首页 > 最新文献

Proceedings of the 6th International Conference on Information Technology and Multimedia最新文献

英文 中文
Financial impacts of smart meter security and privacy breach 智能电表安全和隐私泄露对财务的影响
S. Yussof, M. Rusli, Yunus Yusoff, Roslan Ismail, Azimah Abdul Ghapar
Many power utility companies around the world are moving towards smart grid, which integrates power delivery infrastructure with information and communication technologies. Smart meter is one of the main components of smart grid. The task of a smart meter is to track energy consumption of a premise and send that information to the utility company. Although the use of smart meter has many benefits, there are a number of security concerns regarding its usage. One particular concern is regarding the impacts of security and privacy breach of smart meter. This paper focuses on the financial impacts of smart meter security and privacy breach. The financial impacts discussed in this paper are derived from the impacts of security and privacy breach described in the literature. It is found out that the financial loss may involve various parties including the premise owner, the utility company, as well as the nation. The amount of loss can also go up to billions of dollars. Given the large group of people who may be involved and the large amount of money to be potentially lost should a security or privacy breach occur, it is very important for power companies to establish a security policy regarding smart meter and to allocate reasonable amount of resources to secure the deployed smart meter as well as the rest of the smart grid infrastructure.
智能电网是一种将电力输送基础设施与信息通信技术相结合的技术,世界上许多电力公司都在朝着智能电网的方向发展。智能电表是智能电网的主要组成部分之一。智能电表的任务是跟踪房屋的能源消耗,并将该信息发送给公用事业公司。虽然使用智能电表有很多好处,但它的使用也存在一些安全问题。一个特别关注的问题是智能电表的安全和隐私泄露的影响。本文主要讨论了智能电表安全和隐私泄露对财务的影响。本文讨论的财务影响来源于文献中描述的安全和隐私泄露的影响。据了解,经济损失可能涉及多方面,包括业主,公用事业公司,以及国家。损失金额也可能高达数十亿美元。考虑到可能涉及的大量人员以及一旦发生安全或隐私泄露可能造成的大量资金损失,电力公司制定有关智能电表的安全政策并分配合理的资源来确保部署的智能电表以及其他智能电网基础设施的安全是非常重要的。
{"title":"Financial impacts of smart meter security and privacy breach","authors":"S. Yussof, M. Rusli, Yunus Yusoff, Roslan Ismail, Azimah Abdul Ghapar","doi":"10.1109/ICIMU.2014.7066595","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066595","url":null,"abstract":"Many power utility companies around the world are moving towards smart grid, which integrates power delivery infrastructure with information and communication technologies. Smart meter is one of the main components of smart grid. The task of a smart meter is to track energy consumption of a premise and send that information to the utility company. Although the use of smart meter has many benefits, there are a number of security concerns regarding its usage. One particular concern is regarding the impacts of security and privacy breach of smart meter. This paper focuses on the financial impacts of smart meter security and privacy breach. The financial impacts discussed in this paper are derived from the impacts of security and privacy breach described in the literature. It is found out that the financial loss may involve various parties including the premise owner, the utility company, as well as the nation. The amount of loss can also go up to billions of dollars. Given the large group of people who may be involved and the large amount of money to be potentially lost should a security or privacy breach occur, it is very important for power companies to establish a security policy regarding smart meter and to allocate reasonable amount of resources to secure the deployed smart meter as well as the rest of the smart grid infrastructure.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115623267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Web-based learning tool for primary school student with dyscalculia 为有计算障碍的小学生设计的网络学习工具
Mohamad Firdaus Che Abdul Rani, Rizawati Rohizan, Nor Azlina Abd Rahman
Web-based learning tool provides incorporated environment of various technologies to support diverse instructor and learner needs via the Internet. Electronic learning materials can be accessed easily by normal students but not for dyslexic students. This is because student with Dyslexia needs more attention and guidance from the instructor and special tool is needed to improve their learning environment. This paper proposed the design for a Math Web-based learning tool based on pedagogical techniques for dyscalculia.
