Search results

1 – 10 of 12
Open Access
Article
Publication date: 28 July 2020

Prabhat Pokharel, Roshan Pokhrel and Basanta Joshi

Analysis of log message is very important for the identification of a suspicious system and network activity. This analysis requires the correct extraction of variable entities…

1087

Abstract

Analysis of log message is very important for the identification of a suspicious system and network activity. This analysis requires the correct extraction of variable entities. The variable entities are extracted by comparing the logs messages against the log patterns. Each of these log patterns can be represented in the form of a log signature. In this paper, we present a hybrid approach for log signature extraction. The approach consists of two modules. The first module identifies log patterns by generating log clusters. The second module uses Named Entity Recognition (NER) to extract signatures by using the extracted log clusters. Experiments were performed on event logs from Windows Operating System, Exchange and Unix and validation of the result was done by comparing the signatures and the variable entities against the standard log documentation. The outcome of the experiments was that extracted signatures were ready to be used with a high degree of accuracy.

Details

Applied Computing and Informatics, vol. 19 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 2 May 2023

Rukiye Orman, Elif Şi̇mşek and Meryem Ayşegül Kozak Çakır

Micro-credentials, which have been widely used in re-skilling and skills development, provide advantages for improvement in the professional career. As a complementary approach to…

2798

Abstract

Purpose

Micro-credentials, which have been widely used in re-skilling and skills development, provide advantages for improvement in the professional career. As a complementary approach to career and professional development in formal education, it can be said that micro-credentials are preferred for supporting professional development and/or to acquiring new skills to find a job in a new field (Fisher and Leder, 2022). This study aims to provide a detailed perspective on conceptual framework and the use of micro-credentials in higher education.

Design/methodology/approach

Many questions have arisen regarding micro-credentials, applicability, quality assurance, inclusion in formal educational settings and how to include them in traditional education systems, especially in higher education institutions. Oliver (2019) emphasizes that there is little research on micro-credentials or their derivatives in the literature. There is still uncertainty on micro-credential on behalf of students, employers or employees. In addition, although there are studies on micro-credentials in the USA, Europe and Australia, there is very little research around countries such as Turkey (Yilik, 2021). This study discusses the use of micro-credentials in the world and their reflections on higher education.

Findings

As it is shown in this article, micro-credentials have the potential to challenge or complement traditional ways of how learning is taking place, understood, recognized and certified. Research on micro-credentials is still in its infancy and could benefit a lot from more research. Especially research on employers' recognition and appreciation of digital credentials needs to be studied. Also, empirically confirming propositions of literature on micro-credentials could be beneficial.

Originality/value

This study is original in terms of discussing the use of micro-credential in the world and their reflections on higher education and presenting suggestions on this subject.

Details

Higher Education Evaluation and Development, vol. 17 no. 2
Type: Research Article
ISSN: 2514-5789

Keywords

Open Access
Article
Publication date: 6 June 2018

Jaafar EL Bakkali, Hamid Mansouri and Abderrahim Doudouh

In this work, a user-friendly Java-based open-source software has been developed for internal radiation dosimetry. Based on values published by the International Commission on…

Abstract

In this work, a user-friendly Java-based open-source software has been developed for internal radiation dosimetry. Based on values published by the International Commission on Radiological Protection (ICRP), the software calculates the estimated absorbed dose for each organ and also the estimated effective dose, this for about forty of the most known radioactive drugs. In addition, the present software offers many features which include: 1) a very friendly graphical user-interface (GUI) designed to facilitate the process of selecting mandatory input data such as radiopharmaceutical product, administered activity and patient's data, 2) a tool for generating a medical report, which can be exported as PDF file or printed directly and then incorporated into the patient's record, 3) a SQLite database for storing patient's specific and dosimetric data. We believe that the present software can be a useful tool for nuclear medicine workers. It is freely available for download on GitHub (https://github.com/EL-Bakkali-Jaafar/RadioPharmaDose).

