scholarly journals Development of information security model with application of production model

Author(s):  
Sh. M. Jafarova

Objective. The purpose of the study is to find methods for solving the problem of ensuring a reliable level of security for cloud services. Production models can be considered the most common models that provide simplicity of knowledge representation and inference organization.Method. The research is based on the application of methods of fuzzy logic and mathematical modeling.Result. It is proposed to use fuzzy models that provide a flexible strategy for processing heterogeneous dynamic interacting processes that represent data and knowledge in an essentially fuzzy state space of objects of analysis.Conclusion. A production model of information security management is proposed, which is used to create data processing and storage centers. The production system includes a rule base, a global database, and a rule interpreter. The effective use of large information resources operating in an uncertain environment on the basis of a production model makes it possible to model and ensure information security of systems.

2022 ◽  
Vol 10 (1) ◽  
pp. 63
Author(s):  
Partho Protim Barman ◽  
Md. Mostafa Shamsuzzaman ◽  
Petra Schneider ◽  
Mohammad Mojibul Hoque Mozumder ◽  
Qun Liu

This research evaluated fisheries reference points and stock status to assess the sustainability of the croaker fishery (Sciaenidae) from the Bay of Bengal (BoB), Bangladesh. Sixteen years (2001–2016) of catch-effort data were analyzed using two surplus production models (Schaefer and Fox), the Monte Carlo method (CMSY) and the Bayesian state-space Schaefer surplus production model (BSM) method. This research applies a Stock–Production Model Incorporating Covariates (ASPIC) software package to run the Schaefer and Fox model. The maximum sustainable yield (MSY) produced by all models ranged from 33,900 to 35,900 metric tons (mt), which is very close to last year’s catch (33,768 mt in 2016). The estimated B > BMSY and F < FMSY indicated the safe biomass and fishing status. The calculated F/FMSY was 0.89, 0.87, and 0.81, and B/BMSY was 1.05, 1.07, and 1.14 for Fox, Schaefer, and BSM, respectively, indicating the fully exploited status of croaker stock in the BoB, Bangladesh. The representation of the Kobe phase plot suggested that the exploitation of croaker stock started from the yellow (unsustainable) quadrant in 2001 and gradually moved to the green (sustainable) quadrant in 2016 because of the reduction in fishing efforts and safe fishing pressure after 2012. Thus, this research suggests that the current fishing pressure needs to be maintained so that the yearly catch does not exceed the MSY limit of croaker. Additionally, specific management measures should implement to guarantee croaker and other fisheries from the BoB.


2018 ◽  
Vol 22 (S1) ◽  
pp. 451-468 ◽  
Author(s):  
Daming Li ◽  
Zhiming Cai ◽  
Lianbing Deng ◽  
Xiang Yao ◽  
Harry Haoxiang Wang

Author(s):  
Margareth Stoll

The importance of data privacy, information availability, and integrity is increasingly recognized. Sharpened legal requirements and increasing data leakages have further promoted data privacy. In order to implement the different requirements in an effective, efficient, and sustainable way, the authors integrate different governance frameworks to their holistic information security and data privacy model. More than 1.5 million organizations worldwide are implementing a standard-based management system. In order to promote the integration of different standards, the International Standard Organization (ISO) released a common structure. ISO/IEC 27001 for information security management was changed accordingly in October 2013. The holistic model fulfills all requirements of the new version. Its implementation in several organizations and the study's results are described. In that way data privacy and security are part of all strategic, tactical, and operational business processes, promote corporate governance and living security, as well as the fulfillment of all standard requirements.


Author(s):  
Khalid Eisa Haidar Abdalla Alhosani ◽  
Shamsul Kamal Ahmad Khalid ◽  
Noor Azah Samsudin ◽  
Sapiee Jamel ◽  
Kamaruddin Malik bin Mohamad

Sign in / Sign up

Export Citation Format

Share Document