415 research outputs found

    Infrastructure Asset Management Modeling through an Analysis of the Air Force Strategic Vision and Goals

    Get PDF
    Effective asset management requires an overarching model that establishes a framework for decision-makers. This research project develops a strategic level asset management model for varying types of infrastructure that provides guidance for effective asset management. The strategic model also incorporates Next Generation Information Technology initiatives into a single coherent system to streamline the top-down, bottom-up flow of information. The strategic model is applicable to agencies with a large, varying infrastructure inventory and limited resources. This research also develops an improved performance modeling tool, a critical component of the strategic model. This tool objectively prioritizes maintenance and repair projects according to measurable metrics as well as the strategic vision, established goals, and policies. Asset management of Air Force infrastructure provides an example of applicability for this strategic model and improved tool; thus, an asset management example of Air Force infrastructure is utilized throughout the research project to demonstrate the utility of the model and the tool. The strategic level model and improved tool enable policy-makers to make decisions that tie goals, infrastructure inventory, condition state, importance and criticality, and budget constraints to system performance. As a result, insight is gained on ways to maximize efficiency and optimize the performance of infrastructure

    Cloud Technology Selection: A structured framework for decision making

    Get PDF
    Dissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Information Systems and Technologies ManagementThis study aims to get organizations to improve their decision making during the selection of cloud technology process. As the technology evolves alongside an ever-increasing abundance in market offer, it may be challenging to choose the desirable service that encompasses several business approaches. For the purpose of this study to be attained, the reader must first comprehend the definition of Cloud Technology: it is the delivery of IT resources over the Internet, being applications, software, storage, among other services. Furthermore, understanding the current main technologies/architectures and their capabilities/limitations will play an important role in designing and developing the prospected solution. A thoroughly research will be produced to better define the criteria used in the process. Despite the fact that technology is able to be tailored up to a certain level for the organization needs, a higher level of participation will encourage vendors and architecture designers to develop a better knowledge on the companies’ desires, thus delivering more appropriate features to their unique needs

    CAESAR8: an agile enterprise architecture approach to managing information security risks in business change projects

    Get PDF
    Implementing an Enterprise Architecture (EA) should enable organizations to increase the accuracy of information security risk assessments. Studies show that EAs provide an holistic perspective that improves information security risk management (ISRM). However, many organizations have been unable or unwilling to fully implement EA frameworks. The requirements for implementation of an EA can be unclear, the full benefits of many commercial frameworks is uncertain and the overheads of creating and maintaining EA artifacts considered unacceptable, especially for organizations following agile business change programs or having limited resource. Following the Design Science Research methodology, this thesis describes a comprehensive and multidisciplinary approach to design a new model that can be used for the dynamic and holistic reviews of information security risks in business change projects. The model incorporates five novel design principles that are independent of any existing EA framework, security standard or maturity model. This new model is called CAESAR8 - Continuous Agile Enterprise Security Architecture Review in 8 domains. CAESAR8 incorporates key ISRM success factors that have been determined from root cause analysis of information security failures. Combining systems thinking with agile values and lean concepts into the design has ensured that the impact of a change is considered holistically and continuously, prioritizing the EA process over the creation of EA artifacts. Inclusion of human behavioral-science has allowed the capture of diverse and often tacit knowledge held by different stakeholders impacted by a business change, whilst avoiding the dangers of groupthink. CAESAR8’s presentation of the results provides an impactive and easy-to-interpret metric that is designed to be shared with senior business executives to improve intervention decisions. This thesis demonstrates how CAESAR8 has been developed into a working prototype and presents case studies that describe the model in operation. A diverse group of experts were given access to a working IT prototype for a hands-on evaluation of CAESAR8. An analysis of their findings confirms the model’s novel scientific contribution to ISRM

