Search results

1 – 10 of over 5000
Article
Publication date: 1 November 2011

Sidhartha S. Padhi and Prem Vrat

The purpose of this paper is to investigate the analogy of the human immune system with the economic auction theory.

Abstract

Purpose

The purpose of this paper is to investigate the analogy of the human immune system with the economic auction theory.

Design/methodology/approach

The paper develops an analogy of bio‐immune system with competitive bidding in auction, then develops a model of the situation and discusses its managerial implications.

Findings

The human immune system can be benchmarked to model decision making under competitive environment, such as biddings in auctions and obtains gainful insights.

Practical implications

Various engineering, management, social science, and defense and security‐related applications of the model are suggested.

Originality/value

The paper presents a novel and innovative model with tremendous potential for varied applications.

Details

Journal of Advances in Management Research, vol. 8 no. 2
Type: Research Article
ISSN: 0972-7981

Keywords

Article
Publication date: 1 May 2007

John Rice and Nigel Martin

A strong and fast‐cycle innovation system has been developed to counter the ongoing threat of computer viruses within computer systems employing vulnerable operating systems

1434

Abstract

Purpose

A strong and fast‐cycle innovation system has been developed to counter the ongoing threat of computer viruses within computer systems employing vulnerable operating systems. Generally, however, the innovative applications that develop in response to each generation of computer virus can be seen as a reactive, rather than proactive, critical response. The paper seeks to present a critique of the innovation system that has emerged to combat computer viruses by comparing it with its natural system namesake, the human anti‐viral immune system. It is proposed that the relevance of this analogy extends beyond this case to innovation systems more generally.

Design/methodology/approach

This paper discusses the biological theory related to the human body's immune system and how immune systems might be mimicked in the development of security systems and anti‐virus software. The paper then outlines the biomimicry framework that can be used for scoping the development and features of the security systems and software, including the population of the framework segments. The implications of biomimetic approaches in the wider innovation management literature are discussed.

Findings

Some commercial security products that are undergoing evolutionary development and current research and development activities are used to augment the biomimetic development framework and explicate its use in practice. The paper has implications for the manner in which the objectives of innovation systems are defined. There is implicit criticism of linear models of innovation, that by their nature ignore the recursive and/or adaptive processes evident in natural systems.

Originality/value

This is the first paper, to the best of the authors' knowledge, that discusses the application of natural systems and biomimetics to broaden the scope of innovation process design, and link its findings back to the wider innovation literature.

Details

European Journal of Innovation Management, vol. 10 no. 2
Type: Research Article
ISSN: 1460-1060

Keywords

Article
Publication date: 7 October 2013

Tarek Salah Sobh

Anomaly detection of network attacks has become a high priority because of the need to guarantee security, privacy and reliability. This work aims to describe both intelligent…

Abstract

Purpose

Anomaly detection of network attacks has become a high priority because of the need to guarantee security, privacy and reliability. This work aims to describe both intelligent immunological approaches and traditional monitoring systems for anomaly detection.

Design/methodology/approach

Author investigated different artificial immune system (AIS) theories and proposes how to combine different ideas to solve problems of network security domain. An anomaly detection system that applies those ideas was built and tested in a real time environment, to test the pros and cons of AIS and clarify its applicability. Rather than building a detailed signature based model of intrusion detection system, the scope of this study tries to explore the principle in an immune network focusing on its self-organization, adaptive learning capability, and immune feedback.

Findings

The natural immune system has its own intelligent mechanisms to detect the foreign bodies and fight them and without it, an individual cannot live, even just for several days. Network attackers evolved new types of attacks. Attacks became more complex, severe and hard to detect. This results in increasing needs for network defense systems, especially those with ability to extraordinary approaches or to face the dynamic nature of continuously changing network threats. KDD CUP'99 dataset are used as a training data to evaluate the proposed hybrid artificial immune principles anomaly detection. The average cost of the proposed model was 0.1195 where that the wining of KDD99 dataset computation had 0.233.

Originality/value

It is original to introduce investigation on the vaccination biological process. A special module was built to perform this process and check its usage and how it could be formulated in artificial life.

Details

Information Management & Computer Security, vol. 21 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 March 1991

F. Kieffer and H. Schneider

There is a general notion that immunology represents one of the more recently emerged branches in the field of science. Its actual roots, however, go back to the late 19th century…

Abstract

There is a general notion that immunology represents one of the more recently emerged branches in the field of science. Its actual roots, however, go back to the late 19th century when scientists like Louis Pasteur, Robert Koch and Paul Ehrlich — just to name a few — laid the basis for active immunisation against bacterial infections. Following the discovery of the virus and its structure, immunisation against viral infections was developed, the most spectacular and effective treatments being vaccinations against smallpox and poliomyelitis.

