FBIM Transactions
Editor
Zoran Čekerevac








If you want to review or comment some of the listed articles, please, first copy the article title and click here.



In the next issues


In the next issues of FBIM Transactions, among others, we will publish:
(To read the abstract of the paper, please, click the title of the article)

  1. Kamil Boc, Zdenek Dvorak and Zoran Cekerevac
    SECURITY OF INFORMATION AND COMMUNICATION TECHNOLOGIES

    To read the article before publishing click here

  2. Boris Bursac
    ORIGINS AND HISTORY OF ISLAMIC STATE

    To read the article before publishing click here

  3. Boris Bursac
    TERRORIST ORGANIZATIONS IN SYRIA

    To read the article before publishing click here

  4. Hatidza Berisa and Katarina Jonev
    CHALLENGES OF INFORMATION SECURITY IN THE DEFENSE SYSTEM OF THE REPUBLIC OF SERBIA

    To read the article before publishing click here

  5. Nenad Bingulac
    THE UNAUTHORIZED PROCESSING OF PERSONAL DATA AND MISDEMEANOR LIABILITY UNDER THE LAW OF PERSONAL DATA PROTECTION

    To read the article before publishing click here

  6. Srdjan Blagojevic
    SOCIAL ENGINEERING AND PERSONAL DATA

    To read the article before publishing click here

  7. Zoran Cekerevac, Zdenek Dvorak, and Lyudmila Prigoda
    MODERN COMPUTER FORENZICS AND FORENZIC TOOLS

    To read the article before publishing click here

  8. Haris Hamidovic
    OBLIGATION TO IMPLEMENT TECHNICAL MEASURES FOR DATA PROTECTION BASED ON EU GDPR

    To read the article before publishing click here

  9. Goran Jovanov, Nemanja Jovanov, and Radovan Radovanovic
    IDENTIFICATION OF FAILURE SCENARIO AND THE CONCEPTION OF MATHEMATICAL TOOLS IN NUMERIC RISK ASSESSMENT

    To read the article before publishing click here

  10. Mario Lukinovic
    CRYPTOCURRENCY, BLOCKCHAIN, AND BITCOIN

    To read the article before publishing click here

  11. Zeljko Nikac
    ADOPTION OF THE LAW ON NATIONAL DNA REGISTER IN THE REPUBLIC OF SERBIA

    To read the article before publishing click here

  12. Zoran Milanovic
    INFORMATION-SECURITY CULTURE OF YOUTH IN SERBIA

    To read the article before publishing click here

  13. Zivanka Miladinovic Bogavac
    LEGAL REGULATION OF CHILDREN'S PORNOGRAPHY ON THE INTERNET

    To read the article before publishing click here

  14. Bosko Rodic
    IT COURT EXPERT BETWEEN SCILA AND HARIBDA

    To read the article before publishing click here

  15. Miroslav Stevanovic, and Dragan Djurdjevic
    CHALLENGE OF THE ABUSE OF INFORMATION TECHNOLOGIES FOR PUBLIC INFORMATION

    To read the article before publishing click here

  16. Branka Mijic
    INFORMATION SECURITY IN BOSNIA AND HERZEGOVINA

    To read the article before publishing click here

  17. Salih Sutkovic, Nebojsa Zakic, and Aleksandra Tornjanski
    THE IMPACT OF TRANSFORMATIONAL AND CHANGE LEADERSHIP ON CHANGE READINESS AND COMMITMENT TO CHANGE

    To read the article before publishing click here

  18. Dusan Regodic, Marija Matotek, and Radomir Regodic
    APPLICATION OF INTELLIGENT TECHNOLOGIES IN THE MANAGEMENT OF SUPPLY CHAINS

    To read the article before publishing click here

  19. Slobodan Vuksanovic
    MANAGEMENT IN THE TEACHING PROCESS – THE ROLE OF TEACHERS

    To read the article before publishing click here

  20. Aleksandar Gracanac, Vladimir Stojanovic, and Nada Zivanovic
    TECHNICAL SPECIALISM OF HUMAN RESOURCES AS CONDITION FOR DEVELOPMENT OF SMES IN SERBIA

