2,212 research outputs found

    Ontologies in Cloud Computing - Review and Future Directions

    Get PDF
    Cloud computing as a technology has the capacity to enhance cooperation, scalability, accessibility, and offers discount prospects using improved and effective computing, and this capability helps organizations to stay focused. Ontologies are used to model knowledge. Once knowledge is modeled, knowledge management systems can be used to search, match, visualize knowledge, and also infer new knowledge. Ontologies use semantic analysis to define information within an environment with interconnecting relationships between heterogeneous sets. This paper aims to provide a comprehensive review of the existing literature on ontology in cloud computing and defines the state of the art. We applied the systematic literature review (SLR) approach and identified 400 articles; 58 of the articles were selected after further selection based on set selection criteria, and 35 articles were considered relevant to the study. The study shows that four predominant areas of cloud computing—cloud security, cloud interoperability, cloud resources and service description, and cloud services discovery and selection—have attracted the attention of researchers as dominant areas where cloud ontologies have made great impact. The proposed methods in the literature applied 30 ontologies in the cloud domain, and five of the methods are still practiced in the legacy computing environment. From the analysis, it was found that several challenges exist, including those related to the application of ontologies to enhance business operations in the cloud and multi-cloud. Based on this review, the study summarizes some unresolved challenges and possible future directions for cloud ontology researchers.publishedVersio

    Application of fuzzy AHP in selection of accounting elective courses in undergraduate and graduate level

    Get PDF
    Elective courses, provide students development in terms of interest and ability consist important part of education system and can be used as effective tool for making career plan. Additionally they play important role in curriculum and education quality development. In this study selection criteria of accounting elective courses in business undergraduate and accounting graduate education are determined from the viewpoint of students. For this purpose survey consisting of course selection main criteria and sub-criteria was designed and conducted with final year students in business administration undergraduate and accounting graduate level students via four different fuzzy ranking methods. Furthermore, result of this methods were compared too.peer-reviewe

    Framework for Security Transparency in Cloud Computing

    Get PDF
    The migration of sensitive data and applications from the on-premise data centre to a cloud environment increases cyber risks to users, mainly because the cloud environment is managed and maintained by a third-party. In particular, the partial surrender of sensitive data and application to a cloud environment creates numerous concerns that are related to a lack of security transparency. Security transparency involves the disclosure of information by cloud service providers about the security measures being put in place to protect assets and meet the expectations of customers. It establishes trust in service relationship between cloud service providers and customers, and without evidence of continuous transparency, trust and confidence are affected and are likely to hinder extensive usage of cloud services. Also, insufficient security transparency is considered as an added level of risk and increases the difficulty of demonstrating conformance to customer requirements and ensuring that the cloud service providers adequately implement security obligations. The research community have acknowledged the pressing need to address security transparency concerns, and although technical aspects for ensuring security and privacy have been researched widely, the focus on security transparency is still scarce. The relatively few literature mostly approach the issue of security transparency from cloud providers’ perspective, while other works have contributed feasible techniques for comparison and selection of cloud service providers using metrics such as transparency and trustworthiness. However, there is still a shortage of research that focuses on improving security transparency from cloud users’ point of view. In particular, there is still a gap in the literature that (i) dissects security transparency from the lens of conceptual knowledge up to implementation from organizational and technical perspectives and; (ii) support continuous transparency by enabling the vetting and probing of cloud service providers’ conformity to specific customer requirements. The significant growth in moving business to the cloud – due to its scalability and perceived effectiveness – underlines the dire need for research in this area. This thesis presents a framework that comprises the core conceptual elements that constitute security transparency in cloud computing. It contributes to the knowledge domain of security transparency in cloud computing by proposing the following. Firstly, the research analyses the basics of cloud security transparency by exploring the notion and foundational concepts that constitute security transparency. Secondly, it proposes a framework which integrates various concepts from requirement engineering domain and an accompanying process that could be followed to implement the framework. The framework and its process provide an essential set of conceptual ideas, activities and steps that can be followed at an organizational level to attain security transparency, which are based on the principles of industry standards and best practices. Thirdly, for ensuring continuous transparency, the thesis proposes an essential tool that supports the collection and assessment of evidence from cloud providers, including the establishment of remedial actions for redressing deficiencies in cloud provider practices. The tool serves as a supplementary component of the proposed framework that enables continuous inspection of how predefined customer requirements are being satisfied. The thesis also validates the proposed security transparency framework and tool in terms of validity, applicability, adaptability, and acceptability using two different case studies. Feedbacks are collected from stakeholders and analysed using essential criteria such as ease of use, relevance, usability, etc. The result of the analysis illustrates the validity and acceptability of both the framework and tool in enhancing security transparency in a real-world environment

    An ontology-based compliance audit framework for medical data sharing across Europe

