Definition of DG protection planning methods for network information systems

Author(s):  
K. Maki ◽  
S. Repo ◽  
P. Jarventausta ◽  
M. Karenlampi

Examples of the value that can be created and captured through crowdsourcing go back to at least 1714, when the UK used crowdsourcing to solve the Longitude Problem, obtaining a solution that would enable the UK to become the dominant maritime force of its time. Today, Wikipedia uses crowds to provide entries for the world’s largest and free encyclopedia. Partly fueled by the value that can be created and captured through crowdsourcing, interest in researching the phenomenon has been remarkable. For example, the Best Paper Awards in 2012 for a record-setting three journals—the Academy of Management Review, Journal of Product Innovation Management, and Academy of Management Perspectives—were about crowdsourcing. In spite of the interest in crowdsourcing—or perhaps because of it—research on the phenomenon has been conducted in different research silos within the fields of management (from strategy to finance to operations to information systems), biology, communications, computer science, economics, political science, among others. In these silos, crowdsourcing takes names such as broadcast search, innovation tournaments, crowdfunding, community innovation, distributed innovation, collective intelligence, open source, crowdpower, and even open innovation. The book aims to assemble papers from as many of these silos as possible since the ultimate potential of crowdsourcing research is likely to be attained only by bridging them. The papers provide a systematic overview of the research on crowdsourcing from different fields based on a more encompassing definition of the concept, its difference for innovation, and its value for both the private and public sectors.


2014 ◽  
Vol 701-702 ◽  
pp. 919-922
Author(s):  
Hong Fei Xu ◽  
Si Rui Pang ◽  
Jian Wen Du ◽  
Xue Mei Li

A system includes three power information security defense line is constructed, to achieve the information network, information outside the network, scheduling data network depth protection. According to the information security protection requirements, starting from the overall structure of information systems, taking into account the information system to schedule production system as the core, based on independent research and development of core information security isolation unit, set up three lines of defense in the power of information systems, electricity secondary system, information network systems, information systems outside the network partition protection.


Author(s):  
José Balsa-Barreiro ◽  
Pedro M. Valero-Mora ◽  
Mónica Menéndez ◽  
Rashid Mehmood

Abstract A better understanding of Driving Patterns and their relationship with geographical driving areas could bring great benefits for smart cities, including the identification of good driving practices for saving fuel and reducing carbon emissions and accidents. The process of extracting driving patterns can be challenging due to issues such as the collection of valid data, clustering of population groups, and definition of similar behaviors. Naturalistic Driving methods provide a solution by allowing the collection of exhaustive datasets in quantitative and qualitative terms. However, exploiting and analyzing these datasets is complex and resource-intensive. Moreover, most of the previous studies, have constrained the great potential of naturalistic driving datasets to very specific situations, events, and/or road sections. In this paper, we propose a novel methodology for extracting driving patterns from naturalistic driving data, even from small population samples. We use Geographic Information Systems (GIS), so we can evaluate drivers’ behavior and reactions to certain events or road sections, and compare across situations using different spatial scales. To that end, we analyze some kinematic parameters such as speeds, acceleration, braking, and other forces that define a driving attitude. Our method favors an adequate mapping of complete datasets enabling us to achieve a comprehensive perspective of driving performance.


2018 ◽  
Vol 8 (1) ◽  
Author(s):  
Daniel Perovich ◽  
Leonardo Rodrıguez Rodrıguez ◽  
Andres Vignaga

Component-based development can be addressed from two different fronts, or more precisely, from two different levels. One of them regards the technology used for system implementation, and the other is a previous and more abstract level, where the focus is set to the logical structure of the solution and where technological issues are not considered. Model Driven Architecture promotes such separation by distinguishing platform independent models from platform specific models. In alignment with this approach, this article proposes a mapping from the tiered and platform independent architecture for information systems resulting from the application of a widely known methodological approach, to the available constructs in the J2EE platform. This mapping allows the definition of transformations between platform independent models, resulting from the referred methodology where it is possible to abstractly reason about the solution, and platform specific models which are aligned with technological constructs and are directly implemented.