基于网络的学习工具提供了多种技术的集成环境,通过互联网支持不同的教师和学习者的需求。正常学生可以很容易地使用电子学习材料,但读写困难的学生却不能。这是因为有阅读障碍的学生需要教师更多的关注和指导,需要特殊的工具来改善他们的学习环境。本文提出了一个基于计算障碍教学技术的基于网络的数学学习工具的设计。
{"title":"Web-based learning tool for primary school student with dyscalculia","authors":"Mohamad Firdaus Che Abdul Rani, Rizawati Rohizan, Nor Azlina Abd Rahman","doi":"10.1109/ICIMU.2014.7066622","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066622","url":null,"abstract":"Web-based learning tool provides incorporated environment of various technologies to support diverse instructor and learner needs via the Internet. Electronic learning materials can be accessed easily by normal students but not for dyslexic students. This is because student with Dyslexia needs more attention and guidance from the instructor and special tool is needed to improve their learning environment. This paper proposed the design for a Math Web-based learning tool based on pedagogical techniques for dyscalculia.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113966075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Stress treatment: The effectiveness between guided and non-guided virtual reality setup 应力处理:引导和非引导虚拟现实设置之间的有效性
Ahmad Redza Razieff Zainudin, Azmi Bin Mohd Yusof, M. Rusli, Mohd Zaliman Mohd Yusof, Imran Mahalil
This paper shares an author's findings on the effectiveness between guided and non-guided virtual reality setups during stress treatment. In the first setup, users are guided so that their virtual navigations are automatically controlled by a computer. On the other hand, in the second setup, users are allowed to move freely within a pre-set boundary. Findings obtained from this study, will be used for stress treatments' in future references toward establishing an effective treatment setup. Twelve random users participated in this guided setup and the same number of other users participated in the non-guided treatment setup.
本文分享了作者关于在压力治疗中引导和非引导虚拟现实设置的有效性的研究结果。在第一个设置中,用户被引导,因此他们的虚拟导航是由计算机自动控制的。另一方面,在第二种设置中,用户可以在预先设定的边界内自由移动。本研究的结果将用于今后建立有效治疗机制的应激治疗。12名随机用户参加了这种引导设置,同样数量的其他用户参加了非引导治疗设置。
{"title":"Stress treatment: The effectiveness between guided and non-guided virtual reality setup","authors":"Ahmad Redza Razieff Zainudin, Azmi Bin Mohd Yusof, M. Rusli, Mohd Zaliman Mohd Yusof, Imran Mahalil","doi":"10.1109/ICIMU.2014.7066662","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066662","url":null,"abstract":"This paper shares an author's findings on the effectiveness between guided and non-guided virtual reality setups during stress treatment. In the first setup, users are guided so that their virtual navigations are automatically controlled by a computer. On the other hand, in the second setup, users are allowed to move freely within a pre-set boundary. Findings obtained from this study, will be used for stress treatments' in future references toward establishing an effective treatment setup. Twelve random users participated in this guided setup and the same number of other users participated in the non-guided treatment setup.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116592031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance evaluation of IEEE 802.15.6 MAC in WBANs - A case study IEEE 802.15.6 MAC在无线宽带网络中的性能评估-一个案例研究
Areej Al-Mazroa, N. Rikli
IEEE 802.15.6 standard has emerged as the most suitable standard that fits the special requirements of WBANs. Although the published IEEE 802.15.6 standard draft provides flexibility to designers by recommending the use of several MAC layer techniques, it does not specify how to combine some or all of these recommended techniques to form the most efficient WBAN MAC for a specific scenario. Our main objective here is to combine various MAC techniques in an adaptive way that takes into consideration the types of sensors, their number, and their traffic and energy requirements. The performance of the proposed techniques will be evaluated using some of the standard performance measures such as throughput, delay and energy consumption.
