This study considers the regional characteristics of the Tohoku region and the extent of the damage caused by the Great East Japan Earthquake and makes proposals for recovery and reconstruction of the areas affected b...This study considers the regional characteristics of the Tohoku region and the extent of the damage caused by the Great East Japan Earthquake and makes proposals for recovery and reconstruction of the areas affected by this disaster as well as for a reduction of the impact of natural disasters that may occur in the future with GIS (geographic information systems) as a social infrastructure positioned at the heart of the information infrastructure. Due to the fact that social media that used ICT (information and communication technology) was useful in the days directly after the disaster, it can be said that it is necessary to investigate the provision of an information infrastructure that uses ICT to reduce the impact of disasters. Therefore, this study proposes the construction of a geographical information database using GIS and the provision and sharing of information using social media GIS after discussion of the relationship between the development of the computerization of Japan and GIS as a valid example of using information systems for recovery and reconstruction after the Great East Japan Earthquake.展开更多
Urban public infrastructure is an important basis for urban development.It is of great significance to deepen the research on intelligent management and control of urban public infrastructure.Spatio-temporal informati...Urban public infrastructure is an important basis for urban development.It is of great significance to deepen the research on intelligent management and control of urban public infrastructure.Spatio-temporal information contains the law of state evolution of urban public infrastructure,which is the information base of intelligent control of infrastructure.Due to the needs of operation management and emergency response,efficient sharing and visualization of spatio-temporal information are important research contents of comprehensive management and control of urban public infrastructure.On the basis of summarizing the theoretical research and application in recent years,the basic methods and current situation of the acquisition and analysis of spatio-temporal information,the forecast and early warning,and the intelligent control of urban public infrastructure are reviewed in this paper.展开更多
Spatial Information Infrastructure (SII) facilitates the sharing, interoperability and integration of geographical information among department components of a region or a country. The SII is developed and shared by d...Spatial Information Infrastructure (SII) facilitates the sharing, interoperability and integration of geographical information among department components of a region or a country. The SII is developed and shared by different department components. The relation of department components is a fundament for collaborating tasks and information exchange in SII. There are two kinds of department components, one is the provider which produces geospatial data of SII, other is the consumer which uses geospatial data of SII. The consumer includes two kinds of user, one is the user which only uses and does not produce geospatial data in SII, other is the special user which not only uses but also produces geospatial data in SII. The provider includes different hierarchies corresponding to different kinds of geospatial data in SII. All providers in the hierarchies form provider actor set PA. All consumers also form consumer actor set CA. The sender recipient relation SR and SRI are defined on Cartesian product of PA and CA. Five tasks and information flow in SII demonstrate the geospatial data acquisition, information production, management, and application among department components. The tasks and their sub tasks are subdivided activities. Each activity corresponds to the relation SR or RSI. The activity along with the relation of provider and consumer forms a scheme of geographical information exchange between department components.展开更多
A plan of information and communication services in the HIT-IIS, a prototype system of CIM integrating infrastructure is introduced. These two classes of services provide the basic information supporting platform for ...A plan of information and communication services in the HIT-IIS, a prototype system of CIM integrating infrastructure is introduced. These two classes of services provide the basic information supporting platform for CIM system and CIM integrating infrastructure, based on the distributed database syestem and computer network system. The structure, organization and workflow of these services are given.展开更多
This paper introduces the image fusion approach of multi-resolutionanalysis-based intensity modulation (MRAIM) to produce the high-resolution multi-spectral imagesfrom high-resolution panchromatic image and low-resolu...This paper introduces the image fusion approach of multi-resolutionanalysis-based intensity modulation (MRAIM) to produce the high-resolution multi-spectral imagesfrom high-resolution panchromatic image and low-resolution multi-spectral images for navigationinformation infrastructure. The mathematical model of image fusion is derived according to theprinciple of remote sensing image formation. It shows that the pixel values of a high-resolutionmulti-spectral images are determined by the pixel values of the approximation of a high-resolutionpanchromatic image at the resolution level of low-resolution multi-spectral images, and in the pixelvalae computation the M-band wavelet theory and the a trous algorithm are then used. In order toevaluate the MRAIM approach, an experiment has been carried out on the basis of the IKONOS 1 mpanchromatic image and 4 m multi-spectral images. The result demonstrates that MRAIM image fusionapproach gives promising fusion results and it can be used to produce the high-resolution remotesensing images required for navigation information infrastructures.展开更多
