Volume 3 Issue 2

Authors: Marialisa Scatà; Aurelio La Corte

Abstract: Information security stands for protecting data and information systems from unauthorized access, use, modification or destruction, to ensure the CIA requirements, confidentiality, availability and integrity. Information and communication technology world is facing with security issues due to many challenges in network architecture and communication paradigm. The design of an ICT infrastructure cannot ignore the technological and social analysis, economic aspects, and now with the sustainability. This paper analyses the safety of these systems and propose a new paradigm to manage the security through a bio-inspired approach. This model evaluates the information assets of data, using three steps, Analysis, Assessment and Management, identifying the procedures, the weaknesses and the threats. We present a security management architecture and a bio-inspired model to evaluate the risk and the probability of a probable threat, based on the failure analysis. The goal is to realize the real state of security degree of the system, acting into it in order to optimize the global safety, picking out the business strategic decisions and the economic choices, finding the perfect condition that allows combining the risk of failure, the hazard function, the risk of economic losses and information losses affecting security requirements. This approach could be applied in the future to investment models on information and communication architectures.

Keywords: ICT; Security; Risk Analysis; Bio-Inspired; Economic Investments


Authors: Francesco Tusa; Antonio Celesti; Massimo Villari; Antonio Puliafito

Abstract: Nowadays, cloud computing offers more and more business opportunities, and thanks to the concept of virtualization, different types of cost-effective Cloud-based services have been rising. Virtualization of computing, storage, and networking resources, and their interconnection is at the heart of cloud computing, hence enabling new E-Business scenarios. In such a context, APIs for enabling Cloud-based services are strongly required, nevertheless, methods, mechanisms and tools for exploiting virtualized resources and their utilization for developing anything as a service (*aaS) are still ad-hoc and/or proprietary in nature. In this paper, we discuss how to use an adaptive standard protocol, i.e., XRI, for enabling cloud service providers to arrange their own Cloud-based services, building them on top of the IaaS provided by other service providers.

Keywords: Cloud Computing; Cloud Management; Federation; Service Composition; E-Business


Authors: Chun-Hung Tzeng

Abstract: This paper introduces, based on probability, a general theory of a heuristic search and heuristic information in handling uncertainty. A search model consists of a probability space and a random variable. The task of the model is to search for heuristic information in order to approximate the random variable. Such heuristic information forms a Borel subfield of the probability space and the evaluation is the conditional expectation of the random variable relative to the Borel subfield. The paper considers comparisons and combinations of heuristic searches and studies their properties. As an application, this paper develops a pattern-recognition model, where the classical Bayes and Neyman-Pearson theorems are generalized. Similarity is applied to a pattern recognition, where a minimal representative system is introduced as a data clustering. To search for heuristic information is to compare an object with the representatives. The rough set approach in handling uncertainty is a special search model studied in this paper.

Keywords: Heuristic Information; Heuristic Search; Pattern Recognition; Similarity; Rough Sets


Authors: Thomas J. McCormick

Abstract: This paper utilizes prior case study research and empirical data in order to synthesize an entirely new field of study – Co-created e-Services. Co-creation enables the sharing of innovation and development activities in a close partnership between end-users and service providers. This partnership is enhanced through the innovative use of information technology by creating new interfaces which facilitate the interactions required for the effective co-creation of e-services. The synthesis method involves the logical combining of diverse research from multiple fields of study into a cohesive whole. Prior research from the fields of co-creation, service transformation and e-Services is used to introduce this new field of study. Case studies have provided qualitative insights into the interactions between end-users and service providers, while empirical studies provide quantitative measures upon which to make judgments. The synthesis method enables the simultaneous combining of case study and empirical results from three different fields of study into a cohesive framework with the implementation steps necessary to enable the transformation to Co-created e-Services. A transformational framework and the associated steps are necessary to guide future research in this new field and to enable product- oriented organizations to achieve enhanced economic growth and development through the implementation of Co-created e-Services.

Keywords: e-Services; Co-Creation; Synthesis Method; Service Transformation; Network Economics


Authors: Lin-Hua Zou; Jung-Chi Pai

Abstract: The main purpose of this study is to explore the factors influencing the use of knowledge management systems (KMS). The research model was built on the basis of task-technology fit (TTF) framework as well as DeLone and McLean’s information systems success model. Data were collected by using a questionnaire survey sent to a public sector organization in Taiwan, and structural equation modeling (SEM) was used to analyze hypothesized relationships between the constructs in the research model. The implications of the findings for knowledge management systems practice are discussed. Moreover, the limitations, contributions and future research of this study are examined. Finally, this paper provides a valuable reference for business managers and information systems executives whom are initiating or conducting knowledge management exercises in the e-business era, and for researchers interested in the fields of e-business and knowledge management.

Keywords: Knowledge Management Systems (KMS); Structural Equation Modeling (SEM); Task-Technology Fit (TTF); Information Systems Success Model