Most supervisory control and data acquisition (SCADA) systems have been in operation for decades and they in general have 24times7 availability requirement, hence upgrading or adding new fault tolerant logic into the systems to sustain faults caused by cyber attacks when these systems evolve into a cyber environment is often difficult to achieve. In the proposed approach, an external coordination layer is constructed that only interfaces with the SCADA systems through events and separate from the process under control. The coordination layer is a combination of transparent management of fault-tolerant schemes of critical services of a SCADA system and a model for coordinating different critical services when faults caused by cyber attack occur in that system. In addition, security-related knowledge, such as cyber attack patterns and potential fatal states, etc., are also modeled and built into the coordination layer. The advantages of our approach are twofold: (1) the survivability-related knowledge and protection scheme are built in the coordination layer which is external to the SCADA systems and therefore the disturbance to the underlying systems is greatly reduced; (2) "separation of concern" principle is truly reflected in our model in that fault- tolerance, security and survivability concerns are separated from supervisory and acquisition. In addition, the external coordination model will enable us to accommodate future requirements that may not even be anticipated today.
{"title":"Retrofitting Cyber Physical Systems for Survivability through External Coordination","authors":"Kun Xiao, Shangping Ren, K. Kwiat","doi":"10.1109/HICSS.2008.377","DOIUrl":"https://doi.org/10.1109/HICSS.2008.377","url":null,"abstract":"Most supervisory control and data acquisition (SCADA) systems have been in operation for decades and they in general have 24times7 availability requirement, hence upgrading or adding new fault tolerant logic into the systems to sustain faults caused by cyber attacks when these systems evolve into a cyber environment is often difficult to achieve. In the proposed approach, an external coordination layer is constructed that only interfaces with the SCADA systems through events and separate from the process under control. The coordination layer is a combination of transparent management of fault-tolerant schemes of critical services of a SCADA system and a model for coordinating different critical services when faults caused by cyber attack occur in that system. In addition, security-related knowledge, such as cyber attack patterns and potential fatal states, etc., are also modeled and built into the coordination layer. The advantages of our approach are twofold: (1) the survivability-related knowledge and protection scheme are built in the coordination layer which is external to the SCADA systems and therefore the disturbance to the underlying systems is greatly reduced; (2) \"separation of concern\" principle is truly reflected in our model in that fault- tolerance, security and survivability concerns are separated from supervisory and acquisition. In addition, the external coordination model will enable us to accommodate future requirements that may not even be anticipated today.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115759180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The already huge number of blogs in existence is increasing rapidly, and many users are struggling to find a way to keep up with the expansion. A number of existing tools aim to capture the general topics of all currently popular topics among the entire blogosphere, while others allow individuals to read a fixed list of blogs. However, few personalized tools exist to help the individual get an overview of the specific blogs he or she reads. This paper presents the concept of social topic extraction via the Smarter Blogroll, which displays current topics for a selection of blogs. While there was little difference in users' ability to identify topics using the smarter blogroll, the results of our user study point to design recommendations for improving the use of metadata within blogroll entries, thereby facilitating blog reading. The paper concludes with implications for the design of tools to aid in blog navigation and reading, as well as recommended directions for future research.
{"title":"Smarter Blogroll: An Exploration of Social Topic Extraction for Manageable Blogrolls","authors":"E. Baumer, Danyel Fisher","doi":"10.1109/HICSS.2008.398","DOIUrl":"https://doi.org/10.1109/HICSS.2008.398","url":null,"abstract":"The already huge number of blogs in existence is increasing rapidly, and many users are struggling to find a way to keep up with the expansion. A number of existing tools aim to capture the general topics of all currently popular topics among the entire blogosphere, while others allow individuals to read a fixed list of blogs. However, few personalized tools exist to help the individual get an overview of the specific blogs he or she reads. This paper presents the concept of social topic extraction via the Smarter Blogroll, which displays current topics for a selection of blogs. While there was little difference in users' ability to identify topics using the smarter blogroll, the results of our user study point to design recommendations for improving the use of metadata within blogroll entries, thereby facilitating blog reading. The paper concludes with implications for the design of tools to aid in blog navigation and reading, as well as recommended directions for future research.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122131000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fuminori Kimura, Akira Maeda, K. Hatano, Jun Miyazaki, Shunsuke Uemura
In this paper, we propose a cross-language information retrieval (CLIR) method based on estimating for domains of the query using hierarchic structures of Web directories. To get the most appropriate translation of the queries, we utilize the Web directories written in many different languages as multilingual corpus for disambiguating translation of the query and for estimating the domain of search results using hierarchic structures of Web directories. From experimental evaluations, we found that there is an advantage in retrieval accuracy using our proposal for disambiguating translation in CLIR system. We found that it is effective to restrict to target fields of the query using lower level merged categories in order to acquire suited translation of the query.
