24 results on '"Renata Mekovec"'
Search Results
2. A conceptualization of the privacy concerns of cloud users
- Author
-
Dijana Peras and Renata Mekovec
- Subjects
Information Systems and Management ,Computer Networks and Communications ,Management of Technology and Innovation ,Data_MISCELLANEOUS ,Cloud privacy concerns ,Cloud services ,Privacy dimensions ,Privacy problems ,Software ,Information Systems ,Management Information Systems - Abstract
Purpose The purpose of this paper is to improve the understanding of cloud service users’ privacy concerns, which are anticipated to considerably hinder cloud service market growth. The researchers have explored privacy concerns from dimensions that were identified as relevant in the cloud context. Design/methodology/approach Content analysis was used to identify privacy problems that were most often raised in previous cloud research. Multidimensional developmental theory (MDT) was used to build a conceptual model of cloud privacy concerns. Literature review was made to identify the privacy-related constructs used to measure privacy concerns in previous cloud research. Findings The paper provides systematization of recent cloud privacy research, proposal of a conceptual model of cloud privacy concerns, identification of measuring instruments that were used to measure privacy concerns in previous cloud research and identification of categories of problems that need to be addressed in future cloud research. Originality/value This paper has identified the categories of privacy problems and dimensions that have not yet been measured in the cloud context, to the best of the authors’ knowledge. Their simultaneous examination could clarify the effects of different dimensions on the privacy concerns of cloud users. The conceptual model of cloud privacy concerns will allow cloud service providers to focus on key cloud problems affecting users’ privacy concerns and use the most appropriate privacy protection communication and preservation approaches.
- Published
- 2022
- Full Text
- View/download PDF
3. METHODOLOGY FOR DEVELOPING A FRAMEWORK FOR DIGITAL COMPETENCIES OF SCHOOL PRINCIPALS IN CROATIA
- Author
-
Nikolina Žajdela Hrustek, Valentina Kirinić, Renata Mekovec, Gómez Chova, Luis, López Martínez, Agustín, and Lees, Joanna
- Subjects
school, education, digital transformation, maturity, competence - Abstract
In today’s challenging times subject to daily changes, the active participation of individuals in all spheres of business and social life requires a certain level of digital competence. This strongly applies to the principals of schools in and for the 21st century. In holding this position, they must be actively involved, with great responsibility, in the development of young people so that they can become successful in acquiring the knowledge, skills and competencies needed to overcome challenges and problems in both modern digitally transformed businesses and their private lives. Within the project “e-Schools: Development of the System of Digitally Mature Schools” (e-Schools project), which is in the second phase of its implementation in the Republic of Croatia, it was decided to develop a framework for digital competencies of school principals in order to develop the digital competencies of these very important stakeholders in the educational process. Development of the Framework for Digital Competencies of School Principals was based on scientific research and the steps of the scientific methodology used are described in this paper. The logical requirement placed upon the Framework for digital competencies of school principals was to be aligned with the Framework for Digital Maturity of Schools previously developed within the e-Schools project which defines areas and levels of digital maturity. A total of five areas of digital competencies in the Framework for Digital Competencies of School Principals has been identified: (1) Planning, management and leadership, (2) Digital technologies in learning and teaching, (3) Development of digital competencies, (4) Digital culture and (5) Digital infrastructure. For each of these areas, a set of digital competencies was identified based upon a review and analysis of the relevant literature and strategic documents, and the identification of key school principal tasks. In the next step, content validation of the competencies was performed with the help of a group of experts. Over twenty experts in the field of digital competencies participated in the content validation. In addition to content validation, the experts also determined the degree of importance of each particular competence in a specific identified area. In addition to experts in content validation as well as in the validation of the clarity of digital competencies' formulations, the school principals themselves participated. Validation was performed through focus groups, guided by a qualified moderator according to a predefined protocol. The final version of the competencies was obtained after updating the competencies based on qualitative validation by the experts and school principals who participated in the research. In the last step, after defining the final version of the competencies, a description of the competence and typical activities related to it were identified for each defined competence. As a final result, a total of twenty-five competencies and more than one hundred and seventy typical activities in the five identified areas were defined.
