Search results

1 – 10 of over 21000
Article
Publication date: 1 February 1993

Patricia Flaherty

Most automated library systems include a transaction logging component. Yet this fact may be among the best kept secrets in the automated library arena. Often only a few people…

Abstract

Most automated library systems include a transaction logging component. Yet this fact may be among the best kept secrets in the automated library arena. Often only a few people within a library are aware of its existence, and even fewer have access to the transaction log data. This is unfortunate, since the concrete data garnered by transaction logs can provide bibliographic instructors, reference staff members, systems librarians, and system designers with unique and valuable insights into the patron/system interaction.

Details

Library Hi Tech, vol. 11 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 August 2005

Baoyao Zhou, Siu Cheung Hui and Alvis C. M. Fong

With the explosive growth of information available on the World Wide Web, it has become much more difficult to access relevant information from the Web. One possible approach to…

Abstract

With the explosive growth of information available on the World Wide Web, it has become much more difficult to access relevant information from the Web. One possible approach to solve this problem is web personalization. In this paper, we propose a novel WUL (Web Usage Lattice) based mining approach for mining association access pattern rules for personalized web recommendations. The proposed approach aims to mine a reduced set of effective association pattern rules for enhancing the online performance of web recommendations. We have incorporated the proposed approach into a personalized web recommender system known as AWARS. The performance of the proposed approach is evaluated based on the efficiency and the quality. In the efficiency evaluation, we measure the number of generated rules and the runtime for online recommendations. In the quality evaluation, we measure the quality of the recommendation service based on precision, satisfactory and applicability. This paper will discuss the proposed WUL‐based mining approach, and give the performance of the proposed approach in comparison with the Apriori‐based algorithms.

Details

International Journal of Web Information Systems, vol. 1 no. 3
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 6 March 2009

Christine Merk, Frank Scholze and Nils Windisch

The purpose of this paper is to present how the JISC Usage Statistics Review Project aims to formulate a fundamental scheme for recording usage data and to propose a standard for…

888

Abstract

Purpose

The purpose of this paper is to present how the JISC Usage Statistics Review Project aims to formulate a fundamental scheme for recording usage data and to propose a standard for its aggregation to provide meaningful and comparable item‐level usage statistics for electronic documents such as, for example, research papers and scientific resources.

Design/methodology/approach

A core element of the project has been a stakeholder workshop. This workshop was held in Berlin, 7/8 July 2008. Representatives of key stakeholder groups (repositories, libraries, COUNTER, IRStats, JISC, LogEc, MESUR, OA‐Statistics and other Open Access projects) were invited. During the workshop a fundamental scheme for the recording and the exchange of log files was discussed as well as the normalization of data collected.

Findings

The following mandatory elements describing usage events were agreed during the stakeholder workshop: Who – identification of user/session, What – item identification and type of request performed (e.g. full‐text, front‐page, including failed/partially fulfilled requests), When – date and time, usage event ID. The following elements were regarded as optional: From where – referrer/the referring entity and identity of the service. Usage events should be exchanged in the form of OpenURL Context Objects using OAI. Automated access (e.g. robots) should be tagged. The definition of automated access has to be straightforward with an option of gradual refinement. Users have to be identified unambiguously, but without recording personal data to avoid conflicts with privacy laws. Policies on statistics should be formulated for the repository community as well as the publishing community. Information about statistics policies should be available on services like OpenDOAR and RoMEO.

Originality/value

The paper is based on the detailed project report to the JISC, available at http://ie‐repository.jisc.ac.uk/250/

Details

Library Hi Tech, vol. 27 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 25 September 2019

Nabil Moukafih, Ghizlane Orhanou and Said Elhajji

This paper aims to propose a mobile agent-based security information and event management architecture (MA-SIEM) that uses mobile agents for near real-time event collection and…

Abstract

Purpose

This paper aims to propose a mobile agent-based security information and event management architecture (MA-SIEM) that uses mobile agents for near real-time event collection and normalization on the source device. The externalization of the normalization process, executed by several distributed mobile agents on interconnected computers and devices, proposes a SIEM server dedicated mainly for correlation and analysis.

