scholarly journals Executing large-scale processes in a blockchain

2018 ◽  
Vol 2 (2) ◽  
pp. 106-120 ◽  
Author(s):  
Mahalingam Ramkumar

Purpose The purpose of this paper is to examine the blockchain as a trusted computing platform. Understanding the strengths and limitations of this platform is essential to execute large-scale real-world applications in blockchains. Design/methodology/approach This paper proposes several modifications to conventional blockchain networks to improve the scale and scope of applications. Findings Simple modifications to cryptographic protocols for constructing blockchain ledgers, and digital signatures for authentication of transactions, are sufficient to realize a scalable blockchain platform. Originality/value The original contributions of this paper are concrete steps to overcome limitations of current blockchain networks.

2017 ◽  
Vol 1 (2) ◽  
pp. 76-90 ◽  
Author(s):  
Jassim Happa ◽  
Michael Goldsmith

Purpose Several attack models attempt to describe behaviours of attacks with the intent to understand and combat them better. However, all models are to some degree incomplete. They may lack insight about minor variations about attacks that are observed in the real world (but are not described in the model). This may lead to similar attacks being classified as the same type of attack, or in some cases the same instance of attack. The appropriate solution would be to modify the model or replace it entirely. However, doing so may be undesirable as the model may work well for most cases or time and resource constraints may factor in as well. This paper aims to explore the potential value of adding information about attacks and attackers to existing models. Design/methodology/approach This paper investigates used cases of minor variations in attacks and how it may and may not be appropriate to communicate subtle differences in existing attack models through the use of annotations. In particular, the authors investigate commonalities across a range of existing models and identify where and how annotations may be helpful. Findings The authors propose that nuances (of attack properties) can be appended as annotations to existing attack models. Using annotations appropriately should enable analysts and researchers to express subtle but important variations in attacks that may not fit the model currently being used. Research limitations/implications This work only demonstrated a few simple, generic examples. In the future, the authors intend to investigate how this annotation approach can be extended further. Particularly, they intend to explore how annotations can be created computationally; the authors wish to obtain feedback from security analysts through interviews, identify where potential biases may arise and identify other real-world applications. Originality/value The value of this paper is that the authors demonstrate how annotations may help analysts communicate and ask better questions during identification of unknown aspects of attacks faster,e.g. as a means of storing mental notes in a structured manner, especially while facing zero-day attacks when information is incomplete.


2017 ◽  
Vol 59 (9) ◽  
pp. 990-1006 ◽  
Author(s):  
Roger Pizarro Milian ◽  
Marc Gurrisi

Purpose The purpose of this paper is to empirically examine how entrepreneurship education is being marketed to students within the Canadian university sector. Design/methodology/approach A content analysis of the webpages representing 66 entrepreneurship education programs in Canada is performed. Findings Entrepreneurship education is found to be framed as providing students with a collaborative learning experience, useful hands-on skills with real world applications and an entrepreneurial mindset. Research limitations/implications This study looks at only one type of promotional material, and thus, further research is needed to triangulate its findings. Originality/value This is the first study that empirically examines the marketing of entrepreneurship education in Canada.


2019 ◽  
Vol 3 (1) ◽  
pp. 63-86 ◽  
Author(s):  
Yanan Wang ◽  
Jianqiang Li ◽  
Sun Hongbo ◽  
Yuan Li ◽  
Faheem Akhtar ◽  
...  

Purpose Simulation is a well-known technique for using computers to imitate or simulate the operations of various kinds of real-world facilities or processes. The facility or process of interest is usually called a system, and to study it scientifically, we often have to make a set of assumptions about how it works. These assumptions, which usually take the form of mathematical or logical relationships, constitute a model that is used to gain some understanding of how the corresponding system behaves, and the quality of these understandings essentially depends on the credibility of given assumptions or models, known as VV&A (verification, validation and accreditation). The main purpose of this paper is to present an in-depth theoretical review and analysis for the application of VV&A in large-scale simulations. Design/methodology/approach After summarizing the VV&A of related research studies, the standards, frameworks, techniques, methods and tools have been discussed according to the characteristics of large-scale simulations (such as crowd network simulations). Findings The contributions of this paper will be useful for both academics and practitioners for formulating VV&A in large-scale simulations (such as crowd network simulations). Originality/value This paper will help researchers to provide support of a recommendation for formulating VV&A in large-scale simulations (such as crowd network simulations).


