296,716 research outputs found

    Робоча програма навчальної дисципліни «Основи теорії захисту інформації» для здобувачів вищої освіти другого (магістерського) рівня галузі знань 12 «Інформаційні технології» за спеціальністю 123 "Комп’ютерна інженерія". Program of the Discipline “Fundamentals of the theory of information security in computer systems” specialty 123 "Computer Engineering"

    Get PDF
    Навчальний курс призначений для вивчення основ теорії захисту інформації в комп’ютерних системах, в якому викладено загальні підходи та класифікація загроз для інформації щодо цілісності, конфіденційності та спостережності, методів та засобів їх локалізації та блокування. Подано принципи побудови систем технічного та криптографічного захисту інформації. Приведено описи та розглянуто функціонал сучасних криптоалгоритмів, функцій хешування та електронного цифрового підпису. The training course is designed to study the foundations of the theory of information security in computer systems, which outlines common approaches and the classification of threats for information on integrity, confidentiality and observation, methods and tools for their localization and blocking. The principles of construction of technical and cryptographic information security systems are presented. The given descriptions describe the functional of modern cryptographic algorithms, hashing functions and electronic digital signature

    Agriculture and development : a brief review of the literature

    Get PDF
    After 20 years of neglect by international donors, agriculture is now again in the headlines because higher food prices are increasing food insecurity and poverty. In the coming years it will be essential to increase food productivity and production in developing countries, especially in Sub-Saharan Africa and with smallholders. This however requires finding viable solutions to a number of complex technical, institutional and policy issues including land markets, research on seeds and inputs; agricultural extension; credit; rural infrastructure; storage; connection to markets; rural nonfarm employment and food price stabilization. This paper reviews what the economic literature has to say on these topics. It discusses in turn the role played by agriculture in the development process and the interactions between agriculture and other economic sectors; the determinants of the Green Revolution and discuss the foundations of agricultural growth; issues of income diversification by farmers; approaches to rural development; and finally issues of international trade policy and food security which are at the root of the crisis in agricultural commodity volatility in the past few years.Rural Poverty Reduction,Regional Economic Development,Agricultural Research,Rural Development Knowledge&Information Systems

    On-Device Recommender Systems: A Comprehensive Survey

    Full text link
    Recommender systems have been widely deployed in various real-world applications to help users identify content of interest from massive amounts of information. Traditional recommender systems work by collecting user-item interaction data in a cloud-based data center and training a centralized model to perform the recommendation service. However, such cloud-based recommender systems (CloudRSs) inevitably suffer from excessive resource consumption, response latency, as well as privacy and security risks concerning both data and models. Recently, driven by the advances in storage, communication, and computation capabilities of edge devices, there has been a shift of focus from CloudRSs to on-device recommender systems (DeviceRSs), which leverage the capabilities of edge devices to minimize centralized data storage requirements, reduce the response latency caused by communication overheads, and enhance user privacy and security by localizing data processing and model training. Despite the rapid rise of DeviceRSs, there is a clear absence of timely literature reviews that systematically introduce, categorize and contrast these methods. To bridge this gap, we aim to provide a comprehensive survey of DeviceRSs, covering three main aspects: (1) the deployment and inference of DeviceRSs (2) the training and update of DeviceRSs (3) the security and privacy of DeviceRSs. Furthermore, we provide a fine-grained and systematic taxonomy of the methods involved in each aspect, followed by a discussion regarding challenges and future research directions. This is the first comprehensive survey on DeviceRSs that covers a spectrum of tasks to fit various needs. We believe this survey will help readers effectively grasp the current research status in this field, equip them with relevant technical foundations, and stimulate new research ideas for developing DeviceRSs

    Electronic Commerce: A Half-Empty Glass?

    Get PDF
    This article introduces an electronic commerce paradox by observing that while electronic commerce grows rapidly it is, at the same time, based on unsettled foundations. It describes how 22 constraints for global electronic commerce were identified, and analyzes them in depth. The constraints fall into four themes: 1. Building trust for users and consumers 2. Establishing ground rules for the digital marketplace 3. Enhancing information infrastructure 4. Maximizing benefits. Each of these themes contains a number of critical issues. The first theme--building trust for users and consumers--involves privacy protection, security, consumer protection, authentication and confidentiality, and access blocking. The second theme includes legal framework, acceptance of electronic transactions, taxation, tariffs, intellectual property protection, commercial policy, and payment systems. Enhancing information infrastructure covers the needed infrastructure enhancements and includes Internet infrastructure and governance, interconnectivity and technical convergence, technical standards, bandwidth and accessibility, and the question of how to further the competition. The last theme is about maximizing the benefits of electronic commerce and includes the understanding of digital economy, its measurement, seamless globalization, and involvement of small businesses. At the time that this paper was written (February 2000) none of these 22 issues had been resolved. Yet, they need to be worked out if electronic commerce is to be successful in both the developed and the underdeveloped world