Increasing competition in service businesses (eg: Information Technology, Healthcare, Education, Logistics, Distribution, Hospitality Financial and other services) is compelling corporates to adopt business improvemen...Increasing competition in service businesses (eg: Information Technology, Healthcare, Education, Logistics, Distribution, Hospitality Financial and other services) is compelling corporates to adopt business improvement philosophies and methodologies for addressing customer demands for better quality service and organizational demands for improving the profit margins through cost reduction. Many companies around the world have already implemented Information Technology Infrastructure Library (ITIL) as a way to manage and control their Information Technology (IT) Departments more effectively. These companies are now willing to improve their ITIL processes in order to become even more efficient. Lean Six Sigma is a methodology that has been suggested as a means to resolve these problems, reducing costs and improving quality. Its application in the IT Services area is becoming increasingly popular among researchers and academicians and can be used to conduct these improvements. Despite the application of lean six sigma approaches to different contexts in the service sector, the application of Lean Six Sigma approaches in service delivery specific to Information Technology Service Management (ITSM) remains largely untested. The purpose of this paper is to implement Integrated Lean Six Sigma for Software application support services and evaluate the benefits of continual service improvement over ITIL.展开更多
The advancement of the fourth industrial revolution has shaped the integration and interaction of different information, communication and technologies (ICTs) in the merging cyber, physical, and social infrastructures...The advancement of the fourth industrial revolution has shaped the integration and interaction of different information, communication and technologies (ICTs) in the merging cyber, physical, and social infrastructures. The impact of ICT has accelerated the progress of the United Nation’s Sustainable Development Goals (UN SDGs) and influenced the evolution of smart, sustainable, stable society development. Making the trustworthy information and communication technologies infrastructure widely available will promote the community innovation needed to stimulate domestic economics, provide decent work, and reduce inequalities. This article attempts to outline a big picture about the International Telecommunication Union (ITU)’s trust provisioning framework, including its motivation, current status, and application for achieving the UN SDGs by 2030. This article first describes the purpose of the UN SDGs and the evolution of the industrial revolution, then demonstrates the challenges of global risks affecting the fourth industrial revolution and the need for trustworthy ICT infrastructures. Subsequently, the article evaluates the ITU trust provisioning framework and assesses its applications in the future knowledge society, trust provisioning ecosystem, and cyber, physical, and social infrastructure toward achieving UN SDGs. Use cases are also presented in this article to show the effectiveness of the ITU trust provisioning framework on achieving UN SDGs.展开更多
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering...This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective.展开更多
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
Gave a brief introduction to the origin,concepted and hierarchical structure of Digital Mine.As a huge complex system,Digital Mine took data base and model base to- gether as a mine data management system being its co...Gave a brief introduction to the origin,concepted and hierarchical structure of Digital Mine.As a huge complex system,Digital Mine took data base and model base to- gether as a mine data management system being its core,and Digital Mine was com- prised of five subsystems including data obtaining system,integral dispatching system, applied engineering system,data processing system,and data management system.Be- ing a digitally 3D visualized representation and a spatial information infrastructure of an actual mine,Digital Mine had three basic features such as data warehouse,information reference and digital platform.The present developments of Digital Mine in mining industry, research and education were also introduced.Examples were shown for present Digital Mine construction in China.The development trends,the key technologies and the recent construction procedures on Digital Mine were presented.展开更多
