Informatica Economica Vol. 15 No. 2/2011

Issue Topic: Data Mining

Issue Editor: Cristian CIUREA, PhD

CONTENTS

A Layered Software Architecture for the Management of a Manufacturing Company
Domenico CONSOLI 5
In this paper we describe a layered software architecture in the management of a manufactur-ing company that intensively uses computer technology. Application tools, new and legacy, after the updating, operate in a context of an open web oriented architecture. The software architecture enables the integration and interoperability among all tools that support business processes. Manufacturing Executive System and Text Mining tools are excellent interfaces, the former both for internal production and management processes and the latter for external processes coming from the market. In this way, it is possible to implement, a computer integrated factory, flexible and agile, that immediately responds to customer requirements.
Keywords: ICT, Service Oriented Architecture, Web Services, Computer-Integrated Factory, Application Software

IT&C Impact on the Romanian Business and Organizations. The Enterprise Resource Planning and Business Intelligence Methods Influence on Manager’s Decision: A Case Study
Eduard EDELHAUSER 16
The aim of the paper is to study the use of the advanced management methods in the 2010 year in Romania. The research results were obtained with the use of a questionnaire, and our purpose was to demonstrate some hypothesis concerning identify the effect that implementation of ERP and BI applications in all functions of an organization has over the management method and the IT&C based decision. The originality of this article consists in the study realized in computer based advanced management methods implementation. The study is limited to the SIVECO companies portfolio. The purpose of the study was to demonstrate some hypothesis concerning the relationship between the size of the organization, the management method used, and the role of IT&C in decision making. The practical value of this study consists in the measurement of the impacts of contingency factors, including size, and in the assessment of the ERP systems success. The results demonstrate that the relationship between firm size and ERP success is moderated by IT assets.
Keywords: Enterprise Resource Planning, Business Intelligence, Management Methods, Balanced Scorecard

Prototype of Intrusion Detection Model using UML 5.0 and Forward Engineering
Muthaiyan MADIAJAGAN, Pragya GARG 29
In this paper we are using UML (Unified Modeling Language) which is the blueprint language between the programmers, analysts, and designer’s for easy representation of pictures or diagrammatic notation with some textual data. Here we are using UML 5.0 to show “prototype of the Intrusion Detection Model” and by explaining it by combining various parts by drawing various UML diagrams such as Use cases and Activity diagrams and Class Diagram using which we show forward engineering using the class diagram of the IDM( Intrusion Detection Model). IDM is a device or software that works on detecting malicious activities by unauthorized users that can cause breach to the security policy within a network.
Keywords: Intrusion, Anomaly, UML, Forward Engineering, Intrusion Detection

Initiatives in the Romanian eHealth Landscape
Dan-Andrei SITAR-TAUT, Adela SITAR-TAUT, Oana-Maria PENCIU, Daniel MICAN 38
Even if the foundation in the field of eHealth was set almost half century ago, the current achievements’ status does not place Romania on a good position in a European ranking. The efforts made during the last years are promising, but they still cannot surpass the enormous gaps in many eHealth indicators. This is not a surprising fact because the eHealth level must be sustained by a healthy and stable sanitary system and infrastructure, which, in our country, is almost in collapse, especially now in the context of global economic and financial crisis. We consider being guilty for these circumstances the lack of a clear and solid mid-term strategy developed at the level of the Ministry of Health (MoH), harmonized in a global legal and regulatory framework as well, and also the non-correlated researcher groups interests. The good attitude of practitioners regarding the challenges of new technologies and the political will can still give a chance to the Romanian healthcare system and to its modern faces.
Keywords
: eHealth, Telemedicine, Public Health Policies, EMR, EHR, eHealth Projects

Predicting Product Performance with Social Media
Liviu LICĂ, Mihaela TUTĂ 46
Last 20 years brought massive growth in IT&C world. Mobile solutions such as netbooks, laptops, mobile phones, tablets enable the wireless connection to the Internet. Anyone can ac-cess it anytime and anywhere. In this context, a part of the activities from the real world have a correspondence in the online discussions. Social media in general and social networks in particular have turned into marketing tools for organizations and a place where people can express their opinions and attitudes about products.The paper shows how social media can be used for predicting the success of a product or service. To showcase this, two case studies are presented; a test to prove that the conversations that take place in social media are a good indicator of success and the second is an exercise to predict the winner of the Oscar for best picture in 2011.
Keywords: Social Media, Social Networks, Prediction, Movie, Internet

