9,155 research outputs found

    Ontologies across disciplines

    Get PDF

    Collaboration among humanitarian relief organizations and volunteer technical communities : identifying research opportunities and challenges through a systematic literature review

    Get PDF
    Collaboration is the foundation to strengthen disaster preparedness and for effective emergency response actions at all levels. Some studies have highlighted that remote volunteers, i.e., volunteers supported by Web 2.0 technologies, possess the potential to strengthen humanitarian relief organizations by offering information regarding disaster-affected people and infrastructure. Although studies have explored various aspects of this topic, none of those provided an overview of the state-of-the-art of researches on the collaboration among humanitarian organizations and communities of remote volunteers. With the aim of overcoming this gap, a systematic literature review was conducted on the existing research works. Therefore, the main contribution of this work lies in examining the state of research in this field and in identifying potential research gaps. The results show that most of the research works addresses the general domain of disaster management, whereas only few of them address the domain of humanitarian logistics. Collaboration among Humanitarian Relief Organizations and Volunteer Technical Communities: Identifying Research Opportunities and Challenges through a Systematic Literature Review (PDF Download Available). Available from: https://www.researchgate.net/publication/315790817_Collaboration_among_Humanitarian_Relief_Organizations_and_Volunteer_Technical_Communities_Identifying_Research_Opportunities_and_Challenges_through_a_Systematic_Literature_Review [accessed May 26, 2017]

    Cyber-crime Science = Crime Science + Information Security

    Get PDF
    Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality, integrity, and availability of information assets but is less strong on the empirical study of the effectiveness of these techniques. Crime Science studies the effect of crime prevention techniques empirically in the real world, and proposes improvements to these techniques based on this. Combining both approaches, Cyber-crime Science transfers and further develops Information Security techniques to prevent cyber-crime, and empirically studies the effectiveness of these techniques in the real world. In this paper we review the main contributions of Crime Science as of today, illustrate its application to a typical Information Security problem, namely phishing, explore the interdisciplinary structure of Cyber-crime Science, and present an agenda for research in Cyber-crime Science in the form of a set of suggested research questions

    Performance controls for distributed telecommunication services

    Get PDF
    As the Internet and Telecommunications domains merge, open telecommunication service architectures such as TINA, PARLAY and PINT are becoming prevalent. Distributed Computing is a common engineering component in these technologies and promises to bring improvements to the scalability, reliability and flexibility of telecommunications service delivery systems. This distributed approach to service delivery introduces new performance concerns. As service logic is decomposed into software components and distnbuted across network resources, significant additional resource loading is incurred due to inter-node communications. This fact makes the choice of distribution of components in the network and the distribution of load between these components critical design and operational issues which must be resolved to guarantee a high level of service for the customer and a profitable network for the service operator. Previous research in the computer science domain has addressed optimal placement of components from the perspectives of minimising run time, minimising communications costs or balancing of load between network resources. This thesis proposes a more extensive optimisation model, which we argue, is more useful for addressing concerns pertinent to the telecommunications domain. The model focuses on providing optimal throughput and profitability of network resources and on overload protection whilst allowing flexibility in terms of the cost of installation of component copies and differentiation in the treatment of service types, in terms of fairness to the customer and profitability to the operator. Both static (design-time) component distribution and dynamic (run-time) load distribution algorithms are developed using Linear and Mixed Integer Programming techniques. An efficient, but sub-optimal, run-time solution, employing Market-based control, is also proposed. The performance of these algorithms is investigated using a simulation model of a distributed service platform, which is based on TINA service components interacting with the Intelligent Network through gateways. Simulation results are verified using Layered Queuing Network analytic modelling Results show significant performance gains over simpler methods of performance control and demonstrate how trade-offs in network profitability, fairness and network cost are possible
    corecore