×
Top Information Technology Management
Research articles in 2020

SEMANTIC MANAGEMENT OF ENTERPRISE INFORMATION SYSTEMS THROUGH ONTOLOGIES

    Valentina Casola and Rosario Catelli, University of Naples Federico II, Italy

    ABSTRACT

    This article introduces a model for cloud-aware enterprise governance with a focus on its semantic aspects. It considers the need for Business-IT/OT and Governance-Security alignments. The proposed model suggests the usage of ontologies as specific tools to address the governance of each IT/OT environment in a holistic way. The concrete utilization of ISO and NIST standards allows to correctly structure the ontological model: in fact, by using these wellknown international standards it is possible to significantly reduce terminological and conceptual inconsistencies already in the design phase of the ontology. This also brings a considerable advantage in the operational management phase of the company certifications, congruently aligned with the knowledge structured in this manner. The semantic support within the model suggests further possible applications in different departments of the company, with the aim of evaluating and managing projects in an optimal way, integrating different but important points of view of stakeholders.

    KEYWORDS

    Cloud, Enterprise, Governance, Information management, Ontology, Semantic systems.


    For More Details :
    https://aircconline.com/csit/papers/vol10/csit101403.pdf


    Volume Link :
    http://airccse.org/csit/V10N14.html




TRUSTED COMPUTING IN DATA SCIENCE: VIABLE COUNTERMEASURE IN RISK MANAGEMENT PLAN

    Uchechukwu Emejeamara1, Udochukwu Nwoduh2and Andrew Madu2
    1IEEE Computer Society, Connecticut Section, USA 1Federal Polytechnic Nekede, Nigeria

    ABSTRACT

    The need for secure data systems has prompted, the constant reinforcement of security systems in the attempt to prevent and mitigate risks associated with information security. The purpose of this paper is to examine the effectiveness of trusted computing in data science as a countermeasure in risk management planning. In the information age, it is evident that companies cannot ignore the impact of data, specifically big data, in the decision making processes. It promotes not only the proactive capacity to prevent unwarranted situations while exploiting opportunities but also the keeping up of the pace of market competition. However, since the overreliance on data exposes the company, trusted computing components are necessary to guarantee that data acquired, stored, and processed remains secure from internal and external malice. Numerous measures can be adopted to counter the risks associated with data exploitation and exposure due to data science practices. Nonetheless, trusted computing is a reasonable point to begin with, in the aim to protect provenance systems and big data systems through the establishment of a ‘chain of trust’ among the various computing components and platforms. The research reveals that trusted computing is most effective when combined with other hardware-based security solutions since attack vectors can follow diverse paths. The results demonstrate the potential that the technology provides for application in risk management.


    KEYWORDS

    Trusted Computing, Security, Data, Data Science, Provenance, Risk Management, Big Data, Trusted Platform Module, Platform Computation Register.


    For More Details :
    https://aircconline.com/csit/papers/vol10/csit100602.pdf


    Volume Link :
    http://airccse.org/csit/V10N06.html




CONTEXTUAL FACTORS INFLUENCING THE DESIGN AND MANAGEMENT OF HEALTH INFORMATION SYSTEMS’ INTEROPERABILITY

    Grace Kobusinge
    Gothenburg University, Sweden & Makerere University, Uganda

    ABSTRACT

    Due to their renowned great information processing and dissemination power, Health information systems (HIS) can readily avail past patient medical information across the continuum of care in order to facilitate ongoing treatment. However, a number of existing HIS are designed as vertical silos with no interoperability onuses and therefore, cannot exchange patient information. At the same time, there is limited knowledge about the intricacies and factors that surround HIS’ interoperability implementations. This study therefore, employs an institutional lens perspective to investigate contextual factors influencing HIS’ interoperability designing. Through this perspective, seven contextual factors were arrived at institutional autonomism, intended system goals, existing health-information-systems, national HIS implementation guidelines, interoperability standards, policy and resources in terms of money and labour. A further study implication is the use of institutional lens in making sense of the institutions’ context of integration in order to discover salient factors that might influence health-information-systems’ interoperability designing.

    KEYWORDS

    Health Information Systems’ Interoperability, Design and Management, Contextual Factors


    For More Details :
    https://aircconline.com/csit/papers/vol10/csit100502.pdf


    Volume Link :
    http://airccse.org/csit/V10N05.html




ROLE OF MULTIMEDIA INFORMATION RETRIEVAL IN PROVIDING A CREDIBLE EVIDENCE FOR DIGITAL FORENSIC INVESTIGATIONS: OPEN SOURCE INTELLIGENCE INVESTIGATION ANALYSIS

    Amr Adel1and Brian Cusack2
    1Whitecliffe College of Technology & Innovation, New Zealand 2Auckland University of Technology, New Zealand

    ABSTRACT

    Enhancements in technologies and shifting trends in customer behaviour have resulted in an increase in the variety, volume, veracity and velocity of available data for conducting digital forensic analysis. In order to conduct intelligent forensic investigation, open source information and entity identification must be collected. Challenge of organised crimes are now involved in drug trafficking, murder, fraud, human trafficking, and high-tech crimes. Criminal Intelligence using Open Source Intelligence Forensic (OSINT) is established to perform data mining and link analysis to trace terrorist activities in critical. In this paper, we will investigate the activities done by a suspect employee. Data mining is to be performed and link analysis as well to confirm all participating parties and contacted persons used in the communications. The proposed solution was to identify the scope of the investigation to limit the results, ensure that expertise and correct tools are ready to be implemented for identifying and collecting potential evidences. This enhanced information and knowledge achieved are of advantage in research. This form of intelligence building can significantly support real world investigations with efficient tools. The major advantage of analysing data links in digital forensics is that there may be case-related information included within unrelated databases.

    KEYWORDS

    Open Source Intelligence, Information Retrieval,Digital Forensics, Cyber-Crimes & Data Mining


    For More Details :
    https://aircconline.com/csit/papers/vol10/csit101002.pdf


    Volume Link :
    http://airccse.org/csit/V10N10.html




A SYSTEMATIC REVIEW OF NATURAL LANGUAGE PROCESSING FOR KNOWLEDGE MANAGEMENT IN HEALTHCARE

    Ganga Prasad Basyal, Bhaskar P Rimal and David Zeng
    Dakota State University, USA

    ABSTRACT

    Driven by the visions of Data Science, recent years have seen a paradigm shift in Natural Language Processing (NLP). NLP has set the milestone in text processing and proved to be the preferred choice for researchers in the healthcare domain. The objective of this paper is to identify the potential of NLP, especially, how NLP is used to support the knowledge management process in the healthcare domain, making data a critical and trusted component in improving the health outcomes. This paper provides a comprehensive survey of the state-of-the-art NLP research with a particular focus on how knowledge is created, captured, shared, and applied in the healthcare domain. Our findings suggest, first, the techniques of NLP those supporting knowledge management extraction and knowledge capture processes in healthcare. Second, we propose a conceptual model for the knowledge extraction process through NLP. Finally, we discuss a set of issues, challenges, and proposed future research areas.

    KEYWORDS

    Knowledge Management, Natural Language Processing, Knowledge Extraction, Knowledge Capture.


    For More Details :
    https://aircconline.com/csit/papers/vol10/csit100921.pdf


    Volume Link :
    http://airccse.org/csit/V10N09.html








Journals by Area

menu
Reach Us

emailsecretary@airccse.org


emailjsecretary@airccj.org

close