- Published
- 2022
4. Using clustering methods to identify different profiles based on similarity in online security and privacy attitudes
- Author
-
Renata Mekovec, Dijana Peras, Cartana Alvaro, Xavier, and Cellary, Wojciech
- Subjects
Online security ,Similarity (network science) ,business.industry ,Computer science ,Internet privacy ,k-means clustering ,Online privacy, EU countries, K-means clustering ,media_common.cataloged_instance ,European union ,business ,Cluster analysis ,Eu countries ,media_common - Abstract
This paper examines behavior patterns related to online security and privacy attitudes from individuals across 28 European Union (EU) countries. By using the k-means clustering, the countries were assigned to three different profiles based on similarities in online security and privacy attitudes. The study revealed significant differences in online security and privacy attitudes between individuals from countries assigned to high, low and medium concerned profile. Concerns about online privacy and security of individuals in high concern profile were significantly higher compared to other two profiles, while individuals in low concern profile expressed a significantly lower level of concern about online privacy and security compared to other two profiles. A cross-national EU-based exploration and visual map-ping of attitudes was provided.
- Published
- 2021
5. Continuance Intention to Use Cloud Services in Educational Institutions
- Author
-
Dijana Peras, Renata Mekovec, Stephanidis, Constantine, Antona, Margherita, and Ntoa, Stavroula
- Subjects
Strategic planning ,Information privacy ,Knowledge management ,business.industry ,media_common.quotation_subject ,Cloud services ,educational institutions ,continued use of technology ,Cloud computing ,Identification (information) ,Perception ,Conceptual model ,Continuance ,business ,Psychology ,Research question ,media_common - Abstract
Continued use of technology depends on numerous factors that arise from different dimensions, such as the characteristics of the organization, envi-ronment, tools, and users. Trends in cloud service (CS) related research are focused on technology capabilities, cost reductions, and profit increases in small and medium-sized enterprises (SMEs). Although the use of technology depends on the intention of the users, their perception in this particular re-search area is neglected. Most of the papers from this research domain ex-plore the initial acceptance of CS, although the initial acceptance of tech-nology does not guarantee its continued use. The objectives of the proposed research are: 1) to identify the factors related to the continuance intention to use CS in education institutions (EI), and 2) to develop a conceptual model for the continuance intention to use CS in EI. The main research question of the proposed paper is: “Which factors are related to the continuance inten-tion to use CS in EI”? To identify the factors, an overview of the state of the art will be presented, including: a) a review of the CS used in educational in-stitutions, and b) an analysis of existing models and factors related to the continued use of technology. Furthermore, since the biggest concerns of the CS users are data loss/leakage and data privacy, the review of the impact of privacy perception on the continuance intention to use CS will be made. The identification of factors is the first step towards determining the direction of further development of CS for EI and towards strategic planning and organi- zation of teaching models that include the use of CS. Further efforts will be directed on the development of an instrument for measuring the continu-ance intention to use CS in EI.
- Published
- 2021
- Full Text
- View/download PDF
6. Developing and Validating Measurement Instrument for Various Aspects of Digital economy
- Author
-
Igor Pihir, Renata Mekovec, and Nikolina Žajdela Hrustek
- Subjects
Knowledge management ,Computer Networks and Communications ,Computer science ,Strategy and Management ,media_common.quotation_subject ,02 engineering and technology ,E-commerce ,Virtual reality ,Adaptability ,Management Information Systems ,020204 information systems ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,Digital economy ,media_common ,Marketing ,business.industry ,05 social sciences ,Digital transformation ,Digital Economy, e-Banking, e-Commerce, e-Employment, e-Work, ICT, Internet, Measurement Instrument ,050301 education ,Computer Science Applications ,Work (electrical) ,Workforce ,Augmented reality ,050211 marketing ,business ,0503 education - Abstract
ICT-driven innovations affect all sectors of economy and society where trends like adaptability, remote workforce, augmented reality/virtual reality, internet of things, smart machines and artificial intelligence run the core of digital transformation of every aspect of a business. This article introduces the measurement instrument that was created and validated with intention of questioning certain aspects of digital economy from the user point of view. The validation of the proposed measurement instrument was conducted by applying factor analysis (Principal component analysis - PCA) which revealed critical factors affecting certain aspects of digital economy: e-commerce, e-banking, e-work (telework) and e-employment. Measurement instruments were tested on 197 respondents from two Croatian counties. To maximise the benefits that can be derived from digital transformation it is essential to overcome all barriers and force employment of opened opportunities. Business alignment with IT remains a challenge; therefore, presented results are valuable input in the discussed domain.
