28,355 research outputs found

    Toward optimal multi-objective models of network security: Survey

    Get PDF
    Information security is an important aspect of a successful business today. However, financial difficulties and budget cuts create a problem of selecting appropriate security measures and keeping networked systems up and running. Economic models proposed in the literature do not address the challenging problem of security countermeasure selection. We have made a classification of security models, which can be used to harden a system in a cost effective manner based on the methodologies used. In addition, we have specified the challenges of the simplified risk assessment approaches used in the economic models and have made recommendations how the challenges can be addressed in order to support decision makers

    Towards optimal multi-objective models of network security: survey

    Get PDF
    Information security is an important aspect of a successful business today. However, financial difficulties and budget cuts create a problem of selecting appropriate security measures and keeping networked systems up and running. Economic models proposed in the literature do not address the challenging problem of security countermeasure selection. We have made a classification of security models, which can be used to harden a system in a cost effective manner based on the methodologies used. In addition, we have specified the challenges of the simplified risk assessment approaches used in the economic models and have made recommendations how the challenges can be addressed in order to support decision makers

    A sector analysis for RFID technologies: fundamental and technical analysis for financial decision making problems

    Get PDF
    Automatic identification technologies have been used in a wide range of applications for reducing the amount of time and labor needed to input data and improving data accuracy. As an important automatic identification technology, radio frequency identification (RFID) technologies allow contactless reading and these technologies are particularly successful in manufacturing and other environments where traditional identification technologies such as bar codes can not perform well. By integrating the RFID technology into their business models, companies may save time, lower labor cost, improve products quality and provide better service. RFID is the wireless technology that uses RF communication to identify, track and manage objects and collect and store data. RFID technology enables companies to develop applications that create value by tracking and identifying objects, animals or people. Business applications of RFID technology can be seen in areas such as manufacturing, supply chain management, software integration, security systems, asset tracking and many others. RFID technology was predicted to be one of the “top ten” technologies in 2004 by CNN. Although, the RFID market is less than five years old, it has been applied to many different industries, from retail industry to logistics, or from healthcare to service business industry – and it is still growing. Particularly, RFID has fundamental influences on today's retailing and supply chain management for applications like asset tracking the inventory control and management. RFID technology also finds major application in mobile phones and is widely used in toll collection of highways, for payments in restaurants, vending machines, retail and parking lots. There are a wide range of RFID systems currently being used or being developed. Examples to these systems include but not limited to the following; automatic vehicle and personnel access control for security (Simpson, 2006), airport passenger and baggage tracking (Ferguson, 2006), tracing blood for cutting down errors such as giving patients wrong blood types (Ranger, 2006), payment process systems (Ramachandran, 2006), production control in manufacturing (Liu & Miao, 2006), transfusion medicine (Knels, 2006) real-time inventory control by automated identification of items in warehouses, tracking and management of physical files, tracking of books in the libraries (Shadid, 2005). For some other applications, interested reader is referred to (Finkenzeller, 2003; Smith, 2004). RFID solution providers claim that their technology and solutions bring significant benefits and have valuable advantages in practice. As new RFID solutions being developed and more RFID tags and equipments being used, these solutions will become more cost effective and RFID businesses are expected to grow rapidly. Since RFID is fairly new, it’s difficult to measure resulting sales increases or heightened customer satisfaction quotients. On the other hand, according to IDC estimation (IDC is a subsidiary of International Data Group, a leading technology media, research, and events company and provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets), companies in the retail sector will spend nearly 1.3billiononRFIDintheirsupplychainoperationsin2008,comparedtoabout1.3 billion on RFID in their supply chain operations in 2008, compared to about 91.5 million in 2003 which corresponds to annual growth rate of 70 percent. In a similar look; the Wireless Data Research Group projected that the global market for RFID increased from 1billionin2003to1 billion in 2003 to 3 billion in 2007 (Asif & Mandviwalla, 2005). There are two major drivers of this growth. The first one is the adoption of RFID technology by major retailers and government agencies. The second one is the reduction in the price of RFID tags, readers, and IT systems required to deploy RFID. Given the huge potential of RFID technology, there has been a huge emergence of RFID specialty companies and the development of RFID practices within many market-leading companies. Due to huge emergence, it is desirable to make a sector analysis. In this study, we perform a sector analysis for RFID technologies for researchers and analysts. We investigate public RFID companies traded on the stock exchange markets, summarize their financial performance, describe their RF products, services, and applications, and perform fundamental and technical analysis