IEEE 802.15.6标准作为最适合wban特殊需求的标准应运而生。虽然已发布的IEEE 802.15.6标准草案通过推荐使用几种MAC层技术为设计人员提供了灵活性,但它并没有指定如何将这些推荐技术中的一些或全部结合起来,以形成针对特定场景的最有效的WBAN MAC。我们的主要目标是以一种自适应的方式结合各种MAC技术,同时考虑到传感器的类型、数量、流量和能源需求。所提出的技术的性能将使用一些标准性能度量来评估,例如吞吐量、延迟和能耗。
{"title":"Performance evaluation of IEEE 802.15.6 MAC in WBANs - A case study","authors":"Areej Al-Mazroa, N. Rikli","doi":"10.1109/ICIMU.2014.7066605","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066605","url":null,"abstract":"IEEE 802.15.6 standard has emerged as the most suitable standard that fits the special requirements of WBANs. Although the published IEEE 802.15.6 standard draft provides flexibility to designers by recommending the use of several MAC layer techniques, it does not specify how to combine some or all of these recommended techniques to form the most efficient WBAN MAC for a specific scenario. Our main objective here is to combine various MAC techniques in an adaptive way that takes into consideration the types of sensors, their number, and their traffic and energy requirements. The performance of the proposed techniques will be evaluated using some of the standard performance measures such as throughput, delay and energy consumption.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114959465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Parallel Laplacian filter using CUDA on GP-GPU 基于CUDA的GP-GPU并行拉普拉斯滤波
Mishal Almazrooie, R. Abdullah, L. Yi, Ibrahim Venkat, Zahraa Adnan
Parallel programming has been extensively applied to different fields, such as medicine, security, and image processing. This paper focuses on parallelizing the Laplacian filter, an edge detection algorithm, using CUDA. We have conducted a performance analysis to benchmark the sequential Laplacian version against the CUDA parallel approach. Results show that the parallelization of Laplacian filter achieves better performance than sequential code. CUDA approach achieved 200 fold speedup for an image size of 50MB when 216 processing elements were deployed.
并行编程已经广泛应用于不同的领域,如医学、安全、图像处理等。本文重点研究了利用CUDA并行化边缘检测算法拉普拉斯滤波。我们对顺序拉普拉斯版本和CUDA并行方法进行了性能分析。结果表明,并行化的拉普拉斯滤波比顺序编码的性能更好。当部署216个处理元素时,CUDA方法在50MB大小的图像上实现了200倍的加速。
{"title":"Parallel Laplacian filter using CUDA on GP-GPU","authors":"Mishal Almazrooie, R. Abdullah, L. Yi, Ibrahim Venkat, Zahraa Adnan","doi":"10.1109/ICIMU.2014.7066604","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066604","url":null,"abstract":"Parallel programming has been extensively applied to different fields, such as medicine, security, and image processing. This paper focuses on parallelizing the Laplacian filter, an edge detection algorithm, using CUDA. We have conducted a performance analysis to benchmark the sequential Laplacian version against the CUDA parallel approach. Results show that the parallelization of Laplacian filter achieves better performance than sequential code. CUDA approach achieved 200 fold speedup for an image size of 50MB when 216 processing elements were deployed.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115453295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Strategic information systems planning for RFID implementation in Hajj management systems 在朝觐管理系统中实施RFID的战略信息系统规划
Abdullah Hussein Al-Hashedi, Muhammad Rafie Mohd. Arshad, A. S. Baharudin, H. Mohamed, Omar Osman
The growing number of radio frequency identification (RFID) applications in various industrial fields makes the development of strategic information systems planning (SISP) for the implementation process is essential. Hajj (pilgrimage) sector is one of sectors that would benefit from RFID system implementation through several applications. Without a good plan for the implementation process, it would be difficult to reap a lot of benefits expected from the use of this technology. For this reason, this study proposed a model of SISP for RFID implementation in Hajj management systems. This model assists Hajj management authorities and any related Hajj organization wishing to implement RFID system to better understand and prepare for RFID implementation. It provides guidelines for RFID implementation in Hajj management systems with an emphasis on implementation issues that are needed to be considered such as RFID implementation scenario and RFID data sharing. We hope that the proposed model will provide Hajj organizers with knowledge needed for the implementation of RFID technology in Hajj management.