Trading Platform for the Global Warrant Markets
Iosif ZIMAN 57
Global warrant markets are among the most active financial markets in the retail derivatives investment landscape currently. In this context some of the most relevant markets in the last years have been the ones across Asia and in particular Hong Kong, Korea and Japan. This paper introduces the financial instruments used in connection with the warrant markets, pre-sents and offers suggestions for setting up a generic warrant market making system and in-troduces the main concepts and components that need to be taken into account when develop-ing these systems targeting an exchange driven or E-Businesscontext.
Keywords: Trading, E-Business, Warrant, Market Making

Techniques and Methods to Improve the Audit Process of the Distributed Informatics Systems Based on Metric System
Marius POPA 69
The paper presents how an assessment system is implemented to evaluate the IT&C audit process quality. Issues regarding theoretical and practical terms are presented together with a brief presentation of the metrics and indicators developed in previous researches. The implementation process of an indicator system is highlighted and linked to specification stated in international standards regarding the measurement process. Also, the effects of an assessment system on the IT&C audit process quality are emphasized to demonstrate the importance of such assessment system. The audit process quality is an iterative process consisting of repetitive improvements based on objective measures established on analytical models of the indicators.
Keywords: Informatics Audit, Assessment, Indicator Implementation

An Architectural Solution of Assistance e-Services for Diabetes Diet
Vasile AVRAM, Diana AVRAM 79
The aim of this paper is to outline the requirements and main architecture for a useful tool for determining the nutrition facts of food for people having Type 2 Diabetes. This diabetes is used only to establish the target audience, a “mass of people” having, maybe, to less in common regarding the computer usage skills. The characteristics of the target audience (huge number, diversity of habits and behaviors, computer usage skills) requires a solution based on web services delivered at least partly as a standalone/ portable application, build from Web services and provided with means for domain knowledge dissemination and usage.
Keywords: Software Architecture, Knowledge Management, SIK, Business Rules, Type 2 Diabetes

Theoretical and Factual Meaning in Assisted Instruction
Gabriel ZAMFIR 94
Technology determines new borders for knowledge domain while education reflects more complex activities. A solution in this context is to integrate technology in the educational system, extending it as e-Education.E-Education is a dynamic system and a conceptdeveloped on three kinds of infrastructure which are likely to emerge: technological infrastructure, conceptual infrastructure of the type ofthe study programmes, and cognitive infrastructure of all participants involved in the teaching-learning activities. The purpose of this paper is to provide a meaningful framework for contextual learning, developed on the idea that a personal computer can deliver many skills to a student, but only academic environment can connect those skills to a modern community where they belong. This approach is developed on the much known principle which sustain that the educational system becomes the engine of the learning society.
Keywords: Scientific Research in E-Education, Assisted Instruction, E-Classroom, Didactic Knowledge, Concepts Map Approach

Building Robust E-learning Software Systems Using Web Technologies
Diana BUTUCEA, Cezar Liviu CERVINSCHI 107
Building a robust e-learning software platform represents a major challenge for both the project manager and the development team. Since functionalities of these software systems improves and grows by the day, several aspects must be taken into consideration – e.g. workflows, use-casesor alternative scenarios – in order to create a well standardized and fully functional integrated learning management system. The paper will focus on a model of implementation for an e-learning software system, analyzing its features, its functional mechanisms as well as exemplifying an implementation algorithm. A list of some of the mostly used web technologies (both server-side and client-side) will be analyzed and a discussion over major security leaks of web applicationswill also be put in discussion.
Keywords: E-learning, E-testing, Web Technology, Software System, Web Platform

A Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Applications
Silvia TRIF, Adrian VIŞOIU 119
This paper present and implement a Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Application. In the developing process is used a Windows Phone 7 application that interact with a WCF Web Service and a database. The types of Business Intelligence Mobile Applications are presented. The Windows mobile devices security and restrictions are presented. The namespaces and security algorithms used in .NET Compact Framework for assuring the application security are presented. The proposed architecture is showed underlying the flows between the application and the web service.
Keywords: Security, Secure Architecture, Mobile Applications, Business Intelligence, Web Service