    To read the article before publishing click here

  21. Lyudmila Prigoda, Milanka Bogavac and Jelena Maletic
    APPLICATION OF RFID TECHNOLOGY – SOME PROBLEMS AND DEVELOPMENT DIRECTIONS

    To read the article before publishing click here




SECURITY OF INFORMATION AND COMMUNICATION TECHNOLOGIES

Kamil Boc
Zdenek Dvorak
Zoran Cekerevac

Accepted for publishing: 21.11.2017

Abstract
With the development of computerization, information and communication technologies (ICT) are rapidly penetrating in all areas of human life. The state of information security and security of information systems is at a relatively low level. Threats and risks related to ICT by relevance and severity of possible consequences are most often directed at the state level, somewhat less towards banks, insurance companies, marketing and other companies that have larger amounts of personal data of users. However, small businesses and individuals are also very often exposed to the attacks. The authors analyze the legal environment in the IT sector of the Slovak Republic. After introductory considerations, the paper analyzes the legal regulations of the European Union and, in particular, of the Slovak Republic. The accent was placed on the security standards of the information systems of Slovakia. After that, the technical norms of relevance to the security of information and communication technologies are discussed. The authors dealt with long-term issues of security and the spread of good practice in the protection of property, information and communication systems. The aim of this article is to present the standard security and information systems of the European Union. Based on the research carried out, the authors point out that the goal of the academic environment should be to continuously find solutions to the new and emerging challenges that arise every day. One of the most difficult tasks is the transfer of this new knowledge into the legal framework and technical standards.

Keywords:
security, safety, information and communication technologies, standards, norms, Slovakia

Click here to return to the top of this page



ORIGINS AND HISTORY OF ISLAMIC STATE

Boris Bursac

Accepted for publishing: 21.11.2018

Abstract
Terrorism as we know today is not a new creation it is hiding in the community in form of tactics, strategies, doctrines, methods and means around which only a consensus is needed to reach the light of the day. While some see terrorism as a crime, others describe it as a sacred duty, and as long these two sides exist terrorism will flourish. Terrorists today are better trained and better equipped therefore elusive as never before, this fact has led that this phenomenon rapidly expanding and reaching the whole planet. Inadequate and above all the non-unified terminological definition of terrorism as a concept contributes to this prevalence. Although the world community agree that terrorism is a global evil and terrorist organizations are characterized as criminal, the global power centers utilize this confusion and use terrorism to achieve their own interests. The headquarters of terrorist activities in accordance with those interests have now been stationed in the Middle East and in a multitude of terrorist organizations, one has emerged as a leading one known as Islamic state.

Keywords:
Terrorism, Ansar al Islam, Salafism, Wahhabism, Islamic State

Click here to return to the top of this page



TERRORIST ORGANIZATIONS IN SYRIA

Boris Bursac

Accepted for publishing: 27.11.2018

Abstract
For the past hundred years, Syria has been a synonym for turbulent events, political turmoil, and wars, so we can say that the current situation that has hit Syria is not surprising. The conflict that began in the form of the demonstration in the 2011-th , or, in the form of a sort of conflict of power and opposition, grew into an armed conflict with more than 200,000 dead and 10,000,000 displaced persons. As a result of such a chaos from the "pandora's box" Islamist terrorist organizations have gone out, which lead to misery and poverty, unemployment, political chaos, destabilization, violence, massacres, fighting anytime and anyplace in every city, village, hamlet, therefore, the situation of a general chaos where end of conflicts is not yet seen. It all began with the so-called "Arab Spring" in Tunisia, to expand later to Egypt, Libya, Bahrain, Syria, Yemen, Algeria, Iraq, Jordan, Morocco, Oman and other countries where conflicts were of lesser intensity. The aim of this research is the idea to provide the necessary knowledge stemmed from an extensive analysis, primarily ideological, political, sociological point of view or the point of view of terrorist organizations on the territory of Syria and that the best way to enable true sense of understanding of their business and their great influence on the development of terrorism in general.

