FBIM Transactions
Editor
Zoran Čekerevac








If you want to review or comment some of the listed articles, please, first copy the article title and click here.



In the next issues


In the next issues of FBIM Transactions, among others, we will publish:
(To read the abstract of the paper, please, click the title of the article)

  1. Boris Bursac
    TERRORIST ORGANIZATIONS IN SYRIA

    To read the article before publishing click here

  2. Zivanka Miladinovic Bogavac
    COMPUTER SABOTAGE

    To read the article before publishing click here

  3. Sergey Kirsanov, Evgeny Safonov, and Galina Palamarenko
    DIGITALIZATION IN THE RUSSIAN ECONOMY: ADVANTAGES AND THREATS

    To read the article before publishing click here

  4. Haris Hamidovic
    PRIVACY IMPACT ASSESSMENT

    To read the article before publishing click here

  5. Lyudmila Prigoda, Milanka Bogavac and Jelena Maletic
    APPLICATION OF RFID TECHNOLOGY – SOME PROBLEMS AND DEVELOPMENT DIRECTIONS

    To read the article before publishing click here


TERRORIST ORGANIZATIONS IN SYRIA

Boris Bursac

Accepted for publishing: 27.11.2018

Abstract
For the past hundred years, Syria has been a synonym for turbulent events, political turmoil, and wars, so we can say that the current situation that has hit Syria is not surprising. The conflict that began in the form of the demonstration in the 2011-th , or, in the form of a sort of conflict of power and opposition, grew into an armed conflict with more than 200,000 dead and 10,000,000 displaced persons. As a result of such a chaos from the "pandora's box" Islamist terrorist organizations have gone out, which lead to misery and poverty, unemployment, political chaos, destabilization, violence, massacres, fighting anytime and anyplace in every city, village, hamlet, therefore, the situation of a general chaos where end of conflicts is not yet seen. It all began with the so-called "Arab Spring" in Tunisia, to expand later to Egypt, Libya, Bahrain, Syria, Yemen, Algeria, Iraq, Jordan, Morocco, Oman and other countries where conflicts were of lesser intensity. The aim of this research is the idea to provide the necessary knowledge stemmed from an extensive analysis, primarily ideological, political, sociological point of view or the point of view of terrorist organizations on the territory of Syria and that the best way to enable true sense of understanding of their business and their great influence on the development of terrorism in general.

Keywords:
Terrorism, Al Nusra, Ahrar al-Sham, Liwa al-Tawhid, Liwa al-Haqq, Syrian Islamic Front

Click here to return to the top of this page



COMPUTER SABOTAGE

Zivanka Miladinovic Bogavac

Accepted for publishing: 10.08.2019

Abstract
There is a growing interest among lawyers in computer crime, otherwise known as cyber-crime. Since it is increasingly developing together with the development of innovations in the field of information technologies, legislative measures are necessary to regulate and sanction this type of crime. Nowadays, computer sabotage appears as a frequent criminal offense, which is incriminated by the Criminal Legislation of the Republic of Serbia. Since it is very generally defined by the Criminal Code, it is necessary to determine the very notion of computer sabotage as well as its types, i.e. it is necessary to present some of the many possibilities for the execution of this crime. International legal regulation is of great importance because the criminal offense in question is the one where the perpetrators may be from different countries and thus work together. The International Convention on Cyber Crime defined terms that are important for determining the concept of computer sabotage. Certainly, computer sabotage and other criminal acts of cybercrime are mutually intertwined, and it is necessary to connect them, compare the similarities and differences and analyze in what relation they stand to each other. It is of particular importance to distinguish computer sabotage from cyber terrorism, which is one of the biggest dangers in the world of computers, computer networks, the internet, and social networks. Given that nowadays it is impossible for an individual or a country to function without the use of computers and modern technologies, it is important that the awareness about the danger of those above-mentioned spreads, and it is, therefore, necessary that countries take significant steps towards regulating computer sabotage and other dangerous activities that are carried out through computer technology.

Keywords:
computer sabotage, cyber crime, computer misuse, computer protection, computer network defense

Click here to return to the top of this page



DIGITALIZATION IN THE RUSSIAN ECONOMY: ADVANTAGES AND THREATS

Sergey Kirsanov
Evgeny Safonov
Galina Palamarenko


Accepted for publishing: 28.08.2019.

