Abstract. The impact of Information and Communication Technology (ICT) on economic growth and development has nowadays proven to be significant for almost all national economies. In this paper, a quantitative analysis of the impact of ICT on Croatian economic growth is performed using the input-output (IO) method. The direct and indirect effects of ICT sectors are analysed. Subsequently, simple output multipliers and simple value added multipliers are then calculated. The results indicate that there are no significant differences between the ICT multipliers for the Croatian economy in 2010 and multipliers of other sectors. The largest values of multipliers of all ICT sectors are attributed to the one of ICT service sector. Moreover, significant changes were also not observed when comparing ICT multipliers for the Croatian economy in 2004 and 2010. In addition to Croatia, multiplier analysis of ICT sectors was conducted for the group of new and long-standing European Union member states. The conclusion is that, in new member states, the implementation and usage of ICT has a lower contribution to economic growth and development.
The issue of information systems security, and thus information as key resource in today's information society, is something that all organizations in all sectors face in one way or another. To ensure that information remain secure, many organizations have implemented a continuous, structured and systematic security approach to manage and protect an organization's information from undermining individuals by establishing security policies, processes, procedures, and information security organizational structures. However, despite this, security threats, incidents, vulnerabilities and risks are still raging in many organizations. One of the main causes of this problem is poor understanding of information systems security key success factors. Identifying and understanding of information security key success factors can help organizations to manage how to focus limited resources on those elements that really impact on success, therefore saving time and money and creating added value and further enabling operational business. This research, based on comprehensive literature review, summarizes most cited key success factors of information systems security identified in scientific articles indexed in relevant databases, of which the top three success factors were management support, information security policy and information security education, training and awareness. At the end, article states identified research gaps and provides readers with possible directions for further researches. those from the organizational or sociological aspect, since even the best security technology cannot stop the social engineering based attack [1]. One of the first and the foremost challenges faced by information security executives is to successfully balance the need to protect information assets on the one hand and enable operational operations on the other, because over-strict protection can lead to business performance barriers while loose controls can create unacceptable risks for information assets [3]. A modern view of information security requires that an effective information security strategy must be balanced, i.e. designing and implementing security solutions should emphasize the importance of technology, but also the socio-organizational context within the organization [3] and observe information security also as business and social question, not just technical [3], [2].National Institute of Standards and Technology (NIST) [4] defines information security as "the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability"; information systems security as "the protection of information systems against unauthorized access to or modification of information, whether in storage, processing, or transit, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats" and cyber security as "the ability to protect or defend...
Purpose -The purpose of the paper is to estimate of overall impact of foreign tourist demand on the Croatian output, gross value added and employment. Methodology -The direct, indirect and induced effects of the consumption of foreign tourists to the overall Croatian economy are based on input-output model. Open input-output model was used to calculate the direct and indirect effects of the expenditures of foreign tourists, while the closed input-output model was used to analyze induced effects. Findings -Expenditures of the foreign tourists in the recession period 2009-2014 significantly reduced the overall negative impact of recession. Decrease in gross value added and employment without increased competitiveness of Croatian tourism would be more significant and the level of Croatian real GDP would be even lower than recorded. Besides hotel and restaurant sector, indirect and induced impact of foreign tourist demand is significant for food production, personal services and trade. Originality of the research -The originality and the contribution of the paper is methodological development of model which measure relation of tourist demand and overall macroeconomic performance of an economy. The empirical contribution is calculation of direct, indirect and induced effects of foreign tourists expenditures based on the updated input-output coefficients. The results could be of interest for academic and general public because they provide overall assessment of contribution of tourism industry in Croatia based on the sound methodological framework.
Information and communication technologies (ICT) play an important role in the development of knowledge societies which, on the whole, constitute priority for governments worldwide. For a long time, measurement of unequal access to exploiting the potential of ICT used to be based on the digital divide concept. However, due to a strong relationship between ICT use and social inclusion/exclusion confirmed in current research, this concept has lately become inadequate. Such a complex issue also requires a much more complex approach, which explains why the concept of e-inclusion is more adequate. Insufficient operationalization of the e-inclusion concept, which implies an insufficient number of identified indicators as well as the quantity of collected data, represents a major problem in the existing research on e-inclusion. A multiperspective, multimethodological and multidimensional approach is therefore proposed to overcome this problem.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.