Keywords:
Terrorism, Al Nusra, Ahrar al-Sham, Liwa al-Tawhid, Liwa al-Haqq, Syrian Islamic Front

Click here to return to the top of this page



CHALLENGES OF INFORMATION SECURITY IN THE DEFENSE SYSTEM OF THE REPUBLIC OF SERBIA

Hatidza Berisa
Katarina Jonev


Accepted for publishing: 22.11.2018

Abstract
Information security is an aspect of security related to the security risks associated with the use of information and communication technologies, including the security of data, devices, information systems, networks, organizations and individuals. The development of new technologies brings undoubted benefits to society, but parallel to technological development, new security challenges are coming. High-tech crime and hacking attacks on information systems can significantly jeopardize the functioning of state infrastructure and national security, as well as the defense system of the Republic of Serbia. Attacks on information systems can significantly jeopardize the functioning of the defense system of the Republic of Serbia, as it was the case in Estonia in 2007, when cyber-attack on the ICT systems of state authorities was carried out, when information systems were blocked. The case of the introduction of a computer virus "Stuxnet" in the nuclear power plant in Iran in 2010 to sabotage industrial systems is also known. In addition, there are threats of defense that cannot be classified under international law as forms of armed aggression but are present in international relations. According to the Ministry of Internal Affairs, the number of reported criminal offenses in the field of high-tech crime is growing 50% annually. Attacks on state authority servers are even more frequent and advanced. The paper will discuss the challenges of information security in the defense system of the Republic of Serbia. Also, in this paper will be considered some of the threats of using modern communication and computer systems and networks.

Keywords:
security, defense system, information security, challenges, Republic of Serbia, threats, network

Click here to return to the top of this page



THE UNAUTHORIZED PROCESSING OF PERSONAL DATA AND MISDEMEANOR LIABILITY UNDER THE LAW OF PERSONAL DATA PROTECTION

Nenad Bingulac

Accepted for publishing: 27.11.2018.

Abstract
The protection of personal data due to significant technological breakthroughs and the growing use of social networks, online services and similar modern conveniences is becoming increasingly difficult, both in the literal sense and in the legislative sense, especially when there is no information on which personal data in which cases can be requested and which can not. In this regard, some research indicates that a significant percentage of people are not familiar with the above-mentioned topic, but also that many of them have no special will to inform themselves. This is exactly what leads to additional issues, especially when it comes to various forms of misuse of personal data. In this research, the focus will be on two central issues, namely the unauthorized processing of data on the basis of the personal data protection, while the second question will relate to misdemeanor liability arising from violation of the mentioned law, all in order to achieve general and special prevention. The importance of considering this issue is not only in considering which data are not permitted and consideration of misdemeanor responsibility due to violation of the mentioned law, but also in raising awareness of the mentioned issue, preventive measures of protection, and indirectly it will be pointed to the collection of personal data on the law envisaged way.

Keywords:
unauthorized processing of data, misdemeanor liability, law of personal data protection, data processing

Click here to return to the top of this page



SOCIAL ENGINEERING AND PERSONAL DATA

Srdjan Blagojevic

Accepted for publishing: 27.11.2018

Abstract
In today's information environment, there are more threats and dangers to the security of computer users. One of these threats that is very widespread and without the chance to zoom out in the future, is certainly stealing personal data. To occur, the malicious men are ready for extensive preparation, research of individuals and companies, waiting for the right moment to invade and achieve their goals, so it is necessary to spot some of the most distinctive fraud used by social engineering and their genesis on the Internet and social networks. Usage of social networks is critical of the security and privacy of users. A large amount of information published and often publicly shared on users’ profile, is increasingly drawing the attention of the attackers. Instead of the attacker initiating contact with the victim, the method of reverse social engineering is applied for the victim to be lured to the first contact with the attacker, which results in a high level of trust between the victim and the attacker. Integration of social engineering in these attacks is a new, more complex threat that attempts to take personal data from internet users that is easy to trade with or to cash in. In order to identify these attacks in time, it helps to see their characteristics, and in order to see the problem fully, it is necessary to know the true value of personal information and what they represent in the world of black Internet markets.

Keywords:
social engineering, personal data, fraud, security, protection.

