80,590 Hits in 4.0 sec

Page 15 of Science Trends Vol. 32, Issue 16 [page]

1974 Science Trends  
(Write Office of the Chief Engineer, Federal Power Commission, Washington, D.C. 20426, regarding Staff Report on Guidelines for Energy Conservation for Immediate Implementation, Small Business and Light  ...  ENERGY AND MATERIALS POLICY: Proceedings of a May 1972 national conference sponsored by the University of Texas and the National Commission on Materials Policy, examining the interrelationships of various  ... 

The Transformation of Byod Practices to Support Green Computing in Malaysia Public Sector

Mohd Yusri Jusoh, Haryani Haron, Jasber Kaur
2018 International Journal of Engineering & Technology  
This study concludes that both models can support green computing in Malaysia public sector; however no policy related to processes procedure of BYOD that can be used as guideline for green IT practices  ...  With the current usage of mobile devices such as the smart phones, tablets, and laptops as the necessity in the working environment, the concept of BYOD went beyond personal use towards workplace.  ...  Therefore, the IT department needs to make the procurement of computer and provide the computer equipment for their use.  ... 
doi:10.14419/ijet.v7i3.20.19273 fatcat:tgtc5xqjxfdwdpeetvwmqz7uui

A methodological approach toward the refinement problem in policy-based management systems

J. Rubio-Loyola, J. Serrat, M. Charalambides, P. Flegkas, G. Pavlou
2006 IEEE Communications Magazine  
We also provide the considerations while defining high-level guidelines, and describe a policy refinement framework that formalizes the requirements to refine high-level guidelines into executable policies  ...  This article presents a methodological approach towards the policy refinement problem.  ...  ACKNOWLEDGMENTS This article was supported in part by the EC IST-EMANICS Network of Excellence (#26854).  ... 
doi:10.1109/mcom.2006.1710414 fatcat:jghcraxdfnbazdc3yktfxhtq5e

Page 91 of Journal of Research and Practice in Information Technology Vol. 24, Issue 3 [page]

1992 Journal of Research and Practice in Information Technology  
OFFERS OF BOOKS The ACJ will continue to receive books under its present policy guidelines. These are available on request.  ...  AUSTRALIAN COMPUTER JOURNAL New Guidelines Electronic Book Review Management and Publication Any books not taken up for review on this basis will then be offered under the existing process of explicit  ... 

Categorization of Standards, Guidelines and Tools for Secure System Design for Critical Infrastructure IT in the Cloud

Sarita Paudel, Markus Tauber, Christian Wagner, Aleksandar Hudic, Wee-Kong Ng
2014 2014 IEEE 6th International Conference on Cloud Computing Technology and Science  
Furthermore, we analyse and evaluate how mitigation options for identified open security issues for CI in the cloud point to individual aspects of standards and guidelines to support the creation of secure  ...  With the increasing popularity of cloud computing, security in cloud-based applications is gaining awareness and is regarded as one of the most crucial factors for the longterm success of such applications  ...  [8] explore security issues of secure cloud computing for CI Providers and investigate security requirements for the CI providers.  ... 
doi:10.1109/cloudcom.2014.172 dblp:conf/cloudcom/PaudelTWHN14 fatcat:fybbweodxvegrpqlzfkzbq3mji

Sustainability Inclusion in Informatics Curriculum Development

Deepti Mishra, Alok Mishra
2020 Sustainability  
The analysis is based on recent ACM/IEEE curriculum guidelines for IT, a rigorous literature review as well as various viewpoints and their relevance for sustainability-oriented curriculum development  ...  It also considers recent ACM/IEEE curriculum guidelines for IT professionals, which assert that IT students should explore IT strategies required for developing a culture of green and sustainable IT. (  ...  These are interrelated and should be selected in a manner towards an optimum arrangement and alliance.  ... 
doi:10.3390/su12145769 fatcat:qxzcc3ozv5flvhpfyzz72wifoa

Preface to the Best Papers from CIESC 2013 Special Issue

Silvana Roncagliolo, Jonás Montilva
2014 CLEI Electronic Journal  
Since 1999, the Iberoamerican Congress on Higher Education in Computing (CIESC) has been held as one of the main associated scientific events of the Latin American Conference on Informatics (CLEI).  ...  Its purpose has been to stimulate and provide a space for academics and professionals to discuss topics centered on undergraduate and graduate education in Computing.  ...  The sixth selected paper is "A Detailed Study of the Computer Science Degree at the Central University of Venezuela: Towards a New Curriculum Design" by Maria E. Villapol, Zenaida Castillo, Alecia E.  ... 
doi:10.19153/cleiej.17.3.6 fatcat:6aojla4ilnhh5ldx5jksfej4tq

Identification of Practices for Green Software Development in Multi-Sourced Project: A Systematic Literature Review Protocol

