Papers by Daniela Popescul
IACSS 2018 - IACLPM 2018 Joint Conference Proceedings, 2018
Nowadays, we are witnessing a serious gain in the popularity of the Smart TVs. A triumphalist lan... more Nowadays, we are witnessing a serious gain in the popularity of the Smart TVs. A triumphalist language referring to their benefits can be noticed in mass media, revealing the hype in their adoption. Multiple advantages are perceived by the consumers, and work as positive drivers in the Smart TVs market. Yet, there is little awareness regarding their privacy and security – such concerns are expressed by academia and the experts in the Internet of Things field, but usually ignored by buyers, sellers and manufacturers. The amount of data collected by these personal and familial computers and transmitted to the manufacturers and other third parties, without an explicit user consent, is impressive. For example, according to [1], Smart TVs store and transmit viewing information that can be used to determine every show watched by the user, through Automatic Content Recognition technology. This situation is potentially dangerous in the future, as Smart TVs are intended to become the command centers of a smart home. Therefore, the purpose of this paper is to overview the privacy and security policies published by selected Smart TVs’ manufactures, in order to provide a consistent inventory of collected data sets, to assess the dangers on privacy, personal freedom and autonomy, and to draw some conclusion regarding the recommended future actions for Smart TVs buyers, manufacturers and sellers.
Conference: ISSN: 2247 – 1480At: Iasi, RomaniaVolume: Proceedings of the 17th International Conference on INFORMATICS in ECONOMY (IE 2018) Education, Research & Business Technologies, 2018
Nowadays, Internet of Things (IoT) devices and applications are largely and successfully used in ... more Nowadays, Internet of Things (IoT) devices and applications are largely and successfully used in almost every human activity. Together with smart cities and industrial IoT, one of the top three sectors with a notable estimated growth in the years to come is Health Internet of Things (HIoT). Due to obvious benefits as faster response and better functioning of medical devices, remote diagnosis and treatment, continuous monitoring of patients with implanted devices, better support for clinical decisions, and lower costs, IoT is becoming increasingly relevant in the context of health-care and medical applications. In order to provide these advantages, interconnected patient and hospital IoT devices collect, transmit and process significant amounts of sensitive data. Problems as the lack of transparency in the use of data and contextual metadata, weak security methods implemented in medical devices, probability of human errors and software or hardware malfunctions, autonomous, ambiguous and unpredictable behavior of the interconnected things expose both the health institutions and their clients to significant risks, from harming the privacy of patients to actual health damage. In this spirit, the paper reviews the ethical and security-related concerns in health-IoT and suggests solutions to present and future challenges.
Nowadays, we are witnessing a serious gain in popularity of the wearable smart things. A triumpha... more Nowadays, we are witnessing a serious gain in popularity of the wearable smart things. A triumphalist language referring to their benefits can be noticed in mass media, revealing the hype in their adoption. Multiple advantages are perceived by the consumers, and work as positive drivers in the wearables market. Yet, there is little awareness regarding their privacy and security – such concerns are constantly expressed by academia, but usually ignored by buyers and manufacturers. Therefore, the purpose of this paper is to provide some preliminary insights into how do the users perceive vulnerabilities as interferences, frequent disconnections, hardware and software malfunctions, improper/difficult configuration etc. of hand worn devices. The analysis was realized by means of netnography, using emag.ro, the oldest and largest ecommerce site in Romania as online source. Inspired by a similar study conducted by (Genaro Motti & Caine, 2016), we selected and reviewed 931 comments posted by the buyers of the ten most popular smart watches, in order to identify the hardware, software and connectivity problems they faced while using the devices and to assess the awareness of the buyers to security and privacy issues. Also, an overview of the privacy and security policies published by selected smart watches' manufactures was made, and some conclusion regarding the recommended future actions for wearable buyers, sellers and manufacturers were presented.
The purpose of this paper is to provide an extensive overview of security-related problems in the... more The purpose of this paper is to provide an extensive overview of security-related problems in the context of smart cities, seen as huge data consumers and producers. Trends as hyper con-nectivity, messy complexity, loss of boundary and industrialized hacking transform smart cities in complex environments in which the already-existing security analysis are not useful any-more. Specific data-security requirements and solutions are approached in a four-layer framework , with elements considered to be critical to the operation of a smart city: smart things, smart spaces, smart systems and smart citizens. As urban management should pay close attention to security and privacy protection, network protocols, identity management, standardization , trusted architecture etc., the paper will serve them as a start point for better decisions in security design and management.
The purpose of this study is to learn about Generation Y students' traits, habits, needs and expe... more The purpose of this study is to learn about Generation Y students' traits, habits, needs and expectations when using Social Media (SM). The correct identification of their behavior is, in our opinion, essential for the academic community. Firstly, we need to understand what their real profile is. Then, a serious and consistent adaptation of our attitudes/teaching materials/ways of providing information and a redefinition of universities' policies and procedures is necessary. On this basis, in an empirical study, we try to determine why do Generation Y students use SM, what are their preferences for one media or another, how/for how long/from where do they use SM tools, and what do they expect from universities and their professors.
