0100 Individual Entrepreneurial Behavior in Croatian IT Firms: The Contribution of Strategic Thinking Skills https://jios.foi.hr/index.php/jios/article/view/957 This article addresses the contribution of strategic thinking skills in explaining individual entrepreneurial behavior in Croatian IT firms. Strategic thinking skills were assessed according to entrepreneurs’ use of systems thinking, reflecting, and reframing. Individual entrepreneurial behavior was measured by their inclination towards risk-taking, innovativeness, and proactiveness. Our study of 136 IT entrepreneurs in Croatia confirmed that entrepreneurs with a more developed use of strategic thinking skills exhibit stronger entrepreneurial behaviors. In fact, proactiveness as an element of IEB had a strong relation to all components of strategic thinking skills. Systems thinking as an element of strategic thinking skills showed to be a predictor of all individual entrepreneurial behavior elements. Lara Jelenc, John Pisapia ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/957 Wed, 16 Dec 2015 14:28:08 +0100 The Development of Conceptual, Mathematical and System Dynamics Model for Food Industry Wastewater Purifying System https://jios.foi.hr/index.php/jios/article/view/984 The paper presents the development of the conceptual, mathematical and system dynamics model for the food industry wastewater purification system which removes organic matter. The food industry often located in places where is difficult to install large systems for water purification while small sophisticated systems are expensive. Wastewater food industry is contaminated with organic matter, phosphorus and nitrogen compounds. This paper presents model of the small, cheap and effective cleaner water. The goal of the scientific investigation is developing such a model for purification wastewater and methodology design suitable to significant behavior patterns of contamination matter. Developed conceptual model is a computer variables model uses randomly chosen values from the theoretical probability distribution of the variable applied. For the validation of the model, considering that the distributions are asymmetrical non-Gaussian distributions, a non-parametric test was applied. Methodology proposed in the paper is mostly based on the simulation modeling. Lovorka Gotal Dmitrović, Vesna Dušak, Aleksandra Anić Vučinić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/984 Wed, 16 Dec 2015 14:28:00 +0100 Do You Walk the Talk in Quality Culture? https://jios.foi.hr/index.php/jios/article/view/943 <p style="margin: 0cm 18pt 0pt;"><span lang="EN-US"><span style="font-family: Times New Roman;"><span style="font-size: small;">We present an action research project to foster quality culture in business processes. The client setting is in the food industry, a vital sector for our society and one of the most regulated in the world. Food production involves auditing throughout the supply chain and a demanding information system (IS), with numerous requirements grounded on the organizational policies. Our ISO</span><sub><span style="font-size: small;">2</span></sub><span style="font-size: small;"> approach – for joint development of IS and quality management system (QMS) – was tailored with a set of routines and artifacts to promote quality culture in the maintenance process of the selected organization. This contribution enables a graphical visualization of existing gaps between the high-level principles endorsed by an organization and its confirmation: (1) instantiating company policies at process level; (2) contrasting the assessment of the process owner and of the quality auditor; and (3) comparing the desired and the real practices in a specific business process. An audit from a food retail group confirmed the positive outcome of ISO</span><sub><span style="font-size: small;">2</span></sub><span style="font-size: small;"> approach in what regards the internalization of quality principles while developing the IS. Moreover, we performed a longitudinal evaluation to verify enduring effects of the ISO</span><sub><span style="font-size: small;">2</span></sub><span style="font-size: small;"> approach in business processes. We gathered evidence that ISO</span><sub><span style="font-size: small;">2</span></sub><span style="font-size: small;"> can (1) improve process users’ awareness of quality culture; (2) suggest an approach to increase trust in company policies; and (3) contribute to business process improvements.</span></span></span></p> João Barata, Paulo Rupino da Cunha ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/943 Wed, 16 Dec 2015 14:27:53 +0100 Ontology in Information Security https://jios.foi.hr/index.php/jios/article/view/962 <p class="Abstract">The past several years we have witnessed that information has become the most precious asset, while protection and security of information is becoming an ever greater challenge due to the large amount of knowledge necessary for organizations to successfully withstand external threats and attacks. This knowledge collected from the domain of information security can be formally described by security ontologies. A large number of researchers during the last decade have dealt with this issue, and in this paper we have tried to identify, analyze and systematize the relevant papers published in scientific journals indexed in selected scientific databases, in period from 2004 to 2014. This paper gives a review of literature in the field of information security ontology and identifies a total of 52 papers systematized in three groups: general security ontologies (12 papers), specific security ontologies (32 papers) and theoretical works (8 papers). The papers were of different quality and level of detail and varied from presentations of simple conceptual ideas to sophisticated frameworks based on ontology.</p> Krunoslav Arbanas, Mirko Čubrilo ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/962 Wed, 16 Dec 2015 14:27:46 +0100 Cover pages https://jios.foi.hr/index.php/jios/article/view/972 <span>Here you can download journal cover pages.</span> Alen Lovrenčić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/972 Mon, 06 Jul 2015 16:00:38 +0200 From the Editor https://jios.foi.hr/index.php/jios/article/view/971 <p>Dear authors, reviewers and readers,</p><p><br />I am proud to introduce to you 39 (1) issue of the Journal of Information and Organizational Sciences. <br />I would like to thank all authors and reviewers for their efforts that make this issue possible to be published.</p><p>In this issue, you will find seven papers of respectable quality: five original scientific papers and two survey papers. The papers in this issue really affirm that this journal covers wide field of themes in information and organizational sciences from the neural networks and algorithms, through the knowledge management to the usage of ICT in the business.</p><p>Therefore, I hope that every reader will be able to find some paper that is interesting to him or her and close to the research field of his or her interest.</p><p>I wish you a pleasant reading.</p><p><br />Alen Lovrenčić<br />Editor</p> Alen Lovrenčić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/971 Mon, 06 Jul 2015 15:59:08 +0200 A Study on Knowledge Gain and Retention when Using Multimedia Learning Materials of Different Quality https://jios.foi.hr/index.php/jios/article/view/949 <p class="Abstract">The usage of multimedia has proven to foster meaningful learning, but not every multimedia resource will necessarily contribute to the teaching-learning process. Since for the development of multimedia learning materials (MLMs) additional time and effort is required for everyone involved in the development process to pay proper attention to its quality in order to achieve desired learning effects. The paper deals with issues regarding the quality of multimedia learning materials (MLMs) as well as the relationship between MLM quality and knowledge retention.  </p>The results of an experimental study that involves low-quality and high-quality MLMs for two different topics and their effects on knowledge gain and retention of the polytechnic school students are presented. For the purpose of the research the LORI assessment tool was used to evaluate the quality of MLMs. The analysis of research data shows that MLMs developed according to the principles of multimedia learning and principles for reducing cognitive load were perceived as being of higher quality than those that were not developed using multimedia principles. Furthermore, the students’ usage of high-quality MLMs during treatment resulted in better knowledge acquisition and retention indicated by significantly higher scores in the three knowledge assessments. Maja Gligora Marković, Dijana Plantak Vukovac, Božidar Kliček ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/949 Mon, 06 Jul 2015 09:24:12 +0200 Measuring Public Procurement for Innovation on the Country Level and the Role of ICT Support https://jios.foi.hr/index.php/jios/article/view/948 <p class="BodyUndented">Using of public procurement as a tool for promoting innovations has captured interest of many researchers in recent years. However, most of the research is focused on the impact of public procurement on the company's innovativeness. The article discusses the findings of the literature on this topic and proposes a model on how to transfer the concept from the company level to the level of the whole country. One of the biggest problems is unavailability of appropriate measures of this phenomenon, so the authors suggest that the concept of Public procurement for innovation can be approximated by participation of criterion of the most economically advantageous tender (MEAT). Implementation of this criterion in choosing the best offer can be supported and facilitated by using of ICT which can improve the efficiency of procurement process and enable more innovations.</p> Kristina Detelj, Tanja Markovič Hribernik, Igor Pihir ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/948 Mon, 06 Jul 2015 09:24:07 +0200 Methods and Algorythms of Alternatives Ranging in Managing the Telecommunication Services Guality. https://jios.foi.hr/index.php/jios/article/view/942 <p>The article deals with methods of solving the problem of ranging of alternatives in information-analytical system of managing the quality of telecommunication services rendering process. Tasks of choice are determined, in which the alternatives are as follows: states of quality of different objects in the structure of telecommunication company management. An algorithm of ranging of objects is elaborated for the case of using unstructured set of indices. The algorithm enables to determine the objects priorities and to select the best ones among them. The suggested methods may be used while elaborating the programs of improvement of telecommunication companies competitiveness.</p> Pham Quang Hiep, Kvyatkovskaya Irina Yurievna, Shurshev Valery Fedorovich, Popov Georgy Alexandrovich ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/942 Mon, 06 Jul 2015 09:24:00 +0200 Boosting Ensembles of Heavy Two-Layer Perceptrons for Increasing Classification Accuracy in Recognizing Shifted-Turned-Scaled Flat Images with Binary Features https://jios.foi.hr/index.php/jios/article/view/941 A method of constructing boosting ensembles of heavy two-layer perceptrons is stated. The benchmark classification problem is recognition of shifted-turned-scaled flat images of a medium format with binary features. The boosting gain is suggested in two aspects. The earliest one is the ratio of minimal recognition error percentage among the ensemble perceptrons to the recognition error percentage performed by the ensemble. The second gain type is the ratio of minimal variance of perceptrons’ recognition error percentages over 26 classes to variance of the ensemble’s recognition error percentages over 26 classes. Both ratios increase as the number of perceptron classifiers in the ensemble increase. The ensemble of 36 classifiers performs with increased accuracy, where recognition error percentage is decreased for 33 %, and the variance is decreased for more than 50 %. Further increment of classifiers into ensemble cannot increase accuracy much as there is the saturation effect of the boosting gain. And the gain itself depends on the range of noise modeling object’s distortions. Thus, the heavier perceptron classifier the less gain is expected. Vadim V. Romanuke ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/941 Mon, 06 Jul 2015 09:23:54 +0200 An Overview of Graph-Based Keyword Extraction Methods and Approaches https://jios.foi.hr/index.php/jios/article/view/938 <p class="Abstract">The paper surveys methods and approaches for the task of keyword extraction. The systematic review of methods was gathered which resulted in a comprehensive review of existing approaches. Work related to keyword extraction is elaborated for supervised and unsupervised methods, with a special emphasis on graph-based methods. Various graph-based methods are analyzed and compared. The paper provides guidelines for future research plans and encourages the development of new graph-based approaches for keyword extraction.</p> Slobodan Beliga, Ana Meštrović, Sanda Martinčić-Ipšić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/938 Mon, 06 Jul 2015 09:23:47 +0200 Awareness of Cloud Computing in Slovenian and Croatian Micro-Enterprises https://jios.foi.hr/index.php/jios/article/view/918 <p><span style="font-family: Times New Roman; font-size: small;">This paper presents a comparison of the two studies conducted in Slovenian and Croatian micro-enterprises (µE) about the awareness of the cloud computing (CC). We were interested in the issues relating to the characteristics of µE and the latter's use of information and communication technology (ICT) in business processes. Also, the characteristics of owners and µE were investigated. We found that the results obtained in the two countries were similar. In both cases, the most important CC characteristics were reliability, security and performance. Given that CC could represent a good business opportunity for µE, some managerial implications are proposed.</span></p> Borut Werber, Marina Klačmer Čalopa, Igor Pihir, Anja Žnidaršič ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/918 Mon, 06 Jul 2015 09:23:40 +0200 Evaluating Expert Estimators Based on Elicited Competences https://jios.foi.hr/index.php/jios/article/view/913 Utilization of expert effort estimation approach shows promising results when it is applied to software development process. It is based on judgment and decision making process and due to comparative advantages extensively used especially in situations when classic models cannot be accounted for. This becomes even more accentuated in today’s highly dynamical project environment. Confronted with these facts companies are placing ever greater focus on their employees, specifically on their competences. Competences are defined as knowledge, skills and abilities required to perform job assignments. During effort estimation process different underlying expert competences influence the outcome i.e. judgments they express. Special problem here is the elicitation, from an input collection, of those competences that are responsible for accurate estimates. Based on these findings different measures can be taken to enhance estimation process. The approach used in study presented in this paper was targeted at elicitation of expert estimator competences responsible for production of accurate estimates. Based on individual competences scores resulting from performed modeling experts were ranked using weighted scoring method and their performance evaluated. Results confirm that experts with higher scores in competences identified by applied models in general exhibit higher accuracy during estimation process. For the purpose of modeling data mining methods were used, specifically the multilayer perceptron neural network and the classification and regression decision tree algorithms. Among other, applied methods are suitable for the purpose of elicitation as in a sense they mimic the ways human brains operate. Data used in the study was collected from real projects in the company specialized for development of IT solutions in telecom domain. The proposed model, applied methodology for elicitation of expert competences and obtained results give evidence that in future such a model can be used in practice to reduce estimation error and enhance expert effort estimation. Hrvoje Karna, Sven Gotovac ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/913 Mon, 06 Jul 2015 09:23:28 +0200 Cover pages https://jios.foi.hr/index.php/jios/article/view/925 Here you can download journal cover pages. Alen Lovrenčić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/925 Tue, 16 Dec 2014 13:43:07 +0100 From the Editor https://jios.foi.hr/index.php/jios/article/view/924 <p>Dear authors, readers and reviewers, ladies and gentlemen.</p><p>We present second number of the 38th volume of the Journal of Information and Organizational Sciences. We are continuing to publish papers from the wide scope of information and organizational sciences from the computer science to the organizational systems.</p><p>As a new JIOS editor I would like to introduce myself thank to the former editor prof. Neven Vrček not only for the help in my first JIOS issue, but for all things he did for JIOS while he was in charge. I really think that JIOS as it is today is mostly his credit, as anyone who compare the journal today and before his mandate can easily see. He improved JIOS in every sense, in international recognition, quality of papers, and technical design. I can only hope that I will be as succesful as he was and that I will develop as good relationship with authors, reviewers, editorial and publishing board as he had. I am inviting you all to read, write and participate in JIOS in the future as well as you did in the past.</p><p>In this issue we are proud to present six papers, four original scientific papers, one survey paper and one preliminary communication to you. I really hope you will enjoy in reading this issue of JIOS and that you will find the papers in it interesting and useful.</p> Alen Lovrenčić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/924 Tue, 16 Dec 2014 12:49:53 +0100 A Case Study of Software Product Line for Business Applications Changeability Prediction https://jios.foi.hr/index.php/jios/article/view/916 <p class="Abstract"><span lang="EN-US">The changeability, a sub-characteristic of maintainability, refers to the level of effort which is required to do modifications to a software product line (SPL) application component. Assuming dependencies between SPL application components and reference architecture implementation (a platform), this paper empirically investigates the relationship between 7 design metrics and changeability of 46 server components of a product line for business applications. In addition, we investigated the usefulness of Platform Responsibility (PR) metric as an indicator of product line component changeability. The results show that most of the design metrics are strongly related to the changeability of server component and also indicate statistically significant correlation between Maintainability Index (MI) and PR metric. The assessment is based on a case study of the implementation of the product line for business applications in a financial institution. The results show that PR metric can be used as good predictor of changeability in the software product line environment. </span></p><p class="Abstract"> </p> Zdravko Roško, Vjeran Strahonja ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/916 Tue, 16 Dec 2014 12:45:34 +0100 Applying Genetic Algorithms and RIA technologies to the development of Complex-VRP Tools in real-world distribution of petroleum products https://jios.foi.hr/index.php/jios/article/view/914 <p class="Abstract"><span lang="EN-US">Distribution problems had held a large body of research and development covering the VRP problem and its multiple characteristics, but few investigations examine it as an Information System, and far fewer as how it should be addressed from a development and implementation point of view. This paper describes the characteristics of a real information system for fuel distribution problems at country scale, joining the VRP research and development work using Genetic Algorithms, with the design of a Web based Information System. In this paper a view of traditional workflow in this area is shown, with a new approximation in which is based proposed system. Taking into account all constraint in the field, the authors have developed a VRP</span><span lang="EN-US">Web-based solution using Genetic Algorithms with multiple web frameworks for each architecture layer, focusing on functionality and usability, in order to minimizing human error and maximizing productivity. To achieve these goals, authors have use SmartGWT as a powerful Web based RIA SPA framework with java integration, and multiple server frameworks and OSS based solutions,</span><span class="hps"><span lang="EN">applied to </span></span><span lang="EN-US">development of a very complex VRP system for a logistics operator </span><span class="hps"><span lang="EN">of</span></span><span lang="EN"> <span class="hps">petroleum products.</span></span></p> Antonio Moratilla Ocaña, Eugenio Fernández Vicente, José Ignacio Olmeda Martos, Juan José Sánchez Peña, Alberto Moratilla Ocaña ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/914 Tue, 16 Dec 2014 12:45:25 +0100 An approach to source code conversion of classical programming languages into source code of quantum programming languages https://jios.foi.hr/index.php/jios/article/view/906 Basic principles of quantum computer ensure more computing power than the principles of classical computers. Quantum computers use quantum mechanical effects such as entanglement and superposition to speed up computing processes compared to classical computers. If the quantum computers one day becomes a commercially available product, then it is very important to have a converter that will convert the source code of programming languages for classical computers into source code of programming languages for quantum computers because it will speed up the translation process and ensure that developers of classical computers can develop programs for quantum computer using programming languages for classical computers. In this paper, the basic approach to automatic conversion of the source code for classical computer into a source code of quantum computer is introduced. Alan Bojić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/906 Tue, 16 Dec 2014 12:45:09 +0100 Analysis of human resources in science and technology in ICT companies–case of Croatia https://jios.foi.hr/index.php/jios/article/view/899 <p class="Abstract">This paper integrates theories and findings of the level of tertiary educated workforce, the human resources in science and technology and skills that are desirable in employees from in the information and communication technologies (ICT) sector. It is important to examine the real situation on the labor market in the ICT sector, which is often referred to as the key to overcoming the crisis and the future of national economy. Basic statistical elements, upon which to predict future demand for human resources in science and technology (HRST), are people who enter tertiary level of education (inputs) or are already in the system (throughputs), but until graduation are not considered HRST’s (outputs). Analysis is based on a sample of 56 small companies in ICT sector in Croatia. This paper presents the overview of the situations of human resources in small companies ICT sector in Croatia. Existing literature on HRST, employee’s skills and ICT sector is reviewed in the light of this analysis, in order to better understand current employment structure and desirable competencies of future employees of small companies in the ICT sector in Croatia.</p> Jelena Horvat, Marina Klačmer Čalopa, Aleksandra Sobodić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/899 Tue, 16 Dec 2014 12:44:47 +0100 Approximation of unit-hypercubic infinite antagonistic game via dimension-dependent irregular samplings and reshaping the payoffs into flat matrix wherewith to solve the matrix game https://jios.foi.hr/index.php/jios/article/view/897 There is suggested a method of approximating unit-hypercubic infinite antagonistic game with the matrix game and the corresponding solution in finite strategies. The method is based on dimension-dependent irregular samplings over the game kernel. Numbers of the sampling points and their coordinates are chosen due to the stated conditions. If the sampled kernel is not the flat matrix them the multidimensional payoff matrix is reshaped into the flat one wherewith to solve the matrix game. The reshaping is a reversible matrix map. The concluding step of the approximation is in checking the finite solution consistency. Consistency can be weakened, and consistency can be checked at some rank corresponding to a natural number. The higher rank of the finite solution consistency is, the wider neighborhood of the sampling numbers at which the solution properties are monotonic-like. Vadim Romanuke ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/897 Tue, 16 Dec 2014 12:44:23 +0100 Technical, Legal, Economic and Social Aspects of Biometrics for Cloud Computing https://jios.foi.hr/index.php/jios/article/view/892 <p class="Abstract">This article addresses technical, legal, economic and social aspects of biometrics for cloud computing, featuring application example, gains of such solution, current laws, directives and legislation for biometrics and cloud computing. It is primarily based on Slovenian example due to  common  general  EU  legislation  in  the  field  of  cloud  computing  and  biometrics. Authentication  on  the  Internet  is  still  mainly  done  using  passwords,  while  biometrics  is practically  not  used.  It  is  commonly  known  that  everything  is  moving  to  the  cloud  and biometrics is not an exception. Amount of biometric data is expected to grow significantly over the next few years and only cloud computing is possible to process such amounts of data. Due to these facts and increasing security needs, we propose and implement the use of biometry as a service in the cloud. A challenge regarding the use of biometric solutions in the cloud is the protection of the privacy of individuals and their personal data. In Slovenia privacy legislation is very strong, it permits usage of biometrics only for very specific reasons, but we predict that big players on the market will change this fact globally. One of the important reasons for that is also the fact that biometrics for cloud computing provides some strong benefits and economic incentives. Proper deployment can provide significant savings. Such solutions could improve people’s quality of life in terms of social development, especially in sense of more convenient, safer and reliable identification over multiple government and non-government services.</p> Jernej Bule, Peter Peer ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/892 Tue, 16 Dec 2014 12:44:14 +0100 Cover pages https://jios.foi.hr/index.php/jios/article/view/902 <span>Here you can download journal cover pages.</span> Neven Vrček ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/902 Thu, 26 Jun 2014 15:39:55 +0200 From the Editor https://jios.foi.hr/index.php/jios/article/view/901 <p>Dear authors, readers and future authors,</p><p>it is my pleasure to present you the 1st number of the 38th volume of the Journal of Information and Organizational Sciences – JIOS.</p><p>Please allow me one personal note. This is my last issue as an editor. I started in 2008. and it is time to make some changes. I’ll continue to act as a member of editorial board but I am handling over my editorial duty to new editor Alen Lovrenčić. It was pleasure to work with all authors, reviewers and collaborators and please continue partnership with JIOS because we have high aims which cannot be achieved without dedicated scientific community. I would also like to thank the publishing team of JIOS who helped with many operational issues especially: Bernarda Kos, Goran Hajdin and Darko Grabar.<br /> <br />In this issue a selection of 3 original scientific papers, 1 survey paper and 1 preliminary communications has been included, all of which have undergone a rigorous double-blind review process in some cases in several rounds.</p><p>The constant mission of JIOS is to cover scientific publications from broad area of information sciences and related disciplines and we continuously receive many articles in which authors strive to achieve scientific merit. Our review procedure is very strict but even when we decline papers we try to encourage authors in their future work and motivate them to give better results. That is why we maintain very good relations with our authors and we invite all of you to extend cooperation with JIOS.</p><p>We hope that the variety of themes will draw the attention of researchers in different fields of information sciences and motivate potential authors to expand the Journal’s thematic scope by other themes that may be of interest to the wider ICT research community. These themes motivate us to continue our work of delivering research results to interested audience. The ICT field is changing rapidly and we are constantly searching for cutting edge articles that open perspective and motivate further research. We have to notice that future of ICT related research is in interdisciplinary approach and relations with other research domains which is highly emphasized in Horizon 2020 directions and all related project lines. That is why we encourage and promote scientific collaboration across scientific areas that will bring us new interesting articles. We hope that many of you who will read the Journal will join us as authors, readers and reviewers and help us to fulfill our mission. The number of submitted papers increases every year giving us opportunity to increase the quality and visibility of JIOS.</p><p>I would like to use this opportunity to encourage prospective authors among you, dear readers, to submit papers at http://jios.foi.hr. You are also invited to share with us your comments or critical remarks regarding the papers previously published in the Journal. Further, we would appreciate your willingness to become a reviewer for submitted papers and thus contribute significantly to the rising quality of JIOS.</p><p>So far JIOS has been indexed in ten well known databases. We are continuously investing a lot of effort to extend the list of databases where JIOS would be cited, in order to make the published papers available to a larger readers’ audience, and give your research a greater impact factor.</p><p>So please be with us in the future, support new editorial team and help us build JIOS together.