Latest articles

10
Sep
2009

Introducing Technical Oriented Fast Diagrams in theProjecting of the Informatics Systems for the Management of Small and Medium Size Enterprises

Communications of the IBIMA
If the Value Engineering is currently applied mainly for the projection/reprojection of the products, the researches made in the last twenty years allowed to elaborate new methodologies in order to extend the application area of the method to the technological processes of fabrication and to…
08
Sep
2009

Performance Evaluation of Symmetric Encryption Algorithms

Communications of the IBIMA
Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory,…
07
Sep
2009

The Relation between Sustainable Innovation and Competitive Advantage: Romanian Perspective

Communications of the IBIMA
Under the auspices of globalization, the competitively has to be reviewed from the perspective of some new organization structures of the international business environment. In recent years, different approaches have been developed focusing on corporate intangible resources, competencies and capabilities as the main lever creating…
06
Sep
2009

Development of the electronic banking services in Romania

Communications of the IBIMA
Launching in Romania the banking products and services with long-distance access was based on image motives for the Romanian banks, domestic institutions or foreign banks branches. In this way, banks wanted to be innovative and they didn’t address necessarily to their clients’ needs. Once the…
04
Sep
2009

Using GIS to Overcome Non-Traditional Security (NTS) Threats and Challenges

Communications of the IBIMA
Non-traditional security, often abbreviated as NTS, is a popular but rather ambiguous concept within and outside academic circles. The NTS threats and challenges are always referred to in the context of human security to focus on the security of individuals, societies and groups, which includes…
02
Sep
2009

Information Systems and Trust: Issues for Live Cultural Performances

Communications of the IBIMA
The aim of our research is to understand how the introduction of Information Systems in Cultural Organizations of Live Performances (COLP), influences : 1) the establishment of trust with the (non) spectators, an essential condition for positive attitudes toward the institution, 2) an increased trust…
01
Sep
2009

Critical Factors for Successful KM Initiatives in Project Background

Communications of the IBIMA
This paper aims to analyze different influencing factors to knowledge management initiatives in the project companies. It presents a model of critical factors, which have deep concerns for failure or success of knowledge management initiatives in projects. Based on literature and the survey-based research results,…
31
Aug
2009

A Business Intelligence Model for SMEs Based on Tacit Knowledge

Communications of the IBIMA
This paper proposes a specific model of business intelligence in relation with SMEs practices, culture and competitive environment. This model is based on the mobilization of corporate tacit knowledge and informal information, aiming at interpreting anticipatory environmental information and assist strategic decision making. An empirical…
29
Aug
2009

Evolutionary paths of R&D Internationalization: The Case of Taiwanese Transnational Corporations

Communications of the IBIMA
Based on data from 75 of the top 1000 Taiwanese manufacturers, we examine how these firms establish their overseas R&D centers and connect with global innovation networks over time by conducting both data searching and in-depth interviews. We categorize four paths of internationalizing R&D for…
27
Aug
2009

The Impact of Technology Development on Youth Consumption Culture: An Empirical Investigation of French Teenage’ Use of Mobile Phone Device

Communications of the IBIMA
The importance of the symbolic properties of goods has been explored among adult consumers, but there have been less attention given to the symbolic consumption of young people. This study explores the subject of symbolic consumption with specific reference to mobile phone devices in the…