A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Security in an autonomic computing environment
2003
IBM Systems Journal
In this paper, we discuss these and other security and privacy challenges posed by autonomic systems and provide some recommendations for how these challenges may be met. ...
System and network security are vital parts of any autonomic computing solution. ...
In the 1990s, replicating security threats in the form of computer viruses and worms became a significant problem for the computing community. ...
doi:10.1147/sj.421.0107
fatcat:qxwwwcam3fbqpfa4j7oot3r364
Managing Cloud Computing Environment: Gaining Customer Trust with Security and Ethical Management
2016
Procedia Computer Science
These were: security, data protection and ethics in cloud computing environment. ...
The sample size was 441 where it was resulted in highly significant relationship between ethics and security as well as ethics and data protection which are the main two motivations for any business to ...
Cloud computing services would add the complexity of managing and maintain a good ethical and/or secure environment. ...
doi:10.1016/j.procs.2016.07.110
fatcat:p2oyhvksonehnbpduyz5zmcufq
Learning Analytics in a Shared-Network Educational Environment: Ethical Issues and Countermeasures
2017
International Journal of Advanced Computer Science and Applications
As a result of this, Higher Education Institutions (HEIs) involved in the development of LA tools need to pay particular attention to every ethical challenges/constraint that might arise. ...
This paper aims to identify and discuss several ethical issues connected with the practice and use of LA tools and technologies in analysing and predicting the performance of students in a shared network ...
Static data is from the university record systems while the dynamic data is from the systems such as the learning management system, virtual learning environment or social media. ...
doi:10.14569/ijacsa.2017.080404
fatcat:x7w3oxuyxbcnvkmg2biamgwove
Assessing Software Risks by Implementing Cloud Readiness and Benchmarking in the Pervasive Environments
2019
International Journal of Engineering and Advanced Technology
This state of art will create a case for developing new models for access control, identity, trust, risk management in ubiquitous or pervasive computing environments. ...
In addition, we also proposed a deep insight into Pervasive computing characteristics, risks, and risks models, environmental, ethical and social impacts. ...
Mobility: It is very challenging to provide data access anywhere and anytime in mobile computing environment. • Context Awareness: Inferring context information is a difficult task in mobile computing ...
doi:10.35940/ijeat.a1024.1091s19
fatcat:cpfhspnoafhc3lz6qxeg5ba6vq
Big Data Services Security and Security Challenges in Cloud Environment
2016
Proceedings of the International Conference on Internet of Things and Big Data
This study is concluded with a discussion of current problems and the future direction of cloud computing. ...
This paper explores security issues of storage in the cloud and the methodologies that can be used to improve the security level. ...
Security issues related to cloud computing are a huge concern, and organizations and associations need to be aware of them. ...
doi:10.5220/0005948904610468
dblp:conf/iotbd/AlsufyaniJYR016
fatcat:4hkgdv7vcjfndjerjy5dyouhyi
PEACE: Personal Enhanced Acquisition for Citizen's Environment
2012
Swiss Medical Informatics
Information and communication technologies have a role to play in improving a citizen's quality of life. ...
Creating this system required focusing on multiple areas like user interaction paradigms, I/O management, security management systems and automatic services discovery. ...
Microsoft Research is developing an operating system based on Windows 7 for the control of a holistic home, HomeOS [9] . This system provides intuitive controls for users to manage their devices. ...
doi:10.4414/smi.28.00007
fatcat:eoueiq3tyvh4xicmsecuxmjgbm
Special issue on privacy and security on pervasive e-health and assistive environments
2011
Security and Communication Networks
The limitations and requirements for a system that manages medical information over unstable topologies are described. ...
He also holds an MSc in information systems from the Department of Informatics, Athens University of Economics and Business, Greece, and a PhD in Information and Communication Systems Engineering from ...
doi:10.1002/sec.318
fatcat:m5ofxoowj5fvdbde2bfwm7bgxi
Advanced Personnel Vetting Techniques in Critical Multi-Tennant Hosted Computing Environments
2013
International Journal of Advanced Computer Science and Applications
The emergence of cloud computing presents a strategic direction for critical infrastructures and promises to have far-reaching effects on their systems and networks to deliver better outcomes to the nations ...
