“Happy Talk About Good Ideas”: The Role of Policymakers in Defending Computer Systems

Keyword(s):  
Author(s):  
John Baylis ◽  
James J. Wirtz

This edition explores the role of military power in the contemporary world and the changes that have occurred over the last decade. It examines the debates about whether there has been a revolution in military affairs and the future of warfare, given the phenomenal pace of innovation in electronics and computer systems, which is often referred to as cyberwar. It also considers the strategic implications of the changing structure of global politics and the role of U.S. military power in a world in transition, along with the continuing relevance of various theories of peace and security. This introduction discusses strategic studies, criticisms levelled against strategic studies, and the relationship between strategic studies and security studies.


1997 ◽  
Vol 16 (2) ◽  
pp. 107-124 ◽  
Author(s):  
Theodore W. Frick

After more than four decades, development of artificially intelligent tutoring systems has been constrained by two interrelated problems: knowledge representation and natural language understanding. G. S. Maccia's epistemology of intelligent natural systems implies that computer systems will need to develop qualitative intelligence before these problems can be solved. Recent research on how human nervous systems develop provides evidence for the significance of qualitative intelligence. Qualitative intelligence is required for understanding of culturally bound meanings of signs used in communication among intelligent natural systems. S. I. Greenspan provides neurological and clinical evidence that emotion and sensation are vital to the growth of mind—capabilities that computer systems do not currently possess. Therefore, we must view computers in education as media through which a multitude of teachers can convey their messages. This does not mean that the role of classroom teachers is diminished. Teachers and students can be empowered by these additional learning resources.


1991 ◽  
Vol 6 (2) ◽  
pp. 108-111
Author(s):  
Julie Baddeley

As the costs of computer systems continue to rise, and the commercial advantages become harder to maintain, the implementation of IT projects is coming under close scrutiny. An analysis of the methods used at Penguin Books suggests that a coherent, carefully planned programme, giving priority to the needs of the end-users, can greatly improve the levels of efficiency and reduce support costs once the system goes live. This article outlines the steps taken in drawing up an integrated package of research, documentation and training, and explains how the users were encouraged to contribute to the design of the overall implementation programme. The methods described are put forward as a means of reducing the massive costs currently incurred by implementing new systems, and improving the return on this investment. By prioritizing the role of the user, this article offers a coherent solution to some of the current IT investment problems.


Author(s):  
Art Taylor

With the rise of the Internet, computer systems appear to be more vulnerable than ever from security attacks. Much attention has been focused on the role of the network in security attacks, but evidence suggests that the computer server and its operating system deserve closer examination since it is ultimately the operating system and its core defense mechanisms of authentication and authorization which are compromised in an attack. This chapter provides an exploratory and evaluative discussion of the authentication and authorization features of two widely used server operating systems: Windows and Linux.


1987 ◽  
Vol 31 (9) ◽  
pp. 969-972
Author(s):  
Lisa L. Thrush ◽  
Greta L. Myers ◽  
Luther D. McMillen

A common scenario in both manufacturing and human-computer interaction is that of people linking independently-designed systems. People receive output from one system, modify it and then input it into the next system in the process. In computer systems, manual data entry tasks introduce the possibility of both human errors and delays. With increased automation and integration of computer systems, many of these human links can be eliminated. Removing the human link between independently-designed systems does not remove the user from the system network. Rather, it places the user in the role of exception processing, controlling, monitoring and responding to the overall network of systems. This new role brings with it the requirement for an expansion of user knowledge to include a complete understanding of the system network and skills for technical problem solving. It further requires that the system's design include appropriate means of notifying exception processors, a system administrator and management of system status and production volume. The appropriate combination of these components will make a substantial contribution toward the development of a successful integrated computer system.


Sign in / Sign up

Export Citation Format

Share Document