- Published
- 2021
- Full Text
- View/download PDF
7. ONLINE LEARNING: STUDENT ACTIVITIES AND THEIR PRIVACY CONCERNS
- Author
-
Renata Mekovec, Gomez Chova, L., Lopez Martinez, A., and Candel Torres, I
- Subjects
business.industry ,Online learning ,Internet privacy ,ComputingMilieux_COMPUTERSANDEDUCATION ,Student activities ,business ,Psychology ,online learning ,privacy perception ,student - Abstract
The impact of General Data Protection Regulation (GDPR) is profound on higher education institutions (HEI). HEIs become more accountable for the data they possess regarding their research activities, project activities, most notably teaching activities. As well, they ought to provide detailed databases of what sensitive data remains, as well as documents detailing whether it was stored, how it was obtained, who has access to it, and whether it should be deleted or anonymized. Information about students are generated in different ways: when designing different projects, seminars, essays, exams, but also when using e-learning systems. This article present research findings on students' preferred activities and their perceptions of privacy in the online learning system. The students were encouraged to use different activities within the e-learning system and to evaluate what they liked best with regard to the different types of tasks they were supposed to do. Furthermore, students were asked to evaluate their concerns about their privacy when using certain activities within e-learning platform. Extensive discrepancies in the individual learning trajectories demonstrate that there is no such thing as a one-size-fits-all solution in education. Adaptive online learning environment is continuously adapted to accommodate differences between learners in order to address this challenge. Presented results will enable better understanding of student preferences and thus help all participants in the teaching process to address online activities that will help students to achieve the best possible knowledge and skills.
- Published
- 2020
- Full Text
- View/download PDF
8. Methodology of Transforming Digital Competence Framework to Curricula: Croatian e-Schools Project Example
- Author
-
Renata Mekovec, Nikolina Žajdela Hrustek, and Valentina Kirinić
- Subjects
Croatian ,Medical education ,Curricula, Digital competence framework, Methodology, School ,05 social sciences ,050401 social sciences methods ,050301 education ,language.human_language ,Computer Science Applications ,Education ,0504 sociology ,ComputingMilieux_COMPUTERSANDEDUCATION ,language ,Sociology ,Informatization ,0503 education ,Curriculum ,Digital competence - Abstract
In 2015 the programme entitled “e-Schools: A comprehensive informatization of school operation and teaching processes with the aim of creating digitally mature schools for the 21st century” started in Croatia. The results of the pilot project e-Schools include a Digital Competence Framework for School Employees: Teachers, Principals and Administrative Staff, and based on this, the Curriculum for the Enhancement of Digital Competences of School Employees: Teachers, Principals and Administrative Staff. In the paper, the methodology of transforming the Digital Competence Framework to Curricula is described: from digital competencies expected from school staff, through learning outcomes (units) to the modules and implementation/instruction units to be used as the base for educating school staff and helping them to achieve and/or improve their own digital competencies.
- Published
- 2018
- Full Text
- View/download PDF
9. Customer profile identification in IT service development
- Author
-
Renata Mekovec, Katarina Pažur Aničić, Gomez Chova, L., Lopez Martinez, A., and Candel Torres, I
- Subjects
Identification (information) ,Process management ,Customer profile ,Computer science ,IT service development, customer profile, persona ,Service development - Abstract
As information service production is performed in short bursts, conventional approaches frequently do not have enough time to produce good user experience (UX). Lean UX and other types of UX both share the same aim in mind: to reach a better user interface. Typical questions that should be addressed in the UX sketching concept of the service may include: Who are our users? For what is the product used? When is it used? What situations is it used in? What will be the most important functionality? What’s the biggest risk to product delivery? As opposed to designing products, services, and solutions based upon the preferences of the design team preferences, it has become standard practice to collate research and personify certain trends and patterns in the data as personas. Personas are fictional characters, created based upon research in order to represent the different user types that might use service, product, site, or brand in a similar way. Creating personas can help to understand users’ needs, experiences, behaviours and goals. This article presents the use of simulation method in teaching students basic concepts of IT service development, focusing specifically on defining customer profiles. The students were “acting” the employers of IT firm that is to develop new mobile, web or desktop application. One of the case study was to define characteristics of customer which will be using this application. Students/employers were invited to use various methods to describe customer profile as well as customer requirements.
