963 resultados para cyber security, securitization, information technology, U.S CYBERCOM


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The thesis explores an effective model for using the internet in a distance training program for secondary school teachers. The professional development program, the dissertation, titled The Virtual University: Professional development for teachers, was initiated based on aspects of telecommunication technology and the professional development for Thai school teachers. The question of this program was “How could information technology be used in developing an appropriate professional development model for Thai teachers?” Prior to the project, the four research studies were conducted to formulate the related base line information and supported framework for the program development. The four researches are: (1) Telecommunication Technology in Thai Schools, (2) The Role of University on Science Teachers Development, (3) Computer Education Curriculum for Student Teachers: Theory and Practice, and (4) Teachers’ Perceptions of the Academic Link Project Between Schools and Universities for Teacher Professional Development. The first research study provides the information about the necessary basic factors for change in Thai secondary schools and the new insights and understandings about change in Thai schooling. The major findings were the understandings about teachers’ need for professional development, the available support in Thai school for professional development, and the limitations of professional development of teachers. The second research study provides the information about the roles of university faculty on initiation and operation of science teacher development programs, science teaching and learning resources centers, science instructional media design and production services, science teaching clinics, and science teachers’ associations. The third research study provides the conceptual framework for both preservice and inservice curriculum development program for teacher development. The last research study provides a base of descriptive information about the perspectives of school teachers towards the academic link project between schools and universities and the partnership which can assist in its establishment. The findings of these four research tasks were used for the formation of the framework of the dissertation. The EDNET Project, an example of teachers’ professional development through the information technology based training, was developed and implemented with ten school teachers in Khon Kaen.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

One of the major challenges of MIS activities is the difficulty in measuring the effectiveness of delivered systems. The principal purpose of my research is to explore this field in order to develop an instrument by which to measure such effectiveness. Conceptualisation of Information System (IS) Effectiveness has been substantially framed by DeLone and McLean's (1992) Success; Model. But with the innovation in Information Technology (IT) over the past decade, and the constant pressure in IT to improve performance, there is merit in undertaking a fresh appraisal of the issue. This study built on the model of IS Success developed by DeLone and MeLean, but was broadened to include related research from the domains of IS, Management and Marketing. This analysis found that an effective IS function is built on three pillars: the systems implemented; the information held and delivered by these systems; and, the service provided in support of the IS function. A common foundation for these pillars is the concept of stakeholder needs. In seeking to appreciate the effectiveness: of delivered IS applications in relation to the job performance of stakeholders, this research developed an understanding of what quality means in an IT context I argue that quality is a more useful criterion for effectiveness than the more customary measures of use and user satisfaction. Respecification of the IS Success Model was then proposed. The second phase of the research was to test this model empirically through judgment panels, focus groups and interviews. Results consistently supported the structure and components of the respecified model. Quality was determined as a multi-dimensional construct, with the key dimensions for the quality of delivered IS differing from those used in the research from other disciplines. Empirical work indicated that end-user stakeholders derived their evaluations of quality by internally evaluating perceived performance of delivered IS in relation to their expectations for such performance. A short trial explored whether, when overt measurement of expectations was concurrent with the measurement of perceptions, a more revealing appraisal of delivered IS quality was provided than when perceptions alone were measured. Results revealed a difference between the two measures. Using the New IS Success Model as the foundation, and drawing upon the related theoretical and empirical research, an instrument was developed to measure the quality/effectiveness of delivered IS applications. Four trials of this instrument, QUALIT, are documented. Analysis of results from preliminary trials indicates promise in terms of business value: the instrument is simple to administer and has the capacity to pinpoint areas of weakness. The research related to the respecification of the New IS Success Model and the associated empirical studies, including the development of QTJALIT, have both contributed to the development of theory about IS Effectiveness. More precisely, my research has reviewed the components of an information system, the dimensions comprising these components and the indicators of each, and based upon these findings, formulated an instrument by which to measure the effectiveness of a delivered IS.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The outcome of the research was the development of three network defence systems to protect corporate network infrastructure. The results showed that these defences were able to detect and filter around 94% of the DDoS attack traffic within a matter of seconds.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The thesis makes a significant contribution to the issue of anomaly detection by introducing a computational immunology approach. Immunity-based anomaly detection in high dimensional space is systematically investigated and the proposed hybrid method (combining data mining techniques and computational immunology) improves both accuracy and efficiency.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis proposes a novel architecture of Distributed Active Defense System (DADS) against Distibuted Denial of Service (DDoS) attacks. Three sub-systems of DADS were built. For each sub-system corresponding algorithms were developed, prototypes implemented, criteria for evaluation were set up and experiments in both simulation and real network laboratory environments were carried out.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Preliminary research into the critical factors associated with software development/implementation identified three dimensions for successful implementation based on alignment of the requirements engineering process with business needs, change management process and quality of the implementation process. Research results demonstrate the link between the conceptual model for process quality and the process management attributes determined during the research.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis explores the potential of several popular equalization techniques and proposes new approaches to overcome their disadvantages. A H2 optimal initialization has been proposed to overcome the slow convergence problem while keeping the simplicity algorithms. The effectiveness of the methods proposed in this thesis has been verified.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis explores the effects of Western culture on information about 'Asian-ness' in film. The findings demonstrate that, in the American films, 'Asian-ness' is constructed as being everything that the West is not. Western culture plays an important role in the representation of information about 'Asian-ness'.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this thesis, the author designed three sets of preference based ranking algorithms for information retrieval and provided the corresponsive applications for the algorithms. The main goal is to retrieve recommended, high similar and valuable ranking results to users.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Investigates the creation of a method for the connection and communication of commercial off the shelf discrete-event simulation packages for simulation models of manufacturing systems. Through this research a method to connect different commercial off the shelf discrete-event simulation packages was successfully developed facilitating parallel development of models and the creation of extremely large models.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Fraud and deception in online marketplaces has been an on-going problem. This thesis proposes novel techniques and mechanisms using agent technology to protect buyers and sellers in online environments such as eBay. The proposed solution has been rigorously tested and the results show good commercial promise.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis surveys the latest development of digital forensic tools designed for anti-cybercrime purposes. It discusses the necessity of testing the digital forensics tools, and presents a novel testing framework. This new testing framework takes the viewpoint of software vendors rather than traditional software engineering approaches.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis proposes an innovative adaptive multi-classifier spam filtering model, with a grey-list analyser and a dynamic feature selection method, to overcome false-positive problems in email classification. It also presents additional techniques to minimize the added complexity. Empirical evidence indicates the success of this model over existing approaches.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Network and Information security and reliability is still a key issue in information technology. This thesis develops two algorithms to improve the reliability and stability of content delivery systems, and proposes three attack detection schemes with high effectiveness and accuracy in detecting network attacks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis analyses authentication in public key encryption and makes contributions in two areas. Firstly, Compressed Nested PKI is proposed which improves the certificate validation process. Then an implicitly certified encryption scheme, Authenticated Public Key Encryption, which makes keys easier to manage, is introduced.