射频识别(RFID)在各个工业领域的应用越来越多,使得制定战略信息系统规划(SISP)对于实施过程至关重要。朝觐(朝圣)部门是将受益于RFID系统实施的几个应用部门之一。如果没有实现过程的良好计划,就很难从使用该技术中获得预期的许多好处。因此,本研究提出了一个用于RFID在朝觐管理系统中实施的SISP模型。本模型有助于朝觐管理当局和任何希望实施RFID系统的相关朝觐组织更好地了解和准备RFID的实施。它提供了在朝觐管理系统中实施RFID的指导方针,重点是需要考虑的实施问题,如RFID实施方案和RFID数据共享。我们希望所提出的模型将为朝觐组织者提供在朝觐管理中实施RFID技术所需的知识。
{"title":"Strategic information systems planning for RFID implementation in Hajj management systems","authors":"Abdullah Hussein Al-Hashedi, Muhammad Rafie Mohd. Arshad, A. S. Baharudin, H. Mohamed, Omar Osman","doi":"10.1109/ICIMU.2014.7066620","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066620","url":null,"abstract":"The growing number of radio frequency identification (RFID) applications in various industrial fields makes the development of strategic information systems planning (SISP) for the implementation process is essential. Hajj (pilgrimage) sector is one of sectors that would benefit from RFID system implementation through several applications. Without a good plan for the implementation process, it would be difficult to reap a lot of benefits expected from the use of this technology. For this reason, this study proposed a model of SISP for RFID implementation in Hajj management systems. This model assists Hajj management authorities and any related Hajj organization wishing to implement RFID system to better understand and prepare for RFID implementation. It provides guidelines for RFID implementation in Hajj management systems with an emphasis on implementation issues that are needed to be considered such as RFID implementation scenario and RFID data sharing. We hope that the proposed model will provide Hajj organizers with knowledge needed for the implementation of RFID technology in Hajj management.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125302373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Degradation enhancement for the captured document image using retinex theory 使用视网膜理论对捕获的文档图像进行退化增强
M. Wagdy, I. Faye, D. Rohaya
The state-of-arts global thresholding techniques are fast and efficient to convert the gray scale document image into a binary image. However, they are unsuitable for complex and degraded documents. Moreover, global thresholding techniques produce border noise when the illumination of the document is not uniform. Other methods that depend on local thresholding techniques are efficient in the case of degraded document images, but have common disadvantages include the dependence on the region size and the image characteristics, and the computational time. In this paper we propose a method to overcome the limitations of the related global and local threshold techniques by using the concept of Retinex theory based on Median filter which can effectively enhance the degraded and poor quality document image. High quality results in terms of visual criteria and OCR performance is produced compared to the previous works.