    Get PDF
    Complying with privacy in multi-jurisdictional health domains is important as well as challenging. The compliance management process will not be efficient unless it manages to show evidences of explicit verification of legal requirements. In order to achieve this goal, privacy compliance should be addressed through “a privacy by design” approach. This paper presents an approach to privacy protection verification by means of a novel audit framework. It aims to allow privacy auditors to look at past events of data processing effectuated by healthcare organisation and verify compliance to legal privacy requirements. The adapted approach used semantic modelling and a semantic reasoning layer that could be placed on top of hospital databases. These models allow the integration of fine-grained context information about the sharing of patient data and provide an explicit capturing of applicable privacy obligation. This is particularly helpful for insuring a seamless data access logging and an effective compliance checking during audit trials

    Environmental Management Information Systems (EMIS) for Sustainable Development: A Conceptual Overview

    Get PDF
    Environmental management information systems (EMIS) is defined as \u27organizational-technical systems for systematically obtaining, processing, and making available relevant environmental information available in companies\u27. Such systems evolved out of a growing need to manage environmental information in response to internal and external pressures such as regulations, consumers, stockholders, and changes in the business environments. While over the past decade EMIS have proliferated in the corporate landscape, these systems have received little attention within the information systems research community as whole. The objective of this paper is to serve as a tutorial providing a conceptual overview of EMIS, highlighting organizational and technical issues, as well as research opportunities. In this paper we suggest that there are significant and relatively untapped research synergies existing between information systems and environmental management for sustainable development at the organizational and technical levels

    Decision Making Intelligent Agent on SOX Compliance over the Imports Process

    Get PDF
    The objective of this work is to define a decision support system over SOX (Sarbanes-Oxley Act) compatibility  of the Imports Process based on Artificial Intelligence and Theory of Argumentation knowledge and techniques measuring at the same time the quality of how things were done on this specific process of the analyzed business case. SOX Law in effect nowadays is worldwide facto standard for financial and economical operations of private sector with the main objective to protect investors of private sector and promote the financial health of private companies. In this framework we have developed a decision support intelligent expert model to help SOX control bodies, companies and auditors to support their SOX compliance decisions based on well founded bases like Artificial Intelligence and Theory of Argumentation. The model here presented incorporates several key concepts like pre-existing expert knowledge base, a formalized and structure way to evaluate an existing business case focusing on the Imports Process, a semi automated fuzzy dynamic knowledge learning protocol and an structure method to evolve based on the facts of the business case and suggest an specific decision about the SOX compatibility of the specific business case. Keywords: Multiagent Systems (MAS), Expert Systems (ES), Business Intelligence (BI), Decision Support Systems (DSS), Sarbanes-Oxley Act (SOX), Argumentation, Artificial Intelligence

    Constraint-Driven Approach to Support Input Data Decision-Making in Business Process Management Systems

    Get PDF
    A business process consists of a set of activities that are performed in coordination in an organizational and technical environment (Weske 2007). The base of business process management systems (BPMS) is the explicit representation of business processes with their activities and the execution constraints between them. Compliance rules represent a natural step to include requirements between business functionality and data. For the design of a whole business process management (van der Aalst et al. 2003), it is necessary to design the model of activities and define the causal and temporal relationships between them (Walzer et al. 2008). Compliance rules can help to complete this information, since they can be used to validate business data (Chesani et al. 2008).Junta de AndalucĂ­a P08-TIC-04095Ministerio de Ciencia y TecnologĂ­a TIN2009-1371

    Decision Making Intelligent Agent on SOX Compliance over the Goods Receipt Processs

    Get PDF
    The objective of this work is to define a decision support system over SOX (Sarbanes-Oxley Act) compatibility  of the Goods Receipt Process based on Artificial Intelligence and Theory of Argumentation knowledge and techniques measuring at the same time the quality of how things were done on this specific process of the analyzed business case. SOX Law in effect nowadays is worldwide facto standard for financial and economical operations of private sector with the main objective to protect investors of private sector and promote the financial health of private companies. In this framework we have developed a decision support intelligent expert model to help SOX control bodies, companies and auditors to support their SOX compliance decisions based on well founded bases like Artificial Intelligence and Theory of Argumentation. The model here presented incorporates several key concepts like pre-existing expert knowledge base, a formalized and structure way to evaluate an existing business case focusing on the Goods Receipt Process, a semi automated fuzzy dynamic knowledge learning protocol and an structure method to evolve based on the facts of the business case and suggest an specific decision about the SOX compatibility of the specific business case. Keywords: Multiagent Systems (MAS), Expert Systems (ES), Business Intelligence (BI), Decision Support Systems (DSS), Sarbanes-Oxley Act (SOX), Argumentation, Artificial Intelligence
    • 

    corecore