Filters








68,722 Hits in 7.5 sec

Security in an autonomic computing environment

D. M. Chess, C. C. Palmer, S. R. White
2003 IBM Systems Journal  
In this paper, we discuss these and other security and privacy challenges posed by autonomic systems and provide some recommendations for how these challenges may be met.  ...  System and network security are vital parts of any autonomic computing solution.  ...  In the 1990s, replicating security threats in the form of computer viruses and worms became a significant problem for the computing community.  ... 
doi:10.1147/sj.421.0107 fatcat:qxwwwcam3fbqpfa4j7oot3r364

Managing Cloud Computing Environment: Gaining Customer Trust with Security and Ethical Management

Issam Kouatli
2016 Procedia Computer Science  
These were: security, data protection and ethics in cloud computing environment.  ...  The sample size was 441 where it was resulted in highly significant relationship between ethics and security as well as ethics and data protection which are the main two motivations for any business to  ...  Cloud computing services would add the complexity of managing and maintain a good ethical and/or secure environment.  ... 
doi:10.1016/j.procs.2016.07.110 fatcat:p2oyhvksonehnbpduyz5zmcufq

Learning Analytics in a Shared-Network Educational Environment: Ethical Issues and Countermeasures

Olugbenga Adejo, Thomas Connolly
2017 International Journal of Advanced Computer Science and Applications  
As a result of this, Higher Education Institutions (HEIs) involved in the development of LA tools need to pay particular attention to every ethical challenges/constraint that might arise.  ...  This paper aims to identify and discuss several ethical issues connected with the practice and use of LA tools and technologies in analysing and predicting the performance of students in a shared network  ...  Static data is from the university record systems while the dynamic data is from the systems such as the learning management system, virtual learning environment or social media.  ... 
doi:10.14569/ijacsa.2017.080404 fatcat:x7w3oxuyxbcnvkmg2biamgwove

Assessing Software Risks by Implementing Cloud Readiness and Benchmarking in the Pervasive Environments

2019 International Journal of Engineering and Advanced Technology  
This state of art will create a case for developing new models for access control, identity, trust, risk management in ubiquitous or pervasive computing environments.  ...  In addition, we also proposed a deep insight into Pervasive computing characteristics, risks, and risks models, environmental, ethical and social impacts.  ...  Mobility: It is very challenging to provide data access anywhere and anytime in mobile computing environment. • Context Awareness: Inferring context information is a difficult task in mobile computing  ... 
doi:10.35940/ijeat.a1024.1091s19 fatcat:cpfhspnoafhc3lz6qxeg5ba6vq

Big Data Services Security and Security Challenges in Cloud Environment

Raed Alsufyani, Khursand Jama, Yulin Yao, Muthu Ramachandran, Victor Chang
2016 Proceedings of the International Conference on Internet of Things and Big Data  
This study is concluded with a discussion of current problems and the future direction of cloud computing.  ...  This paper explores security issues of storage in the cloud and the methodologies that can be used to improve the security level.  ...  Security issues related to cloud computing are a huge concern, and organizations and associations need to be aware of them.  ... 
doi:10.5220/0005948904610468 dblp:conf/iotbd/AlsufyaniJYR016 fatcat:4hkgdv7vcjfndjerjy5dyouhyi

PEACE: Personal Enhanced Acquisition for Citizen's Environment

David-Zacharie Issom
2012 Swiss Medical Informatics  
Information and communication technologies have a role to play in improving a citizen's quality of life.  ...  Creating this system required focusing on multiple areas like user interaction paradigms, I/O management, security management systems and automatic services discovery.  ...  Microsoft Research is developing an operating system based on Windows 7 for the control of a holistic home, HomeOS [9] . This system provides intuitive controls for users to manage their devices.  ... 
doi:10.4414/smi.28.00007 fatcat:eoueiq3tyvh4xicmsecuxmjgbm

Special issue on privacy and security on pervasive e-health and assistive environments

Grammati Pantziou, Fillia Makedon, Petros Belsis
2011 Security and Communication Networks  
The limitations and requirements for a system that manages medical information over unstable topologies are described.  ...  He also holds an MSc in information systems from the Department of Informatics, Athens University of Economics and Business, Greece, and a PhD in Information and Communication Systems Engineering from  ... 
doi:10.1002/sec.318 fatcat:m5ofxoowj5fvdbde2bfwm7bgxi

Advanced Personnel Vetting Techniques in Critical Multi-Tennant Hosted Computing Environments

