38,182 research outputs found
Future consumer mobile phone security: a case study using the data centric security model
In the interconnected world that we live in, traditional security barriers are\ud
broken down. Developments such as outsourcing, increased usage of mobile\ud
devices and wireless networks each cause new security problems.\ud
To address the new security threats, a number of solutions have been suggested,\ud
mostly aiming at securing data rather than whole systems or networks.\ud
However, these visions (such as proposed by the Jericho Forum [9] and IBM\ud
[4]) are mostly concerned with large (inter-) enterprise systems. Until now, it is\ud
unclear what data-centric security could mean for other systems and environments.\ud
One particular category of systems that has been neglected is that of\ud
consumer mobile phones. Currently, data security is usually limited to a PIN\ud
number on startup and the option to disable wireless connections. The lack of\ud
protection does not seem justified, as these devices have steadily increased in\ud
capabilities and capacity; they can connect wirelessly to the Internet and have\ud
a high risk of being lost or stolen [8]. This not only puts end users at risk, but\ud
also their contacts, as phones can contain privacy sensitive data of many others.\ud
For example, if birth dates and addresses are kept with the contact records, in\ud
many cases a thief will have enough information to impersonate a contact and\ud
steal his identity.\ud
Could consumer mobile phones benefit from data-centric security? How\ud
useful is data-centric security in this context? These are the core questions we\ud
will try to address here
Integration of BPM systems
New technologies have emerged to support the global economy where for instance suppliers, manufactures and retailers are working together in order to minimise the cost and
maximise efficiency. One of the technologies that has become a buzz word for many businesses is business process management or BPM. A business process comprises activities
and tasks, the resources required to perform each task, and the business rules linking these activities and tasks. The tasks may be performed by human and/or machine actors.
Workflow provides a way of describing the order of execution and the dependent relationships between the constituting activities of short or long running processes.
Workflow allows businesses to capture not only the information but also the processes that transform the information - the process asset (Koulopoulos, T. M., 1995). Applications which involve automated, human-centric and collaborative processes across organisations are
inherently different from one organisation to another. Even within the same organisation but over time, applications are adapted as ongoing change to the business processes is seen as the norm in todayās dynamic business environment. The major difference lies in the specifics of business processes which are changing rapidly in order to match the way in which businesses operate. In this chapter we introduce and discuss Business Process Management (BPM) with a focus on the integration of heterogeneous BPM systems across multiple organisations. We identify the problems and the main challenges not only with regards to technologies but also in the social and cultural context. We also discuss the issues that have arisen in our bid to find the solutions
Knowledge-Intensive Processes: Characteristics, Requirements and Analysis of Contemporary Approaches
Engineering of knowledge-intensive processes (KiPs) is far from being mastered, since they are genuinely knowledge- and data-centric, and require substantial flexibility, at both design- and run-time. In this work, starting from a scientific literature analysis in the area of KiPs and from three real-world domains and application scenarios, we provide a precise characterization of KiPs. Furthermore, we devise some general requirements related to KiPs management and execution. Such requirements contribute to the definition of an evaluation framework to assess current system support for KiPs. To this end, we present a critical analysis on a number of existing process-oriented approaches by discussing their efficacy against the requirements
Towards a pivotal-based approach for business process alignment.
This article focuses on business process engineering, especially on alignment between business analysis and implementation. Through a business process management approach, different transformations interfere with process models in order to make them executable. To keep the consistency of process model from business model to IT model, we propose a pivotal metamodel-centric methodology. It aims at keeping or giving all requisite structural and semantic data needed to perform such transformations without loss of information. Through this we can ensure the alignment between business and IT. This article describes the concept of pivotal metamodel and proposes a methodology using such an approach. In addition, we present an example and the resulting benefits
When Things Matter: A Data-Centric View of the Internet of Things
With the recent advances in radio-frequency identification (RFID), low-cost
wireless sensor devices, and Web technologies, the Internet of Things (IoT)
approach has gained momentum in connecting everyday objects to the Internet and
facilitating machine-to-human and machine-to-machine communication with the
physical world. While IoT offers the capability to connect and integrate both
digital and physical entities, enabling a whole new class of applications and
services, several significant challenges need to be addressed before these
applications and services can be fully realized. A fundamental challenge
centers around managing IoT data, typically produced in dynamic and volatile
environments, which is not only extremely large in scale and volume, but also
noisy, and continuous. This article surveys the main techniques and
state-of-the-art research efforts in IoT from data-centric perspectives,
including data stream processing, data storage models, complex event
processing, and searching in IoT. Open research issues for IoT data management
are also discussed
Human-Centric Program Synthesis
Program synthesis techniques offer significant new capabilities in searching for programs that satisfy high-level specifications. While synthesis has been thoroughly explored for input/output pair specifications (programming-by-example), this paper asks: what does program synthesis look like beyond examples? What actual issues in day-to-day development would stand to benefit the most from synthesis? How can a human-centric perspective inform the exploration of alternative specification languages for synthesis? I sketch a human-centric vision for program synthesis where programmers explore and learn languages and APIs aided by a synthesis tool
Recommended from our members
The Trans-Pacific Partnership Agreement
[Excerpt] The economic and strategic architectures of Asia are evolving. One part of this evolving architecture is the Trans-Pacific Partnership Agreement (TPP), a free trade agreement that includes nations on both sides of the Pacific. The existing TPP, which originally came into effect in 2006, consists of Brunei, Chile, New Zealand, and Singapore. The United States, Australia, Peru, and Vietnam have committed themselves to joining and expanding this group. The third round of discussions among the eight countries took place in Brunei, during the week of October 4, 2010. The third round saw the formal inclusion of Malaysia in the negotiations.