The significance of this research is also to counter human rights and ethical dilemmas by presenting a set of ethical and professional guidelines. ...
for technology and policy solutions for future problems in cloud computing environment. a) Incidents
b) Statistical findings and implications regarding
technical details of the incidents
c) Insider ...
doi:10.14569/ijacsa.2013.040502
fatcat:lwe2otxx3jh2zk6ly7hicozgpa
eFRIEND: an ethical framework for intelligent environments development
2014
Ethics and Information Technology
Intelligent environments aim to provide context-sensitive services to humans in the physical spaces in which they work and live. ...
While the ethical dimensions of these systems have been considered, this is an aspect which requires further analysis. ...
The incorporation of adequate and appropriate security measures into any system is key ethical responsibility, and an essential foundation of user trust and confidence in intelligent environments. ...
doi:10.1007/s10676-014-9358-1
fatcat:epwjiopdsrcyrj373ghbqykkda
An Exploratory Study on the Usage of Internet Technologies and Tools in Educational Working Environment of Developing Countries: A Case of Pokhara University in Nepal
2015
Journal of Internet Computing and services
21 st century has seen a tremendous advancement in the field of Information and Communication Technology. ...
In this paper we analyze the challenges, threats and potential problems in the working environment of Pokhara University due to application of Internet tools and technology. ...
It started the use of computer system from the time of its operation and the demand for computer technology, Internet usage and information management system has multiplied with every passing year. ...
doi:10.7472/jksii.2015.16.4.101
fatcat:fof4p3endjgitgpiawlbstajzq
Towards an evaluation framework for assistive environments
2008
Proceedings of the 1st ACM international conference on PErvasive Technologies Related to Assistive Environments - PETRA '08
Assistive environments incorporate the latest pervasive and ubiquitous technologies and provide a viable alternative to traditional assistive living. ...
The framework is illustrated using an experimental assistive apartment environment that is being built at the University of Texas at Arlington. ...
Any opinions, findings, and conclusions or recommendations expressed in this publication are those of the author(s) and do not necessarily reflect the views of the National Science Foundation. ...
doi:10.1145/1389586.1389601
dblp:conf/petra/MetsisLLM08
fatcat:rpkkwnuwlzdmxlinmdagy2gdsi
Human‐computer interaction in ubiquitous computing environments
2009
International Journal of Pervasive Computing and Communications
Practical implications -In pervasive computing environments the challenge is to create intuitive and user-friendly interfaces. ...
Application domains that may utilize human body movements as input are surveyed here and the paper addresses issues such as culture, privacy, security and ethics raised by movement of a user's body-based ...
One of the most significant challenges in pervasive computing environment is to create intuitive and user-friendly interfaces. ...
doi:10.1108/17427370910950311
fatcat:x65afhl3oradjmjoul534743fa
CREATING A BUSINESS PLANNING AND PERFORMANCE MANAGEMENT SYSTEM: THE BASICS
2005
Proceedings of the Water Environment Federation
Management Information System (MIS) is a very important tool for business organizations due to the value of information that is provided for effective decision making. ...
The following reviews, however give a good insight into the MIS understanding. Mosud(2013) has given an explanation of the impact of information system and decision making in the insurance sector. ...
To manage information systems efficiently Information security challenges in E-Enterprises should be defined for avoiding risks. ...
doi:10.2175/193864705783857027
fatcat:gy3opc2shfatzgpow6rolw5bki
Internet of Things and the Environment
2019
Present Environment and Sustainable Development
The huge amount of information collected by computerized planning, production management, technology risk practice and health hazards monitoring has to serve both economic development, advanced management ...
It also highlights the ethical issues related to the development of an interconnected world through IoT (where unrestrained access to information is stopped, who and for whose control this access has been ...
-Security of information storage is also a major issue: hackers could access databases and destroy them if a ransom is not paid. ...
doi:10.2478/pesd-2019-0014
fatcat:yp44sc3zu5bjhp6zgp23iqv73y
How to become a SSHOCingly trustworthy environment for SSH data
2022
Zenodo
data in the archaeology domain - Holly Wright (University of York) ...
create SSH GDPR Code of Conduct and legal data protection issues - Marianne Høgetveit Myhren (SIKT, NSD) GESIS and UKDA Pilot on secure connection - Deborah Wiltshire (GESIS) Opening access to research ...
"In 2016, the 'FAIR Guiding Principles for scientific data management and stewardship' were published in Scientific Data. ...
doi:10.5281/zenodo.6448438
fatcat:pfta2mxecbfdxp4bsagcdalhbe
« Previous
Showing results 1 — 15 out of 68,722 results