</p><p>Neven Vrček<br />Editor</p> Neven Vrček ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/901 Thu, 26 Jun 2014 14:21:22 +0200 Biometric System Vulnerability as a Compromising Factor for Integrity of Chain of Custody and Admissibility of Digital Evidence in Court of Justice: Analysis and Improvement Proposal https://jios.foi.hr/index.php/jios/article/view/848 <p>Biometric systems play an important role in digital investigation process as a important factor of authentication and verification applications, since they are strongly linked to the holder of a biometric  traits  and  possible  suspect.  Thus  it  is  important  that  biometric  systems  can  be designed  to  withstand  attacks  when  employed  in  security-critical  applications,  especially  in unattended  remote  applications  such  as  energy  plants,  access  to  borders  at  airports,  ecommerce  etc.  Biometric  recognition  either  raises  important  legal  issues  of  remediation, authority,  and  reliability,  and,  of  course,  privacy.  The  standard  assumptions  of  the technologists  who  design  new  techniques,  capabilities,  and  systems  are  very  different  from those embedded in the legal  system.  Legal precedent on the  use of biometric technology is growing, with some key cases going back decades and other more recent cases having raised serious questions about the admissibility of biometric evidence in court. In this paper authors is about to explain influence of reliability of biometric system on general acceptance of digital evidence  in  Court  of  Justice  process.  Through  paper  authors  are  also  about  to  propose vulnerability assessment of biometric system as improvementfactor of reliability of existing methodology  for  preserving  chain  of  custody  of  digital  evidence  called  DEMF  (Digital Evidence Management Framework). Improvement proposal is presented as an introduction of phase  of  biometric  vulnerability  evaluation  methodology  within  proposedframework called APDEMF (Admissibility procedure of DEMF). Using UML (Universal Modeling Language) modeling  methodology  authors  are  about  to  represent  a  APDEMF  framework  which  will describe essential phases of the same process.</p> Zoran Cosic, Jasmin Ćosić, Miroslav Bača ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/848 Thu, 26 Jun 2014 10:35:08 +0200 Using Coevolution Genetic Algorithm with Pareto Principles to Solve Project Scheduling Problem under Duration and Cost Constraints https://jios.foi.hr/index.php/jios/article/view/847 <p class="Abstract"><span lang="EN-US">This article considers the multicriteria optimization approach using the modified genetic algorithm to solve the project-scheduling problem under duration and cost constraints. The work contains the list of choices for solving this problem. The multicriteria optimization approach is justified here. The study describes the Pareto principles, which are used in the modified genetic algorithm. We identify the mathematical model of the project-scheduling problem. We introduced the modified genetic algorithm, the ranking strategies, the elitism approaches. The article includes the example. </span></p> Alexandr Victorovich Budylskiy, Irina Kvyatkovskaya Yuryevna ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/847 Thu, 26 Jun 2014 10:35:01 +0200 Intention to Use and Variables Influencing Intention to Use Electronic Government Services Among Citizens https://jios.foi.hr/index.php/jios/article/view/852 Each organization should be aiming at higher efficiency. Government institutions should not make  an exception.Business  processes of  today’s  government  institutions  are extremely influenced  by  modern  ICT and  user  acceptance  plays  a  pivotal  role  in  success  of  all ICT projects. As  government  tends  to  design  and  launch  online  services  without  actually measuring citizens’ needs, understanding citizens’ (taxpayers’) needs is becoming crucial for government institutions.In this paper, a range of earlier studies have been critically analyzed and comparedto provide anintegrated model that can identify factors which could influence adoption of e-government services. The  goal of this article is to  study citizens’ demand for different  levels  of  electronic  government  service and to find  factors  which  influence  the adoption ofthese same services.This study integrates variables from technology acceptance model  (TAM)  and  trustworthiness  model.Analysis  of  the  results  indicates  that  there  is a significant  positive  relationship  between  Trust  in  Internet,  Perceived  usefulness, Perceived ease of use andtheIntentionto use. Implications for further research are discussed. Mario Klačmer, Neven Vrček ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/852 Thu, 26 Jun 2014 10:34:53 +0200 Elements of Resource Representation in Institutional Repositories: a Bibliographic Review https://jios.foi.hr/index.php/jios/article/view/857 <span>This review focuses on identifying how the literature studies the existing problems in the Resource Representation (RR) of Institutional Repositories (IR). RR is a process of recording in a persistent manner a set of data (metadata) as a synthesis and replacement of the "real" object, to allow its identification, retrieval and dissemination. RR is defined by certain elements: resources, metadata schema, storage and cataloging. On the other hand, IRs are based on functional processes according to the material that is deposited and the ISO 14.721 standard: </span><em>ingest</em><span>, </span><em>storage</em><span>, </span><em>cataloging</em><span>,</span><em>indexing</em><span>, </span><em>search engine</em><span> and </span><em>browsing</em><span>. The results of this review show that identifying the problems found in these elements and functional processes is not a subject of study for the researchers, which leads to a vacant area in this field, and in this way to solve some of the problems present in the RI, from the point of view of functional elements and processes.</span> Jose Daniel Texier, Marisa De Giusti ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/857 Thu, 26 Jun 2014 10:34:45 +0200 An Artificial Neural Network Modeling for Force Control System of a Robotic Pruning Machine https://jios.foi.hr/index.php/jios/article/view/856 <p class="Abstract">Nowadays, there has been an increasing application of pruning robots for planted forests due to the growing concern on the efficiency and safety issues. Power consumption and working time of agricultural machines have become important issues due to the high value of energy in modern world. In this study, different multi-layer back-propagation networks were utilized for mapping the complex and highly interactive of pruning process parameters and to predict power consumption and cutting time of a force control equipped robotic pruning machine by knowing input parameters such as: rotation speed, stalk diameter, and sensitivity coefficient. Results showed significant effects of all input parameters on output parameters except rotational speed on cutting time. Therefore, for reducing the wear of cutting system, a less rotational speed in every sensitivity coefficient should be selected.</p> Ali Hashemi, Keyvan Asefpour Vakilian, Javad Khazaei, Jafar Massah ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/856 Thu, 26 Jun 2014 10:34:36 +0200 From the Editor https://jios.foi.hr/index.php/jios/article/view/855 <p>Dear authors, readers and future authors,</p><p>it is my pleasure to present you the 2nd number of the 37th volume of the Journal of Information and Organizational Sciences – JIOS.</p><p>In this issue a selection of 3 original scientic papers and 2 preliminary communications has been included,  all  of  which  have  undergone  a  rigorous  double-blind  review  process  in  some  cases  in several rounds.</p><p>The mission of JIOS is to cover scientic publications from broad area of information sciences and related  disciplines  and  we  continuously  receive  many  articles  in  which  authors  strive  to  achieve scientic  merit.  Our  review  procedure  is  very  strict  but  even  when  we  decline  papers  we  try  to encourage  authors  in  their  future  work  and  motivate  them  to  give  better  results. That  is  why  we maintain very good relations with our authors and we invite all of you to extend cooperation with JIOS.</p><p>We  hope  that  the  variety  of  themes  will  draw  the  attention  of  researchers  in  di€erent  elds  of information sciences and motivate potential authors to expand the Journal’s thematic scope by other themes that may be of interest to the wider ICT research community. These themes motivate us to continue  our  work  of delivering  research  results  to  interested  audience. The  ICT  eld  is  changing rapidly and we are constantly searching for cutting edge articles that open perspective and motivate further research. We have to notice that future of ICT related research is in interdisciplinary approach and relations with other research domains which is highly emphasized in Horizon 2020 directions. That is why we encourage and promote scientic collaboration across scientic areas that will bring us new interesting articles. We hope that many of you who will read the Journal will join us as authors, readers and reviewers and help us to fulll our mission. The number of submitted papers increases every year giving us opportunity to increase the quality and visibility of JIOS.</p><p>I would like to use this opportunity to encourage prospective authors among you, dear readers, to submit  papers  at  http://jios.foi.hr. You  are  also  invited  to  share  with  us  your  comments  or  critical remarks regarding the papers previously published in the Journal. Further, we would appreciate your willingness to become a reviewer for submitted papers and thus contribute signicantly to the rising quality of JIOS.</p><p>So far JIOS has been indexed in nine well known databases and we are proud to announce that from this issue we are indexed in two more databases Index Copernicus and Directory of Research Journals Indexing. We  are  continuously  investing  a  lot  of  e€ort  to  extend  the  list  of  databases  where  JIOS would be cited, in order to make the published papers available to a larger readers’ audience, and give your research a greater impact factor.</p> Neven Vrček ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/855 Tue, 10 Dec 2013 09:51:28 +0100 Cover pages https://jios.foi.hr/index.php/jios/article/view/854 <span>Here you can download journal cover pages.</span> Neven Vrček ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/854 Tue, 10 Dec 2013 09:47:22 +0100 Designing Gaussian Membership Functions for Fuzzy Classifier Generated by Heuristic Possibilistic Clustering https://jios.foi.hr/index.php/jios/article/view/849 The paper deals with the problem of constructing Gaussian membership functions of fuzzy sets for fuzzy rules derived from the data by using heuristic algorithms of possibilistic clustering. Basic concepts of the heuristic approach to possibilistic clustering are reminded and the extended technique of constructing membership functions of fuzzy sets is proposed. An illustrative example is given and preliminary conclusions are made. Dmitri Arkady Viattchenin, Reyhane Tati, Aliaksandr Damaratski ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/849 Tue, 10 Dec 2013 09:36:07 +0100 Information Technology and Accounting Information Systems’ Quality in Croatian Middle and Large Companies https://jios.foi.hr/index.php/jios/article/view/820 An accounting information system is of a great importance for preparing quality accounting information for a wide range of users. The study elaborates the impact of information technology on accounting process and as a consequence on accounting information systems quality. This paper analyzes the basic characteristics of accounting information systems quality, discussing the model of AIS’s quality measurement. The perception of the quality of accounting information systems by accountants in medium and large companies in Croatia is also presented. The paper presents the historical overview of AIS’s quality based on three empirical studies conducted in 2001, 2008 and 2012.<br /> Ivana Mamić Sačer, Ana Oluić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/820 Tue, 10 Dec 2013 09:35:53 +0100 Knowledge Organization of Integrated Water Resources Management: A Case of Chi River Basin, Thailand https://jios.foi.hr/index.php/jios/article/view/846 <p>This study is a part of the research project on the Development of an Ontology-Based Semantic Search for Integrated Water Resources Management of the Chi River Basin (CRB), Thailand. The study aimed at developing the knowledge domain of water resources management for CRB. The research methods included document analysis and qualitative research by adopting Liou (1990)’s knowledge acquisition approach. Fifteen experts including ten experts in the areas of environmental engineering, water resources engineering, and GIS, and seven government officers who has been involving with water management in the CRB were interviewed. The experts also took part in the processes of developing the knowledge domain, classifying, and structuring the knowledge for water resources management in the CRB.</p><p>The results of this research were the knowledge domain of water resource management for CRB. An example of the water resources management knowledge domain which was structuredby following concepts and processes of water resources management in Thailand is shown in this paper.</p> Nattapong Kaewboonma, Kulthida Tuamsuk, Wanida Kanarkard ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/846 Tue, 10 Dec 2013 09:35:40 +0100 Interpretation of Fuzzy Attribute Subsets in Generalized One-Sided Concept Lattices https://jios.foi.hr/index.php/jios/article/view/816 In this paper we describe possible interpretation and reduction of fuzzy attributes in GeneralizedOne-sided Concept Lattices (GOSCL). This type of concept lattices represent generalization ofFormal Concept Analysis (FCA) suitable for analysis of datatables with different types of attributes. FCA as well as generalized one-sided concept lattices represent conceptual data miningmethods. With growing number of attributes the interpretation of fuzzy subsets may become unclear, hence another interpretation of this fuzzy attribute subsets can be valuable. The originalityof the presented method is based on the usage of one-sided concept lattices derived from submodels of former object-attribute model by grouping attributes with the same truth value structure.This leads to new method for attribute reduction in GOSCL environment. Peter Butka, Jozef Pocs, Jana Pocsova ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/816 Tue, 10 Dec 2013 09:35:13 +0100 The Application of Multimedia Aimed at Improving the Acquisition of Typical Topics in Natural and Social Science Programs in High Schools https://jios.foi.hr/index.php/jios/article/view/824 <p>The issue of natural and social science courses in high schools, as well as in grammar schools, is  very important not only on a global level. Therefore, the aim of this study is to address the issue of improving the process of learning with an emphasis on those subjects which students of a certain program find difficult.</p><p>By means of its application in teaching, multimedia – being a combination of various media – has enabled the introduction of new channels in the information transfer process, i.e. the reception of information through multiple sensors. At the same time the mentioned fact represents the advantage of multimedia materials over classical textual materials.</p><p>The research was conducted on the sample of 121 students, namely two social science classes (62 students) and two natural science classes (59 students). Ultimately, the result of the study is the quantification of the effect of multimedia on various student groups, as well as the recognition of differences when it comes to subject preferences, learning styles and attitudes towards learning.</p><p> </p> Bojan Banić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/824 Tue, 10 Dec 2013 09:34:43 +0100 List of reviewers https://jios.foi.hr/index.php/jios/article/view/840 <ul><li><strong>Daniel Rodriguez<br /> </strong>University of Alcala, Spain</li><li><strong>Ivan Magdalenic</strong><br /> University of Zagreb, Croatia</li><li><strong>Joaquim Filipe <br /> </strong>Polytechnic Institute of Setúbal, Portugal</li><li><strong>Sergei Silvestrov<br /> </strong>Mälardalen University, Sweden<strong></strong></li><li><strong>Alen Lovrenčić<br /> </strong>University of Zagreb, Croatia<strong></strong></li><li><strong>Matilda Drozdova<br /> </strong>University of Žilina, Slovakia<strong></strong></li><li><strong>Maria Jose Escalona<br /> </strong>University of Seville, Spain<strong></strong></li><li><strong>Wolf Rauch<br /> </strong>University of Graz, Austria<strong></strong></li><li><strong>Sandro Gerić<br /> </strong>University of Zagreb, Croatia<strong></strong></li><li><strong>Neven Vrcek<br /> </strong>University of Zagreb, Croatia<strong></strong></li><li><strong>Marina Klačmer Čalopa<br /> </strong>University of Zagreb, Croatia<strong></strong></li><li><strong>Mohit Verma<br /> </strong>Institute of Management Technolopgy, Dubai<strong></strong></li></ul> Neven Vrček ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/840 Wed, 26 Jun 2013 13:50:05 +0200 List of reviewers https://jios.foi.hr/index.php/jios/article/view/839 <ul><li><strong>József Tar<br /> </strong>Institute of Intelligent Engineering Systems, Budapest<strong></strong></li><li><strong>Gašper Mušič<br /> </strong>University of Ljubljana, Slovenia<strong></strong></li><li><strong>William Steingartner<br /> </strong>Technical University of Košice, Slovakia<strong></strong></li><li><strong>Ivana Jugović</strong><br /> Institute for Social Research, Croatia<strong></strong></li><li><strong>Gilda Pecaric<br /> </strong>University of Zagreb, Croatia<strong></strong></li><li><strong>Elisabeth Pergler<br /> </strong>Evolaris next level GmbH, Austria<strong></strong></li><li><strong>Alen Lovrenčić<br /> </strong>University of Zagreb, Croatia<strong></strong></li><li><strong>Peter Andreae</strong><br /> Victoria University, New Zealand</li><li><strong>Jan Paralic</strong><br /> Technical University Kosice, Slovakia</li><li><strong>Diana Šimić<br /> </strong>University of Zagreb, Croatia</li><li><strong>Nadica Hrgarek<br /> </strong>MED-EL Medical Electronics, Austria<strong></strong></li><li><strong>Jadranka Stojanovski<br /> </strong>Rudjer Boskovic Institute, Croatia<strong></strong></li><li><strong>Milan Ambroz</strong><br /> Human Resources Professional, Slovenia<strong></strong></li><li><strong>Katarina Žager</strong><br /> University of Zagreb, Croatia<strong></strong></li><li><strong>Kresimir Fertalj<br /> </strong>University of Zagreb, Croatia<strong></strong></li></ul> Neven Vrček ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/839 Wed, 26 Jun 2013 13:41:02 +0200 List of reviewers https://jios.foi.hr/index.php/jios/article/view/838 <ul><li><strong>Jasminka Dobša<br /> </strong>University of Zagreb, Croatia<strong></strong></li><li><strong>Kornelije Rabuzin<br /> </strong>University of Zagreb, Croatia<strong></strong></li><li><strong>Ali Koyuncugil<br /> </strong>Capital Markets Board of Turkey, Turkey<strong></strong></li><li><strong>Ivan Magdalenic<br /> </strong>University of Zagreb, Croatia<strong></strong></li><li><strong>Kresimir Fertalj<br /> </strong>University of Zagreb, Croatia<strong></strong></li><li><strong>Markus Schatten<br /> </strong>University of Zagreb, Croatia<strong></strong></li><li><strong>Dmitri Viattchenin</strong><br /> United Institute of Informatics Problems of the NAS of Belarus, Belarus</li><li><strong>C. Hurt<br /> </strong>University of Wisconsin, USA<strong></strong></li><li><strong>Vesna Čančer</strong><br /> University of Maribor, Slovenia</li><li><strong>Zeljka Mihajlovic</strong><br /> University of Zagreb, Croatia</li><li><strong>Renata Mekovec<br /> </strong>University of Zagreb, Croatia<br /> <strong>Alen Lovrenčić<br /> </strong>University of Zagreb, Croatia</li></ul> Neven Vrček ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/838 Wed, 26 Jun 2013 13:37:48 +0200 From the Editor https://jios.foi.hr/index.php/jios/article/view/837 <p>Dear authors, readers and future authors,</p><p><br />it is my pleasure to present you the 1st number of the 37th volume of the Journal of Information and Organizational Sciences – JIOS.</p><p>In this issue a selection of 3 original scientific papers, 1 preliminary communication and 1 survey paper has been included, all of which have undergone a rigorous double-blind review process in some cases in several rounds.</p><p>As in prior issues of the Journal, this one also comprises papers that cover broad themes from various ICT fields and related areas: software engineering, strategic planning of information systems, knowledge management and quantum computing. We hope that the variety of themes will draw the attention of researchers in different fields of information sciences and motivate potential authors to expand the Journal’s thematic scope by other themes that may be of interest to the wider ICT research community. These themes motivate us to continue our work of delivering research results to interested audience. The ICT field is changing rapidly and we are constantly searching for cutting edge articles that open perspective and motivate further research. We have to notice that future of ICT related research is in interdisciplinary approach and relations with other research domains which is highly emphasized in Horizon 2020 directions. That is why we encourage and promote scientific collaboration across scientific areas that will bring us new interesting articles. We hope that many of you who will read the Journal will join us as authors, readers and reviewers and help us to fulfill our mission. The number of submitted papers increases every year giving us opportunity to increase the quality and visibility of JIOS.</p><p>I would like to use this opportunity to encourage prospective authors among you, dear readers, to submit papers at http://jios.foi.hr. You are also invited to share with us your comments or critical remarks regarding the papers previously published in the Journal. Further, we would appreciate your willingness to become a reviewer for submitted papers and thus contribute significantly to the rising quality of JIOS.So far JIOS has been indexed in nine well known databases. We are continuously investing a lot of effort to extend the list of databases where JIOS would be cited, in order to make the published papers available to a larger readers’ audience, and give your research a greater impact factor.</p> Neven Vrček ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/837 Wed, 19 Jun 2013 09:53:27 +0200 Cover pages https://jios.foi.hr/index.php/jios/article/view/836 <span>Here you can download journal cover pages.</span> Neven Vrček ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/836 Wed, 19 Jun 2013 09:32:11 +0200 Factors of Knowledge Management and the impact of employee turnover in activity and performance in scientific and technological parks in Slovenia https://jios.foi.hr/index.php/jios/article/view/831 Technology parks provide infrastructure for the creation and developmentof knowledge-based organizations, which are associated with centers oftechnological excellence, mainly universities. This research addresses thequestion of management and skills acquisition in member organizations oftechnology parks in Slovenia. As means and lever for development organizations,we recognize the values and organizational culture, which cannot be achievedwithout employees who possess good knowledge. We associated knowledgemanagement with employee turnover factor. The central purpose of this researchis to focus on exploring the impact of movements in knowledge management on theturnover in organizations, which are members of technology parks. By usingmultivariate regression methods we confirmed that the required skills,knowledge acquisition and knowledge transfer channels, have a statisticallysignificant effect on employee turnover in technology parks. Vasja Roblek, Zlatka Meško Štok, Maja Meško, Ivan Erenda ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/831 Wed, 19 Jun 2013 09:27:03 +0200 Impact of Aspect-Oriented Programming on the Quality of Novices’ Programs: A Comparative Study https://jios.foi.hr/index.php/jios/article/view/801 <p class="Abstract">Aspect-oriented programming has been introduced in order to increase the modularity of object-oriented programs and is claimed to improve software quality. Although there are various researches on this claim, the question to what extent aspect-oriented programming improves the quality of programs depending on a developer’s experience still remains. The purpose of this study is to investigate whether aspect-oriented programming used by novice programmers improves the quality of programs, in terms of software flexibility and readability (consequently reusability and maintainability as well). As a part of an undergraduate course in programming paradigms and languages, a systematic comparison between students’ object-oriented and aspect-oriented solutions of the same problem was driven. In order to drive this comparison we have established the basis for the development of the new quality assessment model consisting of software metrics for an objective evaluation and student survey for subjective evaluation. The results show that the use of aspect-oriented programming lead to novices’ programs that are easier to change and read (flexible and readable) compared to object-oriented programs. What is more, administered survey showed that students perceive their programs as more flexible and readable.</p> Marija Katic, Ivica Boticki, Kresimir Fertalj ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/801 Wed, 19 Jun 2013 09:26:58 +0200 Dynamic Aspects of the Strategic Planning of Information Systems https://jios.foi.hr/index.php/jios/article/view/595 <p>The SPIS methodology provides methods and techniques of developing an information system (IS) that would correspond with the requirements of an organization. The result of its application is the strategic plan of IS development that would meet the future needs. As is the case in the methodology of the strategic planning in general, the primary drawback to the strategic planning of the information system is the lack of efficient control of implementation of the strategic plan, and this is precisely what this research paper deals with. One of the procedures in the measuring of results of an organization, which is also recommended by the SPIS, is the Balanced Scorecard methodology (BSC). However, the BSC concept which the classic SPIS methodology recommends as suitable for the evaluation of performance of the information technology (IT) on the business system and the performance of that new business system, does not take into account the constraint that may lead to non-implementation of the planned activities. Furthermore, the BSC has been criticised for the oversimplified modelling of the cause-consequence relations that do not take into account the time delay and the feedback.<br />This paper provides results of the research that resulted in identification of two types of constraints that need to be included when determining the optimal IS/IT strategy. Within the context of the system dynamics (SD) approach, the broadening of the problem with the analysis of the strategy implementation dynamics results in the new practical knowledge about the control over the time-dependant values and, consequently, with a proposal that would eliminate the reasons for the abovementioned criticism.</p> Marko Hell, Stjepan Vidačić, Josip Brumec ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/595 Wed, 19 Jun 2013 09:26:53 +0200 A New Quantum Game Based on CHSH Game https://jios.foi.hr/index.php/jios/article/view/813 <p class="Abstract">The Quantum game theory is an extension of the classical game theory which describes games in which players share quantum information during the game. The use of the quantum mechanical effects enables players’ better results than they would achieve in the classical game without sharing any information at all. In this paper I would like to describe a new two player cooperative game which is based on the well known CHSH game. A quantum strategy for a new game will be introduced and it will be compared to the classical strategy and CHSH game strategy.</p> Alan Bojić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/813 Wed, 19 Jun 2013 09:26:47 +0200 Creating TTCN-3 Test Suite from CPN Specification https://jios.foi.hr/index.php/jios/article/view/793 Testing of a software product is the key activity before deploying it in the real-time environment. Therefore testing should be introduced into the product development process as early as possible in order to decrease the costs of repairing the damage in later phases. In this paper we use Coloured Petri Nets (CPN) for the system specification and also as a system to be tested instead of its implementation. This specification also serves as the basis for the test suite generation. Test cases are provided in the language of Testing and Test Control Notation version 3 (TTCN-3) due to its general application area and platform independence. Marina Bagic Babac, Dragan Jevtic ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/793 Wed, 19 Jun 2013 09:26:41 +0200 Cover pages https://jios.foi.hr/index.php/jios/article/view/806 Here you can download journal cover pages. Neven Vrček ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/806 Thu, 13 Dec 2012 10:49:30 +0100 From the Editor https://jios.foi.hr/index.php/jios/article/view/805 <p>Dear authors, readers and future authors,</p><p>It is my pleasure to present you the 2nd number of the 36th volume of the Journal of Information andOrganizational Sciences – JIOS.</p><p>In this issue a selection of 3 original scientic papers, 3 preliminary communications and 1 surveypaper has been included, all of which have undergone a rigorous double-blind review process insome cases in several rounds.</p><p>As in prior issues of the Journal, this one also comprises papers that cover themes from various ICTelds and related areas: computer algorithms, ERP systems, business process analysis, and otherrelated themes. We hope that the variety of themes will draw the attention of researchers in di€erentelds of information sciences and motivate potential authors to expand the Journal’s thematic scopeby other themes that may be of interest to the wider ICT research community. These themes motivatesus to continue our work of delivering research results to interested audience. We hope that many ofyou who will read the Journal will join us as authors, readers and reviewers and help us to fulll ourmission. The number of submitted papers increases every year giving us opportunity to increase thequality and visibility of JIOS.