Selected Papers from the 14th International Conference on Application of Information and Communication Technology and Statistics in Economy and Education (ICAICTSEE-2024), December 2-3rd, 2024, UNWE, Sofia, Bulgaria
Selected Papers from the 14th International Conference on Application of Information and Communication Technology and Statistics in Economy and Education (ICAICTSEE-2024), December 2-3rd, 2024, UNWE, Sofia, Bulgaria
Contributor(s): Dimiter Velev (Editor), Serghei Ohrimenco (Editor), Plamena Zlateva (Editor)
Subject(s): Social Sciences, Economy, Education, National Economy, Business Economy / Management, Higher Education , ICT Information and Communications Technologies, Distance learning / e-learning
Published by: Университет за национално и световно стопанство (УНСС)
Keywords: Information and Communication Technology; Statistics; Innovations; Sustainability; Business; Economy; Education
Summary/Abstract: The 14th International Conference on Application of Information and Communication Technology and Statistics in Economy and Education (ICAICTSEE-2024), was held on December 2 and 3, 2024 at the University of National and World Economy (UNWE), Sofia, Bulgaria. During the conference, the results of the application of ICT in various fields of economy, education and related fields of scientific knowledge were presented, and certain advanced and emerging research trends of long-term significance were discussed. The conference was held under the auspices of the International Federation for Information Processing (IFIP).
- E-ISBN-13: 978-619-232-917-4
- Page Count: 384
- Publication Year: 2025
- Language: English
Тhe Integration of State-of-the-Art Technologies and the Ethical Considerations in the Development of Digital Twins
Тhe Integration of State-of-the-Art Technologies and the Ethical Considerations in the Development of Digital Twins
(Тhe Integration of State-of-the-Art Technologies and the Ethical Considerations in the Development of Digital Twins)
- Author(s):David Bennett, Violeta Vasileva, Veselina Aleksandrova
- Language:English
- Subject(s):Social Sciences, Economy, Sociology, Methodology and research technology, Social Informatics, ICT Information and Communications Technologies, Socio-Economic Research
- Page Range:1-6
- No. of Pages:6
- Keywords:Digital Characters; Digital Identity; Technology; AI; 3D; Art
- Summary/Abstract:The identity of a person in society is also related to his presentation in the digital space. In the age of digital progress, the technologies for digital representation of people and objects are also developing. As society and technology advances, the representation of our identity reaches a point where a conflict can arise between what the identity means and the truth behind it. The authors present a methodology that aims to represent the technological advances that have occurred in the field of digital character creation. The aim is to target the younger digital generations, showing the influential role of technology and content creation in the manipulation of identity. The proposed methodology is interdisciplinary in nature, as it would be successfully applied in the field of cultural-historical heritage as well as cyber intelligence.
Building Digital Trust in Document-Centric Systems
Building Digital Trust in Document-Centric Systems
(Building Digital Trust in Document-Centric Systems)
- Author(s):Serghei Ohrimenco, Ghenadie Belinschi, Nichita Bradu
- Language:English
- Subject(s):Politics, Economy, Business Economy / Management, Security and defense, ICT Information and Communications Technologies, Socio-Economic Research
- Page Range:7-14
- No. of Pages:8
- Keywords:Cybersecurity; Digital Trust; Zero Trust; Document-Centric System; International Standards
- Summary/Abstract:The article is devoted to the study of the concept of ‘Zero Trust’ (ZT) as applied to document-centric systems. Various definitions of the ZT concept given in various scientific sources are considered and analysed. The authors point out that the concept of ZT has been further developed in the context of the revision of the conceptual foundations of cybersecurity. An analysis of the composition of literature sources is given. The authors reviewed international standards for access control in document-centric systems. The third part of the paper describes the document-centric approach, which acts as a ‘framework’ for building digital trust, and ZT principles in this context provide a constant assessment of the legitimacy of user actions based on certain risks.
Applying Media Intelligence for Processing the Content of Web Publications
Applying Media Intelligence for Processing the Content of Web Publications
(Applying Media Intelligence for Processing the Content of Web Publications)
- Author(s):Plamen Milev
- Language:English
- Subject(s):Social Sciences, Economy, Media studies, Business Economy / Management, Communication studies, Sociology, Social Informatics, ICT Information and Communications Technologies
- Page Range:15-21
- No. of Pages:7
- Keywords:Media Intelligence; Web Publications; Natural Language Processing; Digital Media; Data Analytics
- Summary/Abstract:The rapid evolution of the digital media landscape necessitates advanced tools and approaches to analyze and understand the content of web publications. This paper presents a conceptual framework for applying media intelligence to process and analyze media content, using data analytics, machine learning, and natural language processing (NLP) techniques. The study focuses on the use of NLP for sentiment analysis and topic modeling, as well as categorization algorithms to group content by themes and geographic parameters. Preliminary findings demonstrate that media intelligence provides significant insights into the prevailing trends and public sentiment within digital media, offering a foundation for future research aimed at enhancing the understanding of media influence on public perception.
Regular Expressions in Web Data Processing: a Case Study on Online Media
Regular Expressions in Web Data Processing: a Case Study on Online Media
(Regular Expressions in Web Data Processing: a Case Study on Online Media)
- Author(s):Yavor Tabov
- Language:English
- Subject(s):Social Sciences, Economy, Media studies, Business Economy / Management, Communication studies, Sociology, Social Informatics, ICT Information and Communications Technologies
- Page Range:22-26
- No. of Pages:5
- Keywords:Regular expressions; Web data processing; Data cleaning; Normalization
- Summary/Abstract:Regular expressions (regex) are a versatile tool for processing web data, offering precision and flexibility in handling unstructured or semi-structured content. In the context of online media, they play a vital role in tasks like content extraction, data analysis, and automation of workflows. This study examines the features and applications of regular expressions in data processing. It focuses on practical use cases of regex in web data processing, particularly for online media platforms, such as data extraction, and the cleaning and normalization of raw text. Finally, the paper presents conclusions based on the research conducted.
Methodological Approaches to the Application of AI-Transcribers' Tools in Research Studies
Methodological Approaches to the Application of AI-Transcribers' Tools in Research Studies
(Methodological Approaches to the Application of AI-Transcribers' Tools in Research Studies)
- Author(s):Tatiana Colesnicova, Mihail Ciobanu
- Language:English
- Subject(s):Social Sciences, Economy, Business Economy / Management, Sociology, Methodology and research technology, Social Informatics, ICT Information and Communications Technologies
- Page Range:27-37
- No. of Pages:11
- Keywords:AI transcription; Methodological approaches; Comparative analysis; SWOT analysis; Research tools
- Summary/Abstract:AI transcription; Methodological approaches; Comparative analysis; SWOT analysis; Research toolsThis paper analyses methodological approaches to the application of AI transcription tools in research studies, with a focus on comparative analysis of their performance and utility. It evaluates key aspects such as accuracy, language support, and usability, employing SWOT analysis to identify the strengths, weaknesses, opportunities, and threats of these tools. The study provides insights into their suitability for diverse research contexts and offers a practical framework for effectively integrating AI transcription tools into research methodologies. This article was elaborated within the framework of the Subprogram 030101 "Strengthening the resilience, competitiveness and sustainability of the Moldovan economy in the context of the EU accession process", institutional funding.
Shaping the Future of Innovation Management: The Evolution from Industry 4.0 to Industry 5.0
Shaping the Future of Innovation Management: The Evolution from Industry 4.0 to Industry 5.0
(Shaping the Future of Innovation Management: The Evolution from Industry 4.0 to Industry 5.0)
- Author(s):Ala Cotelnic, Irina Dorogaia
- Language:English
- Subject(s):Economy, Business Economy / Management, Socio-Economic Research
- Page Range:38-49
- No. of Pages:12
- Keywords:Innovation Management; Industry 4.0; Industry 5.0; Human-centric innovation; Sustainable ecosystems
- Summary/Abstract:The technologies involved in our times are characterized by high speed, the ability to self-learn and adapt, so they require a special approach to use. The use of technologies that fundamentally change all processes contribute to the change of the entire organization. Such significant changes push to the formation of new approaches in innovation management. The aim of the paper is to identify the relationship between the concepts of Industry 4.0 and Industry 5.0, to establish a conceptual continuum between these terms, and to highlight some points related to the perception of social problems in SMEs in the Republic of Moldova. The paper presents the data of the research conducted in the period January-May 2023 in the context of the post-doctoral study "Creation of a change management model for SMEs of the Republic of Moldova in the context of Industrialization 4.0".