Details

Applied Computing and Informatics, vol. 16 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 14 August 2017

Jassim Happa and Michael Goldsmith

Several attack models attempt to describe behaviours of attacks with the intent to understand and combat them better. However, all models are to some degree incomplete. They may…

1249

Abstract

Purpose

Several attack models attempt to describe behaviours of attacks with the intent to understand and combat them better. However, all models are to some degree incomplete. They may lack insight about minor variations about attacks that are observed in the real world (but are not described in the model). This may lead to similar attacks being classified as the same type of attack, or in some cases the same instance of attack. The appropriate solution would be to modify the model or replace it entirely. However, doing so may be undesirable as the model may work well for most cases or time and resource constraints may factor in as well. This paper aims to explore the potential value of adding information about attacks and attackers to existing models.

Design/methodology/approach

This paper investigates used cases of minor variations in attacks and how it may and may not be appropriate to communicate subtle differences in existing attack models through the use of annotations. In particular, the authors investigate commonalities across a range of existing models and identify where and how annotations may be helpful.

Findings

The authors propose that nuances (of attack properties) can be appended as annotations to existing attack models. Using annotations appropriately should enable analysts and researchers to express subtle but important variations in attacks that may not fit the model currently being used.

Research limitations/implications

This work only demonstrated a few simple, generic examples. In the future, the authors intend to investigate how this annotation approach can be extended further. Particularly, they intend to explore how annotations can be created computationally; the authors wish to obtain feedback from security analysts through interviews, identify where potential biases may arise and identify other real-world applications.

Originality/value

The value of this paper is that the authors demonstrate how annotations may help analysts communicate and ask better questions during identification of unknown aspects of attacks faster,e.g. as a means of storing mental notes in a structured manner, especially while facing zero-day attacks when information is incomplete.

Details

PSU Research Review, vol. 1 no. 2
Type: Research Article
ISSN: 2399-1747

Keywords

Open Access
Article
Publication date: 1 October 2019

Laszlo Hetey, Eddy Neefs, Ian Thomas, Joe Zender, Ann-Carine Vandaele, Sophie Berkenbosch, Bojan Ristic, Sabrina Bonnewijn, Sofie Delanoye, Mark Leese, Jon Mason and Manish Patel

This paper aims to describe the development of a knowledge management system (KMS) for the Nadir and Occultation for Mars Discovery (NOMAD) instrument on board the ESA/Roscosmos…

1757

Abstract

Purpose

This paper aims to describe the development of a knowledge management system (KMS) for the Nadir and Occultation for Mars Discovery (NOMAD) instrument on board the ESA/Roscosmos 2016 ExoMars Trace Gas Orbiter (TGO) spacecraft. The KMS collects knowledge acquired during the engineering process that involved over 30 project partners. In addition to the documentation and technical data (explicit knowledge), a dedicated effort was made to collect the gained experience (tacit knowledge) that is crucial for the operational phase of the TGO mission and also for future projects. The system is now in service and provides valuable information for the scientists and engineers working with NOMAD.

Design/methodology/approach

The NOMAD KMS was built around six areas: official documentation, technical specifications and test results, lessons learned, management data (proposals, deliverables, progress reports and minutes of meetings), picture files and movie files. Today, the KMS contains 110 GB of data spread over 11,000 documents and more than 13,000 media files. A computer-aided design (CAD) library contains a model of the full instrument as well as exported sub-parts in different formats. A context search engine for both documents and media files was implemented.

Findings

The conceived KMS design is basic, flexible and very robust. It can be adapted to future projects of a similar size.

Practical implications

The paper provides practical guidelines on how to retain the knowledge from a larger aerospace project. The KMS tool presented here works offline, requires no maintenance and conforms to data protection standards.

Originality/value

This paper shows how knowledge management requirements for space missions can be fulfilled. The paper demonstrates how to transform the large collection of project data into a useful tool and how to address usability aspects.

