3,678 research outputs found
Recommended from our members
Cyber insurance of information systems: Security and privacy cyber insurance contracts for ICT and helathcare organizations
Nowadays, more-and-more aspects of our daily activities are digitalized. Data and assets in the cyber-space, both for individuals and organizations, must be safeguarded. Thus, the insurance sector must face the challenge of digital transformation in the 5G era with the right set of tools. In this paper, we present CyberSure-an insurance framework for information systems. CyberSure investigates the interplay between certification, risk management, and insurance of cyber processes. It promotes continuous monitoring as the new building block for cyber insurance in order to overcome the current obstacles of identifying in real-time contractual violations by the insured party and receiving early warning notifications prior the violation. Lightweight monitoring modules capture the status of the operating components and send data to the CyberSure backend system which performs the core decision making. Therefore, an insured system is certified dynamically, with the risk and insurance perspectives being evaluated at runtime as the system operation evolves. As new data become available, the risk management and the insurance policies are adjusted and fine-tuned. When an incident occurs, the insurance company possesses adequate information to assess the situation fast, estimate accurately the level of a potential loss, and decrease the required period for compensating the insured customer. The framework is applied in the ICT and healthcare domains, assessing the system of medium-size organizations. GDPR implications are also considered with the overall setting being effective and scalable
Mapping the e-business profile and trends in cost management in the UK construction industry
The advancement of e-business applications and IT infrastructure has had massive impact on construction business processes over the last decade. The added effects of globalisation coupled with global economic recession have forced businesses to implement e-business applications within their organisations. It is clear in all industries, that e-business technologies have become a key strategic vehicle in improving performance. In Construction, e-business applications complement most of the business functions and have removed geographical boundaries resulting in a global construction market with increased competition, increased collaboration and have helped reducing the fragmentation of the industry. However, even though the successes are inevitable, it is scrutinized that the advancement is still constrained within the industry. Thus there is a need to undertake an analysis of current construction e-business usage and attitude of construction professionals towards e-business trends to ensure a productive and beneficial implementation of construction e-business tools within organisations. This study acknowledged the niche for research into current e-business usage in UK construction organisations and aimed to determine and map the use of ICT in construction cost management activities, and explore the attitudes of professionals towards e-business approaches. Initially a comprehensive literature review was carried out together with an online web search to identify what ICT and software packages are being used for construction cost management activities. Results from this review aided in developing the research questionnaire and a detailed an online structured survey was carried out using the chartered quantity surveying organisations within the UK. This paper presents the findings of the survey and discusses the ICT usage within construction organisations for cost management activities and the attitude of construction professionals towards BIM and construction e-business trends
The e-revolution and post-compulsory education: using e-business models to deliver quality education
The best practices of e-business are revolutionising not just technology itself but the whole process through which services are provided; and from which important lessons can be learnt by post-compulsory educational institutions. This book aims to move debates about ICT and higher education beyond a simple focus on e-learning by considering the provision of post-compulsory education as a whole. It considers what we mean by e-business, why e-business approaches are relevant to universities and colleges and the key issues this raises for post-secondary education
Architecture of Environmental Risk Modelling: for a faster and more robust response to natural disasters
Demands on the disaster response capacity of the European Union are likely to
increase, as the impacts of disasters continue to grow both in size and
frequency. This has resulted in intensive research on issues concerning
spatially-explicit information and modelling and their multiple sources of
uncertainty. Geospatial support is one of the forms of assistance frequently
required by emergency response centres along with hazard forecast and event
management assessment. Robust modelling of natural hazards requires dynamic
simulations under an array of multiple inputs from different sources.
Uncertainty is associated with meteorological forecast and calibration of the
model parameters. Software uncertainty also derives from the data
transformation models (D-TM) needed for predicting hazard behaviour and its
consequences. On the other hand, social contributions have recently been
recognized as valuable in raw-data collection and mapping efforts traditionally
dominated by professional organizations. Here an architecture overview is
proposed for adaptive and robust modelling of natural hazards, following the
Semantic Array Programming paradigm to also include the distributed array of
social contributors called Citizen Sensor in a semantically-enhanced strategy
for D-TM modelling. The modelling architecture proposes a multicriteria
approach for assessing the array of potential impacts with qualitative rapid
assessment methods based on a Partial Open Loop Feedback Control (POLFC) schema
and complementing more traditional and accurate a-posteriori assessment. We
discuss the computational aspect of environmental risk modelling using
array-based parallel paradigms on High Performance Computing (HPC) platforms,
in order for the implications of urgency to be introduced into the systems
(Urgent-HPC).Comment: 12 pages, 1 figure, 1 text box, presented at the 3rd Conference of
Computational Interdisciplinary Sciences (CCIS 2014), Asuncion, Paragua
Fighting Corruption with ICT: Strengthening Civil Society’s Role
With information and communication technology, civil society plays an increasing role in governance, promoting transparency and accountability to tackle corruption. Development agencies can strengthen civil society-led, ICT -driven anticorruption initiatives by funding projects and programs that foster institutional environments conducive to participation in public affairs, promote cooperation and mobilization, and develop capacities
Assessing digital preservation frameworks: the approach of the SHAMAN project
How can we deliver infrastructure capable of supporting the
preservation of digital objects, as well as the services that can be applied to those digital objects, in ways that future unknown systems will understand? A critical problem in developing systems is the process of validating whether the delivered solution effectively reflects the validated requirements. This is a challenge also for the EU-funded SHAMAN project, which aims to develop an integrated preservation framework using grid-technologies for distributed networks of digital preservation systems, for managing the storage, access, presentation, and manipulation of digital objects over time. Recognising this, the project team ensured that alongside the user requirements an assessment framework was developed. This paper presents the assessment of the SHAMAN demonstrators for the memory institution, industrial design and engineering and eScience domains, from the point of view of
user’s needs and fitness for purpose. An innovative synergistic use of TRAC criteria, DRAMBORA risk registry and mitigation strategies, iRODS rules and information system models requirements has been designed, with the underlying goal to define associated policies, rules and state information, and make them wherever possible machine-encodable and enforceable. The described assessment framework can be valuable not only for the implementers of this project preservation framework, but for the wider digital preservation community, because it provides a
holistic approach to assessing and validating the preservation of digital libraries, digital repositories and data centres
Using Information And Communication Technologies To Improve Transparency In Transition Countries
Automating government to citizen (G2C) interactions will help in achieving transparency and combating corruption. However, in the case of post-communist transitioning countries such as Armenia, the challenges are unique. These countries are struggling with the transformation of their legacy bureaucratic and administrative processes. In addition, almost every post- Soviet country has inherited systemic corruption that is built in to the ‘modus operandi’ of both the public and private sectors. The process of automating G2C interactions using information and communication technology (ICT) needs to be analyzed as a socio-technical information processing system. Automating existing bureaucratic processes that are defective will not yield results. Improving the enforcement of rules through automation is clearly the best way to combat corruption. The introduction of e-Government plays a major role in this context as it automates several processes. To deliver public service in a more transparent and efficient way, it is necessary to categorize, assess, and modify existing administrative processes. In this paper, we propose a methodology to render transparency in governance using information and communication technology that goes beyond mere automating existing citizen-government interactions
- …