Search results
1 – 10 of 73Fatima M. Isiaka, Salihu Abdullahi Audu and Mustafa Ahmed Umar
The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered…
Abstract
Purpose
The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered national economies, enhanced how governments interact with their citizens and how ordinary people connect with friends and family. However, this dependence has equally resulted to a high rise in vulnerability, threat and risk associated with more use of information and communication technology. Cyber-attacks that have the potential to disrupt or damage information system infrastructure are getting more complex with some level of sophistication. Traditional protection of information system infrastructure is no longer sufficient; systems have proven to be immune to failure or incidents. This paper aims to ensure that there is a continuous availability of services through a fail-safe proof.
Design/methodology/approach
MYSQL replication technique was used to develop a model based on three-tier layers using the principle of network interdependency and the replication techniques. Tier 1 depicts a Telecom organization serving as service provider that provides internet service to Tier 2 organization – a Bank; Tier 3 is the financial App that can be used by bank staff and customers. The fail-safe mode integrated mechanism enables Tier 3 to continue to render its services in the event of an attack on Tier 1 such as DDoS without disruption.
Findings
This technique succeeded in mitigating the loss of data if cyber incident occurred or reception of uninterrupted services is countered, which give rise to future master-to-master architecture.
Research limitations/implications
The study conducted is limited to the design and development of a fail-safe system for interdependent networks or systems using MYSQL replication technique.
Originality/value
In an interdependent environment such as the cyberspace, the sectors are interdependent for optimal results. The originality of the work ensures that there is availability of services which is sustained and that data integrity is assured using the fail-safe technique based on MySQL replication method.
Details
Keywords
Xiaochun Guan, Sheng Lou, Han Li and Tinglong Tang
Deployment of deep neural networks on embedded devices is becoming increasingly popular because it can reduce latency and energy consumption for data communication. This paper…
Abstract
Purpose
Deployment of deep neural networks on embedded devices is becoming increasingly popular because it can reduce latency and energy consumption for data communication. This paper aims to give out a method for deployment the deep neural networks on a quad-rotor aircraft for further expanding its application scope.
Design/methodology/approach
In this paper, a design scheme is proposed to implement the flight mission of the quad-rotor aircraft based on multi-sensor fusion. It integrates attitude acquisition module, global positioning system position acquisition module, optical flow sensor, ultrasonic sensor and Bluetooth communication module, etc. A 32-bit microcontroller is adopted as the main controller for the quad-rotor aircraft. To make the quad-rotor aircraft be more intelligent, the study also proposes a method to deploy the pre-trained deep neural networks model on the microcontroller based on the software packages of the RT-Thread internet of things operating system.
Findings
This design provides a simple and efficient design scheme to further integrate artificial intelligence (AI) algorithm for the control system design of quad-rotor aircraft.
Originality/value
This method provides an application example and a design reference for the implementation of AI algorithms on unmanned aerial vehicle or terminal robots.
Details
Keywords
Diego Camara Sales, Leandro Buss Becker and Cristian Koliver
Managing components' resources plays a critical role in the success of systems' architectures designed for cyber–physical systems (CPS). Performing the selection of candidate…
Abstract
Purpose
Managing components' resources plays a critical role in the success of systems' architectures designed for cyber–physical systems (CPS). Performing the selection of candidate components to pursue a specific application's needs also involves identifying the relationships among architectural components, the network and the physical process, as the system characteristics and properties are related.
Design/methodology/approach
Using a Model-Driven Engineering (MDE) approach is a valuable asset therefore. Within this context, the authors present the so-called Systems Architecture Ontology (SAO), which allows the representation of a system architecture (SA), as well as the relationships, characteristics and properties of a CPS application.
Findings
SAO uses a common vocabulary inspired by the Architecture Analysis and Design Language (AADL) standard. To demonstrate SAO's applicability, this paper presents its use as an MDE approach combined with ontology-based modeling through the Ontology Web Language (OWL). From OWL models based on SAO, the authors propose a model transformation tool to extract data related to architectural modeling in AADL code, allowing the creation of a components' library and a property set model. Besides saving design time by automatically generating many lines of code, such code is less error-prone, that is, without inconsistencies.
Originality/value
To illustrate the proposal, the authors present a case study in the aerospace domain with the application of SAO and its transformation tool. As result, a library containing 74 components and a related set of properties are automatically generated to support architectural design and evaluation.
Details
Keywords
Giacomo Cabri and Guido Fioretti
This article aims to provide a theoretical unifying framework for flexible organizational forms, such as so-called adhocracies and network organizations.
Abstract
Purpose
This article aims to provide a theoretical unifying framework for flexible organizational forms, such as so-called adhocracies and network organizations.