Details

Nutrition & Food Science, vol. 91 no. 3
Type: Research Article
ISSN: 0034-6659

Article
Publication date: 25 February 2014

Mario Iván Tarride and Julia González

To contribute to the search for new viewpoints that will enrich the understanding of the complex organizational phenomenon, in particular by contributing to the development of a…

Abstract

Purpose

To contribute to the search for new viewpoints that will enrich the understanding of the complex organizational phenomenon, in particular by contributing to the development of a method that allows qualifying, in the fullest possible way, whether an organization can be said to be healthy. So the objective of this work has been to experiment with the diagnostic method of the organizational health situation – proposed in a previous paper published in this journal – through applications that allowed backfeeding it and offering a new improved version of it. The paper aims to discuss these issues.

Design/methodology/approach

The present work takes up the challenge of advancing in the development of the method of determining the health condition of an organization, revising the general homomorphism as well as the information that will be considered, its sources, the way of obtaining it, and the way of making the synthesis that will allow issuing the final overall judgement of healthy or not of the organization that is being studied. To that end, recourse is made to the experience obtained from eight applications made to different kinds of small organizations in the city of Santiago, Chile, from 2008 to 2012.

Findings

The human-being/organization homomorphism was reformulated, going from eight component systems of the human body to 13, by reformulating some and incorporating others. Although a set of indicators may be used in different kinds of organizations, each one of them also presents a specificity that makes it highly complicated to make comparisons; the health situation of an organization is related only to itself. Consequently, the set of indicators that are selected to determine the health condition of an organization depends on itself. Not all the variables, systems and dimensions have the same weight for those interested in the overall health judgement to be issued, so this task of searching for the weights becomes a key aspect of the method: what was found to be most advisable was to set up a group of experts composed of key informants belonging to the organization itself and of external analysts. The symptoms – perceptions of the key informants – must be transformed into signs that allow objectifying the judgement of healthy or not of an organization.

Originality/value

The work contributes new elements that enrich the method for diagnosing organizational health proposed earlier, starting from the homomorphism established between the way in which allopathic physicians study their patients and the way the analyst operates with an organization.

Details

Kybernetes, vol. 43 no. 2
Type: Research Article
ISSN: 0368-492X

Keywords

Case study
Publication date: 12 May 2022

Syeda Maseeha Qumer and Syeda Ikrama

This case is meant for MBA students as a part of their leadership/information technology and system curriculum. It is suitable for classes in both offline and online mode.

Abstract

Study level/applicability

This case is meant for MBA students as a part of their leadership/information technology and system curriculum. It is suitable for classes in both offline and online mode.

Subject area

Human resources management/information technology and systems.

Case overview

The case discusses how Poppy Gustafsson (Gustafsson) (she), Cofounder and Chief Executive Officer of Darktrace plc, one of the world’s largest cyber-AI companies, is reinventing enterprise security by using artificial intelligence (AI) to detect and respond to cyberthreats to businesses and protect the public. Darktrace’s technology leverages the principles of the human immune system to autonomously defend organizations from cyberattacks, insider threats and AI warfare. In addition to leading a cutting-edge cybersecurity company, Gustafsson evangelizes gender diversity at Darktrace where 40% of employees and four C-level executives are women, a number nearly unheard of in the tech sector.The case chronicles the journey of Gustafsson and how she led the company to growth and success. Under her leadership, Darktrace has grown into a market leader in the AI cybersecurity space serving 5,600 customers in 100 countries, as of June 2021. Gustafsson not only redefined the cybersecurity space but also inspired women to pursue a career in the field of cybersecurity. She also collaborated with a social enterprise called WISE to encourage more girls to consider STEM careers.However, along the way, she faced several challenges including growing competition, procuring funds from investors, cybersecurity talent shortage and training personnel. Going forward, some of the challenges before Gustafsson would be to meet the changing cyber protection demands of customers; hire, train and retain highly skilled cybersecurity personnel; beat the competition in a saturated cybersecurity services space; sustain revenue growth; and post profits as Darktrace had incurred losses every year since its inception.

Expected learning outcomes

This case is designed to enable students to: understand the issues and challenges women face in the field of cybersecurity; understand the qualities required for a woman leader to lead a technology firm; study the leadership and management style of Gustafsson; understand the importance of transformational leadership in management; understand the role of Gustafsson in Darktrace’s growth and success; analyze the traits that Gustafsson possesses as a tech leader in an emerging cybersecurity space; understand the importance of gender diversity in cybersecurity; and analyze the challenges faced by Gustafsson going forward and explore ways in which she can overcome them.

Subject code

CSS: 11 Strategy.