Click here to return to the top of this page




MODERN COMPUTER FORENZICS AND FORENZIC TOOLS

Zoran Cekerevac
Zdenek Dvorak
Lyudmila Prigoda


Accepted for publishing: 27.11.2018

Abstract
Increased use of computers and devices and equipment based on them has made significant improvements in the functioning of companies and institutions, but also individual users. At the same time, risks have arisen due to their improper use or misuse. The loss or theft of data can occur in a variety of ways, from a user's error to an individual or mass attacks of malicious attackers. Some of the problems can be solved using the operating system's or application software's tools, but for specific situations, when the misdoing has already been done, it is necessary to use special, dedicated forensic tools. In case of need for judicial expertise, the task of forensic experts becomes even more complex, as with the detection of causes, the IT forensic expert must provide valid evidence that the act was done and (if possible) who made it, but also left the artifact in an unchanged state that other forensic research could be carried out either in connection with other reasons, or by another institution (or another forensic expert). Therefore, and for other reasons, it is necessary to use specialized forensic tools. In this paper, after the introductory part, which examines forensics and anti-forensics, short history and contemporary legislation, as well as the challenges associated with forensics and tools, the computer forensic tools are discussed in greater detail. The accent is placed on free forensic tools. The conclusions of the paper summarize views on forensics and forensic tools and point out the directions for future development, especially in connection with the massive use of the Internet of Things.

Keywords:
Forensics, anti-forensics, IT tools, computers, IoT, security, protection

Click here to return to the top of this page



OBLIGATION TO IMPLEMENT TECHNICAL MEASURES FOR DATA PROTECTION BASED ON EU GDPR

Haris Hamidovic

Accepted for publishing: 27.11.2018

Abstract
On 25 May 2018 in all countries of the European Union came into force The General Data Protection Regulation – GDPR. The protection of the rights and freedoms of individuals with regard to the processing of personal data requires that appropriate technical and organizational measures be taken to ensure compliance with the requirements of this Regulation. For breaches of the provisions relating to the security of processing, administrative fines of up to EUR 10 000 000 are envisaged, or in the case of an undertaking, up to 2 % of the total worldwide annual turnover of the preceding financial year, whichever is higher. In this paper, we present the obligations of carrying out the appropriate technical and organizational measures for the protection of personal data and the demonstration of conformity with the use of international standards.

Keywords:
information security, privacy, GDPR, ISMS, PIMS, ISO/IEC 27001, ISO/IEC CD 27552

Click here to return to the top of this page



IDENTIFICATION OF FAILURE SCENARIO AND THE CONCEPTION OF MATHEMATICAL TOOLS IN NUMERIC RISK ASSESSMENT

Goran Jovanov
Nemanja Jovanov
Radovan Radovanovic


Accepted for publishing: 27.11.2018

Abstract
In the process industry, risk management is traditionally focused on considering the probability of specific events or accidents. In energy plants which represent the most important field of application, in 1970’s of tha last century, in the USA the structural approach for identification of failure scenario was introduced. Risk assesment represent the decision process related to whether the existing risks are within the range of accepatble risk and whether the exisiting procedures for risk control are adequate. The main reason why it is necessary to make risk assesment is the possibility for risk management, its decrease or elimination.Risk assesment should be as objective as possible, and to depend on scientific criteria. After having received the information on risk, it can be started with the application of effective methods for its decrease, by which the increased efficiency in risk assesment will be accomplished. Methodological course of risk assesment procedure represents the ground for proper estimation, i.e. for monitoring the situation of business system. The result of system’s condition at the application of certain models for risk assesment, depends exclusively on properly made results within the methodological course of risk assesment. Based on further results, the ranking of numerical risk assesment is made, i.e. the risk (R) is ranked from acceptable (insignificantly low risk) of the rank R1 through extremely high risk of the rank R5, which does not allow for activity to either to start or to continue until the risk level is reduced. Also, the table containing the description of criteria for probability estimate is provided, as well as of criteria for the frequency of failure and risk ranking. The evaluation of risk assesment is accomplished by showing the matrix model. There are matrices with different number of levels, but the simplest model of risk matrix is 3x3 with 3 risk levels. Based on the matrix of risk estimate the range of risks for calsification and characterization of risk estimate is defined.

