The paper presents the relationship between the level of logistics and the solu-tions applied in the agribusiness enterprises. The research was conducted in 504 companies. The logistics level was determined on the basis of contribution of cost of logistics in the overall expenses of the company and based on existence of a separate logistics department in a given company. Relevant dependence has been detected only between existence of a separate organisational unit dedicated to logistics and the solutions applied in the area of logistics. For level of logistics costs, in most cas-es, no significant correlation with the use of information technology was seen. The share of cost of logistics in company expenses was determined to be a poor indicator of level of logistics and modernity of the company.
The paper presents the concepts and implementation of application for monitoring, analysis and reporting of enterprise information systems security. The purposes of the application are: comprehensive support for IT security administrator and auditors in checking information security and systems security levels, checking security policy implementation and compliance with security standards required by certificates and other regulations. The paper presents the requirements for the system, its architecture and implementation of particular components, evaluation of application and tests executed with regard to security standards. According to the authors, it is the IT management system which many organizations and solution providers lack. It results in that the effectiveness of the management of information security in these organizations may be less than expected.
Background: Organisations nowadays operate in a very dynamic environment, and therefore, their ability of continuously adjusting the strategic plan to the new conditions is a must for achieving their strategic objectives. BSC is a well-known methodology for measuring performances enabling organizations to learn how well they are doing. In this paper, “BSC for IS” will be proposed in order to measure the IS impact on the achievement of organizations’ business goals. Objectives: The objective of this paper is to present the original procedure which is used to enhance the BSC methodology in planning the optimal targets of IS performances value in order to maximize the organization's effectiveness. Methods/Approach: The method used in this paper is the quantitative methodology - linear programming. In the case study, linear programming is used for optimizing organization’s strategic performance. Results: Results are shown on the example of a case study national park. An optimal performance value for the strategic objective has been calculated, as well as an optimal performance value for each DO (derived objective). Results are calculated in Excel, using Solver Add-in. Conclusions: The presentation of methodology through the case study of a national park shows that this methodology, though it requires a high level of formalisation, provides a very transparent performance calculation.
The use of information systems in contemporary administration has been constantly growing. In Poland this trend is still at an early stage of development, however it can be expected that its importance will be also gradually increasing. From the perspective of administration auditing, the growing application of information systems in the public sector is advantageous, because it creates new opportunities for administration auditing. This is due to the fact that many activities undertaken by the administration with the use of such systems leave digital traces, which allows for tracking entities that undertake these activities. Such traces are attributed to more and more activities, as a result of which big data is being created. Administration auditing may be performed on the basis of big data, and additionally such a process can be, to a large extent, IT-based and automated, thanks to which auditing will be more effective and less costly, and thus more efficient.
Local self-government, as a structure within which civil society can thrive, where the digital competencies of the local and regional community come to life, must have the right tools to ensure adequate cybersecurity. These days, e-government, also at the local self-government level, is a common form of performing public tasks, and as a result, its activities in cyberspace must be properly secured. Many tasks are performed using ICT systems that are exposed to external attacks, and therefore, they should meet the appropriate security standards. The article refers to the legal solutions in the field of cybersecurity operating within local self-government in Poland and Hungary.
The article presents directions for development of end-user-oriented information systems in transport. Characteristics of databases belonging to the trend of NoSQL have been enumerated as well as the represented data models. The example of a relational model transformation to a graph form and the concept of application of a graph database for connections search in public transport system have been presented. The general concept of a distributed information system has been presented which uses NoSQL databases in particular modules.
Nowadays it is very important for a business entity to succeed in the competitive environment. Business enterprises look for ways to significantly and radically improve the efficiency of their corporate processes in order to facilitate the reduction of costs below the maximum level while at the same time maintaining the required quality of products and services. One of the ways to potentially reduce company costs is to implement the enterprise information system into the company environment. To become successful companies cannot simply rely upon their information system only, believing that the system implementation will improve their production efficiency. If core processes and their management are not working, no information system will lead a company to success.
IT systems are seen as invaluable support to financial and accounting specialists, however, many enterprises are unable to use their analytical potential. The paper validates a positive contribution of the systems to the effectiveness of management control in small and medium-sized companies. The research included 129 Polish SMEs. Even though IT systems of ERP and BI classes were not commonly available (they were used by 18.6% of SMEs), it was observed that financial and management accounting received adequate IT support (in 58.1% of cases). Furthermore, sales and customer service were seen as domains were ITS contributed the most to the business. Finally of 51 SMEs which had no access to advanced software, only 7 found that situation negative.
