INFORMATICA ECONOMICA

JOURNAL

 

CONTENTS

Vol. 26 No. 2/2022


A Proposed Model for Developing a Monitoring Solution for e-Business Enhancement
Alexandru COCIORVA 5
In the context of a growing, digitally developed society, new measures for improving e-business solutions are considered mandatory. One of these measures is monitoring enhancement, as an IT operation that has the purpose of optimizing resource utilization and processes from an e-business application. Thus, it is important not only to monitor e-business application infrastructure but also to create correction plans and solutions that can be, in some cases, applied as an immediate response to a system error. This article proposes a model for developing a monitoring application, detailing all its implications in the e-business world, in the context of the infor-mation society. The model is sustained by an experimental framework, along with theoretical basis, which will be developed in the pages of the present paper.
Keywords: Monitoring, ETL, E-business, Cloud, System, IoT


The Impact of ICT Investments on GDP in Central and South-East Europe
Dimitrie-Daniel PLĂCINTĂ, Elena-Aura GRIGORESCU, Bogdan-Ştefan POSEDARU, Florin-Valeriu PANTELIMON, Corina-Marina MIREA, Andrei BOBOCEA 20
This paper provides a comparative analysis between Central and Southeastern European (SEE) countries, members of the European Union, based on their investment in the ICT sector over a period of 2008-2019. The countries analyzed are as follows: Austria, Bulgaria, Croatia, Czech Republic, Greece, Hungary, Malta, Poland, Romania, Slovakia. The conclusion of the article is that there is a strong correlation (83%) between the ICT investments indicator and the GDP indicator, and there are negative correlations between the percentage of ICT personnel in total employment, business expenditure on R&D (BERD) in the ICT sector as a percentage of total R&D expenditure by NACE Rev. 2 activity, the R&D personnel in the ICT sector as percent of total R&D personnel by NACE Rev. 2 activity and GDP for the mentioned countries with the 2008-2019. These last three negative correlations were expected due to the focus on the outsourcing activities, inefficient R&D sector for the countries mentioned above from Central and South-East Europe during the 2008-2019 period.
Keywords: Evolution, Value added, ICT sector, Central and South-East Europe (SEE)


Development of Artificial Intelligence in the Automotive Field
Diana GHEORGHE 29
Artificial Intelligence has had its own development throughout the course of the years, evolving from early minimalistic algorithms to deep learning methods and neural networks. It has, however, faced critique, low points and had failed to be recognized as an industry worth investing in. Looking at what it has become today, the Artificial Intelligence scientific domain has met a rather unique field, the Automotive Industry. Cars have, themselves, progressed from serving basic purposes to providing comfort and serving as more than a mean of transportation to the driver and the passengers. The Auto industry is blooming as companies find new intelligent software features to be added to the infotainment systems. The Artificial Intelligence field has become an inseparable asset of the Automotive industry, the two developing together and merging into a promising future.
Keywords: Artificial Intelligence, Automotive Industry, Driver Profiling


Impact of Blockchain Technology: Benefits and Security Risk and Threats
Vlad-Andrei ROTUNDU 37
The accelerated dynamics of technological evolution has led to a reconfiguration of the security environment by addressing new vulnerabilities, risks and threats generated by the migration of risk-generating entities into cyberspace. These risks are also enhanced by the interest shown by criminal entities in technologies such as Blockchain, which are proving to be attractive in terms of existing functionalities. These changes in the security environment and, by extension, in the international economic environment, are challenges that require a proactive, sustainable and integrated approach. This article aims to analyze the impact of blockchain technology on society in terms of both the benefits and risks of exploiting this technology.
Keywords: Blockchain, Cryptocurrency, Organized Crime, Terrorism, Artificial Intelligence, Security Threats, Malware, Botnet


Perspectives and Reviews in the Development and Evolution of the Zero-Day Attacks
Cosmin Alexandru TEODORESCU 46
Zero-day attacks are among the most dangerous security incidents affecting both home users and corporate environments. Since 2021 broke the record for zero-day attacks, this study will present the state-of-the-art by clarifying the concept and giving a detailed analysis of the field. Unknown threats such as zero day or unknown malware software usually avoid traditional antivirus or antimalware protection solutions. This type of cyberattack disrupts the activity of companies, causing loss of time and money or compromising confidential data. By their nature, antivirus signatures cannot stop unknown threats. New and old security vendors claim that their "next generation" solutions use signature-based detection based on revolutionary technologies such as machine learning to identify zero-day attacks. Despite captivating stories and tempting words, the effectiveness of these solutions is unscientific, and it is rarely supported by reliable sources. The results of this paper will present the development of different well-known attacks by analyzing their evolution.
Keywords: Zero-day, Attacks, Vulnerability, Exploit, Security


IoT Security: Threats and Possible Solutions
Andrei-Robert CAZACU 57
Despite IoT being in the spotlight for several years now, Gartner still predicts a five time increase in number of devices from 2018 to 2028 [1], up to 1.9 billion units, which further intensifies the need for security among IoT nodes. Through the years, a significant amount of effort has been spent standardizing the communication and improving inter-operability among IoT devices. Even so, payload which is not properly secured, or impersonation of the node is still a reality, therefore, great attention still must be paid to the security model used. The main objectives of IoT security are to maintain confidentiality and integrity of the data, availability of services and authentication of the node.
Keywords: Internet of Things, Security, IoT, Fog computing, Cloud computing, MQTT, CoAP


Publishing Guide for Authors 65

INFOREC Association 67









About Us

Aim and Scope

Editorial Board

Call for Papers

Guide for Authors

Contact Us

Subject Index

Current Issue
Vol. 26, no.2, June 2022

Past Issues

Previous Topics

Author Index