- Published
- 2020
10. Implementation of the General Data Protection Regulation: Case of Higher Education Institution
- Author
-
Renata Mekovec and Dijana Peras
- Subjects
Higher education ,business.industry ,media_common.quotation_subject ,05 social sciences ,050301 education ,Accounting ,02 engineering and technology ,Consistency (negotiation) ,GDPR ,HEI ,personal data protection ,steps of implementation ,Order (exchange) ,General Data Protection Regulation ,0202 electrical engineering, electronic engineering, information engineering ,Institution ,Member state ,media_common.cataloged_instance ,Relevance (law) ,020201 artificial intelligence & image processing ,Business ,European union ,0503 education ,media_common - Abstract
The aim of the General Data Protection Regulation (GDPR) is to ensure the consistency of the protection of personal data across the European Union (EU). The GDPR imposes new rules that directly affect every Member State. The purpose of this paper is to identify the practical implications of GDPR and to discuss the changes that have the most practical relevance. The situation regarding the collection, processing and use of personal data at the higher education institution (HEI) in Croatia is analyzed with aim of alignment with the provisions of the GDPR. Accordingly, the areas within the HEI that are subject to change are identified, and measures implemented in order to align to the GDPR are presented.
- Published
- 2020
- Full Text
- View/download PDF
11. Prototype testing: implementation and analysis of student self-assessment and peer-assessment
- Author
-
Renata Mekovec and Katarina Pažur-Aničić
- Subjects
Self-assessment ,Medical education ,Peer assessment ,ComputingMilieux_COMPUTERSANDEDUCATION ,Psychology ,workshop, peer-assessment, prototype testing, self-assessment - Abstract
Prototyping is an important part of the software development process which contributes to the quality of the final product. Accordingly, software engineering students should be taught prototype development and testing, in order to become familiar with users’ needs and also to better understand the application development process. In the process of prototype testing, it is crucial that students evaluate their own work, as well as the work of their peers. Self-evaluation and peer-evaluation of prototypes help students to better understand potential improvements to the application prototype and to implement those improvements in the development of the final product. This paper presents the usability testing of high fidelity prototypes using videos and Moodle workshops in the undergraduate course IT Services Management, and analyzes results of student self-assessment and peerassessment (N=445). An innovative way of prototype testing/evaluation is presented along with the results of teacher evaluation of the prototype ; moreover, student self- assessment and peerassessment are discussed. The results indicate that the student and peer assessments differed from those of the teacher, but the assessments from students and peers are more similar. Student- and peer- assessments are too high when considering teacher grading as a reference framework.
- Published
- 2019
12. Student internship effectiveness: case study of ict study programme
- Author
-
Romina Kućar, Renata Mekovec, Katarina Pažur Aničić, and L. Gómez Chova, A. López Martínez, I. Candel Torres
- Subjects
Medical education ,ComputingMilieux_THECOMPUTINGPROFESSION ,Information and Communications Technology ,Student internship, ICT, evaluation ,Internship ,ComputingMilieux_COMPUTERSANDEDUCATION ,Sociology - Abstract
Education of future ICT professionals is becoming much more challenging due to the requirements and expectations that dynamic and innovative ICT market puts in front of higher education institutions (HEI). In order to prepare graduates for the challenges of future labour market, which consider their equipment with a various technical and soft skills, HEIs must be innovative and creative in introducing new pedagogical approaches, especially the ones in collaboration with the industry. In that context, different forms of work-based learning and internship placements in companies are taking part as an integral part of ICT programmes. This paper analyses an obligatory course “Professional practice” at the University of Zagreb, Faculty of Organization and Informatics. As a part of their final semester of graduate studies, students needs to undergo 160 hours of professional practice in companies. During the internship, each student is assigned a mentor from company’s employees who oversees his work. For each day of internship, students are obliged to write diary with a description of daily tasks which is, at the end of the internship, checked and signed by a mentor. Moreover, mentor completes a student evaluation form, as well as student complete company evaluation form. This paper analyses effectiveness of this form of student internship using the following data: 1) students’ evaluations, 2) mentors’ evaluations and 3) conclusions from students’ diaries. Analysis is based on data from generation 2018/2019. The results are discussed in order to detect potential for future improvements
