scholarly journals A Theory of Information Trilogy: Digital Ecosystem Information Exchange Architecture

Information ◽  
2021 ◽  
Vol 12 (7) ◽  
pp. 283
Author(s):  
Asif Qumer Gill

Information sharing is a critical component of a distributed and multi-actor digital ecosystem (DE). DE actors, individuals and organisations, require seamless, effective, efficient, and secure architecture for exchanging information. Traditional point-to-point and ad hoc integrations hinder the ability of DE actors to do so. The challenge is figuring out how to enable information sharing in a complex DE. This paper addresses this important research challenge and proposes the theory of information trilogy and conceptual DE information exchange architecture, which is inspired by the study of nature and flow of matter, energy, and its states in natural ecosystems. This work is a part of the large DE information framework. The scope of this paper is limited to the emerging concept of DE information exchange. The application of the DE information exchange concept is demonstrated with the help of a geospatial information sharing case study example. The results from this paper can be used by researchers and practitioners for defining the DE information exchange as appropriate to their context. This work also complements Shannon’s mathematical theory of communication.

Author(s):  
Cody Minks ◽  
Anke Richter

AbstractObjectiveResponding to large-scale public health emergencies relies heavily on planning and collaboration between law enforcement and public health officials. This study examines the current level of information sharing and integration between these domains by measuring the inclusion of public health in the law enforcement functions of fusion centers.MethodsSurvey of all fusion centers, with a 29.9% response rate.ResultsOnly one of the 23 responding fusion centers had true public health inclusion, a decrease from research conducted in 2007. Information sharing is primarily limited to information flowing out of the fusion center, with little public health information coming in. Most of the collaboration is done on a personal, informal, ad-hoc basis. There remains a large misunderstanding of roles, capabilities, and regulations by all parties (fusion centers and public health). The majority of the parties appear to be willing to work together, but there but there is no forward momentum to make these desires a reality. Funding and staffing issues seem to be the limiting factor for integration.ConclusionThese problems need to be urgently addressed to increase public health preparedness and enable a decisive and beneficial response to public health emergencies involving a homeland security response.


Author(s):  
Hua Li ◽  
Qingqing Lou ◽  
Qiubai Sun ◽  
Bowen Li

In order to solve the conflict of interests of institutional investors, this paper uses evolutionary game model. From the point of view of information sharing, this paper discusses four different situations. Only when the sum of risk and cost is less than the penalty of free riding, the evolution of institutional investors will eventually incline to the stable state of information sharing. That is, the phenomenon of hugging. The research shows that the institutional investors are not independent of each other, but the relationship network of institutional investors for the purpose of information exchange. The content of this paper enriches the research on information sharing of institutional investors.


2021 ◽  
Vol 2021 ◽  
pp. 1-17
Author(s):  
Muhammad Altaf Khan ◽  
Moustafa M. Nasralla ◽  
Muhammad Muneer Umar ◽  
Zeeshan Iqbal ◽  
Ghani Ur Rehman ◽  
...  

In ad hoc networks, the communication is usually made through multiple hops by establishing an environment of cooperation and coordination among self-operated nodes. Such nodes typically operate with a set of finite and scarce energy, processing, bandwidth, and storage resources. Due to the cooperative environment in such networks, nodes may consume additional resources by giving relaying services to other nodes. This aspect in such networks coined the situation of noncooperative behavior by some or all the nodes. Moreover, nodes sometimes do not cooperate with others due to their social likeness or their mobility. Noncooperative or selfish nodes can last for a longer time by preserving their resources for their own operations. However, such nodes can degrade the network's overall performance in terms of lower data gathering and information exchange rates, unbalanced work distribution, and higher end-to-end delays. This work surveys the main roots for motivating nodes to adapt selfish behavior and the solutions for handling such nodes. Different schemes are introduced to handle selfish nodes in wireless ad hoc networks. Various types of routing techniques have been introduced to target different types of ad hoc networks having support for keeping misbehaving or selfish nodes. The major solutions for such scenarios can be trust-, punishment-, and stimulation-based mechanisms. Some key protocols are simulated and analyzed for getting their performance metrics to compare their effectiveness.


2021 ◽  
Author(s):  
Lubaid Ahmed

Due to recent advances in computing and communication technologies, Mobile Ad hoc Networks (MANETs) are becoming networks of choice for various applications such as emergencies [sic] preparedness and response, military and crisis management, and healthcare, to name a few. The main reason for this is that in MANET, information exchange between nodes can happen dynamically without pre-exisiting fixed network infrastructure with designated centralized access points. However, this privilege also comes with some security drawbacks, especially from a message security viewpoint because the implementation of hard-cryptographic security now becomes a challenging prospect. In this thesis, we improve a recently proposed method of message security in MANET (so called benchmark scheme, also referred to as trust-based multipath DSR routing scheme), by introducing a trust model that makes multi-path routing flexible enough to avoid non-trusted routes that may use brute force attacks to decrypt messages travelling through the network en route to their destinations. Simulation results, coupled with theoretical justification, affirm that the proposed solution is much more secured than the above-mentioned benchmark method and traditional multi-path routing algorithms.


The recent developments in wireless communication technologies along with the costs of hardware allow both V2V and V2I communications for information exchange. Such a network is called Vehicular ad Hoc Network (VANET) which is very important for various road safety and non-safety related applications. However, Due to the wireless nature of communication in VANETs, it is also prone to various security attacks which are originally present in wireless networks. Hence to realize the highest potential of VANET, the network should be free from attackers, there by all the information exchanged in the network must be reliable should be originated from authenticated source. The system can be processed by the fuzzy logic method. It does not require any keys for data transmission. The system design is very efficient compared to other techniques. So the users prevent from road accident and traffic jam.


2016 ◽  
Vol 72 (4) ◽  
pp. 1399-1421
Author(s):  
Keisuke Utsu ◽  
Chee Onn Chow ◽  
Hiroaki Nishikawa ◽  
Hiroshi Ishii

Author(s):  
Alice Noblin ◽  
Kelly McLendon ◽  
Steven Shim

Florida began the journey to health information connectivity in 2004 under Governor Jeb Bush. Initially these efforts were funded by grants, but due to the downturn in the economy, the state was unable to support growth in 2008. The American Recovery and Reinvestment Act of 2009 provided funding to further expand health information exchange efforts across the country. As a result, Florida is now able to move forward and make progress in information sharing. Harris Corporation was contracted to provide some basic services to the health care industry in 2011. However, challenges remain as privacy and security regulations are put in place to protect patients’ information. With two seemingly opposing mandates, sharing the information versus protecting the information, challenges continue to impede progress.


Author(s):  
Robert Farrell ◽  
Catalina Danis ◽  
Thomas Erickson ◽  
Jason Ellis ◽  
Jim Christensen ◽  
...  

Mobile communication is a key enabler for economic, social, and political change in developing regions of the world. This paper describes IBM Picture Discussions, which is a mobile social computing application framework designed to facilitate local information sharing in regions with sparse Internet connectivity, low literacy rates, and having users with little prior experience with information technology. IBM Picture Discussions runs on today’s internet-enabled smartphones as well as camera phones with multimedia messaging. In this paper, the authors argue that engaging citizens in developing regions in information creation and information sharing leverages peoples’ existing social networks to facilitate transmission of critical information, exchange of ideas, and distributed problem solving. All of these activities can support economic development.


Sign in / Sign up

Export Citation Format

Share Document