Search results

1 – 10 of 73
Open Access
Article
Publication date: 7 April 2020

Fatima M. Isiaka, Salihu Abdullahi Audu and Mustafa Ahmed Umar

The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered…

2248

Abstract

Purpose

The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered national economies, enhanced how governments interact with their citizens and how ordinary people connect with friends and family. However, this dependence has equally resulted to a high rise in vulnerability, threat and risk associated with more use of information and communication technology. Cyber-attacks that have the potential to disrupt or damage information system infrastructure are getting more complex with some level of sophistication. Traditional protection of information system infrastructure is no longer sufficient; systems have proven to be immune to failure or incidents. This paper aims to ensure that there is a continuous availability of services through a fail-safe proof.

Design/methodology/approach

MYSQL replication technique was used to develop a model based on three-tier layers using the principle of network interdependency and the replication techniques. Tier 1 depicts a Telecom organization serving as service provider that provides internet service to Tier 2 organization – a Bank; Tier 3 is the financial App that can be used by bank staff and customers. The fail-safe mode integrated mechanism enables Tier 3 to continue to render its services in the event of an attack on Tier 1 such as DDoS without disruption.

Findings

This technique succeeded in mitigating the loss of data if cyber incident occurred or reception of uninterrupted services is countered, which give rise to future master-to-master architecture.

Research limitations/implications

The study conducted is limited to the design and development of a fail-safe system for interdependent networks or systems using MYSQL replication technique.

Originality/value

In an interdependent environment such as the cyberspace, the sectors are interdependent for optimal results. The originality of the work ensures that there is availability of services which is sustained and that data integrity is assured using the fail-safe technique based on MySQL replication method.

Details

International Journal of Crowd Science, vol. 4 no. 2
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Article
Publication date: 1 July 2021

Xiaochun Guan, Sheng Lou, Han Li and Tinglong Tang

Deployment of deep neural networks on embedded devices is becoming increasingly popular because it can reduce latency and energy consumption for data communication. This paper…

2638

Abstract

Purpose

Deployment of deep neural networks on embedded devices is becoming increasingly popular because it can reduce latency and energy consumption for data communication. This paper aims to give out a method for deployment the deep neural networks on a quad-rotor aircraft for further expanding its application scope.

Design/methodology/approach

In this paper, a design scheme is proposed to implement the flight mission of the quad-rotor aircraft based on multi-sensor fusion. It integrates attitude acquisition module, global positioning system position acquisition module, optical flow sensor, ultrasonic sensor and Bluetooth communication module, etc. A 32-bit microcontroller is adopted as the main controller for the quad-rotor aircraft. To make the quad-rotor aircraft be more intelligent, the study also proposes a method to deploy the pre-trained deep neural networks model on the microcontroller based on the software packages of the RT-Thread internet of things operating system.

Findings

This design provides a simple and efficient design scheme to further integrate artificial intelligence (AI) algorithm for the control system design of quad-rotor aircraft.

Originality/value

This method provides an application example and a design reference for the implementation of AI algorithms on unmanned aerial vehicle or terminal robots.

Details

Industrial Robot: the international journal of robotics research and application, vol. 48 no. 5
Type: Research Article
ISSN: 0143-991X

Keywords

Open Access
Article
Publication date: 28 January 2022

Diego Camara Sales, Leandro Buss Becker and Cristian Koliver

Managing components' resources plays a critical role in the success of systems' architectures designed for cyber–physical systems (CPS). Performing the selection of candidate…

1170

Abstract

Purpose

Managing components' resources plays a critical role in the success of systems' architectures designed for cyber–physical systems (CPS). Performing the selection of candidate components to pursue a specific application's needs also involves identifying the relationships among architectural components, the network and the physical process, as the system characteristics and properties are related.

Design/methodology/approach

Using a Model-Driven Engineering (MDE) approach is a valuable asset therefore. Within this context, the authors present the so-called Systems Architecture Ontology (SAO), which allows the representation of a system architecture (SA), as well as the relationships, characteristics and properties of a CPS application.

Findings

SAO uses a common vocabulary inspired by the Architecture Analysis and Design Language (AADL) standard. To demonstrate SAO's applicability, this paper presents its use as an MDE approach combined with ontology-based modeling through the Ontology Web Language (OWL). From OWL models based on SAO, the authors propose a model transformation tool to extract data related to architectural modeling in AADL code, allowing the creation of a components' library and a property set model. Besides saving design time by automatically generating many lines of code, such code is less error-prone, that is, without inconsistencies.

Originality/value

To illustrate the proposal, the authors present a case study in the aerospace domain with the application of SAO and its transformation tool. As result, a library containing 74 components and a related set of properties are automatically generated to support architectural design and evaluation.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 17 May 2022

Giacomo Cabri and Guido Fioretti

This article aims to provide a theoretical unifying framework for flexible organizational forms, such as so-called adhocracies and network organizations.

2019

Abstract

Purpose

This article aims to provide a theoretical unifying framework for flexible organizational forms, such as so-called adhocracies and network organizations.

Design/methodology/approach

In this article, organization practices that are typical of the software industry are analyzed and re-interpreted by means of foundational concepts of organization science. It is shown that one and the same logic is at work in all flexible organizations.

