54 research outputs found

    Turvanõuete tuletamine äriprotsesside mudelitest

    Get PDF
    Väitekirja elektrooniline versioon ei sisalda publikatsioone.Iga ettevõte toodab mingit väärtust, mis nende klientidele kasuks tuleb. Ettevõte saab oma äriplaani tõhusalt ja efektiivselt täita vaid sel juhul, kui indiviidid ja teised ettevõtteallikad nagu informatsioonisüsteemid hästi koos töötavad. Äriprotsessid mängivad olulist rolli selle koostöö hõlbustamisel. Neid äriprotsesse kirjeldatakse mudelite abil, mida nimetatakse äriprotsessimudeliteks. Viimastel aastatel on nende äriprotsesside mudelite modelleerimine arvestatavat tähelepanu pälvinud. Seda seepärast, et äriprotsessimudelite jaoks töötatakse välja üha rohkem infosüsteeme. Veelgi enam, arvestades dünaamilise ärikeskkonnaga, mida digitaalne majandus endaga kaasa on toonud, peavad ettevõtted pidevalt oma äriprotsesse ja tugiinfosüsteeme arendama, et turul toimuvate muutustega toime tulla ning et tehnoloogiauuendustest kasu lõigata. See fenomen suurendab vajadust kohase infoturvalisuse järele äriprotsessides. Tänapäeval ei ole turvalisuse tähtsus enam kaugeltki ainult äri jätkusuutlikkuse tagamine või ettevõtte varade kaitsmine; mõned autorid väidavad, et turvalisus ongi see liikumapanev jõud, mille pärast äri teha. Põhilise probleemid olemasolevate turvalisuse analüüsimise meetoditega on, et need lähenemised keskenduvad turvakontrollide rakendamisele ja ei pööra tähelepanu turvalisuse aluspõhimõtetele. Samamoodi on puudu või juhuslik tingimuste esiletoomine ning see viib mõne väga tähtsa turvatingimuse kahe silma vahele jätmiseni ning kuna äriprotsessid on oma loomult dünaamilised ning keerulised, käsitlevad uurimused ainult osasid aspekte, mitte üleüldist äriprotsesside turvalisust. Et seda vajadust hinnata, on selle lõputöö meetodiks analüüsida äriprotsessimudeleid turvalisuse vaatepunktist, et sellest turvalisuse eesmärke ja tingimusi tuletada. Lõputöö on esitanud kolm täiendavat osa: esiteks, turvariski suunitlusega mustrid, mis integreerivad turvariski analüüsi äriprotsessimudelitesse. Need mustrid toetavad turvariski mõisteid äriprotsessimudelites, millest ärianalüütikud lihtsasti aru saavad. Teiseks, äriprotsesside turvalisuse hindamise taksonoomiat. Seda taksonoomiat kasutatakse turvariski suunitlusega mustrite kindlaks tegemisel ning see aitab analüütikutel neid mustreid äriprotsessimudelites kasutada. Lõpuks moodustavad need tulemused põhja ühele meetodile, turvatingimuste esiletoomine äriprotsessides (Security Requirements’ Elicitation from Business Processes, SREBP), mis viib läbi turvatingimuste esiletoomist nende äriprotsesside jaoks. Need osad töötavad koos, et toetada turvatingimuste esiletoomist äriprotsessimudelites, kus i) ärivarade tuvastamine ning turvaeesmärkide kindlakstegemine viiakse läbi ettevõtte äriprotsessidega. Veelgi enam, ii) turvatingimuste esiletoomist viiakse läbi töötavate äriprotsesside peal, kasutades väljamõeldud piirkondi.Any given enterprise produces some value that is for the benefit of its customers. An enterprise can reach its business goals in an efficient and effective manner only if individuals and other enterprise resources, such as information systems, play together well. Business processes are an important concept to facilitating this effective collaboration. These business processes are described with models that are called business process models. In recent years, modeling of these business process models has received considerable attention. This is due to the fact that information systems increasingly being designed to support business processes. Moreover, given the dynamic business environment that the digital economy has brought about, enterprises need to continuously evolve their business processes and supporting information systems in order to cope with market changes and to take advantage of technology innovations. This phenomenon increases the need for appropriate information security in business processes. Nowadays, the importance of security has gone far away from just ensuring the business continuity or protecting enterprise’s assets; some authors claim security to be the driving force to do business at all. The major problems in existing methods for addressing security analysis are that, these approaches focuses on the implementation of security controls, and leaving behind the rationale for security. Similarly, the requirements elicitation is either missing or haphazard, this leads to miss some critical security requirements; and due to the dynamic and complicated nature of business processes the studies only addresses varying aspects but not the overall security of business processes. To consider this need, the approach taken in this thesis is to analyse the business process models from a security perspective to derive security objectives and requirements. The thesis has proposed three complementary contributions: Firstly, security risk-oriented patterns that integrate the security risk analysis into business process models. These patterns supports security risk concepts in business process models that business analyst can understand easily. Secondly, the taxonomy for assessing security in business processes. This taxonomy is used to classify the security risk-oriented patterns and helps analysts to apply these patterns in business process models. Finally, these contributions form a foundation for a method, security requirements elicitation from business processes (SREBP) that performs a systematic elicitation of security requirements for their business processes. These contributions work together to support the security requirements elicitation from business process models, where, i) the identification of business assets and determination of security objectives are carried out from the enterprise’s business processes. Moreover, ii) the elicitation of security requirements are performed on the operational business processes using contextual areas

