Pavel Nastase - Academia.edu (original) (raw)
Papers by Pavel Nastase
2011 International Conference on Emerging Intelligent Data and Web Technologies, 2011
ABSTRACT Nowadays we encounter an increasing need for electronic services that spans all over the... more ABSTRACT Nowadays we encounter an increasing need for electronic services that spans all over the services' taxonomy. E-services ease access to processes and resources that have implied a lot of administrative burden in the past. One of the most bureaucratic and conservative service areas is the administrative field. Our paper focuses on the solutions that we have developed in order to achieve the interoperability goals for pan-European administrative services based on existing PSCs (Point of Single Contact) developed in each EU country. The solution is based on a common specification that defines a layer that integrates the European administrative services on top of the functionality of the existing PSCs. The paper focuses the document model, a issue that determines the interoperability degree of the system.
Global Economy Journal, 2009
Relatively new in Romania, IT governance is defined as procedures and policies established in ord... more Relatively new in Romania, IT governance is defined as procedures and policies established in order to assure that the IT system of an organization sustains its goals and strategies. This bundle of policies and procedures, following the best practices in the area, intends to guide and control the IT function in order to add value to the organization and to minimize IT risks. The purpose of the research is to identify the measure in which the IT governance practices are implemented to the level of the financial institutions in Romania. The goal of this paper is a comparative analysis for implementing IT governance using data offered by the IT Governance Institute. This institute makes every year a study (IT Governance Global Status Report – 2006) to determine a sense of priorities and to develop actions for implementing IT governance, using data which acknowledges once more the need for all organizations to have tools and services to assure an efficient IT governance. In this way, th...
Annales Universitatis …, 2009
Documents circulating in paper form are increasingly being substituted by itselectronic equivalen... more Documents circulating in paper form are increasingly being substituted by itselectronic equivalent in the modern office today so that any stored document can be retrievedwhenever needed later on. The office worker is already burdened with information overload, soeffective and ...
Relatively new in Romania, IT Governance is defined as procedures and policies established in ord... more Relatively new in Romania, IT Governance is defined as procedures and policies established in order to assure that the IT system of an organization sustains its goals and strategies. This bundle of policies and procedures, following the best practices in the area, intends to guide and control the IT function in order to add value to the organization and to minimize IT risks. The purpose of the research is to identify the measure in which the IT governance practices are implemented to the level of the financial institutions in Romania. More over, the paper has as goal a comparative analysis of implementing IT governance using data offered by the IT Governance Institute. This institute makes every year a study (IT Governance Global Status Report - 2006) to determine the sense of priorities and the developed actions for implementing IT governance, data which acknowledge ones more the need of any organization for tools and services to assure an efficient IT governance. In this way, the ...
Journal of Accounting and Management Information Systems, 2012
EDULEARN16 Proceedings, 2016
Journal of Accounting and Management Information Systems, 2013
Informatica Economica, 2010
Today's successful audit leaders never lose sight of the importance of continually assessing and ... more Today's successful audit leaders never lose sight of the importance of continually assessing and improving the organizations' university governance structure. Focusing on small and large mission, and using practical exercises and individual activities, the auditors will help gain the skills necessary to review and improve university governance structure, while developing techniques to assess risk management activities. Attendees will leave with an understanding of legal and regulatory guidelines as they pertain to university governance and discuss in-depth issues such as business ethics, transparency and disclosure, IT governance and university risks management. Identification, evaluation and management of university risks, is an important element of the university governance system. Today, the Bucharest Academy of Economic Studies is in a complex process to realize a university governance integrate information system. In context of this paperwork there are presented the main aspects for developing and implementing in actual phase information systems audit, to recognize the risks and establish the necessary measures to eliminate them.
Informatica Economica, 2007
Electronic business (e-business) are different than other business because it involves any commer... more Electronic business (e-business) are different than other business because it involves any commercial or business activity that takes place by means of electronic facilities (buy and selling online), including on the Internet, proprietary networks and home banking, instead of through direct physical exchange or contact. This system creates an environment that operates at a much greater speed than traditional methods and involves much less paper-based evidence of activities. These e-business related risks should not be considered in isolation but rather as part of the overall internal control framework of an entity. It is essential to identify and assess the risks associated with an e-business environment and management should develop an e-business strategy that identifies and addresses risks. The e-business Information Systems (IS) audit is a critical component of the e-business plan. This paper tries to present a risk analysis for e-business applications in order to establish the IS audit particularities in this field.
Wireless networking increases the flexibility in the home, work place and community to connect to... more Wireless networking increases the flexibility in the home, work place and community to connect to the Internet without being tied to a single location. Home users have embraced wireless technology and businesses see it as having a great impact on their operational efficiency. However undeniable the benefits of wireless networking are, there are additional risks that do not exist in wired networks. It is imperative that adequate assessment and management of risk is undertaken by businesses and home users. In this paper we have discussed some of the key concerns surrounding the security of wireless networks. We tray to analyse some aspects concerning the audit process in order to increase the reliability, availability and security when using wireless networks.