- Published
- 2019
- Full Text
- View/download PDF
13. Improving Quality of Teaching Process Thought the GDPR Implementation
- Author
-
Renata Mekovec, Dijana Peras, and Tatjana Zrinski
- Subjects
Process management ,Quality of teaching ,Process (engineering) ,Computer science ,GDPR, teaching process, higher education institutions - Abstract
Since the introduction of General Data Privacy Regulation, privacy issues have been put under special attention. Although business entities depend on the personal data of their users, the provisions presented by the modified privacy framework are applicable to higher education institutions (HEI) as well. The teaching process itself mostly depends on accessing, collecting, and sharing student's personal information. Furthermore, the processing and analysing the student’s success of studding is crucial in order to improve the quality of study programs and the study process in general, as well. This paper describes the implementation of the GDPR principle at a higher education institution in the Republic of Croatia. The steps that were needed to ensure the realization of all student rights, as well as the obligations of HEI regarding the securing of privacy throughout the teaching process, are presented. Implementation included the performance of inventory data, the establishment of records of data processing activities and records of privacy breaches. The procedures outlined can be seen as an example of good practice as HEI can align with the requirements of privacy, whereby all pedagogical standards, the achievement of the learning outcomes of a particular study program, as well as the transparency of the student evaluation process is insured and provided.
- Published
- 2019
14. Digital Commpetence Curriculum for Schools' Employees: Croatian e-Schools Project Example
- Author
-
Renata Mekovec, Valentina Kirinić, and Nikolina Zajdela Hrustek
- Subjects
Medical education ,Acquiring skills ,media_common.quotation_subject ,Flexibility (personality) ,digital competence curriculum ,development approach ,curriculum implementation recommendation ,Creativity ,Adult education ,Work (electrical) ,Curriculum development ,ComputingMilieux_COMPUTERSANDEDUCATION ,Sociology ,Set (psychology) ,Curriculum ,media_common - Abstract
The Curriculum for the Enhancement of Digital Competences of School Employees: Teachers and Associates, Principals and Administrative Staff developed as the result of Croatian e-Schools project is presented. An open curriculum approach has been chosen that characterizes the flexibility of design and is based on recommendations that allow creativity and the introduction of change in the course of implementation. The digital competence curriculum is intended for the training of beneficiaries who are considered adults, therefore specifics related to adult education are implemented. As the digitalization of society, work and education is moving fast, there is a need to set a guidance to improve digital competence. Schools should be leaders on the use of digital technologies for learning, acquiring skills and competences and to emphasize the importance of digital technologies for future education and employment. We believe that this Curriculum can help address some of the key challenges that schools are currently facing.
- Published
- 2019
15. Attitudes to and usage of Internet and e-services by citizens in Croatia: General population vs. business population
- Author
-
Nikolina Zajdela Hrustek, Renata Mekovec, Igor Pihir, and Skala, Karolj
- Subjects
Croatian ,E-services ,education.field_of_study ,business.industry ,ICT ,e-services ,benefits of ICT ,Significant difference ,Population ,Sample (statistics) ,language.human_language ,Entertainment ,Politics ,language ,The Internet ,Marketing ,education ,business - Abstract
This paper investigates the usage of Internet and e services by citizens in Croatia. The focus of research is to resolve, if any significant difference in use of e-services and the Internet for private purposes exists between: 1) the general population of citizens (representative sample of 2 county HRs) and 2) citizens who are employed and who are using e- services and the Internet for business purposes. The first sample includes adults from two north-west counties in Croatia (N=427), and the second one includes employees in Croatian small, middle-sized and large companies (N=436). Survey results showed significant differences in using Internet and e services for almost all activities that have been in focus of this research: information search, education, communication, social networking, entertainment, financial activities, commercial activities and participation in civil activities (petitions, discussions). Non- significant differences were found only for participating in political activities.