</p><p>I would like to use this opportunity to encourage prospective authors among you, dear readers, tosubmit papers at http://jios.foi.hr. You are also invited to share with us your comments or criticalremarks regarding the papers previously published in the Journal. Further, we would appreciate yourwillingness to become a reviewer for submitted papers and thus contribute signicantly to the risingquality of JIOS.</p><p>So far JIOS has been indexed in nine well known databases. We are continuously investing a lot ofe€ort to extend the list of databases where JIOS would be cited, in order to make the publishedpapers available to a larger readers’ audience, and give your research a greater impact factor.</p> Neven Vrček ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/805 Thu, 13 Dec 2012 10:44:10 +0100 Comparison of simple graphical process models https://jios.foi.hr/index.php/jios/article/view/787 <p>Comparing structure of graphical process models can reveal different variations of processes. Since most contemporary norms for process modeling lean on directed connectivity of objects in the model, their connections structure form sequences which can be translated into performing scenarios. While the sequences can be tested for completeness in performing process activities using simulation methods, the similarity or difference of static characteristics of sequences in different model variants is difficult to explore.</p> <p>The goal of the paper is to test the appliance of a method for comparison of graphical models by analyzing and comparing the static characteristics of process models. Therefore a metamodel of process models is developed and a comparison procedure conducted using a graphical model comparison algorithm.</p> Katarina Tomicic-Pupek, Ivan Vidović, Martina Tomičić Furjan ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/787 Thu, 13 Dec 2012 10:22:00 +0100 Croatian banking sector research: relationship between ownership structure, concentration, owners’ type and bank performance https://jios.foi.hr/index.php/jios/article/view/789 Banks are important financial intermediaries of any national economy, and corporate governance has an important role in banking sector; especially due to processes of the globalization and the internationalization, and also because of the sensitivity of the activities between the interest groups. The objective of this paper is to examine the relationship between ownership structure, concentration, owners’ type and bank performance. The authors made a research of banks' ownership structure using publicly available data. Using statistical tools authors discovered relationships between bank ownership structure and bank performance indicators (average asset, total asset, average equity, profit (loss) before taxes, profit (loss) after taxes, ROAA, ROAE). Further they discuss the relationships between ownership structure and a number of consequences for the bank performance. The authors discovered significant correlation between bank ownership structure and performance indicators variables that are described in the paper.<br /> Igor Tomičić, Ana Ćorić, Marina Klačmer Čalopa ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/789 Thu, 13 Dec 2012 10:21:43 +0100 Documents for Visually Impaired Users in the Light of Library and Information Science https://jios.foi.hr/index.php/jios/article/view/245 The article aims to show that the classical document paradigm in information science has the greatest potential to grasp the issues related to the providing information to persons with visual disabilities and it aims to check whether the FRBR study is usable in this area. The article is divided into two parts. In the first part, the paradigmatic turns in information science are briefly presented and there is examined their impact on the issues connected with users with visual disabilities. The second part briefly describes the structure of the bibliographic universe and there is examined how it is possible to create a model of documents for users with visual impairment and of associated processes. The model of the bibliographic universe is applied to the situation of the really existing documents for visually impaired users. Methodologically, the article is based on the information system analysis. There is used an entity-relationship approach to a model of the bibliographic universe. Jiří Tomáš Stodola ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/245 Thu, 13 Dec 2012 10:21:36 +0100 Critical Success Factors Aspects of the Enterprise Resource Planning Implementation https://jios.foi.hr/index.php/jios/article/view/795 <p class="Abstract">Considering a global importance of small and medium sized enterprises (SMEs) they are in the spotlight of ERP implementation retail stores. Many of the relevant studies indicate the importance and diversity of the ERP implementation process.  This paper presents results of the authors' research of the implementation success factors from the point of view of implementation participants. Based on the experience of a number of ERP implementations, authors compare the Croatian and international implementing practice of ERP solutions, taking into account the same critical success and the same ERP solution. Te emphasisis is put specifically on the three key participants in an implementation process: CEOs, project managers and successful-advanced users. Regardless of the relatively limited number of end users who took part in this study, it indicates a significant coincidence of Croatian and international practices in the part of perception of the critical success factors for ERP implementation, but also different views of key participants in the successful implementation.</p> Milorad Nikitović, Vjeran Strahonja ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/795 Thu, 13 Dec 2012 10:21:30 +0100 Differentiating between Student Evaluation of Teacher and Teaching Effectiveness https://jios.foi.hr/index.php/jios/article/view/207 <p>Teachers are considered to be principal actors in the teaching process as well as one of its major constituents when quality and equity are concerned. Over the last decade a lot of papers have been published that deal with the quality of the teaching process and teachers. Most of them focus on students as the main subjects in evaluation of the teaching process and teachers. In this paper we analyze freshmen and senior students’ ability to differentiate between the evaluation of teacher and evaluation of teaching. In a lot of questionnaires used in research into this topic there is no difference in the approach to these two diverse aspects of the educational process quality. Since students are commonly the main target group of such questionnaires, in this paper we present the results of the study aimed at determining which elements, from the students’ perspective, are recognized and associated with teaching, and which ones with teachers.</p> Goran Hajdin, Katarina Pažur ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/207 Thu, 13 Dec 2012 10:20:42 +0100 Planning and Optimization of AGV Jobs by Petri Net and Genetic Algorithm https://jios.foi.hr/index.php/jios/article/view/596 <p class="Abstract">The following article presents the possibilities of job optimization on a maritime container terminal, in order to increase the system productivity and optimize the terminal capacity. Automated guided vehicles (AGVs) are now becoming popular mode of container transport in seaport terminals. The moving of vehicles can be described as the set of discrete events and states. Some of these states can be undesirable such as conflicts and deadlocks. It is necessary to apply adequate control policy to avoid deadlocks and block the vehicles’ moving only in the case of dangerous situation.<br />This paper addresses the use a Petri net as modeling and scheduling tool in this context. The aim of AGV scheduling is to dispatch a set of AGVs to improve the productivity of a system and reduce delay in a batch of pickup/drop-off jobs under certain constraints such as deadlines, priority, etc. The final goals are related to optimization of processing time and minimization of the number of AGVs involved while maintaining the system throughput.<br />To find better solutions, the authors propose the integration MRF1 class of Petri net (MRF1PN) with a genetic algorithm. Also, the use of a matrix based formal method is proposed to analyze discrete event dynamic system (DEDS). The algorithm is described to deal with multi-project, multi-constrained scheduling problem with shared resources. The developed model was tested and validated by simulation of typical scenarios of the container terminal of Port Koper. Modularity and simplicity of the approach allow using the model to monitor and test the efficiency of the processes, and also to propose future alternative solutions to optimize the schedule of operations and the employment of AGV at the terminal.</p> Anita Gudelj, Danko Kezić, Stjepan Vidačić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/596 Thu, 13 Dec 2012 10:20:31 +0100 Quantum Algorithm for Finding a Maximum Clique in an Undirected Graph https://jios.foi.hr/index.php/jios/article/view/624 <p class="Abstract">The maximum clique in an undirected graph is the largest subset of  a set of graph's vertices where each pair of elements in the subset is connected. In this paper I would like to propose an algorithm for quantum computers that finds a maximum clique in an arbitrary undirected graph. An algorithm has O(|V|2<sup>|V|/2</sup>) worst case time complexity and O(2<sup>|V|/2</sup>) best case time complexity. Algorithm's space complexity for each case is O(|V|). An algorithm is based on a version of Grover's  quantum algorithm for finding element in an unsorted list in which there can be an unknown number of solutions.</p> Alan Bojić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/624 Thu, 13 Dec 2012 10:19:47 +0100 From the Editor https://jios.foi.hr/index.php/jios/article/view/786 <p>Dear authors, readers and future authors,</p><p>It is my pleasure to present you the 1st number of the 36th volume of the Journal of Information and Organizational Sciences – JIOS.</p><p>In this issue a selection of 5 original scienti! c papers and 1 survey paper has been included, all of which have undergone a rigorous double-blind review process in some cases in several rounds.</p><p>As in prior issues of the Journal, this one also comprises papers that cover themes from various ICT fields: computer programming, mobile technologies, symbolic logic in the field of informationsciences, business processes, formal concept analysis, data analysis, management and other related themes. We hope that the variety of themes will draw the attention of researchers in di" erent ICT fields and motivate potential authors to expand the Journal’s thematic scope by other themes that may be of interest to the wider ICT research community.</p><p>I would like to use this opportunity to encourage prospective authors among you, dear readers, to submit papers at http://jios.foi.hr. You are also invited to share with us your comments or critical remarks regarding the papers previously published in the Journal. Further, we would appreciate your willingness to become a reviewer for submitted papers and thus contribute signi! cantly to the rising quality of JIOS.<br />So far JIOS has been indexed in nine well known databases. We are continuously investing a lot of effort to extend the list of databases where JIOS would be cited, in order to make the published papers available to a larger readers’ audience, and give your research a greater impact factor.</p> Neven Vrček ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/786 Sat, 30 Jun 2012 17:24:31 +0200 Cover pages https://jios.foi.hr/index.php/jios/article/view/785 <span>Here you can download journal cover pages.</span> Neven Vrček ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/785 Sat, 30 Jun 2012 17:17:58 +0200 Adapting hierarchical clustering distance measures for improved presentation of relationships between transaction elements https://jios.foi.hr/index.php/jios/article/view/210 Common goal of descriptive data mining techniques is presenting new information in concise, easily interpretable and understandable ways. Hierarchical clustering technique for example enables simple visualization of distances between analyzed objects or attributes. However, common distance measures used by existing data mining tools are usually not well suited for analyzing transactional data using this particular technique. Including new types of measures specifically aimed at transactional data can make hierarchical clustering a much more feasible choice for transactional data analysis. This paper presents and analyzes convenient measure types, providing methods of transforming them to represent distances between transaction elements more appropriately. Developed measures are implemented, verified and compared in hierarchical clustering analysis on both artificial data as well as referent transactional datasets. Mihaela Vranić, Damir Pintar, Dragan Gamberger ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/210 Sat, 30 Jun 2012 16:48:38 +0200 Automated motive-based user review analysis in the context of mobile app acceptance: Opportunities and applications https://jios.foi.hr/index.php/jios/article/view/218 The increasing amount and importance of user-generated content that is available in the web necessitates methods of its effective and efficient utilization. In this paper a system is presented that enables automated classification of user reviews concerning the usage motives mentioned in the reviews. Four possible applications of the system are discussed in detail in the course of this paper: a learning environment for mobile app development, a download prognosis mechanism, an app prizing decision support system, and a recommendation system. These applications are evaluated concerning state-of-the-art methods that currently address the challenge as well as advantages of the implementation of a motive-based system in the particular business processes. Elisabeth Pergler ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/218 Sat, 30 Jun 2012 16:48:06 +0200 Utilizing GPGPU in Computer Emulation https://jios.foi.hr/index.php/jios/article/view/225 The article deals with the idea of computer emulation using the GPGPU technology in order to get performance improvements. Basic assumptions for using stream processing in computer emulation effectively are discussed and the structure of an emulator, together with the emulation technique are proposed. The emulator structure, in this case, is of distributed nature, so the communication issues are treated too. As an example demonstrating the viability of the proposal, Random Access Machine (RAM) emulator is given within the paper. Peter Jakubco, Slavomir Simonak ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/225 Sat, 30 Jun 2012 16:46:26 +0200 Classification of Hydro Chemical Data in the Reduced Dimensional Space https://jios.foi.hr/index.php/jios/article/view/400 <p>The main objective of this paper is to systematically analyze the performance of water samples classifications for different data representations. We compare the classification of full data representation to the classification of data items in lower dimensional space obtained by projection of original data on the space of first principal components and further on the space of centroids of classes.  We use linear support vector machines for classification of ground water samples collected from five different localities of Odra River basin and results are evaluated by standard measures including recall, precision and F<sub>1</sub>measure.</p> Jasminka Dobša, Petr Praus, Aswani Kumar Cherukuri, Pavel Praks ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/400 Sat, 30 Jun 2012 16:45:56 +0200 Portable reflection for C++ with the Mirror library https://jios.foi.hr/index.php/jios/article/view/204 Reflection and reflective programming can be used for a wide range of tasks such as implementation<br />of serialization-like operations, remote procedure calls, scripting, automated GUIgeneration,<br />implementation of several software design patterns, etc. C++ as one of the most<br />prevalent programming languages however, for various reasons, lacks a standardized reflection<br />facility. In this paper we present Mirror - a portable library adding reflection to C++ with a<br />command-line utility automating its usage. This library supports functional style static compiletime<br />reflection and metaprogramming and also provides two different object-oriented run-time<br />polymorphic layers for dynamic reflection. Matus Chochlik ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/204 Sat, 30 Jun 2012 16:45:15 +0200 Use of Concept Lattices for Data Tables with Different Types of Attributes https://jios.foi.hr/index.php/jios/article/view/228 In this paper we describe the application of Formal Concept Analysis (FCA) for analysis of data tables with different types of attributes. FCA represents one of the conceptual data mining methods. The main limitation of FCA in classical case is the exclusive usage of binary attributes. More complex attributes then should be converted into binary tables. In our approach, called Generalized One-Sided Concept Lattices, we provide a method which deal with different types of attributes (e.g., ordinal, nominal, etc.) within one data table. Therefore, this method allows to create same FCA-based output in form of concept lattice with the precise many-valued attributes and the same interpretation of concept hierarchy as in the classical FCA, without the need for specific unified preprocessing of attribute values. Peter Butka, Jozef Pocs, Jana Pocsova ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/228 Sat, 30 Jun 2012 16:44:44 +0200 COVER PAGES https://jios.foi.hr/index.php/jios/article/view/264 Here you can download cover pages. Željko Hutinski, Mirko Maleković ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/264 Tue, 17 Apr 2012 11:45:07 +0200 From the Editor https://jios.foi.hr/index.php/jios/article/view/244 This issue of the journal JIOS, “Journal of Information and OrganizationalSciences” presents a selection of the papers presented at the 15th InternationalConference on Information and Intelligent Systems held in Varaždin, September2004. The papers were selected after thorough review of at least two internationalreferees. The papers are arranged in alphabetic order, according the surname of thefirst author as referential. Željko Hutinski, Mirko Maleković ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/244 Fri, 16 Mar 2012 09:38:49 +0100 ACTIVE DATABASES, BUSINESS RULES AND REACTIVE AGENTS – WHAT IS THE CONNECTION? https://jios.foi.hr/index.php/jios/article/view/243 These three technologies were and still are mainly treated separately. Since notmuch work has been carried out in defining and combining them together, we are going topresent what has been done and put accent on what could be done. Namely, they rely uponsimilar paradigms and concepts, as will be shown later on, and can be treated ascomplementary technologies. In this paper we will show that reactive agents reactaccording to some set of business rules and active databases can be used as a suitablemeans for implementing business rules and in those way reactive agents as well. Sincereactive agents have been well defined, recent improvements in the fields of activedatabases technology and especially business rules provide the reason to consider thebenefits to be achieved from combining these fields. Kornelije Rabuzin, Mirko Maleković, Miroslav Bača ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/243 Fri, 16 Mar 2012 09:29:16 +0100 DATA ANALYSIS FOR AGENT BASED MOBILE SERVICES https://jios.foi.hr/index.php/jios/article/view/242 One of the high interesting areas in the distributed systems is the problem ofbuilding and running pervasive computing services for mobile users. The central point forbuilding such a services is to appropriately model the physical and data environment. In thispaper we concentrate on the data part of such an environment that would enable creating ageneral scheme for a category of flexible services for mobile users. We define the basicprofile of the users and methods, how the services should deal with the profiles. Formodeling the presence of the user in the data environment (even if he/she is off-line) theagent-based solution was chosen, so the distributed system is build as a multi-agent system. Marek Paralič, Ján Paralič ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/242 Fri, 16 Mar 2012 07:46:01 +0100 GENERIC APPROACH IN CHOICE OF ADEQUATE METHODOLOGY FOR THE ASSESSMENT OF IT INVESTMENTS https://jios.foi.hr/index.php/jios/article/view/241 Investments into information technology (IT), (hereinafter: IT investments) havereached very high figures, which are still continually on the rise. IT potentials are being usedin an increasing number of ways. Various company managers have different approaches tothis issue. A large number of methods/models for the assessment of IT investments isavailable, so the question is posed of how to choose the adequate assessment category. Thesaid reasons have initiated a need for defining the generic approach in the choice ofadequate methodology for the assessment of IT investments, which was indeed the goal ofthis paper. General ideas to this approach stem from the fact that each IT investment has itspurpose and belongs to a certain type of IT investment (decision-making aspect) whichdemands its relevant methodology for assessing IT investments. Two groups of demands(conditions) have been defined in choosing relevant methodology. The first group pertains tomethodology analysis and determination of its compatibility with characteristics of thedefined decision-making aspect. The second group of conditions pertains to methodologyanalysis with respect to its possibilities (abilities) of integrating quantity, quality and riskfactors of IT decision. Conducted field research shows that the assessment of IT investmentshas been done mainly using simpler methods/models and their combinations, and is focusedon quantity aspects of IT values. Melita Kozina ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/241 Fri, 16 Mar 2012 07:39:57 +0100 A TRANSACTION COST ANALYSIS OF MICROPAYMENTS IN MOBILE COMMERCE https://jios.foi.hr/index.php/jios/article/view/240 Personalised, location-related and differentiated services in the mobile digitaleconomy create a demand for suitable pricing models. In the case of disaggregated“microservices” (e.g., small digitalized information or service units), as well as for theacquisition of low-value physical goods, the deployment of micropayments seemsappropriate.This paper analyzes the economic efficiency of marginal transaction amounts in the mcommercearea by applying the theoretical approach of transaction cost economics. Forthis purpose, a separation of technical and cognitive transaction costs is applied. Theinfluence of selected determinants such as specifity, uncertainty and bounded rationality ontransaction costs in mobile commerce micropayments is analyzed. The result is a morelikely application of micropayments for physical goods such as beverages or parking ticketsthan for digital goods and services, given the theoretical assumptions of the model. Inaddition, indicators for a significant above-zero lower limit of transaction amounts inmobile commerce are presented. Daniel Gille ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/240 Fri, 16 Mar 2012 07:38:21 +0100 THE RICH WORLD OF COMPUTER MODELLING AND PROBLEM SOLVING https://jios.foi.hr/index.php/jios/article/view/239 This paper presents some interesting aspects of the rich world of computermodelling and problem solving. After discussing basic model building principles attentionis devoted to several modelling methods aimed for solving different types of problems.These are methods for modelling of optimisation problems, dynamic systems with randomcharacteristics, knowledge, uncertain phenomena, systems with graph structure, learning,as well as cooperation and competition. Basic characteristics of these methods andexamples of their application are given. Vlatko Čerić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/239 Fri, 16 Mar 2012 07:35:57 +0100 MODELING AND SOLVING SELF-REFERENTIAL PUZZLES https://jios.foi.hr/index.php/jios/article/view/238 The so-called self-referential puzzles are a very interesting kind of logic puzzles,aiming at developing the skill of logical thinking. A self-referential puzzle consists of asequence of questions about the puzzle itself. In this paper, we shall show some selfreferentialpuzzles, demonstrate how to model and solve them as propositional logicproblems, and how to mechanically generate new puzzles. For this, we shall make use ofthe specific advantages of Mozart/Oz system – the finite domain constraint programminglanguage and environment.We shall also show some new puzzles, according to our best knowledge not yet publishedelsewhere. The program in Mozart/Oz using our method generated these puzzles. Maja Bubalo, Mirko Čubrilo ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/238 Fri, 16 Mar 2012 07:33:17 +0100 From the Editor https://jios.foi.hr/index.php/jios/article/view/237 All the papers in this issue of the JIOS Journal may fit into the Science as Usual categoryand are therefore not going to be dealt with in detail in the introduction. However, for oneof the papers included an exception has been provided, namely the paper Sigma-notationand the equivalence of P and NP classes by Miron Ivanovich Telpiz. The circumstancesleading to its publication in this issue of JIOS are presented by the editors in this preface.It is generally acknowledged that, ever since it was defined by S. Cook over thirty yearsago, P = NP has presented one of the major open problems in computing science andinformation science in general. Whereas, on one hand, this problem presents a formidablechallenge to any scientist dealing with it, its solution, especially in case it should turn out tobe a positive one considering that current technology tends to evolve in a practicaldirection and its overall functioning is conducted implicitly under the assumption of anegative solution would have a major impact on the development of informationtechnology as well as the wider context of human society as a whole. Apart from being putforward in conferences, both positive and negative “solutions” to P = NP problem can beoccasionally found in press, scientific and professional journals. The web page titled “Pversus-NP Page” (see http://www.win.tue.nl/~gwoegi/P-versus-NP.htm) provides anexcellent source for this issue. It contains links to papers stating that P = NP, as well asthose contradicting the opposite, i.e., stating that P NP. Furthermore, references are givento Oded Goldreich's rationale behind his decision not to review papers proposing solutionsto P = NP problem and related difficult problems because, in his own words, they “alsoattract the attention of non-experts, and one annoying consequence is a flood of falseclaims of resolutions of these problems” (see http://www.wisdom.weizmann.ac.il/~oded/faq.html). Dr. Goldreich a recognised figure amongmathematicians of our time – recommends other scientists to follow his example when thisissue is concerned. Nevertheless, his arguments (at least those regarding non-experts) aredefinitely not to be acknowledged in the case of the work of the Russian mathematician andlogician Miron Ivanovich Telpiz, (see http://www.tarusa.ru/~mit/ENG/eng.php for details),who has been developing his positionality theory for functions, with a special emphasis onBoolean functions, for over two decades. While doing so, he has been drawing its(primarily conceptual) analogy to positionality theory for number systems. Building on hisextensive theory, which is combinatory very complex one indeed, Dr. Telpiz states theproof of P = NP. The underlying theory itself was proposed in the first volume of his bookPositionality principle for notation and calculation the functions, originally published inRussian by the Institute of Space Researches of the Russian Academy of Science. It was dueto this book that contacts between a member of the Editorial Board and Dr. Telpiz, as wellas Dr. Andrej Fomin, his assistant and associate, were established. During those contactsthe idea evolved of Dr. Tepiz delivering an invited lecture at the IIS2004 Conference.Annual IIS Conferences have been organized by the Faculty of Organization andInformatics for years. A lecture on proving the statement P = NP was arranged.Unfortunately, Dr. Telpiz was eventually not capable of giving the lecture. Nevertheless, heproposed for his lecture to be published in form of an article in the JIOS Journal. Uponreceiving the Russian version of his article named Sigma-notation and the equivalence of Pand NP classes, the Editorial Board had it translated into English and proceeded to havingit reviewed. The paper was sent to several renowned world experts in the field of Booleanfunctions, mathematical logic and algorithm theory for review. Yet, no response wasreceived from reviewers contacted although the Editorial Board and Dr. Telpiz made effortsfor access to all relevant papers, as well as the book itself, to be possible. Bearing in mindnot only the great relevance of P = NP problem but also the constant need for scientificideas and findings to be disseminated, the JIOS Editorial Board has decided to have Dr.Telpiz's paper published although it had not been officially reviewed, which the authorhimself has consented to in writing. Owing to its inclusion in this issue, the paper is beingpresented to a wider scientific and professional audience who are thus given an opportunityto both consider and assess it from their own perspective.Editors Željko Hutinski, Mirko Malkoević ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/237 Thu, 15 Mar 2012 13:05:31 +0100 SELECTING NEURAL NETWORK ARCHITECTURE FOR INVESTMENT PROFITABILITY PREDICTIONS https://jios.foi.hr/index.php/jios/article/view/236 After production and operations, finance and investments are one of the mostfrequent areas of neural network applications in business. The lack of standardizedparadigms that can determine the efficiency of certain NN architectures in a particularproblem domain is still present. The selection of NN architecture needs to take intoconsideration the type of the problem, the nature of the data in the model, as well as somestrategies based on result comparison. The paper describes previous research in that areaand suggests a forward strategy for selecting best NN algorithm and structure. Since thestrategy includes both parameter-based and variable-based testings, it can be used forselecting NN architectures as well as for extracting models. The backpropagation, radialbasis,modular, LVQ and probabilistic neural network algorithms were used on twoindependent sets: stock market and credit scoring data. The results show that neuralnetworks