Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

    Jasmin Azemović

    Abstract. Accelerating development of information technologies also causes the growth of computer crime which has the main goal to profit illegally, industrial espionage, forgery and falsification of data. Therefore, a demand for data... more
    Abstract. Accelerating development of information technologies also causes the growth of computer crime which has the main goal to profit illegally, industrial espionage, forgery and falsification of data. Therefore, a demand for data security is needed more than ever. This paper describes a model which ensures effective detection of authorized and unauthorized modification of database scheme and data itself. At the moment when data modification becomes a criminal act, this model represents a foundation for forensic analysis of collected digital evidence. A research described in the paper has been applied on access control methods which use SQL triggers. Special emphasis is laid on detection of forgery over data which were created during the process of access control using hashing methods.
    ABSTRACT Contemporary information systems such as: eLearning, eUnivesity, eVoting, eHealth, etc., are frequently used and misused for irregular data changes (data tampering). Those facts force us to reconsider our security measures and... more
    ABSTRACT Contemporary information systems such as: eLearning, eUnivesity, eVoting, eHealth, etc., are frequently used and misused for irregular data changes (data tampering). Those facts force us to reconsider our security measures and find a way to improve them. Proving a computer crime act require very complicated processes which are based on digital evidence collecting, forensic analysis and investigation process. Forensic analysis of database systems is very specific and demanding task and therefore presents main inspiration for our research. In this paper we present the fact that classical methods of collecting digital evidence are not appropriate and efficient. In order to improve efficiency we propose combination of well know technology independent methods from database world and their application in field of forensic science. Also we are proposed some new research direction in this area.
    Abstract Ensuring privacy in modern information systems is of primary importance for the users of these environments. Use and trust of users certainly depends on the degree of privacy [3]. Solution for the above mentioned problems can be... more
    Abstract Ensuring privacy in modern information systems is of primary importance for the users of these environments. Use and trust of users certainly depends on the degree of privacy [3]. Solution for the above mentioned problems can be found in application of the" ...
    E-learning has become an important tool which allows flexibility and quality requested by contemporary learning processes at universities. In order to ensure efficient support to e-learning, universities need to provide media-rich, online... more
    E-learning has become an important tool which allows flexibility and quality requested by contemporary learning processes at universities. In order to ensure efficient support to e-learning, universities need to provide media-rich, online environments that allow students to interact in highly collaborative environments, gain access to course materials, adaptive knowledge evaluation etc. By focusing on creation of more efficient and adaptable
    The number and size of different kinds of electronic files (text, pictures and videos) incorporated into eLearning environments were dramatically increased during the last ten years and this triggered a development of new web based... more
    The number and size of different kinds of electronic files (text, pictures and videos) incorporated into eLearning environments were dramatically increased during the last ten years and this triggered a development of new web based systems for that specific environment. These systems were developed to satisfy current and specific users' needs which lead to appearance of very heterogeneous environments without
    Over the years, health institutions have collected significant amount of medical data. By applying adequate methods, collected medical data can be observed as a knowledge base and used to support decision making. Developments of medical... more
    Over the years, health institutions have collected significant amount of medical data. By applying adequate methods, collected medical data can be observed as a knowledge base and used to support decision making. Developments of medical knowledge-based systems, which apply case-based reasoning (CBR) techniques to provide decision support, have become very interesting research area. Making a diagnosis is one of the
    ABSTRACT The management of unstructured data is recognized as one of the major unsolved problems in the information technology (IT) industry, the main reason being that the tools and techniques that have proved so successful transforming... more
    ABSTRACT The management of unstructured data is recognized as one of the major unsolved problems in the information technology (IT) industry, the main reason being that the tools and techniques that have proved so successful transforming structured data into business intelligence and actionable information simply don't work when it comes to unstructured data. This unstructured data is often stored outside the database, separate from its structured data. This separation can cause data management complexities. Or, if the data is associated with structured storage, the file streaming capabilities and performance can be limited. User data is produced and generated on big scale where measurement is hundreds of MB or even couple of GB per user per day. Efficient method for storing and accessing those kinds of data is imperative in modern information society. In this paper we are presenting results of research on using different data types for storing unstructured data within database and classic file system. Research is inspired with current situation in modern information society.
    Druga polovina prošlog vijeka okarakterisana je vrtoglavim razvojem računarskeindustrije koja je ubrzo postala osnovni preduslov razvoja svih sektora privrede.Uzimajući u obzir pomenuto, porasla je i potreba za stručnjacima koji će u... more
    Druga polovina prošlog vijeka okarakterisana je vrtoglavim razvojem računarskeindustrije koja je ubrzo postala osnovni preduslov razvoja svih sektora privrede.Uzimajući u obzir pomenuto, porasla je i potreba za stručnjacima koji će u segmentuposlovanja biti u stanju povezati tehničke i upravljačke zajednice. Rezultat je biopokretanje studija poslovne informatike, pod tim istim, sličnim ili različitim imenima,najčešće u okviru poslovnih škola kao studij prvog ciklusa. Međutim, razvojem upodručju poslovanja, a pogotovo kompjutinga, u novom mileniju se ovaj studij sve višepojavljuje kao samostalan sa tendencijom da postane ravnopravna organizacijskajedinica unutar hijerarhije univerziteta. Ovaj rad ima za cilj da predstavi teoretskuosnovu kurikuluma i praktičan primjer studija Poslovna informatika koji je rezultatzajedničkog rada Ekonomskog fakulteta i Fakulteta informacijskih tehnologijaUniverziteta „Džemal Bijedić“ u Mostaru.
    Research Interests:
    Research Interests:
    Ensuring privacy in modern information systems is of primary importance for the users of these environments. Use and trust of users certainly depends on the degree of privacy [3]. Solution for the above mentioned problems can be found in... more
    Ensuring privacy in modern information systems is of primary importance for the users of these environments. Use and trust of users certainly depends on the degree of privacy [3]. Solution for the above mentioned problems can be found in application of the "Hippocratic Databases - HDB concept". The idea is inspired by the basic principles of Hippocratic Oath to be applied on the databases in order to provide data privacy and confidentiality. Implementation and advantages of this concept have been researched for the needs of business intelligence systems and health information systems, but not of eLearning systems, until now. We have created a prototype model of e-learning environment that fully implements the principles of the HDB database. In order to prove the usability and viability of the model, we compared the performance of the production eLearning system with prototype model. The results of these studies are found in this research paper.