24,592 research outputs found

    A framework and tool to manage Cloud Computing service quality

    Get PDF
    Cloud Computing has generated considerable interest in both companies specialized in Information and Communication Technology and business context in general. The Sourcing Capability Maturity Model for service (e-SCM) is a capability model for offshore outsourcing services between clients and providers that offers appropriate strategies to enhance Cloud Computing implementation. It intends to achieve the required quality of service and develop an effective working relationship between clients and providers. Moreover, quality evaluation framework is a framework to control the quality of any product and/or process. It offers a tool support that can generate software artifacts to manage any type of product and service efficiently and effectively. Thus, the aim of this paper was to make this framework and tool support available to manage Cloud Computing service quality between clients and providers by means of e-SCM.Ministerio de Ciencia e InnovaciĂłn TIN2013-46928-C3-3-RJunta de AndalucĂ­a TIC-578

    When should an organisation start vulnerability management?

    Get PDF
    Haavoittuvuuksien hallinnan aloittaminen voi olla suuri haaste monille organisaatioille, mutta näillä organisaatioilla on vaatimuksia tehdä haavoittuvuuksien hallintaa esimerkiksi standardien, regulaatioiden tai bisnessuhteiden kautta. Tutkimuksen tavoitteena oli tuottaa helposti ymmärrettävä dokumentaatio kyberturvallisuudesta, joka avustaa organisaatioita haavoittuvuuksien hallinnan aloittamisessa. Kyberturvallisuuden tueksi haavoittuvuuksien hallinnan aloittamiselle tarvittiin vertailua eri kyberturvallisuusviitekehyksistä, kyberturvallisuuden kypsyysmalleista ja haavoittuvuuksien hallinnan käyttöönottoprosesseista. Tutkimus aloitettiin etsimällä sopivia tutkimuskohteita kyberturvallisuusviitekehyksistä, kyberturvallisuuden kypsyysmalleista ja haavoittuvuuksien hallinnan käyttöönottoprosesseista. Löydettyihin tutkimuskohteisiin perehdyttiin ja niiden ominaisuuksia vertailtiin analyyttisesti. Tutkimuskohteiden vertailussa tutkimuskohteista löydettiin niiden vahvuuksia ja heikkouksia sekä ominaispiirteitä. Tutkimuksen johtopäätöksenä voitiin todeta, että lopullista kaikille organisaatioille sopivaa kyberturvallisuuden viitekehystä, kyberturvallisuuden kypsyysmallia tai haavoittuvuuksien hallinnan käyttöönottoprosessia ei löytynyt. Voidaan kuitenkin todeta, että tutkimus tuotti riittävän dokumentaation organisaatioiden kyberturvallisuuden rakentamiselle ja haavoittuvuuksien hallinnan aloittamiselle.Organisations may find vulnerability management very difficult to start conducting, but they are obligated to perform vulnerability management due to various requirements which may come from standards, regulations or business relationships. The objective of the research was to compile an easy to understand document about cyber security program for an organisation which allows them to begin vulnerability management. To support this cyber security program a strong base for vulnerability management cyber security frameworks and cyber security maturity models needed to be compared and presented. The research started by searching good research subjects for cyber security frameworks, cyber security maturity models and vulnerability management implantation processes. Once these research subjects were studied and similar features were compared analytically. The comparison results and analysis found some strengths and weaknesses of the research subjects. As the conclusion for the research there was no definite answer for all organisations, about cyber security frameworks, cyber security maturity models or vulnerability management models. The research should provide decent support for organisations to build strong basis for their cyber security program and beginning the vulnerability management

    Offenders and E-Learning - a literature review on behalf of Becta

    Get PDF
    This literature review has been prepared by the Hallam Centre of Community Justice at Sheffield Hallam University, on behalf of Becta. The literature review provides a summary of existing research and knowledge relating to e-learning in the offending learning sector with a view to developing a range of e-maturity indicators across the sector. The review also highlights linkages with current Government policy in relation to offender learning and skills

    Optimising processes of IT organisation through software products’ configuration management

    Get PDF
    The present paper is focused on the efficiency of processes within IT firms which design software products, by finding optimum management solutions for these types of activities. In order to achieve this, we focus on software products configuration management, with specific objectives in documenting and ensuring visibility to the product’s configuration and of the stage of achieving its physical and functional characteristics. Through configuration management, technical and administrative rules are established and applied for designing, developing, producing and supporting the elements of the product’s configuration, in each stage of its lifecycle. The conclusions of this research are focused on evaluating economic effects obtained by implementing the quality management system, according to the ISO 9001:2000 quality standard, while developing software products, at the level of IT firm.configuration management, quality management, product lifecycle, software quality

    MANAGING CYBER HYGIENE AT A HIGHER EDUCATION INSTITUTION IN THE UNITED STATES

    Get PDF
    Higher education institutions are obligated to protect their critical data, IT assets, and infrastructures. State governed institutions develop policies and procedures based on state mandated guidelines. While policies and procedures are updated regularly, cyber hygiene is managed in a manner that is feasible financially and based on personnel resources. Savannah State University struggles with maintaining cyber hygiene given its need to manage state funding in a manner that supports operational and mandated costs, but also indirect costs like those that support cybersecurity. The Holistic Cybersecurity Maturity Assessment Framework (HCYMAF) was deployed in this study to examine cybersecurity maturity and hygiene at Savannah State University (SSU). Findings indicate that SSU is currently operating at Level 0 of the HCYMAF and needs to consider action proposed in this study to promote higher levels of cyber maturity. This research contributes to the extant literature on cyber hygiene and maturity in higher education
    • …
    corecore