scholarly journals Trustworthy Cloud Computing

Author(s):  
Olasunkanmi Matthew Alofe ◽  
Kaniz Fatema

AbstractTrustworthy cloud computing has been a central tenet of the European Union cloud strategy for nearly a decade. This chapter discusses the origins of trustworthy computing and specifically how the goals of trustworthy computing—security and privacy, reliability, and business integrity—are represented in computer science research. We call for further inter- and multi-disciplinary research on trustworthy cloud computing that reflect a more holistic view of trust.

2019 ◽  
Vol 122 (1) ◽  
pp. 681-699 ◽  
Author(s):  
E. Tattershall ◽  
G. Nenadic ◽  
R. D. Stevens

AbstractResearch topics rise and fall in popularity over time, some more swiftly than others. The fastest rising topics are typically called bursts; for example “deep learning”, “internet of things” and “big data”. Being able to automatically detect and track bursty terms in the literature could give insight into how scientific thought evolves over time. In this paper, we take a trend detection algorithm from stock market analysis and apply it to over 30 years of computer science research abstracts, treating the prevalence of each term in the dataset like the price of a stock. Unlike previous work in this domain, we use the free text of abstracts and titles, resulting in a finer-grained analysis. We report a list of bursty terms, and then use historical data to build a classifier to predict whether they will rise or fall in popularity in the future, obtaining accuracy in the region of 80%. The proposed methodology can be applied to any time-ordered collection of text to yield past and present bursty terms and predict their probable fate.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Tehmina Amjad ◽  
Mehwish Sabir ◽  
Azra Shamim ◽  
Masooma Amjad ◽  
Ali Daud

PurposeCitation is an important measure of quality, and it plays a vital role in evaluating scientific research. However, citation advantage varies from discipline to discipline, subject to subject and topic to topic. This study aims to compare the citation advantage of open access and toll access articles from four subfields of computer science.Design/methodology/approachThis research studies the articles published by two prestigious publishers: Springer and Elsevier in the author-pays charges model from 2011 to 2015. For experimentation, four sub-domains of computer science are selected including (a) artificial intelligence, (b) human–computer interaction, (c) computer vision and graphics, and (d) software engineering. The open-access and toll-based citation advantage is studied and analyzed at the micro level within the computer science domain by performing independent sample t-tests.FindingsThe results of the study highlight that open access articles have a higher citation advantage as compared to toll access articles across years and sub-domains. Further, an increase in open access articles has been observed from 2011 to 2015. The findings of the study show that the citation advantage of open access articles varies among different sub-domains of a subject. The study contributed to the body of knowledge by validating the positive movement toward open access articles in the field of computer science and its sub-domains. Further, this work added the success of the author-pays charges model in terms of citation advantage to the literature of open access.Originality/valueTo the best of the authors’ knowledge, this is the first study to examine the citation advantage of the author-pays charges model at a subject level (computer science) along with four sub-domains of computer science.


Author(s):  
Kate Keahey ◽  
Pierre Riteau ◽  
Dan Stanzione ◽  
Tim Cockerill ◽  
Joe Mambretti ◽  
...  

2020 ◽  
Vol 22 (3) ◽  
pp. 227-244
Author(s):  
João Serrado ◽  
Ruben Filipe Pereira ◽  
Miguel Mira da Silva ◽  
Isaías Scalabrin Bianchi

Purpose Data can nowadays be seen as the main asset of organizations and data leaks have a considerable impact on the organization’s image, revenues and possible consequences to the affected clients. One of the most critical industries is the bank. Information security frameworks (ISF) have been created to assist organizations and other frameworks evolved to update these domain practices. Recently, the European Union decided to create the general data protection regulation (GDPR), applicable to all organizations dealing with personal data of citizens residing in the European Union. Although considered a general regulation, GDPR implementation needs to align with some industries’ laws and policies. Especially in the Bank industry. How these ISF can assist the implementation of GDPR is not clear. Design/methodology/approach The design science research process was followed and semi-structured interviews performed. Findings A list of practices to assist the bank industry in GDPR implementation is provided. How each practice map with assessed ISF and GDPR requirements is also presented. Research limitations/implications As GDPR is a relatively recent subject, it is hard to find experts in the area. It is more difficult if the authors intend to find experienced people in the GDPR and bank industry. That is one of the main reasons this study does not include more interviews. Originality/value This research provides a novel artefact to the body of knowledge. The proposed artefact lists which ISF practices banks should implement to comply with GDPR. By doing it the artefact provides a centralized view about which ISF frameworks (or part of them) could be implemented to help banks comply with GDPR.


Author(s):  
Sumit Kumar Banshal ◽  
Ashraf Uddin ◽  
Khushboo Singhal ◽  
Vivek Kumar Singh

Sign in / Sign up

Export Citation Format

Share Document