Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Krešimir Šolić is active.

Publication


Featured researches published by Krešimir Šolić.


Computers & Security | 2015

The information systems' security level assessment model based on an ontology and evidential reasoning approach

Krešimir Šolić; Hrvoje Ocevcic; Marin Golub

In the area of information technology an amount of security issues persists through time. Ongoing activities on security solutions aim to integrate existing security guidelines, best practices, security standards and existing solutions, but they often lack a knowledge base or do not involve all security issues, particularly human influence.In this paper, we presented a model that can be the basis for a novel information systems security evaluation solution. This solution should be able to cover a wide range of all possible information security issues. Our model is based on an OWL ontology for knowledge base, uses an enhanced Evidential Reasoning algorithm for mathematical calculations and possesses a simple reflex intelligent agents algorithm as a decision supporting element.Properties for this model supervene from properties of its constructing elements. Knowledge base being built on OWL ontology is a major element of the model. It can provide high flexibility and applicability to different information systems and business organizations; upgradeability to be up to date regarding current security issues and new threats; and high versatility, taking into evaluation all possible aspects regarding security issues, e.g., network security, software and hardware issues, human influence, security policies and disaster recovery plans. Enhanced Evidential Reasoning algorithm is based on the Dumpster-Shafer theory and is well suited for calculations with experts subjective judgements combining qualitative with quantitative evaluation grades. We designed an algorithm for back coupling based on a simple reflex intelligent agent for results presentation and decision support.In our work, we explained how to connect and use each of the models constructive elements to obtain information security evaluation results. In addition, we conducted a case study with the proposed model on a small business organization. To test our model, we also used the standard qualitative risk assessment method on the same business organization in order to compare both qualitative results.Preliminary testing results have shown that the presented model could achieve its goal if it would be developed into an integrated software tool with a well-defined and up-to-date ontological knowledge base.


international convention on information and communication technology electronics and microelectronics | 2017

Towards overall information security and privacy (IS&P) taxonomy

Krešimir Šolić; Hrvoje Ocevcic; Igor Fosic; Ivan Horvat; Marin Vuković; T. Ramljak

Although the importance of information security in every days business and private life is obvious, there is a constant increase in number of security breaches. A wide array of all kinds of issues have either direct or indirect impact on the overall information security and privacy level.


international convention on information and communication technology, electronics and microelectronics | 2011

Possible decrease of spam in the email communication

Krešimir Šolić; Damir Šebo; Franjo Jović; Vesna Ilakovac


international convention on information and communication technology electronics and microelectronics | 2014

Development of Users' Information Security Awareness Questionnaire (UISAQ) — Ongoing work

Tena Velki; Krešimir Šolić; Hrvoje Ocevcic


Tehnicki Vjesnik-technical Gazette | 2013

AN APPROACH TO THE ASSESSMENT OF POTENTIALLY RISKY BEHAVIOR OF ICT SYSTEMS’ USERS

Krešimir Šolić; Franjo Jović; Damir Blažević


international convention on information and communication technology, electronics and microelectronics | 2012

Assessment methodology for the categorization of ICT system users security awareness

Krešimir Šolić; Bojan Tovjanin; Vesna Ilakovac


international convention on information and communication technology electronics and microelectronics | 2015

Empirical study on ICT system's users' risky behavior and security awareness

Krešimir Šolić; Tena Velki; Tomislav Galba


Acta Polytechnica Hungarica | 2015

An Information Security and Privacy Self-Assessment (ISPSA) Tool for Internet Users

Tomislav Galba; Krešimir Šolić; Ivica Lukić


Automatika: Journal for Control, Measurement, Electronics, Computing and Communications | 2015

Survey on Password Quality and Confidentiality

Krešimir Šolić; Hrvoje Očevčić; Damir Blažević


Tehnicki Vjesnik-technical Gazette | 2010

Usporedba stupnja sigurnosti među različitim vrstama e-mail servisa - pilot studija

Krešimir Šolić; Krešimir Grgić; Dario Galić

Collaboration


Dive into the Krešimir Šolić's collaboration.

Top Co-Authors

Avatar

Vesna Ilakovac

Josip Juraj Strossmayer University of Osijek

View shared research outputs
Top Co-Authors

Avatar

Krešimir Nenadić

Josip Juraj Strossmayer University of Osijek

View shared research outputs
Top Co-Authors

Avatar

Tena Velki

Josip Juraj Strossmayer University of Osijek

View shared research outputs
Top Co-Authors

Avatar

Franjo Jović

Josip Juraj Strossmayer University of Osijek

View shared research outputs
Top Co-Authors

Avatar

Dario Galić

Josip Juraj Strossmayer University of Osijek

View shared research outputs
Top Co-Authors

Avatar

Hrvoje Ocevcic

Josip Juraj Strossmayer University of Osijek

View shared research outputs
Top Co-Authors

Avatar

Tomislav Galba

Josip Juraj Strossmayer University of Osijek

View shared research outputs
Top Co-Authors

Avatar

Krešimir Grgić

Josip Juraj Strossmayer University of Osijek

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Damir Blažević

Josip Juraj Strossmayer University of Osijek

View shared research outputs
Researchain Logo
Decentralizing Knowledge