86 research outputs found

    The Trajectory of IT in Healthcare at HICSS: A Literature Review, Analysis, and Future Directions

    Get PDF
    Research has extensively demonstrated that healthcare industry has rapidly implemented and adopted information technology in recent years. Research in health information technology (HIT), which represents a major component of the Hawaii International Conference on System Sciences, demonstrates similar findings. In this paper, review the literature to better understand the work on HIT that researchers have conducted in HICSS from 2008 to 2017. In doing so, we identify themes, methods, technology types, research populations, context, and emerged research gaps from the reviewed literature. With much change and development in the HIT field and varying levels of adoption, this review uncovers, catalogs, and analyzes the research in HIT at HICSS in this ten-year period and provides future directions for research in the field

    Fog computing pour l'intégration d'agents et de services Web dans un middleware réflexif autonome

    Get PDF
    International audienceService Oriented Architecture (SOA) has emerged as a dominant architecture for interoperability between applications, by using a weak-coupled model based on the flexibility provided by Web Services, which has led to a wide range of applications, what is known as cloud computing. On the other hand, Multi-Agent System (MAS) is widely used in the industry, because it provides an appropriate solution to complex problems, in a proactive and intelligent way. Specifically, Intelligent Environments (Smart City, Smart Classroom, Cyber Physical System, and Smart Factory, among others) obtain great benefits by using both architectures, because MAS endows intelligence to the environment, while SOA enables users to interact with cloud services, which improve the capabilities of the devices deployed in the environment. Additionally, the fog computing paradigm extends the cloud computing paradigm to be closer to the things that produce and act on the intelligent environment, allowing to deal with issues like mobility, real time, low latency, geo-localization, among other aspects. In this sense, in this article we present a middleware, which not only is capable of allowing MAS and SOA to communicate in a bidirectional and transparent way, but also, it uses the fog computing paradigm autonomously, according to the context and to the system load factor. Additionally, we analyze the performance of the incorporation of the fog-computing paradigm in our middleware and compare it with other works

    Managing social capital as knowledge management – some specification and representation issues.

    Get PDF
    ‘Classic’ accounts of social capital have emergedin accounts of stable networks or institutionalenvironments. These conditions do not apply inthe case of many firms – a case in point beingsmall firm networks that rely on rapid turnover ofprojects. Our research team is attempting toidentify how social capital is manifest in thesecontexts, and thus to make suggestions forbuilding, maintaining and refreshing such capital.We present work to date that converts this type oftacit knowledge into sets of explicit andmanageable local data, and provide examples ofinformation visualizations for profiling andretrieval that support the management of socialcapital

    A flow-based multi-agent data exfiltration detection architecture for ultra-low latency networks

    Get PDF
    This is an accepted manuscript of an article published by ACM in ACM Transactions on Internet Technology on 16/07/2021, available online: https://dl.acm.org/doi/10.1145/3419103 The accepted version of the publication may differ from the final published version.Modern network infrastructures host converged applications that demand rapid elasticity of services, increased security and ultra-fast reaction times. The Tactile Internet promises to facilitate the delivery of these services while enabling new economies of scale for high-fdelity of machine-to-machine and human-to-machine interactions. Unavoidably, critical mission systems served by the Tactile Internet manifest high-demands not only for high speed and reliable communications but equally, the ability to rapidly identify and mitigate threats and vulnerabilities. This paper proposes a novel Multi-Agent Data Exfltration Detector Architecture (MADEX) inspired by the mechanisms and features present in the human immune system. MADEX seeks to identify data exfltration activities performed by evasive and stealthy malware that hides malicious trafc from an infected host in low-latency networks. Our approach uses cross-network trafc information collected by agents to efectively identify unknown illicit connections by an operating system subverted. MADEX does not require prior knowledge of the characteristics or behaviour of the malicious code or a dedicated access to a knowledge repository. We tested the performance of MADEX in terms of its capacity to handle real-time data and the sensitivity of our algorithm’s classifcation when exposed to malicious trafc. Experimental evaluation results show that MADEX achieved 99.97% sensitivity, 98.78% accuracy and an error rate of 1.21% when compared to its best rivals. We created a second version of MADEX, called MADEX level 2 that further improves its overall performance with a slight increase in computational complexity. We argue for the suitability of MADEX level 1 in non-critical environments, while MADEX level 2 can be used to avoid data exfltration in critical mission systems. To the best of our knowledge, this is the frst article in the literature that addresses the detection of rootkits real-time in an agnostic way using an artifcial immune system approach while it satisfes strict latency requirements