Findings

Coordination modes can be fruitfully employed to characterize flexible organizations. In particular, standardization is key in order to obtain flexibility, provided that a novel sort of coordination by standardization is added to those that have been conceptualized hitherto.

Research limitations/implications

This article highlights one necessary condition for organizations to be flexible. Further aspects, only cursorily mentioned in this paper, need to be addressed in order to obtain a complete picture.

Practical implications

A theory of organizational flexibility constitutes a guide for organizational design. This article suggests the non-obvious prescription that the boundary conditions of individual behavior must be standardized in order to achieve operational flexibility.

Social implications

This theoretical framework can be profitably employed in management classes.

Originality/value

Currently, flexible organizations are only understood in terms of lists of instances. This article shows that apparently heterogeneous case-studies share common features in fact.

Details

International Journal of Organization Theory & Behavior, vol. 25 no. 1/2
Type: Research Article
ISSN: 1093-4537

Keywords

Open Access
Article
Publication date: 22 February 2022

Solmaz Mansoori, Janne Harkonen and Harri Haapasalo

This study aims to facilitate consistency of information in building information modelling (BIM) and address the current BIM gaps through the perspectives of the productization…

2245

Abstract

Purpose

This study aims to facilitate consistency of information in building information modelling (BIM) and address the current BIM gaps through the perspectives of the productization concept and product structure (PS).

Design/methodology/approach

The study follows a conceptual research approach in conjunction with a single case study. First, the previous studies on BIM implementation, productization and PS are reviewed. Further, a case study is used to analyse the current state of productization in the construction sector and develop a functional PS for construction.

Findings

A Part-Phase-Elements Matrix is proposed as a construction-specific PS to facilitate consistency in information and to enhance BIM. The proposed matrix provides new avenues to facilitate consistent information exchange through the interconnection between conceptual PS and standard building objects library, and encourage collaborative communication between stakeholders.

Originality/value

This study explores the core of the productization concept and PS as means to facilitate consistency of information and thus address the current gaps in BIM. This as building projects progressively move towards systematic modular and prefabricated construction where the flow of reliable information about product and construction offerings becomes increasingly important.

Details

Engineering, Construction and Architectural Management, vol. 30 no. 5
Type: Research Article
ISSN: 0969-9988

Keywords

Open Access
Article
Publication date: 25 April 2022

Pedro Antunes and Mary Tate

Many organizations struggle to achieve their desired levels of business process flexibility and support. However, these two capabilities conflict with each other and different…

Abstract

Purpose

Many organizations struggle to achieve their desired levels of business process flexibility and support. However, these two capabilities conflict with each other and different tradeoffs have to be made. In this paper, the authors analyze different process conceptualizations and discuss their implications. The authors argue that the conceptualizations people adopt to think (conceptualize) about business processes affect the way they model them, which in turn result in different flexibility-support tradeoffs.

Design/methodology/approach

A set of properties is proposed to compare process conceptualizations: dominant concept, contract, and existential and representational properties. Using these properties, several process conceptualizations are analyzed and integrated in a comparison chart, which highlights different flexibility-support tradeoffs. The storytelling method is adopted to support the analytic process.

Findings

The authors show how different process conceptualizations result in different flexibility-support tradeoffs. The authors suggest that we need to intervene on a set of properties of process conceptualizations to achieve different flexibility-support tradeoffs.

Research limitations/implications

This research contributes to understanding the relationships between process conceptualizations, process modeling, and the flexibility-support tradeoff. A comparison chart helps organizations analyze their desired levels of flexibility and support using a set of properties.

Originality/value

The extent of covered viewpoints makes this study unique in the process management field. Such effort provides a contribution towards a more multidisciplinary discussion of process models, which integrates different process conceptualizations.

Details

Business Process Management Journal, vol. 28 no. 3
Type: Research Article
ISSN: 1463-7154

Keywords

Open Access
Article
Publication date: 14 August 2017

Jassim Happa and Michael Goldsmith

Several attack models attempt to describe behaviours of attacks with the intent to understand and combat them better. However, all models are to some degree incomplete. They may…

1233

Abstract

Purpose

Several attack models attempt to describe behaviours of attacks with the intent to understand and combat them better. However, all models are to some degree incomplete. They may lack insight about minor variations about attacks that are observed in the real world (but are not described in the model). This may lead to similar attacks being classified as the same type of attack, or in some cases the same instance of attack. The appropriate solution would be to modify the model or replace it entirely. However, doing so may be undesirable as the model may work well for most cases or time and resource constraints may factor in as well. This paper aims to explore the potential value of adding information about attacks and attackers to existing models.

Design/methodology/approach

This paper investigates used cases of minor variations in attacks and how it may and may not be appropriate to communicate subtle differences in existing attack models through the use of annotations. In particular, the authors investigate commonalities across a range of existing models and identify where and how annotations may be helpful.

Findings

The authors propose that nuances (of attack properties) can be appended as annotations to existing attack models. Using annotations appropriately should enable analysts and researchers to express subtle but important variations in attacks that may not fit the model currently being used.

