Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Systems Architecture

Digitalization In Practice: The Fifth Discipline Advantage, Siu Loon Hoe Dec 2019

Digitalization In Practice: The Fifth Discipline Advantage, Siu Loon Hoe

Research Collection School Of Computing and Information Systems

Purpose The purpose of this paper is to provide advice to organizations on how to become successful in the digital age. The paper revisits Peter Senge's (1990) notion of the learning organization and discusses the relevance of systems thinking and the other four disciplines, namely, personal mastery, mental models, shared vision and team learning in the context of the current digitalization megatrend. Design/methodology/approach This paper is based on content analysis of essays from international organizations, strategy experts and management scholars, and insights gained from the author's consulting experience. A comparative case study from the health and social sector is also …


Supporting Software Architecture Maintenance By Providing Task-Specific Recommendations, Matthias Galster, Christoph Treude, Kelly Blincoe Oct 2019

Supporting Software Architecture Maintenance By Providing Task-Specific Recommendations, Matthias Galster, Christoph Treude, Kelly Blincoe

Research Collection School Of Computing and Information Systems

During software maintenance, developers have different information needs (e.g., to understand what type of maintenance activity to perform, the impact of a maintenance activity and its effort). However, information to support developers may be distributed across various sources. Furthermore, information captured in formal architecture documentation may be outdated. In this paper, we put forward a late breaking idea and outline a solution to improve the productivity of developers by providing task-specific recommendations based on concrete information needs that arise during software maintenance.


Trust Architecture And Reputation Evaluation For Internet Of Things, Juan Chen, Zhihong Tian, Xiang Cui, Lihua Yin, Xianzhi Wang Aug 2019

Trust Architecture And Reputation Evaluation For Internet Of Things, Juan Chen, Zhihong Tian, Xiang Cui, Lihua Yin, Xianzhi Wang

Research Collection School Of Computing and Information Systems

Internet of Things (IoT) represents a fundamental infrastructure and set of techniques that support innovative services in various application domains. Trust management plays an important role in enabling the reliable data collection and mining, context-awareness, and enhanced user security in the IoT. The main tasks of trust management include trust architecture design and reputation evaluation. However, existing trust architectures and reputation evaluation solutions cannot be directly applied to the IoT, due to the large number of physical entities, the limited computation ability of physical entities, and the highly dynamic nature of the network. In comparison, it generally requires a general …


Sensitive Behavior Analysis Of Android Applications On Unrooted Devices In The Wild, Xiaoxiao Tang Jul 2019

Sensitive Behavior Analysis Of Android Applications On Unrooted Devices In The Wild, Xiaoxiao Tang

Dissertations and Theses Collection (Open Access)

Dynamic analysis is widely used in malware detection, taint analysis, vulnerability detection, and other areas for enhancing the security of Android. Compared to static analysis, dynamic analysis is immune to common code obfuscation techniques and dynamic code loading. Existing dynamic analysis techniques rely on in-lab running environment (e.g., modified systems, rooted devices, or emulators) and require automatic input generators to execute the target app. However, these techniques could be bypassed by anti-analysis techniques that allow apps to hide sensitive behavior when an in-lab environment is detected through predefined heuristics (e.g., IMEI number of the device is invalid). Meanwhile, current input …


Automatic, Highly Accurate App Permission Recommendation, Zhongxin Liu, Xin Xia, David Lo, John Grundy Mar 2019

Automatic, Highly Accurate App Permission Recommendation, Zhongxin Liu, Xin Xia, David Lo, John Grundy

Research Collection School Of Computing and Information Systems

To ensure security and privacy, Android employs a permission mechanism which requires developers to explicitly declare the permissions needed by their applications (apps). Users must grant those permissions before they install apps or during runtime. This mechanism protects users’ private data, but also imposes additional requirements on developers. For permission declaration, developers need knowledge about what permissions are necessary to implement various features of their apps, which is difficult to acquire due to the incompleteness of Android documentation. To address this problem, we present a novel permission recommendation system named PerRec for Android apps. PerRec leverages mining-based techniques and data …


Driving And Effective Data-Ready Culture: How Companies Can Take On A Datadriven Approach To 11 Business, Johnson Poh Jan 2019

Driving And Effective Data-Ready Culture: How Companies Can Take On A Datadriven Approach To 11 Business, Johnson Poh

MITB Thought Leadership Series

TECHNOLOGY has turned the tables in favour of consumers, enabling them to find goods and services faster and access more choices. Companies now compete more intensely to capture consumers’ mindshare and scour for ways to keep their products relevant. But every coin has two sides. While technology has empowered consumers with choice, it has also offered companies a plethora of data to understand consumers better. This puts the odds in favour of companies that can leverage on data to gain consumer insights and meet their business objectives.