Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cyber (4)
- Architectural strategy (3)
- Cyber Operations (3)
- Cyber operations (3)
- Emerging Technologies (3)
-
- Nuclear (3)
- Sequestration (3)
- Austerity (2)
- Bayesian Model Averaging and Semiparametric Regression (2)
- Climate change (2)
- Complexity (2)
- Copula Modeling (2)
- Cyber Operations in Space (2)
- Cyberwar (2)
- Defense (2)
- Deterrence (2)
- Health informatics (2)
- Implementation (2)
- Information Assurance (2)
- Information Security (2)
- International Affairs (2)
- Local government (2)
- NATO (2)
- National Security (2)
- National security (2)
- Nukes (2)
- Organisational studies (2)
- Space (2)
- State actor (2)
- Sustainability (2)
- Publication
-
- Professor Katina Michael (8)
- Jan Kallberg (7)
- C. Jason Woodard (5)
- Arcot Desai NARASIMHALU (3)
- Maurice Dawson (2)
-
- Michael Stanley Smith (2)
- Bruce Vanstone (1)
- Carolyn Windsor (1)
- DOUGLAS J HENDERSON (1)
- Dr Akemi Chatfield (1)
- Dr Deogratias Harorimana (1)
- Dr Ping Yu (1)
- Dr Xiaoxun Sun (1)
- George H Baker (1)
- Jeffrey E Michelman (1)
- Karin Garrety (1)
- Kyriakos MOURATIDIS (1)
- Nadine E White (1)
- Philadelphia University, Jordan (1)
- Roger H. Blake (1)
- Tobias Hahn (1)
Articles 1 - 30 of 42
Full-Text Articles in Physical Sciences and Mathematics
Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy
Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy
Dr Deogratias Harorimana
ICT for Poverty Alleviation in Pacific Island Nations: Study of ICTs4D in Fiji There has been a vague and little knowledge on the role or potential of Information and Communications Technologies (ICTs) in relation to addressing poverty in Fiji. This may be probably due to the newness of the technology in the South Pacific Region as a whole but also probably due to the fact that only 9.7% of the current Fiji 931,000 populations are internet users (ITC Figures 2011). This paper reports on finding how ICTs is contributing towards poverty alleviation in Fiji. On the basis of reviewed best …
An Estate Dilemma - Inaccessible Assets Hiding Behind Passwords And Encryption, Douglas J. Henderson
An Estate Dilemma - Inaccessible Assets Hiding Behind Passwords And Encryption, Douglas J. Henderson
DOUGLAS J HENDERSON
Every person living in the modern world holds valuable assets, data, or information in digital mediums. Digital mediums include not only digital hardware storage mediums in personal possession (like external hard drives and internal hard drives within laptop and desktop computers, personal digital assistants, cell phones, and the like), but also those only accessible through a network. Because so much is held in digital mediums, when an individual dies or becomes incapacitated, another person must know how to access the incapacitated person’s digital assets and other important information (this person is known herein as the ‘Responsible Party’). There are potential …
E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu
E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu
Dr Akemi Chatfield
While geographic information systems (GIS) can provide information on the static locations of critical infrastructure and evacuation routes, they do not provide the dynamically changing locations of things and people on the move. In contrast, radio frequency identification (RFID) wireless network technology can automatically identify and track the movement of assets (i.e., fire engines, ambulances, and rescue workers) and vulnerable citizens on the move (i.e., the elderly and the disabled), and hence providing local governments and communities with real-time information and enhanced decision-making capabilities, during chaotic disaster response operations (i.e., evacuation). Although the potential high impact and strategic value of …
Complex Adaptive Systems As A Model For Evaluating Organisational Change Caused By The Introduction Of Health Information Systems, Kieren Diment Mr, Ping Yu, K. Garrety
Complex Adaptive Systems As A Model For Evaluating Organisational Change Caused By The Introduction Of Health Information Systems, Kieren Diment Mr, Ping Yu, K. Garrety
Dr Ping Yu
This paper documents the preliminary development of a framework for evaluating organisational change processes during the implementation of an electronic nursing documentation system in residential aged care facilities. It starts with a brief outline of organisational change processes. This is followed by a more detailed exposition of the principles underlying complex adaptive systems (CAS) theory, where we explain how mathematical concepts can be used to illuminate qualitative research approaches. Finally we present some preliminary findings on the facilitators and barriers for the introduction of the electronic documentation system, explained with reference to the CAS theory, based on analysis of interviews …
Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg
Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg
Jan Kallberg
La guerra concentrada en la red depende de la red de información global para capacidades de combate conjuntas.3 La capa fundamental crea la capacidad de combate global como la columna vertebral espacial de la red de información donde los haberes espaciales son el elemento decisivo. EE.UU. depende de las capacidades espaciales para su éxito y la seguridad nacional de EE.UU. se basa hoy en día en un número limitado de satélites muy utilizados. Estos satélites son cruciales para la disuasión estratégica, la vigilancia, la recopilación de inteligencia y las comunicaciones militares. Si la disuasión estratégica falla, los satélites forman parte …
The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther
The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther
Jan Kallberg
With sequestration looming—generating significant cuts to defense spending—the United States may find itself increasingly relying on nuclear and cyber deterrence as an affordable way to guarantee national sovereignty and prevent major conflict. While earlier defense planning and acquisitions were based on economic conditions that no longer exist, Congress’ options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense voters” than “social welfare voters,” according to a number of recent public opinion surveys.
