43,095 research outputs found

    Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization

    Full text link
    Logs are one of the most fundamental resources to any security professional. It is widely recognized by the government and industry that it is both beneficial and desirable to share logs for the purpose of security research. However, the sharing is not happening or not to the degree or magnitude that is desired. Organizations are reluctant to share logs because of the risk of exposing sensitive information to potential attackers. We believe this reluctance remains high because current anonymization techniques are weak and one-size-fits-all--or better put, one size tries to fit all. We must develop standards and make anonymization available at varying levels, striking a balance between privacy and utility. Organizations have different needs and trust other organizations to different degrees. They must be able to map multiple anonymization levels with defined risks to the trust levels they share with (would-be) receivers. It is not until there are industry standards for multiple levels of anonymization that we will be able to move forward and achieve the goal of widespread sharing of logs for security researchers.Comment: 17 pages, 1 figur

    Contextual impacts on industrial processes brought by the digital transformation of manufacturing: a systematic review

    Get PDF
    The digital transformation of manufacturing (a phenomenon also known as "Industry 4.0" or "Smart Manufacturing") is finding a growing interest both at practitioner and academic levels, but is still in its infancy and needs deeper investigation. Even though current and potential advantages of digital manufacturing are remarkable, in terms of improved efficiency, sustainability, customization, and flexibility, only a limited number of companies has already developed ad hoc strategies necessary to achieve a superior performance. Through a systematic review, this study aims at assessing the current state of the art of the academic literature regarding the paradigm shift occurring in the manufacturing settings, in order to provide definitions as well as point out recurring patterns and gaps to be addressed by future research. For the literature search, the most representative keywords, strict criteria, and classification schemes based on authoritative reference studies were used. The final sample of 156 primary publications was analyzed through a systematic coding process to identify theoretical and methodological approaches, together with other significant elements. This analysis allowed a mapping of the literature based on clusters of critical themes to synthesize the developments of different research streams and provide the most representative picture of its current state. Research areas, insights, and gaps resulting from this analysis contributed to create a schematic research agenda, which clearly indicates the space for future evolutions of the state of knowledge in this field

    Integration of BPM systems

    Get PDF
    New technologies have emerged to support the global economy where for instance suppliers, manufactures and retailers are working together in order to minimise the cost and maximise efficiency. One of the technologies that has become a buzz word for many businesses is business process management or BPM. A business process comprises activities and tasks, the resources required to perform each task, and the business rules linking these activities and tasks. The tasks may be performed by human and/or machine actors. Workflow provides a way of describing the order of execution and the dependent relationships between the constituting activities of short or long running processes. Workflow allows businesses to capture not only the information but also the processes that transform the information - the process asset (Koulopoulos, T. M., 1995). Applications which involve automated, human-centric and collaborative processes across organisations are inherently different from one organisation to another. Even within the same organisation but over time, applications are adapted as ongoing change to the business processes is seen as the norm in today’s dynamic business environment. The major difference lies in the specifics of business processes which are changing rapidly in order to match the way in which businesses operate. In this chapter we introduce and discuss Business Process Management (BPM) with a focus on the integration of heterogeneous BPM systems across multiple organisations. We identify the problems and the main challenges not only with regards to technologies but also in the social and cultural context. We also discuss the issues that have arisen in our bid to find the solutions

    Developing lifelong learners: A novel online problem‐based ultrasonography subject

    Get PDF
    Online learning environments have a major role in providing lifelong learning opportunities. Lifelong learning is critical for successful participation in today's competitive work environment. This paper describes an online problem‐based learning approach to the creation of a student‐centred learning environment for the study of the biological sciences subject in the Graduate Diploma of Applied Science (Medical Ultrasonography) course at the University of Sydney. The environment is interactive and collaborative, with all communication taking place online. Students work in groups to study clinically relevant problems. A Web‐database system provides learner control in the process of knowledge acquisition, access to reference materials on the Internet and communication with the tutor and with peers through synchronous chat and asynchronous threaded discussion forums. Other online features include a protocol for problem‐solving, self‐assessment and feedback opportunities, detailed help, streaming audio and video and pre‐course, ongoing and post‐course questionnaires. This technology may be adapted to a range of disciplines and can also be utilized in on‐campus teaching

    Forum Session at the First International Conference on Service Oriented Computing (ICSOC03)

    Get PDF
    The First International Conference on Service Oriented Computing (ICSOC) was held in Trento, December 15-18, 2003. The focus of the conference ---Service Oriented Computing (SOC)--- is the new emerging paradigm for distributed computing and e-business processing that has evolved from object-oriented and component computing to enable building agile networks of collaborating business applications distributed within and across organizational boundaries. Of the 181 papers submitted to the ICSOC conference, 10 were selected for the forum session which took place on December the 16th, 2003. The papers were chosen based on their technical quality, originality, relevance to SOC and for their nature of being best suited for a poster presentation or a demonstration. This technical report contains the 10 papers presented during the forum session at the ICSOC conference. In particular, the last two papers in the report ere submitted as industrial papers

    A Little Birdie Said: How Twitter is Disrupting Shareholder Activism

    Get PDF
    Shareholders are organizing and mobilizing on new social media platforms like Twitter. This changes the dynamics of shareholder proxy contests in ways that favor shareholders over management. Disruptive technology may bring about a shareholder revolution, which may not be in shareholders’ best interests, at least from the perspective of shareholder wealth maximization, and it also has powerful implications for the future of corporate social responsibility

    A Test Bed for Evaluating the Performance of IoT Networks

    Get PDF
    The use of smaller, personal IoT networks has increased over the past several years. These devices demand a lot of resources but only have limited access. To establish and sustain a flexible network connection, 6LoWPAN with RPL protocol is commonly used. While RPL provides a low-cost solution for connection, it lacks load balancing mechanisms. Improvements in OF load balancing can be implemented to strengthen network stability. This paper proposes a test bed configuration to show the toll of frequent parent switching on 6LoWPAN. Contiki’s RPL 6LoWPAN software runs on STM32 Nucleo microcontrollers with expansion boards for this test bed. The configuration tests frequency of parent changes and packet loss to demonstrate network instability of different RPL OFs. Tests on MRHOF for RPL were executed to confirm the working configuration. Results, with troubleshooting and improvements, show a working bed. The laid-out configuration provides a means for testing network stability in IoT networks
    • 

    corecore