Radomir RegodićZavod za izdavanje udžbenika, Beograd, Srbija ©MESTE JEL Category: G32, L86 ApstraktSavremeni uslovi poslovanja i način života doveli su do komercijalne ekspanizije i povećanje broja korisnika bežičnih mreža i pojave upotrebe pametnih telefona. Paralelno sa povećanjem broja korisnika sve je veći broj onih koji nisu upoznati sa sigurnosnim problemima. Bežične računarske mreže nose sa sobom brojne sigurnosne probleme. Laptopovi, pametni telefoni, tableti, i drugi uređaji se danas ne mogu zamisliti bez podrške za povezivanje na bežičnu mrežu. Međutim, nisu svi korisnici bežičnih mreža dobronamerni. Postoje zlonamerni ljudi koji će iskoristiti svoja znanja o bežičnim mrežama, i ne samo kompromitovati podatke koji se šalju kroz mrežu, nego i ukrasti poverljive informacije koje korisnici šalju, kao što su brojevi kreditnih kartica, šifre, itd. nesvesni ko ih sve vidi. Zbog toga je neophodno znati koje opasnosti sa sobom nosi upotreba bežičnih mreža. Kako su napadači uvek korak ispred, neophodan je stalan rad na zaštiti i sigurnosti korisnika bežičnih mreža. Cilj istraživanja ovog rada je da se prikažu bezbednosni problemi u bežičnim računarskim mrežama, slabosti same infrastrukture, i nedovoljna razvijenost bezbednosnih protokola. Društveni cilj ovog rada je da se ukaže svim korisnicima na realne probleme, odnosno pretnje sa kojima se susreću korisnici bežičnih mreža. Sam problem istraživanja, brojne slabosti i bezbednosni problemi u bežičnim računarskim mrežama imaju za cilj podizanje nivoa svesti korisnika i unapređenje nedovoljne razvijenosti upotrebe bezbednosnih protokola.Ključne reči: Bežične računarske mreže, slabosti, pretnje, napadi, šifra. Abstract Modern business conditions and lifestyles have led to commercial expansion and the increase in the number of wireless network users and theAdresa autora zaduženog za korespodenciju: Dušan Regodić emergence of smartphones. In parallel with the increase in the number of users, there is an increasing number of those who are not familiar with security issues. Wireless computer networks carry many security problems with them. Laptop computers, smartphones, tablets, and other devices today can not be imagined without an access to a wireless network. However, not all users of wireless networks are well-intentioned. There are malevolent people who will use their knowledge of wireless networks, to compromise data sent across the network. They also steal confidential information sent by users, such as credit card numbers, passwords, etc. Therefore, it is necessary to understand the dangers of using wireless networks. As attackers are always a step ahead, it is necessary to work continuously on the protection and security of wireless users. The aim of this paper is to present security issues in wireless computing networks, weaknesses of the infrastructure itself, and insufficient development of security protocols. The social goal of this work is to elaborate about the real problems or threats that wireless network users encounter. The main two problems of the...
Original scientific paper Metrics of the key performances indicators (KPIs) should be established into corporate digital forensic (DF) investigation process management to encourage performances effectiveness and efficiency improvement. The KPIs should lead to a quantitative assessment of gains in the DF investigation objectives, such as creating proved digital evidence (DE), reducing costs and DF investigation cycle time, etc. The KPIs metrics should address alignment with DF principles and standard operating procedures (SOP), forensic and legal requirements, digital evidence (DE) quality, stakeholder satisfaction and digital evidence legal admissibility. As a tool for quality improvement of the DF investigation processes, the KPIs metrics should be well defined and understood, and introduced by all stakeholders in the DF investigation process. The authors of this article suggested an integrated model of the corporate DF investigation management process. The model includes key activities, resources, performances objectives, risks and the KPIs metric. It is relevant for the development and management of the effective corporate DF investigation processes. Keywords: DF investigation process management; DF process performance; DF KPI metric; DF process management quality; integrated model Integrirani model upravljanja korporativnom digitalnom forenzičkom istragomIzvorni znanstveni članak Metrici indikatora ključnih performansi (KPI) treba uspostaviti u upravljačkom sustavu procesa korporativne digitalne forenzičke (DF) istrage, kako bi se ohrabrilo poboljšanje efektivnosti i efikasnosti performansi procesa. Oni trebaju omogućiti kvantitativnu procjenu dobiti u ciljevima DF istrage, kao što su izgradnja čvrstih digitalnih dokaza (DE), redukcija troškova i ciklusa DF istrage itd. Metrici KPI trebaju uključiti usklađivanje s DF principima i standardima, standardnim operativnim procedurama (SOP), forenzičkim i legalnim zahtjevima, smanjenjem troškova, kvalitetom DE, zadovoljstvom relevantnih sudionika i pravosudnom prihvatljivosti DE. Kao alat za poboljšanje kvaliteta procesa DF istrage, metrici KPI trebaju biti dobro definirani i shvaćena te da ih svi relevantni sudionici uvode u proces DF istrage. Autori ovog rada sugeriraju jedan integrirani model upravljanja procesom korporacijske DF istrage, koji obuhvaća ključne aktivnosti, resurse, ciljeve performansi, rizike i metrike KPI. Model je relevantan za razvoj i upravljanje efektivnim procesima DF istrage.