Author(s):  
Manuel Mora ◽  
Ovsei Gelman ◽  
Francisco Cervantes ◽  
Marcelo MejIa ◽  
Alfredo Weitzenfeld

In the new economic context, based on Information and Knowledge resources, the concepts of Information Systems and Information Technology (IS&IT) are fundamental to understand the organizational and managerial process in all levels: strategic, tactic and operational. From an academic and practitioner perspective, we pose that the correct use of the concept of IS&IT, and in specific of Information Systems, is critical. First ones need to study the same object and second ones need to use the same common conceptual knowledge about what are Information Systems. Nevertheless, uniquely informal and semiformal definitions of Information Systems have been reported in the literature and thus a formal definition based on core systemic foundations is missing. For these reasons, the conceptualization and formal definition of what are Information Systems acquires a relevant research and praxis status. This chapter addresses this problematic situation posing a formal definition of the term Information Systems based on core theoretical principles of the Systems Approach. For that, we firstly review the foundations of Systems Approach to establish the basis for our conceptual development. Then, an updated formal definition of the core concept System originally developed by Gelman and Garcia (1989) and that incorporates new insights from other systemic researchers is presented. With these theoretical bases, we proceed to review the contributions and limitations of main informal and semiformal definitions of the term Information Systems reported at the literature. Then the new formal definition of this term is developed using the updated formal definition of the term System. We continue with a discussion of how the definition posed formalizes systemic concepts of previous definitions, of how these are partial cases of the new definition and of how it can be used to model and study Information Systems in organizations. Finally, we conclude with main remarks and implications of this definition and with directions for further research.


2019 ◽  
Vol 8 (4) ◽  
pp. 18-38
Author(s):  
Pedro Fernandes da Anunciação ◽  
Alexandre Miguel Barão Rodrigues

This work follows the need of safety standards, update ISO27002:2013, in the major central banks of several European countries. This need has been studied by establishing a focus group that integrated European experts from major central banks. The analysis carried out was supported in the current methodology of information risk management, used by central banks in the safety management of information systems. This methodology is used to analyze and evaluate the adequacy of practices to risk management in the financial activity. The main objective was to present a proposal, sufficiently comprehensive and consistent, to a new risk management process of Information Systems within the European System of Central Banks. And a definition of a practical guide to risk management throughout the different stages of the Information Systems Life Cycle. The proposed model provides a higher degree of protection systems, technologies and information, especially in Central Banks, taking as reference the Portuguese Central Bank.


Author(s):  
H. Treiblmaier

In recent years a plethora of scholarly literature from the marketing and the information systems (IS) domain has dealt with the phenomenon of relationships. While during the pre-computer era relationships always implied a social dimension, modern technology tries to mimic this interaction process by learning about customers’ needs and addressing them individually. Interestingly, the central definition of a relationship remains vague in both marketing and IS. Finding the major constituents, therefore, could shed light on the question of whether technology actually could replace “social interactions.” In this chapter, we show how relationships are defined in scholarly literature. Subsequently, consumers define what they perceive to be the crucial attributes of a relationship in general and with an online organization. The results indicate that the notion of relationship has to be redefined for online communication and interaction and offer practical implications for designing the interaction process with online users.


Author(s):  
Maria Chiara Caschera ◽  
Arianna D’Ulizia ◽  
Leonardo Tininini

An easy, efficient, and effective way to retrieve stored data is obviously one of the key issues of any information system. In the last few years, considerable effort has been devoted to the definition of more intuitive, visual-based querying paradigms, attempting to offer a good trade-off between expressiveness and intuitiveness. In this chapter, we analyze the main characteristics of visual languages specifically designed for querying information systems, concentrating on conventional relational databases, but also considering information systems with a less rigid structure such as Web resources storing XML documents. We consider two fundamental aspects of visual query languages: the adopted visual representation technique and the underlying data model, possibly specialized to specific application contexts.


Author(s):  
Dibakar Ray ◽  
Umesh Gulla ◽  
M. P. Gupta ◽  
Shefali S. Dash

This chapter, based on analysis of literature, introduces a definition and a layered architecture for government information systems. It argues that the interoperability of information systems is essential in providing integrated government services, but unfortunately there is no consensus on what interoperability is and what constitutes interoperable information systems. By analysing available academic literature and government reports on interoperability, the authors have attempted to address this problem. Based on the study, a comprehensive definition of interoperability is presented here. Further, the authors have identified four constituents of interoperable system and finally, a layered architecture for interoperability of government information systems has been presented. The authors believe that an unambiguous definition and clear idea about constituent of interoperability would remove much confusion in conceptualisation, design, and development of interoperable systems in government.


Sign in / Sign up

Export Citation Format

Share Document