Quantitative Risk Management for Communication and Information Systems: State-of-the-Art and Challenges

Author(s):  
Raed Labassi ◽  
Mohamed Hamdi ◽  
Tai-Hoon Kim
Author(s):  
Rui Pedro Figueiredo Marques

In the current organizational context, in which there is a fierce competitiveness and a constant need for more timely, relevant, and reliable information to support the decision making and achieve the strategic and operational objectives, Continuous Assurance has assumed an important role as a management goal and in ensuring improved effectiveness of organizations. This works provides the concept of Continuous Assurance, its objectives and components, and a model which allows both to evaluate information systems with Continuous Assurance services and to help design the requirements of new ones. Finally, some implementations are also presented providing a comprehensive understanding the state-of-the-art and the benefits of Continuous Assurance.


2014 ◽  
Vol 12 (1) ◽  
pp. 35-52 ◽  
Author(s):  
Mariana Curado Malta ◽  
Ana Alice Baptista ◽  
Cristina Parente

This paper presents the state of the art on interoperability developments for the social and solidarity economy (SSE) community web based information systems (WIS); it also presents a framework of interoperability for the SSE' WIS and the developments made in a research-in-progress PhD project in the last 3 years. A search on the bibliographic databases showed that so far there are no papers on interoperability initiatives on the SSE, so it was necessary to have other sources of information: a preliminary analysis of the WIS that support SSE activities; and interviews with the representatives of some of the world's most important SSE organisations. The study showed that the WIS are still not interoperable yet. In order to become interoperable a group of the SSE community has been developing a Dublin Corre Application Profile to be used by the SSE community as reference and binding to describe their resources. This paper also describes this on-going process.


i-com ◽  
2017 ◽  
Vol 16 (2) ◽  
pp. 181-193 ◽  
Author(s):  
Christian Reuter ◽  
Katja Pätsch ◽  
Elena Runft

AbstractThe Internet and especially social media are not only used for supposedly good purposes. For example, the recruitment of new members and the dissemination of ideologies of terrorism also takes place in the media. However, the fight against terrorism also makes use of the same tools. The type of these countermeasures, as well as the methods, are covered in this work. In the first part, the state of the art is summarized. The second part presents an explorative empirical study of the fight against terrorism in social media, especially on Twitter. Different, preferably characteristic forms are structured within the scope with the example of Twitter. The aim of this work is to approach this highly relevant subject with the goal of peace, safety and safety from the perspective of information systems. Moreover, it should serve following researches in this field as basis and starting point.


2021 ◽  
Vol 7 ◽  
pp. e749
Author(s):  
David Limon-Cantu ◽  
Vicente Alarcon-Aquino

Anomaly detection in computer networks is a complex task that requires the distinction of normality and anomaly. Network attack detection in information systems is a constant challenge in computer security research, as information systems provide essential services for enterprises and individuals. The consequences of these attacks could be the access, disclosure, or modification of information, as well as denial of computer services and resources. Intrusion Detection Systems (IDS) are developed as solutions to detect anomalous behavior, such as denial of service, and backdoors. The proposed model was inspired by the behavior of dendritic cells and their interactions with the human immune system, known as Dendritic Cell Algorithm (DCA), and combines the use of Multiresolution Analysis (MRA) Maximal Overlap Discrete Wavelet Transform (MODWT), as well as the segmented deterministic DCA approach (S-dDCA). The proposed approach is a binary classifier that aims to analyze a time-frequency representation of time-series data obtained from high-level network features, in order to classify data as normal or anomalous. The MODWT was used to extract the approximations of two input signal categories at different levels of decomposition, and are used as processing elements for the multi resolution DCA. The model was evaluated using the NSL-KDD, UNSW-NB15, CIC-IDS2017 and CSE-CIC-IDS2018 datasets, containing contemporary network traffic and attacks. The proposed MRA S-dDCA model achieved an accuracy of 97.37%, 99.97%, 99.56%, and 99.75% for the tested datasets, respectively. Comparisons with the DCA and state-of-the-art approaches for network anomaly detection are presented. The proposed approach was able to surpass state-of-the-art approaches with UNSW-NB15 and CSECIC-IDS2018 datasets, whereas the results obtained with the NSL-KDD and CIC-IDS2017 datasets are competitive with machine learning approaches.


Sign in / Sign up

Export Citation Format

Share Document