15,889 research outputs found

    Cyber-physical systems design for runtime trustworthiness maintenance supported by tools

    No full text
    The trustworthiness of cyber-physical systems is a critical factor for establishing wide-spread adoption of these systems. Hence, especially the behavior of safety-critical software components needs to be monitored and managed during system operation. Runtime trustworthiness maintenance should be planned and prepared in early requirements and design phases. This involves the identification of threats that may occur and affect user’s trust at runtime, as well as related controls that can be executed to mitigate the threats. Furthermore, observable and measureable system quality properties have to be identified as indicators of threats, and interfaces for reporting these properties as well as for executing controls have to be designed and implemented. This paper presents a process model for preparing and designing systems for runtime trustworthiness maintenance, which is supported by several tools that facilitate the tasks to be performed by requirements engineers and system designer

    A model for digital literacy enhancement through technology adoption in resource-constrained environments

    Get PDF
    The ubiquitous and pervasive nature of Information and Communication Technologies (ICT) fosters societies driven by knowledge rather than traditional capital and labour through the simplified socio-economic participation. No longer are individuals impacted by spatial and environmental conditions when conducting personal, community and even national obligations and duties. However, the effective use of ICT is governed by personal, interpersonal and environmental factors. Nowhere else is this impact more evident than in rural areas. Rural areas are plagued by a number of challenges which affect ICT use. Some of these challenges relate to the scarcity of income, education and infrastructure. A holistic investigation on the challenges experienced by rural areas was necessary. Based on the outcome of the investigation, rural areas were classified as resource-constrained environments. The study then set out to explore concepts that highlight the opportunities offered by ICT in rural areas and those that mitigate challenges posed by these environments on ICT use. The theoretical grounding of the concepts identified in the study firstly set out to understand and explain general ICT use, then extended this ICT use to rural areas. A conceptual model explaining challenges posed by resource constraints inherent in rural areas on ICT use was incepted. This conceptual model was empirically investigated for evaluation and validation purposes resulting in the final model of the study. The final model of the study facilitated the process of understanding and explaining the effective use of ICT in rural areas based on the inherent resource constraints in these environments. By mitigating the factors affecting ICT use in rural areas, the impact of effective ICT use can potentially be extended to resource-constrained environments, including rural areas.School of ComputingM. Sc. (Computing

    A proposed conceptual basis for mode 2 business and management research and development projects based on design science research principles

    Get PDF
    Due to progressing digitalisation and automatisation, the disciplines of Information Systems and Business / Management will increasingly be merging. It is assumed, therefore, that in Business and Management Research (BMR), there will be a greater demand for artefacts such as conceptual models, particularly in collaborative, Mode 2 research and development projects. Such endeavours require adequate conceptual frameworks, catering for diverse, creative and iterative steps including complementary (multi-)method application in order to handle complexity, uncertainty, user engagement and differing assumptions in a fast-paced environment. They need to be able to do this while rigorously addressing questions in their field or organisation of professionals. Design Science Research (DSR) has been suggested as an suitable approach to fulfil these needs. While numerous examples of applying DSR principles have been reported with respect to Information Systems Research (ISR), the application in BMR has so far been rather modest. This article presents a conceptual basis of DSR principles to apply in Mode 2 BMR artefact development projects, accompanied by a framework for a systematic quality evaluation. By doing so, the article contributes to the advancement of the emerging convergence of BMR and ISR by presenting guidelines embracing iterative and systematic procedures for BMR and ISR researchers

    An improved model of structural changes resulting from use of e-commerce

    Get PDF
    not availabl

    Research on conceptual modeling: Themes, topics, and introduction to the special issue

    Get PDF
    Conceptual modeling continues to evolve as researchers and practitioners reflect on the challenges of modeling and implementing data-intensive problems that appear in business and in science. These challenges of data modeling and representation are well-recognized in contemporary applications of big data, ontologies, and semantics, along with traditional efforts associated with methodologies, tools, and theory development. This introduction contains a review of some current research in conceptual modeling and identifies emerging themes. It also introduces the articles that comprise this special issue of papers from the 32nd International Conference on Conceptual Modeling (ER 2013).This article was supported, in part, by the J. Mack Robinson College of Business at the Georgia State University, the Marriott School of Management at Brigham Young University (EB-201313), and by the GEODAS-BI (TIN2012-37493-C03-03) project from the Spanish Ministry of Education and Competitivity

