Search results

1 – 10 of 18
Article
Publication date: 1 May 2007

K.P. Fischer, U. Bleimann, W. Fuhrmann and S.M. Furnell

Aims to identify security‐relevant semantics of business processes being defined by WS‐BPEL (Web Services Business Process Execution Language, BPEL for short) scripts, in…

520

Abstract

Purpose

Aims to identify security‐relevant semantics of business processes being defined by WS‐BPEL (Web Services Business Process Execution Language, BPEL for short) scripts, in particular, when such scripts defining collaborative business processes on top of web services are deployed across security domain boundaries.

Design/methodology/approach

Analysing potential of BPEL to define behaviour of business processes violating restrictions implied by security policies.

Findings

Semantic patterns being combinations of particular BPEL features and web services with specific access restrictions implied by security policies are defined and their implications for analysis of BPEL scripts during compliance assessment of cross‐domain defined business processes are identified.

Research limitations/implications

The results of the research part of which is reported here have been applied in a research prototype to BPEL scripts of limited size and comparatively simple business logic. Real‐world examples of BPEL scripts with respect to size and complexity should be examined for further approving suitability of the algorithms used.

Originality/value

The results can be used to specify security policies in terms of security‐critical semantics of BPEL scripts in order to facilitate compliance assessment. In conjunction with other results of this research, this will help to overcome security issues arising from cross‐domain definition of business processes by enabling automatic compliance assessment prior to execution.

Details

Information Management & Computer Security, vol. 15 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 July 2005

I. Stengel, K.P. Fischer, U. Bleimann and J. Stynes

This paper seeks to describe an approach to mitigate the unsoluble malicious host problem.

Abstract

Purpose

This paper seeks to describe an approach to mitigate the unsoluble malicious host problem.

Design/methodology/approach

By using obfuscation as a component of communication patterns and their switching in an environment of cooperating agents the malicious host can be detected and the attacked agents can be deleted.

Findings

Finds that the information about the detected malicious host can be used further, e.g. to prevent another mobile agent from visiting this host.

Originality/value

This paper will be helpful to people involved in information management and computer security issues.

Details

Information Management & Computer Security, vol. 13 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 August 1998

S.M. Furnell, P.D. Onions, M. Knahl, P.W. Sanders, U. Bleimann, U. Gojny and H.F. Röder

Considers the requirement for information security within thedomain of online distance learning. A generic modulestructure is presented which represents a high level abstractionof…

1050

Abstract

Considers the requirement for information security within the domain of online distance learning. A generic module structure is presented which represents a high level abstraction of the different stages of the educational process. Discusses the main security issues that must be considered at each stage. These various requirements are being addressed in practice by the security framework being developed by the SDLearn research project, a collaborative initiative between higher academic establishments in the UK and Germany.

Details

Internet Research, vol. 8 no. 3
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 1 August 2003

Ingo Stengel, Udo Bleimann and Jeanne Stynes

To view virtual universities as an extension of real universities and of distant learning Institutes, new concepts in the area of distributed systems and virtual universities are…

Abstract

To view virtual universities as an extension of real universities and of distant learning Institutes, new concepts in the area of distributed systems and virtual universities are needed. Mobile agents satisfy many requirements of such a highly dynamic system. Originally, mobile agents were used as a workflow system for a virtual university. These autonomous entities must next generate dynamic workflows. Examining the behaviour of ants in different situations, some conclusions regarding the use of mobile agents can be drawn. This paper presents the new ideas of a joint research project and gives an overview of the problems that confront us.

Details

Campus-Wide Information Systems, vol. 20 no. 3
Type: Research Article
ISSN: 1065-0741

Keywords

Article
Publication date: 6 February 2007

F. Rimbach, M. Dannenberg and U. Bleimann

The purpose of this paper is to examine the marketing and sales implications of page ranking techniques, in terms of how companies may use knowledge of their operation to increase…

1709

Abstract

Purpose

The purpose of this paper is to examine the marketing and sales implications of page ranking techniques, in terms of how companies may use knowledge of their operation to increase the chances of attracting custom.

Design/methodology/approach

Explaining the calculation, implementation and impact of the PageRank and Topic Sensitive Page Ranking is the prerequisite to recapitulating existing search engine optimization strategies and to identifying new methods for leveraging the Internet for sales and marketing purposes.

Findings

Different strategies have to be adapted to effectively attract potential customers.

Originality/value

This paper aligns the complex calculations of the two concepts to enable a comparison. The changing technology of search engines means that they are getting ever more complex – this article offers a snapshot of major developments.

