28,516 research outputs found
A multifaceted evaluation of the reference model of information assurance & security
The evaluation of a conceptual model, which is an outcome of a qualitative research, is an arduous task due to the lack of a rigorous basis for evaluation. Overcoming this challenge, the paper at hand presents a detailed example of a multifaceted evaluation of a Reference Model of Information Assurance & Security (RMIAS), which summarises the knowledge acquired by the Information Assurance & Security community to date in one all-encompassing model. A combination of analytical and empirical evaluation methods is exploited to evaluate the RMIAS in a sustained way overcoming the limitations of separate methods. The RMIAS is analytically evaluated regarding the quality criteria of conceptual models and compared with existing models. Twenty-six semi-structured interviews with IAS experts are conducted to test the merit of the RMIAS. Three workshops and a case study are carried out to verify the practical value of the model. The paper discusses the evaluation methodology and evaluation results
Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph
Police SWAT teams and Military Special Forces face mounting pressure and
challenges from adversaries that can only be resolved by way of ever more
sophisticated inputs into tactical operations. Lethal Autonomy provides
constrained military/security forces with a viable option, but only if
implementation has got proper empirically supported foundations. Autonomous
weapon systems can be designed and developed to conduct ground, air and naval
operations. This monograph offers some insights into the challenges of
developing legal, reliable and ethical forms of autonomous weapons, that
address the gap between Police or Law Enforcement and Military operations that
is growing exponentially small. National adversaries are today in many
instances hybrid threats, that manifest criminal and military traits, these
often require deployment of hybrid-capability autonomous weapons imbued with
the capability to taken on both Military and/or Security objectives. The
Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of
Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that
required military response and police investigations against a fighting cell of
the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade
Sustainability and Food: a Text Analysis of the Scientific Literature
The paper analyses the evolution of the research debate related to sustainability and to the relation between food and sustainability. A number of text analysis techniques were combined for the investigation of scientific papers. The results stress how discourse analysis of sustainability in the pre-Rio period is mostly associated with agriculture and with a vision where the ecological and environmental aspects are dominant. In the post-Rio phase, the discussion about sustainability, though still strongly linked to environmental issues, enters a holistic dimension that includes social elements. The themes of energy and the sustainability of urban areas become central, and the scientific debate stresses the importance of indicators within an assessment approach linked to the relevance of planning and intervention aspects. The focus on the role of food within the debate on sustainability highlights a food security oriented approach in the pre-Rio phase, with a particular attention towards agriculture and third world Countries. In the post-Rio period, the focus of the analysis moves towards developed Countries. Even though food security remains a strongly significant element of the debate, the attention shifts towards consumers and food choices
“Unblackboxing” Decision Makers’ Interpretations of IS Certifications in the Context of Cloud Service Certifications
IS literature has predominantly taken a black box perspective on IS certifications and studied their diverse set of outcomes, such as signaling superior quality and increased customer trust. As a result, there is little understanding about the structure of certifications and its role in decision makers’ evaluations of certifications to achieve these outcomes. However, idiosyncrasies of novel IT services, such as cloud services, create a need for “unblackboxing” certifications and theorizing about their constituting structural building blocks and structural elements, as well as examining key features that might lead to a more favorable evaluation of a certification by decision makers. To advance theory building on certifications, this article develops an empirically grounded typology of certifications’ key structural building blocks and structural elements, and examines how they interpret substantive features within these elements. Using evidence from 20 interviews with decision makers from a wide range of industries in the context of cloud service certifications, we find that a decision maker’s aggregate evaluation of a certification is a function of their interpretations of its features guided by cognitive interpretive schemas along six key structural elements, contrasted with the decision makers’ expectations regarding the certification’s outcomes. This study contributes by conceptualizing the necessary and sufficient elements of certifications, constructing a nascent theory on decision makers’ evaluations of certifications, and illuminating the dynamics between certifications’ structural elements and outcomes as a coevolutionary process. We discuss implications for the certification literature and give managerial advice regarding the factors to consider when designing and evaluating certifications
Project benefit management: a conceptual framework of target benefit formulation
Successful realization of project benefits is strongly associated with organizational performance. Formulating project target benefits is regarded as the first and critical step in the benefit management process. In this study, we drew upon relevant theories and conducted in-depth interviews with senior managers in Australia to develop a conceptual framework of project target benefit formulation and corresponding propositions. Our findings highlight the important role of project target benefits in funding decision-making and suggest seven criteria for their appraisal (strategic fit, target value, measurability, realism, target date, accountability and comprehensiveness) and four constructs which improve the formulated target benefits (a formal benefit formulation process, senior executive leadership, senior executive supports, and public service motivation). These findings extend the current literature on project benefit management by providing a holistic view on how project target benefits should be formulated and appraised
LIFE3: A predictive costing tool for digital collections
Predicting the costs of long-term digital preservation is a crucial yet complex task for even the largest repositories and institutions. For smaller projects and individual researchers faced with preservation requirements, the problem is even more overwhelming, as they lack the accumulated experience of the former. Yet being able to estimate future preservation costs is vital to answering a range of important questions for each. The LIFE (Life Cycle Information for E-Literature) project, which has just completed its third phase, helps institutions and researchers address these concerns, reducing the financial and preservation risks, and allowing decision makers to assess a range of options in order to achieve effective preservation while operating within financial restraints. The project is a collaboration between University College London (UCL), The British Library and the Humanities Advanced Technology and Information Institute (HATII) at the University of Glasgow. Funding has been supplied in the UK by the Joint Information Systems Committee (JISC) and the Research Information Network (RIN)
- …