Abstract:One of the most important factors of an enterprise's efficiency is also adjusting of supply with demand requirements. Logistics, as an integral function of an enterprise that establishes and develops relations with the environment and, in a targeted manner, directs the subsystems of a company towards the main goal of its existence and operation, is the most appropriate tool for managing an enterprise in the modern dynamic environment. In many enterprises, inventory optimization is a major problem. Mainly, such enterprises are characterized by poor customer service, such as failure to adhere to delivery deadlines. Bearing in mind the state of Serbian companies, few enterprises can boast their applied scientific knowledge in the field of inventory optimization in practice. The subject of our research is the optimization of the inventory in the company Benlian Food Niš. The management of the company finds it rather significant to know approximately exact quantities needed for the next year. Given the fact that this is an importing company with its production, too, more precise quantities would be of great help, as this would enable management to make more adequate decisions on when and how many products to import and produce.
Abstract:In order to maintain their competitiveness or to achieve the desired position in the dynamic market environment, a vast majority of companies are turning to service-oriented business concepts. These changes require the design of a new business model that will take into account a new business approach. This task presents a great challenge for company managers, who are often burdened with the traditional view on business models. However, in order to facilitate this challenge, the appropriate approach and tools are required. The well-known approaches to development of service-oriented business provide informal and semi-formal tools that can produce ambiguities and which give limited possibilities for application of software tools in design. This paper presents service-oriented business as an ontological meta model aimed at solving the above mentioned problem. The developed meta model represents a unique conceptualization and it contributes to a more precise definition of service-oriented business concepts. The paper illustrates one possible application of the developed meta model for creating serviceoriented business model of a certain organisation (company) through meta model instance. This application is implemented in an insurance company, life insurance sector.
Apstrakt -Isticanje novog polja forenzike, forenzičkog računovodstva, je prouzrokovano brzim promjena u elektronskom poslovnom okruženju te naglim porastom broja poslovnih prevara. Iako prevare možemo naći u mnogim oblicima, najčešće se svode na krađu sredstava i informacija ili zloupotrebu nečije imovine u obliku informacija. U današnjem svijetu, računovođe mogu najviše pomoći u istrazi korporativnih, ili bolje rečeno finansijskih prevara, koje danas preovladavaju u digitalnom okruženju. U ovom radu, autori su predložili model integrisane forenzičke istrage poslovnih prevara koji predstavlja spoj računovodstvenog, revizorskog i digitalnog istražnog postupka. No, prije nego što ovaj pristup može biti propisno verifikovan, potrebno je izvršiti dodatna ispitivanja.Ključne riječi -prevare, finansijske prevare, forenzičko računovodstvo, digitalna forenzička analiza Abstract -A new field of forensic accounting has emerged as current practices have been changed in electronic business environment and rapidly increasing fraudulent activities. Although fraud is taking many forms, it is usually found as theft of funds and information or misuse of someone's information assets. In today's world, accountants are the most helpful people to investigate corporate, or should we say financial frauds, which prevail in digital environment these days. In this paper, the authors proposed a model of integrated forensic investigation as a combination of accounting, auditing and digital forensic investigative process. Before this approach can be properly validated some future work needs to be done, too.Keywords -fraud, financial fraud, forensic accounting, digital forensic analysis I. UVOD Savremeno doba digitalizacije podataka i modernizacija poslovnih procesa doveli su do stvaranja novih mogućnosti za počinioce finansijskih prevara, ali i za njihove istražitelje. Na mnogo načina se promijenio proces sprovođenja istrage, metode koje interni revizori koriste za planiranje i obavljanje posla, kao i pristupi koje koriste eksterni revizori da procijene rizik i izvrše reviziju. U isto vrijeme, javlja se i potreba za primjenom digitalnih forenzičkih alata u istrazi i obezbjeđivanju dokaza o kriminalnim radnjama u finansijskim izvještajima vršenih putem prikupljanja i obrade dokaza pohranjenih na računaru ili drugom nosiocu digitalnih podataka, a koje mogu biti vezan za određenu vrstu protivzakonitih aktivnosti.Generalno posmatrano, prevare obuhvataju širok spektar ilegalnih aktivnosti jer se, za razliku od grešaka, sastoje u osmišljenom i namjernom pripremanju dokumenata, činjenica, informacija i situacija da bi se stvorili preduslovi da se neko na bazi pogrešnog predstavljanja činjenica u osmišljenim situacijama i okolnostima, podstakne da povjeruje u neistinu i u skladu sa njom da se ponaša i prema tome, trpi gubitak ili štetu [18]. Krađa sredstava ili informacija ili zloupotreba nečije imovine koja može dovesti do gubitka novca, povjerenja i/ili ugleda klijenta na tržištu su njeni najčešći oblici. Prevare se, najčešće, pojavljuju kao fina...
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.