Zobrazeno 1 - 10
of 111
pro vyhledávání: '"Aad van Moorsel"'
Autor:
Iryna Yevseyeva, James Turland, Charles Morisset, Lynne Coventry, Thomas Groß, Christopher Laing, Aad van Moorsel
Publikováno v:
International Journal of Information Systems and Project Management, Vol 3, Iss 3 (2022)
In this work we address the main issues of Information Technology (IT) consumerization that are related to security risks, and vulnerabilities of devices used within Bring Your Own Device (BYOD) strategy in particular. We propose a ‘soft’ mitigat
Externí odkaz:
https://doaj.org/article/964ac8d6a08f46af8e7d78d7f7c61609
Autor:
Karen Elliott, Kovila Coopamootoo, Edward Curran, Paul Ezhilchelvan, Samantha Finnigan, Dave Horsfall, Zhichao Ma, Magdalene Ng, Tasos Spiliotopoulos, Han Wu, Aad van Moorsel
Publikováno v:
Data & Policy, Vol 4 (2022)
Financial inclusion depends on providing adjusted services for citizens with disclosed vulnerabilities. At the same time, the financial industry needs to adhere to a strict regulatory framework, which is often in conflict with the desire for inclusiv
Externí odkaz:
https://doaj.org/article/03821e81f84a45beaad3db16d116a2f4
Autor:
Maher Alharby, Aad van Moorsel
Publikováno v:
Frontiers in Blockchain, Vol 3 (2020)
Both in the design and deployment of blockchain solutions many performance-impacting configuration choices need to be made. We introduce BlockSim, a framework and software tool to build and simulate discrete-event dynamic systems models for blockchai
Externí odkaz:
https://doaj.org/article/9cabf41960d74614bad70d4731f2a2ca
Autor:
Mhairi Aitken, Ehsan Toreini, Peter Carmichael, Kovila Coopamootoo, Karen Elliott, Aad van Moorsel
Publikováno v:
Big Data & Society, Vol 7 (2020)
Current attention directed at ethical dimensions of data and Artificial Intelligence have led to increasing recognition of the need to secure and maintain public support for uses (and reuses) of people’s data. This is essential to establish a “So
Externí odkaz:
https://doaj.org/article/4c174cb399ac458eb8b162caf3493907
Autor:
Charles Morisset, Christopher Laing, Aad van Moorsel, Thomas Groß, James Turland, Iryna Yevseyeva, Lynne Coventry
Publikováno v:
International Journal of Information Systems and Project Management, Vol 03, Iss 03, Pp 5-22 (2015)
In this work we address the main issues of Information Technology (IT) consumerization that are related to security risks, and vulnerabilities of devices used within Bring Your Own Device (BYOD) strategy in particular. We propose a ‘soft’ mitigat
Publikováno v:
Communications in Computer and Information Science ISBN: 9783031236174
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1d2f5c32725647e7e4fafc4a60fb7b3f
https://doi.org/10.1007/978-3-031-23618-1_42
https://doi.org/10.1007/978-3-031-23618-1_42
Autor:
Rajiv Ranjan, Deepak Puthal, Song Jun, Zhenyu Wen, Schahram Dustdar, Aad van Moorsel, Laurence T. Yang
Publikováno v:
ACM Transactions on Cyber-Physical Systems. 4:1-19
The Internet of Things (IoT) is becoming a backbone of sensing infrastructure to several mission-critical applications such as smart health, disaster management, and smart cities. Due to resource-constrained sensing devices, IoT infrastructures use E
Publikováno v:
Quantitative Evaluation of Systems ISBN: 9783031163357
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::692a44f337627a15de5cf6ef1901af09
https://doi.org/10.1007/978-3-031-16336-4_16
https://doi.org/10.1007/978-3-031-16336-4_16
Autor:
Karen Elliott, Kovila Coopamootoo, Edward Curran, Paul Ezhilchelvan, Samantha Finnigan, Dave Horsfall, Zhichao Ma, Magdalene Ng, Tasos Spiliotopoulos, Han Wu, Aad van Moorsel
Financial inclusion depends on providing adjusted services for citizens with disclosed vulnerabilities. At the same time, the financial industry needs to adhere to a strict regulatory framework, which is often in conflict with the desire for inclusiv
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::27635d8d58eddb69ecd1a173567d1daa
http://arxiv.org/abs/2112.09767
http://arxiv.org/abs/2112.09767
Autor:
Maher Alharby, Aad van Moorsel
Publikováno v:
International Journal of Network Management. 32