    Current established risk assessment methodologies and tools

    Get PDF
    The technology behind information systems evolves at an exponential rate, while at the same time becoming more and more ubiquitous. This brings with it an implicit rise in the average complexity of systems as well as the number of external interactions. In order to allow a proper assessment of the security of such (sub)systems, a whole arsenal of methodologies, methods and tools have been developed in recent years. However, most security auditors commonly use a very small subset of this collection, that best suits their needs. This thesis aims at uncovering the differences and limitations of the most common Risk Assessment frameworks, the conceptual models that support them, as well as the tools that implement them. This is done in order to gain a better understanding of the applicability of each method and/or tool and suggest guidelines to picking the most suitable one

    Energy Policy and International Competitiveness

    Get PDF
    This book is a collection of selected papers presented at the XVI Inforum World Conference organized by the European University of Lefke, North Cyprus, in September 2008. Inforum (Interindustry Forecasting Project at the University of Maryland) was founded in 1967 by Dr. Clopper Almon, now Professor Emeritus at the University of Maryland. At international level, partners build national econometric models for their own country sharing a common modelling approach based on a sectoral representation of the economy. The contributions presented here illustrate the wide variety of issues that can be explored using these models, with particular emphasis on energy policies and competitiveness analyses, which are very high on the agenda of policymakers worldwide

    Automation of the tax practice of the \u2790s;

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/1022/thumbnail.jp

    COSPO/CENDI Industry Day Conference

    Get PDF
    The conference's objective was to provide a forum where government information managers and industry information technology experts could have an open exchange and discuss their respective needs and compare them to the available, or soon to be available, solutions. Technical summaries and points of contact are provided for the following sessions: secure products, protocols, and encryption; information providers; electronic document management and publishing; information indexing, discovery, and retrieval (IIDR); automated language translators; IIDR - natural language capabilities; IIDR - advanced technologies; IIDR - distributed heterogeneous and large database support; and communications - speed, bandwidth, and wireless

    Towards interoperable e-Health system in Tanzania: analysis and evaluation of the current security trends and big data sharing dynamics

    Get PDF
    This research article published by the International Journal of Advanced Technology and Engineering Exploration (IJATEE), Volume-6 Issue-59 October-2019In this paper an insight on various e-health interoperable systems was reviewed to discover strengths and challenges faced during sustainable implementation. It covered local, national and regional coverage of integrated systems towards implementation of a single unified e-health system. Peer reviewed and grey literatures were consulted to discover global and local trend and efforts towards implementations of e-health interoperable systems. The available systems and frameworks from the European Union, Asia, America, Oceania and Africa were analyzed for their strengths and challenges. Various policies, guides as well as free and proprietary standards associated with e-health interoperability was reviewed to understand the common standards adopted by the majority of existing systems. The findings of the analysis are useful for policy makers on the best ways to implement interoperable systems in developing countries by focusing on the existing infrastructures and the environment. Similarly, the strengths and challenges encountered by interoperable systems were also examined to provide recommendations for future studies

    Challenges in Blockchain as a Solution for IoT Ecosystem Threats and Access Control: A Survey

    Full text link
    The Internet of Things (IoT) is increasingly influencing and transforming various aspects of our daily lives. Contrary to popular belief, it raises security and privacy issues as it is used to collect data from consumers or automated systems. Numerous articles are published that discuss issues like centralised control systems and potential alternatives like integration with blockchain. Although a few recent surveys focused on the challenges and solutions facing the IoT ecosystem, most of them did not concentrate on the threats, difficulties, or blockchain-based solutions. Additionally, none of them focused on blockchain and IoT integration challenges and attacks. In the context of the IoT ecosystem, overall security measures are very important to understand the overall challenges. This article summarises difficulties that have been outlined in numerous recent articles and articulates various attacks and security challenges in a variety of approaches, including blockchain-based solutions and so on. More clearly, this contribution consolidates threats, access control issues, and remedies in brief. In addition, this research has listed some attacks on public blockchain protocols with some real-life examples that can guide researchers in taking preventive measures for IoT use cases. Finally, a future research direction concludes the research gaps by analysing contemporary research contributions
    • …
    corecore