Details

The Case For Women, vol. no.
Type: Case Study
ISSN: 2732-4443

Keywords

Article
Publication date: 4 April 2016

M.V.A. Raju Bahubalendruni, B.B.V.L. Deepak and Bibhuti Bhusan Biswal

The purpose of this study is to develop an intelligent methodology to find out an optimal feasible assembly sequence while considering the assembly predicates.

Abstract

Purpose

The purpose of this study is to develop an intelligent methodology to find out an optimal feasible assembly sequence while considering the assembly predicates.

Design/methodology/approach

This proposed study is carried out by using two artificial immune system-based models, namely, Bone Marrow Model and Negative Selection Algorithms, to achieve the following objectives: to obtain the possible number of assembly sequences; to obtain the feasible assembly sequences while considering different assembly predicates; and to obtain an optimal feasible assembly sequence.

Findings

Proposed bone-marrow model determines the possible assembly sequences to ease the intricacy of the problem formulation. Further evaluation has been carried out through negative-selection censoring and monitoring models. These developed models reduce the overall computational time to determine the optimal feasible assembly sequence.

Originality/value

In this paper, the novel and efficient strategies based on artificial immune system have been developed and proposed to obtain all valid assembly sequences and optimized assembly sequence for a given assembled product using assembly attributes. The introduced methodology has proven its effectiveness in achieving optimal assembly sequence with less computational time.

Details

Assembly Automation, vol. 36 no. 2
Type: Research Article
ISSN: 0144-5154

Keywords

Article
Publication date: 11 October 2021

Sebastian Knebel, Mario D. Schultz and Peter Seele

This paper aims to outline how destructive communication exemplified by ransomware cyberattacks destroys the process of organization, causes a “state of exception,” and thus…

Abstract

Purpose

This paper aims to outline how destructive communication exemplified by ransomware cyberattacks destroys the process of organization, causes a “state of exception,” and thus constitutes organization. The authors build on Agamben's state of exception and translate it into communicative constitution of organization (CCO) theory.

Design/methodology/approach

A significant increase of cyberattacks have impacted organizations in recent times and laid organizations under siege. This conceptual research builds on illustrative cases chosen by positive deviance case selection (PDCS) of ransomware attacks.

Findings

CCO theory focuses mainly on ordering characteristics of communication. The authors aim to complement this view with a perspective on destructive communication that destroys the process of organization. Based on illustrative cases, the authors conceptualize a process model of destructive CCO.

Practical implications

The authors expand thoughts about a digital “corporate immune system” to question current offensive cybersecurity strategies of deterrence and promote resilience approaches instead.

Originality/value

Informed by destructive communication of cyberattacks, this theory advancement supports arguments to include notions of disorder into CCO theory. Furthermore, the paper explains where disruptions like cyberattacks may trigger sensemaking and change to preserve stability. Finally, a novel definition of ‘destructive CCO’ is provided: Destructive Communication Constitutes Organization by disrupting and destroying its site and surface while triggering sensemaking and becoming part of sensemaking itself.

Details

Journal of Information, Communication and Ethics in Society, vol. 20 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 1 May 1993

The latest international research on vitamin C and its possible role in reducing the risk of cancers, heart disease and other serious ailments was presented at a conference held…

Abstract

The latest international research on vitamin C and its possible role in reducing the risk of cancers, heart disease and other serious ailments was presented at a conference held recently in Glasgow. The conference was held to celebrate ten years of production of vitamin C by Roche Products at Dairy. Professor Ronald Anderson from the University of Pretoria reviewed the origins and adverse effects on health of oxygen‐free radicals, and other reactive oxidants generated during activation of the human immune system, and the protective role of the anti‐oxidant nutrient vitamin C in the prevention of free radical‐mediated immune dysfunction, tissue damage and carcinogenesis during inflammatory responses. Here we include extracts from his paper.

Details

Nutrition & Food Science, vol. 93 no. 5
Type: Research Article
ISSN: 0034-6659

Article
Publication date: 1 June 1999

Bonawentura Kochel

A control of the first‐line human defence system, using mechanisms analogous to specific and non‐specific (parametric) triggering of phagocytosis, is proposed on the basis of an…

Abstract

A control of the first‐line human defence system, using mechanisms analogous to specific and non‐specific (parametric) triggering of phagocytosis, is proposed on the basis of an autocatalytic model of biphasic modulation of phagocyte luminescence by experimental peptide medicines. Properties of the autocatalytic model are described and its catastrophe and bifurcation sets determined. The mechanism analogous to parametric triggering is shown to result from a fold catastrophe produced by the changes in the autocatalytic interaction parameter characterising a given peptide preparation. Usefulness of the model was shown by its application to two distinct peptide preparations having different immunomodulatory properties.

Details

Kybernetes, vol. 28 no. 4
Type: Research Article
ISSN: 0368-492X

Keywords

1 – 10 of over 5000