48,775 research outputs found

    Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues

    Full text link
    Improved interoperability between public and private organizations is of key significance to make digital government newest triumphant. Digital Government interoperability, information sharing protocol and security are measured the key issue for achieving a refined stage of digital government. Flawless interoperability is essential to share the information between diverse and merely dispersed organisations in several network environments by using computer based tools. Digital government must ensure security for its information systems, including computers and networks for providing better service to the citizens. Governments around the world are increasingly revolving to information sharing and integration for solving problems in programs and policy areas. Evils of global worry such as syndrome discovery and manage, terror campaign, immigration and border control, prohibited drug trafficking, and more demand information sharing, harmonization and cooperation amid government agencies within a country and across national borders. A number of daunting challenges survive to the progress of an efficient information sharing protocol. A secure and trusted information-sharing protocol is required to enable users to interact and share information easily and perfectly across many diverse networks and databases globally.Comment: 20 page

    Model the System from Adversary Viewpoint: Threats Identification and Modeling

    Full text link
    Security attacks are hard to understand, often expressed with unfriendly and limited details, making it difficult for security experts and for security analysts to create intelligible security specifications. For instance, to explain Why (attack objective), What (i.e., system assets, goals, etc.), and How (attack method), adversary achieved his attack goals. We introduce in this paper a security attack meta-model for our SysML-Sec framework, developed to improve the threat identification and modeling through the explicit representation of security concerns with knowledge representation techniques. Our proposed meta-model enables the specification of these concerns through ontological concepts which define the semantics of the security artifacts and introduced using SysML-Sec diagrams. This meta-model also enables representing the relationships that tie several such concepts together. This representation is then used for reasoning about the knowledge introduced by system designers as well as security experts through the graphical environment of the SysML-Sec framework.Comment: In Proceedings AIDP 2014, arXiv:1410.322

    Improving sustainability through intelligent cargo and adaptive decision making

    Get PDF
    In the current society, logistics is faced with the challenge to meet more stringent sustainability goals. Shippers and transport service providers both aim to reduce the carbon footprint of their logistic operations. To do so, optimal use of logistics resources and physical infrastructure should be aimed for. An adaptive decision making process for the selection of a specific transport modality, transport provider and timeslot (aimed at minimisation of the carbon footprint) enables shippers to achieve this. This requires shippers to have access to up-to-date capacity information from transport providers (e.g. current and scheduled loading status of the various transport means and information on carbon footprint) and traffic information (e.g. city logistics and current traffic information). A prerequisite is an adequate infrastructure for collaboration and open exchange of information between the various stakeholders in the logistics value chain to obtain the up-to-date information. This paper gives a view on how such an advanced information infrastructure can be realised, currently being developed within the EU iCargo project. The paper describes a reference logistics value chain, including business benefits for each of the roles in the logistics value chain of aiming for sustainability. A case analysis is presented that reflects a practical situation in which the various roles collaborate and exchange information for realizing sustainability goals, using adaptive decision making for selecting a transport modality, transport provider, and timeslot. A high-level overview is provided of the requirements on and technical implementation of the supporting advanced infrastructure for collaboration and open information exchange.In the current society, logistics is faced with the challenge to meet more stringent sustainability goals. Shippers and transport service providers both aim to reduce the carbon footprint of their logistic operations. To do so, optimal use of logistics resources and physical infrastructure should be aimed for. An adaptive decision making process for the selection of a specific transport modality, transport provider and timeslot (aimed at minimisation of the carbon footprint) enables shippers to achieve this. This requires shippers to have access to up-to-date capacity information from transport providers (e.g. current and scheduled loading status of the various transport means and information on carbon footprint) and traffic information (e.g. city logistics and current traffic information). A prerequisite is an adequate infrastructure for collaboration and open exchange of information between the various stakeholders in the logistics value chain to obtain the up-to-date information. This paper gives a view on how such an advanced information infrastructure can be realised, currently being developed within the EU iCargo project. The paper describes a reference logistics value chain, including business benefits for each of the roles in the logistics value chain of aiming for sustainability. A case analysis is presented that reflects a practical situation in which the various roles collaborate and exchange information for realizing sustainability goals, using adaptive decision making for selecting a transport modality, transport provider, and timeslot. A high-level overview is provided of the requirements on and technical implementation of the supporting advanced infrastructure for collaboration and open information exchange.In the current society, logistics is faced with the challenge to meet more stringent sustainability goals. Shippers and transport service providers both aim to reduce the carbon footprint of their logistic operations. To do so, optimal use of logistics resources and physical infrastructure should be aimed for. An adaptive decision making process for the selection of a specific transport modality, transport provider and timeslot (aimed at minimisation of the carbon footprint) enables shippers to achieve this. This requires shippers to have access to up-to-date capacity information from transport providers (e.g. current and scheduled loading status of the various transport means and information on carbon footprint) and traffic information (e.g. city logistics and current traffic information). A prerequisite is an adequate infrastructure for collaboration and open exchange of information between the various stakeholders in the logistics value chain to obtain the up-to-date information. This paper gives a view on how such an advanced information infrastructure can be realised, currently being developed within the EU iCargo project. The paper describes a reference logistics value chain, including business benefits for each of the roles in the logistics value chain of aiming for sustainability. A case analysis is presented that reflects a practical situation in which the various roles collaborate and exchange information for realizing sustainability goals, using adaptive decision making for selecting a transport modality, transport provider, and timeslot. A high-level overview is provided of the requirements on and technical implementation of the supporting advanced infrastructure for collaboration and open information exchange

