88 research outputs found

    Framework for a business interoperability quotient measurement model

    Get PDF
    Dissertação apresentada na Faculdade de Ciências e Tecnologia da Universidade Nova da Lisboa para obtenção do grau de Mestre em Engenharia e Gestão Industrial (MEGI)Over the last decade the context of Interoperability has been changing rapidly. It has been expanding from the largely technically focused area of Information Systems towards Business Processes and Business Semantics. However, there exists a need for more comprehensive ways to define business interoperability and enable its performance measurement as a first step towards improvement of interoperability conditions between collaborating entities. Through extensive literature reviews and analysis of European Research initiatives in this area, this dissertation presents the State of the Art in Business Interoperability. The objective of this dissertation is to develop a model that closely captures the factors that are responsible for Business Interoperability in the context of Collaborative Business Processes. This Business Interoperability Quotient Measurement Model (BIQMM), developed in this dissertation uses an interdisciplinary approach to capture the key elements responsible for collaboration performance. Through the quantification of the relevance of each element to the particular collaboration scenario in question, this model enables a quantitative analysis of Business Interoperability, so that an overall interoperability score can be arrived at for enhanced performance measurements.Finally, the BIQMM is applied to a business case involving Innovayt and LM Glassfiber to demonstrate its applicability to different collaboration scenarios

    Analysis of Blockchain-Based Security Solutions for IoT Communication Networks

    Get PDF
    In recent years, the concept of blockchain technology has garnered substantial attention owing to its pivotal role as the underlying innovation powering cryptocurrencies such as Bitcoin. This surge in interest is particularly notable due to the manifold applications of blockchain technology across diverse domains, including but not limited to, bolstering the security landscape of the Internet of Things (IoT), fortifying the banking sector, optimizing industrial operations, and enhancing clinical establishments. Furthermore, the IoT paradigm has witnessed exponential growth in its adoption, primarily attributed to its seamless integration within smart homes and urban infrastructure projects on a global scale. However, a notable drawback within IoT lies in the inherent limitations of processing power, constrained data storage capacities, and limited network bandwidth of IoT devices. Because of these limitations, IoT devices stand more vulnerable to various forms of cyberattacks in comparison to their counterparts such as smartphones, tablets, or personal computers. This scholarly paper critically delves into the profound security challenges prevalent within the IoT ecosystem and meticulously examines the intricacies of addressing these challenges through the integration of blockchain technology. Additionally, this study identifies and elucidates certain dimensions that remain inadequately covered by existing blockchain implementations in IoT security contexts. Through this comprehensive exploration, the research aims to contribute to a deeper understanding of the potential and limitations of blockchain in fortifying IoT security, shedding light on unexplored avenues and underscoring the imperatives for future research and technological enhancements

    Privacy In The Smart Grid: An Information Flow Analysis

    Get PDF
    Project Final Report prepared for CIEE and California Energy Commissio

    The Influence of Technology on Long-Term Care Systems

    Get PDF
    New technologies may have a beneficial impact on long-term care (LTC) systems by improving the quality, effectiveness and efficiency of LTC provision, and even by decreasing the need for LTC in the first place. Given the great uncertainty about the diffusion and implementation of available technology, there is little point in trying to make quantitative forecasts about the impact of technology. A more useful approach is to study the mechanisms through which technology can have an impact on LTC. This is the subject of Work Package 4 of the ANCIEN project. Both generally and via a number of case studies, it develops a framework to analyse the impact of technology on LTC. The functioning of this framework is illustrated by considering a number of specific long-term conditions, such as dementia, obesity and diabetes

    Information Security Strategy in Organisations: Review, Discussion and Future Research Directions

    Get PDF
    Dependence on information, including for some of the world’s largest organisations such as governments and multi-national corporations, has grown rapidly in recent years. However, reports of information security breaches and their associated consequences continue to indicate that attacks are still escalating on organisations when conducting these information-based activities. Clearly, more research is needed to better understand how organisations should formulate strategy to secure their information. Through a thematic review of academic security literature, we (1) analyse the antecedent conditions that motivate the potential adoption of a comprehensive information security strategy, (2) the current perspectives of strategy and (3) the yields and benefits that could be enjoyed post-adoption. Our contributions include a definition of information security strategy. We argue for a paradigm shift to extend from internally-focussed protection of organisation-wide information towards a strategic view that considers the inter-organisational level. Our findings are then used to suggest future research directions

    A qualitative cybersecurity analysis of time-triggered communication networks in automotive systems