{"title":"Cross-Language Information Retrieval by Domain Restriction Using Web Directory Structure","authors":"Fuminori Kimura, Akira Maeda, K. Hatano, Jun Miyazaki, Shunsuke Uemura","doi":"10.1109/HICSS.2008.108","DOIUrl":"https://doi.org/10.1109/HICSS.2008.108","url":null,"abstract":"In this paper, we propose a cross-language information retrieval (CLIR) method based on estimating for domains of the query using hierarchic structures of Web directories. To get the most appropriate translation of the queries, we utilize the Web directories written in many different languages as multilingual corpus for disambiguating translation of the query and for estimating the domain of search results using hierarchic structures of Web directories. From experimental evaluations, we found that there is an advantage in retrieval accuracy using our proposal for disambiguating translation in CLIR system. We found that it is effective to restrict to target fields of the query using lower level merged categories in order to acquire suited translation of the query.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"610 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131656408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article demonstrates the way in which knowledge management system (KMS) quality influences effective competitive advantage through decision making and through organizational learning. The results indicate strong support for the research model consisting of the independent variable (KMS quality) and the dependent variables (decision making, organization learning capability and competitive advantage). The model explains respectively 45% of the decision making, 41% of the organization learning capability and 78% of the competitive advantage variance. It concludes that KMS quality plays an important role in sustaining competitive advantage. In light of these findings, implications for theory and practice are discussed.
{"title":"KMS Quality Impact on Competitive Advantage","authors":"Belbaly Nassim","doi":"10.1109/HICSS.2008.225","DOIUrl":"https://doi.org/10.1109/HICSS.2008.225","url":null,"abstract":"This article demonstrates the way in which knowledge management system (KMS) quality influences effective competitive advantage through decision making and through organizational learning. The results indicate strong support for the research model consisting of the independent variable (KMS quality) and the dependent variables (decision making, organization learning capability and competitive advantage). The model explains respectively 45% of the decision making, 41% of the organization learning capability and 78% of the competitive advantage variance. It concludes that KMS quality plays an important role in sustaining competitive advantage. In light of these findings, implications for theory and practice are discussed.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133351575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Personalization is a phenomenon that intrigues and confuses. Personalized offerings promise customer attention, loyalty and safe haven against commoditization. However, these promises do not materialize unless customers accept personalization as a means to enhance their consuming experience. Three points of views are offered to personalization in this paper. An analysis of various personalization concepts shows that the basic concept of personalization is reaching maturity even though fresh views are added to it, e.g. context-based personalization. Secondly, a text-mining based approach profiles the personalization research based on bibliometric data on nearly 800 articles, and indicates that the research field is fairly fragmented, and that mass customization and customization research clearly diverges from personalization research. Based on a selection of articles, a further analysis classifies the type of research and research contexts that are the most common. Finally, this research also suggests a conceptualization of personalization.
{"title":"What, Who and Where: Insights into Personalization","authors":"Anne Sunikka, J. Bragge","doi":"10.1109/HICSS.2008.500","DOIUrl":"https://doi.org/10.1109/HICSS.2008.500","url":null,"abstract":"Personalization is a phenomenon that intrigues and confuses. Personalized offerings promise customer attention, loyalty and safe haven against commoditization. However, these promises do not materialize unless customers accept personalization as a means to enhance their consuming experience. Three points of views are offered to personalization in this paper. An analysis of various personalization concepts shows that the basic concept of personalization is reaching maturity even though fresh views are added to it, e.g. context-based personalization. Secondly, a text-mining based approach profiles the personalization research based on bibliometric data on nearly 800 articles, and indicates that the research field is fairly fragmented, and that mass customization and customization research clearly diverges from personalization research. Based on a selection of articles, a further analysis classifies the type of research and research contexts that are the most common. Finally, this research also suggests a conceptualization of personalization.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121312782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The number of publications in biomedicine is increasing enormously each year. To help researchers digest the information in these documents, text mining tools are being developed that present co-occurrence relations between concepts. Statistical measures are used to mine interesting subsets of relations. We demonstrate how directionality of these relations affects interestingness. Support and confidence, simple data mining statistics, are used as proxies for interestingness metrics. We first built a test bed of 126,404 directional relations extracted from biomedical abstracts, which we represent as graphs containing a central starting concept and 2 rings of associated relations. We manipulated directionality in four ways and randomly selected 100 starting concepts as a test sample for each graph type. Finally, we calculated the number of relations and their support and confidence. Variation in directionality significantly affected the number of relations as well as the support and confidence of the four graph types.
