758 research outputs found

    Strategic Roadmaps and Implementation Actions for ICT in Construction

    Get PDF

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    An Integrated Cybersecurity Risk Management (I-CSRM) Framework for Critical Infrastructure Protection

    Get PDF
    Risk management plays a vital role in tackling cyber threats within the Cyber-Physical System (CPS) for overall system resilience. It enables identifying critical assets, vulnerabilities, and threats and determining suitable proactive control measures to tackle the risks. However, due to the increased complexity of the CPS, cyber-attacks nowadays are more sophisticated and less predictable, which makes risk management task more challenging. This research aims for an effective Cyber Security Risk Management (CSRM) practice using assets criticality, predication of risk types and evaluating the effectiveness of existing controls. We follow a number of techniques for the proposed unified approach including fuzzy set theory for the asset criticality, machine learning classifiers for the risk predication and Comprehensive Assessment Model (CAM) for evaluating the effectiveness of the existing controls. The proposed approach considers relevant CSRM concepts such as threat actor attack pattern, Tactic, Technique and Procedure (TTP), controls and assets and maps these concepts with the VERIS community dataset (VCDB) features for the purpose of risk predication. Also, the tool serves as an additional component of the proposed framework that enables asset criticality, risk and control effectiveness calculation for a continuous risk assessment. Lastly, the thesis employs a case study to validate the proposed i-CSRM framework and i-CSRMT in terms of applicability. Stakeholder feedback is collected and evaluated using critical criteria such as ease of use, relevance, and usability. The analysis results illustrate the validity and acceptability of both the framework and tool for an effective risk management practice within a real-world environment. The experimental results reveal that using the fuzzy set theory in assessing assets' criticality, supports stakeholder for an effective risk management practice. Furthermore, the results have demonstrated the machine learning classifiers’ have shown exemplary performance in predicting different risk types including denial of service, cyber espionage, and Crimeware. An accurate prediction can help organisations model uncertainty with machine learning classifiers, detect frequent cyber-attacks, affected assets, risk types, and employ the necessary corrective actions for its mitigations. Lastly, to evaluate the effectiveness of the existing controls, the CAM approach is used, and the result shows that some controls such as network intrusion, authentication, and anti-virus show high efficacy in controlling or reducing risks. Evaluating control effectiveness helps organisations to know how effective the controls are in reducing or preventing any form of risk before an attack occurs. Also, organisations can implement new controls earlier. The main advantage of using the CAM approach is that the parameters used are objective, consistent and applicable to CPS

    Archives, Access and Artificial Intelligence: Working with Born-Digital and Digitized Archival Collections

    Get PDF
    Digital archives are transforming the Humanities and the Sciences. Digitized collections of newspapers and books have pushed scholars to develop new, data-rich methods. Born-digital archives are now better preserved and managed thanks to the development of open-access and commercial software. Digital Humanities have moved from the fringe to the center of academia. Yet, the path from the appraisal of records to their analysis is far from smooth. This book explores crossovers between various disciplines to improve the discoverability, accessibility, and use of born-digital archives and other cultural assets

    Archives, Access and Artificial Intelligence

    Get PDF
    Digital archives are transforming the Humanities and the Sciences. Digitized collections of newspapers and books have pushed scholars to develop new, data-rich methods. Born-digital archives are now better preserved and managed thanks to the development of open-access and commercial software. Digital Humanities have moved from the fringe to the center of academia. Yet, the path from the appraisal of records to their analysis is far from smooth. This book explores crossovers between various disciplines to improve the discoverability, accessibility, and use of born-digital archives and other cultural assets

    The Neglected Continent of IS Research: A Research Agenda for Sub-Saharan Africa

    Get PDF
    Research with a focus on Sub-Saharan Africa (SSA), a major region within the world’s second largest continent, is almost non-existent in mainstream information systems research. Although infrastructures for information and communication technology (ICT) are well established in the more developed and industrialized parts of the world, the same is not true for developing countries. Research on developing countries has been rare in mainstream IS and, even where existent, has often overlooked the particular situation of SSA, home to 33 of the world’s 48 least-developed countries. Ironically, it is such parts of the world that can stand to gain the most from the promise of ICT with applications that would help the socioeconomic development of this region. In this study, we present the need for focused research on the ICT development and application for SSA. The information systems research community has a unique and valuable perspective to bring to the challenges this region faces in developing its ICT infrastructure, hence extending research and practice in ICT diffusion and policy. We present here a research agenda for studying the adoption, development, and application of ICT in SSA. In particular, teledensity, telemedicine, online education, and e-commerce present important areas for research, with implications for research, practice, and teaching

    Collaborating on Multi-party Information Systems Development Projects: A Collective Reflection-in-Action View

    Get PDF
    Growth of business-to-consumer (B2C) applications such as electronic storefronts, catalogues, and customer support websites has drawn a great number of diverse stakeholders into the IS Development (ISD) practice. Marketing, strategy, and graphic design specialists have joined a variety of technical professionals and business stakeholders in developing B2C applications. Oftentimes, these professionals work for different organizations with different histories, cultures, and reward structures. A longitudinal qualitative field study of a B2C application development project was undertaken in order to build an in-depth understanding of the collaborative practices of diverse professionals in ISD projects. The paper proposes that the multi-party collaborative practice can be understood as a âcollective reflection-in-actionâ cycle through which an IS design emerges as a result of agents producing, sharing, and reflecting upon material objects. Agents from diverse backgrounds exert different influences over emergent designs depending on their organization, profession, and project involvement-based power relations. These power relations shape whether collaborators âadd toâ âignore,â or âchallengeâ the work produced by others. In turn, agentsâ actions either reinforce or transform existing power relations depending on who gets to claim credit for and ownership of the emergent design. Implications for the study of boundary objects, team diversity, organizational learning, and contemporary ISD are drawn.Information Systems Working Papers Serie
    • …
    corecore