196,904 research outputs found
Toward optimal multi-objective models of network security: Survey
Information security is an important aspect of a successful business today. However, financial difficulties and budget cuts create a problem of selecting appropriate security measures and keeping networked systems up and running. Economic models proposed in the literature do not address the challenging problem of security countermeasure selection. We have made a classification of security models, which can be used to harden a system in a cost effective manner based on the methodologies used. In addition, we have specified the challenges of the simplified risk assessment approaches used in the economic models and have made recommendations how the challenges can be addressed in order to support decision makers
Aligning a Service Provisioning Model of a Service-Oriented System with the ITIL v.3 Life Cycle
Bringing together the ICT and the business layer of a service-oriented system
(SoS) remains a great challenge. Few papers tackle the management of SoS from
the business and organizational point of view. One solution is to use the
well-known ITIL v.3 framework. The latter enables to transform the organization
into a service-oriented organizational which focuses on the value provided to
the service customers. In this paper, we align the steps of the service
provisioning model with the ITIL v.3 processes. The alignment proposed should
help organizations and IT teams to integrate their ICT layer, represented by
the SoS, and their business layer, represented by ITIL v.3. One main advantage
of this combined use of ITIL and a SoS is the full service orientation of the
company.Comment: This document is the technical work of a conference paper submitted
to the International Conference on Exploring Service Science 1.5 (IESS 2015
Towards optimal multi-objective models of network security: survey
Information security is an important aspect of a successful business today. However, financial difficulties and budget cuts create a problem of selecting appropriate security measures and keeping networked systems up and running. Economic models proposed in the literature do not address the challenging problem of security countermeasure selection. We have made a classification of security models, which can be used to harden a system in a cost effective manner based on the methodologies used. In addition, we have specified the challenges of the simplified risk assessment approaches used in the economic models and have made recommendations how the challenges can be addressed in order to support decision makers
Recommended from our members
Theorizing Risk and Research: Methodological Constraints and Their Consequences
Conflict, postconflict settings, and other risky research sites are important with wide-ranging policy implications. Microlevel, field-based research lends critical insights to how conflicts work and the mechanisms behind macrolevel correlations that underpin quantitative political science. This article identifies how the risks associated with conflict and postconflict contexts influence researchersâ choices by theorizing the existence of distinct adaptive strategies. Specifically, researchers facing elevated risk generally manage it through three main strategies: outsourcing risk, avoiding risk, and internalizing risk. We argue that these strategies systematically shape and circumscribe outputs. We conclude by discussing how the relationship between risky fieldwork and what we know about conflict is poorly acknowledged. Thinking about how we manage risk should play a larger role in both our preparation for and interpretation of research, particularly in conflict and postconflict contexts
Semantics for incident identification and resolution reports
In order to achieve a safe and systematic treatment of security protocols, organizations release a number of technical
briefings describing how to detect and manage security incidents. A critical issue is that this document set may suffer from
semantic deficiencies, mainly due to ambiguity or different granularity levels of description and analysis. An approach to
face this problem is the use of semantic methodologies in order to provide better Knowledge Externalization from incident
protocols management. In this article, we propose a method based on semantic techniques for both, analyzing and specifying
(meta)security requirements on protocols used for solving security incidents. This would allow specialist getting better
documentation on their intangible knowledge about them.Ministerio de EconomĂa y Competitividad TIN2013-41086-
Developing a Framework for Creating mHealth Surveys
Various issues in the design of surveys for mobile health (mHealth) research projects yet exist. As mHealth solutions become more popular, new issues are brought into consideration. Researchers need to collect some critical information from participants in these mHealth studies. These mHealth studies require a specialized framework to create surveys, track progress and analyze user data. In these procedures, mHealthâs needs differ from other studies. Therefore, there has to be a new framework that satisfies needs of mHealth research studies. Although there are studies for creating efficient, robust and user-friendly surveys, there is no solution or study, which is specialized in mHealth area and solves specific problems of mHealth research studies. mHealth research studies sometimes require real-time access to user data. Reward systems may play a key role in their study. Most importantly, storing user information securely plays a key role in these studies. There is no such solution or study, which covers all these areas. In this thesis, we present guidelines for developing a framework for creating mHealth surveys. In doing this, we hope that we propose a solution for problems of creating and using of surveys in mHealth studies
- âŠ