Design/methodology/approach
In this article, organization practices that are typical of the software industry are analyzed and re-interpreted by means of foundational concepts of organization science. It is shown that one and the same logic is at work in all flexible organizations.
Findings
Coordination modes can be fruitfully employed to characterize flexible organizations. In particular, standardization is key in order to obtain flexibility, provided that a novel sort of coordination by standardization is added to those that have been conceptualized hitherto.
Research limitations/implications
This article highlights one necessary condition for organizations to be flexible. Further aspects, only cursorily mentioned in this paper, need to be addressed in order to obtain a complete picture.
Practical implications
A theory of organizational flexibility constitutes a guide for organizational design. This article suggests the non-obvious prescription that the boundary conditions of individual behavior must be standardized in order to achieve operational flexibility.
Social implications
This theoretical framework can be profitably employed in management classes.
Originality/value
Currently, flexible organizations are only understood in terms of lists of instances. This article shows that apparently heterogeneous case-studies share common features in fact.
Details
Keywords
Solmaz Mansoori, Janne Harkonen and Harri Haapasalo
This study aims to facilitate consistency of information in building information modelling (BIM) and address the current BIM gaps through the perspectives of the productization…
Abstract
Purpose
This study aims to facilitate consistency of information in building information modelling (BIM) and address the current BIM gaps through the perspectives of the productization concept and product structure (PS).
Design/methodology/approach
The study follows a conceptual research approach in conjunction with a single case study. First, the previous studies on BIM implementation, productization and PS are reviewed. Further, a case study is used to analyse the current state of productization in the construction sector and develop a functional PS for construction.
Findings
A Part-Phase-Elements Matrix is proposed as a construction-specific PS to facilitate consistency in information and to enhance BIM. The proposed matrix provides new avenues to facilitate consistent information exchange through the interconnection between conceptual PS and standard building objects library, and encourage collaborative communication between stakeholders.
Originality/value
This study explores the core of the productization concept and PS as means to facilitate consistency of information and thus address the current gaps in BIM. This as building projects progressively move towards systematic modular and prefabricated construction where the flow of reliable information about product and construction offerings becomes increasingly important.
Details
Keywords
Many organizations struggle to achieve their desired levels of business process flexibility and support. However, these two capabilities conflict with each other and different…
Abstract
Purpose
Many organizations struggle to achieve their desired levels of business process flexibility and support. However, these two capabilities conflict with each other and different tradeoffs have to be made. In this paper, the authors analyze different process conceptualizations and discuss their implications. The authors argue that the conceptualizations people adopt to think (conceptualize) about business processes affect the way they model them, which in turn result in different flexibility-support tradeoffs.
Design/methodology/approach
A set of properties is proposed to compare process conceptualizations: dominant concept, contract, and existential and representational properties. Using these properties, several process conceptualizations are analyzed and integrated in a comparison chart, which highlights different flexibility-support tradeoffs. The storytelling method is adopted to support the analytic process.
Findings
The authors show how different process conceptualizations result in different flexibility-support tradeoffs. The authors suggest that we need to intervene on a set of properties of process conceptualizations to achieve different flexibility-support tradeoffs.
Research limitations/implications
This research contributes to understanding the relationships between process conceptualizations, process modeling, and the flexibility-support tradeoff. A comparison chart helps organizations analyze their desired levels of flexibility and support using a set of properties.
Originality/value
The extent of covered viewpoints makes this study unique in the process management field. Such effort provides a contribution towards a more multidisciplinary discussion of process models, which integrates different process conceptualizations.
Details
Keywords
Jassim Happa and Michael Goldsmith
Several attack models attempt to describe behaviours of attacks with the intent to understand and combat them better. However, all models are to some degree incomplete. They may…
Abstract
Purpose
Several attack models attempt to describe behaviours of attacks with the intent to understand and combat them better. However, all models are to some degree incomplete. They may lack insight about minor variations about attacks that are observed in the real world (but are not described in the model). This may lead to similar attacks being classified as the same type of attack, or in some cases the same instance of attack. The appropriate solution would be to modify the model or replace it entirely. However, doing so may be undesirable as the model may work well for most cases or time and resource constraints may factor in as well. This paper aims to explore the potential value of adding information about attacks and attackers to existing models.
Design/methodology/approach
This paper investigates used cases of minor variations in attacks and how it may and may not be appropriate to communicate subtle differences in existing attack models through the use of annotations. In particular, the authors investigate commonalities across a range of existing models and identify where and how annotations may be helpful.
