Search results

1 – 10 of over 21000
Article
Publication date: 6 February 2007

C.J. Tucker, S.M. Furnell, B.V. Ghita and P.J. Brooke

The purpose of this paper is to propose a new taxonomy for intrusion detection systems as a way of generating further research topics focussed on improving intrusion system…

1073

Abstract

Purpose

The purpose of this paper is to propose a new taxonomy for intrusion detection systems as a way of generating further research topics focussed on improving intrusion system performance.

Design/methodology/approach

The paper shows that intrusion systems are characterised by the type of output they are capable of producing, such as intrusion/non‐intrusion declarations, through to intrusion plan determination. The output type is combined with the data scale used to undertake the intrusion determination, to produce a two‐dimensional intrusion matrix.

Findings

The paper finds that different approaches to intrusion detection can produce different footprints on the intrusion matrix. Qualitative comparison of systems can be undertaken by examining the area covered within the footprint and the footprint overlap between systems. Quantitative comparison can be achieved in the areas of overlap.

Research limitations/implications

The paper shows that the comparison of systems based on their footprint on the intrusion matrix may allow a deeper understanding of the limits of performance to be developed. The separation of what was previously understood as “detection” into the three areas of Detection, Recognition and Identification may provide further impetus for the development of a theoretical framework for intrusion systems.

Practical implications

The paper shows that the intrusion matrix can be divided into areas in which the achievement of arbitrarily high performance is relatively easily achievable. Other areas within the matrix, such as the Prosecution and Enterprise regions, present significant practical difficulties and therefore are opportunities for further research.

Originality/value

The use of a taxonomy based on the type of output produced by an intrusion system is new to this paper, as is the combination with data scale to produce an intrusion matrix. The recognition that the network data scale should also be split to differentiate trusted and untrusted networks is new and presents challenging opportunities for further research topics.

Details

Internet Research, vol. 17 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

Open Access
Article
Publication date: 7 May 2019

Yanan Wang, Jianqiang Li, Sun Hongbo, Yuan Li, Faheem Akhtar and Azhar Imran

Simulation is a well-known technique for using computers to imitate or simulate the operations of various kinds of real-world facilities or processes. The facility or process of…

1582

Abstract

Purpose

Simulation is a well-known technique for using computers to imitate or simulate the operations of various kinds of real-world facilities or processes. The facility or process of interest is usually called a system, and to study it scientifically, we often have to make a set of assumptions about how it works. These assumptions, which usually take the form of mathematical or logical relationships, constitute a model that is used to gain some understanding of how the corresponding system behaves, and the quality of these understandings essentially depends on the credibility of given assumptions or models, known as VV&A (verification, validation and accreditation). The main purpose of this paper is to present an in-depth theoretical review and analysis for the application of VV&A in large-scale simulations.

Design/methodology/approach

After summarizing the VV&A of related research studies, the standards, frameworks, techniques, methods and tools have been discussed according to the characteristics of large-scale simulations (such as crowd network simulations).

Findings

The contributions of this paper will be useful for both academics and practitioners for formulating VV&A in large-scale simulations (such as crowd network simulations).

Originality/value

This paper will help researchers to provide support of a recommendation for formulating VV&A in large-scale simulations (such as crowd network simulations).

Details

International Journal of Crowd Science, vol. 3 no. 1
Type: Research Article
ISSN: 2398-7294

Keywords

Article
Publication date: 28 November 2019

Yilmaz Hatipkarasulu

This paper aims to present a graphical comparison method for construction schedules, which illustrates the differences for each individual activity. The method overlays the…

Abstract

Purpose

This paper aims to present a graphical comparison method for construction schedules, which illustrates the differences for each individual activity. The method overlays the observed differences on a bar chart creating a representation of whether each activity is ahead, on or behind schedule at a given date.

Design/methodology/approach

The method is implemented using a Microsoft Project add-in (plug-in). The paper demonstrates the method and its potential uses with three illustration cases: a time impact analysis, an alternative analysis for the selection of subcontractors and a multi-baseline analysis of an as-built schedule.

Findings

The cases included in the paper show that the proposed method uses a simplified and familiar attribute comparison for each activity in a schedule. The method affords flexibility in presenting differences between schedules such as the start/finish dates or duration. As the method does not rely on a specific software application or analysis method, it can be implement to different software applications as well as performance or delay analysis techniques. The method also makes it possible to present multiple and selective baseline comparisons overlaid on an updated or as-built schedule.

Originality/value

The method graphically presents a comparison of start dates, durations and finish dates for each activity that can be integrated with any schedule. The method can be used for forensic analysis as well as project control measures during construction. As the method does not rely on any specific performance or delay calculation method, it can be applied to any forensic analysis technique and delay analysis.