    APACHE-II Score Correlation With Mortality And Length Of Stay In An Intensive Care Unit

    Get PDF
    Objective: To correlate the APACHE-II score system with mortality and length of stay in ICU. Study Design: Cohort study. Place and Duration of Study: The Intensive Care Unit (ICU) of the Aga Khan University Hospital, Karachi, from May 2005 to May 2006. Methodology: All adult patients who were admitted in the ICU were included. APACHE-II score was calculated at the second and seventh days of admission in the ICU. Patients who were discharged alive from the ICU or died after first APACHE-II Score (at 2nd day) were noted as the primary outcome measurement. Second APACHE-II score (at 7th day) was used to predict the length of stay in the ICU. Pearson\u27s correlation coefficient (r) was determined with significance at p \u3c 0.05. Results: In the lowest score category 3-10, 27 out of 30 patients (90%) were discharged and only 3 (10%) died. Out of those 39 patients whose APACHE-II score was found in high category 31 - 40, 33 (84.6%) deaths were observed. This revealed that there might be more chances of death in case of high APACHE-II score (p=0.001). Insignificant but an inverse correlation (r = -0.084, p \u3c 0.183) was observed between APACHE-II score and length of ICU stay. Conclusion: The APACHE-II scoring system was found useful for classifying patients according to their disease severity. There was an inverse relationship between the high score and the length of stay as well higher chances of mortality

    Development of stress-induced cardiomyopathy after cytoreductive surgery and hyperthermic intraperitoneal chemotherapy

    Get PDF
    Pseudomyxoma Peritonei, a massive mucinous peritoneal collection due to a rare epithelial neoplasm, can be effectively treated with Cytoreductive Surgery and Hyperthermic Intraperitoneal Chemotherapy (CRS-HIPEC). A 43-year-old female, previously treated for mucinous ovarian carcinoma with CRS-HIPEC, and total abdominal hysterectomy and bilateral salpingo-oophorectomy, presented with new-onset abdominal distension and early satiety. She was diagnosed with Pseudomyxoma Peritonei. After 48 hours of treatment with CRS-HIPEC, she presented haemodynamically unstable with acute chest pain. Electrocardiogram showed broad complex tachycardia with ST depression in leads V3-6. Severe systolic dysfunction with Ejection Fraction (EF) of 20% along with severe pulmonary hypertension, visualized on Echocardiography. A diagnosis of Stress-induced Cardiomyopathy was established using InterTAK Diagnostic Score. Patients with CRS-HIPEC have presented with Stress-induced Cardiomyopathy. However, no specific relation between the two has been established. This case report discusses Stress-induced Cardiomyopathy as a complication of CRS-HIPEC

    Criteria and Heuristics for Business Process Model Decomposition - Review and Comparative Evaluation

    Get PDF
    It is generally agreed that large process models should be decomposed into sub-processes in order to enhance understandability and maintainability. Accordingly, a number of process decomposition criteria and heuristics have been proposed in the literature. This paper presents a review of the field revealing distinct classes of criteria and heuristics. The study raises the question of how different decomposition heuristics affect process model understandability and maintainability. To address this question, an experiment is conducted where two different heuristics, one based on breakpoints and the other on data objects, were used to decompose a flat process model. The results of the experiment show that, although there are minor differences, the heuristics cause very similar results in regard to understandability and maintainability as measured by various process model metrics

