SEMANTIC MANAGEMENT OF ENTERPRISE INFORMATION SYSTEMS THROUGH ONTOLOGIES
Valentina Casola and Rosario Catelli, University of Naples Federico II, Italy
This article introduces a model for cloud-aware enterprise governance with a focus on its semantic aspects. It considers the need for Business-IT/OT and Governance-Security alignments. The proposed model suggests the usage of ontologies as specific tools to address the governance of each IT/OT environment in a holistic way. The concrete utilization of ISO and NIST standards allows to correctly structure the ontological model: in fact, by using these wellknown international standards it is possible to significantly reduce terminological and conceptual inconsistencies already in the design phase of the ontology. This also brings a considerable advantage in the operational management phase of the company certifications, congruently aligned with the knowledge structured in this manner. The semantic support within the model suggests further possible applications in different departments of the company, with the aim of evaluating and managing projects in an optimal way, integrating different but important points of view of stakeholders.
Cloud, Enterprise, Governance, Information management, Ontology, Semantic systems.
For More Details :
https://aircconline.com/csit/papers/vol10/csit101403.pdf
Volume Link :
http://airccse.org/csit/V10N14.html
TRUSTED COMPUTING IN DATA SCIENCE: VIABLE COUNTERMEASURE IN RISK MANAGEMENT PLAN
Uchechukwu Emejeamara1, Udochukwu Nwoduh2and Andrew Madu2
1IEEE Computer Society, Connecticut Section, USA
1Federal Polytechnic Nekede, Nigeria
The need for secure data systems has prompted, the constant reinforcement of security systems in the attempt to prevent and mitigate risks associated with information security. The purpose of this paper is to examine the effectiveness of trusted computing in data science as a countermeasure in risk management planning. In the information age, it is evident that companies cannot ignore the impact of data, specifically big data, in the decision making processes. It promotes not only the proactive capacity to prevent unwarranted situations while exploiting opportunities but also the keeping up of the pace of market competition. However, since the overreliance on data exposes the company, trusted computing components are necessary to guarantee that data acquired, stored, and processed remains secure from internal and external malice. Numerous measures can be adopted to counter the risks associated with data exploitation and exposure due to data science practices. Nonetheless, trusted computing is a reasonable point to begin with, in the aim to protect provenance systems and big data systems through the establishment of a ‘chain of trust’ among the various computing components and platforms. The research reveals that trusted computing is most effective when combined with other hardware-based security solutions since attack vectors can follow diverse paths. The results demonstrate the potential that the technology provides for application in risk management.
Trusted Computing, Security, Data, Data Science, Provenance, Risk Management, Big Data, Trusted Platform Module, Platform Computation Register.
For More Details :
https://aircconline.com/csit/papers/vol10/csit100602.pdf
Volume Link :
http://airccse.org/csit/V10N06.html
CONTEXTUAL FACTORS INFLUENCING THE DESIGN AND MANAGEMENT OF HEALTH INFORMATION SYSTEMS’ INTEROPERABILITY
Grace Kobusinge
Gothenburg University, Sweden & Makerere University, Uganda
Due to their renowned great information processing and dissemination power, Health information systems (HIS) can readily avail past patient medical information across the continuum of care in order to facilitate ongoing treatment. However, a number of existing HIS are designed as vertical silos with no interoperability onuses and therefore, cannot exchange patient information. At the same time, there is limited knowledge about the intricacies and factors that surround HIS’ interoperability implementations. This study therefore, employs an institutional lens perspective to investigate contextual factors influencing HIS’ interoperability designing. Through this perspective, seven contextual factors were arrived at institutional autonomism, intended system goals, existing health-information-systems, national HIS implementation guidelines, interoperability standards, policy and resources in terms of money and labour. A further study implication is the use of institutional lens in making sense of the institutions’ context of integration in order to discover salient factors that might influence health-information-systems’ interoperability designing.
Health Information Systems’ Interoperability, Design and Management, Contextual Factors
For More Details :
https://aircconline.com/csit/papers/vol10/csit100502.pdf
Volume Link :
http://airccse.org/csit/V10N05.html
ROLE OF MULTIMEDIA INFORMATION RETRIEVAL IN PROVIDING A CREDIBLE EVIDENCE FOR DIGITAL FORENSIC INVESTIGATIONS: OPEN SOURCE INTELLIGENCE INVESTIGATION ANALYSIS
Amr Adel1and Brian Cusack2
1Whitecliffe College of Technology & Innovation, New Zealand
2Auckland University of Technology, New Zealand
Enhancements in technologies and shifting trends in customer behaviour have resulted in an increase in the variety, volume, veracity and velocity of available data for conducting digital forensic analysis. In order to conduct intelligent forensic investigation, open source information and entity identification must be collected. Challenge of organised crimes are now involved in drug trafficking, murder, fraud, human trafficking, and high-tech crimes. Criminal Intelligence using Open Source Intelligence Forensic (OSINT) is established to perform data mining and link analysis to trace terrorist activities in critical. In this paper, we will investigate the activities done by a suspect employee. Data mining is to be performed and link analysis as well to confirm all participating parties and contacted persons used in the communications. The proposed solution was to identify the scope of the investigation to limit the results, ensure that expertise and correct tools are ready to be implemented for identifying and collecting potential evidences. This enhanced information and knowledge achieved are of advantage in research. This form of intelligence building can significantly support real world investigations with efficient tools. The major advantage of analysing data links in digital forensics is that there may be case-related information included within unrelated databases.
Open Source Intelligence, Information Retrieval,Digital Forensics, Cyber-Crimes & Data Mining
For More Details :
https://aircconline.com/csit/papers/vol10/csit101002.pdf
Volume Link :
http://airccse.org/csit/V10N10.html
A SYSTEMATIC REVIEW OF NATURAL LANGUAGE PROCESSING FOR KNOWLEDGE MANAGEMENT IN HEALTHCARE
Ganga Prasad Basyal, Bhaskar P Rimal and David Zeng
Dakota State University, USA
Driven by the visions of Data Science, recent years have seen a paradigm shift in Natural Language Processing (NLP). NLP has set the milestone in text processing and proved to be the preferred choice for researchers in the healthcare domain. The objective of this paper is to identify the potential of NLP, especially, how NLP is used to support the knowledge management process in the healthcare domain, making data a critical and trusted component in improving the health outcomes. This paper provides a comprehensive survey of the state-of-the-art NLP research with a particular focus on how knowledge is created, captured, shared, and applied in the healthcare domain. Our findings suggest, first, the techniques of NLP those supporting knowledge management extraction and knowledge capture processes in healthcare. Second, we propose a conceptual model for the knowledge extraction process through NLP. Finally, we discuss a set of issues, challenges, and proposed future research areas.
Knowledge Management, Natural Language Processing, Knowledge Extraction, Knowledge Capture.
For More Details :
https://aircconline.com/csit/papers/vol10/csit100921.pdf
Volume Link :
http://airccse.org/csit/V10N09.html
Journals by Area
Conference Publicity
To list your conference in this page, please contact us