Details

Construction Innovation , vol. 20 no. 1
Type: Research Article
ISSN: 1471-4175

Keywords

Book part
Publication date: 15 July 2019

David E. Caughlin and Talya N. Bauer

Data visualizations in some form or another have served as decision-support tools for many centuries. In conjunction with advancements in information technology, data…

Abstract

Data visualizations in some form or another have served as decision-support tools for many centuries. In conjunction with advancements in information technology, data visualizations have become more accessible and more efficient to generate. In fact, virtually all enterprise resource planning and human resource (HR) information system vendors offer off-the-shelf data visualizations as part of decision-support dashboards as well as stand-alone images and displays for reporting. Plus, advances in programing languages and software such as Tableau, Microsoft Power BI, R, and Python have expanded the possibilities of fully customized graphics. Despite the proliferation of data visualization, relatively little is known about how to design data visualizations for displaying different types of HR data to different user groups, for different purposes, and with the overarching goal of improving the ways in which users comprehend and interpret data visualizations for decision-making purposes. To understand the state of science and practice as they relate to HR data visualizations and data visualizations in general, we review the literature on data visualizations across disciplines and offer an organizing framework that emphasizes the roles data visualization characteristics (e.g., display type, features), user characteristics (e.g., experience, individual differences), tasks, and objectives (e.g., compare values) play in user comprehension, interpretation, and decision-making. Finally, we close by proposing future directions for science and practice.

Details

Research in Personnel and Human Resources Management
Type: Book
ISBN: 978-1-78973-852-0

Keywords

Article
Publication date: 9 July 2020

Xiaoyue Ma and Hao Ma

Graphic-based tag clouds aim to visually represent tag content and tag structure, and then to better represent tagged information for later search. However, few studies have…

Abstract

Purpose

Graphic-based tag clouds aim to visually represent tag content and tag structure, and then to better represent tagged information for later search. However, few studies have clarified the features among varied visualization approaches involved in graphic-based tag clouds and compared them for the purpose of information search.

Design/methodology/approach

After reviewing four kinds of graphic-based tag clouds, an experimental demonstration was conducted in our study to verify how user performs in information search for a general seeking task by using them. Precision ratio, recall ratio, clicks on search and time for search were four variables tested in the experiment. Also, two supplementary tests were respectively carried out to manifest how graphic-based tag clouds contributed to the identification of target tags and tag clusters.

Findings

The experimental results showed that compared to tag content visual tag structure was more important to find related tags from tag clouds for information search. In addition, tag clouds that visually represented the semantic relationships within tags could make user more confident about their search result and carry out a shorter learning process during searching, which signified a tag-based information search path when visual elements were applied.

Originality/value

This research is one of the first to illustrate systematically the graphic-based tag clouds and their impacts on information search. The research findings could suggest on how to build up more effective and interactive tag clouds and make proposition for the design of search user interface by using graphic-based tag clouds.

Details

Online Information Review, vol. 44 no. 5
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 1 April 1994

Andrew Robson

Undertakes a comparative study of the statistical capability of threespreadsheets which are commonly used in the business sector. Thespreadsheets considered are Lotus 1‐2‐3…

1450

Abstract

Undertakes a comparative study of the statistical capability of three spreadsheets which are commonly used in the business sector. The spreadsheets considered are Lotus 1‐2‐3, Microsoft Excel and Quattro Pro. Considers five areas of statistical analysis regularly used by business decision makers (rather than specialist personnel). In order to obtain an objective measure of the statistical provision of each spreadsheet, comparison has also been made with dedicated statistical software regularly used by business decision makers, namely MINITAB. By making this comparison, argues that the spreadsheet is not only a tool for analysis, but also for presentation. Moreover, considers that two spreadsheets in particular, namely Excel and Quattro Pro, offer a user‐friendly statistical provision which should be sufficient for most business decision makers.

Details

Logistics Information Management, vol. 7 no. 2
Type: Research Article
ISSN: 0957-6053

Keywords

Article
Publication date: 1 September 2004

A.D. Songer, B. Hays and C. North

The construction industry produces voluminous quantitative data. Much of this data is created during the controls phase of projects and relates to cost, schedule, and…

Abstract

The construction industry produces voluminous quantitative data. Much of this data is created during the controls phase of projects and relates to cost, schedule, and administrative information. Recent storage and processing advances in computers as well as display capabilities afforded by computer graphics increase the opportunity to monitor projects fundamentally different from existing project control systems. However, changes in project control methods have been slow to evolve. The lack of a fundamental model of project control data representation contributes to the inadequate application and implementation of visual tools in project control methods. Difficulties associated with the graphical representation of data can be traced to the diversity of skills required in creating visual information displays. Owing to the reality that not all engineers/constructors possess these attributes in great strength, streamlining the process of how to best visualize data is important. Visual representations of data hold great potential for reducing communication difficulties fostered by industry fragmentation. However, without information structure, organization, and visual explanations, the massive amount of data available to project managers results in information overload. Therefore, improved information displays are needed to overcome the possibility of information overload with the capability of human perception. This paper discusses research to create a framework for visual representation of construction project data. Underlying visualization theory, the visual framework, and a detailed implementation are provided.