Abstract
The urgency of digital transformation, both in business and in entire sectors of the economy, is creating a growing interest in the challenges and threats, risks and benefits that are possible within the digital economy. In the coming years, all areas of state activity, and markets will be refocused in accordance with the requirements of new digital economic models. The large-scale transition to the "digital" cannot be stopped because it is valuable for the consumer, profitable for business, and significant for the government. The value of digital solutions is growing and the price of obtaining them is declining. Digitalization is beginning to go far beyond changes in technology itself - it is becoming a macroeconomic and political factor. The article examines the current state of Russia's digital economy and the financing of the program of digitization of the economy. The country's rating is analyzed in accordance with the indices adopted in the international community, which measure how well the Russian economy uses digital technologies to improve competitiveness and well-being, as well as estimate factors influencing the development of the digital economy. The significant lag in the development of Russia's digital economy from world leaders is due to gaps in the regulatory framework for digitalization and a poorly maintained environment for doing business and innovation and, as a result, low levels of digital applications.

Keywords:
digital economy, digitalization, digital technologies, international indices

Click here to return to the top of this page



PRIVACY IMPACT ASSESSMENT

Haris Hamidovic

Accepted for publishing: 08.09.2019

Abstract
Integrating the privacy requirement in the information system design is not an easy task. First of all, privacy is a complex, multiple, and contextual concept in itself. In addition, the issue of privacy is not a primary requirement of the system, and sometimes even this requirement can come into conflict with other (functional or non-functional) requirements of the information system. Therefore, it is of utmost importance to precisely define the objectives of privacy in the process of realizing privacy by design. One way to define the objectives of the information system in terms of the privacy requirement is to conduct a privacy impact assessment or a privacy risk analysis. Conducting a privacy impact assessment is in line with the principles of technical and integrated data protection under Article 25 of the General Data Protection Regulation – GDPR. In accordance with the principles of technical and integrated data protection, a privacy impact assessment should be carried out before the processing itself with the aim of using it as a tool for decision-making, in particular for the selection of appropriate technical protection measures. Although the General Data Protection Regulation does not prescribe any specific methodology or standard for privacy impact assessment in the guidelines of the Article 29 Working Group on Data Protection, there are recommendations for the use of international standards. This paper presents the method of privacy impact assessment based on the recommendations of the French Data Protection Agency and the recommendations of international standards ISO/IEC 29134 and ISO/IEC 27005.

Keywords:
privacy, personal data, data protection, privacy impact assessment, GDPR, PIA, ISO/IEC 29134.

Click here to return to the top of this page


APPLICATION OF RFID TECHNOLOGY – SOME PROBLEMS AND DEVELOPMENT DIRECTIONS

Lyudmila Prigoda
Milanka Bogavac
Jelena Maletic

Accepted for publishing: 27.11.2017

Abstract
In the conditions of modern business and the increasing use of computer technologies, more time constraints are being imposed to businesses, increasing demands in terms of efficiency of the use of machinery, automation of technological processes, higher reliability, lower costs and better economic indicators. As one of the convenient solutions, the use of RFID technology appears. RFID systems are playing a significant role in increasing efficiency and reducing operating costs in the last dozen years, even though all the potentials of this technology have not yet been discovered or exploited. RFID technology provides practical benefits to anyone who needs to monitor the physical presence of objects in a certain environment. Many improve supply chains and production processes by introducing this technology. The reasons for the use of RFID technology in large systems are the ability to fully automate the work with the use of computer management and control, better control of issuing and monitoring the stock situation, while reducing the possibility of error as well as theft and fraud, increasing profits and quality, obtaining reports on the issue of parts or fuel (at what time it was taken, in what quantity ...) etc. In this paper, one RFID solution for controlling fuel refueling at fuel supply stations is shown in more detail. The advantages and disadvantages of this technology, the economic aspects of the application, as well as the possibilities of complete protection against theft and various other frauds are considered. The analysis has shown that the positive effects can be a reduction of total costs, optimization of the existing supply system, optimization of the existing system for monitoring the quantitative state of the fuel stock at fuel stations, fuel consumption by vehicles, etc. At the end of the paper, the future of RFID technology, the paths for further development, and the potential risks of applying this technology are analyzed.

Keywords:
Information Technologies, RFID, control, fuel, disadvantages, attacks

Click here to return to the top of this page








MESTE NGO and FBIM Transactions support teamwork and encourage international scientific cooperation.

That is why we are especially willing to publish works of groups of authors from two or more different countries.


Za prelazak na srpski jezik
kliknite na ikonu



Za prelazak na srpski jezik kliknite na ikonu