نتایج جستجو برای: and 5 infrastructural
تعداد نتایج: 17027160 فیلتر نتایج به سال:
Abstract—The threat modeling process starts with the phases of identifying critical assets, creating an architecture overview, and decomposing to identify possible points of attack. Data flow diagrams and sequence diagrams are used in this process. This paper proposes an alternative flow-based methodology for building an architectural map for the system. It provides a high-level methodology for...
This article examines the role of espionage in defending against cyber-attacks on infrastructural firms. We analyze the problem using a game between a government, an infrastructural firm and an attacker. If the attacker successfully breaches the IT security defenses of the infrastructural firm, primary losses accrue to that firm while widespread collateral losses accrue to the rest of the econo...
This chapter addresses issues related to how to enable the broadest possible innovative activities by infrastructural technology design. The authors focus on the development of high-level services based on mobile telecommunication technologies that for matters of simplicity are termed the development of a Mobile Internet. The focus of the analysis is how features of the technology itself enable...
Understanding the contextual factors affecting user experience is essential in designing and evaluating mobile systems for mobile work. The aim of this paper is to explore these contextual factors through three case studies: of safety observation at construction sites, passenger transportation with taxis, and mobile news journalism. For each case study we describe the nature of the mobile work ...
In less than a decade, Internet-enabled business-to-business (B2B) commerce has become central to supply chain management. But little is known about the infrastructural competencies required for manufacturers engaged in Internet-enabled activities with downstream business customers. This paper aims to take a first step in operationalizing a set of new, multi-item measures that tap into infrastr...
In this introduction to the Special Issue ‘Infrastructural Stigma and Urban Vulnerability’, we outline need join up debates on infrastructural exclusion one hand urban stigma other. We argue that doing so will allow us develop a better understanding of co-constitutive relationship between material symbolic structures city shaping vulnerability. Positing is not merely force but has significant e...
The study assesses Nigeria's infrastructure development and capital budgeting execution. A substantial correlation between the dependent explanatory factors was found using Pearson Correlation Analysis, which assessed link study's variable variables. In contrast, generalised least square regression used to assess assumptions. determined that variables accounted for 40% of improvements via deplo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید