scispace - formally typeset
Search or ask a question
Author

Anca Ioana Andreescu

Bio: Anca Ioana Andreescu is an academic researcher from Bucharest University of Economic Studies. The author has contributed to research in topics: Business rule & Business process management. The author has an hindex of 6, co-authored 24 publications receiving 328 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The research methodology consisted in a rigorous analysis of the latest research on Cloud Computing as an alternative to IT provision, management and security, plus the authors’ experience in IT and higher education to find alternatives to the use of IT, while leading universities to improve agility and obtain savings.
Abstract: In the current financial crisis and being challenged by growing needs, universities are facing problems in providing necessary information technology (IT) support for educational, research and development activities. The objective of this paper is to find alternatives to the use of IT, while leading universities to improve agility and obtain savings. The research methodology consisted in a rigorous analysis of the latest research on Cloud Computing as an alternative to IT provision, management and security. It also took into account the best practices for Cloud Computing usage within universities, plus the authors’ experience in IT and higher education. The article begins with a brief introduction to Cloud Computing in universities, referring to the most important results obtained so far. Further, a starting point for universities to use Cloud Computing is provided, by proposing an adoption strategy. The strategy includes five stages, with emphasis on the evaluation of data and processes/functions/applications from several major universities based on some key criteria, while creating a correspondence between these aspects and the models/services/applications that exist on the Cloud market. The results obtained are encouraging and support the use of Cloud solutions in universities by improving knowledge in this field and providing a practical guide adaptable to the university’s structure. In order to be applicable in practice, the proposed model takes into account the university’s architecture and criteria such as mission, availability and importance of applications and also the data’s mission, sensitivity, confidentiality, integrity and availability.

207 citations

Posted Content
01 Jan 2008
TL;DR: Some aspects about knowledge providing are discussed and research in this field is presented through an e-learning system for major risks management.
Abstract: Current knowledge management systems focus on knowledge acquisition, storage, retrieval and maintenance. Yet, for that knowledge to be operational, to become knowledge rather than information, requires internalization and learning. E- learning systems and courseware, on the other hand, are all too often monolithic and inert and fail to facilitate the development and sharing of knowledge. In this paper we discuss some aspects about knowledge providing and present our research in this field through an e-learning system for major risks management.

49 citations

Journal ArticleDOI
TL;DR: Two novel and efficient settlement mechanisms (Global Balancing Settlement GBS and Splitting Settlement SS) for Peer-to-Peer electricity exchange enhancing the performance of the classic Pairwise Settlement PS are proposed.
Abstract: The progress of ICT technologies, day-ahead forecast, home energy management systems, implementation of smart meters, and Distributed Energy Sources (DER) enables new business opportunities for prosumers to locally trade the surplus via blockchain platforms leading to considerable advantages at the community level. The current research handles settlement similar to a centralized market that it is not necessarily the best solution for blockchain. Nonetheless, the settlement is essential as sellers and buyers perceive the attractiveness of the local trading through the market results. In this paper, we propose two novel and efficient settlement mechanisms (Global Balancing Settlement GBS and Splitting Settlement SS) for Peer-to-Peer (P2P) electricity exchange enhancing the performance of the classic Pairwise Settlement PS. These will be written as stored procedures embedded into the smart contracts along with auctioning procedures. The simulations are performed using a small residential community with 30% of the electricity that can be locally traded to lower the bills and unstress the public grid. The performance of the two proposed settlement methods is proved by the 14 scenarios that thoroughly indicate that GBS and SS provide better results for both sellers and buyers than PS. In the reference scenario, with GBS, sellers have the highest encashments with almost 4% more, whereas buyers encounter the lowest payments with almost 5% less than in case of the classic settlement. Starting from reference scenario, alternative scenarios are envisioned to extend the analyses and assess the performance of the settlement mechanisms. The highest gain is recorded with GBS mechanism: almost 8.8% for sellers and 6.5% for buyers. Another interesting outcome is that GBS is providing better results than SS. When deviations are small, SS provides almost 6% gain for both sellers and buyers, but when they increase, the gain is exceedingly small or none.

31 citations

Proceedings ArticleDOI
17 Jun 2010
TL;DR: The paper justifies the organizations' need for service orientation, it exposes the main tendencies and problems related to the modeling of service-oriented organizations, and it offers an approach to the development of Business Intelligence agile solutions for the management of service -oriented organizations.
Abstract: In the context of modern society, based on knowledge and collaboration relationships, organizations are confronted with numerous challenges and difficulties. As a response to these challenges, the organizations must perform changes in order to be service oriented. At the same time, the instruments and modeling methodologies, as well as the management solutions, must be adapted to the new context. The paper justifies the organizations' need for service orientation, it exposes the main tendencies and problems related to the modeling of service-oriented organizations, and it offers an approach to the development of Business Intelligence agile solutions for the management of service-oriented organizations.