Other architectures, such as the Association of South East Asian Nations (ASEAN), Asia-Pacific Economic Cooperation (APEC) forum, and the East Asia Summit (EAS) have both economic and strategic aspects. They can be grouped into two categories: (1) groupings that are Asia-centric in approach or origins and exclude the United States, and (2) those that are Trans-Pacific in nature and that include, or would include, the United States and other Western Hemispheric nations. The TPP is one vehicle that could be used to shape the U.S. agenda with the region. The United States, by signaling its intention to join the EAS and by working to elevate its relationship with ASEAN to a more strategic level, appears to be shaping regional architectures in a way that will be more inclusive and trans-Pacific in nature.
Asia is viewed as of vital importance to U.S. trade and security interests. According to the U.S. Trade Representative, the Asia-Pacific region is a key driver of global economic growth and accounts for nearly 60% of global GDP and roughly 50% of international trade. Since 1990, Asia-Pacific goods trade has increased 300% while there has been a 400% increase in global investment in the region. The United States has pursued its regional trade interests both bilaterally and through multilateral groupings such as APEC, which has linked the Western Hemisphere with Asia. There appears to be a correlation between increasing intra-regional economic activity and increasing intra-regional political and diplomatic cooperation. Many observers view the more recent intra-Asian Association of Southeast Asian States (ASEAN) plus threeāChina, Japan, South Koreaāand the ASEAN plus six (also known as the East Asia Summit)āChina, Japan, South Korea, India, Australia, New Zealandāgroups as having attracted more interest within the region in recent years. China\u27s rapidly expanding economy and Japan\u27s developed economy have made them attractive trading partners to many Asian nations. Until recently, many regional states also viewed the United States as having been distracted by events in Iraq and Afghanistaa This had led some to increasingly look to China and Japan as key partners. China may be shifting to a more assertive posture in the region, which may affect relations in the region. Secretary of State Clinton attended the East Asia Summit in Hanoi in October 2010 and President Obama stated he plans to attend the 2011 East Asia Summit in Jakarta.
U.S. participation in the TPP involves the negotiation of FTAs with New Zealand, Brunei, Malaysia, and potentially, Vietnam. The United States currently has FTAs in force with Chile, Singapore, Australia, and Peru. Bilateral negotiations with New Zealand may focus on agricultural goods such as beef and dairy products. The possible inclusion of Vietnam has proven controversial from the standpoint of certain U.S. industry groups, such as textiles and apparel, as well as those concerned with labor, human rights and intellectual property issues. The involvement of Vietnam could add a higher level of difficulty, yet is illustrative of the challenges associated with developing a truly Asia-Pacific-wide trade grouping. All the potential parties may face complex negotiations in integrating the myriad FTAs that already exist between some TPP parties
Recommended from our members
Multi-channel customer management: A case study in Egypt
Channel management is one CRM systems component much influenced by the behaviour of customers in relation to the implementation and use of channel management CRM component. The consumersā behaviours, preferences, perceptions and expectations are crucial for the implementation and use of channel management. Customersā contact with the organizationās multi-channels can occur at several touch points through out customer lifecycle. Customersā behaviours may be differentiated according to the individual or micro level, but it might also differ at an ecological or macro level of analysis (Ramaseshan et al., 2006). In this paper the author has conducted a case study in Egypt to analyze customersā behaviours at a macro level and customers channel choices, through out the customer lifecycle. The author has used a Structurational Analysis model (Ali and Brooks, 2008) to identify the cultural factors (Ali, et al. 2008) that influence the multi-channel customer management in Egypt
- ā¦