Search results

1 – 10 of over 63000
To view the access options for this content please click here
Article
Publication date: 12 June 2017

Vivek V. Jog and Senthil Murugan T.

Due to the connectivity of the multiple devices and the systems on the same network, rapid development has become possible in Internet of Things (IoTs) for the last…

Abstract

Purpose

Due to the connectivity of the multiple devices and the systems on the same network, rapid development has become possible in Internet of Things (IoTs) for the last decade. But, IoT is mostly affected with severe security challenges due to the potential vulnerabilities happened through the multiple connectivity of sensors, devices and system. In order to handle the security challenges, literature presents a handful of security protocols for IoT. The purpose of this paper is to present a threat profiling and elliptic curve cryptography (ECC)-based mutual and multi-level authentication for the security of IoTs. This work contains two security attributes like memory and machine-related attributes for maintaining the profile table. Also, the profile table stores the value after encrypting the value with ECC to avoid storage resilience using the proposed protocol. Furthermore, three entities like, IoT device, server and authorization centre (AC) performs the verification based on seven levels mutually to provide the resilience against most of the widely accepted attacks. Finally, DPWSim is utilized for simulation of IoT and verification of proposed protocol to show that the protocol is secure against passive and active attacks.

Design/methodology/approach

In this work, the authors have presented a threat profiling and ECC-based mutual and multi-level authentication for the security of IoTs. This work contains two security attributes like memory and machine-related attributes for maintaining the profile table. Also, the profile table stores the value after encrypting the value with ECC to avoid storage resilience using the proposed protocol. Furthermore, three entities like, IoT device, server and AC performs the verification based on seven levels mutually to provide the resilience against most of the widely accepted attacks.

Findings

DPWSim is utilized for simulation of IoT and verification of the proposed protocol to show that this protocol is secure against passive and active attacks. Also, attack analysis is carried out to prove the robustness of the proposed protocol against the password guessing attack, impersonation attack, server spoofing attack, stolen verifier attack and reply attack.

Originality/value

This paper presents a threat profiling and ECC-based mutual and multi-level authentication for the security of IoTs.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 10 no. 2
Type: Research Article
ISSN: 1756-378X

Keywords

To view the access options for this content please click here
Article
Publication date: 1 April 2006

Derek J. Paulsen

The purpose of this paper is to conduct an independent analysis of all existing geographic profiling software packages to determine if any one is more accurate than the…

Abstract

Purpose

The purpose of this paper is to conduct an independent analysis of all existing geographic profiling software packages to determine if any one is more accurate than the others or if any of the software systems are any more accurate than simple spatial distribution strategies at locating the home base of serial offenders.

Design/methodology/approach

An analysis was conducted of all existing geographic profiling software as well as three spatial distribution methods of profiling. Differences in accuracy were assessed using four different methods; dichotomous profile accuracy, simple error measurement, profile error distance, and average top profile area.

Findings

Results indicate that not only are the different profiling software systems no more accurate than the spatial distribution control methods, but that accuracy in general was marginal at best. In addition results indicated that certain crimes, such as commercial robbery, were particularly difficult to profile and that the number of crimes in a series was not by itself a good indicator of success of a profile.

Research limitations/implications

The paper shows that future research needs to focus more on determining how various factors such as city type, crime type, road network and spatial aspects of a crime series (dispersion and search area) impact profiling accuracy. In addition future research should also endeavor to determine whether these advanced strategies are substantially more accurate than other simple profiling strategies such as human prediction. Finally, future research should also seek to examine geographic profiling in a real world setting and how geographic profiling impacts the success of open investigations.

Practical implications

Practically, this study casts doubt not only on the overall accuracy of profiling strategies in predicting the likely home location of an offender, but also on whether probability strategies are substantially better than spatial distribution strategies.

Originality/value

This research was the first to independently analyze all of the existing geographic profiling systems against control methods for the purpose of determining the accuracy of these different methods.

Details

Policing: An International Journal of Police Strategies & Management, vol. 29 no. 2
Type: Research Article
ISSN: 1363-951X

Keywords

To view the access options for this content please click here
Article
Publication date: 29 May 2007

Fábio Frezatti

This paper seeks to examine the profile of artifacts with superior returns in order to identify the usage of management accounting in a Brazilian context.

Abstract

Purpose

This paper seeks to examine the profile of artifacts with superior returns in order to identify the usage of management accounting in a Brazilian context.

Design/methodology/approach

This paper is part of an empirical research project based on a probabilistic sample (119 entities) from medium and large Brazilian companies, selected according to economic sector and revenues. The management accounting artifacts were identified according to the five stages of International Management Accounting Practice 1 (IMAP 1, International Federation of Accountants (IFA), 1998). Logistic regression was applied to identify the artifacts most adherent to companies with the outstanding profile.