AI and Challenges of Education in Korean Universities
AI and Challenges of Education in Korean Universities
(AI and Challenges of Education in Korean Universities)
- Author(s):James Kang
- Language:English
- Subject(s):Social Sciences, Economy, Education, Business Economy / Management, Higher Education , ICT Information and Communications Technologies, Socio-Economic Research, Sociology of Education
- Page Range:50-60
- No. of Pages:11
- Keywords:AI in education; Personalized learning; AI ethics; Faculty training; Higher education policy
- Summary/Abstract:The integration of Artificial Intelligence (AI) in Korean higher education is transforming learning by enabling personalized education, automating administrative tasks, and improving assessments. AI-driven tools, including smart classrooms, tutoring systems, and adaptive learning platforms, enhance flexibility and efficiency in education. However, challenges such as ethical concerns, unequal AI access, and over-reliance on AI hinder full its implementation. Additionally, the rapid evolution of AI makes curriculum updates and faculty training essential. This paper analyzes challenges in education and intergration of AI and explores solutions such as hybrid AI-human teaching models, AI ethics policies, increased funding, and faculty training programs. While AI offers significant benefits, its implementation must ensure inclusivity, fairness, and the continued role of educators in shaping higher education.
DB2, Transact-SQL and Object-Relational Model of Data
DB2, Transact-SQL and Object-Relational Model of Data
(DB2, Transact-SQL and Object-Relational Model of Data)
- Author(s):Vladimir Dimitrov
- Language:English
- Subject(s):Economy, Business Economy / Management, ICT Information and Communications Technologies
- Page Range:61-68
- No. of Pages:8
- Keywords:DB2; Transact-SQL; Microsoft SQL Server; Relational model of data; Object-relational model of data
- Summary/Abstract:At the beginning of the 90’s of the last century, many experts predicted that the new object-oriented model of data would displace the relational model of data in the world of database systems. The object-oriented model of data still dominates in currently available programming languages. This model of data is suitable for reliable programming. Further, object-oriented concepts permit more adequate modelling of real world. However, above-mentioned prediction did not happened - the relational model of data successfully evolved into the object-relational model of data. The last one has adopted all object-oriented concepts and at the same time supports backward compatibility with the relational model of data. The last one happened to be very important because there were no need old applications using relational database systems to be re-engineered and recoded to work with the new object-relational database systems. Many DBMS vendors have declared its intention to support object-relational model of data, but only few of currently available database management systems are object-relational. This paper outlines the main characteristics of object-relational model of data and then investigates DB2 and Microsoft SQL Server support of that model of data. These two database systems are examples of successful and unsuccessful implementation of the object-relational model of data.
Formalization of Software Weakness CWE-128
Formalization of Software Weakness CWE-128
(Formalization of Software Weakness CWE-128)
- Author(s):Vladimir Dimitrov
- Language:English
- Subject(s):Economy, Business Economy / Management, ICT Information and Communications Technologies
- Page Range:69-75
- No. of Pages:7
- Keywords:Z-notation; CWE; Formal specification; Software weakness; Cyber security
- Summary/Abstract:Collection and publication of software and hardware vulnerabilities, weaknesses, and attacks is an important activity for cyber defense. NIST has initiated establishment and support of such databases. However, these initiatives are supported in clearly defined process to and by all stakeholders. These are CVE, CWE and CAPEC initiatives maintained by MITRE Corporation. CVE is a list containing all registered software and hardware vulnerabilities in particular platforms. CWE is organized as vulnerability (CVEs) classifier. It has complex hierarchical structure – more precisely, vulnerabilities are classified in several application hierarchies. CAPEC contains attack patterns. The last are organized in complex hierarchical structure as CWEs. CVE, CWE, and CAPEC refer to each other: vulnerabilities are classified by one or more weaknesses; attack patterns exploit one or more weaknesses. CWEs are described in formatted text – structured unformal description. There is no widely accepted formal notation for that purpose. This paper presents an attempt for formal description of CWEs. Z-notation is used as description tool. CWE-128 description is formalized. CWE-128: Wrap-around Error is simple weakness that occurs whenever a value is incremented past the maximum value for its type. Z-notation is standardized tool for formal specification based on mathematics – set theory and logic extended with schemas. It is powerful but complex tool for non-mathematicians. This means that nearly all knowledge can be specified, but the problem is how computer scientists that are not mathematicians would accept these specifications.
Digital Economy - Development Opportunities for Companies in the Republic of Moldova
Digital Economy - Development Opportunities for Companies in the Republic of Moldova
(Digital Economy - Development Opportunities for Companies in the Republic of Moldova)
- Author(s):Diana Ignatiuc, Felicia Petrea
- Language:English
- Subject(s):Economy, National Economy, Business Economy / Management, Marketing / Advertising, ICT Information and Communications Technologies
- Page Range:76-84
- No. of Pages:9
- Keywords:Digital economy; Digital; E-commerce; Marketplace; Opportunities
- Summary/Abstract:This paper reviews the opportunities for transitioning from the traditional economy to the digital economy for companies in the Republic of Moldova. It analyzes the development opportunities for companies in both rural and urban areas. The study aims to identify the sectors with the greatest potential, as well as the challenges and opportunities related to e-business, e-business infrastructure, and e-commerce. In addition, this paper explores the opportunities Moldova has to develop its digital economy by implementing the digital development strategy of the Republic of Moldova 2023-2030. The development of the digital economy is both an opportunity and a necessity for the Republic of Moldova at present. The subsequent study outlines all the benefits for Moldovan companies resulting from the transition to the digital economy.
Technological Unemployment in the Context of Structural Transformation Determined by the Digital Economy
Technological Unemployment in the Context of Structural Transformation Determined by the Digital Economy
(Technological Unemployment in the Context of Structural Transformation Determined by the Digital Economy)
- Author(s):Diana Ignatiuc, Oxana Livitchi
- Language:English
- Subject(s):Economy, Supranational / Global Economy, ICT Information and Communications Technologies, Socio-Economic Research
- Page Range:85-91
- No. of Pages:7
- Keywords:digital economy; automation; technological unemployment; information and communication technologies; global economy; digital transformation; innovation
- Summary/Abstract:The philosophical basis of contemporary economic theory is rooted in the concept that the material well-being of the global community, especially in the medium and long term, is determined by the development level and quality of digital technologies. Simultaneously with the emergence of the digital economy, the need for a scientific understanding of its impact on socio-economic development has become increasingly significant. From a broader perspective, the development of the digital economy induces positive shifts, including enhanced labor productivity, reduced market entry barriers, and the advancement of competition, among others. In contrast, it is also associated with a significant drawback, namely the inevitable transformation of employment structures, which entails the emergence and escalation of technological unemployment. This article aims to examine the key characteristics underlying the emergence of technological unemployment within the framework of the digital economy's development. This research is based on the dialectical method of inquiry, alongside techniques of theoretical modeling, comparison, generalization, and empirical data analysis.
