8,906 research outputs found

    The insider on the outside: a novel system for the detection of information leakers in social networks

    Get PDF
    Confidential information is all too easily leaked by naive users posting comments. In this paper we introduce DUIL, a system for Detecting Unintentional Information Leakers. The value of DUIL is in its ability to detect those responsible for information leakage that occurs through comments posted on news articles in a public environment, when those articles have withheld material non-public information. DUIL is comprised of several artefacts, each designed to analyse a different aspect of this challenge: the information, the user(s) who posted the information, and the user(s) who may be involved in the dissemination of information. We present a design science analysis of DUIL as an information system artefact comprised of social, information, and technology artefacts. We demonstrate the performance of DUIL on real data crawled from several Facebook news pages spanning two years of news articles

    Knowledge Engineering Experimentation Management System for Collaboration

    Get PDF
    The article of record as published may be located at http://dx.doi.org/10.1007/978-90-481-3658-2_100This paper presents a methodology and system for the analysis of complex experiments currently utilized by the Department of Defense. Assessed are effectiveness and efficiency of systems interactions and affected intra- and interorganizational processes. Methodology is derived from an operational experimentation analytics and management system designed to assess next-generation military e-services and infrastructure. A focus is the expansion of systems methodology beyond traditional transaction-oriented exchanges to include management layers for complex inter-organizational processes and mechanisms to accommodate sensitive company operations

    POLICY, CULTURE, AND PEOPLE: A DIGITAL TRANSFORMATION STRATEGY FOR NAVSUP NOW AND IN THE FUTURE

    Get PDF
    The Naval Supply Systems Command is currently conducting an information technology modernization plan. Since the 2018 National Security Strategy was released, the U.S. has been in a declared state of great power competition with China and Russia. The nexus of great power competition and NAVSUP’s modernization arrive at digital transformation. The current threat environment for the U.S. military revolves around the idea that war will occur in all domains and for NAVSUP that means that logistics for U.S. forces will be contested. To help succeed in providing warfighters with the requirements they need, digital transformation at business levels such as NAVSUP need to be successful in order to increase the lethality of U.S. forces. Digital transformation is the act of using technology to improve processes, not just modernizing components of the information technology infrastructure. Through interviews with members of companies in the emerging technology sector and with members of NAVSUP, I garnered insights that I developed into recommendations on how NAVSUP can successfully conduct a digital transformation through innovation and education.Lieutenant Commander, United States NavyApproved for public release. Distribution is unlimited

    Innovation, Entrepreneurship and Governance for Sustainable Development of Africa’s Agri-food System

    Get PDF
    Africa has the human capital to transform its agricultural sector Growth in urban markets provides new opportunities for enterprise development Investments in science, technology, engineering and math must be increased Bold leadership, as well as policies that promote R&D collaboration and provide incentives for partnering with the private sector, should be implemented

    Game Theory and Prescriptive Analytics for Naval Wargaming Battle Management Aids

    Get PDF
    NPS NRP Technical ReportThe Navy is taking advantage of advances in computational technologies and data analytic methods to automate and enhance tactical decisions and support warfighters in highly complex combat environments. Novel automated techniques offer opportunities to support the tactical warfighter through enhanced situational awareness, automated reasoning and problem-solving, and faster decision timelines. This study will investigate how game theory and prescriptive analytics methods can be used to develop real-time wargaming capabilities to support warfighters in their ability to explore and evaluate the possible consequences of different tactical COAs to improve tactical missions. This study will develop a conceptual design of a real-time tactical wargaming capability. This study will explore data analytic methods including game theory, prescriptive analytics, and artificial intelligence (AI) to evaluate their potential to support real-time wargaming.N2/N6 - Information WarfareThis research is supported by funding from the Naval Postgraduate School, Naval Research Program (PE 0605853N/2098). https://nps.edu/nrpChief of Naval Operations (CNO)Approved for public release. Distribution is unlimited.

    Cognitive Readiness and Intellectual Leadership for Effective Maritime Advantage: The Naval Postgraduate School Vision & Strategic Framework

    Get PDF
    The Naval Postgraduate School prepares defense leaders with the intellectual capabilities to meet operational and strategic challenges in a dynamic and complex security environment. As part of the Naval Education Enterprise (NEE), NPS provides defense-focused, naval-unique graduate and ad- vanced education and conducts defense-relevant research that contributes to problem-solving and increased capabilities across the naval services. Expert faculty, experienced in defense and security- related issues, develop and enhance the cognitive readiness of our operationally experienced warrior- scholar students through interdisciplinary graduate education and fundamental research in support of advanced knowledge and skills.1 Cognitive readiness is the critical ability to adapt interactively to an unpredictable, complex, and dynamic environment

    Self-tracking modes: reflexive self-monitoring and data practices

    Get PDF
    The concept of ‘self-tracking’ (also referred to as life-logging, the quantified self, personal analytics and personal informatics) has recently begun to emerge in discussions of ways in which people can voluntarily monitor and record specific features of their lives, often using digital technologies. There is evidence that the personal data that are derived from individuals engaging in such reflexive self-monitoring are now beginning to be used by actors, agencies and organisations beyond the personal and privatised realm. Self-tracking rationales and sites are proliferating as part of a ‘function creep’ of the technology and ethos of self-tracking. The detail offered by these data on individuals and the growing commodification and commercial value of digital data have led government, managerial and commercial enterprises to explore ways of appropriating self-tracking for their own purposes. In some contexts people are encouraged, ‘nudged’, obliged or coerced into using digital devices to produce personal data which are then used by others. This paper examines these issues, outlining five modes of self-tracking that have emerged: private, communal, pushed, imposed and exploited. The analysis draws upon theoretical perspectives on concepts of selfhood, citizenship, biopolitics and data practices and assemblages in discussing the wider sociocultural implications of the emergence and development of these modes of self-tracking
    • …
    corecore