Filters








8,272 Hits in 7.9 sec

Legacy Systems Modernisation for Citizen-Centric Digital Government: A Conceptual Model

Humairath Abu Bakar, Rozilawati Razali, Dian Indrayani Jambari
2021 Sustainability  
Nevertheless, legacy systems are essential in supporting critical functions in organisations including the public sector and could not be scrapped easily.  ...  Information technology and communication (ICT) plays an important role as a catalyst for organisational development and innovation.  ...  The systems were developed using software and hardware that were compatible at the time they were developed.  ... 
doi:10.3390/su132313112 fatcat:kw3zm5ml2nezreozjhmvp6dhqe

Advancing cybersecurity capabilities for South African organisations through RD

Zubeida Casmod Khan, Nenekazi Mkuzangwe
2022 International Conference on Cyber Warfare and Security (ICIW)  
starting point is perhaps the identification of key research and development (R&D) areas together with key activitiesthat organisations can focus on in order to improve their cybersecurity capabilities  ...  Five integral R&D dimensions were identified together with key activities and are presented and discussed.  ...  Thus, the main goal for this pillar is: to prepare people in an organisation by training and other human-centric, interactive activities to ensure that an organisation's IT systems are secure.  ... 
doi:10.34190/iccws.17.1.34 fatcat:cz33t5of6rfqfmnadwkezynise

Human-centric Cyber Hygiene

Elina Argyridou, Christos Laoudias
2022 Zenodo  
The webinar "Human-centric Cyber Hygiene" covers human-related aspects regarding cybersecurity and data privacy in the healthcare sector.  ...  and data privacy risks based on the identified risk strategy.  ...  healthcare organisations have experienced personal information (medical) theft cases ➢59% of healthcare organisations would need sufficient security budget ▪ Cyber Hygiene refers to activities that  ... 
doi:10.5281/zenodo.6395105 fatcat:zhze5woglrdg3pzyg2tpvoiofm

Community Informatics Social Network for Facilitated Community Policing: A Case Study of Nigeria

Chinedu Pascal Ezenkwu
2013 Software Engineering (Science Publishing Group)  
The CISN4FCP is a software intensive system; hence, its development follows a Community Centric Incremental Software Development Methodology (CCISDM).  ...  Community Policing is a policing strategy that aims at creating an atmosphere that promotes police-public partnership in providing proactive and active solutions to crimes in a community.  ...  Requirement 25 Centric Incremental Software Development is used in the development of the system.  ... 
doi:10.11648/j.se.20130103.12 fatcat:zpuduapfbffthpwwiw2oikslcu

Role of Agile in Digital Public Health Transformation

Peter Kokol, Helena Blažun Vošner, Marko Kokol, Jernej Završnik
2022 Frontiers in Public Health  
Traditional software development life cycles have often failed in designing complex software; consequently, the agile approach was introduced.  ...  The analysis showed that the use of the agile approach is underutilised in developing digital health software.  ...  AGILE IS SHAPING THE SOFTWARE DEVELOPMENT Traditional software development life cycles (SDLC) have often failed in designing complex software.  ... 
doi:10.3389/fpubh.2022.899874 pmid:35646754 pmcid:PMC9134062 fatcat:35uvr5pivvasxo3oymhyvzk7va

A Review of Asset-Centric Threat Modelling Approaches

Livinus Obiora Nweke, Stephen D.
2020 International Journal of Advanced Computer Science and Applications  
The process of developing and applying a representation of those threats, to understand the possibility of the threats being realized is referred to as threat modelling.  ...  First, we discuss the most widely used asset-centric threat modelling approaches. Then, we present a gap analysis of these methods.  ...  The authors in [15] developed a university information security risk management framework using OCTAVE Method based on ISO/EIC 27001:2013.  ... 
doi:10.14569/ijacsa.2020.0110201 fatcat:qq7os3nwovhpbloyk366g7u3jm

From Spatial Data to Synchronised Actions: The Network-centric Organisation of Spatial Decision Support for Risk and Emergency Management

Jeroen M. M. Neuvel, Henk J. Scholten, Adri van den Brink
2010 Applied Spatial Analysis and Policy  
information be organised in such a way that it supports risk and emergency management more effectively?  ...  The answer requires a conceptualisation of risk and emergency management practices resulting in the network-centric concept, which implies that those involved in risk and emergency management are connected  ...  The GDI4DM project also started in 2005 and finished in 2008 with a total budget of 2 million Euro.  ... 
doi:10.1007/s12061-010-9059-z fatcat:wo5hfj54ebgshiorv5g6pid4ri

Modeling Bitcoin plus Ethereum as an Open System of Systems of Public Blockchains to Improve Their Resilience against Intentional Risk

Alberto Partida, Saki Gerassis, Regino Criado, Miguel Romance, Eduardo Giráldez, Javier Taboada
2022 Electronics  
In this article, we model the two most market-capitalised public, open and permissionless blockchain implementations, Bitcoin (BTC) and Ethereum (ETH), as a System of Systems (SoS) of public blockchains  ...  This article demonstrates that these public blockchain implementations create networks that grow in complexity and connect with each other.  ...  Head of Group for Automation in Signals and Communications. ETSIT. Universidad Politécnica de Madrid.  ... 
doi:10.3390/electronics11020241 fatcat:ocwo4mfyqrcnhixvkup7udnr2e