2010 ◽  
Vol 33 (7) ◽  
pp. 1165-1176 ◽  
Author(s):  
Ming-Di XU ◽  
Huan-Guo ZHANG ◽  
Heng ZHAO ◽  
Jun-Lin LI ◽  
Fei YAN

2016 ◽  
Vol 12 (2) ◽  
pp. 126-149 ◽  
Author(s):  
Masoud Mansoury ◽  
Mehdi Shajari

Purpose This paper aims to improve the recommendations performance for cold-start users and controversial items. Collaborative filtering (CF) generates recommendations on the basis of similarity between users. It uses the opinions of similar users to generate the recommendation for an active user. As a similarity model or a neighbor selection function is the key element for effectiveness of CF, many variations of CF are proposed. However, these methods are not very effective, especially for users who provide few ratings (i.e. cold-start users). Design/methodology/approach A new user similarity model is proposed that focuses on improving recommendations performance for cold-start users and controversial items. To show the validity of the authors’ similarity model, they conducted some experiments and showed the effectiveness of this model in calculating similarity values between users even when only few ratings are available. In addition, the authors applied their user similarity model to a recommender system and analyzed its results. Findings Experiments on two real-world data sets are implemented and compared with some other CF techniques. The results show that the authors’ approach outperforms previous CF techniques in coverage metric while preserves accuracy for cold-start users and controversial items. Originality/value In the proposed approach, the conditions in which CF is unable to generate accurate recommendations are addressed. These conditions affect CF performance adversely, especially in the cold-start users’ condition. The authors show that their similarity model overcomes CF weaknesses effectively and improve its performance even in the cold users’ condition.


2007 ◽  
Vol 12 (1) ◽  
pp. 101-104 ◽  
Author(s):  
Liming Hao ◽  
Xun Sun ◽  
Shutang Yang ◽  
Songnian Lu

2015 ◽  
Vol 43 (3) ◽  
pp. 7-14 ◽  
Author(s):  
Jim Moffatt

Purpose – This case example looks at how Deloitte Consulting applies the Three Rules synthesized by Michael Raynor and Mumtaz Ahmed based on their large-scale research project that identified patterns in the way exceptional companies think. Design/methodology/approach – The Three Rules concept is a key piece of Deloitte Consulting’s thought leadership program. So how are the three rules helping the organization perform? Now that research has shown how exceptional companies think, CEO Jim Moffatt could address the question, “Does Deloitte think like an exceptional company?” Findings – Deloitte has had success with an approach that promotes a bias towards non-price value over price and revenue over costs. Practical implications – It’s critical that all decision makers in an organization understand how decisions that are consistent with the three rules have contributed to past success as well as how they can apply the rules to difficult challenges they face today. Originality/value – This is the first case study written from a CEO’s perspective that looks at how the Three Rules approach of Michael Raynor and Mumtaz Ahmed can foster a firm’s growth and exceptional performance.


2017 ◽  
Vol 16 (4) ◽  
pp. 171-176
Author(s):  
Campbell Macpherson

Purpose This paper aims to present a case study focused on developing a change-ready culture within a large organization. Design/methodology/approach This paper is based on personal experiences gleaned while driving an organization-wide culture change program throughout a major financial advisory firm. Findings This paper details over a dozen key lessons learned while transforming the HR department from a fragmented, ineffective, reclusive and disrespected department into one that was competent, knowledgeable, enabling and a leader of change. Originality/value Drawing on the real-world culture change intervention detailed here, including results and lessons learned, other organizations can apply similar approaches in their own organizations – hopefully to similar effect.


Sign in / Sign up

Export Citation Format

Share Document