31,726 research outputs found

    Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE

    Full text link
    As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are concerned. Security experts, however, must still be able to acquire and analyze data in a methodical, rigorous and forensically sound manner. This work applies the STRIDE asset-based risk assessment method to cloud computing infrastructure for the purpose of identifying and assessing an organization's ability to respond to and investigate breaches in cloud computing environments. An extension to the STRIDE risk assessment model is proposed to help organizations quickly respond to incidents while ensuring acquisition and integrity of the largest amount of digital evidence possible. Further, the proposed model allows organizations to assess the needs and capacity of their incident responders before an incident occurs.Comment: 13 pages, 3 figures, 3 tables, 5th International Conference on Digital Forensics and Cyber Crime; Digital Forensics and Cyber Crime, pp. 223-236, 201

    Identifying higher capability maturity KPAs of construction organisations; Model refinement through expert interviews

    Get PDF
    Process improvement has been identified as a mechanism of achieving the much needed performance improvements within the construction industry. Despite the concerns of being an industry with unique characteristics, construction has borrowed some process improvement principles from other industries such as software. However, while process capability maturity has been identified as an important aspect of process improvements in many disciplines construction shows a clear research gap in that area. Among the few capability maturity based process improvement initiatives within the construction industry, there is a clear necessity to investigate what are the higher capability maturity level dynamics of construction process improvements. Addressing this requirement, this paper discusses a model to identify construction higher capability maturity

    Measuring Software Process: A Systematic Mapping Study

    Get PDF
    Context: Measurement is essential to reach predictable performance and high capability processes. It provides support for better understanding, evaluation, management, and control of the development process and project, as well as the resulting product. It also enables organizations to improve and predict its process’s performance, which places organizations in better positions to make appropriate decisions. Objective: This study aims to understand the measurement of the software development process, to identify studies, create a classification scheme based on the identified studies, and then to map such studies into the scheme to answer the research questions. Method: Systematic mapping is the selected research methodology for this study. Results: A total of 462 studies are included and classified into four topics with respect to their focus and into three groups based on the publishing date. Five abstractions and 64 attributes were identified, 25 methods/models and 17 contexts were distinguished. Conclusion: capability and performance were the most measured process attributes, while effort and performance were the most measured project attributes. Goal Question Metric and Capability Maturity Model Integration were the main methods and models used in the studies, whereas agile/lean development and small/medium-size enterprise were the most frequently identified research contexts.Ministerio de Economía y Competitividad TIN2013-46928-C3-3-RMinisterio de Economía y Competitividad TIN2016-76956-C3-2- RMinisterio de Economía y Competitividad TIN2015-71938-RED

    The new EFQM model: What is really new and could be considered as a suitable tool with respect to Quality 4.0 concept?

    Get PDF
    Purpose: The paper offers a set of original information based on critical analysis of description two last versions of excellence models presented by the European Organisation for Quality Management (EFQM). The principle goal is to present the main advantages and weaknesses of the latest version of The EFQM Model, especially from a practical point of view with respect to a Quality 4.0 era. Methodology/Approach: Comparative analysis of two relevant documents (EFQM, 2012; EFQM, 2019a) was used as a key method. Discussions with 18 quality professionals from Czech production organisations served as a complementary approach. Findings: The basic structure of a new model was completely changed. But the description of certain recommendations by way of guidance points are superficial and confusing. It lays stress on the necessity to transform organisations for the future as well as on comprehensive feedback from key stakeholders. Research Limitation/implication: The latest version of The EFQM Model was published in November 2019, and general knowledge related to this version is naturally limited. Published studies or publicly available experience completely absent. That is why a more in-depth literature review focused on the latest version of The EFQM Model could not be included in this text. Originality/Value of paper: The paper brings an original set of information that was not published yet before. The value of this set should be examined not only from theoretical but primarily from a practical viewpoint.Web of Science241281

    Intelligent student engagement management : applying business intelligence in higher education