2011 International Conference on Emerging Intelligent Data and Web Technologies, 2011
ABSTRACT Nowadays we encounter an increasing need for electronic services that spans all over the... more ABSTRACT Nowadays we encounter an increasing need for electronic services that spans all over the services' taxonomy. E-services ease access to processes and resources that have implied a lot of administrative burden in the past. One of the most bureaucratic and conservative service areas is the administrative field. Our paper focuses on the solutions that we have developed in order to achieve the interoperability goals for pan-European administrative services based on existing PSCs (Point of Single Contact) developed in each EU country. The solution is based on a common specification that defines a layer that integrates the European administrative services on top of the functionality of the existing PSCs. The paper focuses the document model, a issue that determines the interoperability degree of the system.
Global Economy Journal, 2009
Relatively new in Romania, IT governance is defined as procedures and policies established in ord... more Relatively new in Romania, IT governance is defined as procedures and policies established in order to assure that the IT system of an organization sustains its goals and strategies. This bundle of policies and procedures, following the best practices in the area, intends to guide and control the IT function in order to add value to the organization and to minimize IT risks. The purpose of the research is to identify the measure in which the IT governance practices are implemented to the level of the financial institutions in Romania. The goal of this paper is a comparative analysis for implementing IT governance using data offered by the IT Governance Institute. This institute makes every year a study (IT Governance Global Status Report – 2006) to determine a sense of priorities and to develop actions for implementing IT governance, using data which acknowledges once more the need for all organizations to have tools and services to assure an efficient IT governance. In this way, th...
Annales Universitatis …, 2009
Documents circulating in paper form are increasingly being substituted by itselectronic equivalen... more Documents circulating in paper form are increasingly being substituted by itselectronic equivalent in the modern office today so that any stored document can be retrievedwhenever needed later on. The office worker is already burdened with information overload, soeffective and ...
Relatively new in Romania, IT Governance is defined as procedures and policies established in ord... more Relatively new in Romania, IT Governance is defined as procedures and policies established in order to assure that the IT system of an organization sustains its goals and strategies. This bundle of policies and procedures, following the best practices in the area, intends to guide and control the IT function in order to add value to the organization and to minimize IT risks. The purpose of the research is to identify the measure in which the IT governance practices are implemented to the level of the financial institutions in Romania. More over, the paper has as goal a comparative analysis of implementing IT governance using data offered by the IT Governance Institute. This institute makes every year a study (IT Governance Global Status Report - 2006) to determine the sense of priorities and the developed actions for implementing IT governance, data which acknowledge ones more the need of any organization for tools and services to assure an efficient IT governance. In this way, the ...
Journal of Accounting and Management Information Systems, 2012
EDULEARN16 Proceedings, 2016
Journal of Accounting and Management Information Systems, 2013
Informatica Economica, 2010
Today's successful audit leaders never lose sight of the importance of continually assessing and ... more Today's successful audit leaders never lose sight of the importance of continually assessing and improving the organizations' university governance structure. Focusing on small and large mission, and using practical exercises and individual activities, the auditors will help gain the skills necessary to review and improve university governance structure, while developing techniques to assess risk management activities. Attendees will leave with an understanding of legal and regulatory guidelines as they pertain to university governance and discuss in-depth issues such as business ethics, transparency and disclosure, IT governance and university risks management. Identification, evaluation and management of university risks, is an important element of the university governance system. Today, the Bucharest Academy of Economic Studies is in a complex process to realize a university governance integrate information system. In context of this paperwork there are presented the main aspects for developing and implementing in actual phase information systems audit, to recognize the risks and establish the necessary measures to eliminate them.
Informatica Economica, 2007
Electronic business (e-business) are different than other business because it involves any commer... more Electronic business (e-business) are different than other business because it involves any commercial or business activity that takes place by means of electronic facilities (buy and selling online), including on the Internet, proprietary networks and home banking, instead of through direct physical exchange or contact. This system creates an environment that operates at a much greater speed than traditional methods and involves much less paper-based evidence of activities. These e-business related risks should not be considered in isolation but rather as part of the overall internal control framework of an entity. It is essential to identify and assess the risks associated with an e-business environment and management should develop an e-business strategy that identifies and addresses risks. The e-business Information Systems (IS) audit is a critical component of the e-business plan. This paper tries to present a risk analysis for e-business applications in order to establish the IS audit particularities in this field.
Wireless networking increases the flexibility in the home, work place and community to connect to... more Wireless networking increases the flexibility in the home, work place and community to connect to the Internet without being tied to a single location. Home users have embraced wireless technology and businesses see it as having a great impact on their operational efficiency. However undeniable the benefits of wireless networking are, there are additional risks that do not exist in wired networks. It is imperative that adequate assessment and management of risk is undertaken by businesses and home users. In this paper we have discussed some of the key concerns surrounding the security of wireless networks. We tray to analyse some aspects concerning the audit process in order to increase the reliability, availability and security when using wireless networks.