- Published
- 2018
- Full Text
- View/download PDF
16. Opportunities and challenges of applying omnichannel approach to contact center
- Author
-
Renata Mekovec, Dijana Peras, Ruben Picek, and Shuliang, Li
- Subjects
Service (business) ,Focus (computing) ,Process management ,Computer science ,Interface (computing) ,05 social sciences ,Context (language use) ,Omnichannel, Multychannel, Contact Centre, Customer Service, Customer Experience (CX), CRM ,Service provider ,Electronic mail ,Omnichannel ,0502 economics and business ,050211 marketing ,050203 business & management ,Communication channel - Abstract
The contact center is the center of communication between users and service providers through which companies strive to provide support and retain or increase the customer's satisfaction in working with the service. Today companies that provide support through contact centers add more and more independent channels including email, chat, SMS, social networks and other, without paying attention to the needs of customers nor to the potential that a particular channel delivers. In context of the contact center, omnichannel approach rises as an idea of creating the seamless and integrated environment for modern customer experience (CX) through integrated channels, which allows agents to work on a better interface and to use a richer set of customer and service data. This paper discusses the nature of applying the omnichannel approach to contact centers. To be more precise, focus of paper is on presenting the need for an omnichannel approach in today's contact centers, analyzing literature and defining opportunities and challenges of applying omnichannel approach to contact centers.
- Published
- 2018
- Full Text
- View/download PDF
17. Developing Undergraduate IT Students’ Generic Competencies Through Problem-Based Learning
- Author
-
Renata Mekovec, Katarina Pažur Aničić, and Krunoslav Arbanas
- Subjects
Problem-based learning ,students’ generic competences ,IT service management ,lcsh:T ,ComputingMilieux_COMPUTERSANDEDUCATION ,lcsh:L ,lcsh:Technology ,lcsh:Education - Abstract
TEM Journal; Vol 7, No 1, 2018. ISSN 2217-8309, Possession of generic competences is recognized as a very important characteristic of future professionals in the field of information and communication technologies (ICT). There is a high pressure on higher education institutions (HEIs) to provide students with both technical knowledge and generic competencies. This study introduces a learning environment set in line with the principles of problem-based learning (PBL) aimed at raising students’ generic competences. Based on responses from 227 students, the results suggest that students perceive the set learning environment contributing to the development of a wide range of generic competences.
- Published
- 2018
- Full Text
- View/download PDF
18. Influence of GDPR on social networks used by omnichannel contact center
- Author
-
Ruben Picek, Dijana Peras, Renata Mekovec, and Skala, Karolj
- Subjects
User information ,Data collection ,GDPR ,social networks ,SNS ,personal data ,privacy ,omnichannel contact center ,communication channel ,Computer science ,business.industry ,05 social sciences ,Internet privacy ,050801 communication & media studies ,02 engineering and technology ,Service provider ,Business model ,Omnichannel ,0508 media and communications ,020204 information systems ,General Data Protection Regulation ,0202 electrical engineering, electronic engineering, information engineering ,Data Protection Act 1998 ,business ,Personally identifiable information - Abstract
First part of paper addresses the impact of General Data Protection Regulation (GDPR) on data collection by most popular social networks. GDPR will start to apply on May 25th 2018, and it aims to change the way in which organizations treat data protection. Regulation requires organizations, including social networking service providers (SNSP), operating within the EU to know where personal information of their users is located, how can it be used and when does it have to be deleted. The paper clarifies the rights of the users and the obligations of the SNSP. It analyzes 10 most popular social networks and explores what personal information they collect as well as problems related to the application of GDPR. Second part of the paper presents the use of social networks in omnichannel contact center. Omnichannel is a business model which combines various communication channels in order to improve customer experience. Since modern social networks are abundant with personal user information, it is necessary to determine which of them may be collected and used by omnichannel contact center, while respecting the principles of GDPR.