give better accuracy comparing to multiple regression and logistic regressionmodels. Since it is model-independant, the strategy can be used by researchers andprofessionals in other areas of application. Marijana Zekić-Sušac, Nataša Šarlija, Mirta Benšić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/236 Thu, 15 Mar 2012 12:55:41 +0100 ESSENTIAL CHARACTERISTICS OF AN ERP SYSTEM : CONCEPTUALIZATION AND OPERATIONALIZATION https://jios.foi.hr/index.php/jios/article/view/235 The interest of firms in ERP systems has been echoed in both the scientific andprofessional literature. It is worth noting however that while this literature has becomeincreasingly abundant, there does not yet exist an operational definition of the ERP conceptthat is, if not unanimously, at least widely accepted. This constitutes a handicap for boththe research and practice communities. The present study outlines what could beconsidered as an ERP by first determining the essentially required characteristics of such asystem: integration, flexibility and transversality. Indicators are then provided in order tooperationalise these three characteristics. The study concludes by proposing a researchframework on the impact of an ERP’s key characteristics upon the performance of thesystem in a given organisational setting. Sylvestre Uwizeyemungu, Louis Raymond ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/235 Thu, 15 Mar 2012 12:50:10 +0100 INDEPENDENT DE-DUPLICATION IN DATA CLEANING https://jios.foi.hr/index.php/jios/article/view/234 Many organizations collect large amounts of data to support their business anddecision-making processes. The data originate from a variety of sources that may haveinherent data-quality problems. These problems become more pronounced whenheterogeneous data sources are integrated (for example, in data warehouses). A majorproblem that arises from integrating different databases is the existence of duplicates. Thechallenge of de-duplication is identifying “equivalent” records within the database. Mostpublished research in de-duplication propose techniques that rely heavily on domainknowledge. A few others propose solutions that are partially domain-independent. Thispaper identifies two levels of domain-independence in de-duplication namely: domainindependenceat the attribute level, and domain-independence at the record level. Thepaper then proposes a positional algorithm that achieves domain-independent deduplicationat the attribute level, and a technique for field weighting by data profiling,which, when used with the positional algorithm, achieves domain-independence at therecord level. Experiments show that the proposed techniques achieve more accurate deduplicationthan the existing algorithms. Ajumobi Udechukwu, Christie Ezeife, Ken Barker ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/234 Thu, 15 Mar 2012 12:45:49 +0100 WEB LOG EXPLORER – CONTROL OF MULTIDIMENSIONAL DYNAMICS OF WEB PAGES https://jios.foi.hr/index.php/jios/article/view/233 Demand markets dictate and pose increasingly more requirements to the supplymarket that are not easily satisfied. The supply market presenting its web pages to thedemand market should find the best and quickest ways to respond promptly to the changesdictated by the demand market. The question is how to do that in the most efficient andquickest way. The data on the usage of web pages on a specific web site are recorded in alog file. The data in a log file are stochastic and unordered and require systematicmonitoring, categorization, analyses, and weighing. From the data processed in this way, itis necessary to single out and sort the data by their importance that would be a basis for acontinuous generation of dynamics/changes to the web site pages in line with the criterionchosen. To perform those tasks successfully, a new software solution is required. For thatpurpose, the authors have developed the first version of the WLE (WebLogExplorer)software solution, which is actually realization of web page multidimensionality and theweb site as a whole. The WebLogExplorer enables statistical and semantic analysis of a logfile and on the basis thereof, multidimensional control of the web page dynamics. Theexperimental part of the work was done within the web site of HTZ (Croatian NationalTourist Board) being the main portal of the global tourist supply in the Republic of Croatia(on average, daily "log" consists of c. 600,000 sets, average size of log file is 127 Mb, andc. 7000-8000 daily visitors on the web site). Mislav Šimunić, Željko Hutinski, Mirko Čubrilo ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/233 Thu, 15 Mar 2012 12:39:31 +0100 LOG FILE ANALYSIS AND CREATION OF MORE INTELLIGENT WEB SITES https://jios.foi.hr/index.php/jios/article/view/232 To enable successful performance of any company or business system, both inthe world and in the Republic of Croatia, among many problems relating to its operationsand particularly to maximum utilization and efficiency of the Internet as a media forrunning business (especially in terms of marketing), they should make the best possible useof the present-day global trends and advantages of sophisticated technologies andapproaches to running a business. Bearing in mind the fact of daily increasing competitionand more demanding market, this paper addresses certain scientific and practicalcontribution to continuous analysis of demand market and adaptation thereto by analyzingthe log files and by retroactive effect on the web site. A log file is a carrier of numerousdata and indicators that should be used in the best possible way to improve the entirebusiness operations of a company. However, this is not always simple and easy. The websites differ in size, purpose, and technology used for designing them. For this very reason,the analytic analysis frameworks should be such that can cover any web site and at thesame time leave some space for analyzing and investigating the specific characteristicof each web site and provide for its dynamics by analyzing the log file records. Thoseconsiderations were a basis for this paper Mislav Šimunić, Željko Hutinski, Mirko Čubrilo ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/232 Thu, 15 Mar 2012 12:20:08 +0100 A UML PROFILES FOR VIEWPOINT-ORIENTED MODELING https://jios.foi.hr/index.php/jios/article/view/231 The viewpoint-oriented modeling consists in providing an unique modelaccessible by users with various access rights according to their needs. The system isrepresented as sub-systems (called sub-models). This cutting makes the design of systemeasier by an autonomous design of its sub-systems.UML is a standard modeling language and supports extension mechanism to allowtailoring UML to fit the needs of a specific domain. UML Profile is a predefined set ofextension mechanisms. UML profile allows the stakeholders of a certain domain to expressthe semantics of their systems using a well-defined set of extensions. In this paper wepropose an initial discussion on UML profile for viewpoint oriented modeling, whichextends the standard UML by incorporating new concepts like views, viewpoints, flexible,visibility relationships, etc. Abdellatif Hair ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/231 Thu, 15 Mar 2012 12:12:39 +0100 SIGMA-NOTATION AND THE EQUIVALENCE OF P AND NP CLASSES https://jios.foi.hr/index.php/jios/article/view/230 The aim of this paper is to show that –notation, based on the positionalityprinciple, doesn’t just answer the question of equivalence of P and NP problemclasses, but also represents the key to the solution of (some) more general problemsfrom the domain of multivalued logics. However, the achievement of such an aim inits full scope is hardly possible within the limits of this paper. Therefore, the followingplan shall be realized:Firstly, the logic algebra fragment necessary for the solution of the P and NPclasses equivalence problem shall be expounded.Secondly, the necessary symbols and definitions shall be introduced to show thatthe calculations in the domain of the multivalued logic can be directly executed withinthe framework of –notation. Miron I.Telpiz ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/230 Thu, 15 Mar 2012 12:07:09 +0100 Cover pages https://jios.foi.hr/index.php/jios/article/view/221 Here you can download journal cover pages. Neven Vrcek ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/221 Wed, 14 Dec 2011 13:57:08 +0100 From the Editor https://jios.foi.hr/index.php/jios/article/view/220 <p>Dear authors, readers and future authors,<br />It is my pleasure to present you the 2nd number of the 35th volume of the Journal of Information andOrganizational Sciences – JIOS.</p><p>In this issue a selection of 3 original scientific papers and 1 survey paper have been included, all of which have undergone a rigorous double-blind review process. Some of the papers published here were already presented at the CECIIS 2011 Conference held in Varaždin between 21st and 23rdSeptember 2011. These papers were nominated for publishing in JIOS by the chairs of the conference tracks they were presented at on the account of their research quality.</p><p>As in prior issues of the Journal, this one also comprises papers that cover themes from various ICT fields: computer programming, symbolic logic in the field of information sciences, business processes, management and other related themes. We hope that the variety of themes will draw the attentionof researchers in different ICT fields and motivate potential authors to expand the Journal’s thematic scope by other themes that may be of interest to the wider ICT research community.</p><p>I would like to use this opportunity to encourage prospective authors among you, dear readers, to submit papers at jios.foi.hr. You are also invited to share with us your comments or critical remarks regarding the papers previously published in the Journal. Further, we would appreciate yourwillingness to become a peer-reviewed for submitted papers and thus contribute significantly to the rising quality of JIOS.</p><p>So far JIOS has been indexed in eight well known databases and now this number has risen to nine, adding “Library, Information Science &amp; Technology Abstracts” to the database list. We are continuously investing a lot of effort to extend the list of databases where JIOS would be cited, in order to makethe published papers available to a larger readers’ audience, and give your research a greater impact factor.</p> Neven Vrcek ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/220 Wed, 14 Dec 2011 13:52:29 +0100 The Modeling and Complexity of Dynamical Systems by Means of Computation and Information Theories https://jios.foi.hr/index.php/jios/article/view/213 We present the modeling of dynamical systems and finding of their complexity indicators by the use of concepts from computation and information theories, within the framework of J. P. Crutchfield's theory of  ε-machines. A short formal outline of the  ε-machines is given. In this approach, dynamical systems are analyzed directly from the time series that is received from a properly adjusted measuring instrument. The binary strings are parsed through the parse tree, within which morphologically and probabilistically unique subtrees or morphs are recognized as system states. The outline and precise interrelation of the information-theoretic entropies and complexities emanating from the model is given. The paper serves also as a theoretical foundation for the future presentation of the DSA program that implements the  ε-machines modeling up to the stochastic finite automata level. Robert Logozar, Alen Lovrencic ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/213 Wed, 14 Dec 2011 12:52:32 +0100 The rôle of linear logic in coalgebraical approach of computing https://jios.foi.hr/index.php/jios/article/view/208 Linear logic provides a logical perspective on computational issues such as control of resources and order of evaluation. The most important feature of linear logic is that formulae are<br />considered as actions. While classical logic treats the sentences that are always true or false, in linear logic it depends on an internal state of a dynamic system. Curry-Howard correspondence is a correspondence between logic and computing in informatics. In this contribution we present two ways of computations which correctness we prove by Curry-Howard correspondence. We show a standard way and a new way of computing based on hylomorphism by using coalgebras which is an alternative method. Our method of recursive and corecursive computations we apply in simple authentication system. Viliam Slodičák, Pavol Macko ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/208 Wed, 14 Dec 2011 12:52:27 +0100 Transition between process models (BPMN) and service models (WS-BPEL and other standards): A systematic review https://jios.foi.hr/index.php/jios/article/view/206 BPMN and BPEL have become de facto standards for modeling of business processes and imple-mentation of business processes via Web services. There is a quintessential problem of discrep-ancy between these two approaches as they are applied in different phases of lifecycle and theirfundamental concepts are different — BPMN is a graph based language while BPEL is basicallya block-based programming language. This paper shows basic concepts and gives an overviewof research and ideas which emerged during last two years, presents state of the art and possiblefuture research directions. Systematic literature review was performed and critical review wasgiven regarding the potential of the given solutions. Marko Jurišić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/206 Wed, 14 Dec 2011 12:52:22 +0100 Analysis of Top 500 Central and East European Companies Net Income Using Benford's Law https://jios.foi.hr/index.php/jios/article/view/205 <p>There are numerous useful methods that can be conducted in data analysis in order to check data correctness and authenticity. One of contemporary and efficient methods is application of so-called Benford's Law. In this paper we examine ways of application of this law in investigation of specific net income number set. Our aim is to make a conclusion if this number set conforms to Benford's Law. An examination target focus is set on values of top 500 central and east European companies according to their income. Data set contains 1,500 records and spans through 3 years (2007, 2008 and 2009) including 500 net incomes per year. Research is based on net income profit and loss subsets as well as absolute values of net income. Analysis covers first digit Benford's Law test and proves conformance to Benford's Law of all observed subsets.</p> Mario Žgela, Jasminka Dobša ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/205 Wed, 14 Dec 2011 12:52:00 +0100 Cover pages https://jios.foi.hr/index.php/jios/article/view/202 Here you can download journal cover pages. Neven Vrček ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/202 Mon, 27 Jun 2011 10:13:54 +0200 The position of teaching materials on the monitor and its effect on the e-learning success https://jios.foi.hr/index.php/jios/article/view/169 <!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:HyphenationZone>21</w:HyphenationZone> <w:PunctuationKerning /> <w:ValidateAgainstSchemas /> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:Compatibility> <w:BreakWrappedTables /> <w:SnapToGridInCell /> <w:WrapTextWithPunct /> <w:UseAsianBreakRules /> <w:DontGrowAutofit /> </w:Compatibility> <w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" LatentStyleCount="156"> </w:LatentStyles> </xml><![endif]--> <!--[endif]--> <p class="MsoBodyText" style="margin: 0cm 17.85pt 0.0001pt;"><!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:HyphenationZone>21</w:HyphenationZone> <w:PunctuationKerning /> <w:ValidateAgainstSchemas /> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:Compatibility> <w:BreakWrappedTables /> <w:SnapToGridInCell /> <w:WrapTextWithPunct /> <w:UseAsianBreakRules /> <w:DontGrowAutofit /> </w:Compatibility> <w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" LatentStyleCount="156"> </w:LatentStyles> </xml><![endif]--><!--[if gte mso 10]> <mce:style><! /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Obična tablica"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} --> <!--[endif] --></p><p class="MsoBodyText" style="margin: 0cm 17.85pt 0.0001pt;"><span style="font-size: 10pt;" lang="EN-GB">There are various elements in designing e-teaching materials that could have an impact in raising the efficiency of e-learning. This paper is based on the experiments aiming to investigate whether there are certain positions on the monitor in which students are able to better perceive and/or remember e-teaching materials. Our research was carried out at the Juraj Dobrila University of Pula. Participants were first year students attending the teacher education programme (aged 19.5 – 20.5). The research design included two pre-experimental groups and one experimental group. The monitor was virtually divided into 24 zones. Students read the teaching material displayed on the screen; in each reading four texts in different positions were used. The relative ease/difficulty of remembering the text was taken into account by introducing different ponders to each text. Regarding the memory efficiency, our results show statistically significant differences between certain screen positions (these differences ranged from +29.6% to -42.6% from the average result). </span></p> <p class="MsoBodyText" style="margin: 0cm 17.85pt 0.0001pt;"><strong><span style="font-size: 10pt;" lang="EN-GB">Keywords: </span></strong><span style="font-size: 10pt;" lang="EN-GB">efficient e-learning, text position on the screen </span></p> Janko Žufić, Maja Ružić Baf, Predrag Zarevski ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/169 Mon, 27 Jun 2011 09:53:38 +0200 Comparison of Cloud backup performance and costs in Oracle database https://jios.foi.hr/index.php/jios/article/view/186 <!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:TrackMoves /> <w:TrackFormatting /> <w:HyphenationZone>21</w:HyphenationZone> <w:PunctuationKerning /> <w:ValidateAgainstSchemas /> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:DoNotPromoteQF /> <w:LidThemeOther>SL</w:LidThemeOther> <w:LidThemeAsian>X-NONE</w:LidThemeAsian> <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript> <w:Compatibility> <w:BreakWrappedTables /> <w:SnapToGridInCell /> <w:WrapTextWithPunct /> <w:UseAsianBreakRules /> <w:DontGrowAutofit /> <w:SplitPgBreakAndParaMark /> <w:EnableOpenTypeKerning /> <w:DontFlipMirrorIndents /> <w:OverrideTableStyleHps /> </w:Compatibility> <m:mathPr> <m:mathFont m:val="Cambria Math" /> <m:brkBin m:val="before" /> <m:brkBinSub m:val="&#45;-" /> <m:smallFrac m:val="off" /> <m:dispDef /> <m:lMargin m:val="0" /> <m:rMargin m:val="0" /> <m:defJc m:val="centerGroup" /> <m:wrapIndent m:val="1440" /> <m:intLim m:val="subSup" /> <m:naryLim m:val="undOvr" /> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true" DefSemiHidden="true" DefQFormat="false" DefPriority="99" LatentStyleCount="267"> <w:LsdException Locked="false" Priority="0" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Normal" /> <w:LsdException Locked="false" Priority="9" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="heading 1" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9" /> <w:LsdException Locked="false" Priority="39" Name="toc 1" /> <w:LsdException Locked="false" Priority="39" Name="toc 2" /> <w:LsdException Locked="false" Priority="39" Name="toc 3" /> <w:LsdException Locked="false" Priority="39" Name="toc 4" /> <w:LsdException Locked="false" Priority="39" Name="toc 5" /> <w:LsdException Locked="false" Priority="39" Name="toc 6" /> <w:LsdException Locked="false" Priority="39" Name="toc 7" /> <w:LsdException Locked="false" Priority="39" Name="toc 8" /> <w:LsdException Locked="false" Priority="39" Name="toc 9" /> <w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption" /> <w:LsdException Locked="false" Priority="10" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Title" /> <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font" /> <w:LsdException Locked="false" Priority="11" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtitle" /> <w:LsdException Locked="false" Priority="22" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Strong" /> <w:LsdException Locked="false" Priority="20" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Emphasis" /> <w:LsdException Locked="false" Priority="59" SemiHidden="false" UnhideWhenUsed="false" Name="Table Grid" /> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text" /> <w:LsdException Locked="false" Priority="1" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="No Spacing" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 1" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 1" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 1" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 1" /> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision" /> <w:LsdException Locked="false" Priority="34" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="List Paragraph" /> <w:LsdException Locked="false" Priority="29" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Quote" /> <w:LsdException Locked="false" Priority="30" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Quote" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 1" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 1" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 1" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 1" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 1" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 2" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 2" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 2" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 2" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 2" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 2" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 2" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 2" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 2" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 3" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 3" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 3" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 3" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 3" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 3" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 3" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 3" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 3" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 4" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 4" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 4" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 4" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 4" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 4" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 4" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 4" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 4" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 5" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 5" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 5" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 5" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 5" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 5" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 5" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 5" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 5" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 6" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 6" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 6" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 6" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 6" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 6" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 6" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 6" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 6" /> <w:LsdException Locked="false" Priority="19" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis" /> <w:LsdException Locked="false" Priority="21" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis" /> <w:LsdException Locked="false" Priority="31" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference" /> <w:LsdException Locked="false" Priority="32" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Reference" /> <w:LsdException Locked="false" Priority="33" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Book Title" /> <w:LsdException Locked="false" Priority="37" Name="Bibliography" /> <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading" /> </w:LatentStyles> </xml><![endif]--><!--[if gte mso 10]> <mce:style><! /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman","serif";} --> <!--[endif] --><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;,&quot;serif&quot;;" lang="EN-US">Current practice of backing up data is based on using backup tapes and remote locations for storing data. Nowadays, with the advent of cloud computing a new concept of database backup emerges. The paper presents the possibility of making backup copies of data in the cloud. We are mainly focused on performance and economic issues of making backups in the cloud in comparison to traditional backups. We tested the performance and overall costs of making backup copies of data in Oracle database using Amazon S3 and EC2 cloud services. The costs estimation was performed on the basis of the prices published on Amazon S3 and Amazon EC2 sites.</span> Aljaž Zrnec, Dejan Lavbič ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/186 Mon, 27 Jun 2011 09:53:16 +0200 Service-oriented architectural framework for support and automation of collaboration tasks https://jios.foi.hr/index.php/jios/article/view/195 <p class="Abstract">Due to more and more demanding requirements for business flexibility and agility, automation of end-to-end industrial processes has become an important topic. Systems supporting business process execution need to enable automated tasks execution as well as integrate human performed tasks (human tasks) into a business process. In this paper, we focus on collaboration tasks, which are an important type of composite human tasks. We propose a service-oriented architectural framework describing a service responsible for human task execution (Human task service), which not only implements collaboration tasks but also improves their execution by automated and semi-automated decision making and collaboration based on ontologies and agent technology. The approach is very generic and can be used for any type of business processes. A case study was performed for a human task intensive business process from an electric power transmission domain.</p> Ana Sasa, Marjan Krisper ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/195 Mon, 27 Jun 2011 09:52:54 +0200 Ontology-based knowledge management in service-oriented systems https://jios.foi.hr/index.php/jios/article/view/197 <p class="Abstract">This paper proposes an innovative framework for knowledge management in service-oriented systems. An important novelty of our framework is that it allows for automatic instance level evolution of the knowledge base and that it integrates conceptual level knowledge base evolution with the overall service-oriented system framework. In the paper, we identify several opportunities that have arisen in the field of knowledge management with the wider acceptance of SOA and its technology stack, and we present a framework that addresses these opportunities. We focus on ontology-based knowledge management systems, which have become one of the most important technologies for implementation of knowledge management systems. The framework reduces the required input for knowledge management by knowledge engineers, increases information completeness in the knowledge base and provides a simple way for storing more up-to-date information in the knowledge base.</p> Ana Sasa, Marjan Krisper ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/197 Mon, 27 Jun 2011 09:52:31 +0200 Some useful structures for categorical approach for program behavior https://jios.foi.hr/index.php/jios/article/view/187 Using of category theory in computer science has extremely grown in the last decade. Categories allow us to express mathematical structures in unified way. Algebras are used for constructing basic structures used in computer programs. A program can be considered as an element of the initial algebra arising from the used programming language. In our contribution we formulate two ways of expressing algebras in categories. We also construct the codomain functor from the arrow category of algebras into the base category of sets which objects are also the carrier-sets of the algebras. This functor expresses the relation between algebras and carrier-sets. Viliam Slodičák ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/187 Mon, 27 Jun 2011 09:52:12 +0200 Source Code Generator Based on Dynamic Frames https://jios.foi.hr/index.php/jios/article/view/184 <!