    A Design Theory for Secure Semantic E-Business Processes (SSEBP)

    Get PDF
    This dissertation develops and evaluates a Design theory. We follow the design science approach (Hevener, et al., 2004) to answer the following research question: "How can we formulate a design theory to guide the analysis and design of Secure Semantic eBusiness processes (SSeBP)?" Goals of SSeBP design theory include (i) unambiguously represent information and knowledge resources involved in eBusiness processes to solve semantic conflicts and integrate heterogeneous information systems; (ii) analyze and model business processes that include access control mechanisms to prevent unauthorized access to resources; and (iii) facilitate the coordination of eBusiness process activities-resources by modeling their dependencies. Business processes modeling techniques such as Business Process Modeling Notation (BPMN) (BPMI, 2004) and UML Activity Diagrams (OMG, 2003) lack theoretical foundations and are difficult to verify for correctness and completeness (Soffer and Wand, 2007). Current literature on secure information systems design methods are theoretically underdeveloped and consider security as a non-functional requirement and as an afterthought (Siponen et al. 2006, Mouratidis et al., 2005). SSeBP design theory is one of the first attempts at providing theoretically grounded guidance to design richer secure eBusiness processes for secure and coordinated seamless knowledge exchange among business partners in a value chain. SSeBP design theory allows for the inclusion of non-repudiation mechanisms into the analysis and design of eBusiness processes which lays the foundations for auditing and compliance with regulations such as Sarbanes-Oxley. SSeBP design theory is evaluated through a rigorous multi-method evaluation approach including descriptive, observational, and experimental evaluation. First, SSeBP design theory is validated by modeling business processes of an industry standard named Collaborative Planning, Forecasting, and Replenishment (CPFR) approach. Our model enhances CPFR by incorporating security requirements in the process model, which is critically lacking in the current CPFR technical guidelines. Secondly, we model the demand forecasting and capacity planning business processes for two large organizations to evaluate the efficacy and utility of SSeBP design theory to capture the realistic requirements and complex nuances of real inter-organizational business processes. Finally, we empirically evaluate SSeBP, against enhanced Use Cases (Siponen et al., 2006) and UML activity diagrams, for informational equivalence (Larkin and Simon, 1987) and its utility in generating situational awareness (Endsley, 1995) of the security and coordination requirements of a business process. Specific contributions of this dissertation are to develop a design theory (SSeBP) that presents a novel and holistic approach that contributes to the IS knowledge base by filling an existing research gap in the area of design of information systems to support secure and coordinated business processes. The proposed design theory provides practitioners with the meta-design and the design process, including the system components and principles to guide the analysis and design of secure eBusiness processes that are secure and coordinated

    2012 Grantmakers Information Technology Survey Report

    Get PDF
    Together the Technology Affinity Group (TAG) and Grants Managers Network (GMN) conducted an information technology survey of grantmaking organizations in July 2012. This survey serves as a follow?up to similar surveys TAG has conducted in collaboration with the Council on Foundation (The Council) in April 2003, July 2005, and June 2007, and then independently in 2010

    Adding X-security to Carrel: security for agent-based healthcare applications

    Get PDF
    The high growth of Multi-Agent Systems (MAS) in Open Networks with initiatives such as Agentcities1 requires development in many different areas such as scalable and secure agent platforms, location services, directory services, and systems management. In our case we have focused our effort on security for agent systems. The driving force of this paper is provide a practical vision of how security mechanisms could be introduced for multi-agent applications. Our case study for this experiment is Carrel [9]: an Agent-based application in the Organ and Tissue transplant domain. The selection of this application is due to its characteristics as a real scenario and use of high-risk data for example, a study of the 21 most visited health-related web sites on the Internet discovered that personal information provided at many of the sites was being inadvertently leaked for unauthorized persons. These factors indicate to us that Carrel would be a suitable environment in order to test existing security safeguards. Furthermore, we believe that the experience gathered will be useful for other MAS. In order to achieve our purpose we describe the design, architecture and implementation of security elements on MAS for the Carrel System.Postprint (published version

    Investing in Healthy, Sustainable Places Through Urban Agriculture

    Get PDF
    The purpose of this paper is to provide funders with an overview of urban agriculture and its benefits; its connections to the community-based food system; and how foundations are supporting and encouraging urban agriculture as a public health, social enterprise, environmental stewardship, and/or economic development strategy. With bibliographical references
    corecore