Details

Internet Research, vol. 17 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 1 December 2004

Udo Bleimann

Atlantis University is an ambitious international project in the area of learning and is currently being developed by a group of universities and companies. It combines three…

1418

Abstract

Atlantis University is an ambitious international project in the area of learning and is currently being developed by a group of universities and companies. It combines three different types of learning and teaching to form a single package offered to Students and people in the workplace alike: face‐to‐face learning, e‐learning and project‐based learning. The paper gives an overview of the advantages and disadvantages of the different learning methodologies, and describes the new Atlantis approach. The first practical solutions Atlantis University has developed, namely the Virtual Classroom, ELAT learning environment and Project Service Center, are likewise briefly introduced.

Details

Campus-Wide Information Systems, vol. 21 no. 5
Type: Research Article
ISSN: 1065-0741

Keywords

Article
Publication date: 6 February 2007

Robert Loew, Katrin Kuemmel, Judith Ruprecht, Udo Bleimann and Paul Walsh

The purpose of this paper is to describe new search methods based on semantic information structures to offer a personalised and interactive knowledge retrieval to the user.

1290

Abstract

Purpose

The purpose of this paper is to describe new search methods based on semantic information structures to offer a personalised and interactive knowledge retrieval to the user.

Design/methodology/approach

A careful look on existing “knowledge management projects” leads to a proposed approach of a “knowledge broker network” where transfer of knowledge is based on communication between humans. To enhance the quality of search results a new search algorithm (“Search Assistance Algorithm (SAA)”) is described in a simplified manner.

Findings

The paper provides information on the knowledge broker network and shows the advantages of this concept especially of the automated part.

Research limitations/implications

The paper shows the proposed approach has not formally being tested yet. Some pilot studies have been made and a study especially for the SAA is planned for the near future.

Practical implications

This approach has the potential to change the way of transfer of knowledge using a knowledge broker network based on knowledge management systems, which could be improved by our SAA in practice.

Originality/value

Using knowledge management systems in a “standard way” by feeding in information and using retrieval methods is not optimal for sharing knowledge between humans. To provide and update information is very cost‐intensive. Using “meta‐information” about “who is expert in which area” and bring information‐seeker and experts together could be the optimal method. This knowledge broker network helps to bring this idea into reality.

Details

Internet Research, vol. 17 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 1 June 2001

S.M. Furnell and T. Karweni

This paper considers the issue of security in the provision of online distance learning. Security represents an aspect that may not suggest itself as a high priority in an…

Abstract

This paper considers the issue of security in the provision of online distance learning. Security represents an aspect that may not suggest itself as a high priority in an educational environment, but evidence indicates that it is definitely required. The discussion presents an overview of the key security requirements and the main technical elements needed to address them.

Details

VINE, vol. 31 no. 2
Type: Research Article
ISSN: 0305-5728

Article
Publication date: 17 April 2009

Paul Harris, John Connolly and Luke Feeney

The purpose of this paper is to identify key themes within the blended learning literature and to develop a series of practical recommendations to facilitate the successful

4482

Abstract

Purpose

The purpose of this paper is to identify key themes within the blended learning literature and to develop a series of practical recommendations to facilitate the successful adaptation and implementation of a “blended approach to learning delivery”.

Design/methodology/approach

The literature was reviewed and informed a series of recommendations for organisations considering adopting or implementing blended approaches to teaching and training.

Findings

Several key themes centering on the importance of evaluation, skills training, pedagogy, human factors, technology and implementation were identified. The emerging themes informed a series of practical recommendations to assist organisations considering blended learning approaches. Findings highlight the current limitations in the evidence base.

Practical implications

The identified key themes and practical recommendations provide a useful assist to organisations considering adopting and implementing blended approaches to teaching and training.

Originality/value

The paper highlights key areas for development in the blended learning literature and at the organisational level.

Details

Industrial and Commercial Training, vol. 41 no. 3
Type: Research Article
ISSN: 0019-7858

Keywords

Article
Publication date: 1 December 1999

M. Knahl, H.D. Hofmann and A. Phippen

It is proposed that future work should move on from existing network and system management methodologies to consider enhancing the management methodology for ATM and other…

Abstract

It is proposed that future work should move on from existing network and system management methodologies to consider enhancing the management methodology for ATM and other networking technologies to meet existing and future requirements. This paper outlines an area where significant potential for further research exists and proposes a component‐based management architecture. The discussion indentifies the technological limitations and architectural drawbacks of current solutions and proposes the extension of existing services and an enhanced management framework to overcome the current restrictions.

Details

Information Management & Computer Security, vol. 7 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

1 – 10 of 18