    Designing a novel virtual collaborative environment to support collaboration in design review meetings

    Get PDF
    Project review meetings are part of the project management process and are organised to assess progress and resolve any design conflicts to avoid delays in construction. One of the key challenges during a project review meeting is to bring the stakeholders together and use this time effectively to address design issues as quickly as possible. At present, current technology solutions based on BIM or CAD are information-centric and do not allow project teams to collectively explore the design from a range of perspectives and brainstorm ideas when design conflicts are encountered. This paper presents a system architecture that can be used to support multi-functional team collaboration more effectively during such design review meetings. The proposed architecture illustrates how information-centric BIM or CAD systems can be made human- and team-centric to enhance team communication and problem solving. An implementation of the proposed system architecture has been tested for its utility, likability and usefulness during design review meetings. The evaluation results suggest that the collaboration platform has the potential to enhance collaboration among multi-functional teams

    Rethinking De-Perimeterisation: Problem Analysis And Solutions

    Get PDF
    For businesses, the traditional security approach is the hard-shell model: an organisation secures all its assets using a fixed security border, trusting the inside, and distrusting the outside. However, as technologies and business processes change, this model looses its attractiveness. In a networked world, “inside” and “outside” can no longer be clearly distinguished. The Jericho Forum - an industry consortium part of the Open Group – coined this process deperimeterisation and suggested an approach aimed at securing data rather than complete systems and infrastructures. We do not question the reality of de-perimeterisation; however, we believe that the existing analysis of the exact problem, as well as the usefulness of the proposed solutions have fallen short: first, there is no linear process of blurring boundaries, in which security mechanisms are placed at lower and lower levels, until they only surround data. To the contrary, we experience a cyclic process of connecting and disconnecting of systems. As conditions change, the basic trade-off between accountability and business opportunities is made (and should be made) every time again. Apart from that, data level security has several limitations to start with, and there is a big potential for solving security problems differently: by rearranging the responsibilities between businesses and individuals. The results of this analysis can be useful for security professionals who need to trade off different security mechanisms for their organisations and their information systems

    Why do People Adopt, or Reject, Smartphone Security Tools?

    Get PDF
    A large variety of security tools exist for Smartphones, to help their owners to secure the phones and prevent unauthorised others from accessing their data and services. These range from screen locks to antivirus software to password managers. Yet many Smartphone owners do not use these tools despite their being free and easy to use. We were interested in exploring this apparent anomaly. A number of researchers have applied existing models of behaviour from other disciplines to try to understand these kinds of behaviours in a security context, and a great deal of research has examined adoption of screen locking mechanisms. We review the proposed models and consider how they might fail to describe adoption behaviours. We then present the Integrated Model of Behaviour Prediction (IMBP), a richer model than the ones tested thus far. We consider the kinds of factors that could be incorporated into this model in order to understand Smartphone owner adoption, or rejection, of security tools. The model seems promising, based on existing literature, and we plan to test its efficacy in future studies

    Measurement and reporting of climate-smart agriculture: technical guidance for a countrycentric process

    Get PDF
    Given the extent of climate-smart agriculture (CSA) initiatives at project, national, regional and global levels, there is increasing interest in tracking progress in implementing CSA at national level. CSA is also expected to contribute to higher-level goals (e.g., the Paris Agreement, Africa Union’s Vision 25x25, and the Sustainable Development Goals [SDGs], etc.). Measurement and reporting of climate-smart agriculture (MR of CSA) provides intelligence on necessary the status, effectiveness, efficiency and impacts of interventions, which is critical for meeting stakeholders’ diverse management and reporting needs. In this paper, we build the case for a stakeholder-driven, country-centric framework for MR of CSA, which aims to increase coordination and coherence across stakeholders’ MR activities, while also aligning national reporting with reporting on international commitments. We present practical guidance on how to develop an integrated MR framework, drawing on findings from a multi-country assessment of needs, opportunities and capacities for national MR of CSA. The content of a unified MR framework is determined by stakeholders’ activities (how they promote CSA), needs (why MR is useful to them) and current capacities to conduct periodic monitoring, evaluation and reporting (how ready are institutions, staff and finances). Our analysis found that explicit demand for integration of data systems and active engagement of stakeholders throughout the entire process are key ingredients for building a MR system that is relevant, useful and acted upon. Based on these lessons, we identify a seven-step framework for stakeholders to develop a comprehensive information system for MR of progress in implementing CSA
    • 

    corecore