Today management agility as an inter-corporate competitive advantage cannot be realized unless given all of the following quickness: (a) quick recognition of changes in the management environment, (b) quick decis...Today management agility as an inter-corporate competitive advantage cannot be realized unless given all of the following quickness: (a) quick recognition of changes in the management environment, (b) quick decision-making on countermeasures against these changes, and (c) quick implementation of the countermeasures chosen. With a focus on (c) and assuming flexibility as a core property that an MIS (Management Information System) should have to make management agile, this study aims to clarify how MIS flexibility could be enhanced. With this aim in mind, the authors will first survey the sources and types of change demands on an MIS and consider in a structured way the flexibility characteristics of an MIS, enhancement of which will conduce to its efficiency in dealing with these change demands. With this groundwork laid, the authors will go on to discuss practical methods to enhance MIS flexibility, and wind up their discussion by presenting the evaluation procedure for this property.展开更多
With the development of electric power technology, information technology and military technology, the impact of cyber attack on electric power infrastructure has increasingly become a hot spot issue which calls both ...With the development of electric power technology, information technology and military technology, the impact of cyber attack on electric power infrastructure has increasingly become a hot spot issue which calls both domestic and foreign attention. First, main reasons of the impact on power infrastructure caused by cyber attack are analyzed from the following two aspects: 1) The dependence of electric power infrastructure on information infrastructure makes cyber attack issues in information field likely to affect electric power field. 2) As regards to the potential threat sources, it will be considerably profitable to launch cyber attacks on electric power infrastructure. On this basis, this paper gives a classified elaboration on the characteristics and the possibilities of cyber attacks on electrical infrastructures. Finally, the recently published actual events of cyber attacks in respect of threat sources, vulnerabilities and assaulting modes are analyzed and summarized.展开更多
In this paper, first we are going to discuss briefly the importance of 3D information, and its application because of the Increasing demand for detailed information about real world objects and phenomena including alt...In this paper, first we are going to discuss briefly the importance of 3D information, and its application because of the Increasing demand for detailed information about real world objects and phenomena including altimetry and planimetry data (X, Y, Z), then we will explain in short the available methods for 3D measurement. It’s important to note that the Information collection by itself cannot define and sufficiently provide all the necessary actions to be taken in order to get them accessible and useful for users. The data management and establishment of a proper and reliable DBMS and finally a GIS system at the same time are vital crucial in the course of 3D application that will be discussed throughout the paper. The existing drawbacks and elements needed to be considered for the cartographic presentation are the key issues in three-dimensional world visualization. The elaboration on the 3D information and its knowledge transfer to the users in a SDI framework as well as the requirement recognition of beneficiary organizations will be the next step in this paper and the most probable problems will be studied in this stage. At the final stage, we’ll come up with conclusion, warnings and recommendation.展开更多
This study examines the key factors that have impact on the successful adoption of Human Resource Information System (HRIS) within the Aqaba Special Economic Zone Authority (ASEZA)/Jordan. In order to accomplish the p...This study examines the key factors that have impact on the successful adoption of Human Resource Information System (HRIS) within the Aqaba Special Economic Zone Authority (ASEZA)/Jordan. In order to accomplish the purpose of the study four critical factors are inquired. So, four critical factors are inquired: First, TAM Model (Perceived Ease of Use (PEOU) and Perceived Usefulness (PU)). Second, Information Technology Infrastructure (ITI). Third, Top Management Support (TMS). Finally, Individual Experience with Computer (IEC). The research model was applied to collect data from the questionnaires answered by 45 users of HRIS as a source of primary data, based on a convenience sample the response rate was about 91%. In addition, the results were analyzed by utilizing the Statistical Package for Social Software (SPSS). Furthermore, the findings were analyzed;multiple Regression analysis indicated that all research variables have significant relationship on successful adoption of HRIS. The findings indicated IT infrastructures have a positive and significant effect on the successful adoption of HRIS. But there is no significant of PU, PEOU, TMS, and IEC on the successful adoption of HRIS. Finally, the results indicated that no significant statistical differences of demographic characteristics on HRIS adoption. Depending on the research’s findings;the researchers proposed a set of recommendations for better adoption of HRIS in SEZA.展开更多
When creating an asset management plan, missing data is perceived to be a huge problem, especially when the event data (breaks in water distribution pipes as an example) are not tracked. The lack of tracking makes it ...When creating an asset management plan, missing data is perceived to be a huge problem, especially when the event data (breaks in water distribution pipes as an example) are not tracked. The lack of tracking makes it difficult to determine which factors are the critical ones. Many utilities lack the resources for examining buried infrastructure, so other methods of data collection are needed. The concept for this paper was to develop a means to acquire data on the assets for a condition assessment (buried pipe is not visible and in most cases, cannot really be assessed). What was found was that for buried infrastructure, much more information was known than anticipated. Knowing exact information is not really necessary. However, there was a need to track event-breaks, flooding etc.—what would indicate a “failure”.?The latter would be useful for predicting future maintenance needs and the most at-risk assets.展开更多
The present paper is concerned with potential cyberterrorist threats which the objects of national energy infrastructure may undergo, directions of development of counteraction means for these threats, problems arisin...The present paper is concerned with potential cyberterrorist threats which the objects of national energy infrastructure may undergo, directions of development of counteraction means for these threats, problems arising during this development and their possible solutions. This problem field is studied by the author from scientific point of view (from point of view of computer science and information security of large systems) and this paper reflects results of such studies. Many special technical terms were omitted or substituted in order to make the statement accessible to wider range of people concerned.展开更多
The importance of a nation’s infrastructure is a vital core for economic growth, development, and innovation. Health, wealth, access to education, public safety, and helping prepare for global crises like pandemics a...The importance of a nation’s infrastructure is a vital core for economic growth, development, and innovation. Health, wealth, access to education, public safety, and helping prepare for global crises like pandemics are all dependent on functioning and reliable infrastructures. In decades, the substantial threats affecting infrastructures globally whether in the form of extreme weather, Covid-19 pandemic, or the threats of state and non-state actors’ hackers, demanded urgency in building resilience infrastructures both during crises and in more stable conditions. At the same time, the adoption of emerging and innovative technologies boosts the development of the infrastructures using information, communication, and technology (ICT) platform. This shift accelerated its evolution toward digitization where interdependent and interconnected cyberspace demands collaborative and holistic strategies in protecting critical and high risks infrastructure assets from a growing number of disruptive cyberattacks. These ever-evolving cyber threats are creating increasingly dangerous and targeted cyberattacks to damage or disrupt the critical infrastructures delivering vital services to government, energy, healthcare, transportation, telecommunication, and other critical sectors. The infrastructure’s high risks assets present serious challenges and are crucial to safety, efficiency, and reliability. Any nation must recognize and determine how to cope with any type of threats to their critical infrastructure as well as the strategies to remain resilient. This article first describes the challenges and the need for critical infrastructure protection including the related global risks challenges. It then reviews the United Nations, the European Union, and the United States’ strategies, priorities, and urgencies of critical infrastructure protection. Subsequently, it surveys the critical infrastructure protection resilience strategies including ISO, IEC, ISA, NIST, CAF and CMM frameworks.展开更多
Nowadays, information technology (IT) has become a part of the working culture and environment in many organizations. Originally, it is not a supportive tool to make any business successful, but it have become the b...Nowadays, information technology (IT) has become a part of the working culture and environment in many organizations. Originally, it is not a supportive tool to make any business successful, but it have become the backbone of successful business recently. Any non-IT organization could become dead and non-productive. When time comes, maybe it will fail in the business market. However, the usage of IT instruments must be carried out in good and conducive environment especially for business market. In this study, a basic and practical management about how to manage IT asset in small organizations will be discussed. Then this kind of management will be further discussed when the company become small medium organization. The implementation of IT infrastructure, the requirements, infrastructures, services, and platform from software to hardware and networking devices needs to be known. However, this study focuses on networking infrastructure such as networking equipments, servers, network monitoring software, costing, and management best practices.展开更多
