TENDENCIES AND CHARACTERISTICS OF THE LEVEL OF DEVELOPMENT OF BUSINESS TOURISM IN DESTINATION OPATIJA
Business tourism has attracted huge attention all over the world and is certainly considered one of the new and invaluable segments in the large family of tourism. This specific form of tourism is, with minor oscillations, a constantly growing segment of the tourist offer and demand and is in a constant process of innovation, creative movemen...
By Rudančić Andreja
LOGISTIC CHAINS IN PORT TRANSPORT
Globalization and significant containerization growth have changed maritime transport and logistics chains, making ports an integral part of complex supply chains and serving as logistics hubs, adding value, connecting flows and influencing supply chain forms and processes. The competitiveness of a port is determined by its own strengths such...
By Ana Radulović, Marija Bukilica
RESEARCH OF TOURIST MARKET EXAMPLE “MONTENEGRO” TOURIST BRAND DESTINATION
Destination brand is the name, symbol, logo or other graphics which makes certain destination recognized. Brand is also a promise of unforgettable and unique travel experience which is brought in relation to that destination. It brings together all enjoyable moments of visiting certain destination. Branding of tourist destination should be ma...
By Luka B. Uskoković
MONITORING THE PROTECTION OF CHILDREN'S HUMAN RIGHTS IN BIH
The main intention of the work is to create an appropriate process for monitoring the human rights of children and a system for improving the perception of the problems faced by children in Bosnia and Herzegovina, especially in cases of violation of the Convention on the Rights of the Child. Although Bosnia and Herzegovina has made progress i...
By Jelena Latinović
CUSTOMS UNION IN COMPARATIVE PRACTICE
In the context of historical, economic and contemporary international legal sources, it is revealed that the elements covered by the concept of customs union differ. As a consequence of the conceptual diversity and legal flexibility of the laws of the World Trade Organization - WTO, in practice there is a great diversity of customs union desi...
By Jelena Latinović, Mrđan Čolović
CIVIL PROTECTION AS A SEGMENT OF SECURITY IN LOCAL COMMUNITY
A man, individualy or as a part of society, in the past faced different dangers and threats to his personal safety and safety of his property. Until the mid of the 20th century the greatest danger to states, men, material and cultural assets was war. After the development of science, technique and biggertrafficing of goods and services, devel...
By Dražen Erkić
INTERNATIONAL PRIMARY AND CRIMINOGENIC ASPECTS OF THE MIGRATORY CRISIS IN BOSNIA AND HERZEGOVINA
Thousands of migrants from various Asian countries have been staying in Bosnia and Herzegovina for several years. Their movement to the desired destination stopped in Bosnia and Herzegovina due to the impossibility of entering the countries of the European Union. With their arrival, stay in Bosnia and Herzegovina, the migrant violates numerou...
By Mile Matijević, Ajna Jodanović
BLOCKCHAIN TECHNOLOGY CHOICE FOR THE IMPLEMENTATION OF THE SOFTWARE SOLUTION IN A SPECIFIC AREA OF SERVICES OR INDUSTRY
In the modern software industry, which is in constant expansion, the problem of trust between different users of the software solution is becoming increasingly dominant. End users want to be completely sure that the product or service is fully compliant with their requirements and that the quality does not deviate from the selected or ordered...
By Vladimir Milićević, Igor Franc, Andrija Đurić
METHODOLOGICAL BASIS OF DESIGNING, IMPLEMENTATION AND ADMINISTRATION IOT
Following text represents all methodological phases through which a single project of implementing an IT system should be taken through. A theme specifically is describing all methodological phases with practical examples during design, implementation and maintenance of the Internet of Things (IoT) system. Author's own work was used called &b...
By Alen Kamiš
CYBER ATTACK AND THREAT PROTECTION
This paper covers technologies needed for protection of an IT System. Cyber attacks are more frequent then ever and lots of attention should be given to protection from these attacks. This paper covers basis of protecting an IT system and data. In today's business a competitiveness is maintained mainly by high quality back-office processes an...
By Alen Kamiš