The article presents the usage of OPC standard on all levels of integration of manufacturing management subsystem at the integrated management information system. The structure of manufacturing management subsystem, with taking into consideration MES, SCADA and PLC systems, is presented in the first part of the article. Next, the most often used technological standards of integration on system and application levels are characterized. The final part of the article presents using OPC standard, with taking into particular consideration the specification of OPC Unified Architecture, in order to integrate manufacturing management subsystem on the system, application and business process level. This integration allows the data flow in real time to all subsystems of integrated management information system, what has a significant impact on the efficiency of the functioning of an enterprise.
Selection and proper application of business process modeling methods and techniques have a significant impact on organizational improvement capabilities as well as proper understanding of functionality of information systems that shall support activity of the organization. A number of business process modeling notations were popularized in practice in recent decades. Most significant of the notations include Business Process Modeling Notation (OMG BPMN) and several Unified Modeling Language (OMG UML) extensions. In this paper, the assessment whether one of the most flexible and strictly standardized contemporary business process modeling notations, i.e. Rational UML Profile for Business Modeling, enable business analysts to prepare business models that are all-embracing and understandable by all the stakeholders. After the introduction, methodology of research is discussed. Section 2 presents selected case study results. The paper is concluded with a summary.
Experts working with data on crime, victims and offenders, or the criminal justice system, have been drawing attention to the shortcomings in their recording and reporting systems. Such shortcomings result in a biased or incomplete depiction of crime statistics and trends as well as sentencing, which can have a negative impact on how penal policy is formulated and assessed. Current efforts to revise official crime statistics aim to unify and integrate the information systems of the different criminal justice institutions that generate such data. However, these systems do not only vary across different departments but also within the same department or even institution. The authors use the findings from their recent study in which they analyzed the current system for recording and reporting data on violent sexual crime and the application of quasi-compulsory treatment and security detention. They illustrate the complexity of the issue, highlighting some characteristic shortcomings of official crime statistics, and put forth some of the practical implications for our understanding of crime and criminal justice and the penal policy-making process.
Artykuł przedstawia cloud computing jako model świadczenia usług informatycznych. Syntetycznie scharakteryzowano samo pojęcie. Omówiono podstawowe jego cechy, modele oferowania usług oraz modele wdrożeniowe. Zaprezentowano także wybrane dane statystyczne dotyczące rynku tego typu usług. Zasadniczą część opracowania stanowi prezentacja barier wdrożeniowych tej koncepcji. Zaprezentowano wyniki badań własnych autora oraz dokonano ich syntetycznego omówienia.
EN
This paper presents cloud computing as a model for the provision of IT services. It contains a synthetic view of CC. Its basic features, models of service provision and implementation models were described. The paper also presents selected statistics on the market for this type of services. The main part of the study presents implementation barriers of this concept. The results of the author’s own research were presented and synthetically discussed.
At present, one of the main areas ensuring the proper functioning of services responsible for security is ICT systems, which are used to obtain, store and process relevant information and to support the performance of statutory tasks. When carrying out their statutory tasks, the Polish police use centralised, advanced IT systems and databases, e.g. the National Police Information System (hereinafter referred to as the KSIP). At the same time, the development of technology generates the need to constantly modify this line of activity. The necessity of being adaptable to the ever-changing environment has encouraged the Police Academy in Szczytno and its partners to launch the project entitled: Information and analysis system to support risk management when planning and carrying out police operations (hereinafter referred to as the SIA). Innovative in nature, the project is being implemented based on, among others, expert interviews conducted among police commanding officers. The SIA is being built using the data collected and stored in the police ICT systems and obtained from other sources. The works will result in the development of a possibly full application with planning and decision-making mechanisms and forecasting algorithms, which will provide information on probable successes and necessary investments in possible scenarios of police activities to be undertaken in a specific situation of massive disturbance to public order and safety. The proposed solution is the IT system that serves both as a presentation and simulation of possible incidents in the virtual environment. The author presents the functioning of selected modern ICT systems, and their role and importance in supporting decision-making processes when ensuring public order and safety.
The relationship between systems development and systems methodologies is discussed in this paper. As the measure of system development on the macro level, Gross Domestic Product (GDP) is assumed to be the consequence of systems Research and Development (R&D), which is estimated indirectly by the number of published articles in the last 40 years. It was supposed that profit and governmental organizations are systems comprised of Production, Management and Information Systems (IS), and that their quality performance is related with its income generation, which in the future would impact the overall GDP of a country. Under such view, we also assume that such organizational processes are qualitatively improved by the application of knowledge generated by research publications, and in this study, we research for the specific case of the Systems Approach (SA), Systems Engineering (SE), Operational Research (OR), Information Systems Development (ISD) and Simulation, as the research topics for coping with organizational improvement. We looked for the articles containing the afore-mentioned variables as topic keywords, which indicate sufficient correlations with GDP and carrying information on sustainable development. We found a positive trend in the evolution of research methodologies, such as SE, ISD and OR, towards a Systems Approach and Simulation as a holistic methodology. As a result, we have proved the dynamic hypothesis of a high correlation between GDP of Top 10 + Slovenia and R&D expressed by the above-mentioned variables.