Since the damages caused by disasters associated with climate anomalies and the diversification of the social structure increase every year, an efficient management system associated with a damage assessment of the ar...Since the damages caused by disasters associated with climate anomalies and the diversification of the social structure increase every year, an efficient management system associated with a damage assessment of the areas vulnerable to disasters is demanded to prevent or mitigate the damages to infrastructure. The areas vulnerable to disasters in Busan, located at southeastern part of Korea, were estimated based on historical records of damages and a risk assessment of the infrastructure was performed to provide fundamental information prior to the establishment of the real-time monitoring system for infrastructure and establish disaster management system. The results are illustrated by using geographical information system(GIS) and provide the importance of the roadmap for comprehensive and specific strategy to manage natural disasters.展开更多
In order to relate the design and analysis of an optical pattern recognition system with the structural parameters, only by introducing the prolate spheroidal wave function (PSWF) can the amount of information be comp...In order to relate the design and analysis of an optical pattern recognition system with the structural parameters, only by introducing the prolate spheroidal wave function (PSWF) can the amount of information be computed. Combining the imaging wave function set {ψi(x)} and distorted wave function set {b_i(p)} and two integral equations they satisfy derives the expression of the amount of information. The design method of matched filter connected with its amount of information is studied, and their amounts of information belonging to different pattern recognition systems are illustrated. It can be seen that the difference of the amounts of information for various systems is obvious.展开更多
文摘This study considers the regional characteristics of the Tohoku region and the extent of the damage caused by the Great East Japan Earthquake and makes proposals for recovery and reconstruction of the areas affected by this disaster as well as for a reduction of the impact of natural disasters that may occur in the future with GIS (geographic information systems) as a social infrastructure positioned at the heart of the information infrastructure. Due to the fact that social media that used ICT (information and communication technology) was useful in the days directly after the disaster, it can be said that it is necessary to investigate the provision of an information infrastructure that uses ICT to reduce the impact of disasters. Therefore, this study proposes the construction of a geographical information database using GIS and the provision and sharing of information using social media GIS after discussion of the relationship between the development of the computerization of Japan and GIS as a valid example of using information systems for recovery and reconstruction after the Great East Japan Earthquake.
基金Jinqiao Project Seed Fund of Beijing Association for Science and Technology(No.ZZ19018)。
文摘Urban public infrastructure is an important basis for urban development.It is of great significance to deepen the research on intelligent management and control of urban public infrastructure.Spatio-temporal information contains the law of state evolution of urban public infrastructure,which is the information base of intelligent control of infrastructure.Due to the needs of operation management and emergency response,efficient sharing and visualization of spatio-temporal information are important research contents of comprehensive management and control of urban public infrastructure.On the basis of summarizing the theoretical research and application in recent years,the basic methods and current situation of the acquisition and analysis of spatio-temporal information,the forecast and early warning,and the intelligent control of urban public infrastructure are reviewed in this paper.
基金Supported by the National Natural Science Foundation of China(6 98330 10 ) and the Emphasis Project of National"Ninth five-ye
文摘Spatial Information Infrastructure (SII) facilitates the sharing, interoperability and integration of geographical information among department components of a region or a country. The SII is developed and shared by different department components. The relation of department components is a fundament for collaborating tasks and information exchange in SII. There are two kinds of department components, one is the provider which produces geospatial data of SII, other is the consumer which uses geospatial data of SII. The consumer includes two kinds of user, one is the user which only uses and does not produce geospatial data in SII, other is the special user which not only uses but also produces geospatial data in SII. The provider includes different hierarchies corresponding to different kinds of geospatial data in SII. All providers in the hierarchies form provider actor set PA. All consumers also form consumer actor set CA. The sender recipient relation SR and SRI are defined on Cartesian product of PA and CA. Five tasks and information flow in SII demonstrate the geospatial data acquisition, information production, management, and application among department components. The tasks and their sub tasks are subdivided activities. Each activity corresponds to the relation SR or RSI. The activity along with the relation of provider and consumer forms a scheme of geographical information exchange between department components.
文摘A plan of information and communication services in the HIT-IIS, a prototype system of CIM integrating infrastructure is introduced. These two classes of services provide the basic information supporting platform for CIM system and CIM integrating infrastructure, based on the distributed database syestem and computer network system. The structure, organization and workflow of these services are given.