    Integrated artificial intelligence effect on crisis management and lean production: structural equation modelling frame work

    Get PDF
    It is a goal that manufacturing companies strive towards on a regular basis, and it involves enhancing the efficiency and productivity of maintenance operations. It is especially vital to avoid unforeseen breakdowns, which may result in costly charges and production losses if they do not occur in advance. While the execution of an acceptable management plan affects maintenance productivity, it also affects the adoption of proper procedures and tools to help in the assessment processes in this field. This difficulty, among other things, affects a company's capacity to achieve high performance with the equipment it employs, as well as the judgement process and the design of the firm's maintenance plan. In order to achieve this goal, the aim of this paper is to exemplify how intelligent systems can be used to enhance judgement techniques in the implementation of the lean maintenance perspective, allowing for an advancement in the functional capabilities of the industry's technological infrastructure. The reseachers employed artificial intelligence technologies to look for connections between specific operations carried out as part of the deployment of lean maintenance and the findings achieved. The raw set notion, which was used in this situation, was used to determine whether or not the lean maintenance method was being used in this study. The crisis management process carries with it some of the most complex data technology concerns ever encountered. It necessitates, among other items, active information gathering and information transfer efforts, that are used for a range of functions, such as decreasing uncertainty, attempting to measure and manage consequences, and attempting to manage resources in a way that goes beyond what is generally possible to deal with daily problems. It also needs the employment of artificial intelligence technology, among other things, to increase crisis awareness.Campus At

    The burden of stroke and transient ischemic attack in Pakistan: a community-based prevalence study.

    Get PDF
    BACKGROUND: The burden of cerebrovascular disease in developing countries is rising sharply. The prevalence of established risk factors of stroke is exceptionally high in Pakistan. However, there is limited data on the burden of stroke and transient ischemic attack (TIA) in South Asia. We report the first such study conducted in an urban slum of Karachi, Pakistan. METHODS: Individuals 35 years of age or older were invited for participation in this investigation through simple random sampling. A structured face-to-face interview was conducted using a pre-tested stroke symptom questionnaire in each participant to screen for past stroke or TIA followed by neurological examination of suspected cases. Anthropometric measurements and random blood glucose levels were recorded. Multivariable logistic regression was used to determine the association of vascular risk factors with prevalence of stroke. RESULTS: Five hundred and forty five individuals (49.4% females) participated in the study with a response rate of 90.8%. One hundred and four individuals (19.1%) were observed to have a prior stroke while TIA was found in 53 individuals (9.7%). Overall, 119 individuals (21.8% with 66.4% females) had stroke and/or TIA. Female gender, old age, raised random blood glucose level and use of chewable tobacco were significantly associated with the prevalence of cerebrovascular disease. CONCLUSION: This is the first study demonstrating an alarmingly high life-time prevalence of cerebrovascular disease in Pakistan. Individual and public health interventions in Pakistan to increase awareness about stroke, its prevention and therapy are warranted.RIGHTS : This article is licensed under the BioMed Central licence at http://www.biomedcentral.com/about/license which is similar to the 'Creative Commons Attribution Licence'. In brief you may : copy, distribute, and display the work; make derivative works; or make commercial use of the work - under the following conditions: the original author must be given credit; for any reuse or distribution, it must be made clear to others what the license terms of this work are

    The prediction of sleep quality using wearable-assisted smart health monitoring systems based on statistical data

    Get PDF
    The technology, which plays a significant role in our lives, has made it possible for many of the appliances and gadgets we use on a daily basis to be monitored and controlled remotely. Health and fitness data is collected by wearable devices attached to patients' bodies. A number of parties could benefit from this technology, including doctors, insurers, and health providers. This technology, including smartwatches, smart ring, smart cloth wristbands, and GPS shoes, is frequently used for fitness and wellness since it allows users to track their day-to-day health. Devices that compute the sleep characteristics by storing sleep movements fall within the category of wearables worn on the wrist. In order to lead a healthy lifestyle, sleep is crucial. Inadequate sleep can harm one's physical, mental, and emotional well-being and increase the risk of developing a number of ailments, including stress, heart disease, high blood pressure, insulin resistance, and other conditions. Deep learning (DL) models have recently been used to forecast sleep-quality based on wearables information from the awake hours. Deep learning has been demonstrated to be capable of predicting sleep efficiency based on wearable data obtained during awake periods. In this regard, this study creates a novel deep learning model for wearables-enabled smart health monitoring system (DLM-WESHMS) for the prediction of sleep quality. The wearables are initially able to collect data linked to sleep-activity using the described DLM-WESHMS approach. The data is then put through pre-processing to create a standard format. Using the DLM-WESHMS, sleep quality is predicted using the deep belief network (DBN) model. The DBN model uses the auto-encoders algorithm (AEA) to predict popularity, which improves the accuracy of its predictions of sleep quality. The experimental outcomes of the DLM-WESHMS approach are investigated using several metrics. The DLM-WESHMS model performs significantly better than other models, according to a thorough comparison analysis