Research limitations/implications

This work only demonstrated a few simple, generic examples. In the future, the authors intend to investigate how this annotation approach can be extended further. Particularly, they intend to explore how annotations can be created computationally; the authors wish to obtain feedback from security analysts through interviews, identify where potential biases may arise and identify other real-world applications.

Originality/value

The value of this paper is that the authors demonstrate how annotations may help analysts communicate and ask better questions during identification of unknown aspects of attacks faster,e.g. as a means of storing mental notes in a structured manner, especially while facing zero-day attacks when information is incomplete.

Details

PSU Research Review, vol. 1 no. 2
Type: Research Article
ISSN: 2399-1747

Keywords

Open Access
Article
Publication date: 1 June 2009

Mohammed B. Lahkim, Gregory J. Skulmoski and Russel E. Bruhn

This paper investigates the integration of leadership training into IT curricula to develop current and future skills needed by the IT job market. The technical and non-technical…

Abstract

This paper investigates the integration of leadership training into IT curricula to develop current and future skills needed by the IT job market. The technical and non-technical skills required for IT professionals are presented and a conceptual model for including leadership training in technical courses is outlined. To implement this model, we adopted the Problem-Based Learning approach to teach an IT course. Qualitative and quantitative data were gathered, through a survey, from 52 undergraduate students in the College of Information Technology at Zayed University. Our results show that our adopted approach was successful in teaching IT skills as well as developing leadership skills. Given these findings, we highlight the importance and feasibility of integrating leadership development on a daily basis within technical courses to develop both the technical and non technical skills required by the job market.

Details

Learning and Teaching in Higher Education: Gulf Perspectives, vol. 6 no. 1
Type: Research Article
ISSN: 2077-5504

Open Access
Article
Publication date: 1 March 2021

Yiqiang Feng, Leiju Qiu and Baowen Sun

The originality of the crowd cyber system lies in the fact that it possesses the intelligence of multiple groups including intelligence of people, intelligence of objects and…

1203

Abstract

Purpose

The originality of the crowd cyber system lies in the fact that it possesses the intelligence of multiple groups including intelligence of people, intelligence of objects and intelligence of machines. However, quantitative analysis of the level of intelligence is not sufficient, due to many limitations, such as the unclear definition of intelligence and the inconformity of human intelligence quotient (IQ) test and artificial intelligence assessment methods. This paper aims to propose a new crowd intelligence measurement framework from the harmony of adaption and practice to measure intelligence in crowd network.

Design/methodology/approach

The authors draw on the ideas of traditional Confucianism, which sees intelligence from the dimensions of IQ and effectiveness. First, they clarify the related concepts of intelligence and give a new definition of crowd intelligence in the form of a set. Second, they propose four stages of the evolution of intelligence from low to high, and sort out the dilemma of intelligence measurement at the present stage. Third, they propose a framework for measuring crowd intelligence based on two dimensions.

Findings

The generalized IQ operator model is optimized, and a new IQ algorithm is proposed. Individuals with different IQs can have different relationships, such as cooperative, competitive, antagonistic and so on. The authors point out four representative forms of intelligence as well as its evolution stages.

Research limitations/implications

The authors, will use more rigorous mathematical symbols to represent the logical relationships between different individuals, and consider applying the measurement framework to a real-life situation to enrich the research on crowd intelligence in the further study.

Originality/value

Intelligence measurement is one of foundations of crowd science. This research lays the foundation for studying the interaction among human, machine and things from the perspective of crowd intelligence, which owns significant scientific value.

Details

International Journal of Crowd Science, vol. 5 no. 1
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Article
Publication date: 28 April 2020

Chepkoech C. Kiptoo

This paper aims to investigate the use of crowdsourcing in the enhancement of an ontology of taxonomic knowledge. The paper proposes a conceptual architecture for the…

Abstract

Purpose

This paper aims to investigate the use of crowdsourcing in the enhancement of an ontology of taxonomic knowledge. The paper proposes a conceptual architecture for the incorporation of crowdsourcing into the creation of ontologies.

Design/methodology/approach

The research adopted the design science research approach characterised by cycles of “build” and “evaluate” until a refined artefact was established.

Findings

Data from a case of a fruit fly platform demonstrates that online crowds can contribute to ontology enhancement if engaged in a structured manner that feeds into a defined ontology model.

Research limitations/implications

The research contributes an architecture to the crowdsourcing body knowledge. The research also makes a methodological contribution for the development of ontologies using crowdsourcing.

Practical implications

Creating ontologies is a demanding task and most ontologies are not exhaustive on the targeted domain knowledge. The proposed architecture provides a guiding structure for the engagement of online crowds in the creation and enhancement of domain ontologies. The research uses a case of taxonomic knowledge ontology.

Originality/value

Crowdsourcing for creation and enhancement of ontologies by non-experts is novel and presents opportunity to build and refine ontologies for different domains by engaging online crowds. The process of ontology creation is also prone to errors and engaging crowds presents opportunity for corrections and enhancements.

Details

International Journal of Crowd Science, vol. 4 no. 3
Type: Research Article
ISSN: 2398-7294

Keywords

1 – 10 of 73