文摘This paper introduces the image fusion approach of multi-resolutionanalysis-based intensity modulation (MRAIM) to produce the high-resolution multi-spectral imagesfrom high-resolution panchromatic image and low-resolution multi-spectral images for navigationinformation infrastructure. The mathematical model of image fusion is derived according to theprinciple of remote sensing image formation. It shows that the pixel values of a high-resolutionmulti-spectral images are determined by the pixel values of the approximation of a high-resolutionpanchromatic image at the resolution level of low-resolution multi-spectral images, and in the pixelvalae computation the M-band wavelet theory and the a trous algorithm are then used. In order toevaluate the MRAIM approach, an experiment has been carried out on the basis of the IKONOS 1 mpanchromatic image and 4 m multi-spectral images. The result demonstrates that MRAIM image fusionapproach gives promising fusion results and it can be used to produce the high-resolution remotesensing images required for navigation information infrastructures.
文摘Increasing competition in service businesses (eg: Information Technology, Healthcare, Education, Logistics, Distribution, Hospitality Financial and other services) is compelling corporates to adopt business improvement philosophies and methodologies for addressing customer demands for better quality service and organizational demands for improving the profit margins through cost reduction. Many companies around the world have already implemented Information Technology Infrastructure Library (ITIL) as a way to manage and control their Information Technology (IT) Departments more effectively. These companies are now willing to improve their ITIL processes in order to become even more efficient. Lean Six Sigma is a methodology that has been suggested as a means to resolve these problems, reducing costs and improving quality. Its application in the IT Services area is becoming increasingly popular among researchers and academicians and can be used to conduct these improvements. Despite the application of lean six sigma approaches to different contexts in the service sector, the application of Lean Six Sigma approaches in service delivery specific to Information Technology Service Management (ITSM) remains largely untested. The purpose of this paper is to implement Integrated Lean Six Sigma for Software application support services and evaluate the benefits of continual service improvement over ITIL.
文摘The advancement of the fourth industrial revolution has shaped the integration and interaction of different information, communication and technologies (ICTs) in the merging cyber, physical, and social infrastructures. The impact of ICT has accelerated the progress of the United Nation’s Sustainable Development Goals (UN SDGs) and influenced the evolution of smart, sustainable, stable society development. Making the trustworthy information and communication technologies infrastructure widely available will promote the community innovation needed to stimulate domestic economics, provide decent work, and reduce inequalities. This article attempts to outline a big picture about the International Telecommunication Union (ITU)’s trust provisioning framework, including its motivation, current status, and application for achieving the UN SDGs by 2030. This article first describes the purpose of the UN SDGs and the evolution of the industrial revolution, then demonstrates the challenges of global risks affecting the fourth industrial revolution and the need for trustworthy ICT infrastructures. Subsequently, the article evaluates the ITU trust provisioning framework and assesses its applications in the future knowledge society, trust provisioning ecosystem, and cyber, physical, and social infrastructure toward achieving UN SDGs. Use cases are also presented in this article to show the effectiveness of the ITU trust provisioning framework on achieving UN SDGs.
文摘This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective.
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
基金the National 863 High-Tech.Program of China(2006AA12Z2162007AA06Z108)the Natural Science Funds of China(50525414,40571137)
文摘Gave a brief introduction to the origin,concepted and hierarchical structure of Digital Mine.As a huge complex system,Digital Mine took data base and model base to- gether as a mine data management system being its core,and Digital Mine was com- prised of five subsystems including data obtaining system,integral dispatching system, applied engineering system,data processing system,and data management system.Be- ing a digitally 3D visualized representation and a spatial information infrastructure of an actual mine,Digital Mine had three basic features such as data warehouse,information reference and digital platform.The present developments of Digital Mine in mining industry, research and education were also introduced.Examples were shown for present Digital Mine construction in China.The development trends,the key technologies and the recent construction procedures on Digital Mine were presented.