    Challenges in Cybersecurity and Privacy - the European Research Landscape

    Get PDF
    Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context, new holistic approaches, methodologies, techniques and tools are needed to cope with those issues, and mitigate cyberattacks, by employing novel cyber-situational awareness frameworks, risk analysis and modeling, threat intelligent systems, cyber-threat information sharing methods, advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition, novel privacy-preserving techniques, and crypto-privacy mechanisms, identity and eID management systems, trust services, and recommendations are needed to protect citizens’ privacy while keeping usability levels. The European Commission is addressing the challenge through different means, including the Horizon 2020 Research and Innovation program, thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues from a different perspective. Each chapter includes the project’s overviews and objectives, the particular challenges they are covering, research achievements on security and privacy, as well as the techniques, outcomes, and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields, and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely, the EU projects analyzed in the book are: ANASTACIA, SAINT, YAKSHA, FORTIKA, CYBECO, SISSDEN, CIPSEC, CS-AWARE. RED-Alert, Truessec.eu. ARIES, LIGHTest, CREDENTIAL, FutureTrust, LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects

    Learning systemic management practice

    Get PDF
    Systems thinking has been proposed as an answer to the question of how management practitioners can best equip themselves to tackle the complexity of management practice. As a body of work intended to transcend disciplinary silos, systems thinking pursues the ideal of generating comprehensive descriptions of real situations. It seeks to do this by embracing a variety of systems approaches and ideas to explain patterns and hypothesise causes of observable empirical events. As systems thinking is a diverse field, there are many knowledge areas and perspectives available to programme designers to facilitate teaching and the learning of systems thinking for management practice. The purpose of this study is to examine students' experience of learning events in the context of an interdisciplinary course designed for the development of management practice through systems thinking. Data was collected from three cohorts of students by observing lectures and class-based group work; and conducting interviews using conversational repertory grid techniques. The interview responses were analysed using grounded theory principles. Based on the findings derived from this qualitative analysis, the process of learning of systems thinking is outlined as a practice involving the selection and interpretation of events which evolve from the starting out phase, where students become interested in learning, and then outlines progress through the phases of assimilation and, changes in knowledge, culminating in more complex learning phases described as integration and adaptation. The synthesis of these phenomena as a theory provided an answer to the primary research objective of investigating how students experience learning events designed to develop systemic management practice. Critical realism, following Bhaskar's philosophy, is used to frame explanations to extend the grounded theory analysis, seeking to account for generative mechanisms that enable and constrain student experience with respect to systems thinking development. As a secondary contribution, this informed the identification of possible mechanisms and emergent properties at the level of the course through an analytical separation of the academic and work environments. These included the discourse of the context of application, academic discourse and professional identity. In combination, these findings make a contribution to understanding the learning of systemic management practice. In addition, applications for this research are suggested for educators, managers and organisations. These applications include: 1) a framework to help educators design meaningful experiences for learners; 2) a basis for understanding what constitutes systemic management practice and explaining differential development; 3) establishment of a basis for understanding what is needed for organisations to support the development of systemic management practice

    Bridging the gap between human and machine trust : applying methods of user-centred design and usability to computer security

    Get PDF
    This work presents methods for improving the usability of security. The work focuses on trust as part of computer security. Methods of usability and user-centred design present an essential starting point for the research. The work uses the methods these fields provide to investigate differences between machine and human trust, as well as how the technical expressions of trust could be made more usable by applying these methods. The thesis is based on nine publications, which present various possibilities to research trust with user-centric methods. The publications proceed chronologically and logically from the first user interviews about trust, trusting attitudes and behaviours in general to the actual design and usability testing of user interfaces for security applications, finally presenting the outcomes and conclusions of the research. The work also presents a review of relevant previous work in the area, concentrating on work done in the fields of usability and user-centred design. The work is of cross-disciplinary nature, falling into the areas of human-computer interaction, computer science and telecommunications. The ultimate goal of the conducted research has been to find out 1) how trust is to be understood in this context; 2) what methods can be used to gain insight into trust thus defined; and, finally, 3) what means can be used to create trust in the end users in online situations, where trust is needed. The work aims at providing insight into how trust can be studied with the methods provided by user-centred design and usability. Further, it investigates how to take understanding of trust formation in humans into account when attempting to design trust-inducing systems and applications. The work includes an analysis and comparison of the methods used: what kinds of methods to study trust exist in the field of usability and user-centred design. Further, it is evaluated, what kind of results and when can be reached with the different methods available, by applying a variety of these methods. Recommendations for the appropriate application of these methods when studying the various parts of trust is one of the outcomes. The results received with the methods used have also been compared with results received by others by applying alternative methods to the same research questions. On a conceptual level, the work contains an analysis of the concept of trust. It also contains a brief investigation into both technical and humane ways to express trust, with a comparison between the two
    corecore