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:TrackMoves /> <w:TrackFormatting /> <w:HyphenationZone>21</w:HyphenationZone> <w:PunctuationKerning /> <w:ValidateAgainstSchemas /> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:DoNotPromoteQF /> <w:LidThemeOther>HR</w:LidThemeOther> <w:LidThemeAsian>X-NONE</w:LidThemeAsian> <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript> <w:Compatibility> <w:BreakWrappedTables /> <w:SnapToGridInCell /> <w:WrapTextWithPunct /> <w:UseAsianBreakRules /> <w:DontGrowAutofit /> <w:SplitPgBreakAndParaMark /> <w:DontVertAlignCellWithSp /> <w:DontBreakConstrainedForcedTables /> <w:DontVertAlignInTxbx /> <w:Word11KerningPairs /> <w:CachedColBalance /> </w:Compatibility> <w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel> <m:mathPr> <m:mathFont m:val="Cambria Math" /> <m:brkBin m:val="before" /> <m:brkBinSub m:val="&#45;-" /> <m:smallFrac m:val="off" /> <m:dispDef /> <m:lMargin m:val="0" /> <m:rMargin m:val="0" /> <m:defJc m:val="centerGroup" /> <m:wrapIndent m:val="1440" /> <m:intLim m:val="subSup" /> <m:naryLim m:val="undOvr" /> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true" DefSemiHidden="true" DefQFormat="false" DefPriority="99" LatentStyleCount="267"> <w:LsdException Locked="false" Priority="0" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Normal" /> <w:LsdException Locked="false" Priority="9" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="heading 1" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9" /> <w:LsdException Locked="false" Priority="39" Name="toc 1" /> <w:LsdException Locked="false" Priority="39" Name="toc 2" /> <w:LsdException Locked="false" Priority="39" Name="toc 3" /> <w:LsdException Locked="false" Priority="39" Name="toc 4" /> <w:LsdException Locked="false" Priority="39" Name="toc 5" /> <w:LsdException Locked="false" Priority="39" Name="toc 6" /> <w:LsdException Locked="false" Priority="39" Name="toc 7" /> <w:LsdException Locked="false" Priority="39" Name="toc 8" /> <w:LsdException Locked="false" Priority="39" Name="toc 9" /> <w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption" /> <w:LsdException Locked="false" Priority="10" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Title" /> <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font" /> <w:LsdException Locked="false" Priority="11" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtitle" /> <w:LsdException Locked="false" Priority="22" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Strong" /> <w:LsdException Locked="false" Priority="20" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Emphasis" /> <w:LsdException Locked="false" Priority="59" SemiHidden="false" UnhideWhenUsed="false" Name="Table Grid" /> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text" /> <w:LsdException Locked="false" Priority="1" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="No Spacing" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 1" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 1" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 1" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 1" /> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision" /> <w:LsdException Locked="false" Priority="34" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="List Paragraph" /> <w:LsdException Locked="false" Priority="29" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Quote" /> <w:LsdException Locked="false" Priority="30" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Quote" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 1" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 1" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 1" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 1" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 1" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 2" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 2" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 2" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 2" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 2" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 2" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 2" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 2" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 2" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 3" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 3" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 3" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 3" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 3" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 3" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 3" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 3" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 3" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 4" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 4" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 4" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 4" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 4" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 4" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 4" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 4" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 4" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 5" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 5" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 5" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 5" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 5" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 5" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 5" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 5" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 5" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 6" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 6" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 6" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 6" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 6" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 6" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 6" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 6" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 6" /> <w:LsdException Locked="false" Priority="19" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis" /> <w:LsdException Locked="false" Priority="21" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis" /> <w:LsdException Locked="false" Priority="31" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference" /> <w:LsdException Locked="false" Priority="32" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Reference" /> <w:LsdException Locked="false" Priority="33" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Book Title" /> <w:LsdException Locked="false" Priority="37" Name="Bibliography" /> <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading" /> </w:LatentStyles> </xml><![endif]--><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Obična tablica"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} </style> <![endif]--> <p class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"><span style="font-family: &quot;Times New Roman&quot;,&quot;serif&quot;;" lang="EN-GB">This paper presents the model of source code generator based on dynamic frames. The model is named as the SCT model because if its three basic components: Specification (S), which describes the application characteristics, Configuration (C), which describes the rules for building applications, and Templates (T), which refer to application building blocks. The process of code generation dynamically creates XML frames containing all building elements (S, C ant T) until final code is produced. This approach is compared to existing XVCL frames based model for source code generating.</span></p> <p class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"><span style="font-family: &quot;Times New Roman&quot;,&quot;serif&quot;;" lang="EN-GB">The SCT model is described by both XML syntax and the appropriate graphical elements. The SCT model is aimed to build complete applications, not just skeletons.</span></p> <p class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"><span style="font-family: &quot;Times New Roman&quot;,&quot;serif&quot;;" lang="EN-GB">The main advantages of the presented model are its textual and graphic description, a fully configurable generator, and the reduced overhead of the generated source code. The presented SCT model is shown on development of web application example in order to demonstrate its features and justify our design choices.</span></p> Danijel Radošević, Ivan Magdalenic ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/184 Mon, 27 Jun 2011 09:51:53 +0200 Unlearning/Relearning in Processesof Business Information Systems Innovation https://jios.foi.hr/index.php/jios/article/view/180 <span style="font-family: 'Times New Roman';"><span style="font-size: 15px;">Unlearning is defined as throwing away concepts learnt in the past to give space for possible new learning. The learning process that supports deep change should be composed by different unlearning-learning phases, both at the individual level and at a more general organizational level. Must unlearning and relearning concepts be explicitly considered in business process reengineering based on the reorganization of information systems? This paper tries to answer this question, by describing the impact of change in information systems on the knowledge model of an organization. The analysis of a recent case study of information systems innovation, permit us to highlight common deficiencies in the design of information systems reengineering processes, particularly in SME. The paper ends with the suggestion of “good practices” that could permit the success of innovation processes by reducing the risk of failure due to excessive resistance to change.<br /></span></span> Maurizio Pighin, Anna Marzona ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/180 Mon, 27 Jun 2011 09:51:29 +0200 Proposing methodology pattern for measuring public value of IT projects https://jios.foi.hr/index.php/jios/article/view/174 <span style="font-family: &quot;Times New Roman&quot;; font-size: 11pt; mso-ansi-language: EN-GB; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'Times New Roman'; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-GB">The assessment of the acceptability and the value of IT projects in the public sector, especially when the projects feature the qualitative value along with the monetary one, is a complex problem. There are certain methodologies in the world though that help various organizations in decision-making process when projects are being chosen. The paper surveys the three IT projects public value assessing methodologies: the American Value Measuring Methodology, the French MAREVA, and the German WiBe. A comparison of the approaches to solving the problem of assessing public value of IT projects was thus made. The Analytic Hierarchy Process &ndash; a method of a multicriteria analysis of alternatives-was briefly presented. By the use of the Hierarchy Criteria Model in the way that respects all the basic characteristics that a methodology of the kind should feature in accordance with Gartner, a proposition of an IT project public value measurement methodology pattern was presented. The selection of projects with little value contribution if compared to the existing situation, the assessment of the acceptability of risk through the hierarchy structure of the value of a project and the aggregation of the value of separate PVIT dimensions is a contribution related to the methodology patterns that were surveyed.</span> Dinko Kancijan, Neven Vrček ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/174 Mon, 27 Jun 2011 09:50:52 +0200 The impact of Game-based learning on the achievement of learning goals and motivation for learning mathematics - literature review https://jios.foi.hr/index.php/jios/article/view/182 <!--[if gte mso 9]><xml> <o:OfficeDocumentSettings> <o:RelyOnVML /> <o:AllowPNG /> </o:OfficeDocumentSettings> </xml><![endif]--><!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:TrackMoves /> <w:TrackFormatting /> <w:HyphenationZone>21</w:HyphenationZone> <w:PunctuationKerning /> <w:ValidateAgainstSchemas /> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:DoNotPromoteQF /> <w:LidThemeOther>SH</w:LidThemeOther> <w:LidThemeAsian>X-NONE</w:LidThemeAsian> <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript> <w:Compatibility> <w:BreakWrappedTables /> <w:SnapToGridInCell /> <w:WrapTextWithPunct /> <w:UseAsianBreakRules /> <w:DontGrowAutofit /> <w:SplitPgBreakAndParaMark /> <w:DontVertAlignCellWithSp /> <w:DontBreakConstrainedForcedTables /> <w:DontVertAlignInTxbx /> <w:Word11KerningPairs /> <w:CachedColBalance /> </w:Compatibility> <m:mathPr> <m:mathFont m:val="Cambria Math" /> <m:brkBin m:val="before" /> <m:brkBinSub m:val="&#45;-" /> <m:smallFrac m:val="off" /> <m:dispDef /> <m:lMargin m:val="0" /> <m:rMargin m:val="0" /> <m:defJc m:val="centerGroup" /> <m:wrapIndent m:val="1440" /> <m:intLim m:val="subSup" /> <m:naryLim m:val="undOvr" /> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true" DefSemiHidden="true" DefQFormat="false" DefPriority="99" LatentStyleCount="267"> <w:LsdException Locked="false" Priority="0" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Normal" /> <w:LsdException Locked="false" Priority="9" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="heading 1" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9" /> <w:LsdException Locked="false" Priority="39" Name="toc 1" /> <w:LsdException Locked="false" Priority="39" Name="toc 2" /> <w:LsdException Locked="false" Priority="39" Name="toc 3" /> <w:LsdException Locked="false" Priority="39" Name="toc 4" /> <w:LsdException Locked="false" Priority="39" Name="toc 5" /> <w:LsdException Locked="false" Priority="39" Name="toc 6" /> <w:LsdException Locked="false" Priority="39" Name="toc 7" /> <w:LsdException Locked="false" Priority="39" Name="toc 8" /> <w:LsdException Locked="false" Priority="39" Name="toc 9" /> <w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption" /> <w:LsdException Locked="false" Priority="10" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Title" /> <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font" /> <w:LsdException Locked="false" Priority="11" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtitle" /> <w:LsdException Locked="false" Priority="22" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Strong" /> <w:LsdException Locked="false" Priority="20" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Emphasis" /> <w:LsdException Locked="false" Priority="59" SemiHidden="false" UnhideWhenUsed="false" Name="Table Grid" /> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text" /> <w:LsdException Locked="false" Priority="1" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="No Spacing" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 1" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 1" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 1" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 1" /> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision" /> <w:LsdException Locked="false" Priority="34" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="List Paragraph" /> <w:LsdException Locked="false" Priority="29" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Quote" /> <w:LsdException Locked="false" Priority="30" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Quote" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 1" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 1" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 1" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 1" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 1" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 2" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 2" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 2" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 2" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 2" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 2" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 2" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 2" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 2" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 3" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 3" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 3" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 3" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 3" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 3" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 3" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 3" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 3" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 4" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 4" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 4" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 4" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 4" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 4" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 4" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 4" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 4" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 5" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 5" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 5" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 5" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 5" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 5" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 5" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 5" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 5" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 6" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 6" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 6" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 6" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 6" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 6" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 6" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 6" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 6" /> <w:LsdException Locked="false" Priority="19" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis" /> <w:LsdException Locked="false" Priority="21" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis" /> <w:LsdException Locked="false" Priority="31" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference" /> <w:LsdException Locked="false" Priority="32" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Reference" /> <w:LsdException Locked="false" Priority="33" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Book Title" /> <w:LsdException Locked="false" Priority="37" Name="Bibliography" /> <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading" /> </w:LatentStyles> </xml><![endif]--><!--[if gte mso 10]> <mce:style><! /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Obična tablica"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin-top:0cm; mso-para-margin-right:0cm; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0cm; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} --> <!--[endif]--> <p class="MsoNormal" style="margin: 0cm 18.15pt 0.0001pt; text-align: justify;"><span style="font-size: 10pt;" lang="EN-GB">Information technologies are an integral part of a contemporary society which bases its progress on knowledge being one goal of education. Beside acquiring knowledge, skills and routines, the goal of education is to create a complete individual who can rationally and timely make decisions, purposefully react in new situations and be trained for life-long learning. In order to accomplish all this, it is necessary to make educational process more creative, contemporary and adjusted to new generations of computer literate pupils who demand quicker and more frequent interactions, a lot of information at the same time, generations who quickly acquire rules of computer games. Computer games meeting pedagogical criteria should become an integral part of learning. Teaching with mathematical computer games, which fulfil pedagogical criteria, influences pupils&rsquo; motivation, learning, retention and forgetting. This paper provides a review of literature in this field and determines whether the use of mathematical computer games contributes to more efficient realisation of educational goals at all level of education. Furthermore, considering prior research we have attempted to establish whether the use of mathematical games for teaching has an impact on the formation of a positive attitude of pupils of different ages toward the subject of mathematics, their motivation and knowledge acquisition when compared to learning without computer games. Finally, we have analysed different research methods concerning this issue and assessed the impact of pedagogically designed mathematical computer games on the realisation of educational goals and quality improvement of teaching and learning. </span></p> Blaženka Divjak, Damir Tomić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/182 Mon, 27 Jun 2011 09:50:33 +0200 An Ontological Approach to Study and Manage Digital Chain of Custody of Digital Evidence https://jios.foi.hr/index.php/jios/article/view/188 <span style="font-family: 'Times New Roman', serif;"><span style="font-size: 15px;">Chain of custody of digital evidence in digital forensic field are today essential part of digital investigation process. In order the evidence to be accepted by the court as valid, chain of custody for digital evidence must be kept, or it must be known who exactly, when, where, why and how came into contact with evidence in each stage of the digital investigations process. This paper deals with digital evidence and chain of custody of digital evidence. Authors definetaxonomy and use an ontological approach to manage chain of custody of digital evidence. The aim of this paper was to develop ontology to provide a new approach to study and better understand chain of custody of digital evidence . Additionally, developed ontology can be used as a method to further develop a set of standard and procedures for secure management with digital evidence.<br /></span></span> Jasmin Ćosić, Zoran Ćosić, Miroslav Bača ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/188 Mon, 27 Jun 2011 09:49:57 +0200 Towards more efficient e-learning, intelligence and adapted teaching material https://jios.foi.hr/index.php/jios/article/view/166 <p class="Abstract"><span lang="EN-US">This article presents results of a research project in which we attempted to determine the relationship between efficient E-learning and teaching materials adapted based on students&rsquo; structure of intelligence.</span></p> <p class="Abstract"><span lang="EN-US">The project was conducted on approximately 500 students, 23 classes, nine elementary schools, with ten teachers of history, informatics and several licensed psychologists. E-teaching material was prepared for the subject of History for eight-grade students of elementary school.</span></p> <p class="Abstract"><span lang="EN-US">Students were tested for the structure of intelligence, and based on their most prominent component, they were divided into groups, using teaching materials adapted to their most prominent intelligence component. The results have shown that use of the adapted teaching materials achieved 6-12% better results than E-materials not adapted to students&rsquo; structure of intelligence.</span></p> Janko Žufić, Damir Kalpić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/166 Tue, 14 Dec 2010 09:57:37 +0100 Determining semantic similarity of it systems based on the comparison of their graphical data models https://jios.foi.hr/index.php/jios/article/view/175 <p>Modelling is the basis for research and development of IT systems. Graphical models and graphic representations of models originally built in non-graphic languages and formalisms are often used. In modelling IT systems a need exists for comparing graphical models which can represent different variations of the same or similar modelled content or graphical models which, with certain revisions, could be applied in various domains. Graphical model in the latter case first needs to be translated into another form of predicate expressions or formal languages of modelled content representation. The lack of translation of the model for comparison is a time-consuming venture and may result in the loss of modelled relations due to differences in the "language" and representation symbols. <br />The goal of the paper is to explore and propose methods and procedures for determining similarities of IT systems based on the comparison of their graphical data models. The procedure of determining the similarities of graphical data models of the same type shall at the end of my research be based on semantic and structural similarity of models. In this article procedures for determining semantic similarity and their application is discussed together with examples and the procedure for determining structural similarity is proposed in roughly as it is in the finishing state of current research activities.</p> Katarina Tomicic-Pupek ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/175 Tue, 14 Dec 2010 09:55:50 +0100 Online privacy: overview and preliminary research https://jios.foi.hr/index.php/jios/article/view/140 <!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:TrackMoves /> <w:TrackFormatting /> <w:HyphenationZone>21</w:HyphenationZone> <w:PunctuationKerning /> <w:ValidateAgainstSchemas /> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:DoNotPromoteQF /> <w:LidThemeOther>HR</w:LidThemeOther> <w:LidThemeAsian>X-NONE</w:LidThemeAsian> <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript> <w:Compatibility> <w:BreakWrappedTables /> <w:SnapToGridInCell /> <w:WrapTextWithPunct /> <w:UseAsianBreakRules /> <w:DontGrowAutofit /> <w:SplitPgBreakAndParaMark /> <w:DontVertAlignCellWithSp /> <w:DontBreakConstrainedForcedTables /> <w:DontVertAlignInTxbx /> <w:Word11KerningPairs /> <w:CachedColBalance /> </w:Compatibility> <w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel> <m:mathPr> <m:mathFont m:val="Cambria Math" /> <m:brkBin m:val="before" /> <m:brkBinSub m:val=" " /> <m:smallFrac m:val="off" /> <m:dispDef /> <m:lMargin m:val="0" /> <m:rMargin m:val="0" /> <m:defJc m:val="centerGroup" /> <m:wrapIndent m:val="1440" /> <m:intLim m:val="subSup" /> <m:naryLim m:val="undOvr" /> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true" DefSemiHidden="true" DefQFormat="false" DefPriority="99" LatentStyleCount="267"> <w:LsdException Locked="false" Priority="0" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Normal" /> <w:LsdException Locked="false" Priority="9" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="heading 1" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9" /> <w:LsdException Locked="false" Priority="39" Name="toc 1" /> <w:LsdException Locked="false" Priority="39" Name="toc 2" /> <w:LsdException Locked="false" Priority="39" Name="toc 3" /> <w:LsdException Locked="false" Priority="39" Name="toc 4" /> <w:LsdException Locked="false" Priority="39" Name="toc 5" /> <w:LsdException Locked="false" Priority="39" Name="toc 6" /> <w:LsdException Locked="false" Priority="39" Name="toc 7" /> <w:LsdException Locked="false" Priority="39" Name="toc 8" /> <w:LsdException Locked="false" Priority="39" Name="toc 9" /> <w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption" /> <w:LsdException Locked="false" Priority="10" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Title" /> <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font" /> <w:LsdException Locked="false" Priority="11" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtitle" /> <w:LsdException Locked="false" Priority="22" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Strong" /> <w:LsdException Locked="false" Priority="20" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Emphasis" /> <w:LsdException Locked="false" Priority="59" SemiHidden="false" UnhideWhenUsed="false" Name="Table Grid" /> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text" /> <w:LsdException Locked="false" Priority="1" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="No Spacing" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 1" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 1" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 1" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 1" /> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision" /> <w:LsdException Locked="false" Priority="34" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="List Paragraph" /> <w:LsdException Locked="false" Priority="29" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Quote" /> <w:LsdException Locked="false" Priority="30" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Quote" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 1" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 1" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 1" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 1" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 1" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 2" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 2" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 2" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 2" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 2" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 2" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 2" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 2" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 2" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 3" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 3" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 3" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 3" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 3" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 3" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 3" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 3" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 3" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 4" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 4" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 4" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 4" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 4" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 4" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 4" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 4" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 4" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 5" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 5" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 5" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 5" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 5" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 5" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 5" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 5" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 5" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 6" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 6" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 6" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 6" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 6" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 6" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 6" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 6" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 6" /> <w:LsdException Locked="false" Priority="19" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis" /> <w:LsdException Locked="false" Priority="21" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis" /> <w:LsdException Locked="false" Priority="31" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference" /> <w:LsdException Locked="false" Priority="32" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Reference" /> <w:LsdException Locked="false" Priority="33" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Book Title" /> <w:LsdException Locked="false" Priority="37" Name="Bibliography" /> <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading" /> </w:LatentStyles> </xml><![endif]--> <!