    The Karachi intracranial stenosis study (KISS) Protocol: an urban multicenter case-control investigation reporting the clinical, radiologic and biochemical associations of intracranial stenosis in Pakistan.

    Get PDF
    Background: Intracranial stenosis is the most common cause of stroke among Asians. It has a poor prognosis with a high rate of recurrence. No effective medical or surgical treatment modality has been developed for the treatment of stroke due to intracranial stenosis. We aim to identify risk factors and biomarkers for intracranial stenosis and to develop techniques such as use of transcranial doppler to help diagnose intracranial stenosis in a cost-effective manner. Methods/Design: The Karachi Intracranial Stenosis Study (KISS) is a prospective, observational, case-control study to describe the clinical features and determine the risk factors of patients with stroke due to intracranial stenosis and compare them to those with stroke due to other etiologies as well as to unaffected individuals. We plan to recruit 200 patients with stroke due to intracranial stenosis and two control groups each of 150 matched individuals. The first set of controls will include patients with ischemic stroke that is due to other atherosclerotic mechanisms specifically lacunar and cardioembolic strokes. The second group will consist of stroke free individuals. Standardized interviews will be conducted to determine demographic, medical, social, and behavioral variables along with baseline medications. Mandatory procedures for inclusion in the study are clinical confirmation of stroke by a healthcare professional within 72 hours of onset, 12 lead electrocardiogram, and neuroimaging. In addition, lipid profile, serum glucose, creatinine and HbA1C will be measured in all participants. Ancillary tests will include carotid ultrasound, transcranial doppler and magnetic resonance or computed tomography angiogram to rule out concurrent carotid disease. Echocardiogram and other additional investigations will be performed at these centers at the discretion of the regional physicians. Discussion: The results of this study will help inform locally relevant clinical guidelines and effective public health and individual interventions

    Determinants of intra-household food allocation between adults in South Asia - a systematic review.

    Get PDF
    BACKGROUND: Nutrition interventions, often delivered at the household level, could increase their efficiency by channelling resources towards pregnant or lactating women, instead of leaving resources to be disproportionately allocated to traditionally favoured men. However, understanding of how to design targeted nutrition programs is limited by a lack of understanding of the factors affecting the intra-household allocation of food. METHODS: We systematically reviewed literature on the factors affecting the allocation of food to adults in South Asian households (in Afghanistan, Bangladesh, Bhutan, India, Islamic Republic of Iran, Maldives, Nepal, Pakistan, Sri Lanka) and developed a framework of food allocation determinants. Two reviewers independently searched and filtered results from PubMed, Web of Knowledge and Scopus databases by using pre-defined search terms and hand-searching the references from selected papers. Determinants were extracted, categorised into a framework, and narratively described. We used adapted Downs and Black and Critical Appraisal Skills Programme checklists to assess the quality of evidence. RESULTS: Out of 6928 retrieved studies we found 60 relevant results. Recent, high quality evidence was limited and mainly from Bangladesh, India and Nepal. There were no results from Iran, Afghanistan, Maldives, or Bhutan. At the intra-household level, food allocation was determined by relative differences in household members' income, bargaining power, food behaviours, social status, tastes and preferences, and interpersonal relationships. Household-level determinants included wealth, food security, occupation, land ownership, household size, religion / ethnicity / caste, education, and nutrition knowledge. In general, the highest inequity occurred in households experiencing severe or unexpected food insecurity, and also in better-off, high caste households, whereas poorer, low caste but not severely food insecure households were more equitable. Food allocation also varied regionally and seasonally. CONCLUSION: Program benefits may be differentially distributed within households of different socioeconomic status, and targeting of nutrition programs might be improved by influencing determinants that are amenable to change, such as food security, women's employment, or nutrition knowledge. Longitudinal studies in different settings could unravel causal effects. Conclusions are not generalizable to the whole South Asian region, and research is needed in many countries
    corecore