- Published
- 2018
19. The perception of e-democracy and e-participation at the individual level - a Croatian example
- Author
-
Anamarija Musa, Renata Mekovec, Nikolina Zajdela Hrustek, Misnikov, Yuri, and Trutnev, Dmitrii
- Subjects
Government ,Politics ,e-participation ,business.industry ,Social system ,Information and Communications Technology ,Political science ,Social media ,The Internet ,e-democracy ,e-government ,perception survey ,Public relations ,business ,E-democracy - Abstract
Today, the ICT and the Internet tools offer citizens the opportunity to surpass the position of passive actors in the creation of new political and social systems, and become active participants who are able to propose new alternatives based on their opinions. Various available social media platforms are breaking down the barriers between citizens and government authorities, both at the central and local level, by overcoming traditional forms of interactions and giving opportunities to numerous and various categories of individuals and groups to be potentially involved in the political processes. In order to examine the perception and frequency of ICT and Internet use which enable citizens to be included in different processes of public and political activities, as well as the communication between public authorities and citizens and active involvement of citizens in decision- making processes, a survey was conducted on a representative sample of participants in the north-east part of Croatia. Research results show a very low level of the use of ICT and the Internet for the aforementioned purposes.
- Published
- 2015
20. ONLINE SHOPPING AND (IM)POSSIBILITY OF PRIVACY PROTECTION IN INTERNET BANKING
- Author
-
Renata Mekovec, Krsto Kero, and Benedikt Bojanić-Glavica
- Subjects
communication ,online shopping ,internet ,komunikacija ,online kupovina - Abstract
We live in the society of World Wide Web, smart mobile devices and social networking, where an individual can be monitored and his current location can be identified. Each of those new-developed technologies are associated with a set of privacy issues. Firstly, those technologies enable people to be monitored and tracked, so various information about specific technology users can be collected. Secondly, collected information about users can be stored, merged and analyzed at any time. Finally, they enable further dissemination and publication in endlessly varied forms. If those technologies are misused many privacy violations can occur. Privacy can be seen as an individual right. Since individuals differ, the definition of privacy as well as the invasion of privacy will mean different things to different people. The aim of empirical research described in this paper was to investigate individual’s attitude toward privacy issues when shopping online and/or when using Internet banking services. Furthermore, we wanted to investigate the relationships between different factors that can influence user’s online privacy perception. The research results have shown that there is a connection between respondents’ privacy perception and their concerns about information that are collected during their online activity. There is also a connection between respondents’ privacy perception and their concerns about how government and current regulations protect their privacy., Živimo u društvu koje karakterizira upotreba World Wide Weba, pametnih mobilnih uređaja i društvenih mreža, gdje pojedinac može biti nadziran te može biti određena njegova trenutna lokacija. Svaku od ovih novorazvijenih tehnogija prate različiti problemi vezani uz privatnost. Prvo, ove tehnologije omogućavaju da pojedinci budu nadzirani i praćeni pa se na taj način može prikupiti puno informacija o korisnicima određene tehnologije. Drugo, tako prikupljene informacije mogu biti pohranjene, kombinirane te analizirane u bilo koje vrijeme. Na kraju, ove tehnologije omogućavaju daljnje širenje i publikaciju informacija u raznim oblicima. Ukoliko se navedene tehnologije zlobupotrijebe može doći do različitih oblika povrede privatnosti korisnika. Privatnost se može definirati kao osnovno ljudsko pravo. Pošto se pojedinci međusobno razlikuju tako se i shvaćanje pojma privatnosti, ali i povrede privatnosti može razlikovati od pojedinca do pojedinca. Cilj empirijskog istraživanja prezentiranog u ovom radu bio je ispitati stavove ispitanika vezano uz pitanja o njihovoj zabrinutosti za privatnost prilikom korištenja usluga kupovanja/plaćanja robe putem Interneta (online kupnje) i/ili Internet bankarstva. Nadalje, željeli smo ispitati odnose između različitih činitelja koji mogu imati utjecaj na korisnikovu percepciju online privatnosti. Rezultati istraživanja pokazuju da postoji veza između percepcije ispitanika vezano za njegovu online privatnost i njegove zabrinutosti za količinu informacija koje se prikupljaju o njemu prilikom njegove online aktivnosti. Također postoji pozitivna veza ispitanikove percepcije online privatnosti i njegove percepcije postojećih pravnih okvira vezanih uz zaštitu privatnosti osobnih podataka.
- Published
- 2012
21. Online shopping and (im)possibility of privacy protection in Internet banking
- Author
-
Renata Mekovec, Kero, K., and Bojanić-Glavica, B.