采用当前最先进的全局阈值分割技术,可以快速有效地将灰度文档图像转换为二值图像。然而,它们不适用于复杂和退化的文件。此外,当文档的光照不均匀时,全局阈值分割技术会产生边界噪声。其他依赖于局部阈值技术的方法在文档图像退化的情况下是有效的,但有共同的缺点,包括对区域大小和图像特征的依赖,以及计算时间。本文提出了一种基于中值滤波的Retinex理论的方法,克服了相关的全局和局部阈值技术的局限性,可以有效地增强退化的、质量较差的文档图像。与以前的作品相比,在视觉标准和OCR性能方面产生了高质量的结果。
{"title":"Degradation enhancement for the captured document image using retinex theory","authors":"M. Wagdy, I. Faye, D. Rohaya","doi":"10.1109/ICIMU.2014.7066660","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066660","url":null,"abstract":"The state-of-arts global thresholding techniques are fast and efficient to convert the gray scale document image into a binary image. However, they are unsuitable for complex and degraded documents. Moreover, global thresholding techniques produce border noise when the illumination of the document is not uniform. Other methods that depend on local thresholding techniques are efficient in the case of degraded document images, but have common disadvantages include the dependence on the region size and the image characteristics, and the computational time. In this paper we propose a method to overcome the limitations of the related global and local threshold techniques by using the concept of Retinex theory based on Median filter which can effectively enhance the degraded and poor quality document image. High quality results in terms of visual criteria and OCR performance is produced compared to the previous works.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126069057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Embedding organizational culture values towards successful business continuity management (BCM) implementation 为成功实施业务连续性管理(BCM),嵌入组织文化价值观
Noorul Halimin Mansol, N. M. Alwi, W. Ismail
Today's increased reliance on Information and Communications Technology (ICT) has raised the expectations for service quality, reliability and availability. Such expectations have introduced BCM as a crucial requirement for organizations. BCM is a management process that helps in improving the organization's resilience to interruptions caused by information security threats. The implementation of BCM not only involves the information technology (IT) department, but also business areas that use IT services. BCM however, only receives attention with the support and direction from top management whenever it is required for regulatory compliance. Therefore this paper aims to explore and identify the effects of organizational culture on the successful implementation of BCM in Malaysian organizations. Quantitative surveys have been distributed to 300 participants with varying roles within the organizational hierarchy. 22 Malaysian IT organizations and departments have been selected to participate in the survey. The survey explores the organization employee's view on the importance and effect of organizational culture on BCM implementation. The results indicate that cultural factors greatly impact and play an important role to the organization in terms of BCM readiness and implementation. The results are useful as a guidance for organizations in Malaysia specifically to monitor security incidents or threats which may arise not only from technicalities but also human complexity. The results may also aid in the preparation of organizational guidelines regarding readiness towards BCM implementation.
今天对信息和通信技术(ICT)的日益依赖提高了对服务质量、可靠性和可用性的期望。这样的期望使得BCM成为组织的关键需求。BCM是一个管理过程,有助于提高组织对由信息安全威胁引起的中断的弹性。BCM的实现不仅涉及信息技术(IT)部门,还涉及使用IT服务的业务领域。然而,BCM只有在符合法规要求时才得到最高管理层的支持和指导。因此,本文旨在探讨和确定组织文化对马来西亚组织成功实施BCM的影响。已向300名在组织层级中扮演不同角色的参与者分发了数量调查。22个马来西亚的IT机构和部门被选中参与调查。调查探讨了组织员工对组织文化对实施BCM的重要性和作用的看法。结果表明,文化因素对组织在BCM准备和实施方面有很大的影响和发挥重要作用。这些结果对于马来西亚的组织来说是有用的指导,特别是监控安全事件或威胁,这些事件或威胁可能不仅来自技术问题,而且来自人类的复杂性。研究结果还有助于编制关于BCM实施准备情况的组织指导方针。
{"title":"Embedding organizational culture values towards successful business continuity management (BCM) implementation","authors":"Noorul Halimin Mansol, N. M. Alwi, W. Ismail","doi":"10.1109/ICIMU.2014.7066599","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066599","url":null,"abstract":"Today's increased reliance on Information and Communications Technology (ICT) has raised the expectations for service quality, reliability and availability. Such expectations have introduced BCM as a crucial requirement for organizations. BCM is a management process that helps in improving the organization's resilience to interruptions caused by information security threats. The implementation of BCM not only involves the information technology (IT) department, but also business areas that use IT services. BCM however, only receives attention with the support and direction from top management whenever it is required for regulatory compliance. Therefore this paper aims to explore and identify the effects of organizational culture on the successful implementation of BCM in Malaysian organizations. Quantitative surveys have been distributed to 300 participants with varying roles within the organizational hierarchy. 22 Malaysian IT organizations and departments have been selected to participate in the survey. The survey explores the organization employee's view on the importance and effect of organizational culture on BCM implementation. The results indicate that cultural factors greatly impact and play an important role to the organization in terms of BCM readiness and implementation. The results are useful as a guidance for organizations in Malaysia specifically to monitor security incidents or threats which may arise not only from technicalities but also human complexity. The results may also aid in the preparation of organizational guidelines regarding readiness towards BCM implementation.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131854611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A proposed norms' benefits awareness framework for norms adoption 提出规范采用的规范利益意识框架
Al-Mutazbellah Khamees Itaiwi, M. S. Ahmad, Alicia Y. C. Tang, M. Mahmoud
Several works have been conducted on norms detection and identification, but almost none has been found to explore the concept of norm's benefit awareness that triggers agents' belief to adopt new norms. The literature discuss norms' adoption by agents which are not aware of the benefits of the adopted norms, but use some mining algorithms to identify the norms from a set of observed events. In this paper, we propose a novel solution to this problem that calculates the benefit of a norm to its utility and subsequently decides to adopt or reject the norm.
