scholarly journals Data Extraction in Malignant Environments

Author(s):  
Amith Mandal ◽  
R. P. Ramkumar

Deliberate or inadvertent escape of classified data is undoubtedly one among the premier extreme security dangers that associations look inside the advanced period. The risk right now stretches out to the private lives: an abundance of private information is out there to interpersonal organizations and great telephone providers and is in a roundabout way exchanged to undependable outsider and fourth gathering applications. amid this work, a bland data genealogy structure LIME (Data Lineage in the Malicious Environment), is utilized for data stream over different elements that take two trademark, guideline parts (i.e., proprietor and buyer). It characterizes the exact security ensures required by such a data heredity component toward recognizable proof of a blameworthy substance, and decide the disentangling non-denial and trustworthiness suspicions. At that point create and break down a totally special dependable data exchange convention between two substances among noxious surroundings by expanding upon unmindful exchange, solid watermarking, and mark natives. At long last, an exploratory investigation to exhibit the helpfulness of convention what's more, apply structure to the important data run projections of learning outsourcing and the informal organizations. In general, LIME(Data Lineage in the Malicious Environment),lineage structure for information exchange, to be a key advance towards accomplishing responsibility by plan.

2021 ◽  
Vol 28 (1) ◽  
pp. e100241
Author(s):  
Job Nyangena ◽  
Rohini Rajgopal ◽  
Elizabeth Adhiambo Ombech ◽  
Enock Oloo ◽  
Humphrey Luchetu ◽  
...  

BackgroundThe use of digital technology in healthcare promises to improve quality of care and reduce costs over time. This promise will be difficult to attain without interoperability: facilitating seamless health information exchange between the deployed digital health information systems (HIS).ObjectiveTo determine the maturity readiness of the interoperability capacity of Kenya’s HIS.MethodsWe used the HIS Interoperability Maturity Toolkit, developed by MEASURE Evaluation and the Health Data Collaborative’s Digital Health and Interoperability Working Group. The assessment was undertaken by eHealth stakeholder representatives primarily from the Ministry of Health’s Digital Health Technical Working Group. The toolkit focused on three major domains: leadership and governance, human resources and technology.ResultsMost domains are at the lowest two levels of maturity: nascent or emerging. At the nascent level, HIS activities happen by chance or represent isolated, ad hoc efforts. An emerging maturity level characterises a system with defined HIS processes and structures. However, such processes are not systematically documented and lack ongoing monitoring mechanisms.ConclusionNone of the domains had a maturity level greater than level 2 (emerging). The subdomains of governance structures for HIS, defined national enterprise architecture for HIS, defined technical standards for data exchange, nationwide communication network infrastructure, and capacity for operations and maintenance of hardware attained higher maturity levels. These findings are similar to those from interoperability maturity assessments done in Ghana and Uganda.


2018 ◽  
Vol 52 (1) ◽  
pp. 16-26 ◽  
Author(s):  
Frances V.C. Ryan ◽  
Peter Cruickshank ◽  
Hazel Hall ◽  
Alistair Lawson

Results are reported from a study that investigated patterns of information behaviour and use as related to personal reputation building and management in online environments. An everyday life information seeking (ELIS) perspective was adopted. Data were collected by diary and interview from 45 social media users who hold professional and managerial work roles, and who are users of Twitter, Facebook and/or LinkedIn. These data were first transcribed, then coded with NVivo10 according to themes identified from a preliminary literature review, with further codes added as they emerged from the content of the participant diaries and interviews. The main findings reveal that the portrayal of different personas online contributes to the presentation (but not the creation) of identity, that information-sharing practices for reputation building and management vary according to social media platform, and that the management of online connections and censorship are important to the protection of reputation. The maintenance of professional reputation is more important than private reputation to these users. They are aware of the ‘blur’ between professional and private lives in online contexts, and the influence that it bears on efforts to manage an environment where LinkedIn is most the useful of the three sites considered, and Facebook the most risky. With its novel focus on the ‘whole self’, this work extends understandings of the impact of information on the building and management of reputation from an information science perspective.


2020 ◽  
Vol 9 (1) ◽  
pp. 1661-1666

The Internet has become the most important medium for information exchange and the core communication environment for business relations as well as for social interactions. The current internet architecture itself might become the limiting factor of Internet growth and deployment of new applications including 5G and future internet. Architectural limitations of internet include weak security, lack of efficient storage and caching, data distribution and traceability issues, lack of interoperability and so on. The proposed system overcomes these limitations by an alternate architecture for internet called NovaGenesis. This architecture integrates the concepts of Information Centric Networking (ICN), Service Oriented Architecture (SOA), network caching and name based routing. ICN evolve internet from a host-centric model to a content-centric model through efficient data exchange, storage and processing. SOA enables software-control/management of network devices based on service requirements. Network caching improves performance in terms of throughput, network traffic and retrieval delay. Name based routing is for discovering and delivering of data. The framework proposed increases the scalability and reliability of the delivery of IoT data for services.