Profitability Based on Live Labor Costs (Models and Methodology for Analysis)
Profitability Based on Live Labor Costs (Models and Methodology for Analysis)
(Profitability Based on Live Labor Costs (Models and Methodology for Analysis))
- Author(s):Rositsa Ivanova
- Language:English
- Subject(s):Economy, Business Economy / Management, Human Resources in Economy, Socio-Economic Research
- Page Range:92-101
- No. of Pages:10
- Keywords:Workforce; Labor productivity; Models; Effectiveness; Factors; Influencing
- Summary/Abstract:Labor is one of the factors that directly affect the implementation of the business plan of any enterprise. The effectiveness of the use of the labor force of an industrial enterprise is characterized by the labor productivity indicator, considered in two aspects. First, as an independent object of financial and economic analysis, i.e. as an indicator of efficiency, the value of which is formed under the influence of a system of direct and indirect factors. The task of the analysis is to establish and assess the strength and direction of influence of direct factors on the changes in labor productivity that have occurred. In the second aspect, labor productivity is analyzed as a factor influencing the formation and change in the values of other important key business indicators characterizing the activities of the enterprise. The object of study in the article is profitability based on the cost of living labor in the enterprise as an independent object of analysis. The subject of study are models for analyzing profitability based on the cost of living labor in the enterprise. The purpose of the article is to derive and propose improved model for analyzing the influence of direct factors on changes in profitability, calculated on the basis of living labor costs. To achieve this goal, tasks are solved to establish the influence of factors from different levels of management on changes in the values of this important business indicator. At the first level, the influence is exerted by changes in: annual labor productivity, average costs of salaries and insurance premiums for personnel and sales profitability. At the second level, the factors are related to changes in staff structure, use of working time and hourly labor productivity. At the third level, influencing factors are related to the structure of production by labor intensity, individual hourly labor productivity by type of products, average wage and insurance per person of the staff.
Risk Assessment during the Audit of Insurers’ Information Environment
Risk Assessment during the Audit of Insurers’ Information Environment
(Risk Assessment during the Audit of Insurers’ Information Environment)
- Author(s):Maia Natchkova
- Language:English
- Subject(s):Economy, Business Economy / Management, Accounting - Business Administration, ICT Information and Communications Technologies
- Page Range:102-108
- No. of Pages:7
- Keywords:insurers; risks; information environment; independent financial audit
- Summary/Abstract:The independent financial audit gives to the public an independent expert opinion on the authenticity of the insurers’ financial statements and on the true and fair presentation of the information therein in all material aspects. The identification and assessment of the major risks that influence the information environment of the audited insurers by the certified public accountants, registered auditors, through specific audit procedures, is crucial for the high-quality independent financial audit of the financial statements. Registered auditors must track the timely and adequate measures undertaken by the audited insurers in order to eliminate the adverse effects of these risks on their information environment, and therefore, on the quality of the performed independent financial audit of the insurers’ financial statements. Registered auditors must carry out continuous control over the digital technologies used by the audited insurers in the process of their insurance business for the purposes of finding in timely manner of any weaknesses, errors and defects in the process of digitalization of their information environment. Ensuring high-quality independent financial audit requires to improve the digitalization process of the independent financial audit of insurers’ financial statements, by improving the effectiveness of controls and passwords, enhancing cybersecurity and improving the protection of information obtained during the audit of their information environment.
Strength Verification of Floor Steel Loading Platform for Building of Small Floor House
Strength Verification of Floor Steel Loading Platform for Building of Small Floor House
(Strength Verification of Floor Steel Loading Platform for Building of Small Floor House)
- Author(s):Lubomir Lahtchev
- Language:English
- Subject(s):Social Sciences, Economy, Sociology, Methodology and research technology, ICT Information and Communications Technologies
- Page Range:109-113
- No. of Pages:5
- Keywords:building loading platform; strength verification; small floor house
- Summary/Abstract:family house is an economically acceptable solution for this aim. It needs of suitable loading platform, which usually is made from concrete. When the concrete platform is not foreseen in the building project it must be changed with steel loading platform performing the same function. In this case, a strength verification of the bearing capability of the steel platform is required. The paper is dedicated on the method of examination the forces, affecting the steel platform at a given scenario of its assemblage with the house for earth based load lift up system.
Risks and CyberSecurity Measures for Online Safety in Higher Education: Challenges and Perspectives
Risks and CyberSecurity Measures for Online Safety in Higher Education: Challenges and Perspectives
(Risks and CyberSecurity Measures for Online Safety in Higher Education: Challenges and Perspectives)
- Author(s):Aurelia Turcan, Lucia Gujuman
- Language:English
- Subject(s):Social Sciences, Economy, Education, Business Economy / Management, Higher Education , ICT Information and Communications Technologies
- Page Range:114-122
- No. of Pages:9
- Keywords:digital; university education; online safety; risk; cybersecurity
- Summary/Abstract:Contemporary society is rapidly moving towards digitization, an essential process without which progress would not be possible. Technology and digitalization have become central pillars of economic and social development, influencing all aspects of our lives. Currently, in the context of accelerated digitalization and increased dependence on technology, cybersecurity issues in higher education are becoming increasingly relevant. The importance of this study lies in the identification and analysis of cyber risks specific to higher education institutions, as well as in proposing effective measures to prevent and minimize these threats, thus ensuring a safe and protected academic environment. The aim of this paper is to present the cybersecurity risks that affect higher education and propose practical solutions for reducing them: implementing strict security policies, using multi-factor authentication, encrypting data, and adopting advanced IT security solutions, etc. By investigating these aspects and proposing concrete solutions, the paper contributes to the creation of a comprehensive cybersecurity framework in higher education institutions, ensuring data protection and the continuity of academic activities in a secure and robust digital environment.
The Role of AI in Shaping a New Era of Cybersecurity Vulnerability Detection
The Role of AI in Shaping a New Era of Cybersecurity Vulnerability Detection
(The Role of AI in Shaping a New Era of Cybersecurity Vulnerability Detection)
- Author(s):Veronica Hincu
- Language:English
- Subject(s):Economy, Business Economy / Management, ICT Information and Communications Technologies, Socio-Economic Research
- Page Range:123-130
- No. of Pages:8
- Keywords:Artificial intelligence; Cybersecurity; Vulnerability detection; Security automation; Data analysis
- Summary/Abstract:Cyberattacks are becoming more numerous and sophisticated around the world. This trend is expected to continue to grow in the future, as more and more devices are connected to the internet. Nowadays, artificial intelligence (AI) plays an important role in transforming cybersecurity, enabling faster detection of vulnerabilities. Machine learning, anomaly detection, and predictive analytics are AI-based technologies that enable the identification of threats before they are exploited. Artificial intelligence significantly improves the speed, accuracy, and scalability of security measures by automating vulnerability assessment processes and analyzing large amounts of data. However, integrating AI into cybersecurity also brings challenges, including ethical concerns and the risk of adversarial attacks. This article explores how artificial intelligence is shaping a new era of proactive vulnerability detection, discussing both the opportunities and challenges it presents in building more resilient digital infrastructures.
Computer Based Linear Modeling of the Brachial Artery along with a Signal of Electronic Sphygmomanometer
Computer Based Linear Modeling of the Brachial Artery along with a Signal of Electronic Sphygmomanometer
(Computer Based Linear Modeling of the Brachial Artery along with a Signal of Electronic Sphygmomanometer)
- Author(s):Lubomir Lahtchev
- Language:English
- Subject(s):Social Sciences, Economy, Methodology and research technology, ICT Information and Communications Technologies
- Page Range:131-139
- No. of Pages:9
- Keywords:Electronic sphygmomanometer; Brachial artery; Determinate linear model; Automatic control
- Summary/Abstract:The personal computer reads the pressure signal of electronic sphygmomanometer. The discrete readings of the signal are restored and filtered during whole cycle of continuous measurement process. The resulted piece wise discrete graphics is separated into input influence branch and output result branch in accordance with the structure scheme, describing adequate measurement system of automatic control (MSAC). The exploration is oriented to building the linear model of the output result branch and its estimation, based on the theory of the automatic control (TAC). The measurement SAC belongs to a class determinate linear continuous controllable systems. The estimation is lead out with computation of the transition characteristics and its parameters, for which the transition process lasts around three - five time constants.
