Search results for "SYSTEMS"

showing 10 items of 11952 documents

Supporting Cyber Resilience with Semantic Wiki

2016

Cyber resilient organizations, their functions and computing infrastructures, should be tolerant towards rapid and unexpected changes in the environment. Information security is an organization-wide common mission; whose success strongly depends on efficient knowledge sharing. For this purpose, semantic wikis have proved their strength as a flexible collaboration and knowledge sharing platforms. However, there has not been notable academic research on how semantic wikis could be used as information security management platform in organizations for improved cyber resilience. In this paper, we propose to use semantic wiki as an agile information security management platform. More precisely, t…

ta113021110 strategic defence & security studiesEngineeringKnowledge managementCloud computing securitybusiness.industryStandard of Good Practiceinformation security management0211 other engineering and technologies02 engineering and technologyInformation securitycyber resiliencesemantic wikiSecurity information and event managementrisk managementSecurity controlsResilience (organizational)World Wide WebITIL security managementInformation security management020204 information systems0202 electrical engineering electronic engineering information engineeringbusiness
researchProduct

Seeking Technical Debt in Critical Software Development Projects : An Exploratory Field Study

2016

In recent years, the metaphor of technical debt has received considerable attention, especially from the agile community. Still, despite the fact that agile practices are increasingly used in critical domains, to the best of our knowledge, there are no studies investigating the occurrence of technical debt in critical software development projects. The results of an exploratory field study conducted across several projects reveal that a variety of business and environmental factors cause the occurrence of technical debt in critical domains. Using Grounded Theory method, these factors are categorized as ambiguity of requirement, diversity of projects, inadequate knowledge management, and res…

ta113Agile usability engineeringKnowledge managementbusiness.industryEmpirical process (process control model)Agile Unified Process020207 software engineering02 engineering and technologySoftware peer reviewcomputer.software_genreExtreme programming practicestechnical debtTechnical debt020204 information systemssoftware development0202 electrical engineering electronic engineering information engineeringLean software developmentbusinessohjelmistokehityscomputerAgile software development
researchProduct

Anomaly detection approach to keystroke dynamics based user authentication

2017

Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using keystroke dynamics. In addition, we applied a k-NN-based approach that demonstrated strong results. Most of the existing approaches use only genuine users data for training and validation. We designed a cross validation procedure with artificially generated impostor samples that improves the learning process yet allows fair comparison to previous works. We evaluated the methods using the CMU keystroke dynamics benchmark dataset. Both proposed approaches outperformed the previou…

ta113AuthenticationpääsynvalvontaComputer scienceaccess control02 engineering and technologycomputer.software_genreKeystroke dynamicstodentaminen020204 information systems0202 electrical engineering electronic engineering information engineeringBenchmark (computing)Unsupervised learningauthentication020201 artificial intelligence & image processingAnomaly detectionData miningtietoturvadata securitycomputer
researchProduct

Employees’ adherence to information security policies: An exploratory field study

2014

The key threat to information security comes from employees who do not comply with information security policies. We developed a new multi-theory based model that explained employees' adherence to security policies. The paradigm combines elements from the Protection Motivation Theory, the Theory of Reasoned Action, and the Cognitive Evaluation Theory. We validated the model by using a sample of 669 responses from four corporations in Finland. The SEM-based results showed that perceived severity of potential information security threats, employees' belief as to whether they can apply and adhere to information security policies, perceived vulnerability to potential security threats, employees…

ta113Cognitive evaluation theoryInformation Systems and Managementbusiness.industryInformation securityPublic relationsSecurity policyManagement Information SystemsThreatTheory of reasoned actionInformation security managementInformation security standardsSecurity managementBusinessMarketingInformation SystemsInformation & Management
researchProduct

Why Do Users Switch Mobile Applications? : Trialing Behavior as a Predecessor of Switching Behavior

2018

Mobile application providers face high user losses because users can easily and often switch to an alternative application. Researchers have recently started to study information technology (IT) switching. However, no studies have concentrated on the unique context of mobile applications. Mobile application switching differs from the switching behavior related to many other IT products and services because of the highlighted role of alternatives, beta versions, updates, reviews, and users’ spontaneous behavior. To address this gap, we develop a mobile-specific model by using a qualitative research approach. As a theoretical contribution, we introduce trialing behavior as a predecessor of sw…

ta113Computer science020204 information systems0502 economics and business05 social sciences0202 electrical engineering electronic engineering information engineeringswitching behavior02 engineering and technology050203 business & managementmobile applicationsInformation Systems
researchProduct

