45 research outputs found

    A STUDY ON EFFECTIVE COUNTERMEASURES AGAINST CYBER ATTACKS IN SOUTH KOREA

    Get PDF
    Based on U.S. cybersecurity policy, this thesis proposes effective countermeasures for the Republic of Korea (ROK) to prepare for, deter, and recover from cyber threats posed by North Korea. This study identifies the most dangerous North Korean cyber strikes facing South Korea by reviewing several cases of North Korean cyberattacks, the ROK’s countermeasures, and the severity of the damage caused by the attacks. The study builds on the writings of academics and subject matter experts as well as publicly available government policy documents, although specifics on policy are limited due to national security concerns. In addition, the study acknowledges how the cybersecurity paradigm has shifted as a result of U.S. planning, reaction to, and establishment of follow-up measures for an attack of a similar type by a cyber superpower. The strategy of deterring an opponent's operations based on the past has evolved into a strategy of preparing for enemy attacks through information sharing and preemptive defense measures, and counterattack by rapid recovery and identification of the enemy through resilience and with tracking technologies. Although the ROK is a country with well-developed information technology, its cybersecurity knowledge, systems, and technology remain weak in comparison to North Korea's abilities. Consequently, it is conceivable that the ROK can respond effectively to North Korea’s cyber threats by applying the lessons learned from the United States.Major, Republic of Korea Air ForceApproved for public release. Distribution is unlimited

    Information support for the sense-making activities of managers

    Get PDF
    This thesis addresses the problem of how computer technologies and associated systems can be used effectively to provide information, in particular organisational performance information, to support managers in their strategic activities, with particular reference to managers in public, professional bureaucracies such as universities. The objective of the thesis is to answer the following questions: 1. What do different disciplines and bodies of knowledge cwrently say about this problem? 2. Is there a theoretical approach that can provide a holistic, contextual and dynamic understanding of this problem? 3. Can this theory be used to develop a holistic, contextual and dynamic model of the problem? 4. Can the model provide guidelines or methodologies that can be of general use to real organisations faced with this problem? The approach taken is one of a qualitative, interpretive epistemology and the theoretical basis is that of the Cultural Historical Activity Theory (CHAT) based on the work of the Russian psychologists Vygotsky (1978) and Leontiev (1981). Following a review of the literature, a study was conducted of five projects aimed at the provision of information to management at a single site. This study used the historical research methodology of Mason et al (1997). From this study a new holistic model was developed of the use of computer technologies and associated systems in providing information to support managers in their strategic activities. This model is contrasted with a model of the same problem based on the current literature. A framework, derived from the model, is presented. The new model and framework were applied to a project concerning the creation of a prototype enterprise information system for research output performance in a university. This project, guided by the model, captured the imagination of management and is a significant improvement on previous attempts, thus verifying the validity of the model and the CHAT approach

    AI Now Institute 2023 Landscape: Confronting Tech Power

    Get PDF
    This report highlights a set of approaches that, in concert, will collectively enable us to confront tech power. Some of these are bold policy reforms that underscore the need for bright-line rules and structural curbs. Others identify popular policy responses that, because they fail to meaningfully address power discrepancies, should be abandoned. Several aren't in the traditional domain of policy at all, but acknowledge the importance of nonregulatory interventions such as collective action, worker organizing, and the role public policy can play in bolstering these efforts. We intend this report to provide strategic guidance to inform the work ahead of us, taking a bird's eye view of the many levers we can use to shape the future trajectory of AI – and the tech industry behind it – to ensure that it is the public, not industry, that this technology serves