Keywords:
Possibility, ranking, estimate, frequency criteria, failure criteria

Click here to return to the top of this page



CRYPTOCURRENCY, BLOCKCHAIN, AND BITCOIN

Mario Lukinovic


Accepted for publishing: 16.03.2019

Abstract
Cryptocurrencies are digital (virtual) currencies, which, although they are a means of payment, are not yet strictly regulated by law in most states, and in some, they are even prohibited. Many people, including IT professionals and programmers, do not know much about this topic, and the general public equates the terms blockade and bitcoin. The crypto-market today amounts to nearly $ 770 billion. Since the emergence of the first digital currencies to date, over 1,300 active crypto sites have appeared, which differ in their properties and uses. Before the bitcoin, there were a lot of unsuccessful attempts to create digital currencies (DigiCash, Hashcash, Facebook credit, etc.). Utopian idea that mathematics and physics can solve social problems began its life through the appearance of bitcoin. The genial idea on which is a bitcoin functioned is based on blockchain technology, whose potential reaches far beyond the cryptocurrencies. Although there is still a controversy over the pseudonyms of Satoshi Nakamoto, his legacy has the potential to change the world. The success of bitcoin is in the advantages it has in relation to other similar currencies, but its importance goes beyond the benefits it has made. The banks do not need to store the data on money, property records and every bit of transaction stored by computers of all network users in a common database - blockchain. All transactions are much faster than banking, no tax, with drastically easier payment across state borders. Bitcoin provides to users security without identification, although blockchain registers a transaction, does not record who is behind it. The paper presents the basic principles on which bitcoin and other cryptocurrencies are based, the relationship between blockchain and bitcoin is explained.

Keywords:
cryptocurrencies, digital money cryptography, blockchain, bitcoin.

Click here to return to the top of this page



ADOPTION OF THE LAW ON NATIONAL DNA REGISTER IN THE REPUBLIC OF SERBIA

Zeljko Nikac

Accepted for publishing: 15.03.2019

Abstract
In the middle of last year, the National Assembly of the Republic of Serbia adopted a new Law on the National DNA Registry, which is the most important legal source for forensic analysis and expertise, primarily in the context of the detection and clarification of the most serious crimes and perpetrators. This is a regulation that is of great importance for the prosecution of criminal offenses and perpetrators, the adoption of relevant court decisions and the sanctioning of perpetrators. The DNA was established to establish the identity of the missing and unknown persons, identify the identity of the bodies and parts of the body. The DNA profile database that has been established contains profiles of uncontested and controversial biological samples, which were established in the criminal procedure and submitted to the central laboratory of the NCTC MOI RS. The data contained in the DNA register are primarily personal and therefore should show great sensitivity and caution in the treatment, must not violate the integrity of the personality and must be ensured their legal use. In the context of the famous Prum Convention (the so-called Schengen III) and the application of Serbia for admission to the EU, the author suggests the establishment of a permanent database of DNA data and the improvement of the expert procedure and with respect to national legislation.

Keywords:
DNA Register, databases, clarification of criminal offenses, identification of perpetrators, corpses, missing and unknown persons, Serbia, EU

Click here to return to the top of this page



INFORMATION-SECURITY CULTURE OF YOUTH IN SERBIA

Zoran Milanovic

Accepted for publishing: 19.03.2019

Abstract
Younger populations are the most common Internet users, especially social networks, and as such are the most vulnerable target group for most forms of abuse. Therefore, a survey was conducted using a questionnaire, with the aim of determining their current knowledge and behavior on the Internet and their information and security culture. The research results should have the effect of raising the awareness of the end users about the need to protect data, information and knowledge.The research has shown the existence of inconsistencies between the acquired knowledge (awareness) of the information-security risks and behavior (information-security culture) of the respondents. The author believes that the causes of these inconsistencies lack of practical (applicable) knowledge and thinks that young people should be encouraged to be more active in acquiring a greater scope of knowledge, understanding and ability to cope with problems.

Keywords:
youth, knowledge, behavior, awareness, information-security culture.