    Get PDF
    © 2023 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY license. (http://creativecommons.org/licenses/by/4.0/).Security is gaining increasing importance in automotive systems, driven by technical innovations. For example, automotive vehicles become more open systems, allowing the communication with other traffic participants and road infrastructure. Also, automotive vehicles are provided with increased autonomy which raises severe safety concerns, and consequently also security concerns – both concerns that interweave in such systems. In this paper we present a qualitative cybersecurity analysis by comparing different time-triggered (TT) communication networks. While TT communication networks have been analysed extensively for dependability, the contribution of this work is to identify security-related benefits that TT communication networks can provide. In particular, their mechanisms for spacial and temporal encapsulation of network traffic are instrumental to improve network security. The security arguments can be used as a design guide for implementing critical communication in flexible network standards like TSN.Peer reviewe

    The Power of Models: Modeling Power Consumption for IoT devices

    Get PDF
    Low-energy technologies in the Internet of Things (IoTs) era are still unable to provide the reliability needed by the industrial world, particularly in terms of the wireless operation that pervasive deployments demand. While the industrial wireless performance has achieved an acceptable degree in communications, it is no easy task to determine an efficient energy-dimensioning of the device in order to meet the application requirements. This is especially true in the face of the uncertainty inherent in energy harvesting. Thus, it is of utmost importance to model and dimension the energy consumption of the IoT applications at the pre-deployment or pre-production stages, especially when considering critical factors, such as reduced cost, life-time, and available energy. This paper presents a comprehensive model for the power consumption of wireless sensor nodes. The model takes a system-level perspective to account for all energy expenditures: communications, acquisition and processing. Furthermore, it is based only on parameters that can empirically be quantified once the platform (i.e., technology) and the application (i.e., operating conditions) are defined. This results in a new framework for studying and analyzing the energy life-cycles in applications, and it is suitable for determining in advance the specific weight of application parameters, as well as for understanding the tolerance margins and tradeoffs in the system

    Computer-based exams in schools: Freedom from the limitations of paper?

    Get PDF
    There is little doubt that the curriculum content and pedagogy in schools is driven by the structure and forms of assessment employed, particularly for summative purposes. When most such assessment was limited to what a student could do with a pen and paper in short ‘exams’ this pushed the content of the curriculum towards small descriptive chunks, and the pedagogy towards memorisation and replication techniques. Over the past two decades alternative forms of assessment supported by the power of computer systems have been conceived and tried. This paper discusses progress towards various forms of computer-based exams and how these may encourage curriculum and pedagogy suited to 21st Century learning. In particular it draws attention to research I have led to investigate the feasibility of a number of forms of computer-based exams for high-stakes summative assessment in secondary education. The result was the successful development and implementation of audiovisual stimuli and response computer-based exams, and digital production exams resulting in portfolios of evidence. Each implemented form of exam was tested for feasibility to ensure a defensible balance of manageability, reliability and validity. I believe that for most highstakes summative assessment in Australian schools it is time to replace the ancient paper-based technology with computer-based technologies

    New Media Consumption, Electorate's Political Participation and Candidates' Preference during 2019 Presidential Election in Oyo State, Nigeria

    Get PDF
    The incorporation of new media has widened the electorates’ horizons of political participation during Nigeria's electioneering process. These new media platforms such as whatapp, Facebook, Instagram, digital billboards and others have become ingrained in electioneering in recent Nigerian Politics. This study used Technological Determinism Theory. This study investigates New Media Consumption, Electorate Political Participation and Candidate Preference during 2019 Presidential Election in Oyo State. The study adopted survey methods research design. Snowball sampling technique was employed to collect the needed data for the study. Sample Size of 400 respondents was drawn from a population of 2,934,107 registered voters for the general elections in Oyo State. Data was collected through the use of structured close ended questionnaire. Descriptive Statistics were used to statically analyze the data collected for the study using statistical package for social science. Findings showed that Twitter and Whatapp were dominant new media platforms through which the electorate in Oyo State got engaged with politicians. Many of the respondents voted for their preferred candidates during elections as a result of what politicians posted on new media platforms. Participations in elections by the electorates were also as a result of engagement by politicians on new media platforms. However, affordability of data subscription are major challenges that the electorates encountered to ultimately be active on the new media platforms during the 2019 Presidential elections in Oyo State. The study recommended that politicians should develop websites that will be pretty much interactive, informative, dynamic to disseminate information about their activities during elections
    • …
    corecore