Details

Aircraft Engineering and Aerospace Technology, vol. 92 no. 2
Type: Research Article
ISSN: 1748-8842

Keywords

Open Access
Article
Publication date: 1 May 2018

N.M. Fonseca Ferreira, André Araujo, M.S. Couceiro and David Portugal

This paper describes a two-month summer intensive course designed to introduce participants with a hands-on technical craft on robotics and to acquire experience in the low-level…

Abstract

This paper describes a two-month summer intensive course designed to introduce participants with a hands-on technical craft on robotics and to acquire experience in the low-level details of embedded systems. Attendants started this course with a brief introduction to robotics; learned to draw, design and create a personalized 3D structure for their mobile robotic platform and developed skills in embedded systems. They were familiarize with the practices used in robotics, learning to connect all sensors and actuator, developing a typical application on differential kinematic using Arduino, exploring ROS features under Raspberry Pi environment and Arduino – Raspberry Pi communication. Different paradigms and some real applications and programming were addressed on the topic of Artificial Intelligence. Throughout the course, participants were introduced to programming languages (including Python and C++), advanced programming concepts such as ROS, basic API development, system concepts such as I2C and UART serial interfaces, PWM motor control and sensor fusion to improve robotic navigation and localization. This paper describes not just the concept, layout and methodology used on RobotCraft 2017 but also presents the participants knowledge background and their overall opinions, leading to focus on lessons learned and suggestions for future editions.

Details

Applied Computing and Informatics, vol. 16 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 8 January 2020

Elham Rostami, Fredrik Karlsson and Ella Kolkowska

The purpose of this paper is to survey existing information security policy (ISP) management research to scrutinise the extent to which manual and computerised support has been…

1442

Abstract

Purpose

The purpose of this paper is to survey existing information security policy (ISP) management research to scrutinise the extent to which manual and computerised support has been suggested, and the way in which the suggested support has been brought about.

Design/methodology/approach

The results are based on a literature review of ISP management research published between 1990 and 2017.

Findings

Existing research has focused mostly on manual support for managing ISPs. Very few papers have considered computerised support. The entire complexity of the ISP management process has received little attention. Existing research has not focused much on the interaction between the different ISP management phases. Few research methods have been used extensively and intervention-oriented research is rare.

Research limitations/implications

Future research should to a larger extent address the interaction between the ISP management phases, apply more intervention research to develop computerised support for ISP management, investigate to what extent computerised support can enhance integration of ISP management phases and reduce the complexity of such a management process.

Practical implications

The limited focus on computerised support for ISP management affects the kind of advice and artefacts the research community can offer to practitioners.

Originality/value

Today, there are no literature reviews on to what extent computerised support the ISP management process. Findings on how the complexity of ISP management has been addressed and the research methods used extend beyond the existing knowledge base, allowing for a critical discussion of existing research and future research needs.

Details

Information & Computer Security, vol. 28 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 17 May 2022

Giacomo Cabri and Guido Fioretti

This article aims to provide a theoretical unifying framework for flexible organizational forms, such as so-called adhocracies and network organizations.

2142

Abstract

Purpose

This article aims to provide a theoretical unifying framework for flexible organizational forms, such as so-called adhocracies and network organizations.

Design/methodology/approach

In this article, organization practices that are typical of the software industry are analyzed and re-interpreted by means of foundational concepts of organization science. It is shown that one and the same logic is at work in all flexible organizations.

Findings

Coordination modes can be fruitfully employed to characterize flexible organizations. In particular, standardization is key in order to obtain flexibility, provided that a novel sort of coordination by standardization is added to those that have been conceptualized hitherto.

Research limitations/implications

This article highlights one necessary condition for organizations to be flexible. Further aspects, only cursorily mentioned in this paper, need to be addressed in order to obtain a complete picture.

Practical implications

A theory of organizational flexibility constitutes a guide for organizational design. This article suggests the non-obvious prescription that the boundary conditions of individual behavior must be standardized in order to achieve operational flexibility.

