The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
End-of-life management of complex systems is increasingly important for industry because of growing environmental concerns and associated regulations. In many areas, lack of hindsight and significant statistical information restricts the efficiency of end-of-life management processes and additional expert knowledge is required. In this context and to promote the reuse of secondhand components, a methodology...
Researchers have shown that human decision making in complex environments like cyber is a significant risk factor. Unfortunately, much work on cyber situational awareness has been technology-focused, despite the ultimate importance of human decisions, especially in crisis situations like real-time cyber-attacks and data breaches. Cybersecurity practitioners and leaders require an appropriate framework...
Military command and control networks exist in the context of System of Systems. In a near-peer land combat environment, the benefits conferred to a commander by a networked command and control system make that network a highly desirable cyber target. This paper contends that the successful compromise of a command and control system, in conjunction with an integrated deception plan, leads to the degradation...
The benefits of contract management can be usually observed in terms of ambiguity minimization, disputes avoidance and smooth completion of processes arising from contractual agreements. Neverthless, uncertainty still plays its role: contractors might not have detailed information on the objective to achieve, the realization context could be not fully identified, the assumptions made at contract signing...
A complex system's requirements almost always remain uncertain late into its software development. In gas turbine engine control systems at Rolls-Royce, for a traditional project (non-product line) typically 50% of requirements will change between Critical Design Review and Entry into Service. Requirements uncertainty is particularly relevant when defining the scope of a Software Product Line. If...
This paper describes the proposed implementation of “Data-Rich Sequence Diagrams” in association with top events from Fault Tree Analysis used for risk assessments at the Deep Space Network (DSN). 12Given the probability of a top event, “the risk”, there will be actions taken and further events occurring after the risk manifests itself. By diagramming the initiating risk event, the pivotal events...
When the precise risk probability or consequence is not known, as is the case with many online security risks, it is not clear how people judge and respond to such risks. In this research, we study the impact of e-commerce consumers' knowledge of online security risks on their risk evaluation and purchase intentions. Based on research in the decision theory field, we categorize a person's knowledge...
Usage control model (UCON) is based on the idea that attributes required for decision-making can be changed over a period of usage. Since it is not always possible to get a fresh and trustworthy value of attributes, a decision has to be done with some uncertainties in mind. Moreover, modern systems become more distributed and dynamic and this evolution aggravates the problem. Such trend demands for...
In this period of grave economic uncertainty, organizations have to manage increasingly complicated situations in an environment that is subject to massive and rapid evolution. A solely intuitive approach to risk management is no longer sufficient when considering the need to optimize investments in relation to security. It is necessary to find the often difficult balance between the cost of risks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.