-- /* Font Definitions */ @font-face {font-family:"Cambria Math"; panose-1:2 4 5 3 5 4 6 3 2 4; mso-font-charset:238; mso-generic-font-family:roman; mso-font-pitch:variable; mso-font-signature:-1610611985 1107304683 0 0 159 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-unhide:no; mso-style-qformat:yes; mso-style-parent:""; margin:0cm; margin-bottom:.0001pt; text-align:justify; mso-pagination:widow-orphan; font-size:11.0pt; mso-bidi-font-size:12.0pt; font-family:"Times New Roman","serif"; mso-fareast-font-family:"Times New Roman"; mso-ansi-language:EN-GB; mso-fareast-language:EN-US;} p.Abstract, li.Abstract, div.Abstract {mso-style-name:Abstract; mso-style-unhide:no; margin-top:0cm; margin-right:18.0pt; margin-bottom:0cm; margin-left:18.0pt; margin-bottom:.0001pt; text-align:justify; mso-pagination:widow-orphan; font-size:10.0pt; mso-bidi-font-size:12.0pt; font-family:"Times New Roman","serif"; mso-fareast-font-family:"Times New Roman"; mso-ansi-language:EN-GB; mso-fareast-language:EN-US;} .MsoChpDefault {mso-style-type:export-only; mso-default-props:yes; font-size:10.0pt; mso-ansi-font-size:10.0pt; mso-bidi-font-size:10.0pt;} @page Section1 {size:612.0pt 792.0pt; margin:70.85pt 70.85pt 70.85pt 70.85pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.Section1 {page:Section1;} --> <!--[if gte mso 10]> <mce:style><! /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} --> <!--[endif]--> <p class="Abstract" style="margin: 0cm 18.15pt 0.0001pt;">Over the last decade using the Internet for online shopping, information browsing and searching as well as for online communication has become part of everyday life. Although the Internet technology has a lot of benefits for users, one of the most important disadvantages is related to the increasing capacity for users&rsquo; online activity surveillance. However, the users are increasingly becoming aware of online surveillance methods, which results in their increased concern for privacy protection. Numerous factors influence the way in which individuals perceive the level of privacy protection when they are online. This article provides a review of factors that influence the privacy perception of Internet users. Previous online privacy research related to e-business was predominantly focused on the dimension of <em>information privacy</em> and concerned with the way users&rsquo; personal information is collected, saved and used by an online company. This article&rsquo;s main aim is to provide an overview of numerous Internet users&rsquo; privacy perception elements across various privacy dimensions as well as their potential categorization. In addition, considering that e-banking and online shopping are one of the most widely used e-services, an examination of online privacy perception of e-banking/online shopping users was performed.</p><p>&nbsp;</p> Renata Mekovec ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/140 Tue, 14 Dec 2010 09:55:06 +0100 An Approach to Optical Network Design using General Heuristic Optimization Framework https://jios.foi.hr/index.php/jios/article/view/137 <p class="Abstract">The article tackles the problem of optimization methods in optical network design process, based on optimal traffic routing with the goal to minimize the utilized network resources for given topology and traffic demands. An optimization framework <strong style="mso-bidi-font-weight: normal;"><em style="mso-bidi-font-style: normal;">Nyx</em></strong> has been developed with the focus on flexibility in solving optimization problems by implementing general heuristic search techniques. <strong style="mso-bidi-font-weight: normal;"><em style="mso-bidi-font-style: normal;">Nyx</em></strong> modular organization has been described, including coding types for solutions and genetic algorithm as the optimization method. Optimal routing has been implemented to demonstrate the use of <strong style="mso-bidi-font-weight: normal;"><em style="mso-bidi-font-style: normal;">Nyx</em></strong> in the optical network design process. Optimal routing procedure has been applied to Pan-European optical network with variations of routing procedures and the number of wavelengths. The analysis included no protection scenario, 1+1 protection and path restoration. The routing was performed using shortest path routing and optimal routing which minimizes the use of optical network resources, being network multiplexers, amplifiers and fibers.</p><p> </p><p> </p> Marko Lacković ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/137 Tue, 14 Dec 2010 09:52:56 +0100 Social network analysis of Eureka project partnership in Central and South-Eastern European regions https://jios.foi.hr/index.php/jios/article/view/176 <span style="font-family: 'Times New Roman', serif; font-size: medium;"><span style="font-size: 15px;">In this article we present research on the social network structure of project partnership in the Eureka network in order to understand country performance in the network. The main method used in our research is the Social Network Analysis (SNA). Research questions were set and examined on the set of the Central and South-Eastern European countries. We investigated regionally based partnerships, relation between central position in the network and country&rsquo;s level of development and, finally, in order to analyze relation between number of project partners and project success, Eureka success stories were investigated as well.</span></span> Blaženka Divjak, Petra Peharda, Nina Begičević ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/176 Tue, 14 Dec 2010 09:52:17 +0100 Strategic Analysis and Model Construction on Conflict Resolution with Motion Game Theory https://jios.foi.hr/index.php/jios/article/view/141 This research uses the &ldquo;Participating Observation Method&rdquo; to observe the interaction between manufacturer and distributor negotiation strategies, determine the preference and expectation of participants, and establish a framework for this type of research. Then it sets up the &ldquo;analysis framework of negotiation strategies&rdquo; between the manufacturer and the distributor based on an analysis of the respective conditions, advantages, and disadvantages of the manufacturer and distributor. Thirdly, this study sets up a reward matrix of the strategy action game between the manufacturer and the distributor. Then establishes a set of feasible &ldquo;negotiation models&rdquo; based on the reward matrix of the strategy game between the both parties to observe how the manufacturer and the distributor make their own bargaining decisions in the situation of information asymmetry or exterior opportunity/threat. Finally, this study establishes a &ldquo;multi-agent strategy game protocol system model&rdquo; to solve the conflict resulting from the self-strategizing of both parties for their own interests, and to achieve the utmost efficiency in the negotiation. Chih-Yao Lo, Yu-Teng Chang ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/141 Wed, 30 Jun 2010 15:19:14 +0200 Analytical method of CIM to PIM transformation in Model Driven Architecture (MDA) https://jios.foi.hr/index.php/jios/article/view/163 Information system&rsquo;s models on higher level of abstraction have become a daily routine in many software companies. The concept of Model Driven Architecture (MDA) published by standardization body OMG1 since 2001 has become a concept for creation of software applications and information systems. MDA specifies four levels of abstraction: top three levels are created as graphical models and the last one as implementation code model. Many research works of MDA are focusing on the lower levels and transformations between each other. The top level of abstraction, called Computation Independent Model (CIM) and its transformation to the lower level called Platform Independent Model (PIM) is not so extensive research topic. Considering to a great importance and usability of this level in practice of IS2Keywords: transformation, MDA, CIM, PIM, UML, DFD. development now our research activity is focused to this highest level of abstraction &ndash; CIM and its possible transformation to the lower PIM level. In this article we are presenting a possible solution of CIM modeling and its analytic method of transformation to PIM. Martin Kardos, Matilda Drozdová ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/163 Wed, 30 Jun 2010 15:18:30 +0200 Automatically Generated Keywords: A Comparison to Author-Generated Keywords in the Sciences https://jios.foi.hr/index.php/jios/article/view/158 <p style="margin: 0px; text-indent: 0px;">This paper examines the differences between author-generated keywords and automatically generated keywords in one area of scientific and technical literature. Using inverse frequency, keywords produced using both methods are examined using a maximum likelihood algorithm. By reducing the scope and size of the corpus of literature examined, this study more closely emulates the information gathering processes of scientists and technologists. Care was taken in developing the sample used, balancing statistical factors to allow interpretable outcomes and replication. The results of the study indicated there are no statistically significant differences between the two techniques.<!--EndFragment--></p> Charlie D. Hurt ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/158 Wed, 30 Jun 2010 15:17:59 +0200 Describing Layered Communication Architecture in SDL Markup Language https://jios.foi.hr/index.php/jios/article/view/157 Using Specification and Description Language (SDL) as a formal language for specification of requirements for the complex, real-time and distributed systems involving many concurrent activities, we have come to the idea of making the language independent of platforms and operating systems which may use it. Shortly, we have developed markup version of the SDL language, and named it SDL Markup Language. It is an XML-based version of the SDL-PR (Phrase Representation), an SDL textual notation. We use the language to specify the complex communications protocols, which are used in wide range of layered architectures. We provide the specification from the INRES protocol in SDL-ML. Marina Bagic Babac, Marijan Kunštić, Dragan Jevtić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/157 Wed, 30 Jun 2010 15:16:59 +0200 eTourism: A comparison of online and offline bookings and the importance of hotel attributes https://jios.foi.hr/index.php/jios/article/view/152 Internet is an important tool for information searching and purchasing of products especially in tourism. This paper investigates the impact of demographic and travel characteristics of hotel guests on online and offline reservations. It also examines the importance of hotel attributes in selecting a hotel and the differences in priorities between guests who book their accommodation online and offline. Data was collected by surveys of guests in three hotels in Dubrovnik. The results of the study showed that the method of booking mostly depends on the nature of travel, and that the importance of hotel attributes does not differ much between different groups of guests. Igor H. Crnojevac, Jadranka Gugić, Saša Karlovčan ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/152 Wed, 30 Jun 2010 15:16:23 +0200 Social network analysis of study environment https://jios.foi.hr/index.php/jios/article/view/150 Student working environment influences student learning and achievement level. In this respect social aspects of students&rsquo; formal and non-formal learning play special role in learning environment. The main research problem of this paper is to find out if students' academic performance influences their position in different students' social networks. Further, there is a need to identify other predictors of this position. In the process of problem solving we use the Social Network Analysis (SNA) that is based on the data we collected from the students at the Faculty of Organization and Informatics, University of Zagreb. There are two data samples: in the basic sample N=27 and in the extended sample N=52. We collected data on social-demographic position, academic performance, learning and motivation styles, student status (full-time/part-time), attitudes towards individual and teamwork as well as informal cooperation. Afterwards five different networks (exchange of learning materials, teamwork, informal communication, basic and aggregated social network) were constructed. These networks were analyzed with different metrics and the most important were betweenness, closeness and degree centrality. The main result is, firstly, that the position in a social network cannot be forecast only by academic success and, secondly, that part-time students tend to form separate groups that are poorly connected with full-time students. In general, position of a student in social networks in study environment can influence student learning as well as her/his future employability and therefore it is worthwhile to be investigated. Blaženka Divjak, Petra Peharda ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/150 Wed, 30 Jun 2010 15:16:09 +0200 Theoretical difference between impact factor and influence factor https://jios.foi.hr/index.php/jios/article/view/146 <span style="font-family: 'Times New Roman'; font-size: medium;"><span style="font-size: 15px;">Bibliometric constructions of "knowledge maps" and "cognitive structures of science" do not differentiate between impact and influence factors. The difference can be constructedaccording to different meaning and interpretation of the terms reference and citation. Reference is "acknowledgment which one author gives to another", whereas citation is "acknowledgment which one document receives from another". Development of Information Science according to period and subject area is analyzed on the corpus of citation literature retrieved from doctoral dissertations in Information Science from 1978 to 2007 at Croatian universities. The research aim is to indicate the difference between document impact factor and author's influence factor (i.e. reference ability to produce effects on actions, behavior, and opinions of authors of doctoral theses). The influence factor serves to distinguish the key role of cited authors in time and according to the duration of the influence (the average age for cited papers of dominant authors in different periods is between eight and ten years). The difference between linear and interactive communication seems vital for the interpretation of cited half-life, i.e. the attitude of one science community towards used information resources and cognitive heritage. The analyzed corpus of 22,210 citations can be divided into three communication phases according to influence factor criteria: in the phase of dialogue and interactive communication 25% of bibliographic units are cited in the first four years; in the second phase another 25% of units are cited from the fifth to the ninth year; after ten years, in the dominant linear communication phase, approximately 30% of units are cited.</span></span> Đilda Pečarić, Miroslav Tuđman ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/146 Wed, 30 Jun 2010 15:14:45 +0200 Personal Efficacy and Factors of Effective Learning Environment in Higher Education: Croatian and American Students https://jios.foi.hr/index.php/jios/article/view/145 Successful learning in higher education incorporates various factors related to knowledge, skills, habits, and motivation. Additionally, students&rsquo; personalities and self-efficacy may contribute to their adjustment, planning of activities, and achieving success. The objective of this paper is to analyze students&rsquo; needs for support services, which enhance the effectiveness of their learning environment at higher education institutions. Answers received from a sample of undergraduate freshmen at one American University and one Croatian University were analyzed and compared. The students from both countries agree that there is a need for developing self-reliance and personal responsibility in using support services, as well as for the timely and accurate information on availability of these services. Students&rsquo; suggestions and their desire to enhance effectiveness of their learning environment may be used in creating and improving support services in higher education institutions as well as training their staff. Violeta Vidaček - Hainš, Harry Prats, Victoria Appatova ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/145 Wed, 30 Jun 2010 15:14:00 +0200 Syntactic Method for Vehicles Movement Description and Analysis https://jios.foi.hr/index.php/jios/article/view/144 <span style="font-family: 'Times New Roman', serif; font-size: medium;"><span style="font-size: 15px;">The syntactic primitives and the description language can be used for assignment and analysis of vehicles movement. The paper introduces a method that allows spotting vehicles&rsquo; manoeuvres on and between traffic lanes, observing images, registered by a video camera. The analysis algorithms of the vehicles&rsquo; movement trajectories were considered in this paper as well.</span></span> Marcin Staniek, Jan Piecha ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/144 Wed, 30 Jun 2010 15:13:15 +0200 Fuzzy Linguistic Optimization on Multi-Attribute Machining https://jios.foi.hr/index.php/jios/article/view/139 Most existing multi-attribute optimization researches for the modern CNC (computer numerical control) turning industry were either accomplished within certain manufacturing circumstances, or achieved through numerous equipment operations. Therefore, a general deduction optimization scheme proposed is deemed to be necessary for the industry. In this paper, four parameters (cutting depth, feed rate, speed, tool nose runoff) with three levels (low, medium, high) are considered to optimize the multi-attribute (surface roughness, tool wear, and material removal rate) finish turning. Through FAHP (Fuzzy Analytic Hierarchy Process) with eighty intervals for each attribute, the weight of each attribute is evaluated from the paired comparison matrix constructed by the expert judgment. Additionally, twenty-seven fuzzy control rules using trapezoid membership function with respective to seventeen linguistic grades for each attribute are constructed. Considering thirty input and eighty output intervals, the defuzzifierion using center of gravity is thus completed. The TOPSIS (Technique for Order Preference by Similarity to Ideal Solution) is moreover utilized to integrate and evaluate the multiple machining attributes for the Taguchi experiment, and thus the optimum general deduction parameters can then be received. The confirmation experiment for optimum general deduction parameters is furthermore performed on an ECOCA-3807 CNC lathe. It is shown that the attributes from the fuzzy linguistic optimization parameters are all significantly advanced comparing to those from benchmark. This paper not only proposes a general deduction optimization scheme using orthogonal array, but also contributes the satisfactory fuzzy linguistic approach for multiple CNC turning attributes with profound insight. Tian-Syung Lan, Chen-Feng Wu, Ming-Yung Wang, Chih-Yao Lo ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/139 Wed, 30 Jun 2010 15:12:13 +0200 Generic icons – yes or no? https://jios.foi.hr/index.php/jios/article/view/132 The information society has become increasingly dependant on programs that are subjected to frequent evolutive, basic and logical changes for a variety of reasons whereas the visual design of the program/program interface mostly remains the same or gets slightly modified. The development of technology has become to such an extent a commonplace that the use of redesigned programs implies icons that are visually acceptable although representing obsolete technologies and that are eventually hard to change due to the habits developed by the program users. The research presents a study into the personal preference as to a particular icon, &ldquo;Save&rdquo; for example, and into the perception of the visual identities of today's programs under the circumstance of program icons being not compliant with the technological state-of-the-art. Based on the obtained results, the survey that included students attending web design and media technician courses and ECDL course participants who come in contact with computers and programming tools for the first time should enlighten both teachers and designers of programming interfaces about the way of linking the formal knowledge with a constructivist approach to designing and redesigning programs. Krunoslav Bedi, Nikolina Žajdela Hrustek ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/132 Wed, 30 Jun 2010 15:11:17 +0200 Considering Interactions among Multiple Criteria for the Server Selection https://jios.foi.hr/index.php/jios/article/view/129 Decision-making about server selection is one of the multi-criteria decision-making (MCDM) processes where interactions among criteria should be considered. The paper introduces and develops some solutions for considering interactions among criteria in the MCDM problems. In the frame procedure for MCDM by using the group of methods, based on assigning weights, special attention is given to the synthesis of the local alternatives&rsquo; values into the aggregate values where the mutual preferential independence between two criteria is not assumed. Firstly, we delineate how to complete the additive model into the multiplicative one with synergic and redundancy elements in the case that criteria are structured in one level and in two levels. Furthermore, we adapted the concept of the fuzzy Choquet integral to the multi-attribute value theory. Studying and comparing the results of the example case of the server selection obtained by both aggregation approaches, the paper highlights the advantages of the first one since it does not require from decision makers to determine the weights of all possible combinations of the criteria and it enables the further use of the most preferred MCDM methods. Vesna Čančer ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/129 Wed, 30 Jun 2010 15:10:14 +0200 Model-Driven Analysis towards Interoperability of Assessments in LMS https://jios.foi.hr/index.php/jios/article/view/117 In this article we are focusing on interoperability of two aspects of LMS systems - test question types and assessments as such. The proposed strategy is based on MDA, especially on the Platform Independent Models (PIM). On the higher level of abstraction (PIM) it is possible to find commonalities and differences of architectures of various systems and these are the basis for the common generalized model of the assessments. In the three steps methodology we are adding specificities of PIM models of candidate systems with various architecture &ndash; Moodle, Olat and Claroline. The correctness of the final common model (General PIM) is proved in the implemented system for exchange of tests between the existing systems. Zuzana Bizonova, Katarina Pilatova ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/117 Wed, 30 Jun 2010 15:08:28 +0200 Multi-Agent System for Decision Support in Enterprises https://jios.foi.hr/index.php/jios/article/view/123 <!--[if gte mso 9]><xml> <o:OfficeDocumentSettings> <o:RelyOnVML /> <o:AllowPNG /> </o:OfficeDocumentSettings> </xml><![endif]--><!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:TrackMoves /> <w:TrackFormatting /> <w:HyphenationZone>21</w:HyphenationZone> <w:PunctuationKerning /> <w:ValidateAgainstSchemas /> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:DoNotPromoteQF /> <w:LidThemeOther>SL</w:LidThemeOther> <w:LidThemeAsian>X-NONE</w:LidThemeAsian> <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript> <w:Compatibility> <w:BreakWrappedTables /> <w:SnapToGridInCell /> <w:WrapTextWithPunct /> <w:UseAsianBreakRules /> <w:DontGrowAutofit /> <w:SplitPgBreakAndParaMark /> <w:DontVertAlignCellWithSp /> <w:DontBreakConstrainedForcedTables /> <w:DontVertAlignInTxbx /> <w:Word11KerningPairs /> <w:CachedColBalance /> <w:UseFELayout /> </w:Compatibility> <m:mathPr> <m:mathFont m:val="Cambria Math" /> <m:brkBin m:val="before" /> <m:brkBinSub m:val=" " /> <m:smallFrac m:val="off" /> <m:dispDef /> <m:lMargin m:val="0" /> <m:rMargin m:val="0" /> <m:defJc m:val="centerGroup" /> <m:wrapIndent m:val="1440" /> <m:intLim m:val="subSup" /> <m:naryLim m:val="undOvr" /> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true" DefSemiHidden="true" DefQFormat="false" DefPriority="99" LatentStyleCount="267"> <w:LsdException Locked="false" Priority="0" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Normal" /> <w:LsdException Locked="false" Priority="9" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="heading 1" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9" /> <w:LsdException Locked="false" Priority="39" Name="toc 1" /> <w:LsdException Locked="false" Priority="39" Name="toc 2" /> <w:LsdException Locked="false" Priority="39" Name="toc 3" /> <w:LsdException Locked="false" Priority="39" Name="toc 4" /> <w:LsdException Locked="false" Priority="39" Name="toc 5" /> <w:LsdException Locked="false" Priority="39" Name="toc 6" /> <w:LsdException Locked="false" Priority="39" Name="toc 7" /> <w:LsdException Locked="false" Priority="39" Name="toc 8" /> <w:LsdException Locked="false" Priority="39" Name="toc 9" /> <w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption" /> <w:LsdException Locked="false" Priority="10" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Title" /> <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font" /> <w:LsdException Locked="false" Priority="11" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtitle" /> <w:LsdException Locked="false" Priority="22" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Strong" /> <w:LsdException Locked="false" Priority="20" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Emphasis" /> <w:LsdException Locked="false" Priority="59" SemiHidden="false" UnhideWhenUsed="false" Name="Table Grid" /> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text" /> <w:LsdException Locked="false" Priority="1" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="No Spacing" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 1" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 1" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 1" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 1" /> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision" /> <w:LsdException Locked="false" Priority="34" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="List Paragraph" /> <w:LsdException Locked="false" Priority="29" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Quote" /> <w:LsdException Locked="false" Priority="30" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Quote" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 1" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 1" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 1" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 1" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 1" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 2" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 2" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 2" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 2" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 2" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 2" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 2" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 2" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 2" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 3" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 3" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 3" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 3" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 3" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 3" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 3" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 3" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 3" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 4" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 4" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 4" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 4" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 4" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 4" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 4" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 4" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 4" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 5" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 5" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 5" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 5" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 5" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 5" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 5" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 5" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 5" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 6" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 6" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 6" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 6" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 6" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 6" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 6" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 6" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 6" /> <w:LsdException Locked="false" Priority="19" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis" /> <w:LsdException Locked="false" Priority="21" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis" /> <w:LsdException Locked="false" Priority="31" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference" /> <w:LsdException Locked="false" Priority="32" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Reference" /> <w:LsdException Locked="false" Priority="33" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Book Title" /> <w:LsdException Locked="false" Priority="37" Name="Bibliography" /> <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading" /> </w:LatentStyles> </xml><![endif]--> <!-- /* Font Definitions */ @font-face {font-family:"Cambria Math"; panose-1:2 4 5 3 5 4 6 3 2 4; mso-font-charset:238; mso-generic-font-family:roman; mso-font-pitch:variable; mso-font-signature:-1610611985 1107304683 0 0 415 0;} @font-face {font-family:Cambria; panose-1:2 4 5 3 5 4 6 3 2 4; mso-font-charset:238; mso-generic-font-family:roman; mso-font-pitch:variable; mso-font-signature:-1610611985 1073741899 0 0 415 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-unhide:no; mso-style-qformat:yes; mso-style-parent:""; margin-top:0cm; margin-right:0cm; margin-bottom:10.0pt; margin-left:0cm; text-align:justify; text-justify:inter-ideograph; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Cambria","serif"; mso-ascii-font-family:Cambria; mso-ascii-theme-font:major-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:major-fareast; mso-hansi-font-family:Cambria; mso-hansi-theme-font:major-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:major-bidi; mso-ansi-language:EN-US; mso-fareast-language:EN-US; mso-bidi-language:EN-US;} .MsoChpDefault {mso-style-type:export-only; mso-default-props:yes; mso-ascii-font-family:Cambria; mso-ascii-theme-font:major-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:major-fareast; mso-hansi-font-family:Cambria; mso-hansi-theme-font:major-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:major-bidi; mso-ansi-language:EN-US; mso-fareast-language:EN-US; mso-bidi-language:EN-US;} .MsoPapDefault {mso-style-type:export-only; margin-bottom:10.0pt; line-height:115%;} @page Section1 {size:612.0pt 792.0pt; margin:70.85pt 70.85pt 70.85pt 70.85pt; mso-header-margin:35.4pt; mso-footer-margin:35.4pt; mso-paper-source:0;} div.Section1 {page:Section1;} --> <!