Repository logo
  • Collections
  • Browse
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Anghel, Monica"

Filter results by typing the first few letters
Now showing 1 - 4 of 4
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Some of the metrics are blocked by your 
    consent settings
    Publication
    Cyber Security approaches in e-Learning
    (INTED, 2020)
    Anghel, Monica
    ;
    Perețeanu, Georgiana Cristina
    Along with the advent of the “e-” revolution that began in the 2000s, came the issue of cyber security, cyber-attacks and cyber threats concerning domains included, but not limited to e-Business, eGovernment, e-Commerce, etc. As the issue of cyber security in e-Learning is less explored, this paper intends to illustrate approaches that will focus on the management of cyber security issues related to e-Learning systems. Moreover, this article sets out to showcase some best practice examples concerning cyber security management techniques in e-Learning, addressing the important aspect of BYOD and cyber security tendencies in this domain.
  • Loading...
    Thumbnail Image
    Some of the metrics are blocked by your 
    consent settings
    Publication
    New ways to achieve cyber-aggression through computer-specific electromagnetic emissions
    (ICI Publishing House, 2019-12-20)
    Radu, Andreea Florina
    ;
    Cozma, Lucian Ștefan
    ;
    Barbu, Dragoş-Cătălin
    ;
    Anghel, Monica
    Along with the transition to the information society, the concept of "cyberspace" became an established term, and it has been defined in various ways in recent years, most of the definitions have focused on the fact that it is an imaginary, virtual environment, in which the electromagnetic activity specific to the informational and information networks of an electronic type, comprising of communication activities, control and command, storage, processing of electronic data, etc., takes place. In a some what narrower sense related to military literature, cyberspace is strictly related to cyber activity, this being intended exclusively for electronic control and command operations, in real or simulated operations. In the common language, cyberspace is not limited in this way, however it is described by all of the activities carried out in the electronic communications networks, regardless of their specific activity. In terms of security, cyberspace has become more and more important as most of the activities of critical importance (these corresponding to the permanent critical infrastructure) are carried out online and depend on electronic databases. With this, the techniques of cyber-aggression have also been developed. Of these, the most well-known and applied ones are those that involve designing and introducing in the cybernetic environment such programs as to cause serious damages, such as unauthorized access and theft, deletion or alteration of data and information, blocking of applications, etc. However, there is also another (much less known and studied) means of carrying out cyber-aggression, namely by using online networks in order to subject their users to harmful electromagnetic emissions, most often through subliminal level effects. This paper will deal with this kind of aggression.
  • Loading...
    Thumbnail Image
    Some of the metrics are blocked by your 
    consent settings
    Publication
    Shaping the future: between opportunities and challenges of the ongoing 4th and the forthcoming 5th industrial revolution
    (Editura Universitara, 2020)
    Petcu, Ioana
    ;
    Barbu, Dragoș-Cătălin
    ;
    Anghel, Monica
    ;
    Radu, Andreea Florina
    ;
    Golea, Daniela Georgiana
    The impact of the recent digital and innovative technological evolutions has, by all means,been major on every aspect of our lives, affecting and transforming our societies. We are living an eraof fast technological developments. Thus, we dare stating that the natural selection is not an optionanymore, but rather the forced evolution and only those looking for new creative, innovative solutionswill be able to survive, evolve and thrive in the future. We recently entered the 4th industrial revolutionand we are about to take the next step to the 5th one. But we have to question ourselves: are we trulyready to keep up with this alert pace of evolution? Are we prepared and aware of the opportunities andmost important of the challenges brought by the new technological revolutions? Therefore, our paperaims to analyse / evaluate in a more or less comprehensive approach, the current state of play of thedigital and innovative solutions (e.g.: artificial intelligence) and their future impact on publicadministration's and business environment activities, educational systems and on the society, as awhole. Through our paper we also want to underline that we do not have any guarantees on how the scenarios will unfold, but nevertheless, we do have the prerequisites to foresee those scenarios and prepare ourselves to respond in a common, integrated manner, informing and involving all stakeholders- the public and private sector, academia and civil society. Only taking this path we can make the mostout of it and generate added value, in terms of: more efficient and up-to-date public services, increasedquality of products and services provided by companies, a functional and sustainable labour market,implicit overall competitiveness and not at last, a better quality of life for citizens.
  • Loading...
    Thumbnail Image
    Some of the metrics are blocked by your 
    consent settings
    Publication
    Using Data Mining Techniques in Online Coching Sessions to Identify Clusters of Client Typologies
    (INTED, 2020)
    Barbu, Dragoș-Cătălin
    ;
    Petcu, Ioana
    ;
    Anghel, Monica
    This article explains how one of the most popular coaching tools, the coaching sessions' journal, could identify the clusters of pattern behavior and analyze the clients' typologies using artificial intelligence such as data mining techniques, pattern recognition technologies and Big Data analytics in Cloud Computing. It is a known fact that the coaching process determines the increase of individual performance and the achievement of excellence in a certain domain, therefore, in this paper we provide related research that reviews and describes the techniques of data mining. The main steps in the process are: identification of the relevant parameters from the coaching sessions' journal; collecting and anonymized data pick-up from the investigation and integration into Big Data application; analyzing data using a data mining model; validation of the data results based on clusters and their interpretation. As this research will reveal, the investigated subjects need at least one personal development online coaching session.

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science

  • Privacy policy
  • End User Agreement
  • Send Feedback