27,768 research outputs found

    Developing a Conceptual Framework for Cloud Security Assurance

    Get PDF
    Postprin

    Open Science, Open Data, and Open Scholarship: European Policies to Make Science Fit for the Twenty-First Century

    Get PDF
    Open science will make science more efficient, reliable, and responsive to societal challenges. The European Commission has sought to advance open science policy from its inception in a holistic and integrated way, covering all aspects of the research cycle from scientific discovery and review to sharing knowledge, publishing, and outreach. We present the steps taken with a forward-looking perspective on the challenges laying ahead, in particular the necessary change of the rewards and incentives system for researchers (for which various actors are co-responsible and which goes beyond the mandate of the European Commission). Finally, we discuss the role of artificial intelligence (AI) within an open science perspective

    Making Sustainable Seafood Also Good for Business

    Get PDF
    This GrantCraft case study, developed for Foundation Center's FundingtheOcean.org portal, explores how the Walton Family Foundation, isusing a systems approach to make the seafood business more sustainable. It includes the perspective of one of it's grantees in the area, the Sustainable Fisheries Partnership, and how they worked together with industry and private partners to create a tipping point in the business practices of fisheries producing seafood commodity products

    Rethinking De-Perimeterisation: Problem Analysis And Solutions

    Get PDF
    For businesses, the traditional security approach is the hard-shell model: an organisation secures all its assets using a fixed security border, trusting the inside, and distrusting the outside. However, as technologies and business processes change, this model looses its attractiveness. In a networked world, “inside” and “outside” can no longer be clearly distinguished. The Jericho Forum - an industry consortium part of the Open Group – coined this process deperimeterisation and suggested an approach aimed at securing data rather than complete systems and infrastructures. We do not question the reality of de-perimeterisation; however, we believe that the existing analysis of the exact problem, as well as the usefulness of the proposed solutions have fallen short: first, there is no linear process of blurring boundaries, in which security mechanisms are placed at lower and lower levels, until they only surround data. To the contrary, we experience a cyclic process of connecting and disconnecting of systems. As conditions change, the basic trade-off between accountability and business opportunities is made (and should be made) every time again. Apart from that, data level security has several limitations to start with, and there is a big potential for solving security problems differently: by rearranging the responsibilities between businesses and individuals. The results of this analysis can be useful for security professionals who need to trade off different security mechanisms for their organisations and their information systems

    Toward an mHealth Intervention for Smoking Cessation

    Get PDF
    The prevalence of tobacco dependence in the United States (US) remains alarming. Invariably, smoke-related health problems are the leading preventable causes of death in the US. Research has shown that a culturally tailored cessation counseling program can help reduce smoking and other tobacco usage. In this paper, we present a mobile health (mHealth) solution that leverages the Short Message Service (SMS) or text messaging feature of mobile devices to motivate behavior change among tobacco users. Our approach implements the Theory of Planned Behavior (TPB) and a phase-based framework. We make contributions to improving previous mHealth intervention approaches by delivering personalized and evidence-based motivational SMS messages to participants. Our proposed solution implements machine learning algorithms that take the participant\u27s demographic profile and previous smoking behavior into account. We discuss our preliminary evaluation of the system against a couple of pseudo-scenarios and our observation of the system\u27s performance
    • 

    corecore