17 citations

Proceedings ArticleDOI
12 Jun 2008
TL;DR: This paper is an attempt to define the connection between Master Data Management, Service Oriented Architectures and Complex event Processing in creating an agile infrastructure, types of master data integration and management solutions.
Abstract: This paper presents, at a conceptual level, the fist stage of the author's research in the field of software systems for business management. It is an attempt to define the connection between Master Data Management, Service Oriented Architectures and Complex event Processing in creating an agile infrastructure, types of master data integration and management solutions. It also outlines the minimum stages needed for the development of a Master Data Management system.

16 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The survey identifies and analyzes the advantages and risks that the use of cloud computing may have for the main stakeholders in education, and identifies and discusses the main technical and domain-specific research challenges, thus facilitating researchers the task of finding relevant issues, in which they can focus their efforts.
Abstract: This paper surveys the state of the art on the use and research of cloud computing in education following a systematic methodology. After a comprehensive search of the scientific literature, 112 works were selected for the review. The survey identifies and analyzes the advantages and risks that the use of cloud computing may have for the main stakeholders in education, which can be useful to identify the scenarios in which the use of cloud computing in an educational context may have significant advantages. Furthermore, the survey categorizes and discusses the main technical and domain-specific research challenges, thus facilitating researchers the task of finding relevant issues, in which they can focus their efforts. We review 112 scientific works on cloud computing in education up to 2012.The survey takes into account the main educational stakeholders.Advantages and risks of cloud in education are categorized and exemplified.We identify and discuss promising technical and domain-specific research issues.

262 citations

Journal ArticleDOI
TL;DR: This paper has demonstrated that CCAF multi-layered security can protect data in real-time and it has three layers of security: 1) firewall and access control; 2) identity management and intrusion prevention and 3) convergent encryption.
Abstract: Offering real-time data security for petabytes of data is important for cloud computing. A recent survey on cloud security states that the security of users' data has the highest priority as well as concern. We believe this can only be able to achieve with an approach that is systematic, adoptable and well-structured. Therefore, this paper has developed a framework known as Cloud Computing Adoption Framework (CCAF) which has been customized for securing cloud data. This paper explains the overview, rationale and components in the CCAF to protect data security. CCAF is illustrated by the system design based on the requirements and the implementation demonstrated by the CCAF multi-layered security. Since our Data Center has 10 petabytes of data, there is a huge task to provide real-time protection and quarantine. We use Business Process Modeling Notation (BPMN) to simulate how data is in use. The use of BPMN simulation allows us to evaluate the chosen security performances before actual implementation. Results show that the time to take control of security breach can take between 50 and 125 hours. This means that additional security is required to ensure all data is well-protected in the crucial 125 hours. This paper has also demonstrated that CCAF multi-layered security can protect data in real-time and it has three layers of security: 1) firewall and access control; 2) identity management and intrusion prevention and 3) convergent encryption. To validate CCAF, this paper has undertaken two sets of ethical-hacking experiments involved with penetration testing with 10,000 trojans and viruses. The CCAF multi-layered security can block 9,919 viruses and trojans which can be destroyed in seconds and the remaining ones can be quarantined or isolated. The experiments show although the percentage of blocking can decrease for continuous injection of viruses and trojans, 97.43 percent of them can be quarantined. Our CCAF multi-layered security has an average of 20 percent better performance than the single-layered approach which could only block 7,438 viruses and trojans. CCAF can be more effective when combined with BPMN simulation to evaluate security process and penetrating testing results.

253 citations

Journal ArticleDOI
TL;DR: The research methodology consisted in a rigorous analysis of the latest research on Cloud Computing as an alternative to IT provision, management and security, plus the authors’ experience in IT and higher education to find alternatives to the use of IT, while leading universities to improve agility and obtain savings.
Abstract: In the current financial crisis and being challenged by growing needs, universities are facing problems in providing necessary information technology (IT) support for educational, research and development activities. The objective of this paper is to find alternatives to the use of IT, while leading universities to improve agility and obtain savings. The research methodology consisted in a rigorous analysis of the latest research on Cloud Computing as an alternative to IT provision, management and security. It also took into account the best practices for Cloud Computing usage within universities, plus the authors’ experience in IT and higher education. The article begins with a brief introduction to Cloud Computing in universities, referring to the most important results obtained so far. Further, a starting point for universities to use Cloud Computing is provided, by proposing an adoption strategy. The strategy includes five stages, with emphasis on the evaluation of data and processes/functions/applications from several major universities based on some key criteria, while creating a correspondence between these aspects and the models/services/applications that exist on the Cloud market. The results obtained are encouraging and support the use of Cloud solutions in universities by improving knowledge in this field and providing a practical guide adaptable to the university’s structure. In order to be applicable in practice, the proposed model takes into account the university’s architecture and criteria such as mission, availability and importance of applications and also the data’s mission, sensitivity, confidentiality, integrity and availability.

207 citations

Journal ArticleDOI
TL;DR: This research article proposes a new paradigm by extending the Technology Organization Environment Model (TOE) with external factors, namely, perceived IT security risk and risk analysis for the first time in a technology adoption study to predict motivators affecting cloud computing adoption services in the Indian private organizations.

150 citations