Details

Construction Innovation, vol. 4 no. 3
Type: Research Article
ISSN: 1471-4175

Keywords

Article
Publication date: 28 August 2009

Kerstin Altmanninger, Martina Seidl and Manuel Wimmer

The purpose of this paper is to provide a feature‐based characterization of version control systems (VCSs), providing an overview about the state‐of‐the‐art of versioning systems…

1460

Abstract

Purpose

The purpose of this paper is to provide a feature‐based characterization of version control systems (VCSs), providing an overview about the state‐of‐the‐art of versioning systems dedicated to modeling artifacts.

Design/methodology/approach

Based on a literature study of existing approaches, a description of the features of versioning systems is established. Special focus is set on three‐way merging which is an integral component of optimistic versioning. This characterization is employed on current model versioning systems, which allows the derivation of challenges in this research area.

Findings

The results of the evaluation show that several challenges need to be addressed in future developments of VCSs and merging tools in order to allow the parallel development of model artifacts.

Practical implications

Making model‐driven engineering (MDE) a success requires supporting the parallel development of model artifacts as is done nowadays for text‐based artifacts. Therefore, model versioning capabilities are a must for leveraging MDE in practice.

Originality/value

The paper gives a comprehensive overview of collaboration features of VCSs for software engineering artifacts in general, discusses the state‐of‐the‐art of systems for model artifacts, and finally, lists urgent challenges, which have to be considered in future model versioning system for realizing MDE in practice.

Details

International Journal of Web Information Systems, vol. 5 no. 3
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 18 March 2022

Suncica Hadzidedic, Silvia Fajardo-Flores and Belma Ramic-Brkic

This paper aims to address the user perspective about usability, security and use of five authentication schemes (text and graphical passwords, biometrics and hardware tokens…

Abstract

Purpose

This paper aims to address the user perspective about usability, security and use of five authentication schemes (text and graphical passwords, biometrics and hardware tokens) from a population not covered previously in the literature. Additionally, this paper explores the criteria users apply in creating their text passwords.

Design/methodology/approach

An online survey study was performed in spring 2019 with university students in Mexico and Bosnia and Herzegovina. A total of 197 responses were collected.

Findings

Fingerprint-based authentication was most frequently perceived as usable and secure. However, text passwords were the predominantly used method for unlocking computer devices. The participants preferred to apply personal criteria for creating text passwords, which, interestingly, coincided with the general password guidelines, e.g. length, combining letters and special characters.

Originality/value

Research on young adults’ perceptions of different authentication methods is driven by the increasing frequency and sophistication of security breaches, as well as their significant consequences. This study provided insight into the commonly used authentication methods among youth from two geographic locations, which have not been accounted for previously.

Details

Information & Computer Security, vol. 30 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 April 2014

Antonio Armillotta

This paper aims to present a method for the tolerance analysis of mechanical assemblies that is suitable to nonlinear problems where explicit functional equations are difficult or…

Abstract

Purpose

This paper aims to present a method for the tolerance analysis of mechanical assemblies that is suitable to nonlinear problems where explicit functional equations are difficult or even impossible to write down. Such cases are usually modelled by linearised tolerance chains, whose coefficients (or sensitivities) are calculated from assembly data.

Design/methodology/approach

The method is based on the free-body diagrams of force analysis, which are shown to be related to the sensitivities of linearised functional equations. Such an analogy allows the conversion of a tolerance chain into a corresponding static problem, which can be solved by common algebraic or graphical procedures.

Findings

The static analogy leads to a correct treatment of tolerance chains, as the analysis of several examples has confirmed by comparison to alternative methods.

Research limitations/implications

Currently, the method has only been tested on two-dimensional chains of linear dimensions for assemblies with nonredundant kinematic constraints among parts.

Practical implications

The proposed method lends itself to ready application by using simple operations with minimal software assistance. This could make it complementary to current methods for calculating sensitivities, which are mathematically complex and require software implementation for deployment in industrial practice.

Originality/value

Analogy with force analysis, which has not been previously highlighted in the literature, is a potentially interesting concept that could be extended to a wider range of tolerancing problems.

Details

Assembly Automation, vol. 34 no. 2
Type: Research Article
ISSN: 0144-5154

Keywords

1 – 10 of over 21000