Click here to return to the top of this page



LEGAL REGULATION OF CHILDREN'S PORNOGRAPHY ON THE INTERNET

Zivanka Miladinovic Bogavac

Accepted for publishing: 22.03.2018

Abstract
Child pornography i.e. abuse of children for pornographic purposes, it's a big problem of today’s society in an era when human and children’s rights are placed first. It is also a serious criminological, sociological and victimological problem, so it is dealt with by not only lawyers, but also experts of various scientific fields. Exploitation of children’s psychological and physical integrity is experiencing its expansion, as opposed to preventive and restrictive efforts of the international community, as well as efforts of the Republic of Serbia to suppress this problem in a legal way. Numerous scientific discussions are being held around the world, their purpose being an attempt to reach an “ideal” solution. With the development of technology, modern age facilitates expansion of child pornography. The world’s most famous social network that has a wide range of functions and possibilities – the internet – has developed with emergence of modern computers and programs. It certainly has its positive sides, primarily because it allows people all over the world to connect, communicate, meet, share information and experiences through messages, pictures, recordings... All positive sides of the internet are also susceptible to abuse. As a large amount of information became easily accessible to users around the world, it has also become a good basis for commission of various criminal offenses. The possibility of anonymity on the internet, the free flow of content and access to that very same content create many dangers, one of which is child pornography.

Keywords:
child pornography, pornography, high technology crime, internet, child abuse

Click here to return to the top of this page



IT COURT EXPERT BETWEEN SCILA AND HARIBDA

Bosko Rodic

Accepted for publishing: 22.03.2019

Abstract
Accepting expertise in IT, the court expert encounters with numerous: moral, professional, and is understood by objective problems. In this paper we will try to explain the mentioned problems by offering solutions from our own experience. The first problem is -to get a job, to do the job, and the third -to charge the services. This job is primarily obtained through courts. Experts also suggest individuals - participants in the judicial process: the defendants, prosecutors and / or their plenipotentiaries. The parties (the respondent and / or the prosecutor) may for various reasons not accept expert witnesses suggested by someone past them. In order for this work to be successfully realized, already mentioned at the beginning of this text, the expert has to master numerous Scile and Haribde. Still, a typical problem for the Serbian judiciary in relation to experts is payment, or rather - non-payment. According to (Derikonjić, 2017) experts are owed about half a million euros. And if they are paid out, because of the inflation, because of the rules "better today thousand, then for a year - ten thousand", experts are constantly in trouble. A particular problem is realistic valuation - the valorization of someone's work in the artificial experiment. Let's agree that IT is an expertise in the domain of high-tech crime where the highest possible level of expertise - knowledge is required. How to pay this knowledge?

Keywords:
IT, Laws, Expertise, Finding and Opinion, Expertise Collection

Click here to return to the top of this page



CHALLENGE OF THE ABUSE OF INFORMATION TECHNOLOGIES FOR PUBLIC INFORMATION

Miroslav Stevanovic
Dragan Djurdjevic


Accepted for publishing: 22.03.2019

Abstract
In this article, we view public information as a process of making available data and information through their distribution, primarily in cyberspace. Given that information is the fundamental right of every individual and obligation of public authority, the emergence of a phenomenon called "fake news" implies that, in contemporary conditions, public authorities fail to secure the right to objective and accurate information. The problem we are focusing on is the extent to which information technology can be instrumentalised to relativise the public information function. In this context, the goal of the work is to isolate the abuse mechanisms, so that they can be timely identified and harmful consequences counteracted in the realm. Methodologically, the work is based on the phenomenological distinction between the importance of the impression and the factual situation in order to reach the real value dimension of information. The indicators obtained in this way are analysed from the perspective of the potential structural and functional impact of systematic instrumentalisation of information technologies to impose opinions instead of informing. The results of the analysis point to the existence of a number of risks arising from the unregulated and uncontrolled mass application of information technologies, which stem from the unequal position of the participants in the cyberspace. Findngs provide a basis for the conclusion that potential risks include possible offensive action and require the organisation of the download and transmission of information and data in the national cyberspace. In this context, it seems that information technology evaluations cannot be left to autarchical initiatives, but must be subject to a systematic assessment by relevant forensic bodies.

Keywords:
perception, narrativa, geospatial intelligence, metadata, human domain intelligence

Click here to return to the top of this page



INFORMATION SECURITY IN BOSNIA AND HERZEGOVINA

Branka Mijic

Accepted for publishing: 24.03.2019

Abstract
At present, information security is most commonly associated with various Internet threats such as hacking attacks, viruses, or various other applications that have the potential to harm our computer, information system, and even information. However, information security should be seen in a wider context. Possible uncontrolled "leak" of important and valuable information outside the system poses a major threat to the organization, the company. We can say that information that can often be very important or characterized as secret and confidential, not always in electronic form, can be in written documents, pictures, tables, charts, etc. Nowadays, most of the information mentioned is in digital form, the subject of this paper relates to the security of information, risks, risk assessment and risk management and legal regulations, all for the purpose of protection, respectively, information security and information system, and for all this it is necessary to apply ISO27001 standards.

