44 research outputs found

    MSIS 2000: Model Curriculum and Guidelines for Graduate Degree Programs in Information Systems

    Get PDF
    This article contains the official text of the MSIS 2000 model curriculum as approved by both the Association for Computing Machinery and the Association for Information Systems. It is presented here in its original form

    The Need of Multidisciplinary Approaches and Engineering Tools for the Development and Implementation of the Smart City Paradigm

    Get PDF
    This paper is motivated by the concept that the successful, effective, and sustainable implementation of the smart city paradigm requires a close cooperation among researchers with different, complementary interests and, in most cases, a multidisciplinary approach. It first briefly discusses how such a multidisciplinary methodology, transversal to various disciplines such as architecture, computer science, civil engineering, electrical, electronic and telecommunication engineering, social science and behavioral science, etc., can be successfully employed for the development of suitable modeling tools and real solutions of such sociotechnical systems. Then, the paper presents some pilot projects accomplished by the authors within the framework of some major European Union (EU) and national research programs, also involving the Bologna municipality and some of the key players of the smart city industry. Each project, characterized by different and complementary approaches/modeling tools, is illustrated along with the relevant contextualization and the advancements with respect to the state of the art

    The 30/20 GHz fixed communications systems service demand assessment. Volume 3: Appendices

    Get PDF
    The market analysis of voice, video, and data 18/30 GHz communications systems services and satellite transmission services is discussed. Detail calculations, computer displays of traffic, survey questionnaires, and detailed service forecasts are presented

    Design in the Age of Information: A Report to the National Science Foundation (NSF)

    Get PDF
    The Information Age is upon us - it has become a global force in our everyday lives. But the promise of significant benefits from this revolution, which has been driven largely by technologists, will not be realized without more careful planning and design of information systems that can be integral to the simultaneously emerging user-cultures. In cultural terms, information systems must be effective, reliable, affordable, intuitively meaningful, and available anytime and everywhere. In this phase of the information revolution, design will be essential

    Technical and legal perspectives on forensics scenario

    Get PDF
    The dissertation concerns digital forensic. The expression digital forensic (sometimes called digital forensic science) is the science that studies the identification, storage, protection, retrieval, documentation, use, and every other form of computer data processing in order to be evaluated in a legal trial. Digital forensic is a branch of forensic science. First of all, digital forensic represents the extension of theories, principles and procedures that are typical and important elements of the forensic science, computer science and new technologies. From this conceptual viewpoint, the logical consideration concerns the fact that the forensic science studies the legal value of specific events in order to contrive possible sources of evidence. The branches of forensic science are: physiological sciences, social sciences, forensic criminalistics and digital forensics. Moreover, digital forensic includes few categories relating to the investigation of various types of devices, media or artefacts. These categories are: - computer forensic: the aim is to explain the current state of a digital artefact; such as a computer system, storage medium or electronic document; - mobile device forensic: the aim is to recover digital evidence or data from mobile device, such as image, log call, log sms and so on; - network forensic: the aim is related to the monitoring and analysis of network traffic (local, WAN/Internet, UMTS, etc.) to detect intrusion more in general to find network evidence; - forensic data analysis: the aim is examine structured data to discover evidence usually related to financial crime; - database forensic: the aim is related to databases and their metadata. The origin and historical development of the discipline of study and research of digital forensic are closely related to progress in information and communication technology in the modern era. In parallel with the changes in society due to new technologies and, in particular, the advent of the computer and electronic networks, there has been a change in the mode of collection, management and analysis of evidence. Indeed, in addition to the more traditional, natural and physical elements, the procedures have included further evidence that although equally capable of identifying an occurrence, they are inextricably related to a computer or a computer network or electronic means. The birth of computer forensics can be traced back to 1984, when the FBI and other American investigative agencies have began to use software for the extraction and analysis of data on a personal computer. At the beginning of the 80s, the CART(Computer Analysis and Response Team) was created within the FBI, with the express purpose of seeking the so-called digital evidence. This term is used to denote all the information stored or transmitted in digital form that may have some probative value. While the term evidence, more precisely, constitutes the judicial nature of digital data, the term forensic emphasizes the procedural nature of matter, literally, "to be presented to the Court". Digital forensic have a huge variety of applications. The most common applications are related to crime or cybercrime. Cybercrime is a growing problem for government, business and private. - Government: security of the country (terrorism, espionage, etc.) or social problems (child pornography, child trafficking and so on). - Business: purely economic problems, for example industrial espionage. - Private: personal safety and possessions, for example phishing, identity theft. Often many techniques, used in digital forensics, are not formally defined and the relation between the technical procedure and the law is not frequently taken into consideration. From this conceptual perspective, the research work intends to define and optimize the procedures and methodologies of digital forensic in relation to Italian regulation, testing, analysing and defining the best practice, if they are not defined, concerning common software. The research questions are: 1. The problem of cybercrime is becoming increasingly significant for governments, businesses and citizens. - In relation to governments, cybercrime involves problems concerning national security, such as terrorism and espionage, and social questions, such as trafficking in children and child pornography. - In relation to businesses, cybercrime entails problems concerning mainly economic issues, such as industrial espionage. - In relation to citizens, cybercrime involves problems concerning personal security, such as identity thefts and fraud. 2. Many techniques, used within the digital forensic, are not formally defined. 3. The relation between procedures and legislation are not always applied and taken into consideratio

    The BG News February 9, 2000

    Get PDF
    The BGSU campus student newspaper February 9, 2000. Volume 85 - Issue 21https://scholarworks.bgsu.edu/bg-news/7602/thumbnail.jp

    Routledge Handbook of Public Policy in Africa

    Get PDF
    This Handbook provides an authoritative and foundational disciplinary overview of African Public Policy and a comprehensive examination of the practicalities of policy analysis, policymaking processes, implementation, and administration in Africa today. The book assembles a multidisciplinary team of distinguished and upcoming Africanist scholars, practitioners, researchers and policy experts working inside and outside Africa to analyse the historical and emerging policy issues in 21st-century Africa. While mostly attentive to comparative public policy in Africa, this book attempts to address some of the following pertinent questions: • How can public policy be understood and taught in Africa? • How does policymaking occur in unstable political contexts, or in states under pressure? • Has the democratisation of governing systems improved policy processes in Africa? • How have recent transformations, such as technological proliferation in Africa, impacted public policy processes? • What are the underlying challenges and potential policy paths for Africa going forward? The contributions examine an interplay of prevailing institutional, political, structural challenges and opportunities for policy effectiveness to discern striking commonalities and trajectories across different African states. This is a valuable resource for practitioners, politicians, researchers, university students, and academics interested in studying and understanding how African countries are governed

    Disability in Different Cultures: Reflections on Local Concepts

    Get PDF
    How are disability and rehabilitation conceived of in different cultures? How can these concepts be made accessible? Studies from the fields of sociology, ethnology and educational science address these questions, whilst contributors from rehabilitation projects in development cooperation and from self-help movements highlight culturally different perceptions of disability. A distinctive feature of this reader is the dialogue it creates by bringing together scientific praxis and practical work
    corecore