Developing High Frequency Foreign Exchange Trading Systems, Bruce Vanstone, Tobias Hahn, Gavin Finnie
Developing High Frequency Foreign Exchange Trading Systems, Bruce Vanstone, Tobias Hahn, Gavin Finnie
Bruce Vanstone
The foreign exchange (FX) spot markets are well suited to high frequency trading. They are highly liquid, allow leverage, and trade 24 hours a day, 5 days a week. This paper documents and tests the stylized facts known about high-frequency FX markets. It then postulates a high frequency trading system on the basis of these stylized facts. Benchmarking confirms the robustness of the approach, demonstrating the role algorithmic trading has to play in higher frequency trading environments.
Developing High Frequency Foreign Exchange Trading Systems, Bruce Vanstone, Tobias Hahn, Gavin Finnie
Developing High Frequency Foreign Exchange Trading Systems, Bruce Vanstone, Tobias Hahn, Gavin Finnie
Tobias Hahn
The foreign exchange (FX) spot markets are well suited to high frequency trading. They are highly liquid, allow leverage, and trade 24 hours a day, 5 days a week. This paper documents and tests the stylized facts known about high-frequency FX markets. It then postulates a high frequency trading system on the basis of these stylized facts. Benchmarking confirms the robustness of the approach, demonstrating the role algorithmic trading has to play in higher frequency trading environments.
Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg
Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg
Jan Kallberg
In releasing the United States Department of Defense’s (DoD) Sustaining U.S. Global Leadership: Priorities for 21st Century Defense and Defense Budget Priorities and Choices in January 2012, President Barack Obama and Secretary of Defense Leon Panetta offered a rationale for the administration’s reductions in defense spending. By stating that the shift in strategic direction is an effort to “put our fiscal house in order” and a response to the 2011 Budget Control Act, which requires DoD to reduce spending by $487 billion between fiscal years 2012 and 2021, the United States’ NATO partners in Europe were given considerable reason for …
Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael
Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael
Professor Katina Michael
Late last year, IEEE SSIT was invited to put together a paper for the centennial edition of Proceedings of the IEEE that was published in May 2012. The paper titled, “Social Implications of Technology: The Past, the Present, and the Future,” brought together five members of SSIT with varying backgrounds, and two intense months of collaboration and exchange of ideas. I personally felt privileged to be working with Karl D. Stephan, Emily Anesta, Laura Jacobs and M.G. Michael on this project.
Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael
Professor Katina Michael
This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.
