2 resultados para data backup

em Deakin Research Online - Australia


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Purpose Many methodologies exist to assess the security risks associated with unauthorized leakage, modification and interruption of information used by organisations. This paper argues that these methodologies have a traditional orientation towards the identification and assessment of technical information assets. This obscures key risks associated with the cultivation and deployment of organisational knowledge. The purpose of this paper is to explore how security risk assessment methods can more effectively identify and treat the knowledge associated with business processes.

Design/methodology/approach – The argument was developed through an illustrative case study in which a well-documented traditional methodology is applied to a complex data backup process. Follow-up interviews were conducted with the organisation’s security managers to explore the results of the assessment and the nature of knowledge “assets” within a business process.

Findings – It was discovered that the backup process depended, in subtle and often informal ways, on tacit knowledge to sustain operational complexity, handle exceptions and make frequent interventions. Although typical information security methodologies identify people as critical assets, this study suggests a new approach might draw on more detailed accounts of individual knowledge, collective knowledge and their relationship to organisational processes.

Originality/value – Drawing on the knowledge management literature, the paper suggests mechanisms to incorporate these knowledge-based considerations into the scope of information security risk methodologies. A knowledge protection model is presented as a result of this research. This model outlines ways in which organisations can effectively identify and treat risks around process knowledge critical to the business.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Despite significant advancements in wireless sensor networks (WSNs), energy conservation remains one of the most important research challenges. Proper organization of nodes (clustering) is one of the major techniques to expand the lifespan of the whole network through aggregating data at the cluster head. The cluster head is the backbone of the entire cluster. That means if a cluster head fails to accomplish its function, the received and collected data by cluster head can be lost. Moreover, the energy consumption following direct communications from sources to base stations will be increased. In this paper, we propose a type-2 fuzzy based self-configurable cluster head selection (SCCH) approach to not only consider the selection criterion of the cluster head but also present the cluster backup approach. Thus, in case of cluster failure, the system still works in an efficient way. The novelty of this protocol is the ability of handling communication uncertainty, which is an inherent operational aspect of sensor networks. The experiment results indicate SCCH performs better than other recently developed methods.