文摘Today management agility as an inter-corporate competitive advantage cannot be realized unless given all of the following quickness: (a) quick recognition of changes in the management environment, (b) quick decision-making on countermeasures against these changes, and (c) quick implementation of the countermeasures chosen. With a focus on (c) and assuming flexibility as a core property that an MIS (Management Information System) should have to make management agile, this study aims to clarify how MIS flexibility could be enhanced. With this aim in mind, the authors will first survey the sources and types of change demands on an MIS and consider in a structured way the flexibility characteristics of an MIS, enhancement of which will conduce to its efficiency in dealing with these change demands. With this groundwork laid, the authors will go on to discuss practical methods to enhance MIS flexibility, and wind up their discussion by presenting the evaluation procedure for this property.
文摘With the development of electric power technology, information technology and military technology, the impact of cyber attack on electric power infrastructure has increasingly become a hot spot issue which calls both domestic and foreign attention. First, main reasons of the impact on power infrastructure caused by cyber attack are analyzed from the following two aspects: 1) The dependence of electric power infrastructure on information infrastructure makes cyber attack issues in information field likely to affect electric power field. 2) As regards to the potential threat sources, it will be considerably profitable to launch cyber attacks on electric power infrastructure. On this basis, this paper gives a classified elaboration on the characteristics and the possibilities of cyber attacks on electrical infrastructures. Finally, the recently published actual events of cyber attacks in respect of threat sources, vulnerabilities and assaulting modes are analyzed and summarized.
文摘In this paper, first we are going to discuss briefly the importance of 3D information, and its application because of the Increasing demand for detailed information about real world objects and phenomena including altimetry and planimetry data (X, Y, Z), then we will explain in short the available methods for 3D measurement. It’s important to note that the Information collection by itself cannot define and sufficiently provide all the necessary actions to be taken in order to get them accessible and useful for users. The data management and establishment of a proper and reliable DBMS and finally a GIS system at the same time are vital crucial in the course of 3D application that will be discussed throughout the paper. The existing drawbacks and elements needed to be considered for the cartographic presentation are the key issues in three-dimensional world visualization. The elaboration on the 3D information and its knowledge transfer to the users in a SDI framework as well as the requirement recognition of beneficiary organizations will be the next step in this paper and the most probable problems will be studied in this stage. At the final stage, we’ll come up with conclusion, warnings and recommendation.
文摘This study examines the key factors that have impact on the successful adoption of Human Resource Information System (HRIS) within the Aqaba Special Economic Zone Authority (ASEZA)/Jordan. In order to accomplish the purpose of the study four critical factors are inquired. So, four critical factors are inquired: First, TAM Model (Perceived Ease of Use (PEOU) and Perceived Usefulness (PU)). Second, Information Technology Infrastructure (ITI). Third, Top Management Support (TMS). Finally, Individual Experience with Computer (IEC). The research model was applied to collect data from the questionnaires answered by 45 users of HRIS as a source of primary data, based on a convenience sample the response rate was about 91%. In addition, the results were analyzed by utilizing the Statistical Package for Social Software (SPSS). Furthermore, the findings were analyzed;multiple Regression analysis indicated that all research variables have significant relationship on successful adoption of HRIS. The findings indicated IT infrastructures have a positive and significant effect on the successful adoption of HRIS. But there is no significant of PU, PEOU, TMS, and IEC on the successful adoption of HRIS. Finally, the results indicated that no significant statistical differences of demographic characteristics on HRIS adoption. Depending on the research’s findings;the researchers proposed a set of recommendations for better adoption of HRIS in SEZA.
文摘When creating an asset management plan, missing data is perceived to be a huge problem, especially when the event data (breaks in water distribution pipes as an example) are not tracked. The lack of tracking makes it difficult to determine which factors are the critical ones. Many utilities lack the resources for examining buried infrastructure, so other methods of data collection are needed. The concept for this paper was to develop a means to acquire data on the assets for a condition assessment (buried pipe is not visible and in most cases, cannot really be assessed). What was found was that for buried infrastructure, much more information was known than anticipated. Knowing exact information is not really necessary. However, there was a need to track event-breaks, flooding etc.—what would indicate a “failure”.?The latter would be useful for predicting future maintenance needs and the most at-risk assets.