    System support for proactive adaptation

    Full text link
    Applications in our modern, pervasive computing environments have to adapt themselves or their context in order to cope with changes. In the process, these pervasive applications should be as unobtrusive as possible, i.e., their adaptation should be automatic. In dynamic multi-user systems with shared resources and interactive applications, such adaptations cannot be scripted in advance. Instead, they have to be calculated at runtime. However, the necessary calculations quickly exceed the complexity that can be handled in real-time, i.e., without causing significant delays. The concept of proactive adaptation allows to change applications and/or context based on prediction of context and user behavior. Hence, proactive adaptation can reduce adaptation delays and avoid context interferences by determining coordinated adaptation plans ahead of time, instead of reactively when adaptation becomes necessary. Further, it helps to provide a seamless service to the user, while optimizing the overall system utility. This thesis presents a general framework and middleware-based system support for coordinated proactive adaptation in dynamic multi-user pervasive systems. The framework consists of five major components. The context interaction model and corresponding context broker offers context information, prediction, as well as actuation in a uniform fashion. The application configuration model allows applications to specify their requirements towards their context, as well as detail user preferences and duration-dependent utility and cost functions for adaptation optimization. Configuration algorithms calculate and rate all adaptation alternatives of an application given a current or predicted context and the specified rating functions, before coordination algorithms find interference-free adaptation plans for situations in which multiple applications share a context space. Finally, the adaptation control component combines the individual components of the framework in a two-dimensional control loop for proactive and fallback reactive adaptation. The prototype framework is evaluated in real-time simulations of an interactive pervasive system using recorded user traces

    A Mobile phone solution for systematically identifying and reporting nonstandardised medicinal drugs in Nairobi, Kenya

    Get PDF
    Thesis Submitted in partial fulfillment of the requirements for the Degree of Science in Mobile Telecommunication and Innovation (MSc. MTI) at Strathmore UniversityEffective observation and reporting of uncertified/counterfeit drug items demands timely identification and dissemination of information to parties’ responsible for consumption,prevention, distribution and control of drugs to warrant necessary action in case of a flaw. Tools used to identify and report existence of such drug items determine the level of efficiency and effectiveness of the exercise. Traditional paper based and rigid computer based reporting procedures compromise on completeness, timeliness and correctness of data. This scenario creates unprecedented opportunities that researchers can use to improve the current way of identifying and reporting counterfeit drugs. This dissertation gives an analysis of the distribution and effects of counterfeit drugs to the human population in Kenya and internationally with focus on emerging markets. A comprehensive investigation of mobile scanning techniques and existing technologies used to track drug items is also covered. Data collection instruments used were through holding interviews and observations. Both qualitative and quantitative methods of data analysis were employed. Results of the data analysis aided to inform system requirements and design of the application. SCRUM, an agile methodology was adopted as the software methodology for development of the application. PEPELEZI DAWA, a mobile application was developed as a tool to offer an interactive menu where users can scan medication and report counterfeit drug items using their mobile devices. A web application was also developed to provide a portal for authorized personnel, registered under local drug quality control organisations to; manage users,view and edit stored records of drug items and view reports posted by users. System testing was done to ensure usability, reliability, completeness and correctness of both developed applications

    Technologies for Development: From Innovation to Social Impact

    Get PDF
    Development Engineering; Technologies for Development; Innovation for Humanitarian Action; Emerging Countries; Developing Countries; Tech4De

    New Fundamental Technologies in Data Mining

    Get PDF
    The progress of data mining technology and large public popularity establish a need for a comprehensive text on the subject. The series of books entitled by "Data Mining" address the need by presenting in-depth description of novel mining algorithms and many useful applications. In addition to understanding each section deeply, the two books present useful hints and strategies to solving problems in the following chapters. The contributing authors have highlighted many future research directions that will foster multi-disciplinary collaborations and hence will lead to significant development in the field of data mining

    2015 - 2016, Gardner-Webb University Graduate Academic Catalog

    Get PDF
    2015 - 2016, Gardner-Webb University Graduate Academic Catalog. A. Frank Bonner, president.https://digitalcommons.gardner-webb.edu/graduate-academic-catalogs/1010/thumbnail.jp

    2015 - 2016, Gardner-Webb University Academic Catalog

    Get PDF
    2015 - 2016, Gardner-Webb University Academic Catalog. A. Frank Bonner, president.https://digitalcommons.gardner-webb.edu/academic-catalogs-graduate-undergraduate-combined/1004/thumbnail.jp
    corecore