DOBRO : a prediction error correcting robot under drifts

2016

We propose DOBRO, a light online learning module, which is equipped with a smart correction policy helping making decision to correct or not the given prediction depending on how likely the correction will lead to a better prediction performance. DOBRO is a standalone module requiring nothing more than a time series of prediction errors and it is flexible to be integrated into any black-box model to improve its performance under drifts. We performed evaluation in a real-world application with bus arrival time prediction problem. The obtained results show that DOBRO improved prediction performance significantly meanwhile it did not hurt the accuracy when drift does not happen.

ta113Concept driftComputer scienceMean squared prediction error02 engineering and technologyARIMAconcept drifton-line prediction error correction020204 information systems0202 electrical engineering electronic engineering information engineeringRobot020201 artificial intelligence & image processingAutoregressive integrated moving averageSimulation
researchProduct

A Cooperative Coevolution Framework for Parallel Learning to Rank

2015

We propose CCRank, the first parallel framework for learning to rank based on evolutionary algorithms (EA), aiming to significantly improve learning efficiency while maintaining accuracy. CCRank is based on cooperative coevolution (CC), a divide-and-conquer framework that has demonstrated high promise in function optimization for problems with large search space and complex structures. Moreover, CC naturally allows parallelization of sub-solutions to the decomposed sub-problems, which can substantially boost learning efficiency. With CCRank, we investigate parallel CC in the context of learning to rank. We implement CCRank with three EA-based learning to rank algorithms for demonstration. E…

ta113Cooperative coevolutionTheoretical computer scienceLearning to RankComputer sciencebusiness.industryRank (computer programming)Genetic ProgrammingEvolutionary algorithmContext (language use)Genetic programmingImmune ProgrammingMachine learningcomputer.software_genreEvolutionary computationComputer Science ApplicationsComputational Theory and MathematicsCooperative CoevolutionInformation RetrievalBenchmark (computing)Learning to rankArtificial intelligencebusinesscomputerInformation SystemsIEEE Transactions on Knowledge and Data Engineering
researchProduct

Wastewater treatment: New insight provided by interactive multiobjective optimization

2011

In this paper, we describe a new interactive tool developed for wastewater treatment plant design. The tool is aimed at supporting the designer in designing new wastewater treatment plants as well as optimizing the performance of already available plants. The idea is to utilize interactive multiobjective optimization which enables the designer to consider the design with respect to several conflicting evaluation criteria simultaneously. This is more important than ever because the requirements for wastewater treatment plants are getting tighter and tighter from both environmental and economical reasons. By combining a process simulator to simulate wastewater treatment and an interactive mul…

ta113Decision support systemInformation Systems and ManagementOperations researchProcess (engineering)business.industrySoftware developmentMulti-objective optimizationManufacturing engineeringManagement Information SystemsSimulation-based optimizationArts and Humanities (miscellaneous)WastewaterDevelopmental and Educational PsychologyDesign processbusinessEngineering design processInformation SystemsDecision Support Systems
researchProduct

E-NAUTILUS: A decision support system for complex multiobjective optimization problems based on the NAUTILUS method

2015

Interactive multiobjective optimization methods cannot necessarily be easily used when (industrial) multiobjective optimization problems are involved. There are at least two important factors to be considered with any interactive method: computationally expensive functions and aspects of human behavior. In this paper, we propose a method based on the existing NAUTILUS method and call it the Enhanced NAUTILUS (E-NAUTILUS) method. This method borrows the motivation of NAUTILUS along with the human aspects related to avoiding trading-off and anchoring bias and extends its applicability for computationally expensive multiobjective optimization problems. In the E-NAUTILUS method, a set of Pareto…

ta113Decision support systemMathematical optimizationInformation Systems and ManagementOptimization problemMultiple criteria optimizationGeneral Computer ScienceComputer sciencePareto principleTrading-offManagement Science and Operations ResearchSpace (commercial competition)Multiple objective programmingMulti-objective optimizationIndustrial and Manufacturing EngineeringSet (abstract data type)Modeling and SimulationPoint (geometry)Computational costInteractive methodsEuropean Journal of Operational Research
researchProduct

Shape Sensitivity Analysis and Gradient-Based Optimization of Large Structures Using MLFMA

2014

A fast method for computing the action of shape-differentiated electric field integral equation (EFIE) system matrix to a vector is derived exploiting the multilevel fast multipole algorithm (MLFMA). The proposed method is used in conjunction with the adjoint-variable method (AVM) to compute the shape gradient of arbitrary objective functions depending on shape of a metallic scatterer. The method is demonstrated numerically by optimizing the shape of a parabolic reflector illuminated with a half-wave dipole.

ta113DipoleParabolic reflectorGradient based algorithmMathematical analysisShape gradientSensitivity (control systems)Electrical and Electronic EngineeringElectric-field integral equationMultipole expansionAction (physics)MathematicsIEEE Transactions on Antennas and Propagation
researchProduct