14,920 research outputs found

    Introducing realist ontology for the representation of adverse events

    Get PDF
    The goal of the REMINE project is to build a high performance prediction, detection and monitoring platform for managing Risks against Patient Safety (RAPS). Part of the work involves developing in ontology enabling computer-assisted RAPS decision support on the basis of the disease history of a patient as documented in a hospital information system. A requirement of the ontology is to contain a representation for what is commonly referred to by the term 'adverse event', one challenge being that distinct authoritative sources define this term in different and context-dependent ways. The presence of some common ground in all definitions is, however, obvious. Using the analytical principles underlying Basic Formal Ontology and Referent Tracking, both developed in the tradition of philosophical realism, we propose a formal representation of this common ground which combines a reference ontology consisting exclusively of representations of universals and an application ontology which consists representations of defined classes. We argue that what in most cases is referred to by means of the term 'adverse event' - when used generically - is a defined class rather than a universal. In favour of the conception of adverse events as forming a defined class are the arguments that (1) there is no definition for 'adverse event' that carves out a collection of particulars which constitutes the extension of a universal, and (2) the majority of definitions require adverse events to be (variably) the result of some observation, assessment or (absence of) expectation, thereby giving these entities a nominal or epistemological flavour

    Using Assurance Cases and Boolean Logic Driven Markov Processes to Formalise Cyber Security Concerns for Safety-Critical Interaction with Global Navigation Satellite Systems

    Get PDF
    Satellite-based location and timing systems support a wide range of mass market applications, typically using the GPS infrastructure. Until recently, these applications could not be used within safety-critical interfaces. Limits to the accuracy, availability, integrity and continuity of the space-based signals prevented regulatory agencies from certifying their use. Over the last three months, however, the latest generation of augmented Global Navigation Satellite Systems (GNSS) have been approved for use in safety-related applications. They use a range of techniques to overcome the limitations of previous infrastructures. This means that they can be used as primary navigation tools in a wide range of interactive systems, including aircraft cockpits, railway signalling tools etc. Unfortunately, a range of organisations including the UK Ministry of Defence, have raised concerns about our increasing vulnerability to attacks on these satellite based architectures. These threats are compounded by the difficulty of representing and reasoning about the impact of jamming, spoofing and insider threats for the end-users of safety-critical systems. A sudden loss of navigational support can undermine users confidence in complex applications and pose a significant threat to distributed situation awareness. We show how formal reasoning techniques can be used to identify the safety and security concerns that jeopardise interaction with future generations of Global Navigation Satellite Systems applications

    Critique of Architectures for Long-Term Digital Preservation

    Get PDF
    Evolving technology and fading human memory threaten the long-term intelligibility of many kinds of documents. Furthermore, some records are susceptible to improper alterations that make them untrustworthy. Trusted Digital Repositories (TDRs) and Trustworthy Digital Objects (TDOs) seem to be the only broadly applicable digital preservation methodologies proposed. We argue that the TDR approach has shortfalls as a method for long-term digital preservation of sensitive information. Comparison of TDR and TDO methodologies suggests differentiating near-term preservation measures from what is needed for the long term. TDO methodology addresses these needs, providing for making digital documents durably intelligible. It uses EDP standards for a few file formats and XML structures for text documents. For other information formats, intelligibility is assured by using a virtual computer. To protect sensitive information—content whose inappropriate alteration might mislead its readers, the integrity and authenticity of each TDO is made testable by embedded public-key cryptographic message digests and signatures. Key authenticity is protected recursively in a social hierarchy. The proper focus for long-term preservation technology is signed packages that each combine a record collection with its metadata and that also bind context—Trustworthy Digital Objects.
    • 

    corecore