    A hybrid Delphi-SWOT paradigm for oil and gas pipeline strategic planning in Caspian Sea basin

    Get PDF
    The Caspian Sea basin holds large quantities of both oil and natural gas that could help meet the increasing global demand for energy resources. Consequently, the oil and gas potential of the region has attracted the attention of the international oil and gas industry. The key to realizing the energy producing potential of the region is the development of transnational export routes to take oil and gas from the landlocked Caspian Sea basin to world markets. The evaluation and selection of alternative transnational export routes is a complex multi-criteria problem with conflicting objectives. The decision makers (DMs) are required to consider a vast amount of information concerning internal strengths and weaknesses of the alternative routes as well as external opportunities and threats to them. This paper presents a hybrid model that combines strength, weakness, opportunity and threat (SWOT) analysis with the Delphi metho

    Solving Organisational Problems with Intranet Technology

    Get PDF
    Information serves as an essential intermediate input in decision-making for any business process. It is an essential requirement not only for effective and efficient management but also for medium and long term planning. In this era of technological advancement the rapid growth of information flow has contributed significantly in the expansion of business, commercial, industrial, financial, educational and research organisations. Electronic communication provides the ability to overcome many organisational problems. In recent years, an easy and inexpensive access to information through the Internet and e-mail has created an atmosphere of strong competition among organisations. In this competitive environment, the organisations need an efficient, productive and competent internal set-up based on a well-informed workforce. In the absence of effective co-ordination, the expansion of an organisation may result in inter-group conflicts, unhealthy bureaucratic activities, and various complexities in decision-making [Telleen (1996)]. This applies even more to organisations in developing countries such as Pakistan that are in need of efficient ways to improve governance and enhance institutional reforms.

    The Economics of Information Technology in Public Sector Health Facilities in Developing Countries: The Case of South Africa

    Get PDF
    The public healthcare sector in developing countries face many challenges, including weak healthcare systems and under resourced facilities that deliver poor outcomes relative to total healthcare expenditure. Healthcare delivery, access to healthcare and cost containment has the potential for improvement through more efficient healthcare resource management. Global references demonstrate that information technology (IT) has the ability to assist in this regard through the automation of processes, thus reducing the inefficiencies of manually driven processes and lowering transaction costs. This study examines the impact of new systems implementations on service delivery, user adoption and organizational culture within the hospital setting in South Africa, as perceived by doctors, nurses and hospital administrators. The research provides some insight into the reasons for investing in system automation, the associated outcomes, and organiztional factors that impact the successful adoption of IT systems. In addition, it finds that sustainable success in these initiatives is as much a function of the technology as it is of the change management function that must accompany the system implementation.Hospital information systems; healthcare management; electronic health records; South Africa, mixed methods

    RFID in the supply chain: lessons from European early adopters

    Get PDF
    Purpose Radio frequency identification (RFID) is increasingly being presented as a technology with the potential to improve supply chain performance, but empirical evidence from early adopters is sparse. This paper aims to rectify this scarcity and contribute to a more informed discussion in and between academic and practitioner communities. Design/Methodology/Approach The paper is based on a conceptual model of factors influencing the success of adoption efforts. It then reports the results of a survey of 612 European supply chain managers, focusing on the 128 respondents who have begun RFID trials. Findings A significant influence on operational deployment is the presence of mandates from key customers requiring the technology’s use. Customer mandates also impact the anticipated benefits of a faster sales cycle and of enhanced systems integration, though the relationships are complex. By contrast, greater cost reduction benefits are anticipated in two industries where mandates are less common – industrial goods and logistics. Perceived organizational innovativeness positively impacts anticipated ROI from RFID. Companies adopting a ‘slap and ship’ approach are less likely to anticipate pricing benefits than those integrating RFID into enterprise systems Research Limitations/Implications The limitations of the paper include the limited sample size of early adopters. In addition, qualitative research is needed into RFID supply chain applications and into different approaches to IS integration of RFID, to inform future survey work. Practical Implications This paper informs supply chain managers and senior decision makers who are examining the potential of RFID technology. It offers guidance on what issues to look for when adopting this technology, approaches to take and the benefits that might be accrued. Originality/Valuer This paper offers a major contribution to understanding the current status of the adoption of RFID in European supply chains. This understanding is put in the context of the wider literatures on supply chain management and the adoption of information systems and te
    corecore