Design/methodology/approach

The architecture has been proposed in three stages. In the first step, the authors described the different aspects of the proposed approach. Then they implemented the proposed architecture and presented a new vision for the insertion of normalized data into the SIEM database. Finally, the authors performed a numerical comparison between the approach used in the proposed architecture and that of existing SIEM systems.

Findings

The results of the experiments showed that MA-SIEM systems are more efficient than existing SIEM systems because they leave the SIEM resources primarily dedicated to advanced correlation analysis. In addition, this paper takes into account realistic scenarios and use-cases and proposes a fully automated process for transferring normalized events in near real time to the SIEM server for further analysis using mobile agents.

Originality/value

The work provides new insights into the normalization security-related events using light mobile agents.

Details

Information & Computer Security, vol. 28 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 15 June 2020

Tamir Tsegaye and Stephen Flowerday

An electronic health record (EHR) enables clinicians to access and share patient information electronically and has the ultimate goal of improving the delivery of healthcare…

Abstract

Purpose

An electronic health record (EHR) enables clinicians to access and share patient information electronically and has the ultimate goal of improving the delivery of healthcare. However, this can create security and privacy risks to patient information. This paper aims to present a model for securing the EHR based on role-based access control (RBAC), attribute-based access control (ABAC) and the Clark-Wilson model.

Design/methodology/approach

A systematic literature review was conducted which resulted in the collection of secondary data that was used as the content analysis sample. Using the MAXQDA software program, the secondary data was analysed quantitatively using content analysis, resulting in 2,856 tags, which informed the discussion. An expert review was conducted to evaluate the proposed model using an evaluation framework.

Findings

The study found that a combination of RBAC, ABAC and the Clark-Wilson model may be used to secure the EHR. While RBAC is applicable to healthcare, as roles are linked to an organisation’s structure, its lack of dynamic authorisation is addressed by ABAC. Additionally, key concepts of the Clark-Wilson model such as well-formed transactions, authentication, separation of duties and auditing can be used to secure the EHR.

Originality/value

Although previous studies have been based on a combination of RBAC and ABAC, this study also uses key concepts of the Clark-Wilson model for securing the EHR. Countries implementing the EHR can use the model proposed by this study to help secure the EHR while also providing EHR access in a medical emergency.

Details

Information & Computer Security, vol. 28 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 August 1998

Shahana Sen, Balaji Padmanabhan, Alexander Tuzhilin, Norman H. White and Roger Stein

Investigates the information needs of marketers on the WWW for consumer analysis purposes, and examines how these can be met. Begins by briefly highlighting the attractiveness of…

2634

Abstract

Investigates the information needs of marketers on the WWW for consumer analysis purposes, and examines how these can be met. Begins by briefly highlighting the attractiveness of the Web as a medium for communication. Next, summarizes the bases for consumer analysis and segmentation in the context of the traditional marketing communication media. Based on this framework, examines consumer analysis needs in the context of the WWW medium and proposes analysis variables relevant to this medium. Finally, discusses how the information needs for consumer analysis may be met from the different information sources available to a marketer, including the Web logfiles which are generated as a result of tracking the interactions of visitors accessing information from a company’s Web site.

Details

European Journal of Marketing, vol. 32 no. 7/8
Type: Research Article
ISSN: 0309-0566

Keywords

Article
Publication date: 1 July 2002

Roger K. Doost

The one area in accounting that shows the sign of volatility, unsettlement, and continuous change is accounting information systems. While textbooks have been revised and updated…

2425

Abstract

The one area in accounting that shows the sign of volatility, unsettlement, and continuous change is accounting information systems. While textbooks have been revised and updated in line with the change in technology, the auxiliary teaching materials do not seem to have kept pace. Professors teaching the course may be handicapped by their own shortcomings as well as the inadequacy of the supplementary material. The emphasis on database and database management should be supplemented with relevant software and teaching material to make the course more meaningful and the efforts more fruitful. One easily available tool is Access. Incorporation of Access into the course provides an excellent demonstration into application and utility of database management systems.