Schedule and Cost Project Risk Assessment Using Simulation Modeling
Schedule and Cost Project Risk Assessment Using Simulation Modeling
(Schedule and Cost Project Risk Assessment Using Simulation Modeling)
- Author(s):Tsvetan Tsvetkov
- Language:English
- Subject(s):Social Sciences, Economy, Business Economy / Management, Sociology, Methodology and research technology, ICT Information and Communications Technologies
- Page Range:140-150
- No. of Pages:11
- Keywords:Project risk; Schedule risk; Cost risk; Monte Carlo simulation
- Summary/Abstract:This paper is dedicated to an approach for assessing project schedule and cost risks, which uses the methodology of simulation modelling. A problem identification was made, examining the issues in this area. The main identified issue is that the current environment in which projects are developed and implemented is complex and highly dynamic. It is increasingly difficult for managers to rely on their own intellect, experience and intuition to justify their decisions in project management. It is necessary to use contemporary methods with a quantitative orientation. An analysis of the literary sources in the areas necessary to clarify the indicated approach is presented: project management, project risk management, PERT/CPM network models, and the features of simulation modelling. For the needs of this paper, a hypothetical project was developed, based on which a simulation model for cost and time risk analysis was created. The model was run with 5 000 iterations, and the results obtained were analysed. Based on this, a series of conclusions have been formulated.
Integration of Artificial Intelligence for Automation and Optimization in Backend Programming
Integration of Artificial Intelligence for Automation and Optimization in Backend Programming
(Integration of Artificial Intelligence for Automation and Optimization in Backend Programming)
- Author(s):Maria Marzovanova, Veska Mihova
- Language:English
- Subject(s):Social Sciences, Economy, Business Economy / Management, Sociology, Methodology and research technology, ICT Information and Communications Technologies
- Page Range:151-157
- No. of Pages:7
- Keywords:Аrtificiаl Intеlligеncе; Bаckеnd Prоgrаmming; ML.NЕT; Аzurе Cоgnitivе Sеrvicеs; GitHub Cоpilоt; Intеllicоdе
- Summary/Abstract:With the rapid development of Artificial Intelligence (AI) and its growing аpplicаtiоns in thе sоftwаrе industry, dеvеlоpеrs аrе incrеаsingly sееking wаys tо intеgrаtе it fоr аutоmаtiоn аnd оptimizаtiоn оf bаckеnd prоcеssеs. This pаpеr еxplоrеs thе оppоrtunitiеs fоr implеmеnting АI in bаckеnd dеvеlоpmеnt with C#, fоcusing оn tооls such аs GitHub Cоpilоt, Intеllicоdе, ML.NЕT, Аzurе Cоgnitivе Sеrvicеs. Mоst impоrtаnt АI cаpаbilitiеs аrе prеsеntеd, including thе аutоmаtiоn оf rоutinе tаsks, аutоmаtеd tеsting, аnd prеdictiоn оf pоtеntiаl cоdе еrrоrs. Thе pаpеr аlsо еxаminеs thе chаllеngеs оf intеgrаtiоn. It dеmоnstrаtеs hоw АI cаn trаnsfоrm bаckеnd prоgrаmming, mаking it mоrе еfficiеnt аnd rеliаblе.
Mеtadata Modеl for Migrating Еxcеl Formulas and Data to SQL Sеrvеr
Mеtadata Modеl for Migrating Еxcеl Formulas and Data to SQL Sеrvеr
(Mеtadata Modеl for Migrating Еxcеl Formulas and Data to SQL Sеrvеr)
- Author(s):Veska Mihova, Maria Marzovanova
- Language:English
- Subject(s):Social Sciences, Economy, Sociology, Methodology and research technology, ICT Information and Communications Technologies
- Page Range:158-164
- No. of Pages:7
- Keywords:Еxcеl migration; SQL Sеrvеr; Mеtadata modеl; Formula convеrsion
- Summary/Abstract:Thе widеsprеad usе of Еxcеl sprеadshееts for data analysis and opеrational tasks oftеn introducеs limitations in scalability, maintainability, and intеgration with еntеrprisе systеms. This papеr proposеs a mеtadata-drivеn modеl for thе migration of Еxcеl formulas and data structurеs into SQL Sеrvеr. Thе modеl lеvеragеs mеtadata to еncapsulatе Еxcеl’s logic, structurе, and dеpеndеnciеs, allowing for accuratе and maintainablе translation into SQL-compatiblе formats. Kеy aspеcts addrеssеd includе formula rеusability, dеpеndеncy rеsolution, and data normalization. Thе proposеd approach is particularly applicablе in domains such as disastеr risk assеssmеnt, whеrе Еxcеl-basеd modеls arе frеquеntly usеd to еvaluatе natural hazards, vulnеrability, and еxposurе. Migrating thеsе modеls to SQL Sеrvеr еnablеs intеgration with rеal-timе data sourcеs and gеospatial systеms, supporting fastеr and morе rеliablе еmеrgеncy rеsponsе planning.
The National Cyber Defence - A Balance of Ambitions and Capabilities
The National Cyber Defence - A Balance of Ambitions and Capabilities
(The National Cyber Defence - A Balance of Ambitions and Capabilities)
- Author(s):Kristina Krumova
- Language:English
- Subject(s):Politics / Political Sciences, Politics, Economy, Business Economy / Management, Security and defense, ICT Information and Communications Technologies
- Page Range:165-172
- No. of Pages:8
- Keywords:Communication and information system; Capability; Cyber; Defence; Cyberspace; MilCERT
- Summary/Abstract:The paper reviews the necessity for a balance between ambitions at political and strategic levels and the capabilities to operate in cyberspace. The main way to improve national cyber defence is through a comprehensive approach to developing existing and acquiring new capabilities to operate in cyberspace. On the other hand, high national ambitions in the cyber domain are a direct response to growing threats and their destructive impacts.
Digital Transformation in Education as a Pillar of Sustainable Competitiveness
Digital Transformation in Education as a Pillar of Sustainable Competitiveness
(Digital Transformation in Education as a Pillar of Sustainable Competitiveness)
- Author(s):Oxana Livitchi, Diana Ignatiuc
- Language:English
- Subject(s):Politics / Political Sciences, Politics, Social Sciences, Economy, Education, Business Economy / Management, Economic policy, Developing nations, ICT Information and Communications Technologies, Socio-Economic Research, Sociology of Education, Distance learning / e-learning
- Page Range:173-183
- No. of Pages:11
- Keywords:Education; Digital transformation; Advantages; Systemic model; Competitiveness
- Summary/Abstract:Digital transformation in education plays a crucial role in the development of an educational system that is both sustainable and of high quality, capable of responding to the challenges and needs of a constantly evolving labor market. The research explores the impact of digital technologies on the accessibility and quality of educational processes, as well as on the competencies developed among future professionals. An important aspect is the integration of essential digital skills, which contribute not only to the personal and professional development of students but also to increasing competitive. Furthermore, supporting continuous digital learning is a key factor in developing a workforce capable of quickly adapting as technology advances. In this context, digital transformation in education becomes a pillar of sustainable competitiveness, facilitating the training of professionals ready to face the new challenges of the labor market.
Importance of Regenerative Agriculture in the Republic of Moldova in the Context of Climate Change
Importance of Regenerative Agriculture in the Republic of Moldova in the Context of Climate Change
(Importance of Regenerative Agriculture in the Republic of Moldova in the Context of Climate Change)
- Author(s):Eugeniu Stoian
- Language:English
- Subject(s):Economy, National Economy, Business Economy / Management, Agriculture, Energy and Environmental Studies
- Page Range:184-192
- No. of Pages:9
- Keywords:Regenerative agriculture; Sustainability; Circular economy; Ecological impact; Climate change
- Summary/Abstract:Regenerative agriculture is gaining increasing importance in the Republic of Moldova as a key response to the environmental and economic challenges of climate change. This innovative agricultural practice focuses on restoring and maintaining soil health, reducing soil erosion, increasing the soil's capacity to retain water and improving natural fertility. Through techniques such as crop rotation, cover crop cultivation, compost integration and minimizing tillage, regenerative agriculture supports the development of sustainable agricultural ecosystems while reducing dependence on environmentally harmful chemical inputs. As Moldova faces increasingly intense periods of drought and erratic rainfall caused by climate change, these regenerative practices help increase farmers' resilience and adaptability to variable climatic conditions. Healthy soils with a high organic matter content become more resilient to drought, providing farmers with more stable yields and reduced losses. In addition, regenerative agriculture contributes to reducing greenhouse gas emissions through soil carbon sequestration practices and by promoting farming methods that conserve biodiversity and reduce degradation of agricultural land. In addition to environmental benefits, regenerative agriculture also brings significant economic benefits to rural communities, contributing to food security and income diversification. Regenerative practices reduce long-term costs by reducing the need for irrigation and chemical fertilizers and thus support the development of a more resilient economic model for farmers. The implementation of regenerative farming practices can also attract international financial support and is aligned with globally promoted sustainability and environmental conservation objectives.