Farhan Hyder, Wolfgang Slany
2013 International Journal of Advanced Computer Science and Applications  
The emergence of cloud computing presents a strategic direction for critical infrastructures and promises to have far-reaching effects on their systems and networks to deliver better outcomes to the nations  ...  The significance of this research is also to counter human rights and ethical dilemmas by presenting a set of ethical and professional guidelines.  ...  for technology and policy solutions for future problems in cloud computing environment. a) Incidents b) Statistical findings and implications regarding technical details of the incidents c) Insider  ... 
doi:10.14569/ijacsa.2013.040502 fatcat:lwe2otxx3jh2zk6ly7hicozgpa

eFRIEND: an ethical framework for intelligent environments development

Simon Jones, Sukhvinder Hara, Juan Carlos Augusto
2014 Ethics and Information Technology  
Intelligent environments aim to provide context-sensitive services to humans in the physical spaces in which they work and live.  ...  While the ethical dimensions of these systems have been considered, this is an aspect which requires further analysis.  ...  The incorporation of adequate and appropriate security measures into any system is key ethical responsibility, and an essential foundation of user trust and confidence in intelligent environments.  ... 
doi:10.1007/s10676-014-9358-1 fatcat:epwjiopdsrcyrj373ghbqykkda

An Exploratory Study on the Usage of Internet Technologies and Tools in Educational Working Environment of Developing Countries: A Case of Pokhara University in Nepal

Deepanjal Shrestha, Seung Ryul Jeong
2015 Journal of Internet Computing and services  
21 st century has seen a tremendous advancement in the field of Information and Communication Technology.  ...  In this paper we analyze the challenges, threats and potential problems in the working environment of Pokhara University due to application of Internet tools and technology.  ...  It started the use of computer system from the time of its operation and the demand for computer technology, Internet usage and information management system has multiplied with every passing year.  ... 
doi:10.7472/jksii.2015.16.4.101 fatcat:fof4p3endjgitgpiawlbstajzq

Towards an evaluation framework for assistive environments

Vangelis Metsis, Zhengyi Le, Yu Lei, Fillia Makedon
2008 Proceedings of the 1st ACM international conference on PErvasive Technologies Related to Assistive Environments - PETRA '08  
Assistive environments incorporate the latest pervasive and ubiquitous technologies and provide a viable alternative to traditional assistive living.  ...  The framework is illustrated using an experimental assistive apartment environment that is being built at the University of Texas at Arlington.  ...  Any opinions, findings, and conclusions or recommendations expressed in this publication are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.  ... 
doi:10.1145/1389586.1389601 dblp:conf/petra/MetsisLLM08 fatcat:rpkkwnuwlzdmxlinmdagy2gdsi

Human‐computer interaction in ubiquitous computing environments

J.H. Abawajy, J.H. Abawajy
2009 International Journal of Pervasive Computing and Communications  
Practical implications -In pervasive computing environments the challenge is to create intuitive and user-friendly interfaces.  ...  Application domains that may utilize human body movements as input are surveyed here and the paper addresses issues such as culture, privacy, security and ethics raised by movement of a user's body-based  ...  One of the most significant challenges in pervasive computing environment is to create intuitive and user-friendly interfaces.  ... 
doi:10.1108/17427370910950311 fatcat:x65afhl3oradjmjoul534743fa

CREATING A BUSINESS PLANNING AND PERFORMANCE MANAGEMENT SYSTEM: THE BASICS

Richard Gerstberger
2005 Proceedings of the Water Environment Federation  
Management Information System (MIS) is a very important tool for business organizations due to the value of information that is provided for effective decision making.  ...  The following reviews, however give a good insight into the MIS understanding. Mosud(2013) has given an explanation of the impact of information system and decision making in the insurance sector.  ...  To manage information systems efficiently Information security challenges in E-Enterprises should be defined for avoiding risks.  ... 
doi:10.2175/193864705783857027 fatcat:gy3opc2shfatzgpow6rolw5bki

Internet of Things and the Environment

Mirela Danubianu, Cristian Teodorescu, Isabela Corneanu
2019 Present Environment and Sustainable Development  
The huge amount of information collected by computerized planning, production management, technology risk practice and health hazards monitoring has to serve both economic development, advanced management  ...  It also highlights the ethical issues related to the development of an interconnected world through IoT (where unrestrained access to information is stopped, who and for whose control this access has been  ...  -Security of information storage is also a major issue: hackers could access databases and destroy them if a ransom is not paid.  ... 
doi:10.2478/pesd-2019-0014 fatcat:yp44sc3zu5bjhp6zgp23iqv73y

How to become a SSHOCingly trustworthy environment for SSH data

Mari Kleemola, Henri Ala-Lahti, Marianne Høgetveit Myhren, Deborah Wiltshire, Holly Wright
2022 Zenodo  
data in the archaeology domain - Holly Wright (University of York)  ...  create SSH GDPR Code of Conduct and legal data protection issues - Marianne Høgetveit Myhren (SIKT, NSD) GESIS and UKDA Pilot on secure connection - Deborah Wiltshire (GESIS) Opening access to research  ...  "In 2016, the 'FAIR Guiding Principles for scientific data management and stewardship' were published in Scientific Data.  ... 
doi:10.5281/zenodo.6448438 fatcat:pfta2mxecbfdxp4bsagcdalhbe
« Previous Showing results 1 — 15 out of 68,722 results