    Get PDF
    Advances in emerging ICT have enabled organisations to develop innovative ways to intelligently collect data that may not be possible before. However, this leads to the explosion of data and unprecedented challenges in making strategic and effective use of available data. This research-in-progress paper presents an action research focusing on applying business intelligence (BI) in a UK higher education institution that has developed a student engagement tracking system (SES) for student engagement management. The current system serves merely as a data collection and processing system, which needs significant enhancement for better decision support. This action research aims to enhance the current SETS with BI solutions and explore its strategic use. The research attempts to follow socio-technical approach in its effort to make the BI application a success. Progress and experience so far has revealed interesting findings on advancing our understanding and research in organisation-wide BI for better decision-making

    Cyber security investigation for Raspberry Pi devices

    Get PDF
    Big Data on Cloud application is growing rapidly. When the cloud is attacked, the investigation relies on digital forensics evidence. This paper proposed the data collection via Raspberry Pi devices, in a healthcare situation. The significance of this work is that could be expanded into a digital device array that takes big data security issues into account. There are many potential impacts in health area. The field of Digital Forensics Science has been tagged as a reactive science by some who believe research and study in the field often arise as a result of the need to respond to event which brought about the needs for investigation; this work was carried as a proactive research that will add knowledge to the field of Digital Forensic Science. The Raspberry Pi is a cost-effective, pocket sized computer that has gained global recognition since its development in 2008; with the wide spread usage of the device for different computing purposes. Raspberry Pi can potentially be a cyber security device, which can relate with forensics investigation in the near future. This work has used a systematic approach to study the structure and operation of the device and has established security issues that the widespread usage of the device can pose, such as health or smart city. Furthermore, its evidential information applied in security will be useful in the event that the device becomes a subject of digital forensic investigation in the foreseeable future. In healthcare system, PII (personal identifiable information) is a very important issue. When Raspberry Pi plays a processor role, its security is vital; consequently, digital forensics investigation on the Raspberry Pies becomes necessary

    Design for safety: theoretical framework of the safety aspect of BIM system to determine the safety index

    Get PDF
    Despite the safety improvement drive that has been implemented in the construction industry in Singapore for many years, the industry continues to report the highest number of workplace fatalities, compared to other industries. The purpose of this paper is to discuss the theoretical framework of the safety aspect of a proposed BIM System to determine a Safety Index. An online questionnaire survey was conducted to ascertain the current workplace safety and health situation in the construction industry and explore how BIM can be used to improve safety performance in the industry. A safety hazard library was developed based on the main contributors to fatal accidents in the construction industry, determined from the formal records and existing literature, and a series of discussions with representatives from the Workplace Safety and Health Institute (WSH Institute) in Singapore. The results from the survey suggested that the majority of the firms have implemented the necessary policies, programmes and procedures on Workplace Safety and Health (WSH) practices. However, BIM is still not widely applied or explored beyond the mandatory requirement that building plans should be submitted to the authorities for approval in BIM format. This paper presents a discussion of the safety aspect of the Intelligent Productivity and Safety System (IPASS) developed in the study. IPASS is an intelligent system incorporating the buildable design concept, theory on the detection, prevention and control of hazards, and the Construction Safety Audit Scoring System (ConSASS). The system is based on the premise that safety should be considered at the design stage, and BIM can be an effective tool to facilitate the efforts to enhance safety performance. IPASS allows users to analyse and monitor key aspects of the safety performance of the project before the project starts and as the project progresses

    The potential of additive manufacturing in the smart factory industrial 4.0: A review

    Get PDF
    Additive manufacturing (AM) or three-dimensional (3D) printing has introduced a novel production method in design, manufacturing, and distribution to end-users. This technology has provided great freedom in design for creating complex components, highly customizable products, and efficient waste minimization. The last industrial revolution, namely industry 4.0, employs the integration of smart manufacturing systems and developed information technologies. Accordingly, AM plays a principal role in industry 4.0 thanks to numerous benefits, such as time and material saving, rapid prototyping, high efficiency, and decentralized production methods. This review paper is to organize a comprehensive study on AM technology and present the latest achievements and industrial applications. Besides that, this paper investigates the sustainability dimensions of the AM process and the added values in economic, social, and environment sections. Finally, the paper concludes by pointing out the future trend of AM in technology, applications, and materials aspects that have the potential to come up with new ideas for the future of AM explorations
    corecore