- Subjects
online privacy ,Internet privacy ,Internet technology ,privacy concerns - Abstract
We live in the society of World Wide Web, smart mobile devices and social networking, where an individual can be monitored and his current location can be identified. Each of those new-developed technologies are associated with a set of privacy issues. Firstly, those technologies enable people to be monitored and tracked, so various information about specific technology users can be collected. Secondly, collected information about users can be stored, merged and analyzed at any time. Finally, they enable further dissemination and publication in endlessly varied forms. If those technologies are misused many privacy violations can occur. Privacy can be seen as an individual right. Since individuals differ, the definition of privacy as well as the invasion of privacy will mean different things to different people. The aim of empirical research described in this paper was to investigate individual’s attitude toward privacy issues when shopping online and/or when using Internet banking services. Furthermore, we wanted to investigate the relationships between different factors that can influence user’s online privacy perception. The research results have shown that there is a connection between respondents’ privacy perception and their concerns about information that are collected during their online activity. There is also a connection between respondents’ privacy perception and their concerns about how government and current regulations protect their privacy.
- Published
- 2012
22. Privacy preserving in data mining - Experimental research on SMEs data
- Author
-
Zita Bošnjak, Olivera Grljević, and Renata Mekovec
- Subjects
Information privacy ,Data collection ,Computer science ,Privacy software ,media_common.quotation_subject ,computer.software_genre ,Data warehouse ,privacy ,data mining ,privacy preserving techiques ,Information sensitivity ,Data quality ,Data analysis ,Quality (business) ,Data mining ,computer ,media_common - Abstract
Analysis of data on individuals and business sensitive data as well as revealing the results of such analysis without disclosing confidential and sensitive information is a very important issue. Many techniques for preserving privacy of data are currently being used. In this paper, we addressed the basic techniques: randomization, kanonymity, distributed privacy preserving and application effectiveness downgrading. Most of the techniques should be applied in the phase of data collection or their preprocessing, which can lead to different results (better or worse) of data mining than would be obtained on original data. For this reason, data analysts should be encouraged to quantify the ratio between privacy preserved in data with application of each technique and the loss of data or quality of outputs. In this paper, we illustrated the application of certain techniques for preserving privacy on experimental dataset, and we showed the effects that their use has on the results.
- Published
- 2011
- Full Text
- View/download PDF
23. Online privacy: overview and preliminary research
- Author
-
Renata Mekovec
- Subjects
privacy perception ,online privacy ,e-banking ,online shopping ,Information theory ,Q350-390 - Abstract
Over the last decade using the Internet for online shopping, information browsing and searching as well as for online communication has become part of everyday life. Although the Internet technology has a lot of benefits for users, one of the most important disadvantages is related to the increasing capacity for users’ online activity surveillance. However, the users are increasingly becoming aware of online surveillance methods, which results in their increased concern for privacy protection. Numerous factors influence the way in which individuals perceive the level of privacy protection when they are online. This article provides a review of factors that influence the privacy perception of Internet users. Previous online privacy research related to e-business was predominantly focused on the dimension of information privacy and concerned with the way users’ personal information is collected, saved and used by an online company. This article’s main aim is to provide an overview of numerous Internet users’ privacy perception elements across various privacy dimensions as well as their potential categorization. In addition, considering that e-banking and online shopping are one of the most widely used e-services, an examination of online privacy perception of e-banking/online shopping users was performed. 
- Published
- 2010
24. A METHOD FOR IMPROVEMENT OF OBJECTIVITY OF E-SERVICE QUALITY EVALUATION
- Author
-
Renata Mekovec, Bubaš, G., and Vrček, N.
- Subjects
Information theory ,e-retailing ,e-commerce ,measurement ,Q350-390 ,e-service quality - Abstract
Measurement and improvement of e-service quality is important for sustaining competitive advantage of an e-commerce web site. A number of e-service quality measures have recently been developed that predominantly rely on the subjective evaluation of diverse quality attributes. To increase the objectivity of e-service quality measurement a recently developed measure of e-service quality has been adapted in a way that replaces its Likert type scales for evaluation of specific attributes with check-lists that include specific observable elements for appraisal and a scoring procedure. The consistency of scoring with this adaptation of an e-service quality measure was investigated in comparison to the use of the standard measure with Likert type scales and by the use of untrained and trained evaluators. The results of the empirical evaluation indicate a greater inter-rater consistency when the adapted/objective measure is used for evaluation of the efficiency dimension of e-service quality.
- Published
- 2007
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.