Social implications

This theoretical framework can be profitably employed in management classes.

Originality/value

Currently, flexible organizations are only understood in terms of lists of instances. This article shows that apparently heterogeneous case-studies share common features in fact.

Details

International Journal of Organization Theory & Behavior, vol. 25 no. 1/2
Type: Research Article
ISSN: 1093-4537

Keywords

Open Access
Article
Publication date: 17 January 2024

Anastasia Krupskaya

The purpose of this paper is to identify and describe the influence of the knowledge base (KB) of the company on driving forces of innovation processes in knowledge-intensive…

Abstract

Purpose

The purpose of this paper is to identify and describe the influence of the knowledge base (KB) of the company on driving forces of innovation processes in knowledge-intensive services (KIS) and to compare the level of innovativeness of the final services.

Design/methodology/approach

The paper investigates through qualitative research 11 KIS organisations with different KB.

Findings

The research results identified and described the influence of the KB on driving forces of innovations processes and its results in companies with four newly identified KBs (analytical, synthetic, symbolic and compliance).

Research limitations/implications

Further research, based on a larger number of companies, is needed to confirm the results of this research and to complement the effect of the KB on driving forces of innovation.

Practical implications

This research can help organisations understand how to develop strategic plans and new ideas for innovative services depending on the KB of the organisation.

Social implications

The description of successful innovation processes and results in several leading companies presented in the study may help other companies in identifying knowledge-integration practices to improve performance and innovation processes that support multiplicity, productivity and creativity.

Originality/value

The study systemised the sources of new ideas for innovation in companies with different KB, several driving forces of innovation were identified and how these forces are affected by each KB; lastly, innovation results were compared in companies with different KB.

Details

foresight, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-6689

Keywords

Open Access
Article
Publication date: 5 October 2022

Stratos Moschidis, Angelos Markos and Athanasios C. Thanopoulos

The purpose of this paper is to create an automatic interpretation of the results of the method of multiple correspondence analysis (MCA) for categorical variables, so that the…

2897

Abstract

Purpose

The purpose of this paper is to create an automatic interpretation of the results of the method of multiple correspondence analysis (MCA) for categorical variables, so that the nonexpert user can immediately and safely interpret the results, which concern, as the authors know, the categories of variables that strongly interact and determine the trends of the subject under investigation.

Design/methodology/approach

This study is a novel theoretical approach to interpreting the results of the MCA method. The classical interpretation of MCA results is based on three indicators: the projection (F) of the category points of the variables in factorial axes, the point contribution to axis creation (CTR) and the correlation (COR) of a point with an axis. The synthetic use of the aforementioned indicators is arduous, particularly for nonexpert users, and frequently results in misinterpretations. The current study has achieved a synthesis of the aforementioned indicators, so that the interpretation of the results is based on a new indicator, as correspondingly on an index, the well-known method principal component analysis (PCA) for continuous variables is based.

Findings

Two (2) concepts were proposed in the new theoretical approach. The interpretative axis corresponding to the classical factorial axis and the interpretative plane corresponding to the factorial plane that as it will be seen offer clear and safe interpretative results in MCA.

Research limitations/implications

It is obvious that in the development of the proposed automatic interpretation of the MCA results, the authors do not have in the interpretative axes the actual projections of the points as is the case in the original factorial axes, but this is not of interest to the simple user who is only interested in being able to distinguish the categories of variables that determine the interpretation of the most pronounced trends of the phenomenon being examined.

Practical implications

The results of this research can have positive implications for the dissemination of MCA as a method and its use as an integrated exploratory data analysis approach.

Originality/value

Interpreting the MCA results presents difficulties for the nonexpert user and sometimes lead to misinterpretations. The interpretative difficulty persists in the MCA's other interpretative proposals. The proposed method of interpreting the MCA results clearly and accurately allows for the interpretation of its results and thus contributes to the dissemination of the MCA as an integrated method of categorical data analysis and exploration.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

1 – 10 of 12