The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther
The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther
Jan Kallberg
With the prospect of sequestration looming, the United States may find itself increasingly rely ing on nuclear and cy ber deterrence as an affordable means of guaranteeing national sovereignty and preventing major conflict between the U.S. and potential adversaries in the Asia-Pacific. While earlier defense planning and acquisition were based on economic conditions that no longer ex ist, Congress’s options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense v oters” relative to “social welfare voters,” according to a number of recent public opinion surveys. The simple fact is China’s rise has …
Local Governments’ Risk-Based Approach To Climate Change Adaptation: A Missed Opportunity For Resilience In New South Wales, Nadine E. White
Local Governments’ Risk-Based Approach To Climate Change Adaptation: A Missed Opportunity For Resilience In New South Wales, Nadine E. White
Nadine E White
Parts of New South Wales (NSW) have experienced warming of 1.5 to 2.0 degrees Celsius in the period 1960 to 2009, indicating that the impacts of climate change are already being felt. Immediate, effective adaptation to potential impacts is crucial in reducing vulnerability to climate change. All three levels of government in Australia have a role in adaptation planning however it is local government that is at the ‘coal face’ of the outcomes of imminent climatic changes. This empirical research seeks to discover whether the existing institutional and cultural environment of local governments in NSW facilitates or impedes effective adaptation. …
A Survey Of Schema Matching Research, Roger Blake
A Survey Of Schema Matching Research, Roger Blake
Roger H. Blake
Schema matching is the process of developing semantic matches between two or more schemas. The purpose of schema matching is generally either to merge two or more databases, or to enable queries on multiple, heterogeneous databases to be formulated on a single schema (Doan and Halevy 2005). This paper develops a taxonomy of schema matching approaches, classifying them as being based on a combination schema matching technique and the type of data used by those techniques. Schema matching techniques are categorized as being based on rules, learning, or ontology, and the type of data used is categorized as being based …
Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg
Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg
Jan Kallberg
Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As …
Heuristic Algorithms For Balanced Multi-Way Number Partitioning, Jilian Zhang, Kyriakos Mouratidis, Hwee Hwa Pang
Heuristic Algorithms For Balanced Multi-Way Number Partitioning, Jilian Zhang, Kyriakos Mouratidis, Hwee Hwa Pang
Kyriakos MOURATIDIS
Balanced multi-way number partitioning (BMNP) seeks to split a collection of numbers into subsets with (roughly) the same cardinality and subset sum. The problem is NP-hard, and there are several exact and approximate algorithms for it. However, existing exact algorithms solve only the simpler, balanced two-way number partitioning variant, whereas the most effective approximate algorithm, BLDM, may produce widely varying subset sums. In this paper, we introduce the LRM algorithm that lowers the expected spread in subset sums to one third that of BLDM for uniformly distributed numbers and odd subset cardinalities. We also propose Meld, a novel strategy for …
A Quality Metric For Sustainable Innovations, Arcot Desai Narasimhalu
A Quality Metric For Sustainable Innovations, Arcot Desai Narasimhalu
Arcot Desai NARASIMHALU
Sustainability has become a major concern for nations and firms especially since the Kyoto Protocol was defined in 1997. While there have been several studies on benchmarks for national innovation systems and effectiveness of innovation management within firms there is as yet no reasonable metric for determining the quality of an innovation much less its quality relating to sustainability? Similarly, there have been several studies on sustainability but that such research groups have also not focused on developing a metric for denoting the quality of sustainable innovations. This paper offers a metric that defines the quality of an innovation, especially …
Agile Innovation Management, Arcot Desai Narasimhalu
Agile Innovation Management, Arcot Desai Narasimhalu
Arcot Desai NARASIMHALU
The volume and velocity of innovations are on the increase resulting in increased pressures on every company for attaining, retaining and increasing its market leadership. Many companies need to retool their innovation management processes to address two agility related objectives in order to survive and grow in such a rapidly changing innovation environment. The first objective would be the ability to assemble an innovation team within the shortest possible time. This can only be satisfied by companies that are capable of forming innovation teams rather quickly. The related second objective would be to reduce the I2M (Idea to Market) cycle …
Innovative Entrepreneurs Workbook, Arcot Desai Narasimhalu
Innovative Entrepreneurs Workbook, Arcot Desai Narasimhalu
Arcot Desai NARASIMHALU
The workbook provides a step by step approach to identifying innovation opportunities and the key aspects of Innovation development
Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham
Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
Abstract – The shift towards cyber operations represents a shift not only for the defense establishments worldwide but also cyber security research and education. Traditionally cyber security research and education has been founded on information assurance, expressed in underlying subfields such as forensics, network security, and penetration testing. Cyber security research and education is connected to the homeland security agencies and defense through funding, mutual interest in the outcome of the research, and the potential job market for graduates. The future of cyber security is both defensive information assurance measures and active defense driven information operations that jointly and coordinately …
Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat
Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat
Professor Katina Michael
Location based social networking (LBSN) applications are part of a new suite of social networking tools. LBSN is the convergence between location based services (LBS) and online social networking (OSN). LBSN applications offer users the ability to look up the location of another “friend” remotely using a smart phone, desktop or other device, anytime and anywhere. Users invite their friends to participate in LBSN and there is a process of consent that follows. This paper explores the potential impact of LBSN upon trust in society. It looks at the willingness of individuals to share their location data with family, friends, …