Findings
The authors propose that nuances (of attack properties) can be appended as annotations to existing attack models. Using annotations appropriately should enable analysts and researchers to express subtle but important variations in attacks that may not fit the model currently being used.
Research limitations/implications
This work only demonstrated a few simple, generic examples. In the future, the authors intend to investigate how this annotation approach can be extended further. Particularly, they intend to explore how annotations can be created computationally; the authors wish to obtain feedback from security analysts through interviews, identify where potential biases may arise and identify other real-world applications.
Originality/value
The value of this paper is that the authors demonstrate how annotations may help analysts communicate and ask better questions during identification of unknown aspects of attacks faster,e.g. as a means of storing mental notes in a structured manner, especially while facing zero-day attacks when information is incomplete.
Details
Keywords
Mohammed B. Lahkim, Gregory J. Skulmoski and Russel E. Bruhn
This paper investigates the integration of leadership training into IT curricula to develop current and future skills needed by the IT job market. The technical and non-technical…
Abstract
This paper investigates the integration of leadership training into IT curricula to develop current and future skills needed by the IT job market. The technical and non-technical skills required for IT professionals are presented and a conceptual model for including leadership training in technical courses is outlined. To implement this model, we adopted the Problem-Based Learning approach to teach an IT course. Qualitative and quantitative data were gathered, through a survey, from 52 undergraduate students in the College of Information Technology at Zayed University. Our results show that our adopted approach was successful in teaching IT skills as well as developing leadership skills. Given these findings, we highlight the importance and feasibility of integrating leadership development on a daily basis within technical courses to develop both the technical and non technical skills required by the job market.
Yiqiang Feng, Leiju Qiu and Baowen Sun
The originality of the crowd cyber system lies in the fact that it possesses the intelligence of multiple groups including intelligence of people, intelligence of objects and…
Abstract
Purpose
The originality of the crowd cyber system lies in the fact that it possesses the intelligence of multiple groups including intelligence of people, intelligence of objects and intelligence of machines. However, quantitative analysis of the level of intelligence is not sufficient, due to many limitations, such as the unclear definition of intelligence and the inconformity of human intelligence quotient (IQ) test and artificial intelligence assessment methods. This paper aims to propose a new crowd intelligence measurement framework from the harmony of adaption and practice to measure intelligence in crowd network.
Design/methodology/approach
The authors draw on the ideas of traditional Confucianism, which sees intelligence from the dimensions of IQ and effectiveness. First, they clarify the related concepts of intelligence and give a new definition of crowd intelligence in the form of a set. Second, they propose four stages of the evolution of intelligence from low to high, and sort out the dilemma of intelligence measurement at the present stage. Third, they propose a framework for measuring crowd intelligence based on two dimensions.
Findings
The generalized IQ operator model is optimized, and a new IQ algorithm is proposed. Individuals with different IQs can have different relationships, such as cooperative, competitive, antagonistic and so on. The authors point out four representative forms of intelligence as well as its evolution stages.
Research limitations/implications
The authors, will use more rigorous mathematical symbols to represent the logical relationships between different individuals, and consider applying the measurement framework to a real-life situation to enrich the research on crowd intelligence in the further study.
Originality/value
Intelligence measurement is one of foundations of crowd science. This research lays the foundation for studying the interaction among human, machine and things from the perspective of crowd intelligence, which owns significant scientific value.
Details
Keywords
This paper aims to investigate the use of crowdsourcing in the enhancement of an ontology of taxonomic knowledge. The paper proposes a conceptual architecture for the…
Abstract
Purpose
This paper aims to investigate the use of crowdsourcing in the enhancement of an ontology of taxonomic knowledge. The paper proposes a conceptual architecture for the incorporation of crowdsourcing into the creation of ontologies.
Design/methodology/approach
The research adopted the design science research approach characterised by cycles of “build” and “evaluate” until a refined artefact was established.
Findings
Data from a case of a fruit fly platform demonstrates that online crowds can contribute to ontology enhancement if engaged in a structured manner that feeds into a defined ontology model.
Research limitations/implications
The research contributes an architecture to the crowdsourcing body knowledge. The research also makes a methodological contribution for the development of ontologies using crowdsourcing.
Practical implications
Creating ontologies is a demanding task and most ontologies are not exhaustive on the targeted domain knowledge. The proposed architecture provides a guiding structure for the engagement of online crowds in the creation and enhancement of domain ontologies. The research uses a case of taxonomic knowledge ontology.
Originality/value
Crowdsourcing for creation and enhancement of ontologies by non-experts is novel and presents opportunity to build and refine ontologies for different domains by engaging online crowds. The process of ontology creation is also prone to errors and engaging crowds presents opportunity for corrections and enhancements.
Details