Integration of Artificial Intelligence in Security Controls for Financial Organizations
Integration of Artificial Intelligence in Security Controls for Financial Organizations
(Integration of Artificial Intelligence in Security Controls for Financial Organizations)
- Author(s):Atanas Nikolov, George Ridzhalski
- Language:English
- Subject(s):Politics / Political Sciences, Politics, Economy, Business Economy / Management, Security and defense, ICT Information and Communications Technologies
- Page Range:193-203
- No. of Pages:11
- Keywords:data breach; ransomware; CVE; NIST AI RMF; machine learning; deep learning; EU AI Act; privacy preserving artificial intelligence
- Summary/Abstract:The digital transformation that is occurring nowadays in numerous organizations is based on the prerequisite for proactive security operations in terms of protecting valuable assets that could drain the financial efforts even of a well developed, built through decades, organizations. The core of this movement could be enabled by artificial intelligence, because cyberattacks are becoming more complex, and even more important - complexity that could be developed by almost anybody, through the usage of GPTs or other technologies, makes it easy for any company or governmental entity to become a target. In this paper, you can find exact ways on how artificial intelligence can help technical security controls, to proactively “catch” new attacks, by using sophisticated learning, rather than just simple rules for detection, and you will find how this correlates to the current compliance standards and frameworks.
IT Tools in ESP Pedagogy: Current Practices of Using Video Materials
IT Tools in ESP Pedagogy: Current Practices of Using Video Materials
(IT Tools in ESP Pedagogy: Current Practices of Using Video Materials)
- Author(s):Anastasia Romanova
- Language:English
- Subject(s):Social Sciences, Economy, Education, Business Economy / Management, Vocational Education, ICT Information and Communications Technologies, Pedagogy
- Page Range:204-211
- No. of Pages:8
- Keywords:ESP; information technologies; communicative competence; video support
- Summary/Abstract:Developments in Information and Communication Technology have transformed the way people communicate, also the way they learn. IT tools are widely used in language teaching and learning, and the benefits have been repeatedly expressed in literature. ESP is area of language education that has been affected by these developments. Despite the fact that there are ESP practitioners who use technologies in their teaching, more research is needed in order to identify how widely technology tools are used in ESP, so that action is taken to empower practitioners and provide them with the help they need in order to integrate technology in their practices. The article focuses on the issue of selecting video materials for ESP lessons. The first part describes some theoretical approaches. In the next part the author’s personal experience of selecting video in language teaching is briefly covered. The paper concludes with suggestions regarding opportunities for professional development on issues related to the integration of video materials in ESP teaching and learning.
Process Approach to Cyber Risk Management in Educational Organizations
Process Approach to Cyber Risk Management in Educational Organizations
(Process Approach to Cyber Risk Management in Educational Organizations)
- Author(s):Liubomir Chiriac, Violeta Bogdanova
- Language:English
- Subject(s):Politics / Political Sciences, Politics, Economy, Business Economy / Management, Security and defense, ICT Information and Communications Technologies
- Page Range:212-219
- No. of Pages:8
- Keywords:organizational processes of an educational institution; cyber security threats; digitalization of education; fuzzy logic
- Summary/Abstract:The article considers the organizational processes of an educational institution. The relationship of cyber security threats within the framework of management, main and auxiliary processes is shown. It is revealed that a person is a weak link in the cyber security system of an educational institution. A model of the implementation of cyber threats in an educational organization by means of fuzzy logic is presented. The prospects for studying the analysis of cyber security risks of an educational institution using fuzzy logic algorithms are outlined.
Opportunities and Challenges of the Agile Approach in Modern Organizations
Opportunities and Challenges of the Agile Approach in Modern Organizations
(Opportunities and Challenges of the Agile Approach in Modern Organizations)
- Author(s):Anastasia Chirita
- Language:English
- Subject(s):Social Sciences, Economy, Business Economy / Management, Methodology and research technology, Management and complex organizations, Socio-Economic Research
- Page Range:220-227
- No. of Pages:8
- Keywords:Agile; Scrum; Kanban; Traditional management methods; Successful implementation
- Summary/Abstract:The Agile approach has gained significant attention in the context of modern organizational management, promising increased flexibility, improved team dynamics, and faster adaptation to changing market demands. This article examines the dual nature of Agile methodologies, highlighting both their advantages and the potential obstacles organizations may encounter during implementation. Agile promotes creativity, strengthens collaboration with stakeholders, and streamlines project execution. However, its adoption requires a deep cultural transformation, poses difficulties in scaling across large organizations, and can face pushback from teams accustomed to conventional management approaches. Drawing on real-world examples and research findings, this study aims to provide a nuanced understanding of how Agile principles can be effectively applied to maximize benefits while addressing potential drawbacks. The analysis seeks to offer practical insights for managers and leaders navigating the complexities of Agile transformation in today's dynamic business environment.
Artificial Intelligence and Social Influencers: Fraud Scenarios and Counteraction Realities
Artificial Intelligence and Social Influencers: Fraud Scenarios and Counteraction Realities
(Artificial Intelligence and Social Influencers: Fraud Scenarios and Counteraction Realities)
- Author(s):Irina Balina
- Language:English
- Subject(s):Social Sciences, Economy, Business Economy / Management, Sociology, Social Informatics, ICT Information and Communications Technologies, Socio-Economic Research
- Page Range:228-232
- No. of Pages:5
- Keywords:Artificial intelligence; Neural network; Internet fraud; Digital security
- Summary/Abstract:The article presents research of artificial intelligence in a complex of positive and negative aspects at the present stage from the point of view of both technological and socio-psychological realities. In parallel, the paper considers types of AI-based fraud and ways to combat them (cloning the voice of social authorities, personalized phishing, deepfakes and blackmail with identity substitution, etc.) The basic concept of counteraction and modern requirements for secure IT technologies are revealed. Conclusions and proposals are formulated.
Comparative Analysis of Legislative Support for the Organization of a Family Business
Comparative Analysis of Legislative Support for the Organization of a Family Business
(Comparative Analysis of Legislative Support for the Organization of a Family Business)
- Author(s):Ivan Stamov
- Language:English
- Subject(s):Politics / Political Sciences, Politics, Economy, National Economy, Business Economy / Management, Economic policy, Welfare systems, EU-Approach / EU-Accession / EU-Development, Socio-Economic Research
- Page Range:233-240
- No. of Pages:8
- Keywords:family business; family enterprise; legislative support; comparative analysis; determination of legal status; Republic of Moldova; legislative definition of legal status; international legislation; economic development
- Summary/Abstract:Family business is a unique phenomenon that allows you to solve several important tasks at once: attracting the younger generation to work, mentoring and succession, ensuring the financial independence of the family. It should be noted that today the family business does not have an official status in the legislation of most countries of the world, which is an acute problem in obtaining state support measures and a significant obstacle to the development of family entrepreneurship as a separate institutional unit of the economy. In this regard, the relevance of the study is determined by the need to introduce into scientific circulation and legislation the concept of "family enterprise" as a business entity and the legislative definition of its legal status. The paper presents research of various methods of legislative support for family businesses. The study suggests a number of measures to support family business. The relevance of the research is determined by the need to introduce the concept of “family business” into scientific circulation and legislation as a business entity and the legislative definition of its legal status. The analysis of the legislative framework allows us to identify problems and improve laws in order to create a favorable environment for the development of family business. The research devoted to the analysis of legislative support for family businesses also allows us to assess the effectiveness of various support mechanisms, such as preferential tax conditions or training and consulting programs. The study provides successful examples of legislative support, which represent models on which other countries and regions can learn and learn from experience. Conclusions and suggestions are formulated.