Findings

In the analysis of the five stages of IMAP 1, only the fifth stage, value management, provided the significance level to accept the hypothesis. In this stage, the artifacts that were accepted with a significance level of 90 percent were return on equity and balanced scorecard.

Research limitations/implications

The field research was applied only in the Brazilian market.

Practical implications

Especially for researchers, this paper raises some important questions, and aims to stimulate future studies in management accounting.

Originality/value

This paper contributes by presenting research from outside the Anglo‐Saxon world, and by analyzing the artifacts' profile with approaches balanced between positive and qualitative accounting.

Details

Managerial Auditing Journal, vol. 22 no. 5
Type: Research Article
ISSN: 0268-6902

Keywords

To view the access options for this content please click here
Article
Publication date: 1 January 1972

F.H. BARKER, D.C. VEAL and B.K. WYATT

This paper describes part of the Chemical Abstracts Condensate Evaluation (CAC Evaluation) carried out by the United Kingdom Chemical Information Service (UKCIS).

Abstract

This paper describes part of the Chemical Abstracts Condensate Evaluation (CAC Evaluation) carried out by the United Kingdom Chemical Information Service (UKCIS).

Details

Journal of Documentation, vol. 28 no. 1
Type: Research Article
ISSN: 0022-0418

To view the access options for this content please click here
Article
Publication date: 1 June 2012

Helena Bukvova

The article aims to present a holistic approach to analysis of patterns on complex online profiles, demonstrated on profiles of European scientists.

Abstract

Purpose

The article aims to present a holistic approach to analysis of patterns on complex online profiles, demonstrated on profiles of European scientists.

Design/methodology/approach

An existing analytical framework was developed to incorporate a holistic understanding of online profiles. The framework was applied to a sample of 188 online profiles belonging to 48 European scientists. The profile data were studied on three levels (content‐unit level, profile‐instance level, and profile‐network level), using methods of the qualitative comparative analysis to derive profiling patterns.

Findings

The approach developed in this work generated profiling patterns for European scientists. The patterns exist on all three levels, forming a hierarchy. This pattern structure shows the variety of ways in which scientists can use the internet for self‐presentation.

Originality/value

The study was based on a holistic understanding of online self‐presentation, acknowledging that personal presentation can be spread across different platforms. The study presented shows how this understanding can be used when analysing online profiling behaviour. The profiling patterns of European scientists identified in this study supplement existing typologies. The study serves as a foundation to structure further research as well as to inform practitioners.

To view the access options for this content please click here
Article
Publication date: 13 November 2009

Wim Van Opstal, Eva Deraedt and Caroline Gijselinckx

The sector of work integration social enterprises (WISEs) has grown considerably all across Europe during the last few decades. Unfortunately, many governments do not have…

Abstract

Purpose

The sector of work integration social enterprises (WISEs) has grown considerably all across Europe during the last few decades. Unfortunately, many governments do not have a clear sight on the profile of WISEs they are supporting. The purpose of this paper is to provide a detailed profile of WISEs in Flanders and identify shifts and differences within and between WISE work forms.

Design/methodology/approach

Data are utilized from a newly designed monitoring instrument to capture the profile of WISEs in Flanders (Belgium). This paper discusses some methodological issues in using administrative data to monitor this sector, and present a profile at the enterprise level and at the worker level. Parametric and nonparametric tests are applied to assess the significance of profile shifts and differences within this sector.

Findings

One of the dominant features of the analysis has been the identification of profound differences that can be observed between the work forms and the slighter differences that are observed within the work forms while comparing start‐ups to their mature counterparts. Therefore, it might be concluded that the policy framework on the social insertion economy as it currently exists in Flanders has a strong regulative impact on the WISEs in Flanders. This impact translates itself through differences in the profile of enterprises, as well as differences in the profile of the target group workers they employ.

Originality/value

A dataset combining administrative data are created to estimate enterprise and target group worker profiles in this sector. The discussion on methodological aspects involved contributes to the literature on monitoring this sector.

Details

Social Enterprise Journal, vol. 5 no. 3
Type: Research Article
ISSN: 1750-8614

Keywords

To view the access options for this content please click here
Article
Publication date: 12 January 2015

Aki Jääskeläinen and Juho-Matias Roitto

– The purpose of this paper is to design and test a model for analyzing organizational performance management (PM) practices.

Abstract

Purpose

The purpose of this paper is to design and test a model for analyzing organizational performance management (PM) practices.

Design/methodology/approach

This study follows the design science approach. Variables affecting the status of PM are reviewed and classified based on existing literature. These variables are analyzed and a compact set of critical variables are chosen to represent PM maturity. Designed model is implemented in practice as a survey receiving 271 responses, and tested by using both quantitative and qualitative approach.

