The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With thousands of alerts identified by IDSs every day, the process of distinguishing which alerts are important (i.e., true positives) and which are is irrelevant (i.e., false positives) is become more complicated. The security administrator must analyze each single alert either a true of false alert. This paper proposes an alert prioritization model, which is based on risk assessment. The model uses...
In a collaboration, trust is of great importance for the substantial governance of the inter-organizational activities. In this paper, considering changes of collaboration situations, an on-going trust model is established for a better understanding of the dynamics of relationship. Determinants of the on-going trust condition are also gathered and structured in two clusters. Those are ‘initial trust...
The internet becomes the major channel for the college students to receive information and public or share their opinions to the world wide without any limitation, which makes more tougher for the public opinion management in college students. This research concentrates on the characteristics of the public opinion management in the network environment and the status of the university public opinion...
In the current IT landscape, key challenges are to "un the business", "Outperform competition" & to expand the customer base to "Grow the business". This mandates an organization to constantly diversify the existing services provided and add new offerings. During such transformation initiatives, it is also imperative to ensure services are available 24/7 without interruption...
In Cloud Computing Resources are allocated to customers based on their requests and prioritization, but sometimes a non-cloud provider organization wants to share their spare resources to same customers through Cloud Brokers so in this type of system a heterogeneous environment is created between regular cloud providers, Non- cloud provider organization, cloud broker and customers. In this paper we...
This paper addresses 30 major challenges faced by reliability engineers and managers in their work. The paper's title reflects problems and approaches collectively developed by four long-time members of an engineering services company upon the occasion of its 30th anniversary. These challenges are common in the Reliability/Safety/Maintenance Engineering community but not everyone recognizes them as...
Nowadays there is a new awareness of the importance of continuous monitoring and controlling of organizational transactions, because their auditing in real time allows to determine the degree of reliability with which transactions are carried out, mitigating the organizational risk. This paper aims to contribute to a new vision of organizational auditing focused on assurance services in transactions...
Due to the rapid emergence of Information Technology, cloud computing provides assorted advantages to service providers, developers, organizations, and customers with respect to scalability, flexibility, cost-effectiveness, and availability. However, it also introduces new challenges and concerns, especially in terms of security and privacy. One of the major security obstacles to widespread adoption...
Chronic diseases are currently recognized as one of the leading causes of mortality and morbidity worldwide. On top of this, these diseases represent a major burden for the healthcare systems in terms of costs and resources, which is driving them to define and adopt novel programs for prevention and chronic disease management. Still, many aspects of the processes of care and follow up of these patients...
This paper attempts to classify the management control systems (MCS) model. By using a native instrument whose reliability and validity are tested empirically, the findings indicate that MCS include objective controls, action controls, outcome controls and cultural controls. This study provides a new theoretical basis for MCS to make adjustment to the new environment.
In this paper, physical speed event group was taken as the carrier, and AHP(Analytic Hierarchy Process) was adopted to determine the weight values in the four-level elements of the competition structure. Meanwhile, Kendall coefficient of concordance was used to exam the reliability of weight evaluation and Cronbach coefficients to make a consistent internal mathematical test of four-level elements...
In most of companies or organizations, logs play important role in information security. However, the common security mechanism only backup logs, it is not able to find out traces of intruders because the hacker who is able to intrudes the security mechanism of organization would try to alter logs or destroy important intrusion evidences making it impossible to preserve evidence using traditional...
Partially distributed teams (PDTs) are increasingly common in organizations as they collaborate across distance. A PDT has at least two collocated subteams that are geographically distant and communicate by electronic media. This paper reports on a two semester quasi-experimental study of students in global PDTs in the role of software developers designing an emergency management information system...
Work on the construction site is known to be inefficient due to workers spending much time waiting for materials, transporting materials and from frequent interruptions of tasks. Studies on the construction site typically use statistical measures to analyse the sampled data about work and such measures, while very useful, can overlook important features of the data. In this paper we apply a previously...
The establishment of competitive electricity markets worldwide, the deregulation of the electricity industry, and the response of the industry to the U.S. Energy Policy Act of 2005 have resulted in both very large and very small Balancing Authorities, greater operational complexities, and new reliability management needs at the wide-area level. Both the industry and government organizations responsible...
Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified...
An organizational level test strategy needs to incorporate metrics to make the testing activities visible and available to process improvements. The majority of testing measurements that are done are based on faults found in the test execution phase. In contrast, this paper investigates metrics to support software test planning and test design processes. We have assembled metrics in these two process...
The UNICORE grid system provides a seamless, secure and intuitive access to distributed grid resources. In recent years, UNICORE 5 is used as a well-tested grid middleware system in production grids (e.g. DEISA, D-Grid) and at many supercomputer centers world-wide. Beyond this production usage, UNICORE serves as a solid basis in many European and International research projects and business scenarios...
Accelerated by the rapid deployment of distributed systems and the Internet, online collaboration and information sharing are pervasive in enterprise computing environment. With regard to the requirements of online collaboration and information sharing, authentication information needs flexible manipulation to facilitate federation across trust domains. To achieve identity federation for federated...
ldquoDevelopment for advanced thermoelectric conversion systemsrdquo supported by the new energy and industrial technology development organization (NEDO) has been successfully completed as one of the Japanese national energy conservation projects. Three types of the cascaded thermoelectric modules operating up to 850 K in high electrode temperature and two types of Bi-Te thermoelectric modules operating...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.