Muhammad Salam, Siffat Ullah
2016 International Journal of Computer Applications  
Outcome: The expected outcomes of the implementation of SLR protocol will be the identification of solutions/practices for multisourcing vendors in the development of green and sustainable software in  ...  Context: Green software engineering (GSE) is a research area gaining reputation to develop green and sustainable software.  ...  According to Tushi and Bonny [16] "green computing is the practice of implementing policies and procedures that improve the efficiency of computing resources in such a way as to reduce the energy consumption  ... 
doi:10.5120/ijca2016909712 fatcat:ozum256ijvdatezveltmctmzsy

Master Thesis Proposal: Designing An Architecture For Machine-Actionable Research Data Management Planning In An Institutional Context [article]

Simon Oblasser
2018 Zenodo  
This master thesis proposal provides the necessary context and outlines the work in progress for exploring machine-actionable Data Management Plans (maDMPs) use cases in an institutional context such as  ...  These tools guide the researchers through a set of open questions covering the themes of a DMP and provide templates for funder-specific guidance based on the selected RDM policy.  ...  The development of a demonstrator requires the engineering of web applications including the selection of suitable technologies as covered by the Internet Computing and Distributed Systems Technologies  ... 
doi:10.5281/zenodo.1464188 fatcat:4kafkjt5bbdm5gj5k6dyf6bfea

Developing A Viral Artifact To Improve Employees' Security Behavior

Stefan Bauer, Josef Frysak
2014 Zenodo  
According to the scientific information management literature, the improper use of information technology (e.g. personal computers) by employees are one main cause for operational and information security  ...  policies.  ...  International Science Index, Computer and Information Engineering Vol:8, No:8, 2014 World Academy of Science, Engineering and Technology International Journal of Computer  ... 
doi:10.5281/zenodo.1094160 fatcat:czi6fnzpvbf2bd5igklzywgrzq

Countering Social Engineering through Social Media: An Enterprise Security Perspective [article]

H. Wilcox, Maumita Bhattacharya
2015 arXiv   pre-print
Also included is an analysis of existing social media security policies and guidelines within the public and private sectors.  ...  This paper examines concerns of social engineering through social media within the enterprise and explores countermeasures undertaken to stem ensuing risk.  ...  From the selection of policies available, very few mentioned guidance for securing social media technologies specifically, and even fewer associated social engineering with prominent security threats.  ... 
arXiv:1511.06915v1 fatcat:d2vwxv2u6rg43eb5vwvhb4raya


P. K. Paul, A. Bhuimali, P. S. Aithal, R. Rajesh
2022 Zenodo  
The IT and Computing education in India offered in two platform, in one it is the area of Science (Applied) and in another it is fall under the area of Technology/ Engineering.  ...  and policies of higher educational institutions.  ...  Information Assurance is essential for the mobile security as well as other allied security solutions specially the guidelines and principles etc. Design, development, and modernization of a secure and  ... 
doi:10.5281/zenodo.6575947 fatcat:7wgnnkx2dzenhjufwyclrk6hra

A Primer to Method Engineering [chapter]

J. J. Odell
1996 Method Engineering  
COMPUTER-AIDED METHOD ENGINEERING Computer-Aided Software Engineering (CASE) automates automation. In contrast, Computer-Aided Method Engineering (CAME) automates the assembly of methods.  ...  At the repeatable level, policies for managing a project and procedures to implement those policies are established.  ... 
doi:10.1007/978-0-387-35080-6_1 fatcat:wpfmcpuckzbcjdprdeygon745q

Coevolution of Security's Body of Knowledge and Curricula

Paul C. van Oorschot
2021 IEEE Security and Privacy  
W hile progress toward curricular guidelines continued on numerous fronts, our selective tour picks up next with a 2010 paper by Cooper et al., 4 again under the IA moniker.  ...  They noted that IA programs may live in academic departments ranging from computer science (CS), computer engineering, information technology, and security, to business, public policy, and forensic science  ... 
doi:10.1109/msec.2021.3093735 fatcat:vvu25um2wffkpcsr6zbfm2uqhy

Introducing Dynamic Identity and Access Management in Organizations [chapter]

Michael Kunz, Ludwig Fuchs, Matthias Hummer, Günther Pernul
2015 Lecture Notes in Computer Science  
By means of conducting structured and tool-supported attribute and policy management activities, the migration guide supports organizations to distribute privilege assignments in an application-independent  ...  This paper closes the existing research gap by introducing a novel migration guide for extending static IAM systems with dynamic ABAC policies.  ...  The research leading to these results was supported by the "Bavarian State Ministry of Education, Science and the Arts" as part of the FORSEC research association.  ... 
doi:10.1007/978-3-319-26961-0_9 fatcat:omucnln6ifdntampbqockzjwku
« Previous Showing results 1 — 15 out of 80,590 results