--[if gte mso 10]> <mce:style><! /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin-top:0cm; mso-para-margin-right:0cm; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0cm; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} --> <!--[endif]--><span style="font-size: 11pt; line-height: 115%; font-family: " lang="EN-US">Business decisions must rely not only on organisation’s internal data but also on external data from competitors or relevant events. This information can be obtained from the Web but must be integrated with the data in an organisation’s Data Warehouse (DW). In this paper we discuss the agent-based integration approach using ontologies. To enable common understanding of a domain between people and application systems we introduce business rules approach towards ontology management. Because knowledge in organisation’s ontologies is acquired from business users without technical knowledge simple user interface based on ontology restrictions and predefined templates are used. After data from internal DW, Web and business rules are acquired; agent can deduce new knowledge and therefore facilitate decision making process. Tasks like information retrieval from competitors, creating and reviewing OLAP reports are autonomously performed by agents, while business users have control over their execution through knowledge base in ontology. The approach presented in the paper was verified on the case study from the domain of mobile communications with the emphasis on supply and demand of mobile phones and its accessories.</span> Dejan Lavbič, Rok Rupnik ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/123 Tue, 15 Dec 2009 11:17:51 +0100 Impact of ICT on the structural and contextual organizational elements: Case of the Varaždin County https://jios.foi.hr/index.php/jios/article/view/122 <p class="Abstract" style="margin: 0cm 18pt 0pt;"><span lang="EN-US"><span style="font-size: x-small; font-family: Times New Roman;">The influence of certain factors on the organizational components has been in researchers' focus for years, together with their impact on the overall organizational efficiency. Traditional view commonly divided the factors on internal and external ones, which became improper in modern conditions. With contemporary division on structural and contextual factors, as a specific determinant we have to extract information and communication technology (ICT) which impacts elements of structural and contextual dimension in every organization. Therefore it is becoming generic factor which cannot be classified into one of these groups. In this research, we observed impact of ICT on organizational elements of public administrations offices on the case of the Varaždin County. Results show that this impact is present in various forms in all observed factors and thus makes ICT a generic organizational factor. </span></span></p> Kristina Brodar, Marina Klačmer Čalopa, Igor Pihir ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/122 Tue, 15 Dec 2009 11:17:36 +0100 Creating an effective learning environment through an E-Learning Instructional Programme (ELIP) https://jios.foi.hr/index.php/jios/article/view/121 Though numerous research reports have provided a body of information about benefits of e-learning there are barriers such as, asynchronous communication channels, lack of personalisation, which decrease the level of interaction between the learner and instructor [13].<br /><br />The aim of this paper is to discuss and outline a framework on e-learning pedagogical and technology issues which provide a basis for the creation of an e-learning instructional programme (ELIP). The Phase I of this research start with the creation of a framework for an e-learning environment and derivation of the e-learning instructional programme (ELIP); Phase II is aimed to implement a popular audio playback device (iPod) and VoIP. In this phase 40 learners, one instructor and three tutors will be observed and their experiences will be evaluated through focus group interviews and documents analysis. This research was based on a qualitative research approach [78],[44].<br /> Maria Jakovljevic ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/121 Tue, 15 Dec 2009 11:17:27 +0100 PNMBG: Point Neighborhood Merging with Border Grids https://jios.foi.hr/index.php/jios/article/view/118 <span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA; mso-bidi-font-weight: bold;" lang="EN-US">The special clustering algorithm is attractive for the task of grouping arbitrary shaped database into several proper classes. Up to now, a wide variety of clustering algorithms designed for this task have been proposed, the majority of these algorithms is density-based. But the effectivity and efficiency still is the great challenges for these algorithms as far as the clustering quality of such task is concerned. </span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA; mso-bidi-font-weight: bold;" lang="EN-US">In this paper, we</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA; mso-bidi-font-weight: bold;" lang="EN-US"> propose an arbitrary shaped clustering method with border grids (PNMBG),</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA; mso-bidi-font-weight: bold;" lang="EN-US"> </span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA; mso-bidi-font-weight: bold;" lang="EN-US">PNMBG</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-US"> is a crisp partition method. It groups objects </span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">to point neighborhoods</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-US"> first</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">ly</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-US">, and then</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US"> </span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-US">iterati</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">vely</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US"> merges</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-US"> these </span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">point neighborhoods</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-US"> into </span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">clusters</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-US"> </span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">via</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-US"> grids</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">, only bordering grids are considered during the merging stage. </span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-US">Experiments show that </span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA; mso-bidi-font-weight: bold;" lang="EN-US">PNMBG</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-US"> has a good efficiency </span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">especially</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-US"> on the database with high dimension. In general, </span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA; mso-bidi-font-weight: bold;" lang="EN-US">PNMBG</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-US"> outperforms DBSCAN in the term of efficiency</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US"> and has an almost same </span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-US">effectivity</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US"> with the later.</span> Renxia Wan, Jingchao Chen, Lixin Wang, Xiaoke Su ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/118 Tue, 15 Dec 2009 11:17:14 +0100 Suitability of Modern Software Development Methodologies for Model Driven Development https://jios.foi.hr/index.php/jios/article/view/114 As an answer to today’s growing challenges in software industry, wide spectrum of new approaches of software development has occurred. One prominent direction is currently most promising software development paradigm called Model Driven Development (MDD). Despite a lot of skepticism and problems, MDD paradigm is being used and improved to accomplish many inherent potential benefits. In the methodological approach of software development it is necessary to use some kind of development process. Modern methodologies can be classified into two main categories: formal or heavyweight and agile or lightweight. But when it is a question about MDD and development process for MDD, currently known methodologies are very poor or better said they don't have any explanation of MDD process. As the result of research, in this paper, author examines the possibilities of using existing modern software methodologies in context of MDD paradigm.<br /> Ruben Picek ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/114 Tue, 15 Dec 2009 11:16:53 +0100 The Role of Knowledge Management in Mobile Marketing https://jios.foi.hr/index.php/jios/article/view/112 <!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:TrackMoves /> <w:TrackFormatting /> <w:HyphenationZone>21</w:HyphenationZone> <w:PunctuationKerning /> <w:ValidateAgainstSchemas /> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:DoNotPromoteQF /> <w:LidThemeOther>HR</w:LidThemeOther> <w:LidThemeAsian>X-NONE</w:LidThemeAsian> <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript> <w:Compatibility> <w:BreakWrappedTables /> <w:SnapToGridInCell /> <w:WrapTextWithPunct /> <w:UseAsianBreakRules /> <w:DontGrowAutofit /> <w:SplitPgBreakAndParaMark /> <w:DontVertAlignCellWithSp /> <w:DontBreakConstrainedForcedTables /> <w:DontVertAlignInTxbx /> <w:Word11KerningPairs /> <w:CachedColBalance /> </w:Compatibility> <m:mathPr> <m:mathFont m:val="Cambria Math" /> <m:brkBin m:val="before" /> <m:brkBinSub m:val=" " /> <m:smallFrac m:val="off" /> <m:dispDef /> <m:lMargin m:val="0" /> <m:rMargin m:val="0" /> <m:defJc m:val="centerGroup" /> <m:wrapIndent m:val="1440" /> <m:intLim m:val="subSup" /> <m:naryLim m:val="undOvr" /> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true" DefSemiHidden="true" DefQFormat="false" DefPriority="99" LatentStyleCount="267"> <w:LsdException Locked="false" Priority="0" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Normal" /> <w:LsdException Locked="false" Priority="9" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="heading 1" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9" /> <w:LsdException Locked="false" Priority="39" Name="toc 1" /> <w:LsdException Locked="false" Priority="39" Name="toc 2" /> <w:LsdException Locked="false" Priority="39" Name="toc 3" /> <w:LsdException Locked="false" Priority="39" Name="toc 4" /> <w:LsdException Locked="false" Priority="39" Name="toc 5" /> <w:LsdException Locked="false" Priority="39" Name="toc 6" /> <w:LsdException Locked="false" Priority="39" Name="toc 7" /> <w:LsdException Locked="false" Priority="39" Name="toc 8" /> <w:LsdException Locked="false" Priority="39" Name="toc 9" /> <w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption" /> <w:LsdException Locked="false" Priority="10" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Title" /> <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font" /> <w:LsdException Locked="false" Priority="11" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtitle" /> <w:LsdException Locked="false" Priority="22" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Strong" /> <w:LsdException Locked="false" Priority="20" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Emphasis" /> <w:LsdException Locked="false" Priority="59" SemiHidden="false" UnhideWhenUsed="false" Name="Table Grid" /> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text" /> <w:LsdException Locked="false" Priority="1" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="No Spacing" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 1" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 1" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 1" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 1" /> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision" /> <w:LsdException Locked="false" Priority="34" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="List Paragraph" /> <w:LsdException Locked="false" Priority="29" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Quote" /> <w:LsdException Locked="false" Priority="30" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Quote" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 1" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 1" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 1" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 1" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 1" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 2" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 2" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 2" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 2" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 2" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 2" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 2" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 2" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 2" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 3" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 3" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 3" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 3" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 3" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 3" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 3" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 3" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 3" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 4" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 4" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 4" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 4" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 4" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 4" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 4" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 4" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 4" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 5" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 5" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 5" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 5" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 5" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 5" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 5" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 5" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 5" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 6" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 6" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 6" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 6" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 6" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 6" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 6" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 6" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 6" /> <w:LsdException Locked="false" Priority="19" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis" /> <w:LsdException Locked="false" Priority="21" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis" /> <w:LsdException Locked="false" Priority="31" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference" /> <w:LsdException Locked="false" Priority="32" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Reference" /> <w:LsdException Locked="false" Priority="33" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Book Title" /> <w:LsdException Locked="false" Priority="37" Name="Bibliography" /> <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading" /> </w:LatentStyles> </xml><![endif]--> <!-- /* Font Definitions */ @font-face {font-family:"Cambria Math"; panose-1:2 4 5 3 5 4 6 3 2 4; mso-font-charset:238; mso-generic-font-family:roman; mso-font-pitch:variable; mso-font-signature:-1610611985 1107304683 0 0 159 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-unhide:no; mso-style-qformat:yes; mso-style-parent:""; margin:0cm; margin-bottom:.0001pt; text-align:justify; mso-pagination:widow-orphan; font-size:11.0pt; mso-bidi-font-size:12.0pt; font-family:"Times New Roman","serif"; mso-fareast-font-family:"Times New Roman"; mso-ansi-language:EN-US; mso-fareast-language:EN-US;} p.Abstract, li.Abstract, div.Abstract {mso-style-name:Abstract; mso-style-unhide:no; margin-top:0cm; margin-right:18.0pt; margin-bottom:0cm; margin-left:18.0pt; margin-bottom:.0001pt; text-align:justify; mso-pagination:widow-orphan; font-size:10.0pt; mso-bidi-font-size:12.0pt; font-family:"Times New Roman","serif"; mso-fareast-font-family:"Times New Roman"; mso-ansi-language:EN-US; mso-fareast-language:EN-US;} .MsoChpDefault {mso-style-type:export-only; mso-default-props:yes; font-size:10.0pt; mso-ansi-font-size:10.0pt; mso-bidi-font-size:10.0pt;} @page Section1 {size:612.0pt 792.0pt; margin:70.85pt 70.85pt 70.85pt 70.85pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.Section1 {page:Section1;} --> <!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} </style> <![endif]--> <p class="Abstract"><span lang="EN-US">Mobile terminal devices and mobile networks enable mass customization for individual customers, and pursuant to this mobile marketing represent the last stage of segmentation leading up to the individually customized marketing, i.e. „one on one marketing“. Mobile marketing refers to using an interactive wireless medium with purpose of providing customers with personal information, having time and location dimension, promoting goods, services and ideas, thus generating value for all stakeholders. On one hand, mobile medium has completely transformed present day notion of marketing campaigns and opened up a range of new opportunities for advertisers, and on the other hand it put new challenges before companies whose CRM and KM systems are not well adapted to new requirements of mobile marketing. This article attempts to answer the question on how to successfully run mobile marketing campaigns, while using tools and knowledge provided by Knowledge Management and Customer Relationship Management.</span></p> Neven Bosilj, Ivan Jurinjak ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/112 Tue, 15 Dec 2009 11:16:27 +0100 Creating adaptive environment for e-learning courses https://jios.foi.hr/index.php/jios/article/view/107 In this paper we provide an approach to creating adaptive environment for e-learning courses. In the context of e-education, successful adaptation has to be performed upon learners’ characteristics. Currently, modeling and discovering users’ needs, goals, knowledge preferences and motivations is one of the most challenging tasks in e-learning systems that deal with large volumes of information. Primary goal of the research is to perform personalizing of distance education system, according to students’ learning styles. Main steps and requirements in applying business intelligence techniques in process of personalization are identified. In addition, we propose generic model and architecture of an adaptive e-learning system by describing the structure of an adaptive course and exemplify correlations among e-learning course content and different learning styles. Moreover, research that dealt with application of data mining technique in a real e-learning system was carried out. We performed adaptation of our e-learning courses using the results from the research. Bozidar Radenkovic, Marijana Despotovic, Zorica Bogdanovic, Dusan Barac ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/107 Wed, 01 Jul 2009 14:32:20 +0200 1957-2007: 50 Years of Higher Order Programming Languages https://jios.foi.hr/index.php/jios/article/view/81 <p>Fifty years ago one of the greatest breakthroughs in computer programming and in the history of computers happened -- the appearance of FORTRAN, the first higher-order programming language. From that time until now hundreds of programming languages were invented, different programming paradigms were defined, all with the main goal to make computer programming easier and closer to as many people as possible. Many battles were fought among scientists as well as among developers around concepts of programming, programming languages and paradigms. It can be said that programming paradigms and programming languages were very often a trigger for many changes and improvements in computer science as well as in computer industry. Definitely, computer programming is one of the cornerstones of computer science.</p><p>Today there are many tools that give a help in the process of programming, but there is still a programming tasks that can be solved only manually. Therefore, programming is still one of the most creative parts of interaction with computers.</p><p>Programmers should chose programming language in accordance to task they have to solve, but very often, they chose it in accordance to their personal preferences, their beliefs and many other subjective reasons.</p><p>Nevertheless, the market of programming languages can be merciless to languages as history was merciless to some people, even whole nations. Programming languages and developers get born, live and die leaving more or less tracks and successors, and not always the best survives. </p><p>The history of programming languages is closely connected to the history of computers and computer science itself. Every single thing from one of them has its reflexions onto the other. This paper gives a short overview of last fifty years of computer programming and computer programming languages, but also gives many ideas that influenced other aspects of computer science. Particularly, programming paradigms are described, their intentions and goals, as well as the most of the significant languages of all paradigms. </p> Alen Lovrenčić, Mario Konecki, Tihomir Orehovački ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/81 Wed, 01 Jul 2009 14:30:54 +0200 Web-based Systems Development: The Influence of Disciplinary Backgrounds on Design Practices https://jios.foi.hr/index.php/jios/article/view/90 Web development teams are multidisciplinary, bringing together designers from a variety of backgrounds. A Web designer’s professional training and education can shape his problem-solving orientation and world view by indoctrinating certain values and conditioning him to think and behave in certain ways. This paper presents an analysis of data gathered across 14 interviews, wherein four distinct orientations were identified: (1) Web development as the design of a functional software application (emphasis on back-end functionality); (2) as the design of an interactive tool (emphasis on ergonomics); (3) as the design of a communicational dialogue (emphasis on audience engagement); and (4) as an extension of branded graphic design (emphasis on visual presentation). Michael Lang ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/90 Wed, 01 Jul 2009 14:28:07 +0200 Linguistic competence in tertiary-level instruction in English and its relevance for student mobility https://jios.foi.hr/index.php/jios/article/view/109 Student and  teacher mobility are  important aspects of education within  the Bologna Process. Overcoming the language barrier is a precondition for following and providing instruction in a foreign  language.  A  survey  was  conducted  among  first-year  undergraduate  students  to determine  their  readiness  for  instruction  in English. The  survey  results  show  the  respondent profile, their assessment of instruction within an English language course, using other ways of acquiring  knowledge  and  self-assessment  of  their  command  of  English.  The  students'  self-assessment  of  motivation  for  learning  English  and  its  relevance  for  their  profession  are presented  along with  students'  interest  in  other  courses  offered  in English.  It  turns out  that, regardless  of  a  satisfactory  level  of  self-assesed  competence  in  English  and motivation  for learning English, students are not willing to enroll in the offered study courses in English. This may indicate that all the precoditions for mobility have not been fulfilled. The survey results are compared with  the corresponding results of another, more comprehensive, survey among graduate  students  at  the  Faculty  of  Organization  and  Informatics  conducted  at  the  whole University of Zagreb. Althouh the results obtained in the two surveys are not identical, they roughly correspond. <br /> Andreja Kovacic, Valentina Kirinic, Blazenka Divjak ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/109 Wed, 01 Jul 2009 14:22:42 +0200 Integrating Six Sigma into a Quality Management System in the Medical Device Industry https://jios.foi.hr/index.php/jios/article/view/97 <p><!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:HyphenationZone>21</w:HyphenationZone> <w:PunctuationKerning /> <w:ValidateAgainstSchemas /> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:Compatibility> <w:BreakWrappedTables /> <w:SnapToGridInCell /> <w:WrapTextWithPunct /> <w:UseAsianBreakRules /> <w:DontGrowAutofit /> </w:Compatibility> <w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" LatentStyleCount="156"> </w:LatentStyles> </xml><![endif]--> Six Sigma is a valuable management strategy to improve business processes, reduce development and production costs, increase profit margin and improve customer satisfaction. The purpose of this paper is to describe how applicable Six Sigma concepts may complement and support formal quality management systems (QMS) in the medical device industry.</p><p>A significant number of issues, which increase the development costs and times, is often found during different phases of a medical device life cycle. Some defects with high patient safety risk may result in dangerous and very costly product recalls.</p><p>The basic idea of this paper is to explore the possibilities of integrating Six Sigma techniques with an existing QMS throughout the entire life cycle of a medical device. This paper addresses how Six Sigma techniques, when appropriately integrated into the QMS at medical device companies, can eliminate defects earlier in the medical device life cycle, identify major opportunities for cost savings, focus on customer needs and expectations, and improve the overall business processes.</p> Nadica Hrgarek, Kerri-Anne Bowers ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/97 Wed, 01 Jul 2009 14:21:51 +0200 Web 2.1 : Toward a large and qualitative participation on the Web https://jios.foi.hr/index.php/jios/article/view/87 <!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:HyphenationZone>21</w:HyphenationZone> <w:PunctuationKerning /> <w:ValidateAgainstSchemas /> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:Compatibility> <w:BreakWrappedTables /> <w:SnapToGridInCell /> <w:WrapTextWithPunct /> <w:UseAsianBreakRules /> <w:DontGrowAutofit /> </w:Compatibility> <w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" LatentStyleCount="156"> </w:LatentStyles> </xml><![endif]--><!--[if !mso]><object classid="clsid:38481807-CA0E-42D2-BF39-B33AF135CC4D" id=ieooui></object> <mce:style><! st1\:*{behavior:url(#ieooui) } --> <!--[endif]--> <!-- /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0cm; margin-bottom:.0001pt; text-align:justify; mso-pagination:widow-orphan; font-size:11.0pt; mso-bidi-font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:"Times New Roman"; mso-ansi-language:EN-US; mso-fareast-language:EN-US;} p.Abstract, li.Abstract, div.Abstract {mso-style-name:Abstract; margin-top:0cm; margin-right:18.0pt; margin-bottom:0cm; margin-left:18.0pt; margin-bottom:.0001pt; text-align:justify; mso-pagination:widow-orphan; font-size:10.0pt; mso-bidi-font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:"Times New Roman"; mso-ansi-language:EN-US; mso-fareast-language:EN-US;} @page Section1 {size:612.0pt 792.0pt; margin:70.85pt 70.85pt 70.85pt 70.85pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.Section1 {page:Section1;} --> <!--[if gte mso 10]> <mce:style><! /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Tableau Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} --> <!--[endif]--> <p class="Abstract"><span lang="EN-US">This article presents the results of research done on Web 2.0 within the School of Information Sciences ESI. It aims to study the behavior of different academic actors who deal with information, among whom we cite teachers, students of masters and students of information sciences in Morocco, face to Web 2.0’s services. </span></p> <p class="Abstract"><span lang="EN-US">Firstly, it aims to evaluate the use and production of information in the context of Web 2.0. Then, it<span>   </span>attempts to assess those rates, to identify and analyze the causes of eventual problems and obstacles that academic actors face.<span>  </span>In fact, we intend to understand why information actors in the academic world use often Web 2.0’s services but do rarely produce qualitative content.</span></p> <p class="Abstract"><span lang="EN-US">To achieve the objectives set, we used the on-site survey method, which was based on an electronic questionnaire administered directly to our people via the Internet. We chose the electronic version of questionnaire in order to make an optimal use in terms of new technologies, to gain time and to reduce cost. Then, in order to deepen the understanding of the data collected, we complete the data collected by the questionnaire by an ongoing discussions with actors.</span></p> <p class="Abstract"><span lang="EN-US">Finally, to overcome the problems already identified, we intend to propose the elements of a new version of the Web called Web 2.1 offering new concepts<span>   </span>in order to encourage users to produce information of quality and make the Web more open to a larger community.</span></p> <p class="Abstract"><span lang="EN-US">This version maintains the current contents of<span>   </span>Web 2.0 and adds more value to it. Indeed, the content will be monitored, evaluated and validated before being published. </span></p> <p class="Abstract"><span lang="EN-US">In order to target valuable information, the new version of Web 2.1 proposes to categorize users into three groups: users who just use the contents, producers who use and produce content, and<span>  </span>validators<span>  </span>who validate the content in order to<span>  </span>target information that is validated and of good quality. Once the information is published, it must be well organized, well stored and archived or removed to avoid over-information.