The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The complexity of contemporary external action missions is increasing with a growing number of civilian and other non-military actors operating in a shared environment. There are currently not sufficient capabilities for civil-military cooperation in place which hinders operational effectiveness and the full exploitation of the information sharing potential. We contribute to the assessment of information...
Industry classification has been rigorously utilized in academic research and business analytics. The existing classification schemes, however, have been constructed and maintained manually by domain experts, which require exhaustive time and human effort while vulnerable to subjectivity. Hence, the existing classification systems do not properly reflect the fast-changing trends of the firms and the...
Cyber has been on NATO’s agenda since 2002, with clear mandates and taskings from Summits and Ministerials on how to develop its capacity in the area. Yet, despite an increasingly cyber-dependent world and visible progress on the Alliance’s civilian side, NATO has had no visible track record on how this change in the way the world does business has had an impact on its key military structure and enabler...
The role of social media may be considered as an important development in aiding crisis, thus the purpose of this study was to determine the factors influencing the use of social media during crises. An online survey of 44 respondents was conducted. The study revealed that there is a need for the use of social media in crises, however there were underlying factors contributing to the use of social...
To enable effective and efficient service delivery, addressing data quality problems is an item of high importance on the business agenda of managers in government departments. However, the constant use of manual and legacy information systems, in South African government departments contributes significantly to poor data quality. This work proposes a conceptual model for improving Data Quality Management...
Using large-scale web survey in six countries we study the societal readiness and acceptance of specific technology options in relation to the potential next generation of ePassports. We find that the public has only limited knowledge of the electronic data and functions ePassports include, and often have no clear opinion on various potential uses for ePassports and related personal data. Still, the...
Identifying global change impacts on Defence will assist future preparedness, minimize unanticipated demand and reduce unfunded cost pressures. The physical world is observably changing, arguably at an increasing rate and perhaps irreversibly. This is provoking socio-economic, technological and geographical change — known as Global Change. These changes will affect Defence, directly and indirectly,...
Recently, interest in performance modeling of out-come-based regulations has grown in the regulatory community. In this context, performance modeling refers to the measuring of important business aspects in a coordinated manner and the use of these measurements for improved decision making. Goal modeling techniques have shown to be beneficial when expressing and analyzing performance models. Since...
The cyber threat landscape is evolving at a much faster rate than corporate cyber defenses are. Malicious actors have become more audacious in their exploit attempts during the past two years as evidenced by the growing number of publicly acknowledged breaches in the commercial and industrial sectors. Motivations range the gamut from “hacktivism” to corporate espionage. This paper will discuss one...
Instances of fraudulent acts are often headline news in the popular press in South Africa. Increasingly these press reports point to the government tender process as being the main enabler used by the perpetrators committing the fraud. The cause of the tender fraud problem is a confidentiality breach of information. This is accomplished, in part, by compromising the tender information contained in...
In a masquerade attack, an adversary who has stolen a legitimate user's credentials attempts to impersonate him to carry out malicious actions. Automatic detection of such attacks is often undertaken constructing models of normal behaviour of each user and then measuring significant departures from them. One potential vulnerability of this approach is that anomaly detection algorithms are generally...
The negative effect neo-liberalism impact the Chinese social security reform is domination of the financial crisis. the neo-liberalism whose core is excessive marketization and privatization deviated neo-liberalism to Chinese social security reform from the fair, mutual economic track. we should emphasize state intervention and social equity of Keynesian rational return to correctly guide the direction...
In this study, we proposed a set of constructs and used it to assess the effects of ICT on e-commerce migration-migrating toward internet-based e-commerce at firm level. We examined the validity of the instrument in terms of the relationships to e-commerce migration with data from 156 firms in China. A series of hypotheses were designed and tested, and the drivers and their contributions to e-commerce...
Advances in digital technology are increasing the volume of computer data and accelerating the massive integration of software into our daily lives. The widespread interconnection of networks and digital convergence accentuates this computerization process, making computing, telecommunications and audiovisual information increasingly compatible and interoperable. eGovernment services to citizens and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.