The developments taking place in information and communication technology are affecting the finan... more The developments taking place in information and communication technology are affecting the financial institutions worldwide. This evolution had transformed the way banks deliver their services, using technologies such as automated teller machines, phones, the Internet, credit cards, and electronic cash. In this spirit, banking in Romania has been undergoing some changes. Many banks have been investing in Internet technology in order to maintain a competitive edge. This paper presents various aspects regarding the application of information and communication technology in the context of a developing nation.
This paper discusses mobile commerce aspects, with specific attention focused on differences betw... more This paper discusses mobile commerce aspects, with specific attention focused on differences between electronic and mobile commerce. The paper proposes a theoretical investigation of these differences, on three levels: technical problems, customer attitude, and business models. On this bases, at the end of the paper are formulated a set of conclusions regarding the link between mobile and electronic commerce.
The purpose of this study is to treat aspects that are related to the sensitivity of data, inform... more The purpose of this study is to treat aspects that are related to the sensitivity of data, information and knowledge transmitted through Internet of Things, helping all people interested in these new ICT technologies to become aware of some ethical issues. In this new media, which is no more in its infancy, the vulnerabilities and attacks are various, caused by technological advances and proliferated through lack of users’ awareness. This warning message is needed because of data, information and knowledge transfer from virtual to physical devices that are connected to wireless networks of different sizes and importance. The transfer is augmented by the extended use of new technologies as RFID, NFC, sensors, 3G and 4G and brings along the adjustment of the traditional information security threats to this new environment, as well as the emergence of new characteristic dangers. The problems treated here are of interest both for each of us, as individuals, and for the organizations man...
The necessity of (re)considering the three main faces of security mentioned in the title of the p... more The necessity of (re)considering the three main faces of security mentioned in the title of the paper derives from the accumulation of the importance of the knowledge circulating in organizations, with the existence of numerous dangers and threats that target this knowledge, focusing on people as depositaries and users of knowledge. After a general presentation of the knowledge workers characteristics that can be analyzed as potential risks from the point of view of the confidentiality, integrity and accessibility of knowledge, the paper suggests some solutions that spin around the idea, that is, knowledge security is a human problem and not a technical one, and therefore it should be treated as such. The paper is mainly addressed to the managers interested in the use of knowledge in the activity of the organizations they lead, warning them about the sensitive points of the knowledge-related activities, with the dangers associated with them and suggesting them that the traditional i...
This paper aims to analyze the degree of innovation of processes in the Romanian local public adm... more This paper aims to analyze the degree of innovation of processes in the Romanian local public administration. In a first instance, we have mirrored, on the one hand, the positive connotation unanimously credited to innovation (summarized by the truism “innovation generates progress, economic growth and a better quality of life”) and, on the other hand, the blames of bureaucracy and enclosure traditionally addressed to local public agencies (normally regarded as non-innovator). Starting from this apparent set, we have analyzed the modification the information and communication technologies brought to the 41 city halls which are now present virtually. We have also noticed changes facilitated by the internet and web technologies regarding the payment of taxes and duties, filling in forms, booking services (marriages, public hearings, etc.), the delivery of information, and the relationship with citizens. Finally, according to this information, we have come to several conclusions and re...
The present paper investigates the barriers against the knowledge flows which are intended to pro... more The present paper investigates the barriers against the knowledge flows which are intended to produce innovation. The analysis is made at the at the individual, organisational and inter-organisational levels, underlining the importance of knowledge communication, collaboration and accumulation in assuring the percolation of knowledge and making the grid of our model more and more fertile and able to support innovation. The paper also identifies some solutions to decrease the identified barriers.
Customer habits, behavior, informational needs and expectations were a subject of change in elect... more Customer habits, behavior, informational needs and expectations were a subject of change in electronic commerce and are changing further in the mobile commerce. In this spirit, the "mobile" sellers must understand that the ways to assure customer satisfaction are also changing. A new, coherent and fully developed customer strategy is indispensable in the assurance of … mobile satisfaction. This paper analyzes the changes in the mobile customer behavior, and also proposes some recommendations for a successful mobile marketing strategy.
The present paper proposes a new way of thinking regarding the relation between innovation and kn... more The present paper proposes a new way of thinking regarding the relation between innovation and knowledge using a Physics-borrowed model, trying to prove whether knowledge resources can "flow" (be percolated) in a network or a grid, in order to be transformed in technological innovation. In the Knowledge Flow Percolation Model centre, human beings are seen as thinking electrons, both consuming and generating knowledge flow. Through the inter-dependent actions of individuals, knowledge circulates inside different types of organisations, allowing functioning and innovating in order to obtain competitive advantages. The model can be extended also at a national level, and some assumptions of self similarity appear in this process of extension. The model must be seen as a proposal for the research community and as a basis for future observations regarding the importance of knowledge flows in innovation.
