it systems
Recently Published Documents


TOTAL DOCUMENTS

1086
(FIVE YEARS 344)

H-INDEX

21
(FIVE YEARS 4)

Electronics ◽  
2022 ◽  
Vol 11 (2) ◽  
pp. 238
Author(s):  
Attiq Ur-Rehman ◽  
Iqbal Gondal ◽  
Joarder Kamruzzaman ◽  
Alireza Jolfaei

The development of cyber-assured systems is a challenging task, particularly due to the cost and complexities associated with the modern hybrid networks architectures, as well as the recent advancements in cloud computing. For this reason, the early detection of vulnerabilities and threat strategies are vital for minimising the risks for enterprise networks configured with a variety of node types, which are called hybrid networks. Existing vulnerability assessment techniques are unable to exhaustively analyse all vulnerabilities in modern dynamic IT networks, which utilise a wide range of IoT and industrial control devices (ICS). This could lead to having a less optimal risk evaluation. In this paper, we present a novel framework to analyse the mitigation strategies for a variety of nodes, including traditional IT systems and their dependability on IoT devices, as well as industrial control systems. The framework adopts avoid, reduce, and manage as its core principles in characterising mitigation strategies. Our results confirmed the effectiveness of our mitigation strategy framework, which took node types, their criticality, and the network topology into account. Our results showed that our proposed framework was highly effective at reducing the risks in dynamic and resource constraint environments, in contrast to the existing techniques in the literature.


2022 ◽  
pp. 330-355
Author(s):  
Chung-Yeung Pang

Most enterprise IT systems are very complex with a combination of COBOL and Java programs running on multiple platforms. What is needed is a solid IT architecture that supports the operation and growth of a cross-platform IT system. It must enable the iterative and incremental development of applications that are foreseen in an agile development process. The design concept of such an architecture with its infrastructure and development tool is presented in this chapter. This design concept is based on the design principles and architectural patterns of software engineering. The architecture is a combination of layered, component-based, and service-oriented architectural patterns. The agile development process is based on a model-driven approach. The architecture and development approaches were first introduced in 2004. Since then, many applications have been developed on time and within budget.


2022 ◽  
pp. 571-589
Author(s):  
Sumathi Doraikannan ◽  
Prabha Selvaraj

Data becomes big data when then the size of data exceeds the ability of our IT systems in terms of 3Vs (volume, velocity, and variety). When the data sets are large and complex, it becomes a great difficult task for handling such voluminous data. This chapter will provide a detailed knowledge of the major concepts and components of big data and also the transformation of big data in to business operations. Collection and storage of big data will not help out in creation of business values. Values and importance are created once when the action starts on data by performing an analysis. Hence, this chapter provides a view on various kinds of analysis that can be done with big data and also the differences between traditional analytics and big data analytics. The transformation of digital data into business values could be in terms of reports, research analyses, recommendations, predictions, and optimizations. In addition to the concept of big data, this chapter discuss about the basic concepts of digital analytics, methods, and techniques for digital analysis.


2022 ◽  
Author(s):  
Alexandr Alexandrovich Kuznetsov ◽  
Oleksandr Volodymyrovych Potii ◽  
Nikolay Alexandrovich Poluyanenko ◽  
Yurii Ivanovich Gorbenko ◽  
Natalia Kryvinska
Keyword(s):  

2022 ◽  
Vol 12 (1) ◽  
pp. 0-0

The article proposed interdisciplinary research should contribute to understanding the attitude of the population to the ongoing processes of digital transformation of the means of interaction with authorities, the level of their confidence in the widespread introduction of artificial intelligence technologies in the provision of public services. Understanding the psychology of the user, the specifics of information flows in public administration, the capabilities of modern IT systems - all this together will make it possible to significantly improve the corresponding communication processes.The scientific task posed within the framework of the topic is to develop a conceptual model for optimizing one of the main elements of modern e-government systems - "intelligent chat bots" designed to make the interaction of citizens with government bodies more efficient. The results of the article is contribute to the implementation of the goals, objectives and strategic guidelines of the programs of scientific and technological development of both the region and Russia as a whole.


2022 ◽  
Vol 29 (1) ◽  
pp. e100477
Author(s):  
Geeth Silva ◽  
Tim Bourne ◽  
Graeme Hall ◽  
Shriyam Patel ◽  
Mohammed Qasim Rauf ◽  
...  