Purpose Investigation of the current state and determination of the role of information systems and technologies in the management of the enterprise to increase the effi ciency of making managerial decisions. Methods Th e work used such general scientifi c methods as observation, comparison, generalization, abstraction, formalization, analysis, synthesis, deduction and induction, analogy, systemic methods, and others. Results Th e introduction and use of information systems and technologies is an indispensable condition for the activities of a modern enterprise. It facilitates the adoption of sound management decisions: increasing the competitiveness of an enterprise and enhancing economic security. Th is will not only ensure the eff ectiveness of making managerial decisions in the activities of the enterprise, and as a consequence will be a guarantee of the development of the country’s economy. Discussion Th e development of the world economy is greatly infl uenced by the dynamic development of the world market of information systems and technologies, as the introduction of new information systems and technologies makes it possible to increase the effi ciency of using enterprise resources, optimize business processes of production, facilitate the exchange of information, and much more. Th e use of information systems and technologies by enterprises in their work allows solving tasks from operational management to improving the eff ectiveness of making managerial decisions.
In the paper, we propose a method for mining real-estate listings using clustering algorithms intended for numerical data. The presented approach is based on information systems over ontological graphs. Such information systems have been proposed to deal with data in the form of concepts linked by different semantic relations. A special attention is focused on preprocessing steps transforming advertisements in the textual form into information systems defined over ontological graphs, as well as on encoding attribute values for clustering algorithms.
PL
W artykule zaproponowano metodę eksploracji serwisów ogłoszeń nieruchomości przy użyciu algorytmów klasteryzacji przeznaczonych dla danych numerycznych. Przedstawione podejście bazuje na systemach informacyjnych nad grafami ontologicznymi. Systemy informacyjne tego typu zaproponowane zostały w celu poradzenia sobie z danymi w postaci pojęć powiązanych ze sobą za pomocą różnych relacji semantycznych. Specjalna uwaga została zwrócona na etap wstępnego przetwarzania danych z ogłoszeń w postaci tekstowej do postaci systemów informacyjnych zdefiniowanych nad grafami ontologicznymi jak również na kodowanie wartości atrybutów dla algorytmów klasteryzacji.
In the era of globalization, more and more threats to the IT systems of many global companies will be observed. More and more attacks are effective and the losses caused by intrusions are systematically growing. The problem of ensuring the security of networks and computer systems is one of the most important issues of modern computer science. Today, more research is being done around the world to ensure the security of operating systems and applications.
Celem analizy jest proces zarządzania bezpieczeństwem informacji w warunkach kryzysu. Konstrukcja składa się z wprowadzenia, trzech zagadnień problematycznych oraz podsumowania. Początkowo autor zdefiniował pojęcie bezpieczeństwa informacji. Następnie omówił znaczenie roli i wiedzy w zarządzaniu organizacją odnosząc się do literatury zagranicznej. W dalszym etapie przeanalizował procesy składające się na zarządzanie przez organizację bezpieczeństwem informacji w warunkach kryzysu. Na końcu zaś dokonał ekspozycji wyciągniętych wniosków
XX
The aim of the analysis is the management process of information security in the conditions of crisis. The construction consists of an introduction, three problematic issues and summary. Initially, the author defined the concept of information security. Then he presented the importance of the role and knowledge in the management of the organization, referring to foreign literature. In a further step he has analyzed the processes for the management of the organization information security in conditions of crisis. At the end of the exposure he has made conclusions drawn. "
The article covers the research of key aspects of information systems creation in highly technological economic sector (htEs), the analysis of their tasks and causes that influence information systems safety, the measures to implement information systems at the enterprises of highly technological economic sector. it has been noted that there is a threat for economic safety at the enterprises of HTES. The most appropriate ways to fulfill the tasks of modern information supply have been determined.
Współcześnie w rozwijającym się świecie, w procesach przekształcania się społeczeństwa industrialnego w społeczeństwo informacyjne, zwiększa się znaczenie informacji. Świadomość i zrozumienie ważności tego procesu jest nieodzowne, aby poprawnie zdefiniować wymagania związanie z bezpieczeństwem informacji. Istotne jest również zdobycie umiejętności oceny ważności informacji w celu określenia jej właściwej wartości oraz poziomów i form ochrony.
EN
In the developed world at present, perhaps there is already a modern man, growing organization, or functioning process, which would reduce the importance of information in dynamically changing society and its gradual transformation from an industrial society to an information society. In such a society is awareness and understanding of the concept of information necessary to adequately define the requirements for information security and in particular of a number of key aspects. When information arises, how to handle information and when the information becomes void. Understanding the concept of information is also a prerequisite for obtaining the ability to assess the importance of information to quantify its fair value and define the desired level and form of its protection.
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.