Development Directions for the Winemaking Sector in the Framework of Sustainability
Development Directions for the Winemaking Sector in the Framework of Sustainability
(Development Directions for the Winemaking Sector in the Framework of Sustainability)
- Author(s):Irina Dorogaia, Vladislava Conop
- Language:English
- Subject(s):Politics / Political Sciences, Politics, Social Sciences, Economy, Business Economy / Management, Sociology, Economic policy, Policy, planning, forecast and speculation, Political Ecology, EU-Approach / EU-Accession / EU-Development, Socio-Economic Research
- Page Range:241-247
- No. of Pages:7
- Keywords:winemaking sector; sustainability; environment; certification; waste management regulation
- Summary/Abstract:This research examines the directions of sustainable development within winemaking enterprises in the Republic of Moldova, with a focus on the production of BIO/ECO/vegan wines, ecological certification, and waste management. The study addresses the increasing consumer demand for natural and pure products, free from preservatives or containing reduced additives, which significantly influences global market trends. By analyzing the achievements of European countries in sustainable winemaking, the research evaluates the feasibility of adapting and implementing these practices in the Moldovan context. Particular emphasis is placed on ecological certification as a strategic tool for enhancing export potential and fostering consumer trust. Furthermore, the study investigates the alignment of national legislative requirements for waste management with European standards. The findings aim to provide actionable recommendations to advance sustainability practices and strengthen the competitiveness of Moldova's winemaking sector.
Model Collapse in the Age of Synthetic Data: Risks and Consequences
Model Collapse in the Age of Synthetic Data: Risks and Consequences
(Model Collapse in the Age of Synthetic Data: Risks and Consequences)
- Author(s):Bozhidar Bahov
- Language:English
- Subject(s):Social Sciences, Economy, Business Economy / Management, Sociology, Evaluation research, Social Informatics, ICT Information and Communications Technologies, Socio-Economic Research
- Page Range:248-256
- No. of Pages:9
- Keywords:model collapse; Model Autophagy Disorder (MAD); synthetic data; generative models; data contamination
- Summary/Abstract:This paper presents a literature review on model collapse—sometimes termed Model Autophagy Disorder (MAD)—observed when generative models are recursively trained on synthetic data produced by earlier versions of themselves. Drawing on evidence from recent studies in language modeling and computer vision, we highlight how reliance on model-generated content can gradually degrade performance metrics and reduce expressive diversity, impacting downstream tasks such as text generation, image classification, and captioning. We examine the theoretical impact of model collapse, including mechanisms that drive the distributional drift and loss of tail events, and survey the empirical findings demonstrating its effects on large language models and modern image generators. Finally, we discuss the broader risks and consequences—ranging from ethical concerns to long-term threats to AI system reliability—and propose strategies for mitigating collapse, including the inclusion of fresh real-world data, rigid data curation, and detection techniques like watermarking.
Indirect Impact of Investments in Renewable Energy Sources on Other Sectors of the Economy
Indirect Impact of Investments in Renewable Energy Sources on Other Sectors of the Economy
(Indirect Impact of Investments in Renewable Energy Sources on Other Sectors of the Economy)
- Author(s):Lesan Timur
- Language:English
- Subject(s):Economy, Business Economy / Management, Energy and Environmental Studies, Socio-Economic Research
- Page Range:257-263
- No. of Pages:7
- Keywords:electricity; renewable energy; investments; indirect effect from renewable energy sources
- Summary/Abstract:In recent years, Europe has faced an energy crisis, which has been reflected in rising energy prices and limited availability of these energy resources. As a result, Europe and the world are actively investing in renewable energy sources, which provides economic growth by saving energy resources, and also creates energy independence, especially for countries that do not have traditional energy sources. In addition to the direct effect of introducing investments in renewable energy sources, there is also an indirect effect in the form of creating additional jobs, increasing GDP, and developing local industries related to the production and maintenance of renewable energy sources. In this article, we will consider the indirect effect of investing in renewable energy sources.
Exporting Conflict? The European Union’s Arms Trade and Its Effects on Forced Migration
Exporting Conflict? The European Union’s Arms Trade and Its Effects on Forced Migration
(Exporting Conflict? The European Union’s Arms Trade and Its Effects on Forced Migration)
- Author(s):Vasil Pavlov
- Language:English
- Subject(s):Politics / Political Sciences, Politics, Civil Society, Economic policy, International relations/trade, EU-Approach / EU-Accession / EU-Development, Asylum, Refugees, Migration as Policy-fields
- Page Range:264-269
- No. of Pages:6
- Keywords:defense expenditure; arms trade; forced migration; asylum seekers; military conflicts
- Summary/Abstract:This paper aims to critically investigate whether the export of arms produced within the EU might contribute to the very instability that drives forced migration. Through a quantitative, data-driven approach, this study seeks to analyze the main destinations and monetary value of EU-issued arms export licenses based on the European COARM data, alongside demographic and geographic data, extracted from Eurostat on asylum seekers arriving in the EU between 2015 and 2023. The research question is whether EU arms trade policies may, even unintentionally, be acting as a catalyst for displacement, thereby generating humanitarian consequences that reverberate back into Europe’s own borders.
Leveraging Information Technology in Auditing Practice
Leveraging Information Technology in Auditing Practice
(Leveraging Information Technology in Auditing Practice)
- Author(s):Iavor Bachev
- Language:English
- Subject(s):Economy, Business Economy / Management, Accounting - Business Administration, ICT Information and Communications Technologies
- Page Range:270-273
- No. of Pages:4
- Keywords:audit; technology; risk; data analytics; artificial intelligence
- Summary/Abstract:This article investigates the impact of cutting-edge technology such as artificial intelligence and process automation on the auditing industry and profession. The essay examines relevant sources and literature to present the benefits, problems, and implications of integrating new technology, and discovers a link between how digital tools are reinventing auditing by boosting audit process efficiency and accuracy. The new tools enable auditors to examine various datasets, detect patterns and abnormalities, eliminate human error, and concentrate on high-level yet critical tasks like planning. The article also addresses potential concerns about adopting new technologies--while the benefits are significant, there are potential drawbacks such as implementation costs (e.g., licenses), security concerns, and the need for auditors to learn new skills and knowledge in order to properly use the new technologies. The study identifies the necessity of training programs and organizational change management in addressing the key needs that occur as a result of the adoption of new technologies. Finally, the article concludes that, despite the hurdles, integrating sophisticated technology into auditing is critical for enhancing audit quality and operating efficiency. These technologies would lead to specialization in different areas like as data analytics or cyber security, as well as improved collaboration between auditors and other stakeholders.
Information Technology as a Critical Attribute in Nuclear Security
Information Technology as a Critical Attribute in Nuclear Security
(Information Technology as a Critical Attribute in Nuclear Security)
- Author(s):Tumelo Baraedi
- Language:English
- Subject(s):Politics / Political Sciences, Politics, Economy, Business Economy / Management, Security and defense, ICT Information and Communications Technologies
- Page Range:274-283
- No. of Pages:10
- Keywords:information technology; Nuclear Power Plants; nuclear security
- Summary/Abstract:Information Technology (IT) can be defined as the use of software, computers, networks, or any other electronic systems in processing, storing, managing and transmitting data. It plays a major role in nuclear security, whereby the enhancement of control, monitoring, safety and management of nuclear and/or radioactive materials and associated facilities (e.g., Nuclear Power Plants) is maintained. Effective and long-term IT systems are necessary to ensure the protection of nuclear/radioactive material and associated facilities from any cyber threats or any form of malicious acts by adversaries. It must be noted that nuclear power plants (NPP) have over the years emphasised the use of information or cyber security due to the escalated attacks on nuclear installations/facilities resulting in states losing billions due to infrastructure damage. The main objective is to review the threats and risks associated with existing nuclear infrastructure, with focus being on information security. The paper seeks to emphasise the critical role played by Information Technology in Nuclear Security in ensuring the protection of nuclear assets from both physical and cyber threats. The research was conducted through a literature review of international instruments such as IAEA publications (IAEA NSS No. 42-G) on computer security for nuclear security, and other publications related to I.T. in the nuclear security.