Reconfigurability Function Deployment in Software Development
Stelian BRAD, Adrian CHIOREANU, Mircea FULEA, Bogdan MOCAN, Emilia BRAD 130
In the forthcoming highly dynamic and complex business environment high-speed and cost-effective development of software applications for targeting a precise, unique and momentary set of requirements (no more-no less) associated to a customized business case will bring sig-nificant benefits both for producers and users. This requires a life cycle change-oriented ap-proach in software development. In this respect, designing software with intrinsic evolutionary resources for reconfiguration represents the sound approach. A methodology for concurrent deployment of reconfigurability characteristics in software applications is introduced in this paper. Its potential is exemplified in a case study dealing with web-based software tools to support systematic product innovation projects.
Keywords: Reconfigurability, Software Development, Innovation, TRIZ, RAD

On Best Practices for Risk Management in Complex Projects
Dan BENŢA, Ioan Marius PODEAN, Cristian MIRCEAN 142
Risk management shall be proactive. This is one of the key preliminaries to cope with the challenges of complex projects. An overarching and consistent view on project risks and uncertainties is necessary to follow a holistic approach in project risk management. Uncertainty is inevitable since projects are unique and temporary undertakings based on assumptions and constraints, delivering project results to multiple stakeholders with different requirements. Project management can be seen as an attempt to control this uncertain environment, through the use of structured and disciplined techniques such as estimating, planning, cost control, task allocation, earned value analysis, monitoring, and review meetings. Each of these elements of project management has a role in defining or controlling inherent variability in projects. Project risk management provides approaches by which uncertainty can be understood, assessed, and managed within projects. A number of associations (e.g., Project Management Institute – PMI®, International Project Management Association – IPMA,or Network of Nordic Project Management Associations - NORDNET) work constantly in acquiring, improving, and standardizing best practices in project management.Based on the industrial practice, this paper outlines strategies to identify, prioritize, and mitigate risks for achievement of project’ or organizational objectives.
Keywords: Project Management, Risk Management, Best Practices of Management, Standardization of Management, Maturity of Organizations

Survey of the Use of Steganography over the Internet
Lavinia Mihaela DINCA 153
This paper addresses the use of Steganography over the Internet by terrorists. There were ru-mors in the newspapers that Steganography is being used to covert communication between terrorists, without presenting any scientific proof. Niels Provos and Peter Honeyman conducted an extensive Internet search where they analyzed over 2 million images and didn’t find a single hidden image. After this study the scientific community was divided: some believed that Niels Provos and Peter Honeyman was conclusive enough other did not.
This paper describes what Steganography is and what can be used for, various Steganography techniques and also presents the studies made regarding the use of Steganography on the Internet.
Keywords: Steganography, Secret Communication, Information Hiding, Cryptography

Collaborative Systems – Finite State Machines
Ion IVAN, Cristian CIUREA, Sorin PAVEL 165
In this paper the finite state machines are defined and formalized. There are presented the collaborative banking systems and their correspondence is done with finite state machines. It highlights the role of finite state machines in the complexity analysis and performs operations on very large virtual databases as finite state machines. It builds the state diagram and presents the commands and documents transition between the collaborative systems states. The paper analyzes the data sets from Collaborative Multicash Servicedesk application and performs a combined analysis in order to determine certain statistics. Indicators are obtained, such as the number of requests by category and the load degree of an agent in the collaborative system.
Keywords: Collaborative System, Finite State Machine, Inputs, States, Outputs

Implementing SaaS Solution for CRM
Adriana LIMBĂŞAN, Lucia RUSU 175
Greatest innovations in virtualization and distributed computing have accelerated interest in cloud computing (IaaS, PaaS, SaaS, aso). This paper presents the SaaS prototype for Customer Relationship Management of a real estate company. Starting from several approaches of e-marketing and SaaS features and architectures, we adopted a model for a CRM solution using SaaS Level 2 architecture and distributed database. Based on the system objective, functionality, we developed a modular solution for solve CRM and e-marketing targets in real estate companies.
Keywords: E-Marketing, SaaS Architecture, Modular Development

IT Clusters as a Special Type of Industrial Clusters
Catalin BOJA 184
Economic and industrial clusters have become in the last years the object of a new economic theory that has proved important for regional and even national (Porter, 1990) development. The papers objective is to emphasize the particularities of IT clusters, especially their characteristics that are derived from the special features of this type of technological clusters. IT clusters represent an important type of technology clusters and at global view they represent most successful and efficient examples of clusters. The paper describes the characteristics that are behind the creation, the continuous development and the success of the IT cluster and aims to emphasize those particular features which define an IT cluster and separate it from another type of industrial cluster. In order to emphasize the importance factors, there are described different types of IT clusters.
Keywords: Quality, Cluster, Characteristic, IT

Publishing Guide for Authors 194

Inforec Association 197