704 research outputs found

    Optimizing Interconnectivity among Networks under Attacks

    Get PDF
    Networks may need to be interconnected for various reasons such as inter-organizational communication, redundant connectivity, increasing data-rate and minimizing delay or packet-loss, etc. However, the trustworthiness of an added interconnection link cannot be taken for granted due to the presence of attackers who may compromise the security of an interconnected network by intercepting the interconnections. Namely, an intercepted interconnection link may not be secured due to the data manipulations by attackers. In the first part of this dissertation, the number of interconnections between the two networks is optimized for maximizing the data-rate and minimizing the packet-loss under the threat of security attacks. The optimization of the interconnectivity considering the security attack is formulated using a rate-distortion optimization setting, as originally introduced by Claude E. Shannon in the information theory. In particular, each intercepted interconnection is modeled as a noisy communication channel where the attackers may manipulate the data by flipping and erasing of data bits, and then the total capacity for any given number of interconnections is calculated. By exploiting such formulation, the optimal number of interconnections between two networks is found under network administrators data-rate and packet-loss requirement, and most importantly, without compromising the data security. It is concluded analytically and verified by simulations under certain conditions, increasing interconnections beyond an optimal number would not be beneficial concerning the data-rates and packet-loss. In the second part of this dissertation, the vulnerability of the interconnected network is analyzed by a probabilistic model that maps the intensity of physical attacks to network component failure distributions. Also, assuming the network is susceptible to the attack propagation, the resiliency of the network is modeled by the influence model and epidemic model. Finally, a stochastic model is proposed to track the node failure dynamics in a network considering dependency with power failures. Besides, the cascading failure in the power grid is analyzed with a data-driven model that reproduces the evolution of power-transmission line failure in power grids. To summarize, the optimal interconnectivity among networks is analyzed under security attacks, and the dynamic interactions in an interconnected network are investigated under various physical and logical attacks. The proper application of this work would add the minimum number of inter-network connections between two networks without compromising the data security. The optimal number interconnections would meet network administrator’s requirement and minimize cost (both security and monetary) associated with unnecessary connections. This work can also be used to estimate the reliability of a communication network under different types of physical attacks independently and also by incorporating the dynamics of power failures

    Increasing operational performance of a Human Resources Department through improving the managing of the relationships and interactions : a systems approach

    Get PDF
    Bibliography: leaves 97-104.Operational efficiency requires, inter-alia, efficient interpersonal and cross-functional collaboration within a system. This, however, demands a proper management of interrelationships and interactions between the different functions ofthe system. However, the emergence of interpersonal and cross-functional collaboration would appear to be dependent on more than simply the provision of a technical infrastructure. It also requires a fundamental change in the way people think and act. This necessitates the restructuring of relationships. As organisations are primarily constituted through the interaction of people within their operational domains and, as the qualities of these interactions are dependable on the network of relationships, it is essential that the relationship network also be reconstructed

    Integrity and Efficiency in the EU: The Case Against the European Economic Constitution. CES Working Paper, no. 130, 2006

    Get PDF
    The European Constitutional Treaty (ECT) was presented by its drafters as an explicit constitution for the European Union (EU 25). A possible explanation for its rejection by the French and Dutch citizens in the course of spring 2005 is that it did not sufficiently amend the implicit constitution of the EU 25, the European Union Treaty (EUT), which was truly the object of voters’ aversion. Assuming this to be true, there should be a thorough debate on the relevance and viability of the de facto current constitution of the European Union. In this paper, we engage in this debate by identifying what is essentially wrong with the economic provisions of the EUT, which we designate as the “European economic constitution.” Using a constitutional political economy approach, we first attempt to demonstrate that both what we define as the “principle of integrity” and the “principle of efficiency” of collective action appear to be violated by the European economic constitution. This occurs, respectively, because its provisions are not neutral, nor revisable, and because they do not sufficiently allow for the possibility of cooperative collective decision (leading to convergence in welfare) in a more than ever numerous and heterogeneous EU. Our essential argument in this respect regards the implications of the structurally different economic performances and incentives of small and large countries under the European economic constitution. Finally, since the present European trade-off between “integrity” and “efficiency” appears sub-optimal, we present two original ways of achieving potentially better ones in the EU, through a “Great compromise” or “Economic constitution(s),” expressing a preference for the latter

    Two Essays on Analytical Capabilities: Antecedents and Consequences

    Get PDF
    Although organizations are rapidly embracing business analytics (BA) to enhance organizational performance, only a small proportion have managed to build analytical capabilities. While BA continues to draw attention from academics and practitioners, theoretical understanding of antecedents and consequences of analytical capabilities remain limited and lack a systematic view. In order to address the research gap, the two essays investigate: (a) the impact of organization’s core information processing mechanisms and its impact on analytical capabilities, (b) the sequential approach to integration of IT-enabled business processes and its impact on analytical capabilities, and (c) network position and its impact on analytical capabilities. Drawing upon the Information Processing Theory (IPT), the first essay investigates the relationship between organization’s core information processing mechanisms–i.e., electronic health record (EHRs), clinical information standards (CIS), and collaborative information exchange (CIE)–and its impact on analytical capabilities. We use data from two sources (HIMSS Analytics 2013 and AHA IT Survey 2013) to test the theorized relationships in the healthcare context empirically. Using the competitive progression theory, the second essay investigates whether organizations sequential approach to the integration of IT-enabled business processes is associated with increased analytical capabilities. We use data from three sources (HIMSS Analytics 2013, AHA IT Survey 2013, and CMS 2014) to test if sequential integration of EHRs –i.e., reflecting the unique organizational path of integration–has a significant impact on hospital’s analytical capability. Together the two essays advance our understanding of the factors that underlie enabling of firm’s analytical capabilities. We discuss in detail the theoretical and practical implications of the findings and the opportunities for future research
    • 

    corecore