Findings

The survey data are utilized in the development of four distinct PM maturity profiles. The empirical results provide understanding on the current PM maturity level and common development targets in Finnish organizations.

Research limitations/implications

External validity of the research is compromised by the context and respondent group. More in-depth qualitative studies could provide more understanding on the causes of presented findings.

Practical implications

The proposed model offers best practices to develop PM and identifies variables crucial to create satisfaction toward PM. The presented profiles also help in evaluating the status of PM in the organization examined.

Originality/value

The originality of the new model relates to its balance between rigor and relevance. In addition, the study is one of the first attempts to widely apply PM maturity models in practice. A distinctive feature of this study is the maturity profiles which are built upon empirical data.

Details

International Journal of Productivity and Performance Management, vol. 64 no. 1
Type: Research Article
ISSN: 1741-0401

Keywords

To view the access options for this content please click here
Article
Publication date: 6 March 2007

Herbert Sherman, Daniel J. Rowley and Barry R. Armandi

The purpose of this article is to assist strategic planners and managers in developing and utilizing a strategic profile of the firm in order to conduct a SWOT analysis…

Abstract

Purpose

The purpose of this article is to assist strategic planners and managers in developing and utilizing a strategic profile of the firm in order to conduct a SWOT analysis and therein apply its results appropriately.

Design/methodology/approach

How are the objectives achieved? This objective is achieved by developing a seven‐step procedure, with templates that assist planners and managers in creating a strategic profile of the firm and then utilizing that profile as a filtering mechanism for a SWOT analysis. The article covers the topics of competitive approach, competitive strategy, organizational structure, leadership, and organizational culture.

Findings

The profile may not only be employed as a method for centering a firm's strategic planning and implementation, it may also be used for creating a competitive profile of the firm's competitors.

Practical implications

The practical implications of the article indicate the need to attach a pre‐planning stage to the typical strategic management process of a firm. This action will lead to the creation of a preliminary strategic profile of the firm. This profile is used to produce a more accurate SWOT analysis with a greater likelihood of successful strategy implementation.

Originality/value

The value of this article is that it introduces a pre‐planning stage to the traditional strategic management process. This stage creates a strategic profile of the firm which managers and strategic planners can use for two purposes: producing a more accurate SWOT analysis with a greater likelihood of successful strategy implementation; and creating a strategic profile of their competitors.

Details

Business Strategy Series, vol. 8 no. 3
Type: Research Article
ISSN: 1751-5637

Keywords

To view the access options for this content please click here
Article
Publication date: 1 March 1993

S.R.P. MEDEIROS, P.M. PIMENTA and P. GOLDENBERG

A new algorithm for reducing the profile and root‐mean‐square wavefront of sparse matrices with a symmetric structure is presented. Our numerical experiments show an…

Abstract

A new algorithm for reducing the profile and root‐mean‐square wavefront of sparse matrices with a symmetric structure is presented. Our numerical experiments show an overall better performance than the widely used reverse Cuthill‐McKee, Gibbs‐King and Sloan algorithms. The new algorithm is fast, simple and useful in engineering analysis where it can be employed to derive efficient orderings for both profile and frontal solution schemes.

Details

Engineering Computations, vol. 10 no. 3
Type: Research Article
ISSN: 0264-4401

Keywords

To view the access options for this content please click here
Article
Publication date: 4 July 2016

Hugo Santana de Figueiredo Junior, Miranda P. M. Meuwissen, Ivo A. Van der Lans and Alfons G. J. M. Oude Lansink

Development studies rarely measure the impact of value chain strategies on performance. The purpose of this paper is to quantify the perceived contribution of strategies…

Abstract

Purpose

Development studies rarely measure the impact of value chain strategies on performance. The purpose of this paper is to quantify the perceived contribution of strategies to the performance of three honey value chains in Brazil.

Design/methodology/approach

The value chain structure-conduct-performance (SCP) framework was used to select strategies and two performance indicators, honey production growth and local value-added. In a conjoint study, experts were asked to judge the contribution to the two performance indicators of several hypothetical combinations of value chain strategies.

Findings

According to the experts, adoption of specialised technical assistance, sharing resources at the production step, increase in exports, and organic certification were the strategies which contributed the most to performance. Simulations suggested that some honey value chains could have greatly increased their performance with these higher pay-off strategies.

Research limitations/implications

Quantifying the perceived impact of individual strategies contributes to improved evaluation of development interventions.

Practical implications

Outcomes also show that conjoint analysis is a useful method for policy evaluations in data scarce situations.

Originality/value

The paper combines an extended SCP framework for strategy selection and conjoint analysis for strategy evaluation of value chains.

Details

British Food Journal, vol. 118 no. 7
Type: Research Article
ISSN: 0007-070X

Keywords

1 – 10 of over 63000