Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Igor Bernik is active.

Publication


Featured researches published by Igor Bernik.


Simulation | 2000

Simulation Approach to Decision Assessment in Enterprises

Miroljub Kljajić; Igor Bernik; Andrej Škraba

The methodology of an integrated simulation system application for decision-making support in enterprises is described in this article. The use of visual interac tive modelling and animation can help users better understand simulation results, especially those who are not experts. Decision-makers are motivated by the aniniation while seeking better solutions for pro duction problems. The method was tested in a medium- sized company in order to improve operational plan ning and re-engineering. The real process was recorded on video, digitized, and implemented on a PC. Anima tion of the simulated process, synchronized with video of the real process, was projected in a room to achieve model validation and participant confidence. Opera tional production plans were simulated using current demands as the basis. Application of discrete event simulation in reengineering is also presented. The article shows how to develop a model, prepare sce narios and evaluate alternatives. Two criteria were evaluated for the alternative: the expected value and the value of multiple criteria evaluation, which was examined with the AHP method. Model validation and its use for alternative selection is also discussed.


european intelligence and security informatics conference | 2011

Cybercrime: Awareness and Fear: Slovenian Perspectives

Gorazd Meško; Igor Bernik

In this paper the Slovene perspective on the perception of cyber crime in terms of awareness and fear is presented. On the basis of theoretical knowledge the online survey has been prepared and conducted. The results of the perception of cyber crime and its understanding have been analyzed. The results and their interpretations are the basis for further work with the cyberspace users. Based on the results some guidelines on how to raise awareness, reduce risk and thereby reduce the fear of cyber crime in Slovenia are given.


Archive | 2018

Mobile device security

Blaž Markelj; Igor Bernik

Smartphone becomes the most typical and popular mobile device in recent years. It combines the functionality of mobile phone and PDA. Besides, it provides many computers functionality, such as processing, communication, data storage and etc. It also provides many computers service, such as web browser, portable media player, video call, GPS, Wi-Fi and etc. This paper analyzes and compares the feature and security issue among three popular brands of smartphones (Google Android, iPhone and BlackBerry) aiming to help customers choose suitable mobile device based on their specific needs.


availability, reliability and security | 2017

Investigating the darknet: limitations in Slovenian legal system

Anže Mihelič; Blaž Markelj; Igor Bernik; Sabina Zgaga

The rapid development of the cyberspace brought about a relatively new type of crime, namely cybercrime, that transcends both time and space convergence conditions of traditional crime definitions. The darknet and anonymity it assures have been very inviting for cybercriminals in the recent years and it has been plagued with criminal activity, such as distribution of child pornography, illegal arms trafficking or drug trafficking. The purpose of the paper is to show legislative limits of investigating crimes committed using the darknet in Slovenia on examples of a few basic investigative acts: identification of the IP holder, search and seizure of electronic devices, undercover investigative measures and use of malware. Our main finding is that the current legal limitations do not allow a deep darknet investigation of potential offenders. If an IP address of a potential offender is leaked, law enforcement authorities can identify the IP address holder and seize his related electronic devices. The current legal limitations effectively end the investigation at this point as they do not allow the use of any kind of malware by the law enforcement authorities.


PLOS ONE | 2016

Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation

Igor Bernik; Kaja Prislan

Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model—ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it’s recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes.


IFAC Proceedings Volumes | 2000

Adaptive Inventory Control Simulation Model

Miroljub Kljajić; Andrej Škraba; Igor Bernik

Abstract The development of a simulation model of the production system for inventory control is described. Business simulator is used as a part of adaptive decision-making methodology for raw material inventory management, which is dependent on delivery times and market demand. Reports are generated as a result of simulation runs in the supporting application, which incorporate the simulation model and production database and include raw material, product and recipe data. Economic ordering quantity is determined according to the state of the inventory and safety stock value.


Archive | 1999

A Method for Visual Interactive Modeling and Simulation for Production Process Improvement

Miroljub Kljajić; Igor Bernik; Robert Leskovar; Andrej Škraba

The proposed methodology deals with the behavior of the integrated simulation system for decision making support in enterprise. The method was tested in a medium size factory in order to improve operation planing and reengineering process. The process of production was modeled and implemented with the ProModel simulation package. The real process was recorded by a video camera and digitalised on a personal computer. Animation of the simulated process synchronized with the video of the real process was projected in the meeting room. On this way, validation of the model and the confidence of the participants in evaluating the chosen solution were achieved. On the basis of current demand, the operational production plans are prepared. Strategic plans for system reengineering on the base of the company’s strategic vision can also be prepared.


workshop on information security applications | 2015

Safe use of mobile devices arises from knowing the threats

Blaz Markelj; Igor Bernik


MCBE'07 Proceedings of the 8th Conference on 8th WSEAS Int. Conference on Mathematics and Computers in Business and Economics - Volume 8 | 2007

Using information technology for human resource management decisions

Mojca Bernik; Jože Florjančič; Du¡an Črnigoj; Igor Bernik


ISPACT'10 Proceedings of the 9th WSEAS international conference on Advances in e-activities, information security and privacy | 2010

Risk management with ISO 27000 standards in information security

Kaja Prislan; Igor Bernik

Collaboration


Dive into the Igor Bernik's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Eva Jereb

University of Maribor

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge