Risk Assessment and Management in Pervasive Computing
Latest Publications


TOTAL DOCUMENTS

19
(FIVE YEARS 0)

H-INDEX

1
(FIVE YEARS 0)

Published By IGI Global

9781605662206, 9781605662213

Author(s):  
Genevieve Watson

Pervasive computers cover many areas of both our working and personal lives. This chapter investigates this phenomenon through the human factors impacts, particularly in aviation. This chapter gives a brief introduction to pervasive computers and how they interact with aviation human factors research. Further, it follows the discussion on how pervasive computers have permeated into an integral part of the aviation industry by reviewing the specific issues of cockpit automation and the human-machine interface in the aircraft cockpit.


Author(s):  
Patrice Braun

In view of the fact that women are playing an increasingly important role in the global economy, this chapter examines business skilling in the digital economy for women in general and women-led small businesses in Australia, in particular. With employability and entrepreneurial capacity of women increasing, so too is their need for a comprehensive skill set is increasing. It is proposed that business courses currently offered do not necessarily consider their target audience or include new economy considerations. This chapter discusses the need for meta-competencies that will allow women in both developed and emerging economies to operate more effectively in a changing work environment and an increasingly digital business environment. For meta-competency efficacy, it is further proposed that evidence-based learning models, gender-sensitive approaches to business learning, and collaborative uses of technology underpin content and (e-)business learning designs.


Author(s):  
Helena Halas ◽  
Tomaž Klobucar

This chapter explores the influence of pervasive computing on companies and their businesses, with the main stress on business models. The role of business models for companies is presented. Introduction to pervasive computing and a survey of existing e-business models classifications are used as a base for our research. The main characteristics of today’s business models are discussed and a method for evaluating business models characteristics is proposed. We concentrate on characteristics of pervasive computing and their influence on companies’ business processes and business models. The present and future business characteristics and business models are briefly compared, and future research directions on pervasive computing and business models are presented.


Author(s):  
Gaya Prasad

Microorganisms are ubiquitous in their presence. They are present in air, soil, water, and all kinds of living creatures. Varieties of microbes have been linked to diseases of humans, animals, and plants. Advances in molecular biology, electronics, nanotechnology, computer sciences, and information technology have made it possible to hybridize these to create ubiquitous devices and biosensors that would indicate presence of microbial agents in water, foods, air, hospitals, animal farms, and other environments. Analyses of microbial genomes and phylogenies have become increasingly important in the tracking and investigation of events leading to spread of microbial diseases and biocrimes. The capability of microorganisms to communicate with similar as well as different microorganisms, the ability to react to the environmental changes, and most of all, the intelligence to manage themselves without the need for supervision during deployment and operation; makes them attractive agents for use in Biosensors. Biosensors such as genetically engineered bacteria have been proven useful. It appears possible to develop biosensors that could detect the presence of biocrime/bioterror agents in diverse environments. Ubiquitous computing technology has the potential to develop integrated small devices which could detect bioterrorism agents. Similarly, pervasive computing could be a tool to monitor the microbial pollution in water, milk, and other edible commodities. Microbial forensics has become an important field for research and development due to increased threats of biocrimes. Microbial forensics requires utilization of diverse data that are acquired through standard processes in distributed locations. Technologies for data production are evolving rapidly, especially with respect to instrumentation and techniques that produce high-resolution data about the molecular constituents of living cells (DNA, mRNA, proteins, and metabolites) that are used as microbial signatures/fingerprints. Both bioinformatics and computational biology have grown over the last 20 years, and diverse database systems and analytical tools have been developed and deployed. Some public domain resources, such as GenBank, have become very important resources of research on a global scale. Effective responses to natural, accidental, or intentional outbreaks of infectious diseases in humans, livestock, and agricultural crops, will require that the information be easily accessed in realtime or near real-time. Flexible, decentralized, modular information system architectures, able to adapt to evolving requirements and available on the Internet, are needed.