{"title":"The Impact of Directionality in Predications on Text Mining","authors":"G. Leroy, M. Fiszman, T. Rindflesch","doi":"10.1109/hicss.2008.443","DOIUrl":"https://doi.org/10.1109/hicss.2008.443","url":null,"abstract":"The number of publications in biomedicine is increasing enormously each year. To help researchers digest the information in these documents, text mining tools are being developed that present co-occurrence relations between concepts. Statistical measures are used to mine interesting subsets of relations. We demonstrate how directionality of these relations affects interestingness. Support and confidence, simple data mining statistics, are used as proxies for interestingness metrics. We first built a test bed of 126,404 directional relations extracted from biomedical abstracts, which we represent as graphs containing a central starting concept and 2 rings of associated relations. We manipulated directionality in four ways and randomly selected 100 starting concepts as a test sample for each graph type. Finally, we calculated the number of relations and their support and confidence. Variation in directionality significantly affected the number of relations as well as the support and confidence of the four graph types.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115376669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amelia Maurizio, James Sager, Peter Jones, G. Corbitt, L. Girolami
Today, the means for attaining competitive advantage with information technology (IT) has shifted from efficiently managing the organization's operations to discovering ways to collaborate with industry partners to provide products and services to markets that are otherwise uneconomical to pursue. Current IT challenges center on ways to integrate diverse systems into function rich business processes that span organizational boundaries. Though service oriented architecture (SOA) is poised to become a mainstream technology, its success may hinge on a meeting of the minds between the architects and developers of Web services and business process modelers who map out corporate requirements. This paper defines SOA, discusses how SOA relates to business process management, and provides an illustration of enterprise SOA applied in an enterprise resource planning (ERP) environment. The paper also describes how SOA motivates change in IT governance, enumerates the fundamentals of SOA success, and reflects on implications for IT education.
{"title":"Service Oriented Architecture: Challenges for Business and Academia","authors":"Amelia Maurizio, James Sager, Peter Jones, G. Corbitt, L. Girolami","doi":"10.1109/HICSS.2008.387","DOIUrl":"https://doi.org/10.1109/HICSS.2008.387","url":null,"abstract":"Today, the means for attaining competitive advantage with information technology (IT) has shifted from efficiently managing the organization's operations to discovering ways to collaborate with industry partners to provide products and services to markets that are otherwise uneconomical to pursue. Current IT challenges center on ways to integrate diverse systems into function rich business processes that span organizational boundaries. Though service oriented architecture (SOA) is poised to become a mainstream technology, its success may hinge on a meeting of the minds between the architects and developers of Web services and business process modelers who map out corporate requirements. This paper defines SOA, discusses how SOA relates to business process management, and provides an illustration of enterprise SOA applied in an enterprise resource planning (ERP) environment. The paper also describes how SOA motivates change in IT governance, enumerates the fundamentals of SOA success, and reflects on implications for IT education.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116022052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As electronic government is increasing its momentum internationally, there is a growing need for the systematic management of the newly defined and constantly transforming services. eGovernment interoperability frameworks usually cater for the technical standards of eGovernment systems interconnection, but do not address service composition and use by citizens, businesses or other administrations. An interoperability registry is a system devoted to the formal description, composition and publishing of traditional or electronic services, together with the relevant document and process descriptions in an integrated schema. Through such a repository, the discovery of services by users or systems can be automated, resulting in an important tool for managing eGovernment transformation towards achieving interoperability. The paper goes beyond the methodology and tools used for developing such a system for the Greek government, to population with services and documents, application and extraction of useful conclusions for electronic government transformation at global level.