IntroductionUniversity Hospitals Leicester has codeveloped, with Nervecentre, an Electronic Prescribing and Medicines Administration System that meets specific clinical and interoperability demands of the National Health Service (NHS).MethodsThe system was developed through a frontline-led and agile approach with a project team consisting of clinicians, Information Technology (IT) specialists and the vendor’s representatives over an 18-month period.ResultsThe system was deployed successfully with more than a thousand transcriptions during roll-out. Despite the high caseload and novelty of the system, there was no increase in error rates within the first 3 months of roll-out. Healthcare professionals perceived the new system as efficient with improved clinical workflow, and safe through an integrated medication alert system.DiscussionThis case study demonstrates how NHS trusts can successfully co-develop, with vendors, new IT systems which meet interoperability standards such as Fast Healthcare Interoperability Resources, while improving front line clinical experience.ConclusionAlternative methods to the ‘big bang’ deployment of IT projects, such as ‘gradual implementation’, must be demonstrated and evaluated for their ability to deliver digital transformation projects in the NHS successfully.


2022 ◽  
pp. 587-610
Author(s):  
Kathick Raj Elangovan

In recent times, cyber-attacks have been a significant problem in any organization. It can damage the brand name if confidential data is compromised. A robust cybersecurity framework should be an essential aspect of any organization. This chapter talks about the security framework for cyber threats in supply chain management and discusses in detail the implementation of a secure environment through various controls. Today, a systematic method is used for handling sensitive information in an organization. It includes processes, people, and IT systems by implementing a risk management method. Distinct controls dedicated to different levels of domains, namely human resources, access control, asset management, cryptography, physical security, operations security, supplier relations, acquisition, incident management, and security governance are provided. Companies, contractors, and any others who are part of the supply chain organization must follow this security framework to defend from any cyber-attacks.


2022 ◽  
pp. 26-39
Author(s):  
Kirandeep Bedi ◽  
Monica Bedi ◽  
Ramanjeet Singh

Artificial intelligence has led to the automation of traditional manufacturing and industrial processes and practices. The use of artificial intelligence improves customer experience and it's a proven fact that consumers who enjoy their shopping experience end up making more purchases. Retailing is one of the sectors that has seen drastic changes after the inception of artificial intelligence. This transformation can be seen in the supermarkets like Amazon Go store, Alibaba Hema store, IKEA, and many others. The objective of this chapter is to study the impact of artificial intelligence on Indian retail customers. Primary survey was conducted for the study and it was found that retail organizations emphasizing store design/layout and adoption of technological innovation to ease the consumer buying process were more successful in creating loyal customers for their stores. It can be concluded that India is still lacking in the adoption of IT systems in the retail sector and serious efforts are required in this direction.


SAGE Open ◽  
2022 ◽  
Vol 12 (1) ◽  
pp. 215824402110710
Author(s):  
Atif Saleem Butt

The novel COVID-19 (coronavirus) has created havoc and massive disruption to firms’ business operations. While much literature has recently emerged on how this pandemic outbreak has affected the firms. Limited empirical studies to date exist on what actions firms are employing to reduce the spread of COVID-19 and further ensure business continuity. Our study attempts to fill this gap in management literature. This study employs a multiple case study methodology. Overall, 36 semi-structured interviews with eight different based in China were undertaken. Results reveal that Chinese firms are employing six distinct actions to control the spread of COVID-19 while ensuring that the business continues to run to its maximum capacity. In particular, firms are educating employees on the symptoms of COVID-19, implementing strict screening protocols, applying agile IT systems, revising their cash flow policies and conducting global scenario planning to mitigate the spread of COVID-19. This study concludes by discussing its implications for theory, alongside limitations and future research directions.


2021 ◽  
Vol 3 (1) ◽  
pp. 29-32
Author(s):  
Bartłomiej Ulatowski ◽  
Marek Gróbarczyk ◽  
Zbigniew Łukasik

This paper presents a concept, developed and tested by the authors, of a virtualisation environment enabling the protection of aggregated data through the use of high availability (HA) of IT systems. The presented solution allows securing the central database system and virtualised server machines by using a scalable environment consisting of physical servers and disk arrays. The authors of this paper focus on ensuring the continuity of system operation and on minimising the risk of failures related to the availability of the operational data analysis system.


Sign in / Sign up

Export Citation Format

Share Document