Keywords:
information security, risk assessment, risk management, legal regulations and ISO 27001

Click here to return to the top of this page



THE IMPACT OF TRANSFORMATIONAL AND CHANGE LEADERSHIP ON CHANGE READINESS AND COMMITMENT TO CHANGE

Salih Sutkovic
Nebojsa Zakic
Aleksandra Tornjanski


Accepted for publishing: 22.03.2019

Abstract
Negative attitudes towards change are one of the main reasons why an organizational change fails. Initially, researchers focused on resistance to change, subsequently developing several constructs with research instruments, which represent positive attitudes of organizational members to change, among which a readiness for change and a commitment to change stands out. Readiness for change creates positive energy necessary for the success of a change effort and it is an important link for achieving the desired outcome of a change. Readiness for change is a complex and multidimensional construct. A commitment to change is a construct with a strong positive focus. Highly committed organizational members make efforts, show initiative and act cooperatively, which contributes to the effective change implementation. Within the context of organizational change, two approaches are generally used to understanding the role of leadership in shaping a follower's response to change: transformational leadership and change leadership. Transformational leadership is a construct which took a long time to develop, and it is one of the most interesting topics in modern leadership research. On the other hand, there are infinitely fewer research papers on change leadership, the construct and research instrument having been established only recently. This paper examines the influence of transformational leadership and change leadership on a readiness for change and a commitment to change, including relationship between a readiness for change and a commitment to change, and suggests a model in which a readiness for change has a mediating role between leadership behaviors and a commitment to change.

Keywords:
organizational change, readiness for change, commitment to change, transformational leadership, change leadership

Click here to return to the top of this page



APPLICATION OF INTELLIGENT TECHNOLOGIES IN THE MANAGEMENT OF SUPPLY CHAINS

Dusan Regodic
Marija Matotek
Radomir Regodic


Accepted for publishing: 22.03.2019

Abstract
The aim of this paper is to demonstrate that the effective implementation of modern information systems in companies, as well as their availability through cloud computing, enable higher quality management of supply chains. The use of new information systems, such as cloud computing, e-business, and decision support systems, increases the company's efficiency and effectiveness. Companies can now address multifaceted processes, new market integrations, and customer requirements in a faster, simpler and more affordable way. Cloud computing, as a new web technology, is becoming increasingly popular in the business world. The effects of using this technology in today's business environment are numerous. Interwoven relationships between participants in the e-supply chain, e-production and e-commerce required the creation of new software for storage, processing, management, collaboration, analysis, creation, and simulation. Intelligent software systems are being developed to ensure autonomy for all stakeholders in the supply chain, as well as to simulate process development in the virtual world. At the level of the software platform 6PL, the conditions of the interaction of the participants in the logistics supply chain are formed in an integrated information environment. The 6PL software platform can be used in logistics systems. Furthermore, this paper presents the results of the analysis of modern level logistics services. Virtualization of the interaction between the participants in the supply chain was realized using modern information and communication technologies.

Keywords:
cloud computing, information system, logistic operator, supply chain, decision support system.

Click here to return to the top of this page



MANAGEMENT IN THE TEACHING PROCESS – THE ROLE OF TEACHERS

Slobodan Vuksanovic

Accepted for publishing: 27.03.2019

Abstract
The aim of this paper is that it shows teachers role in organizing the teaching process. Half of the teaching process represents the teacher, and the other half presents his students. In their mutual relations, which includes lectures, discussions, questions, suggestions, new ideas, makes the whole process of teaching. In the process, the teacher is only one part that cannot function without the cooperation of students. This text deals with the obligations of teachers that are necessary to make the students were motivated and inspired to also take part in joint work. The teacher, as an individual, cannot achieve its objective if there are interested and equal interlocutors among students.