{"title":"Interoperability Registries in eGovernment: Developing a Semantically Rich Repository for Electronic Services and Documents of the New Public Administration","authors":"Y. Charalabidis, D. Askounis","doi":"10.1109/HICSS.2008.218","DOIUrl":"https://doi.org/10.1109/HICSS.2008.218","url":null,"abstract":"As electronic government is increasing its momentum internationally, there is a growing need for the systematic management of the newly defined and constantly transforming services. eGovernment interoperability frameworks usually cater for the technical standards of eGovernment systems interconnection, but do not address service composition and use by citizens, businesses or other administrations. An interoperability registry is a system devoted to the formal description, composition and publishing of traditional or electronic services, together with the relevant document and process descriptions in an integrated schema. Through such a repository, the discovery of services by users or systems can be automated, resulting in an important tool for managing eGovernment transformation towards achieving interoperability. The paper goes beyond the methodology and tools used for developing such a system for the Greek government, to population with services and documents, application and extraction of useful conclusions for electronic government transformation at global level.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115171584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Operating systems and data protection tools are employing sophisticated password derived encryption key techniques in order to encrypt data. Such techniques impose a significant computational burden on forensic tools that attempt dictionary attacks are requiring cryptographic hash generation functions to be called several thousand times for each password attempted. In order to improve throughput, forensic analysis tools are designed to operate in a distributed manner over a dedicated network of workstations. This paper describes an FPGA-based hardware implementation of the standard CPSK#5 technique published by RSA Laboratories for generating password-derived encryption keys. This is the most computationally demanding step required when performing a dictionary attack on modern password-protected systems. The initial FPGA implementation incorporates four password-derived encryption key generation units operating at a frequency of 150 MHz and is capable of processing over 510 passwords per second. The implementation's performance can be easily improved by incorporating additional key generation units.
{"title":"Using FPGAs to Parallelize Dictionary Attacks for Password Cracking","authors":"Yoginder S. Dandass","doi":"10.1109/HICSS.2008.484","DOIUrl":"https://doi.org/10.1109/HICSS.2008.484","url":null,"abstract":"Operating systems and data protection tools are employing sophisticated password derived encryption key techniques in order to encrypt data. Such techniques impose a significant computational burden on forensic tools that attempt dictionary attacks are requiring cryptographic hash generation functions to be called several thousand times for each password attempted. In order to improve throughput, forensic analysis tools are designed to operate in a distributed manner over a dedicated network of workstations. This paper describes an FPGA-based hardware implementation of the standard CPSK#5 technique published by RSA Laboratories for generating password-derived encryption keys. This is the most computationally demanding step required when performing a dictionary attack on modern password-protected systems. The initial FPGA implementation incorporates four password-derived encryption key generation units operating at a frequency of 150 MHz and is capable of processing over 510 passwords per second. The implementation's performance can be easily improved by incorporating additional key generation units.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116783071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
It is well known that software piracy is widespread. While the existing research on this subject has applied a number of theories in order to understand and prevent such an act, this text presents an alternative perspective by advancing two criminological theories. More specifically, a novel theoretical model is advanced, drawing on these theories entitled Techniques of 'Neutralization and Differential Association Theory. The former helps to explain how individuals are able to rationalize their criminal behaviour in a manner which absolves them of pressures from social norms and internal controls such as feelings of guilt and shame. The latter explains how criminality is developed through a learning process taking place in personal groups. While empirical research is needed to test the model further, it is argued that these theories offer both an alternative perspective on the intention to commit software piracy, but also potentially open up new avenues for preventing this crime.
{"title":"Software Piracy: Original Insights from a Criminological Perspective","authors":"R. Willison, M. Siponen","doi":"10.1109/HICSS.2008.407","DOIUrl":"https://doi.org/10.1109/HICSS.2008.407","url":null,"abstract":"It is well known that software piracy is widespread. While the existing research on this subject has applied a number of theories in order to understand and prevent such an act, this text presents an alternative perspective by advancing two criminological theories. More specifically, a novel theoretical model is advanced, drawing on these theories entitled Techniques of 'Neutralization and Differential Association Theory. The former helps to explain how individuals are able to rationalize their criminal behaviour in a manner which absolves them of pressures from social norms and internal controls such as feelings of guilt and shame. The latter explains how criminality is developed through a learning process taking place in personal groups. While empirical research is needed to test the model further, it is argued that these theories offer both an alternative perspective on the intention to commit software piracy, but also potentially open up new avenues for preventing this crime.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115427793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}