7 research outputs found
Cyber Security’s Influence on Modern Society
The world of cyber security is evolving every day, and cyber-criminals are trying to take advantage of it to gain as much money and power as possible. As the Internet continues to grow, more people around the world join the Internet. The purpose of this is to see how much of an importance cyber security has and how cyber-criminals are able to utilize the cyberworld for their own personal gain. Research has been done on how the cyberworld got where it is today. Additionally, individual research has been done in an effort to learn how to hack. A hack lab has been created and a study has been done to see if it is possible to hack into a cell phone within one month without obtaining any knowledge prior to the start of the study
Multivariate Ewma Models and Monitoring Health Surveillance during a Pandemic
We examine a common problem is biological analytics and surveillance in health care. These methods can improve greatly the process of monitoring health data to assess changes in the likelihood of Pandemics and disease incidence in a world where medical knowledge is still largely in an embryonic period. Based on an illustration, we suggest that multivariate exponential moving-average (MEWMA) control charts are suitable in many cases where detection and inspection of several or more variables over a lengthy period of testing provide for the best analysis of data leading to pre-Âdiagnostic and diagnostic therapy. Though these methods came from the control of quality and continuous improvement in lean manufacturing and service operations, these methods are useful if not a vital application in the analysis of health care and therapeutic data. The indications from this study corroborate earlier findings by others that MEWMA methods fit the diagnostic activity under study. Unfortunately Pandemic Analysis is using oversimplified techniques in analyzing data secure by diagnostic tests which can easily be improved especially in the use modern day analytics based on quality control methods used in other disciplines
The Multivariate EWMA Model and Health Care Monitoring
We introduce the construction of MEWMA (Multivariate exponentially weighted movingaverage) process control in the field of bio surveillance. Such introduction will both improve the reliability of data collected in bio surveillance, better interpretation of the results,improvement in the quality of results and standardization of results when more than two variables are involved. We propose sensitivity ratios as a measure of the effects of the mean shift and dispersion shift in processes under study. Using these sensitivity measures, we designed the optimal exponential weighting factor, which is consistent to results reported in control chart applications. Although ARL (average run length) is the usual measure for control chart performance in multivariate process control, it is by no means the only criterion, however, at the moment it is most widely used criterion for decision making. We suggest addition study of other criteria. For example Medial Run Length, Days to Completion, Direction of Eorrors and others
The United States Marine Corps Data Collaboration Requirements: Retrieving and Integrating Data From Multiple Databases
The goal of this research is to develop an information sharing and database integration model and suggest a framework to fully satisfy the United States Marine Corps collaboration requirements as well as its information sharing and database integration needs. This research is exploratory; it focuses on only one initiative: the IT-21 initiative. The IT-21 initiative dictates The Technology for the United States Navy and Marine Corps, 2000-2035: Becoming a 21st Century Force. The IT-21 initiative states that Navy and Marine Corps information infrastructure will be based largely on commercial systems and services, and the Department of the Navy must ensure that these systems are seamlessly integrated and that information transported over the infrastructure is protected and secure. The Delphi Technique, a qualitative method approach, was used to develop a Holistic Model and to suggest a framework for information sharing and database integration. Data was primarily collected from mid-level to senior information officers, with a focus on Chief Information Officers. In addition, an extensive literature review was conducted to gain insight about known similarities and differences in Strategic Information Management, information sharing strategies, and database integration strategies. It is hoped that the Armed Forces and the Department of Defense will benefit from future development of the information sharing and database integration Holistic Model
Recommended from our members
Cyber security information sharing in the United States : an empirical study including risk management and control implications, 2000-2003
A tremendous amount of change in traditional business paradigms has occurred over the past decade through the development of Electronic Commerce and ad\ ancements in the field of Information Technology. As lesser-developed countries progress and become more prosperous. traditional . first world' countries have migrated to become strong service oriented economies (Asch, 200 I). Supporting technologies have developed over the past decade which has exploited the benefits of the Internet and other infonnation technologies. While Electronic Commerce continues to grow there is a corresponding impact on computer software and individual privacy (Ghosh and Swaminatha, 200 I). Recently. the U.S. National Institute of Standards and Technology (NIST) found that software bugs cost the U.S. economy approximately $59.5 billion, or .600/0 of the annual Gross Domestic Product (U.S. Department of Commerce, 2003). In addition, we have witnessed a rise in the strength and impact of Denial of Service and other types of computer attacks such as: viruses. trojans. exploit scripts and probes/scans. Popular industry surveys such as the annual Federal Bureau of Investigation/Computer Security Institute (Gordon. Et. AI.. 2006) confirm the growing threats in the Information Assurance field. In addition to these concerns our increased reliance on the Internet enabled systems (loudon and loudon. 2000). E-Commerce systems and Information Technologies an integrated suite of risks which must be managed effectively across the public and private sectors (Backhouse. Et. AI. 2005. Ghosh and Swamintha. 200 I. Parker. 200 I. Graf. 1995. Greenberg and Goldman, 1995). Previous research (Rumizen, 1998. Haver, 1998, Roulier, 1998) examined InterOrganisational, Web Infonnation Systems and Government Information Systems in order to assess how companies and other organisations can effectively design these information systems such that maximum benefits can be achieved for all participating organisations. Furthermore, Davenport, Harris and Delong (2001) and Davenport (1999) explained that collaboration is central to the results of a knowledge management system in which open, nonpolitical, non-competitive entities are involved in environments to achieve optimal individual and collective results. Before this memorable event. some related programmatic initiatives were already in-process at that time. The United States government built upon its active leadership in the areas of computer security and information assurance when it launched a number of important efforts to manage information security threats. This was clearly evident when President Clinton made the U.S. National Infrastructure (Nil) a major national priority in the 1 990s. One critical development occurred in 1998 when the National Infrastructure Protection Centre was established to be the central point for gathering, analysing and disseminating critical cyber security information and built upon the previous success of the national Computer Emergency Response Team (CERT). Earlier research (Rich. 2001, Soo Hoo, 2000. Howard. 1997 and Landwher, 1994) addressed various aspects of information security information and incident reporting. Also. Vatis 0001) addressed some research considerations in this area while investigating foreign network centric and traditional warfare events primarily through Denial of Service and Web Site Defacement attacks. However. areas for new exploration existed especially as they related to U.S. critical infrastructure protection (Karestand. 2003. Vatis. 200 I. U.S. General Accounting Office. 2000. Alexander and Swetham. 19(9). Finally. Information and Network Centric Warfare (Arens and Rosenbloom. 2003. Davies. 2000. Denning and Baugh. 2000. and Schwartau. 1997) are increasing national security issues in the \\' ar on Terrorism and Homeland Security in general