Author(s):  
Penny Duquenoy ◽  
Oliver K. Burmeister

There is a growing concern both publicly and professionally surrounding the implementation of Information and Communication Technologies (ICT) and their social and ethical impact. As these technologies become increasingly pervasive and less visible to the user, there is a greater need for professionals to address the concerns in order to regain public trust and maximise the benefits that these technologies can bring. This chapter explores the ethical aspects of the world of pervasive computing and shows the need for an ethical perspective when considering the design and implementation of complex, integrated, multiple systems. We present the background to ethics and technology to give the foundation for our discussion, and refer to current research and ethical principles to provide the argument for ethical consideration. Finally, codes of professional conduct provide the standards, and endorsement, for professional responsibility.


Author(s):  
Lawan Ahmed Mohammed ◽  
Kashif Munir

The change in physical structures of computing facilities into small and portable devices, or even wearable computers, has enhanced ubiquitous information processing. The basic paradigm of such pervasive computing is the combination of strongly decentralized and distributed computing with the help of diversified devices allowing for spontaneous connectivity via the Internet. In general, pervasive computing strives to simplify day-to-day life by providing mobile users with the means to carry out personal and business tasks via mobile and portable devices. This chapter examines the security challenges that are barriers to mainstream pervasive computing and explains why traditional security mechanisms fail to meet the demands of these environments.


Author(s):  
Jonathan G.M. Pratt

This chapter presents the major findings of case study research investigating uncritical assessment of an institution-wide learning management system in an Australian university. Suburban University illustrates the ways in which a range of social and institutional influences, operating internally and externally to an organization, can affect managerial decision making. Many of the parties involved were unaware of the influence of some of these factors upon them at the time of assessment. When these parties also lacked a background in the areas they sought to manage (i.e., the educational enterprise of the university), critical assessment was made even more difficult. Therefore, universities that teach skills in critical assessment to their students can sometimes be uncritical in their own decision making, particularly when the vice chancellor fears “falling behind” other adopting universities and key organizational decision makers lack relevant theoretical frameworks to inform decision making in the areas they manage.


Author(s):  
Deo Prakash Vidyarthi

The proliferation of the capable mobile devices has given the opportunity to utilize these devices for various purposes. The mobile devices being used as a Web portal is its short-term use as these devices have added many features and facility that does not only facilitate communication, but also adds to the huge computing power put together. The chapter proposes how a huge computational grid of these compute capable mobile devices can be formed, and the computing power from such a grid can be extracted. This kind of computational mobile grid put fourth many issues that require great attention before such a concept is fully functional.


Author(s):  
Te Fu Chen

To date, identifying barriers and critical success factors (CSFs) and integrating business model in implementing e-business for SMEs, have not been systematically investigated. Few existing studies have derived their CSFs and business models from large companies’ perspectives, and have not considered the needs of integration for smaller businesses. This chapter is aimed to bridge this gap. Existing studies on CSFs and e-business models were reviewed and their limitations were identified. By integrating insights drawn from these studies, as well as adding some new factors, the author proposed a set of 18 CSFs which is believed to be more useful for SMEs. The importance of the proposed CSFs was theoretically discussed and justified. In addition, a case study was conducted to evaluate the extent of success of this proposition. The overall results from the case study assessment were positive, thus reflecting the appropriateness of the proposed CSFs and integrated models. The set of CSFs and integrated models can act as a list of items and an easy to follow model for SMEs to address when adopting e-business. This helps to ensure that the essential issues and factors are covered during implementation. For academics, it provides a common language for them to discuss, and study the factors crucial for the success of e-business in SMEs. This study is probably the first to provide an integrative perspective of CSFs and integrated model for implementing e-business in the SME sector. It gives valuable information, which hopefully will help this business sector to accomplish e-business visions.


Author(s):  
Antony Glambedakis

This chapter sets out to inform the reader about the impact of pervasive computers in aviation passenger risk profiling. First is an overview of the perception of risk from a passenger perspective, including definitions and general descriptions of risk; and discussion on how perception can influence decisions, and thus behaviour. Then follows a section on profiling, its definition, how it can be done, where it is done, problems that have been encountered with its application, and recent developments in profiling including Australia’s growing involvement in its use. The issue of pervasive computers is interwoven throughout, to highlight its role in passenger profiling. The chapter then discusses the legislation that relates to aviation and concludes by noting that passenger perception of risk and use of profiling techniques is an important factor that needs to be addressed in the application of passenger profiling to risk management in the Australian aviation industry.


Sign in / Sign up

Export Citation Format

Share Document