Emp And Geomagnetic Storm Protection Of Critical Infrastructure, George H. Baker Iii
Emp And Geomagnetic Storm Protection Of Critical Infrastructure, George H. Baker Iii
George H Baker
EMP and solar storm wide geographic coverage and ubiquitous system effects beg the question of “Where to begin?” with protection efforts. Thus, in addressing these “wide area electromagnetic (EM) effects,” we must be clever in deciding where to invest limited resources. Based on simple risk analysis, the electric power and communication infrastructures emerge as the highest priority for EM protection. Programs focused on these highest risk infrastructures will go a long way in lessoning societal impact. Given the national scope of the effects, such programs must be coordinated at the national level but implemented at local level. Because wide-area EM …
Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta
Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta
Professor Katina Michael
The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …
Complex Adaptive Systems As A Model For Evaluating Organisational Change Caused By The Introduction Of Health Information Systems, Kieren Diment Mr, Ping Yu, K. Garrety
Complex Adaptive Systems As A Model For Evaluating Organisational Change Caused By The Introduction Of Health Information Systems, Kieren Diment Mr, Ping Yu, K. Garrety
Karin Garrety
This paper documents the preliminary development of a framework for evaluating organisational change processes during the implementation of an electronic nursing documentation system in residential aged care facilities. It starts with a brief outline of organisational change processes. This is followed by a more detailed exposition of the principles underlying complex adaptive systems (CAS) theory, where we explain how mathematical concepts can be used to illuminate qualitative research approaches. Finally we present some preliminary findings on the facilitators and barriers for the introduction of the electronic documentation system, explained with reference to the CAS theory, based on analysis of interviews …
Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael
Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael
Professor Katina Michael
Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.
Strategyproof Mechanisms For Ad Hoc Network Formation, C. Jason Woodard, David C. Parkes
Strategyproof Mechanisms For Ad Hoc Network Formation, C. Jason Woodard, David C. Parkes
C. Jason Woodard
Agents in a peer-to-peer system typically have incentives to influence its network structure, either to reduce their costs or increase their ability to capture value. The problem is compounded when agents can join and leave the system dynamically. This paper proposes three economic mechanisms that offset the incentives for strategic behavior and facilitate the formation of networks with desirable global properties.
Architectural Dualities In Complex Systems: Components, Interfaces, Technologies And Organizations, C. Jason Woodard, Joel West
Architectural Dualities In Complex Systems: Components, Interfaces, Technologies And Organizations, C. Jason Woodard, Joel West
C. Jason Woodard
Research on technological innovation and product development has long recognized the importance of product architecture, and many scholars have explored its relationship to the organizational structure of the product development process. Product architecture, in turn, has long encompassed both the allocation of functionality to components and the pattern of linkages between them. In this paper, we forge new connections among these established ideas by examining them as two pairs of dual relationships. First, we draw attention to the duality between components and interfaces. While innovation and product development researchers have historically emphasized the partitioning of products and systems into components, …
Platform Competition In Digital Systems: Architectural Control And Value Migration, C. Jason Woodard
Platform Competition In Digital Systems: Architectural Control And Value Migration, C. Jason Woodard
C. Jason Woodard
Digital systems give rise to complex layered architectures in which products at one layer serve as platforms for applications and services in adjacent layers. Platform owners face a difficult balancing act. On one hand, they need to make their platforms attractive to potential complementors by mitigating the threat of architectural lock-in. On the other hand, platform owners must be careful not to give away too much too soon, or risk being unable to recoup their own investments. This paper presents an agent-based model that explores this tension at both the firm and industry levels. Computational experiments show that boundedly rational …
Competition In Modular Clusters, Carliss Y. Baldwin, C. Jason Woodard
Competition In Modular Clusters, Carliss Y. Baldwin, C. Jason Woodard
C. Jason Woodard
The last twenty years have witnessed the rise of disaggregated “clusters,” “networks,” or “ecosystems” of firms. In these clusters the activities of R&D, product design, production, distribution, and system integration may be split up among hundreds or even thousands of firms. Different firms will design and produce the different components of a complex artifact (like the processor, peripherals, and software of a computer system), and different firms will specialize in different stages of a complex production process. This paper considers the pricing behavior and profitability of these so-called modular clusters. In particular, we investigate a possibility hinted at in prior …
Modeling Product Development As A System Design Game, C. Jason Woodard
Modeling Product Development As A System Design Game, C. Jason Woodard
C. Jason Woodard
A system design game is a model of a situation in which agents’ actions determine the structure of a system, which in turn affects the system’s value and the share of value that each agent may capture through bargaining or market competition. This paper describes a class of games in which agents design interdependent products, for example software programs, which may be complements or substitutes for each other. These relationships are epresented by an object called a design structure network (DSN). Depending on the modeler’s choice of allocation rules, agents may benefit from owning critical nodes in the DSN, corresponding …