Future information systems for road transport: A Delphi panel-derived scenario

1988 ◽  
Vol 33 (2) ◽  
pp. 159-178 ◽  
Author(s):  
Ove Svidén
Finisterra ◽  
2012 ◽  
Vol 38 (75) ◽  
Author(s):  
Julian Mora Aliseda ◽  
José Nogales Galán ◽  
José Gutierréz Gallego ◽  
Tomás Cortés Ruíz

GIS IN ROAD TRANSPORT PLANNING IN EXTREMADURA (SPAIN). Increasingly more importance is given to the role played by infrastructures as an element that shapes the landscape. New highways modify conditions of access, which consequently influences potential regional development. In this sense, Geographical Information Systems (GIS) are suitable tools for the calculation of accessibility levels and the implementation of cartographical outputs and results. In the light of these premises, this work is aimed at designing a GIS transportation model in the Regional Community of Extremadura in order to make an inventory and to plan and analyse regional infrastructures from economic and social perspectives. It is also our aim to evaluate the effects derived from infrastructure changes on the landscape by considering the highway transportation systems.In this sense, the calculation of shorter pathways is of great importance in order to achieve realistic accessibility GIS models. These models need calculations of the distance between couples of objects. By means of the calculation of the shortest pathways, distances can be precisely measured through the network that monitors the movements instead of using straight-line distances. By using GIS, models can be created that allow us to predict future trends. In order to study the potential of the designed model, different indicators have been determined showing the communication levels in different areas of Extremadura. Indicators calculated for the different population centres and areas are accessibility in absolute and relative terms, times of minimum access and the gravitational pull in comparison with the most significant populated areas. Maps are then generated with the results obtained from each of the indicators.


1984 ◽  
Vol 8 (2) ◽  
pp. 49-55
Author(s):  
Hubert Fondin

This paper discusses the mutations occurring within the information profession as a result of the rapid and complex transformation of existing information systems. The author feels it is essential for professionals, users and the information profession as a whole to recognize and understand these changes as well as their socio-economic consequences. Particular atten tion should be given to the following: the advent of microcom puters, electronic publishing, the end-user's reappropriation of information systems, the emergence of new types of informa tion, and the concept of information utility.


Author(s):  
Claus Hohmann

This article introduces emotional digitalization as a phenomenon of future information systems. It argues that emotional digitalization is a progress that will lessen the gap between technology and humanity, as well as between computer and man. The author develops and verifies his assumption besides theoretical references arising from his experiences with the information technology within the BrandLand Autostadt.


2009 ◽  
pp. 2462-2472
Author(s):  
Claus Hohmann

This article introduces emotional digitalization as a phenomenon of future information systems. It argues that emotional digitalization is a progress that will lessen the gap between technology and humanity, as well as between computer and man. The author develops and verifies his assumption besides theoretical references arising from his experiences with the information technology within the BrandLand Autostadt.


Author(s):  
Aline Franca de Abreu ◽  
Ruth Ferreira Roque Rossi

The purpose of this study was to identify through the Delphi Technique, important requirements of an information system development methodology. These requirements should satisfy the needs of actual organizations, regarding the strategic use of information technology. An initial listing of requirements was developed through a review of the related literature. The Delphi panel consisted of 31 brazilian specialists in information systems. Two rounds were employed to collect from this panel the most important requirements. The requirements were distributed in five basic areas: technical process, interaction between the end user and analysts, organizational structure, business strategies and quality of the information system. It is expected that methodologies will continue to be of great importance in the development of information systems and they will increase their focus on the social-technical approach.


AI Magazine ◽  
2019 ◽  
Vol 40 (1) ◽  
pp. 49-62 ◽  
Author(s):  
Sunny Fugate ◽  
Kimberly Ferguson-Walter

Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defender must detect all possible threats at all times from all attackers and defend all systems against all possible exploitation. In contrast, an attacker needs only to find a single path to the defender’s critical information. In this article, we discuss how this asymmetry can be rebalanced using cyber deception to change the attacker’s perception of the network environment, and lead attackers to false beliefs about which systems contain critical information or are critical to a defender’s computing infrastructure. We introduce game theory concepts and models to represent and reason over the use of cyber deception by the defender and the effect it has on attacker perception. Finally, we discuss techniques for combining artificial intelligence algorithms with game theory models to estimate hidden states of the attacker using feedback through payoffs to learn how best to defend the system using cyber deception. It is our opinion that adaptive cyber deception is a necessary component of future information systems and networks. The techniques we present can simultaneously decrease the risks and impacts suffered by defenders and dramatically increase the costs and risks of detection for attackers. Such techniques are likely to play a pivotal role in defending national and international security concerns.


Sign in / Sign up

Export Citation Format

Share Document