文摘The present paper is concerned with potential cyberterrorist threats which the objects of national energy infrastructure may undergo, directions of development of counteraction means for these threats, problems arising during this development and their possible solutions. This problem field is studied by the author from scientific point of view (from point of view of computer science and information security of large systems) and this paper reflects results of such studies. Many special technical terms were omitted or substituted in order to make the statement accessible to wider range of people concerned.
文摘The importance of a nation’s infrastructure is a vital core for economic growth, development, and innovation. Health, wealth, access to education, public safety, and helping prepare for global crises like pandemics are all dependent on functioning and reliable infrastructures. In decades, the substantial threats affecting infrastructures globally whether in the form of extreme weather, Covid-19 pandemic, or the threats of state and non-state actors’ hackers, demanded urgency in building resilience infrastructures both during crises and in more stable conditions. At the same time, the adoption of emerging and innovative technologies boosts the development of the infrastructures using information, communication, and technology (ICT) platform. This shift accelerated its evolution toward digitization where interdependent and interconnected cyberspace demands collaborative and holistic strategies in protecting critical and high risks infrastructure assets from a growing number of disruptive cyberattacks. These ever-evolving cyber threats are creating increasingly dangerous and targeted cyberattacks to damage or disrupt the critical infrastructures delivering vital services to government, energy, healthcare, transportation, telecommunication, and other critical sectors. The infrastructure’s high risks assets present serious challenges and are crucial to safety, efficiency, and reliability. Any nation must recognize and determine how to cope with any type of threats to their critical infrastructure as well as the strategies to remain resilient. This article first describes the challenges and the need for critical infrastructure protection including the related global risks challenges. It then reviews the United Nations, the European Union, and the United States’ strategies, priorities, and urgencies of critical infrastructure protection. Subsequently, it surveys the critical infrastructure protection resilience strategies including ISO, IEC, ISA, NIST, CAF and CMM frameworks.
文摘Nowadays, information technology (IT) has become a part of the working culture and environment in many organizations. Originally, it is not a supportive tool to make any business successful, but it have become the backbone of successful business recently. Any non-IT organization could become dead and non-productive. When time comes, maybe it will fail in the business market. However, the usage of IT instruments must be carried out in good and conducive environment especially for business market. In this study, a basic and practical management about how to manage IT asset in small organizations will be discussed. Then this kind of management will be further discussed when the company become small medium organization. The implementation of IT infrastructure, the requirements, infrastructures, services, and platform from software to hardware and networking devices needs to be known. However, this study focuses on networking infrastructure such as networking equipments, servers, network monitoring software, costing, and management best practices.
基金Project supported by the 2013 Inje University Research Grant of Korea
文摘Since the damages caused by disasters associated with climate anomalies and the diversification of the social structure increase every year, an efficient management system associated with a damage assessment of the areas vulnerable to disasters is demanded to prevent or mitigate the damages to infrastructure. The areas vulnerable to disasters in Busan, located at southeastern part of Korea, were estimated based on historical records of damages and a risk assessment of the infrastructure was performed to provide fundamental information prior to the establishment of the real-time monitoring system for infrastructure and establish disaster management system. The results are illustrated by using geographical information system(GIS) and provide the importance of the roadmap for comprehensive and specific strategy to manage natural disasters.
基金Project supported by the National Natural Science Foundation of China.
文摘In order to relate the design and analysis of an optical pattern recognition system with the structural parameters, only by introducing the prolate spheroidal wave function (PSWF) can the amount of information be computed. Combining the imaging wave function set {ψi(x)} and distorted wave function set {b_i(p)} and two integral equations they satisfy derives the expression of the amount of information. The design method of matched filter connected with its amount of information is studied, and their amounts of information belonging to different pattern recognition systems are illustrated. It can be seen that the difference of the amounts of information for various systems is obvious.