Keywords:
management, teacher, teaching process, education

Click here to return to the top of this page


TECHNICAL SPECIALISM OF HUMAN RESOURCES AS CONDITION FOR DEVELOPMENT OF SMES IN SERBIA

Aleksandar Gracanac
Vladimir Stojanovic
Nada Zivanovic


Accepted for publishing: 27.03.2019

Abstract
Technical progress and adequate staff profiling are two essential conditions for the development of forces of production, in one company ande country alike. The competitive advantage of SME-s grouped in to the sectors with Low-tech, Medium-low tech, Medium-high tech, High-tech on aspects. These aspects are two technical specialization and flexibility. Technical Specialism of companies is teh most important condition to the development and success of SME-s, because i this fashion small companies focus their resources (which are usually extremly limited) to what they do best. Small and medium enterprises SME-s, usually have no problems with quality control, as they deal in only one business activity, but this activity they need to give their full contribution so as to meet the set standards. The key point, considered are: management of human resources and staff qualifications and training level of workforce, productivity and inovation, collaboration with universities and research institutions, use of consulting services and adopted standards of quality. By adopting the Strategy for the SME-s sector and entrepreneurship in 2015, basic conditions have been created, but not enough for the development of entrepreneurship and a higher level of human resources. Comprehensive activities in the realization of the Strategy, primarily in the part of the sources of financing and alternative sources of financing, more innovative legal solutions in the coming years, technical specialization of human resources will contribute to the growth of competitiveness and profitability. The paper explains the importance of Human Resource Management, which takes up one of the most important topics and positions in creating the development, functioning and success of the SME-s sector in the European Union and in our country. Therefore, the first and most important issue of diversity in the structure of employees, as well as differences in management, defines basically and specifically categorizes the success of micro, small medium-sized companies and entrepreneurs. In such a defined concept, which implies competitiveness levels, the focus of management engagement is the strategy of continuously creating the level of highly professional managers and employees. This European trend is due to the implementation of 10 principles of the Small Business Act of June 2008, with the aim of achieving prestigious competitiveness. The strategic document adopted by the European Union and set in the priorities of economic policy has enabled stable growth of entrepreneurship and the development of innovative solutions, which have produced new high technical professions and a new generation of managers.

Keywords:
Technical Specialism Human Resources, Strategy of SME-s, management of human resources, managers, strategy, management, entrepreneurs

Click here to return to the top of this page


APPLICATION OF RFID TECHNOLOGY – SOME PROBLEMS AND DEVELOPMENT DIRECTIONS

Lyudmila Prigoda
Milanka Bogavac
Jelena Maletic

Accepted for publishing: 27.11.2017

Abstract
In the conditions of modern business and the increasing use of computer technologies, more time constraints are being imposed to businesses, increasing demands in terms of efficiency of the use of machinery, automation of technological processes, higher reliability, lower costs and better economic indicators. As one of the convenient solutions, the use of RFID technology appears. RFID systems are playing a significant role in increasing efficiency and reducing operating costs in the last dozen years, even though all the potentials of this technology have not yet been discovered or exploited. RFID technology provides practical benefits to anyone who needs to monitor the physical presence of objects in a certain environment. Many improve supply chains and production processes by introducing this technology. The reasons for the use of RFID technology in large systems are the ability to fully automate the work with the use of computer management and control, better control of issuing and monitoring the stock situation, while reducing the possibility of error as well as theft and fraud, increasing profits and quality, obtaining reports on the issue of parts or fuel (at what time it was taken, in what quantity ...) etc. In this paper, one RFID solution for controlling fuel refueling at fuel supply stations is shown in more detail. The advantages and disadvantages of this technology, the economic aspects of the application, as well as the possibilities of complete protection against theft and various other frauds are considered. The analysis has shown that the positive effects can be a reduction of total costs, optimization of the existing supply system, optimization of the existing system for monitoring the quantitative state of the fuel stock at fuel stations, fuel consumption by vehicles, etc. At the end of the paper, the future of RFID technology, the paths for further development, and the potential risks of applying this technology are analyzed.

Keywords:
Information Technologies, RFID, control, fuel, disadvantages, attacks

Click here to return to the top of this page








MESTE NGO and FBIM Transactions support teamwork and encourage international scientific cooperation.

That is why we are especially willing to publish works of groups of authors from two or more different countries.


Za prelazak na srpski jezik
kliknite na ikonu



Za prelazak na srpski jezik kliknite na ikonu