在规范检测和识别方面已经进行了一些研究,但几乎没有研究发现规范的利益意识这一概念会引发行为人采纳新规范的信念。文献讨论了不知道所采用规范的好处的代理采用规范,而是使用一些挖掘算法从一组观察到的事件中识别规范。在本文中,我们提出了一种新的解决方案,即计算规范对其效用的收益,然后决定采用或拒绝该规范。
{"title":"A proposed norms' benefits awareness framework for norms adoption","authors":"Al-Mutazbellah Khamees Itaiwi, M. S. Ahmad, Alicia Y. C. Tang, M. Mahmoud","doi":"10.1109/ICIMU.2014.7066646","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066646","url":null,"abstract":"Several works have been conducted on norms detection and identification, but almost none has been found to explore the concept of norm's benefit awareness that triggers agents' belief to adopt new norms. The literature discuss norms' adoption by agents which are not aware of the benefits of the adopted norms, but use some mining algorithms to identify the norms from a set of observed events. In this paper, we propose a novel solution to this problem that calculates the benefit of a norm to its utility and subsequently decides to adopt or reject the norm.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131905575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Overview of knowledge flow in a software development process 概述软件开发过程中的知识流
Mustafa S. Khalefa, M. Jabar, R. Abdullah, Salfarina Abdullah, A. Amidi
Knowledge flow (KF) and workflow have many definitions in the literature. The development of information technology has led many organizations to become more focused on knowledge than on labor because KF is considered complementary to the software development process when used in the software development domain. Knowledge is the most valuable property about any business organization or academic institution; in addition the knowledge flow plays a part in elevating the competitiveness of teams. This paper presents the origin of KF research and its different definitions. It provides an overview of KF and workflow and the interaction mechanism between the two. A systematic review of the subject is also given.
知识流(KF)和工作流在文献中有很多定义。信息技术的发展导致许多组织更加关注知识而不是劳动力,因为在软件开发领域中使用KF被认为是对软件开发过程的补充。知识是任何商业组织或学术机构最宝贵的财产;此外,知识流动在提高团队竞争力方面也起着一定的作用。本文介绍了KF研究的起源及其不同的定义。它概述了KF和工作流以及两者之间的交互机制。对这一课题也作了系统的回顾。
{"title":"Overview of knowledge flow in a software development process","authors":"Mustafa S. Khalefa, M. Jabar, R. Abdullah, Salfarina Abdullah, A. Amidi","doi":"10.1109/ICIMU.2014.7066621","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066621","url":null,"abstract":"Knowledge flow (KF) and workflow have many definitions in the literature. The development of information technology has led many organizations to become more focused on knowledge than on labor because KF is considered complementary to the software development process when used in the software development domain. Knowledge is the most valuable property about any business organization or academic institution; in addition the knowledge flow plays a part in elevating the competitiveness of teams. This paper presents the origin of KF research and its different definitions. It provides an overview of KF and workflow and the interaction mechanism between the two. A systematic review of the subject is also given.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129521003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 6th International Conference on Information Technology and Multimedia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1