Information Management and Protection of Sensitive Nuclear Information for Strengthened Nuclear Security
Information Management and Protection of Sensitive Nuclear Information for Strengthened Nuclear Security
(Information Management and Protection of Sensitive Nuclear Information for Strengthened Nuclear Security)
- Author(s):Bokhari Ahmed Moneir
- Language:English
- Subject(s):Politics / Political Sciences, Politics, Economy, Business Economy / Management, Security and defense
- Page Range:284-293
- No. of Pages:10
- Keywords:sensitive information; nuclear security; threat; information management
- Summary/Abstract:Information management and protection of sensitive nuclear information (SNI) has become an increasingly important pillar of national and international security due to threats, both physical and informational. This paper explores protection of sensitive in nuclear security role classification protocols, and reporting mechanisms in strengthening nuclear security infrastructures. It analyses the types of information that need protection and assess the potential consequences of compromise. In conclusion, the paper offers recommendations for building a resilient and balanced information ecosystem that is transparent and confidential, utilizing several international frameworks, including the International Atomic Energy Agency's nuclear security series and international treaties. A growing international cooperation in nuclear security is essential in order to meet emerging threats like cyberattacks. Enhancement of nuclear security culture, education, and training is essential, as well as creating systems that ensure secure handling of SNI while maintaining accessibility for authorised personnel and keeping nuclear materials, facilities, and knowledge secure.
The Role of Public Communication in Emergency Preparedness for Nuclear and Radiological Threats: Case Study Rwanda
The Role of Public Communication in Emergency Preparedness for Nuclear and Radiological Threats: Case Study Rwanda
(The Role of Public Communication in Emergency Preparedness for Nuclear and Radiological Threats: Case Study Rwanda)
- Author(s):Emmanuel Abenanye
- Language:English
- Subject(s):Politics / Political Sciences, Politics, Social Sciences, Economy, Business Economy / Management, Civil Society, Communication studies, Security and defense, Socio-Economic Research, Hybrid Warfare
- Page Range:294-303
- No. of Pages:10
- Keywords:public awareness; emergency preparedness; RN Threats; Rwanda
- Summary/Abstract:Stakeholder awareness and preparedness are critical for ensuring effective responses to radiological and nuclear (RN) incidents, particularly in countries with ambition of developing nuclear security frameworks. With an emphasis on their ability to react to RN threats and accidents, this study looks at the roles and awareness levels of important players in Rwanda's nuclear security system. In addition to field observations and document analysis of Rwanda's nuclear security protocols and International Atomic Energy Agency (IAEA) recommendations, a qualitative approach was used to gather data through interviews with policymakers, security personnel, and representatives from local institutions. The findings highlight the growing awareness among stakeholders, including government agencies, border security officials, and healthcare providers, regarding the importance of nuclear security. Targeted training initiatives, international cooperation with the IAEA, and the incorporation of nuclear security measures into more comprehensive national safety policies are among its main advantages. There are still gaps, nevertheless, especially in the areas of public knowledge, sophisticated detection technology access, and stakeholder cooperation. The study emphasises the necessity of a multi-stakeholder approach to nuclear security, which includes more training to increase capability at all levels, frequent simulation exercises, and improved communication. The creation of a national nuclear security task force, the creation of standardised procedures for interagency cooperation, and the encouragement of public awareness initiatives are among the suggestions made to strengthen defences against RN threats. By highlighting the significance of awareness, readiness, and cooperation in effectively responding to RN incidents in Rwanda, this study advances our understanding of the roles that stakeholders play in nuclear security. The results provide useful information for bolstering nuclear security frameworks in comparable situations around the world.
The Role of ICT Through Statistical Models in Enhancing Nuclear Security: A Case Study of Rwanda’s Border Points
The Role of ICT Through Statistical Models in Enhancing Nuclear Security: A Case Study of Rwanda’s Border Points
(The Role of ICT Through Statistical Models in Enhancing Nuclear Security: A Case Study of Rwanda’s Border Points)
- Author(s):Emmanuel Abenanye
- Language:English
- Subject(s):Politics / Political Sciences, Politics, Economy, Business Economy / Management, Security and defense, ICT Information and Communications Technologies
- Page Range:304-313
- No. of Pages:10
- Keywords:Bayesian Inference Models; emergency preparedness; RN Threats; Rwanda; nuclear security
- Summary/Abstract:Nuclear security is a growing concern worldwide due to the increased risks posed by the proliferation of radiological and nuclear (RN) materials and the potential for their misuse. This paper examines the integration of Information and Communication Technology (ICT) and statistical methodologies in bolstering nuclear security frameworks. Using Rwanda’s border security as a case study, it highlights how technological advancements and data analytics have enhanced the detection and prevention of unauthorized nuclear material transport. The findings emphasize the role of innovative technologies in securing borders and preventing nuclear trafficking. It uses Rwanda’s border points as a case study, where advanced detection technologies and probabilistic risk analysis have been employed to improve RN threat preparedness. The paper draws on the findings of my 2023 dissertation and supplementary literature to analyze the current capabilities and challenges at key points of entry. Recommendations are provided to bolster Rwanda’s nuclear security infrastructure through technological, analytical, and institutional improvements.
Theoretical Aspects and Accounting Practices of Balance Sheet Reform
Theoretical Aspects and Accounting Practices of Balance Sheet Reform
(Theoretical Aspects and Accounting Practices of Balance Sheet Reform)
- Author(s):Liliana LAZARI, Gheorghe Balan
- Language:English
- Subject(s):Economy, Business Economy / Management, Accounting - Business Administration, ICT Information and Communications Technologies
- Page Range:314-319
- No. of Pages:6
- Keywords:balance sheet reform transactions; accounting treatment; accounting records
- Summary/Abstract:In this research, a study is carried out on the theoretical aspects and accounting practices of balance sheet reform transactions. The aim of the research is to present the method of processing financial information in accounting after the annual financial reporting and before the start of the new management period for the activity. The study employed several research methods, including the analysis of the regulatory framework governing the study, the synthesis of information related to the accounting treatment of balance sheet reform transactions and the deduction of challenges.
Integrating Public Administration and Higher Education through Digital Innovation and International Collaboration
Integrating Public Administration and Higher Education through Digital Innovation and International Collaboration
(Integrating Public Administration and Higher Education through Digital Innovation and International Collaboration)
- Author(s):Ivona Velkova, Mariana Kovacheva
- Language:English
- Subject(s):Politics / Political Sciences, Politics, Social Sciences, Economy, Education, Business Economy / Management, Public Administration, International relations/trade, Higher Education , ICT Information and Communications Technologies
- Page Range:320-326
- No. of Pages:7
- Keywords:digital innovation; transnational collaboration; public administration; higher education; cross-sectoral engagement
- Summary/Abstract:The paper explores the intersection of public administration and higher education, focusing on how digital innovation and transnational collaboration serve as transformative forces for both domains. The study examines strategies for fostering seamless integration between public institutions and academic environments. It highlights how collaborative initiatives, and digital tools enhance institutional efficiency, knowledge exchange, and skills development, aligning with the broader goals of transnational cooperation. The findings reveal that connecting public administration and higher education through innovative models yields measurable outcomes, including improved service delivery, enhanced digital literacy, and the creation of sustainable frameworks for cross-sectoral engagement. The report also proposes a roadmap for replication in other contexts, emphasizing the importance of shared governance, mutual learning, and technological adaptation.
Threats to National Security and Area of Cyber Defense
Threats to National Security and Area of Cyber Defense
(Threats to National Security and Area of Cyber Defense)
- Author(s):Liudmyla Rybalchenko
- Language:English
- Subject(s):Politics / Political Sciences, Politics, Economy, Business Economy / Management, Security and defense, ICT Information and Communications Technologies
- Page Range:327-330
- No. of Pages:4
- Keywords:cyber defense; information technology; cybercrime; national security
- Summary/Abstract:The article is devoted to the issues of protecting organizations from cybercrime, which poses global threats to national security. The use of information technology leads to numerous crimes and the emergence of new types of threats based on the use of various means, methods and elements of influence on human consciousness. The author shows that the use of illegal technical means, creation of viruses, spam, phishing attacks and other means have enabled cybercriminals to gain access to confidential information, databases, restricted information, payment cards, bank accounts and automated control systems with the aim of stealing and seizing data, and this leads to various forms of fraud. It is found that the use of cyberattacks on information resources is the basis for cybercriminals to cause damage and losses to the country's critical infrastructure. It is established that in times of war, the number of cybercrimes has increased many times and is carried out to destabilize the state, cause damage, disable equipment, technology, communications and communications. Hacker attacks can gain control over personal data, databases of large enterprises and institutions, and become a threat to data leakage and network damage.
