61 research outputs found

    Model-Driven Information Security Risk Assessment of Socio-Technical Systems

    Get PDF

    An API-based search system for one click access to information

    Get PDF
    This paper proposes a prototype One Click access system, based on previous work in the field and the related 1CLICK-2@NTCIR10 task. The proposed solution integrates methods from into a three tier algorithm: query categorization, information extraction and output generation and offers suggestions on how each of these can be implemented. Finally, a thorough user-based evaluation concludes that such an information retrieval system outperforms the textual preview collected from Google search results, based on a paired sign test. Based on validation results suggestions for future improvements are proposed

    Modelling telecom fraud with e3value

    Get PDF
    Telecommunication services are complex product packages that rely on a large and complex technical infrastructure. However, fraudulent use of such telecommunication services rarely exploits hardware vulnerabilities. Instead, most common exploits operate at a business level, capitalizing on the unexpected interaction between various product packages from multiple providers. As such, an assumption was made that in order to fully describe the scenarios, a modelling language capable of describing value transactions between actors is required. In order to validate this assumption, a business value modelling language, e3value was selected, generic (non-misuse) business models were created and four misuse scenarios were modelled. This report showcases the models, discusses strengths and limitations encountered during modelling and draws conclusions with regard to the applicability, usability and utility of e3value models in modelling (Telecom) fraud as well as more generally in Risk Assessment

    Current established risk assessment methodologies and tools

    Get PDF
    The technology behind information systems evolves at an exponential rate, while at the same time becoming more and more ubiquitous. This brings with it an implicit rise in the average complexity of systems as well as the number of external interactions. In order to allow a proper assessment of the security of such (sub)systems, a whole arsenal of methodologies, methods and tools have been developed in recent years. However, most security auditors commonly use a very small subset of this collection, that best suits their needs. This thesis aims at uncovering the differences and limitations of the most common Risk Assessment frameworks, the conceptual models that support them, as well as the tools that implement them. This is done in order to gain a better understanding of the applicability of each method and/or tool and suggest guidelines to picking the most suitable one

    Investigating the usability and utility of tangible modelling of socio-technical architectures

    Get PDF
    Socio-technical models are models that represent social as well as technical elements of the modeling subject, where the technical part consists of both physical and digital elements. Examples are enterprise models and models of the target of assessment used in risk assessment. Constructing and validating these models often implies a challenging task of extracting and integrating information from a multitude of stakeholders which are rarely modelling experts and don’t usually have the time or desire to engage in modelling activities.\ud We investigate a promising approach to overcome this challenge by using physical tokens to represent the model. We call the resulting models tangible models.\ud In this paper we illustrate this idea by creating a tangible representations of a socio-technical modelling language used in Risk Assessment and provide an initial validation of the relative usability and utility of tangible versus abstract modelling by an experiment and a focus group, respectively. We discuss possible psychological and social mechanisms that could explain the enhanced usability and utility of tangible modelling approaches for domain experts. Finally, we discuss the generalizability of this approach to other languages and modelling purposes

    Underactive bladder - an underestimated entity

    Get PDF
    Introduction. The concept of underactive bladder is relatively new. Currently there is no generally accepted definition of this pathology. Diagnosis depends on urodynamic findings, and symptoms are usually rare and intricated with the symptoms of other urinary pathology. Matherials and methods. This review examines the current literature on underactive bladder regarding pathology, definition, diagnosis, current guidelines, and any further potential medical developments. Conclusions. Underactive bladder is a poorly understood pathologic condition. Only since 2002 has there been any consensus regarding the definition. The diagnosis relies only on urodynamics; clinical diagnosis is a challenge even for a consultant; and treatment does not seem to alleviate much of the suffering. This disease remains underrecognized and undertreated. More research is needed to identify less invasive diagnosis tools and treatment for this pathology

    Corrosion of carbon steel OLC 45 and stainless steel aisi 304L in wines from Banat county

    Get PDF
    In the present paper, results on the corrosion rate of carbon steel OLC 45 (similar to EU C 45) and stainless steel AISI 304L in a few species of wines from Banat County (Romania) have been emphasized. Corrosion rates have been determined using weight loss measurements, as well as Tafel plots method. The effect of wines on the surface of studied steels has been revealed using scanning electron microscopy. The obtained results show that the values of the corrosion rates in the wines tested for OLC 45 are close to the maximum allowed limit, which means that this type of steel cannot be used in the wine processing and storage. On the contrary, the corrosion rates for AISI 304L steel are extremely low in all the analyzed wines, which proves that they can be used both for wine processing and storage
    • …
    corecore