A Qualitative Study of Legacy Systems Modernisation for Citizen-Centric Digital Government

Humairath Abu Bakar, Rozilawati Razali, Dian Indrayani Jambari
2022 Sustainability  
The study results revealed that human, process, product, and organisation aspects as well as the related characteristics of the citizen-centric influence the legacy systems modernisation in the era of  ...  The findings contribute as a complete guideline for the public sector agencies in modernising the legacy systems in line with the citizen-centric digital government vision.  ...  Informed Consent Statement: Informed consent was obtained from all subjects involved in the study. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/su141710951 fatcat:g4s5teyicfeghofe4wo4os6uli

A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC) [chapter]

Nicolas Racz, Edgar Weippl, Andreas Seufert
2010 Lecture Notes in Computer Science  
Governance, Risk and Compliance (GRC) is an emerging topic in the business and information technology world.  ...  By means of a literature review the authors merge observations, an analysis of existing definitions and results from prior surveys in the derivation of a single-phrase definition.  ...  The review shows that GRC software vendors are the most active group providing GRC publications (40), closely followed by analysts (34) and consultancies (31).  ... 
doi:10.1007/978-3-642-13241-4_11 fatcat:d7hz4ujoyrg2nbjdaizyowu35i

Changing Requirements of Information Security landscape
english

UPASNA SALUJA, DR NORBIK IDRIS
2014 International Journal of Innovative Research in Science Engineering and Technology  
Information security risk assessment has gained importance as organisations" dependence on information has grown on the one handwhile the threat environment has become complex on the other hand.  ...  This new approach should have a scientific foundation to assess and evaluate risks which should improve information security risk assessment approach by assessing risks in a more objective manner while  ...  In such organisations, any asset centric approach for risk identification is neither practical nor effective.  ... 
doi:10.15680/ijirset.2014.0310081 fatcat:pqkkrnzxdbhn5ibec6ivyge64a

Reviewing qualitative research approaches in the context of critical infrastructure resilience

R Cantelmi, G Di Gravio, R Patriarca
2021 Environment Systems and Decisions  
The paper identifies four principal dimensions of resilience referred to CIs (i.e., techno-centric, organisational, community, and urban) and discusses the related qualitative methods.  ...  Nowadays, a variety of approaches exist in the context of CIs' resilience research.  ...  About one of these factors, "qualitative vs. quantitative approach", the paper argues that a risk assessment in the public transport security should be done firstly in a qualitative way because of the  ... 
doi:10.1007/s10669-020-09795-8 pmid:33520598 pmcid:PMC7826495 fatcat:v3r6jxhhy5e7bk7yn7bg53mosm

What to share, when, and where: balancing the objectives and complexities of open source software contributions

Johan Linåker, Björn Regnell
2020 Empirical Software Engineering  
Complexities include risk of loosing control, risk of giving away competitive advantage, risk of creating negative exposure, costs of contributing, and the possibility and need to contribute to an existing  ...  Context: Software-intensive organizations' rationale for sharing Open Source Software (OSS) may be driven by both idealistic, strategic and commercial objectives, and include both monetary as well as non-monetary  ...  Also, we would like to thank the interviewees and case organizations for participating in this study. Without their participation the study would not have been made possible.  ... 
doi:10.1007/s10664-020-09855-2 fatcat:mjbepqciyfcv5hb34h6iw3dan4

Assurance Techniques for Industrial Control Systems (ICS)

William Knowles, Jose M. Such, Antonios Gouglidis, Gaurav Misra, Awais Rashid
2015 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy - CPS-SPC '15  
For the purpose of certification to an assurance scheme, this evidence enables us to answer the question: are the implemented security controls consistent with organisational risk posture?  ...  This paper uses interviews with security practitioners to assess how ICS security assessments are conducted in practice, before introducing the five "PASIV" principles to ensure the safe use of assurance  ...  Much work has been conducted in the field of risk management; in particular the development of new methodologies.  ... 
doi:10.1145/2808705.2808710 dblp:conf/ccs/KnowlesSGMR15 fatcat:pie2gttc35fyljwnstyvtgkpcy

A review of threat modelling approaches for APT-style attacks

Matt Tatam, Bharanidharan Shanmugam, Sami Azam, Krishnan Kannoorpatti
2021 Heliyon  
Using this intelligence to minimise risk, requires a systematic methodology or framework that recognises every possible threat scenario.  ...  This can be done with Threat Modelling (TM), which assists with identifying, understanding and providing visibility of threats affecting an organisation.  ...  At the software development and operations level system-centric and data-centric are more relevant.  ... 
doi:10.1016/j.heliyon.2021.e05969 pmid:33506133 pmcid:PMC7814160 fatcat:zif6ebwcqrhr7pkudsq2ynqpgm
« Previous Showing results 1 — 15 out of 8,272 results