Marek Zanker, Vladimír Bureš, Anna Cierniak-Emerych, Martin Nehéz
Individuals and corporations alike are aware of the need for data protection. They undergo training and perform exercises where various types data-jeopardizing techniques or cyberattacks are simulated in order to increase the resilience of society and preparedness for crisis situations (National Cyber and Information Security Agency, 2019a). With the help of the General Data Protection Regulation (GDPR), the European Commission (EC) seeks to draw a line between the personal data security and the free and uncontrolled manipulation of personal data (IT Governance Privacy Team, 2020). Since its advent, the GDPR has put burden on the shoulders of various institutions which have been struggling to share data. Not surprisingly, it brought a flareup of frustration (Bovenberg et al., 2020). The intension was good, as the GDPR would ensure and balance the fragile relationship between the data protection and other regulations, such as competition law, consumer protection or intellectual property (De Hert et al., 2018).
Jan Čapek, Miloslav Hub
The ubiquitous Internet connectivity has led to the introduction of an ever-increasing list of diverse online services ranging from financial transactions to online gaming and the other e-commerce purposes. For example, with cloud computing on the rise, geographically distant employees of organizations are able to access and share sensitive organizational resources online. The mentioned trend has increased the amount of user authentication processes. The aim of authentication is to decide whether a subject in question is in fact the subject that he claims to be. As an example can be mentioned traditional authentication, when end users authenticate themselves on computers by using the pair of username and password. In the past, many sophisticated authentication methods were developed. Generally, they can by divided to the three basic types of authentication depending on what kind of identification feature is used: authentication by knowledge, authentication by ownership of something, and authentication by biometrics. Each of these ways has its advantages and disadvantages.
Patricija Bajec, Monika Kontelj, Aleš Groznik
The objective of this study is to propose a trustworthy, valid and consistent methodological approach for measuring the efficiency of a logistics platform, where an entire country constitutes a logistic platform. Traditional Data Envelopment Analysis (DEA) is found to be an appropriate tool – if its weaknesses are eliminated. DEA results are highly influenced by the choice of appropriate inputs and outputs variables, but the method itself does not provide guidance for their identification. The authors therefore propose to integrate traditional DEA by combining the Delphi technique with the Analytical Hierarchy Process (AHP) method, which will assist in identifying proper, consistent input/output variables, evaluated by their relevance. The proposed framework allows the performance evaluation of the selected platform’s element or elements. It is thus a useful decision support tool for enterprises (private, public, both) that are managing logistics platforms and trying to improve their productivity in order to sustain or improve their position on the competitive market. This methodology allows comparative efficiency analyses to be estimated for similar countries. The presented methodology on one hand enables tailor-made solutions, but on the other hand is very general, and, with minor adjustments, can be applied by a variety of firms and industries. It can be applied in private sector firms in production and service industries, to analyse the relative performance of diverse logistics and non-logistics services, and in public profit or non-profit organisations.
Sarfaraz Hashemkhani Zolfani, Morteza Yazdani, Edmundas Kazimieras Zavadskas, Hamidreza Hasheminasab
“Multiple Attribute Decision Making (MADM)” is an expert based field which is working based on real data and experts’ opinions. So many studies have been doing based on MADM methods which they usually use qualitative data based on experts’ ideas. Decisions based on the experts’ opinion shall be carefully designed to cope the real problems uncertainty. This uncertainty will be even more intricate if combining the problem with the ambiguity of the future study. Prospective MADM is a future based type of MADM field which is concentrating on decision making and policy making about the future. Prospective MADM (PMADM) can have both explorative and descriptive paradigms in the studies but it will more useful to be applied for strategic planning. In this regard, experts’ role would be even more challenging because one/some possible future/futures will be partially designed based on their opinions. Future and prediction always complicates the decision environment, especially methodologies founded on experts’ judgement. Considering experts’ preferences, attitude, and background, they may be a major source of inaccurate results. Causal Layered Analysis (CLA) is well-known “Futures Studies” method which is qualitative and usually is supporting other methods such as “Backcasting” and “Scenario Planning”. CLA has a deep point of view to the subjects to support a future with all those changes which are necessary for the main goal/goals. In this study, this idea will be proposed that CLA can be added to PMADM outline to decrease the risk of unsuitable decisions for the future and for this aim a case study about energy and CO2 consumption in policy making level proposed and a hybrid MADM method based on BWM-CoCoSo applied in the PMADM outline for the procedure.