Protection of Children from the Negative Impact of Advertising on Children
Protection of Children from the Negative Impact of Advertising on Children
(Protection of Children from the Negative Impact of Advertising on Children)
- Author(s):Victoria Stoyanova
- Language:English
- Subject(s):Politics / Political Sciences, Politics, Social Sciences, Economy, Media studies, Communication studies, Sociology, Security and defense, Marketing / Advertising, Social Norms / Social Control, Socio-Economic Research
- Page Range:331-339
- No. of Pages:9
- Keywords:advertising; children; negative impact; threats; risks; protection; security; safety
- Summary/Abstract:The report provides an overview of the negative impact of advertising on children in today’s dynamically changing media environment. Its objective is to draw attention to the necessity of reform in state advertising policy by establishing a robust legal framework and implementing measures to protect the children from the negative effects of advertising on children. Based on analyses and research, the report includes recommendations for developing the necessary measures to address this issue in Bulgaria.
Measures to Counteract the Threats and Risks of Advertising on Children
Measures to Counteract the Threats and Risks of Advertising on Children
(Measures to Counteract the Threats and Risks of Advertising on Children)
- Author(s):Victoria Stoyanova
- Language:English
- Subject(s):Politics / Political Sciences, Politics, Economy, Business Economy / Management, Security and defense, Marketing / Advertising, Socio-Economic Research
- Page Range:340-349
- No. of Pages:10
- Keywords:advertising; children; negative impact; threats; risks; necessity; measures; counteraction; protection; security; safety
- Summary/Abstract:This paper provides an overview of the research of negative impact of advertising on children in the age of rapidly developing new technologies and a dynamically changing media environment. Its objective is to raise awareness of the necessity of measures to counteract the threats and risks posed by advertising, in order to limit its negative impact on children. Based on analyses and research, the article also examines the measures to counteract the threats by advertising communication to children within the framework of media regulation in the conditions of the modern dynamically changing world.
Aspects of the Economic Activity of Companies in the Real Sector and the Role of Software in These Aspects
Aspects of the Economic Activity of Companies in the Real Sector and the Role of Software in These Aspects
(Aspects of the Economic Activity of Companies in the Real Sector and the Role of Software in These Aspects)
- Author(s):Zlatan Enchev
- Language:English
- Subject(s):Economy, Business Economy / Management, Micro-Economics, ICT Information and Communications Technologies, Socio-Economic Research
- Page Range:350-355
- No. of Pages:6
- Keywords:software; financial autonomy; company liquidity; total cost
- Summary/Abstract:The European Commission's regular report on the accession of Bulgaria to the European Union for 2002 states that "Bulgaria is a functioning market economy". In other words, this type of economy has been established in the country for more than 20 years. Accordingly, the analysis and planning aspects of the economic activity of companies in the real sector in the conditions of competition that are present in a market economy are of essential importance. The paper examines some aspects of the business activities of companies in the real sector, namely financial autonomy, liquidity, supplies of materials and cost. The role of appropriate software in the analysis and planning of indicators measuring these aspects is indicated. The topic corresponds to the theory of company finances and the regulatory framework of our country. Issues that are relevant in the conditions of a market economy and its characteristic feature - the competition, are studied. Software application significantly facilitates specialists working in companies being also a prerequisite for quality analysis and planning.
System for Analyzing the Alignment between the Labor Market and the Educational Competencies
System for Analyzing the Alignment between the Labor Market and the Educational Competencies
(System for Analyzing the Alignment between the Labor Market and the Educational Competencies)
- Author(s):Tetiana Filatova, Zoia Nikolaevna Sokolovska
- Language:English
- Subject(s):Social Sciences, Economy, Business Economy / Management, Sociology, Methodology and research technology, Human Resources in Economy, ICT Information and Communications Technologies
- Page Range:356-358
- No. of Pages:3
- Keywords:labor market; IT sector; specialists; education; competencies
- Summary/Abstract:The article addresses current issues related to the shortage of non-technical IT professionals. Solving this problem can improve both personal job-seeking needs and tracking the competencies that are in demand by IT companies. Additionally, it directly impacts the country's economic situation through the taxes paid by such professionals. The concept of matching the labor market with the educational profile is analyzed. The main stages of creating a system to address this issue are proposed.
Individual Form of Learning a Foreign Language of Students within the Language Class Activity
Individual Form of Learning a Foreign Language of Students within the Language Class Activity
(Individual Form of Learning a Foreign Language of Students within the Language Class Activity)
- Author(s):Svetlana Apachita
- Language:English
- Subject(s):Social Sciences, Economy, Education, Business Economy / Management, Educational Psychology, Sociology of Education
- Page Range:359-362
- No. of Pages:4
- Keywords:teaching approach; individual work; complementarity; professional formation; self-directed learning
- Summary/Abstract:Individual work is a teaching strategy at all levels of education and individual based assignments are an effective way of self-study education. The efficient use of individual work in the language class activity can provide a valuable learning experience to students and give them the opportunity to really experience language acquisition. In this regard, this paper attempts to identify the efficiency of individual work teaching strategy of the students to thrive in the process of foreign language learning. The article aims to identify the effect of individual work on students participation in academic communication. It is recognised that learning languages should be an integral part of public education to promote cognitive skills like creativity, critical thinking, and problem solving. In this context every teacher should identify the teaching methods to teach students to communicate their thoughts while being creative and reflective in their academic process. Finally, the article tries to determine the most effective methods for working in a group and individually.
Converting Text into a Protected Document
Converting Text into a Protected Document
(Converting Text into a Protected Document)
- Author(s):Ghenadie Belinschi
- Language:English
- Subject(s):Politics / Political Sciences, Politics, Economy, Business Economy / Management, Security and defense, ICT Information and Communications Technologies
- Page Range:363-365
- No. of Pages:3
- Keywords:confidentiality; neutral transformations; natural language processing; artificial intelligence; data protection
- Summary/Abstract:In today's digital world, protecting confidential information is critically important. Traditional methods often fail to prevent data leaks during the exchange of text documents. A method protects confidential information by transforming texts with sensitive data into neutral documents using natural language processing and artificial intelligence. This ensures security even if documents are copied or hacked.
Contemporary Applications of the Self-Service Approach: Empowering Users in the Digital Era
Contemporary Applications of the Self-Service Approach: Empowering Users in the Digital Era
(Contemporary Applications of the Self-Service Approach: Empowering Users in the Digital Era)
- Author(s):Petar Genov
- Language:English
- Subject(s):Social Sciences, Economy, Business Economy / Management, Sociology, Social development, Social Informatics, Marketing / Advertising, ICT Information and Communications Technologies, Socio-Economic Research
- Page Range:366-371
- No. of Pages:6
- Keywords:self-service; digital transformation; artificial intelligence (AI); automation; user experience (UX); reducing cost; personalization
- Summary/Abstract:In the digital age, self-service have emerged as leading approach to increasing user autonomy and efficiency. With the development of artificial intelligence, automation, and cloud technologies, more and more industries are offering solutions that allow users to perform operations without the need for direct employee intervention. Recent developments have heightened the need for research of applications of self-service in various sectors, such as e-commerce, finance, healthcare, education, and smart technologies. Thus, the objectives of this paper are to determine the benefits of self-service approach technologies (SST), and the balance between automation and human interaction using qualitative content analysis method. The findings will provide insights into the developmental prospects of the self-service approach and will evaluate its anticipated impact by exploring the opportunities and limitations of the topic of SST.
