Search results for "SYSTEMS"
showing 10 items of 11952 documents
Supporting Cyber Resilience with Semantic Wiki
2016
Cyber resilient organizations, their functions and computing infrastructures, should be tolerant towards rapid and unexpected changes in the environment. Information security is an organization-wide common mission; whose success strongly depends on efficient knowledge sharing. For this purpose, semantic wikis have proved their strength as a flexible collaboration and knowledge sharing platforms. However, there has not been notable academic research on how semantic wikis could be used as information security management platform in organizations for improved cyber resilience. In this paper, we propose to use semantic wiki as an agile information security management platform. More precisely, t…
Seeking Technical Debt in Critical Software Development Projects : An Exploratory Field Study
2016
In recent years, the metaphor of technical debt has received considerable attention, especially from the agile community. Still, despite the fact that agile practices are increasingly used in critical domains, to the best of our knowledge, there are no studies investigating the occurrence of technical debt in critical software development projects. The results of an exploratory field study conducted across several projects reveal that a variety of business and environmental factors cause the occurrence of technical debt in critical domains. Using Grounded Theory method, these factors are categorized as ambiguity of requirement, diversity of projects, inadequate knowledge management, and res…
Anomaly detection approach to keystroke dynamics based user authentication
2017
Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using keystroke dynamics. In addition, we applied a k-NN-based approach that demonstrated strong results. Most of the existing approaches use only genuine users data for training and validation. We designed a cross validation procedure with artificially generated impostor samples that improves the learning process yet allows fair comparison to previous works. We evaluated the methods using the CMU keystroke dynamics benchmark dataset. Both proposed approaches outperformed the previou…
Employees’ adherence to information security policies: An exploratory field study
2014
The key threat to information security comes from employees who do not comply with information security policies. We developed a new multi-theory based model that explained employees' adherence to security policies. The paradigm combines elements from the Protection Motivation Theory, the Theory of Reasoned Action, and the Cognitive Evaluation Theory. We validated the model by using a sample of 669 responses from four corporations in Finland. The SEM-based results showed that perceived severity of potential information security threats, employees' belief as to whether they can apply and adhere to information security policies, perceived vulnerability to potential security threats, employees…
Why Do Users Switch Mobile Applications? : Trialing Behavior as a Predecessor of Switching Behavior
2018
Mobile application providers face high user losses because users can easily and often switch to an alternative application. Researchers have recently started to study information technology (IT) switching. However, no studies have concentrated on the unique context of mobile applications. Mobile application switching differs from the switching behavior related to many other IT products and services because of the highlighted role of alternatives, beta versions, updates, reviews, and users’ spontaneous behavior. To address this gap, we develop a mobile-specific model by using a qualitative research approach. As a theoretical contribution, we introduce trialing behavior as a predecessor of sw…
DOBRO : a prediction error correcting robot under drifts
2016
We propose DOBRO, a light online learning module, which is equipped with a smart correction policy helping making decision to correct or not the given prediction depending on how likely the correction will lead to a better prediction performance. DOBRO is a standalone module requiring nothing more than a time series of prediction errors and it is flexible to be integrated into any black-box model to improve its performance under drifts. We performed evaluation in a real-world application with bus arrival time prediction problem. The obtained results show that DOBRO improved prediction performance significantly meanwhile it did not hurt the accuracy when drift does not happen.
A Cooperative Coevolution Framework for Parallel Learning to Rank
2015
We propose CCRank, the first parallel framework for learning to rank based on evolutionary algorithms (EA), aiming to significantly improve learning efficiency while maintaining accuracy. CCRank is based on cooperative coevolution (CC), a divide-and-conquer framework that has demonstrated high promise in function optimization for problems with large search space and complex structures. Moreover, CC naturally allows parallelization of sub-solutions to the decomposed sub-problems, which can substantially boost learning efficiency. With CCRank, we investigate parallel CC in the context of learning to rank. We implement CCRank with three EA-based learning to rank algorithms for demonstration. E…
Wastewater treatment: New insight provided by interactive multiobjective optimization
2011
In this paper, we describe a new interactive tool developed for wastewater treatment plant design. The tool is aimed at supporting the designer in designing new wastewater treatment plants as well as optimizing the performance of already available plants. The idea is to utilize interactive multiobjective optimization which enables the designer to consider the design with respect to several conflicting evaluation criteria simultaneously. This is more important than ever because the requirements for wastewater treatment plants are getting tighter and tighter from both environmental and economical reasons. By combining a process simulator to simulate wastewater treatment and an interactive mul…
E-NAUTILUS: A decision support system for complex multiobjective optimization problems based on the NAUTILUS method
2015
Interactive multiobjective optimization methods cannot necessarily be easily used when (industrial) multiobjective optimization problems are involved. There are at least two important factors to be considered with any interactive method: computationally expensive functions and aspects of human behavior. In this paper, we propose a method based on the existing NAUTILUS method and call it the Enhanced NAUTILUS (E-NAUTILUS) method. This method borrows the motivation of NAUTILUS along with the human aspects related to avoiding trading-off and anchoring bias and extends its applicability for computationally expensive multiobjective optimization problems. In the E-NAUTILUS method, a set of Pareto…
Shape Sensitivity Analysis and Gradient-Based Optimization of Large Structures Using MLFMA
2014
A fast method for computing the action of shape-differentiated electric field integral equation (EFIE) system matrix to a vector is derived exploiting the multilevel fast multipole algorithm (MLFMA). The proposed method is used in conjunction with the adjoint-variable method (AVM) to compute the shape gradient of arbitrary objective functions depending on shape of a metallic scatterer. The method is demonstrated numerically by optimizing the shape of a parabolic reflector illuminated with a half-wave dipole.