The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Knowledge is seen as one of the main resources for organizations providing knowledge-intensive services. Therefore, sharing and reusing are the main goals of the modern knowledge management (KM) approach, driven by information and communication technologies (ICT). However, one must ask for the details in order to provide the means and tools to design and deploy an environment able to fulfil these...
Organizations are exposed to various cyber-attacks. When a component is exploited, the overall computed damage is impacted by the number of components the network includes. This work is focuses on estimating the Target Distribution characteristic of an attacked network. According existing security assessment models, Target Distribution is assessed by using ordinal values based on users' intuitive...
Instruction set simulators (ISSs) play a critical role in the design cycle of embedded systems. However, as ISSs evolve and increase in complexity, not only new bugs might be introduced but also old latent bugs might be revealed. Finding these bugs based on the simulator output might be a challenging task. This letter presents HybridVerifier, a novel and retargetable framework for ISS verification...
Cloud computing has been evolving over a couple of years with the increased use of cloud-based services like Amazon Web Services (AWS), Dropbox, Office 365, and so on. It revolves around the several technologies, for developing and supporting these services. With the evolution of new technologies, it leads to widespread use of cloud-based applications in real time. Processing powers are increased...
Cloud computing is an emerging economic modelthat provides a broad network access to services with manybenefits to many tenants at the same time. Although it createsa large potential to develop new online services the evolution ofcloud computing has been accompanied by the proliferation ofvarious attacks against the services on the cloud infrastructures. The importance of risk management in cloud...
There is a significant need to give careful consideration to Capability Maturity Model Integration (CMMI) Level 2 specific practices—SP 1.3 “manage requirements changes,” and SP 1.4 “maintain bidirectional traceability of requirements,” especially in the context of small- and medium-sized software development organizations in Saudi Arabia, in order to assist such organizations in getting one step...
Today's universities are on the forefront of technological advancement which makes University's computing environment vulnerable because of its large open networks. This paper analyzed the security threats specifically evolve in University's network, and with consideration of these issues, proposed risk assessment framework for University computing environment. The proposed framework reduces the risk...
Cloud computing has been evolved from server based context to service-oriented context. This transformation poses lots of challenges to a cloud environment in terms of cloud service reliability and information security. In most of the aspects of current cloud service environment, lot of information exchange taking place without much security. In this context cloud computing, with reliability and security...
Cloud computing is an emerging trend that provides on-demand computational resources to the end users as services. Hence, consumers are charged based on their usage and consumption of services delivered through the Internet. This paradigm aims at outsourcing and delegating computations to an external third-party and reducing operating costs. As a result, public sector and private enterprises are interested...
Now a day's, cloud is an environment for sharing computing resources like any IT infrastructure hitherto available in-house, software applications, development platforms that can be efficiently and effectively, accessed and utilized. These computing resources could be dynamically reconfigured against variable loads to maximize the resource utilization. New and unknown threats arise due to rapid technology...
This paper explores about the use of enablers, criteria and attributes as a conceptual model to assess the leanness level of the banking organization. The twofold objectives are set to be achieved through this paper. First is to find the leanness level of a banking organization for which a cooperative bank has been selected as the case company. Second is to find the critical obstacles for the lean...
In the current paper we propose analyzing the recorded information about broken rules in business process execution and using it for enhancing business process models defined inside organizations for specific business cases. An alert system is designed as a Web Application for detecting deviations by verifying the event log data of the running cases. We consider it a Business Activity Monitoring solution...
Cloud computing is a set of Information Technology services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Cloud computing is a new general purpose internet-based technology through which information is stored in servers and provided as a service and on-demand to the clients. It builds on decades of research in...
Information systems (IS) researchers have developed various frameworks to understand the reactions of individuals to new information systems and their decisions to continue or discontinue their use. While routine use is usually enough to obtain the first-order benefits of information systems once they have been deployed in an enterprise, more extensive and deeper use of these systems is needed to...
This paper summarizes an event which brought together modeling experts, users, potential users and healthcare management practitioners to explore the question of evidence in the field of healthcare: how it is, and how it should be, used. The paper is an abridged version of a full report on the event. The paper highlights the high status accorded to empirical evidence (generated, in particular by randomized...
In this paper the new Cloud task at temper is discussed. It combined the Cloud computing with role layer resource organize, role working flow and role collaboration. Consequently, the tactical computing functions has been shifted from single node running into simultaneous multi-node operation. Thus, the problems caused by large amount of data and complicated operation, such as poor speed, high request...
The purpose of this paper is to introduce a model — the Cyber Security Governance Maturity model — that aims to determine the general Cyber Security maturity of n organization. The model is made up of a number of constituent maturity models which together aims at determining the overall Cyber Security Governance maturity. The end result of this model is a "Cyber Security Governance Maturity dashboard",...
The use of models has been one of the prevalent approaches to enhancing information security education and awareness in existing literature. Models provide step by step problem solving opportunities and are thus essential in security education and awareness activities. This paper categorized models for enhancing security education and awareness based on their stakeholder domains into: End-Users, Institutions...
Cloud bursting is a deployment model in cloud computing that allows organizations to utilize additional computing resources temporarily from the public cloud, for running certain heavy-duty applications. However, not all applications in an organization are suitable for cloud bursting, due to several reasons. Cloud bursting of applications is constrained by the way those applications are built and...
Cloud computing has emerged as a fast-growing paradigm for storing/sharing data and delivering services over the Internet. It provides its users with a way to deal with information or data without investing in any new technology or resources of their own. Although cloud computing environment is viewed as a promising Internet-based computing platform, the security challenges it poses are also equally...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.