    Katsaus tekoÀlyyn : tekoÀly ja sen sovellutukset

    Get PDF
    Postgraduate seminar series with a title artificial intelligence and logic held at the Department of Military Technology of the National Defence University in 2020 and 2021. This book is a collection of some of talks that were presented in the seminar. The papers address ethics in autonomous military technology, algorithmic thinking, application of fuzzy logic in the Armed Forces, logic and skill, use of artificial intelligence technologies in information and psychological warfare, cyber security risks of artificial intelligence applications and algorithms, information acquisition strategies and artificial intelligence to support learning. This set of papers tries to give some insight to current issues of the artificial intelligence and logic. Seminars at the Department of Military Technology have a tradition to make publication based on the presentations, but only as an internal publication of the Finnish Defence Forces and in such a way has not hindered publication of the papers e.g. in international conferences. Publication of these papers in peer reviewed conferences has indeed been always the goal of the seminar, since it teaches writing conference level papers. We still hope that an internal publication in the department series is useful to the Finnish Defence Forces by offering an easy access to these papers

    Management and Services

    Get PDF
    Management in all business areas and organisational activities are the acts of getting people together to accomplish desired goals and objectives. Service is intangible, therefore, it is not too easy to define the theory application in varieties of service industries. Service Management usually incorporates automated systems along with skilled labour; it also provides service development. Due to enormous demand of service industries and management development, the book under the title "Management and Services" would create a milestone in management arena for all categories of readers including Business Administration, Engineering and Architecture. This book covers educational service development, service-oriented-architecture and case research analysis, including theory application in network security, GRID technology, integrated circuit application. The book is comprised of five chapters and has been divided into two parts. Part A contains chapters on service development in educational institutions and it depicts the application of supply chain management concept in service industries like tertiary educational institutions and multiple ways of web 2.0 applications transforming learning patterns and pathways. To understand the subject in a practical manner, Part B of this book consists of noteworthy case studies and research papers on management and services and represents theory application of Data mining, Fuzzy Cluster, Game theory, GRID Technology, simulation of Operational Amplifier and Current Controlled Conveyor II in network security, architecture, and integrated circuit application

    Veröffentlichungen und VortrĂ€ge 2001 der Mitglieder der FakultĂ€t fĂŒr Informatik

    Get PDF

    A model for it practitioners’ participation in it governance initiatives

    Get PDF
    Information Technology (IT) governance has received increasing attention in the recent years. However, participation of IT practitioners continues to be the weakest link in IT governance. The objectives of the research are to assess the current situation of IT governance from the perspective of IT practitioners, to develop a model that identifies the relationship between attitudes, subjective norms, perceived behavioural control, participation and perceived IT governance effectiveness, to identify differences in perceived IT governance effectiveness between groups of IT practitioners having differences in job function, education level, education area of specialisation, certification and experience level, and to measure the influence on their participation in IT governance initiatives and perceived IT governance effectiveness. To achieve these objectives, this study employed a sequential explanatory mixed methods approach, in which the quantitative approach guided by the Theory of Planned Behaviour (TPB) was followed by a qualitative inquiry. Quantitative data were gathered through on-line survey among IT practitioners in Multimedia Super Corridor (MSC) status companies. Semi-structured interviews were conducted among IT practitioners in one IT end-user organisation to explain findings from the quantitative inquiry. The results showed that there was a difference in the perceived IT governance effectiveness for job function, but not for education level, certification or experience level. Subjective norms and perceived behavioural control resulted in greater participation in IT governance initiatives. Conversely, attitudes did not insignificantly influence participation in IT governance initiatives. Participation in IT governance initiatives resulted in higher perceived IT governance effectiveness. The qualitative inquiry study suggested three emergent themes, which are the IT practitioners’ self, peers and the environment, constraints that discourage bad behaviours, and constraints that encourage good behaviours in IT governance. These themes reconciled with the subjective norms and perceived behavioural controls in TPB. The research contributes to knowledge with the development of a model of IT practitioners’ participation in IT governance initiatives based on TPB. Practically, the research findings help the top management of IT to focus on the most important factors which are awareness, perceived importance, organisational processes, structures, and reward system to increase effectiveness of IT governance. Methodologically, the mixed methods approach complements the objectivity of the quantitative findings with richer understanding of the IT practitioners’ perspective to IT governance
    • 

    corecore