</span></p> Boubker Sbihi, Siham El jazouli, Kamal Eddine El kadiri ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/87 Sat, 30 May 2009 19:08:46 +0200 Interactions Validation Methods for Training Resources Control Engine Development https://jios.foi.hr/index.php/jios/article/view/94 The training courseware complexity proper selection is one of the most difficult factors looking from an intelligent application engine development. The application needs individual settings, the most relevant for the application structure matching to the users' individual expectations. What  is more,  the  obtained  structure  allows  controlling  dynamically  the  application within a time it is used. The application units description with their controlling functions allow joining the database components into individual composition of the courseware. The paper in-troduces several aspects of distance learning resources development, fulfilling the demanding assumptions of the interactive training units. <br /> Marcin Waldemar Bernaś, Jan Piecha ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/94 Sat, 30 May 2009 18:57:46 +0200 Double Separation Method for Translation of the Infrared Information into a Visible Area https://jios.foi.hr/index.php/jios/article/view/98 Information visualization refers to the wavelength area ranging from 400 to 700 nm. Areas in lower wavelengths ranging from 100 to 400 nm are translated into the visual area with the goal to protect information visible only by applying instruments adapted for the ultraviolet area. Our recent research work refers to the infrared wavelength areas above the visible specter up to 1000 nm. The scientific contribution of this paper is in setting the double separation method for printing with CMYK printing inks with the goal to detect graphic information in the infrared area only. An algorithm has been created for making visual basics in the overall visible specter containing material that responds in the infrared section. This allows planning of areas in all coloring types for one and the same document that contains a secure piece of information. The system is based on double transition transformation of the visible RGB1 information recognition into CMYK2 in the same document. Secure information is recognized with the help of instruments in the set wavelength range. Most of the experiments have been carried out by analyzing the same set of RGB records. Each sample in the set was a test unit coming from another source containing different IR3 components. Thus an innovative method of color mixing has been set where colors appear respectively in daylight and separately according to IR light programming. New IR cryptography is proposed as shown in the experimental work. <br /> Ivana Žiljak, Klaudio Pap, Vilko Žiljak ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/98 Sun, 24 May 2009 12:26:28 +0200 An Efficient Algorithm for Congestion Control in Highly Loaded DiffServ/MPLS Networks https://jios.foi.hr/index.php/jios/article/view/100 <p class="MsoNormal" style="margin: 0cm 0cm 0pt; text-indent: 11.35pt;"><span style="font-family: Times New Roman;"><span style="font-size: 10pt; font-family: TimesNewRoman;">The optimal QoS path provisioning of coexisted and aggregated traffic in networks is still demanding problem. All traffic flows in a domain are distributed among LSPs (Label Switching Path) related to <em style="mso-bidi-font-style: normal;">N</em> service classes, but the congestion problem of concurrent flows can appear. As we know the IGP (Interior Getaway Protocol) uses simple on-line routing algorithms (e.g. OSPFS, IS-IS) based on shortest path methodology. In QoS end-to-end provisioning where some links may be reserved for certain traffic classes (for particular set of users) it becomes insufficient technique. On other hand, constraint based explicit routing (CR) based on IGP metric ensures traffic engineering (TE) capabilities. The algorithm proposed in this paper may find a longer but lightly loaded path, better than the heavily loaded shortest path. LSP</span><span style="font-size: 10pt;" lang="EN-US"> can be </span><span style="font-size: 10pt; mso-ansi-language: EN;" lang="EN">pre-computed</span><span style="font-size: 10pt;" lang="EN-US"> much earlier, possibly during SLA (Service Level Agreement) negotiation process. </span><span style="font-size: 10pt; mso-ansi-language: EN-GB;" lang="EN-US"><span style="mso-spacerun: yes;"> </span></span><span style="font-size: 10pt;" lang="EN-US">As w</span><span style="font-size: 10pt; mso-bidi-font-family: Times; mso-ansi-language: HR;">e need firm </span><span style="font-size: 10pt;" lang="EN-US">correlation with</span><span style="font-size: 10pt; mso-ansi-language: EN-GB;" lang="EN-GB"> bandwidth management and traffic engineering (TE) the </span><span style="font-size: 10pt;" lang="EN-US">initial (pro-active) routing can be </span><span style="font-size: 10pt; mso-ansi-language: EN;" lang="EN">pre-computed </span><span style="font-size: 10pt;" lang="EN-US">in the context of all priority traffic flows (former contracted SLAs) traversing the network simultaneously.</span><span style="font-size: 10pt; font-family: TimesNewRoman;"> </span><span style="font-size: 10pt; mso-ansi-language: EN-GB;" lang="EN-GB">It</span><span style="font-size: 10pt;" lang="EN-US"> could be a very good solution for congestion avoidance and for better load-balancing purpose</span><span style="font-size: 10pt; font-family: TimesNewRoman;"> where links are running close to capacity. Also, such technique could be useful in inter-domain end-to-end provisioning, where bandwidth reservation has to be negotiated with neighbor ASes (Autonomous System). To be acceptable for real applications such complicated routing algorithm can be significantly improved. Algorithm was tested on the network of <em style="mso-bidi-font-style: normal;">M</em> core routers on the path (between edge routers) and results are given for <em style="mso-bidi-font-style: normal;">N</em>=3 service classes. Further improvements through heuristic approach are made and results are discussed.</span></span></p> Srecko Krile, Dario Kresic ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/100 Tue, 07 Apr 2009 22:28:49 +0200 An Algorithm for Detecting the Principal Allotment among Fuzzy Clusters and Its Application as a Technique of Reduction of Analyzed Features Space Dimensionality https://jios.foi.hr/index.php/jios/article/view/91 <span style="font-size: 11pt; font-family: ";Times New Roman";; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-US">This paper describes a modification of a possibilistic clustering method based on the concept of allotment among fuzzy clusters. Basic ideas of the method are considered and the concept of a principal allotment among fuzzy clusters is introduced. The paper provides the description of the plan of the algorithm for detection principal allotment. An analysis of experimental results of the proposed algorithm’s application to the Tamura’s portrait data in comparison with the basic version of the algorithm and with the NERFCM-algorithm is carried out. A methodology of the algorithm’s application to the <span style="mso-bidi-font-weight: bold;">dimensionality reduction</span><strong style="mso-bidi-font-weight: normal;"> </strong>problem is outlined and the application of the methodology is illustrated on the example of Anderson’s Iris data <span style="mso-bidi-font-weight: bold;">in comparison with the result of principal component analysis</span>. Preliminary conclusions are formulated also.</span> Dmitri A. Viattchenin ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/91 Sat, 21 Mar 2009 20:17:46 +0100 The Partial Mapping of the Web Graph https://jios.foi.hr/index.php/jios/article/view/101 The paper presents an approach to partial mapping of a web sub-graph. This sub-graph contains the nearest surroundings of an actual web page. Our work deals with acquiring relevant Hyperlinks of a base web site, generation of adjacency matrix, the nearest distance matrix and matrix of converted distances of Hyperlinks, detection of compactness of web representation, and visualization of its graphical representation. The paper introduces an LWP algorithm – a technique for Hyperlink filtration.  This work attempts to help users with the orientation within the web graph. Kristina Machova ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/101 Fri, 06 Mar 2009 19:33:26 +0100 Application of Benford's Law in Payment Systems Auditing https://jios.foi.hr/index.php/jios/article/view/108 <p class="MsoBodyTextIndent" style="margin: 0in 18.15pt 0pt; text-indent: 14.2pt;"><span style="font-style: normal; mso-ansi-language: EN-GB;" lang="EN-GB"><span style="font-size: x-small; font-family: Times New Roman;">Information systems auditing activities are mandatory in today business environments. There are numerous useful methods that can be conducted in such audits. One of contemporary methods is application of so-called Benford's Law. In this paper we examine ways of application of this law in investigation of certain number set with aim to make a conclusion if number set conforms to Benford's Law. As an examination target we used foreign payment system messages which are issued between foreign and domestic business entities i.e. commercial and central banks. We chose sample of 1.745.311 transactions and conducted examination for first, second and first two digits. We examine certain data subsets, created according to certain payment types, and investigate how Benford’s Law tests can be used in auditing. We also compare practical usefulness and note differences between various conformity tests in auditing environment. Results we achieved prove adequate potential of this law in audit practice.</span></span><span style="font-size: 11pt; font-style: normal; mso-ansi-language: PL; mso-bidi-font-size: 10.0pt;" lang="PL"></span></p> Mario Žgela, Zdravko Krakar ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/108 Sun, 01 Mar 2009 12:36:24 +0100 Theory of Microcrediting in Transitional Economies https://jios.foi.hr/index.php/jios/article/view/84 In the early 1970s, Bangladeshi banker and economist Dr. Muhammad Yunus designed microcrediting – a socially sensitive and rightful system of fighting poverty and high unemployment rates. His Grameen Bank for the poorest of the poor in Bangladesh has so far lifted more than 3.2 million of individuals and their families out of poverty. After initial successes at home, microcredit was put into service for reducing unemployment and alleviating poverty in numerous countries throughout the world. This paper explores specific problems that a typical transitional country (like Croatia), is likely to face, with unemployment – the source of a vast number of related problems in a transitional society – as the focal point. The authors have attempted to incorporate particularities of a transitional economy into the original microcrediting principles. As a solution to problems afflicting the domestic economy, the authors define a global microcrediting system framework on the macroeconomic level, assuming at the same time that microcrediting of socially vulnerable groups can resolve many problems of modern transitional societies. Arising from the authors' primary intention – to consider in depth the functionality of microcrediting in general transition conditions – a transitional microcrediting system has been defined in general terms, and a corresponding financial and mathematical model developed. Nikola Kadoić, Matija Kopić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/84 Thu, 11 Dec 2008 18:37:18 +0100 Conceptual Modelling of Complex Production Systems https://jios.foi.hr/index.php/jios/article/view/68 Complex system dynamics, structure and behaviour performances call for a wide range of methods, algorithms and tools to reach a model capable of finding optimal performing parameters. In the modelling process, it is up to the analyst to select the appropriate combination of methods, algorithms and tools to express significant system performances. Such a methodology for designing complex systems should be based upon conceptual modelling to perform a sensitive analysis of different system levels and views, allowing system representations for developing computer models.Complex systems, such as business systems with a continuous-discrete production process, require a well organised supply chain highly reactive to production assortment changes. Aligning two different production components distinctive in their behaviour is especially delicate at the production parameters transition point. Such system performances require distinctive designing methods that can follow the double nature of the production process behaviour in accordance with their entities dynamics caused by assortment changes. Consequently, such systems need different conceptual presentations for their purpose to be realized from different views and aspects. <br /> Nenad Perši ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/68 Tue, 09 Dec 2008 13:59:46 +0100 From the Editor https://jios.foi.hr/index.php/jios/article/view/86 The Journal of Information and Organizational Sciences – JIOS – is an interdisciplinary scientific journal with  a  focus  on  the  application  of  information  sciences  and  advances  in  organizational  sciences, as well as on  theoretical  contemplations  in  the fields  that  impact  information  sciences,  computer sciences and organizational sciences. JIOS is published twice a year, and is managed by a  team of professionals, all of whom are employed at the Faculty of Organization and Informatics, University of Zagreb.<br /><br />The Journal’s name and layout have already undergone several changes. As you can see, we have transformed our visual identity, and the format of the published papers has been changed as well.  However, it is not only the visual identity of the Journal that we have been working on, as we have also aimed to enhance its visibility, accessibility and referencing. As a result, we are proud to say that the number of databases the Journal is cited in has grown from one to seven, and we are putting a lot of our e. orts into broadening this number in future.<br /><br />As you already know, the Journal’s web address has been changed to www.jios.foi.hr and it is currently being managed by the Open Journal System, in which the entire communication from submitting the paper to its reviewing and publishing is conducted on-line.   <br /><br />In  this  issue  of  JIOS  a  selection  of  five  original scientific  papers  and  one  review  paper  has  been included covering the following topics: modern production management, fuzzy data, software and information systems development, online privacy and security, and fraud management. We hope you will find the papers interesting and challenging for your own research.<br /><br />Finally, we  encourage  you  to  submit  your papers  and  also  share with  us  your  recommendations, comments or observations about papers already published.  In  that  respect, we would very much appreciate your willingness to become a peer-reviewer for submitted papers, and thus contribute to the rising quality of JIOS.<br /> Neven Vrček ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/86 Tue, 09 Dec 2008 13:58:27 +0100 Factors and Predictors of Online Security and Privacy Behavior https://jios.foi.hr/index.php/jios/article/view/63 Assumptions and habits regarding computer and Internet use are among the major factors which influence online privacy and security of Internet users. In our study a survey was performed on 312 subjects (college students who are Internet users with IT skills) that investigated how assumptions and habits of Internet users are related to their online security and privacy. The following four factors of online security and privacy related behaviors were revealed in factor analysis: F1 – conscientiousness in the maintenance of the operating system, upgrading of the Internet browser and use of antivirus and antispyware programs; F2 –engagement in risky and careless online activities with lack of concern for personal online privacy; F3 – disbelief that privacy violations and security threats represent possible problems; F4 – lack of fear regarding potential privacy and security threats with no need for change in personal online behavior. Statistically significant correlations were found between some of the discovered factors on the one side, and criteria variables occurrence of malicious code (C1) and data loss on the home computer (C2) on the other. In addition, a regression analysis was performed which revealed that the potentially risky online behaviors of Internet users were associated with the two criteria variables. To properly interpret the results of correlation and regression analyses a conceptual model was developed of the potential causal relationships between the behavior of Internet users and their experiences with online security threats. An additional study was also performed which partly confirmed the conceptual model, as well as the factors of online security and privacy related behaviors.<br /><br /> Goran Bubaš, Tihomir Orehovački, Mario Konecki ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/63 Fri, 05 Dec 2008 20:33:28 +0100 Holistic approach to fraud management in health insurance https://jios.foi.hr/index.php/jios/article/view/80 Fraud present an immense problem for health insurance companies and the only way to fight fraud is by using specialized fraud management systems. The current research community focussed great efforts on different fraud detection techniques while neglecting other also important activities of fraud management. We propose a holistic approach that focuses on all 6 activities of fraud management, namely, (1) deterrence, (2) prevention, (3) detection, (4) investigation, (5) sanction and redress, and (6) monitoring. The main contribution of the paper are 15 key characteristics of a fraud management system, which enable construction of a fraud management system that provides effective and efficient support to all fraud management activities. We base our research on literature review, interviews with experts from different fields, and a case study. The case study provides additional confirmation to expert opinions, as it puts our holistic framework into practice.<br /> Štefan Furlan, Marko Bajec ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/80 Sat, 29 Nov 2008 22:16:14 +0100 Method for Estimating the Complexity of Designing Business Information Systems https://jios.foi.hr/index.php/jios/article/view/72 The most used method for determining the complexity of information systems is the function point method. This paper illustrates the new method, Data on Document (DOD) for estimating the complexity of designing business information systems. Similar methods are shown in brief. The objective is to explain the reasons for using the newly defined DOD method instead of the function point method. The new method is easier to use while the usage of function point method takes a lot of time and effort, and is more complex. The DOD method is compared to the function point method. A high degree of correlation was determined in observed information systems. The DOD method helps in early stages of the development of information systems, when it is not possible to apply the function point method.<br /> Patrizia Poščić, Mile Pavlić, Neven Vrček ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/72 Thu, 20 Nov 2008 20:08:30 +0100 Java Applications Development Based on Component and Metacomponent Approach https://jios.foi.hr/index.php/jios/article/view/79 Component based modeling offers new and improved approach to design, construction, implementation and evolution of software applications development. This kind of software applications development is usually represented by appropriate component model/diagram. UML, for example, offers component diagram for representation of this kind of model. On the other hand, metacomponents usage offers some new features which hardly could be achieved by using generic components. Firstly, implementation of program properties which are dispersed on different classes and other program units, i.e. aspects, is offered. This implies using automated process of assembling components and their interconnection for building applications, according to appropriate model offered in this paper, which also offers generic components usage. Benefits of this hybrid process are higher flexibility achieved by automated connection process, optimization through selective features inclusion and easier application maintenance and development. In this paper we offer an approach of application development based on hybrid component/metacomponent model. The component model is given by UML diagrams, while the metacomponent model is given by generator scripting model. We explain that hybrid approach on an example of Java Web application development. Danijel Radošević, Mario Konecki, Tihomir Orehovački ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/79 Mon, 10 Nov 2008 13:54:49 +0100 A Heuristic Approach to Possibilistic Clustering for Fuzzy Data https://jios.foi.hr/index.php/jios/article/view/74 <span style="font-family: TimesNewRomanPSMT; font-size: x-small;"><span style="font-family: TimesNewRomanPSMT; font-size: x-small;"><p align="left">The paper deals with the problem of the fuzzy data clustering. In other words, objects attributes can be represented by fuzzy numbers or fuzzy intervals. A direct algorithm of possibilistic clustering is the basis of an approach to the fuzzy data clustering. The paper provides the basic ideas of the method of clustering and a plan of the direct possibilistic clustering algorithm. Definitions of fuzzy intervals and fuzzy numbers are presented and distances for fuzzy numbers are considered. A concept of a vector of fuzzy numbers is introduced and the fuzzy data preprocessing methodology for constructing of a fuzzy tolerance matrix is described. A numerical example is given and results of application of the direct possibilistic clustering algorithm to a set of vectors of triangular fuzzy numbers are considered in the example. Some preliminary conclusions are stated.</p></span></span> Dmitri A. Viattchenin ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/74 Mon, 18 Aug 2008 20:43:03 +0200 An Uncontrolled Item of Enterprise ICT Innovation: the High Level Digital Divide https://jios.foi.hr/index.php/jios/article/view/54 The globalization phenomena strongly stresses western countries’ economies. Especially in industrial districts, companies are reacting with continuous innovations in product and process, based mainly on the introduction of ICT. This continuous organizational change process forces employees to keep in touch with the working environment in an endless learning process. Therefore, the introduction of new ICT seems to bring a cultural development for individuals. Is this always true? Our conviction is that the strong ICT impact generates a new form of digital-divide, a “High-Level Digital Divide” (HLDD): an increasing cultural distance between people able to follow the enterprise ICT evolution and complexity, and people with a lower cultural growth ability. An uncontrolled growth of HLDD may limit the evolution capacity of the enterprise and drop out people from labor market. Maurizio Pighin, Anna Marzona ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/54 Fri, 04 Jul 2008 19:22:12 +0200 Benchmarking User Perceived Impact for Web Portal Success Evaluation https://jios.foi.hr/index.php/jios/article/view/53 We describe an approach for success evaluation of Web portals by benchmarking user perceived impact with Multiple-Criteria Decision Analysis (MCDA). For impact measurement a questionnaire is used. The method is applied in a case study of four eGovernment portals and results are discussed. Daniel Delic, Hans-J. Lenz ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/53 Fri, 04 Jul 2008 19:21:37 +0200 Modeling Organizational Design - Applying A Formalism Model From Theoretical Physics https://jios.foi.hr/index.php/jios/article/view/71 Modern organizations are exposed to diverse external environment influences. Currently accepted concepts of organizational design take into account structure, its interaction with strategy, processes, people, etc. Organization design and planning aims to align this key organizational design variables. At the higher conceptual level, however, completely satisfactory formulation for this alignment doesn’t exist. We develop an approach originating from the application of concepts of theoretical physics to social systems. Under this approach, the allocation of organizational resources is analyzed in terms of social entropy, social free energy and social temperature. This allows us to formalize the dynamic relationship between organizational design variables. In this paper we relate this model to Galbraith's Star Model and we also suggest improvements in the procedure of the complex analytical method in organizational design. Robert Fabac, Josip Stepanić ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/71 Mon, 16 Jun 2008 13:24:14 +0200 An Investigation of Marketing via Mobile Devices - Attitudes of Croatian Marketing Experts https://jios.foi.hr/index.php/jios/article/view/55 Marketing activities supported by mobile devices offer great opportunities for direct communication with consumers without the barriers of time, place, location and other. This article explores opinions and expectations Croatian marketing experts have towards use of m-advertising and other available advertising media, where we take the perspective of marketing experts to predict the future of m-marketing and m-advertising in Croatia. The paper also discusses the relevance of m-advertising and investigates the future of m-marketing and m-advertising in Croatia. This research focuses mainly on understanding the potential and effectiveness of the use of mobile phones as a promotional medium, but we also try to recognize the level of concern of marketing experts associated with spam, relating to privacy intrusion and ethics components in m-advertising. Privacy and ethics concerns could create resistance to the adoption of m-advertising. Media selection becomes the most critical factor for the success of a promotional and advertising marketing campaign. Croatian experts still consider TV or newspapers the best way to reach a large number of potential consumers, but what are their expectations towards mobile advertising? To answer this question, we built a model that links attitudes towards advertising via classical media to the intention to use m-advertising. Damir Dobrinić, Stjepan Dvorski, Neven Bosilj ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/55 Mon, 16 Jun 2008 13:23:52 +0200 Shot Boundary Detection in Soccer Video using Twin-comparison Algorithm and Dominant Color Region https://jios.foi.hr/index.php/jios/article/view/59 The first step in generic video processing is temporal segmentation, i.e. shot boundary detection. Camera shot transitions can be either abrupt (e.g. cuts) or gradual (e.g. fades, dissolves, wipes). Sports video is one of the most challenging domains for robust shot boundary detection. We proposed a shot boundary detection algorithm for soccer video based on the twin-comparison method and the absolute difference between frames in their ratios of dominant colored pixels to total number of pixels. With this approach the detection of gradual transitions is improved by decreasing the number of false positives caused by some camera operations. We also compared performances of our algorithm and the standard twin-comparison method. Matko Šarić, Hrvoje Dujmić, Domagoj Baričević ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/59 Mon, 16 Jun 2008 13:22:35 +0200 Evaluation Framework for Quality Management Software https://jios.foi.hr/index.php/jios/article/view/49 <p>Identifying and specifying user requirements is an integral part of information systems design and is critical for the project success. More than 50% of the reasons for the project failure presented in the CHAOS report [36] and study of a US Air Force project by Sheldon et al. [33] are related to requirements. The goal of this paper is to assess the relevant user and software requirements which are the basis for an electronic quality management system selection in medical device companies. This paper describes the structured evaluation and selection process of different quality management software tools that shall support business processes. The purpose of this paper is to help the small to medium size medical device companies to choose the right quality management software which meets the company's business needs.</p> Nadica Hrgarek ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/49 Tue, 03 Jun 2008 12:44:55 +0200 PREDICTING THE INTENTION TO USE INTERNET – A COMPARATIVE STUDY https://jios.foi.hr/index.php/jios/article/view/5 This article focuses on an application of the Triandis Model in researching Internet usage and the intention to use Internet. Unlike other TAM-based studies undertaken to date, the Triandis Model offers a sociological account of interaction between the various factors, particularly attitude, intention, and behavior. The technique of Structural Equation Modeling was used to assess the impact those factors have on intention to use the Internet in accordance with the relationships posited by the Triandis Model. The survey was administered to Croatian undergraduate students at and employed individuals. The survey results are compared to the results of a similar survey that was carried out by two universities in Hong Kong. Slaven Brumec ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/5 Fri, 14 Mar 2008 10:09:24 +0100 FINGERPRINTS PREPROCESSING USING WALSH FUNCTIONS https://jios.foi.hr/index.php/jios/article/view/4 Minutiae classification and fingerprint classification in fingerprint evaluating process are very important. Fingerprint image contains about 150 minutiae’s. When we compare two fingerprint images, we compare latent and non latent fingerprint and we try to find 12 minutiae’s placed on the same position on latent and non latent fingerprint images. After fingerprint image pre-processing we can perform classification or we can try to find minutiae. In this paper we describe the process of minutiae classification for comparison purposes. For that purpose we use Walsh function and Walsh transforms. Paper describes minutiae classification which is relatively new in recognition systems and gives contribution for development of practical fingerprint recognition systems. Paper also gives contribution in the theoretical part due to the fact that Walsh functions were not implemented in fingerprint pre-processing systems so far. The new symbolic database model for fingerprint storage gives multifunctional foundations for future research. Miroslav Bača, Kornelije Rabuzin ##submission.copyrightStatement## https://jios.foi.hr/index.php/jios/article/view/4 Fri, 14 Mar 2008 10:08:52 +0100