Details

Managerial Auditing Journal, vol. 17 no. 5
Type: Research Article
ISSN: 0268-6902

Keywords

Article
Publication date: 29 April 2014

Daniel Bachlechner, Stefan Thalmann and Markus Manhart

The purpose of this paper is to shed light on the particular information needs of external auditors performing information technology (IT) audits at service providers in…

2406

Abstract

Purpose

The purpose of this paper is to shed light on the particular information needs of external auditors performing information technology (IT) audits at service providers in cross-organizational settings and to promote a software-based approach towards their satisfaction. The approach is intended to supplement the manual approaches currently adopted by auditors to procure information in such settings.

Design/methodology/approach

The authors analyzed data collected by means of a series of 16 interviews and four think-aloud sessions with experienced professionals.

Findings

Information procurement is perceived as tedious by auditors and largely relies on repeat interviews and perusal of documents. Given the growing complexity of cross-organizational settings, manual approaches to information procurement are reaching their limits. A considerable portion of the information required is often stored by service providers using software that is inaccessible to auditors. The authors argue that a software-based approach providing an interface for auditors to access relevant information held by such software presents an avenue worth exploring.

Practical implications

The authors outline how the information stored by service providers using software can be made accessible with reasonable effort. Complementing manual approaches to information procurement with an audit interface would reduce workload and increase quality.

Originality/value

The concept of an audit interface represents a novel and promising approach to meeting the information needs of auditors performing IT audits in cross-organizational settings more effectively. Both auditors and service providers would benefit from its implementation.

Details

Managerial Auditing Journal, vol. 29 no. 4
Type: Research Article
ISSN: 0268-6902

Keywords

Article
Publication date: 1 October 2000

Daniel Cunliffe

The number and range of organisations developing a Web site is growing rapidly. Many of these Web sites are developed in‐houseeven though the skills and resources required for…

4639

Abstract

The number and range of organisations developing a Web site is growing rapidly. Many of these Web sites are developed in‐houseeven though the skills and resources required for developing a successful site may not be available. It is argued that some of the limitations in terms of resources and skills inherent in the small‐scale in‐house development environment can be overcome through the adoption of an informal Web site development model and suitable usability methods. Presents an informal development model synthesised from a review of development case studies and published Web research literature. This model identifies the main stages and tasks of development. A review of information gathering and usability methods currently being employed is integrated into the model. The importance of understanding user and information provider needs is discussed. A number of common usability methods are then examined in greater detail. The appropriateness of the model and methods for the small‐scale in‐house development environment is considered.

Details

Internet Research, vol. 10 no. 4
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 29 March 2013

Tran Khanh Dang and Tran Tri Dang

By reviewing different information visualization techniques for securing web information systems, this paper aims to provide a foundation for further studies of the same topic…

1105

Abstract

Purpose

By reviewing different information visualization techniques for securing web information systems, this paper aims to provide a foundation for further studies of the same topic. Another purpose of the paper is to discover directions in which there is a lack of extensive research, thereby encouraging more investigations.

Design/methodology/approach

The related techniques are classified first by their locations in the web information systems architecture: client side, server side, and application side. Then the techniques in each category are further classified based on attributes specific to that category.

Findings

Although there is much research on information visualization for securing web browser user interface and server side systems, there are very few studies about the same techniques on web application side.

Originality/value

This paper is the first published paper reviewing extensively information visualization techniques for securing web information systems. The classification used here offers a framework for further studies as well as in‐depth investigations.

Details

International Journal of Web Information Systems, vol. 9 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

1 – 10 of over 21000