Igor Bernik
University of Maribor
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Igor Bernik.
Simulation | 2000
Miroljub Kljajić; Igor Bernik; Andrej Škraba
The methodology of an integrated simulation system application for decision-making support in enterprises is described in this article. The use of visual interac tive modelling and animation can help users better understand simulation results, especially those who are not experts. Decision-makers are motivated by the aniniation while seeking better solutions for pro duction problems. The method was tested in a medium- sized company in order to improve operational plan ning and re-engineering. The real process was recorded on video, digitized, and implemented on a PC. Anima tion of the simulated process, synchronized with video of the real process, was projected in a room to achieve model validation and participant confidence. Opera tional production plans were simulated using current demands as the basis. Application of discrete event simulation in reengineering is also presented. The article shows how to develop a model, prepare sce narios and evaluate alternatives. Two criteria were evaluated for the alternative: the expected value and the value of multiple criteria evaluation, which was examined with the AHP method. Model validation and its use for alternative selection is also discussed.
european intelligence and security informatics conference | 2011
Gorazd Meško; Igor Bernik
In this paper the Slovene perspective on the perception of cyber crime in terms of awareness and fear is presented. On the basis of theoretical knowledge the online survey has been prepared and conducted. The results of the perception of cyber crime and its understanding have been analyzed. The results and their interpretations are the basis for further work with the cyberspace users. Based on the results some guidelines on how to raise awareness, reduce risk and thereby reduce the fear of cyber crime in Slovenia are given.
Archive | 2018
Blaž Markelj; Igor Bernik
Smartphone becomes the most typical and popular mobile device in recent years. It combines the functionality of mobile phone and PDA. Besides, it provides many computers functionality, such as processing, communication, data storage and etc. It also provides many computers service, such as web browser, portable media player, video call, GPS, Wi-Fi and etc. This paper analyzes and compares the feature and security issue among three popular brands of smartphones (Google Android, iPhone and BlackBerry) aiming to help customers choose suitable mobile device based on their specific needs.
availability, reliability and security | 2017
Anže Mihelič; Blaž Markelj; Igor Bernik; Sabina Zgaga
The rapid development of the cyberspace brought about a relatively new type of crime, namely cybercrime, that transcends both time and space convergence conditions of traditional crime definitions. The darknet and anonymity it assures have been very inviting for cybercriminals in the recent years and it has been plagued with criminal activity, such as distribution of child pornography, illegal arms trafficking or drug trafficking. The purpose of the paper is to show legislative limits of investigating crimes committed using the darknet in Slovenia on examples of a few basic investigative acts: identification of the IP holder, search and seizure of electronic devices, undercover investigative measures and use of malware. Our main finding is that the current legal limitations do not allow a deep darknet investigation of potential offenders. If an IP address of a potential offender is leaked, law enforcement authorities can identify the IP address holder and seize his related electronic devices. The current legal limitations effectively end the investigation at this point as they do not allow the use of any kind of malware by the law enforcement authorities.
PLOS ONE | 2016
Igor Bernik; Kaja Prislan
Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model—ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it’s recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes.
IFAC Proceedings Volumes | 2000
Miroljub Kljajić; Andrej Škraba; Igor Bernik
Abstract The development of a simulation model of the production system for inventory control is described. Business simulator is used as a part of adaptive decision-making methodology for raw material inventory management, which is dependent on delivery times and market demand. Reports are generated as a result of simulation runs in the supporting application, which incorporate the simulation model and production database and include raw material, product and recipe data. Economic ordering quantity is determined according to the state of the inventory and safety stock value.
Archive | 1999
Miroljub Kljajić; Igor Bernik; Robert Leskovar; Andrej Škraba
The proposed methodology deals with the behavior of the integrated simulation system for decision making support in enterprise. The method was tested in a medium size factory in order to improve operation planing and reengineering process. The process of production was modeled and implemented with the ProModel simulation package. The real process was recorded by a video camera and digitalised on a personal computer. Animation of the simulated process synchronized with the video of the real process was projected in the meeting room. On this way, validation of the model and the confidence of the participants in evaluating the chosen solution were achieved. On the basis of current demand, the operational production plans are prepared. Strategic plans for system reengineering on the base of the company’s strategic vision can also be prepared.
workshop on information security applications | 2015
Blaz Markelj; Igor Bernik
MCBE'07 Proceedings of the 8th Conference on 8th WSEAS Int. Conference on Mathematics and Computers in Business and Economics - Volume 8 | 2007
Mojca Bernik; Jože Florjančič; Du¡an Črnigoj; Igor Bernik
ISPACT'10 Proceedings of the 9th WSEAS international conference on Advances in e-activities, information security and privacy | 2010
Kaja Prislan; Igor Bernik