5 research outputs found

    The appropriation of GitHub for curation

    Get PDF

    The appropriation of GitHub for curation

    Get PDF

    Sharing Open Deep Learning Models

    Get PDF
    We examine how and why trained deep learning (DL) models are shared, and by whom, and why some developers share their models while others do not. Prior research has examined sharing of data and software code, but DL models are a hybrid of the two. The results from a Qualtrics survey administered to GitHub users and academics who publish on DL show that a diverse population shares DL models, from students to computer/data scientists. We find that motivations for sharing include: increasing citation rates; contributing to the collaboration of developing new DL models; encouraging to reuse; establishing a good reputation; receiving feedback to improve the model; and personal enjoyment. Reasons for not sharing include: lack of time; thinking that their models would not be interesting for others; and not having permission for sharing. The study contributes to our understanding of motivations for participating in a novel form of peer-production

    Strategies Security Managers Used to Prevent Security Breaches in SCADA Systems\u27 Networks

    Get PDF
    Supervisory Control and Data Acquisition (SCADA) systems monitor and control physical processes in critical infrastructure. The impact of successful attacks on the SCADA systems includes the system\u27s downtime and delay in production, which may have a debilitating effect on the national economy and create critical human safety hazards. Grounded in the general systems theory, the purpose of this qualitative multiple case study was to explore strategies SCADA security managers in the Southwest region of the United States use to secure SCADA systems\u27 networks. The participants comprised six SCADA security managers from three oil and gas organizations in the midstream sector located within this region. Data were collected using semistructured interviews and a review of organizational documents. Four themes emerged from the thematic analysis: (a) the importance of security awareness and workforce security training, (b) the use of technical control mechanisms, (c) the establishment of standard security policies, and (d) the use of access and identity management techniques. A key recommendation is for IT managers to adopt security awareness and workforce security training to strengthen the security chain\u27s most vulnerable link. The implications for positive social change include the potential to prevent consequences such as loss of lives, damage to the environment, and the economy resulting from malicious activities

    Developing Cloud Computing Infrastructures in Developing Countries in Asia

    Get PDF
    Developing Cloud Computing Infrastructures in Developing Countries in Asia by Daryoush Charmsaz Moghaddam MS, Sharif University, 2005 BS, Civil Aviation Higher Education Complex, 1985 Doctoral Study Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Information Technology Walden University March 202
    corecore