Author(s):  
Alireza Pourshahid ◽  
Liam Peyton ◽  
Sepideh Ghanavati ◽  
Daniel Amyot ◽  
Pengfei Chen ◽  
...  

Validation should be done in the context of understanding how a business process is intended to contribute to the business strategies of an organization. Validation can take place along a variety of dimensions including legal compliance, financial cost, customer value, and service quality. A business process modeling tool cannot anticipate all the ways in which a business process might need to be validated. However, it can provide a framework for extending model elements to represent context for a business process. It can also support information exchange to facilitate validation with other tools and systems. This chapter demonstrates a model-based approach to validation using a hospital approval process for accessing patient data in a data warehouse. An extensible meta-model, a flexible data exchange layer, and linkage between business processes and enterprise context are shown to be the critical elements in model-based business process validation.


Author(s):  
Antonio Celesti ◽  
Maria Fazio ◽  
Antonio Puliafito ◽  
Massimo Villari

In this paper the authors focus on sensing systems supporting data exchange among several healthcare administrative domains. The challenge in this area is twofold: efficient management of a huge amount of data produced by medical devices, bio-sensors and information systems, sharing sensed data for scientific and clinical purposes. The authors present a new information system that exploits Cloud computing capabilities to overcome such issues, also guaranteeing patients' privacy. Their proposal integrates different healthcare institutions into a federated environment, thus establishing a trust context among the institutions themselves. The storage service is designed according to a fully distributed approach and it is based on the wide-used Open Source framework Hadoop, which is enriched to establish a compelling federated system. They adopt the XRI technology to formalize an XML-based data model which allows to simplify the classification, searching and retrieval of medical data.


2020 ◽  
Vol 4 (4) ◽  
pp. 3-78 ◽  
Author(s):  
Christina Leb

AbstractCross-border data and information exchange is one of the most challenging issues for transboundary water management. While the regular exchange of data and information has been identified as one of the general principles of international water law, only a minority of treaties include direct obligations related to mutual data exchange. Technological innovations related to real-time data availability, space technology and earth observation have led to an increase in quality and availability of hydrological, meteorological and geo-spatial data. These innovations open new avenues for access to water related data and transform data and information exchange globally. This monograph is an exploratory assessment of the potential impacts of these disruptive technologies on data and information exchange obligations in international water law.


Author(s):  
Scott Flinn ◽  
Scott Buffett

This chapter discusses privacy from the perspective of the consumer of e-services. It proposes a technique for risk management assessment designed to help consumers evaluate a situation to identify and understand potential privacy concerns. The technique centers around a series of questions based on common principles of privacy protection. The chapter discusses how a consumer can understand exposure risks and how information can be controlled and monitored to mitigate the risks. It also proposes a method for assessing the consumer’s value of personal information, and a mechanism for automated negotiation is presented to facilitate fair, private information exchange. The authors believe that these or similar techniques are essential to give consumers of e-services meaningful control over the personal information they release. This forward-looking chapter provides a foundation for developing methods to empower users with control over their private information.


2020 ◽  
Vol 9 (4) ◽  
pp. 394-409
Author(s):  
Saikiran Gopalakrishnan ◽  
Nathan W. Hartman ◽  
Michael D. Sangid

AbstractThe digital transformation of manufacturing requires digitalization, including automatic and efficient data exchange. Model-based definitions (MBDs) capture digital product definitions, in order to eliminate error-prone information exchange associated with traditional paper-based drawings and to provide contextual information through additional metadata. The flow of MBDs extends throughout the product lifecycle (including the design, analysis, manufacturing, in service life, and retirement stages) and can be extended beyond the typical geometry and tolerance information within a computer-aided design. In this paper, the MBDs are extended to include materials information, via dynamic linkages. To this end, a model-based feature information network (MFIN) is created to provide a comprehensive framework that facilitates storing, updating, searching, and retrieving of relevant information across a product’s lifecycle. The use case of a damage tolerant analysis for a compressor bladed-disk (blisk) is demonstrated, in Ti-6Al-4V blade(s) linear friction welded to the Ti-6Al-4V disk, creating well-defined regions exhibiting grain refinement and high residuals stresses. By capturing the location-specific microstructure and residual stress values at the weld regions, this information is accessed within the MFIN and used for downstream damage tolerant analysis. The introduction of the MFIN framework facilitates access to dynamically evolving data for use within physics-based models (resulting in the opportunity to reduce uncertainty in subsequent prognosis analyses), thereby enabling a digital twin description of the component or system.


Sign in / Sign up

Export Citation Format

Share Document