SSRN Electronic Journal, 2000
The new information society offers great potential in promoting sustainable development, democrac... more The new information society offers great potential in promoting sustainable development, democracy and transparency for developing countries. In this context it is very important, both for these countries governments and business communities, to develop successful electronic commerce and electronic business strategies. This paper discusses electronic commerce aspects, with specific attention focused on e-readiness -a country's ability to take advantage of the Internet as an engine of economic growth and human development. The paper proposes a theoretical investigation of the e-readiness rank in Romania, in the framework of an "electronic commerce network" provided by J.P. Singh and S.M. Gilchrist. There are presented some of the positive and negative implications that developing countries (and especially Romania) need to be aware of if appropriate strategies are to be put in place, and also several factors which will impede or support faster Internet penetration and e-commerce development in these countries (the regulatory framework, the situation of IT&C market, the (limited) use of credit cards and other ways of electronic payment, cyber space (in)security and the level of computer literacy, the penetration of mobile telephony as a basis for mobile Internet access). Also, there are presented some results of a survey published to the portal of Faculty of Economics and Business Administration, "Al. I. Cuza" University of Iassy, Romania, during July 2004. The study identifies electronic consumers' motivations and preferences. Ultimately, the user's opinion about electronic commerce can be identified, and used to develop a set of recommendation for Romanian and other developing countries e-readiness growth.
Available at SSRN: http://ssrn. com/ …, 2006
The field of mobile technologies has been particularly dynamic during the past few years. The num... more The field of mobile technologies has been particularly dynamic during the past few years. The number of mobile phone users has grown permanently. Mobile operators are involved in launching new technologies which allow for an ever faster and better data exchange. The degree of ...
Procedia Economics and Finance, 2014
Advances in Intelligent Systems and Computing, 2015
ABSTRACT The present paper uses as research basis a new way of thinking regarding the relation be... more ABSTRACT The present paper uses as research basis a new way of thinking regarding the relation between innovation and knowledge - the Knowledge Flow Percolation Model (KFPM). In this model’s center, human beings are seen as thinking electrons, both consuming and generating knowledge flows. Through the interdependent actions of individuals, knowledge circulates inside organizations, allowing them to innovate in order to obtain competitive advantages. But there is a wide range of barriers which impede the creation and movement of flows in the model grid and consequently, hinder their change into innovation. The solution proposed by this paper as one of the most adequate instruments to make KFPM more spreadable is the project. On this basis, in an empirical study, we try to demonstrate the hypothesis of the positive influence of projects, as knowledge swirls, on the development of innovative skills which will help solving problems in the organization, creating and widening of knowledge and reducing the barriers in knowledge transfer.
Procedia Economics and Finance, 2014
This paper aims to analyze the degree in which Web 2.0 related technologies are used in the Roman... more This paper aims to analyze the degree in which Web 2.0 related technologies are used in the Romanian local public administration. We have mirrored, on the one hand, the positive connotation unanimously credited to ICT technologies and, on the other hand, the blames of bureaucracy and enclosure traditionally addressed to local public agencies (normally regarded as non-innovator). Starting from this apparent set, we have analyzed the modification of ICT technologies brought to the 41 City Halls which are now present virtually, focusing on the use of Web 2.0 technologies ate the year 2012 level. The importance of the analyzed web-pages derives from the width of their target audience: they are addressed, directly or indirectly (indirect estimates include minors), to approximately 7,872,986 people, which amounts to 37% of the total population of Romania. In completing this study, the used research methods were observation, desk review and open interview. The main scientific aim is to conduct the analysis of the theoretical assumptions leading up to changing technological trends in the development of the Romanian public administration, based on own elaborated knowledge's from research field, as well as an empirical testing of the Web 2.0 presence of the Romanian City Halls.
Today, the high level of use and interaction of Social Media influences greatly the business envi... more Today, the high level of use and interaction of Social Media influences greatly the business environment which is thus exposed to a paradigm shift, where hierarchies fall apart and the communication and collaboration create wider and wider networks for the employees and all the partners of the organizations. All the economic sectors, including the tourism and services, are affected. In this spirit, this paper discusses the opportunities and challenges that emerge from the contemporary Social Media evolution for promoting the tourism potential of a country or region. We have noticed changes facilitated by the Web 2.0 related technologies regarding the delivery of information, and the relationship with the modern tourist. According to this information, we have come to several conclusions and recommendations in order to increase the visibility and consumption of Romanian heritage in the 2014 -2020 time horizon.
Uploads
Papers by Daniela Popescul