21 research outputs found

    AIM Triad: A Prioritization Strategy for Public Institutions to Improve Information Security Maturity

    Get PDF
    In today’s world, private and government organizations are legally obligated to prioritize their information security. They need to provide proof that they are continually improving their cybersecurity compliance. One approach that can help organizations achieve this goal is implementing information security maturity models. These models provide a structured framework for measuring performance and implementing best practices. However, choosing a suitable model can be challenging, requiring cultural, process, and work practice changes. Implementing multiple models can be overwhelming, if possible. This article proposes a prioritization strategy for public institutions that want to improve their information security maturity. We thoroughly analyzed various sources through systematic mapping to identify critical similarities in information security maturity models. Our research led us to create the AIM (Awareness, Infrastructure, and Management) Triad. This triad is a practical guide for organizations to achieve maturity in information security practices.This work received partial support from Proyecto DIUFRO DI21-0079 and Proyecto DIUFRO DI22-0043, Universidad de La Frontera, Temuco. Chile

    Robertsonian chromosomes and the nuclear architecture of mouse meiotic prophase spermatocytes

    Get PDF
    BACKGROUND: The nuclear architecture of meiotic prophase spermatocytes is based on higher-order patterns of spatial associations among chromosomal domains from different bivalents. The meiotic nuclear architecture depends on the chromosome characteristics and consequently is prone to modification by chromosomal rearrangements. In this work, we consider Mus domesticus spermatocytes with diploid chromosome number 2n = 40, all telocentric, and investigate a possible modification of the ancestral nuclear architecture due to the emergence of derived Rb chromosomes, which may be present in the homozygous or heterozygous condition. RESULTS: In the 2n = 40 spermatocyte nuclei random associations mediated by pericentromeric heterochromatin among the 19 telocentric bivalents ocurr at the nuclear periphery. The observed frequency of associations among them, made distinguishable by specific probes and FISH, seems to be the same for pairs that may or may not form Rb chromosomes. In the homozygote Rb 2n = 24 spermatocytes, associations also mediated by pericentromeric heterochromatin occur mainly between the three telocentric or the eight metacentric bivalents themselves. In heterozygote Rb 2n = 32 spermatocytes all heterochromatin is localized at the nuclear periphery, yet associations are mainly observed among the three telocentric bivalents and between the asynaptic axes of the trivalents. CONCLUSIONS: The Rb chromosomes pose sharp restrictions for interactions in the 2n = 24 and 2n = 32 spermatocytes, as compared to the ample possibilities for interactions between bivalents in the 2n = 40 spermatocytes. Undoubtedly the emergence of Rb chromosomes changes the ancestral nuclear architecture of 2n = 40 spermatocytes since they establish new types of interactions among chromosomal domains, particularly through centromeric and heterochromatic regions at the nuclear periphery among telocentric and at the nuclear center among Rb metacentric ones

    On (h,k) Manifolds with Asymptotic Phase

    Get PDF
    AbstractWe introduce the notion of (h,k) manifolds and give conditions under which the property of being a manifold with asymptotic phase holds. These conditions allow the construction of a transformation of the variational equation of a nonlinear nonautonomous systems with (h,k) dichotomies, into an almost decoupled quasilinear system. The class of admissiblehandkfunctions is also briefly analyzed

    (h, k)-Trichotomies and asymptotics of nonautonomous difference systems

    No full text
    Discrete nonautonomous nonlinear systems possessing (h, k)-trichotomies are considered. We specialize to the case of solutions moving inside - and in a neighborhood of - an invariant manifold of a special kind, which we call (h, k)-hyperbolic. The Aulbach-Coppel-Knobloch transformation is then developed and used to state conditions for granting asymptotic equivalence of solutions. Our results generalize some of Aulbach's results in which the manifold considered was made of stationary points, and the system taken was autonomous

    Exploring the Intersection between Software Maintenance and Machine Learning—A Systematic Mapping Study

    No full text
    While some areas of software engineering knowledge present great advances with respect to the automation of processes, tools, and practices, areas such as software maintenance have scarcely been addressed by either industry or academia, thus delegating the solution of technical tasks or human capital to manual or semiautomatic forms. In this context, machine learning (ML) techniques play an important role when it comes to improving maintenance processes and automation practices that can accelerate delegated but highly critical stages when the software launches. The aim of this article is to gain a global understanding of the state of ML-based software maintenance by using the compilation, classification, and analysis of a set of studies related to the topic. The study was conducted by applying a systematic mapping study protocol, which was characterized by the use of a set of stages that strengthen its replicability. The review identified a total of 3776 research articles that were subjected to four filtering stages, ultimately selecting 81 articles that were analyzed thematically. The results reveal an abundance of proposals that use neural networks applied to preventive maintenance and case studies that incorporate ML in subjects of maintenance management and management of the people who carry out these tasks. In the same way, a significant number of studies lack the minimum characteristics of replicability
    corecore