2014 47th Hawaii International Conference on System Sciences最新文献

筛选
英文 中文
Analysis of Monolithic and Microkernel Architectures: Towards Secure Hypervisor Design 单片和微内核架构分析:迈向安全管理程序设计
2014 47th Hawaii International Conference on System Sciences Pub Date : 2014-03-10 DOI: 10.1109/HICSS.2014.615
Jordan Shropshire
{"title":"Analysis of Monolithic and Microkernel Architectures: Towards Secure Hypervisor Design","authors":"Jordan Shropshire","doi":"10.1109/HICSS.2014.615","DOIUrl":"https://doi.org/10.1109/HICSS.2014.615","url":null,"abstract":"This research focuses on hyper visor security from holistic perspective. It centers on hyper visor architecture - the organization of the various subsystems which collectively compromise a virtualization platform. It holds that the path to a secure hyper visor begins with a big-picture focus on architecture. Unfortunately, little research has been conducted with this perspective. This study investigates the impact of monolithic and micro kernel hyper visor architectures on the size and scope of the attack surface. Six architectural features are compared: management API, monitoring interface, hyper calls, interrupts, networking, and I/O. These subsystems are core hyper visor components which could be used as attack vectors. Specific examples and three leading hyper visor platforms are referenced (ESXi for monolithic architecture; Xen and Hyper-V for micro architecture). The results describe the relative strengths and vulnerabilities of both types of architectures. It is concluded that neither design is more secure, since both incorporate security tradeoffs in core processes.","PeriodicalId":250241,"journal":{"name":"2014 47th Hawaii International Conference on System Sciences","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127075646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Analyzing and Modeling of Medical Data on Distributed Computing Infrastructures 基于分布式计算基础设施的医疗数据分析与建模
2014 47th Hawaii International Conference on System Sciences Pub Date : 2014-03-10 DOI: 10.1109/HICSS.2014.364
G. Terstyánszky, T. Kiss, V. Korkhov, S. Olabarriaga
{"title":"Analyzing and Modeling of Medical Data on Distributed Computing Infrastructures","authors":"G. Terstyánszky, T. Kiss, V. Korkhov, S. Olabarriaga","doi":"10.1109/HICSS.2014.364","DOIUrl":"https://doi.org/10.1109/HICSS.2014.364","url":null,"abstract":"Researchers want to analyse Health Care data which may requires large pools of compute and data resources. To have them they need access to Distributed Computing Infrastructures (DCI). To use them it requires expertise which researchers may not have. Workflows can hide infrastructures. There are many workflow systems but they are not interoperable. To learn a workflow system and create workflows in a workflow system may require significant effort. Considering these efforts it is not reasonable to expect that researchers will learn new workflow systems if they want to run workflows of other workflow systems. As a result, the lack of interoperability prevents workflow sharing and a vast amount of research efforts is wasted. The FP7 Sharing Interoperable Workflow for Large-Scale Scientific Simulation on Available DCIs (SHIWA) project developed the Coarse-Grained Interoperability (CGI) to enable workflow sharing. The project created the SHIWA Simulation Platform (SSP) to support CGI as a production-level service. The paper describes how the CGI approach can be used for analysis and simulation in Health Care.","PeriodicalId":250241,"journal":{"name":"2014 47th Hawaii International Conference on System Sciences","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126109071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risk Management in Video Game Development Projects 电子游戏开发项目中的风险管理
2014 47th Hawaii International Conference on System Sciences Pub Date : 2014-03-10 DOI: 10.1109/HICSS.2014.534
Marc L. Schmalz, Aimee Finn, Hazel Taylor
{"title":"Risk Management in Video Game Development Projects","authors":"Marc L. Schmalz, Aimee Finn, Hazel Taylor","doi":"10.1109/HICSS.2014.534","DOIUrl":"https://doi.org/10.1109/HICSS.2014.534","url":null,"abstract":"The video game software industry has a reputation for volatile, chaotic projects yet, in spite of dramatic growth in global revenues, surprisingly little academic work has examined these projects. This study reports a preliminary investigation into this under-researched area. We interviewed eight video game producers from a range of companies, using a critical incident method to explore risk management practices and risk perceptions. Our results revealed that in lieu of formal risk management practices, these managers relied on prototyping, pre-production decision points, and agile approaches to contain risk on their projects. Among the risk factors mentioned, two are specific to the unique context of video game development. The risk of failing to match the development strategy to the project was identified as a major cause of problems during the development process, and a new risk - the 'fun factor' - was a key element threatening the success of the final game release.","PeriodicalId":250241,"journal":{"name":"2014 47th Hawaii International Conference on System Sciences","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116923074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
IT Governance Effectiveness and Its Antecedents: An Empirical Examination in Brazilian Firms
2014 47th Hawaii International Conference on System Sciences Pub Date : 2014-03-10 DOI: 10.1109/HICSS.2014.540
G. Lunardi, A. C. Maçada, J. Becker
{"title":"IT Governance Effectiveness and Its Antecedents: An Empirical Examination in Brazilian Firms","authors":"G. Lunardi, A. C. Maçada, J. Becker","doi":"10.1109/HICSS.2014.540","DOIUrl":"https://doi.org/10.1109/HICSS.2014.540","url":null,"abstract":"IT governance has become an important concern for business, receiving great attention from both practitioners and academics. Although some authors have stated that effective IT governance is crucial for any organization to achieve its corporate goals, little academic research is available that empirically supports the assumptions about the factors that determine the effectiveness of IT governance. In this sense, we proposed and examined a theoretical model that explains and predicts IT governance effectiveness, linking its domains and mechanisms. We empirically tested our hypotheses based on survey data gathered from 87 CIOs of large Brazilian companies. The results have implications about how IT governance domains and the adoption of different IT governance mechanisms can affect IT governance effectiveness, bringing implications from theory and practice.","PeriodicalId":250241,"journal":{"name":"2014 47th Hawaii International Conference on System Sciences","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125024985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A Nomological Network Analysis of Research on Information Security Management Systems 信息安全管理系统研究的法理学网络分析
2014 47th Hawaii International Conference on System Sciences Pub Date : 2014-03-10 DOI: 10.1109/HICSS.2014.536
Fernando Parra, Laura L. Hall
{"title":"A Nomological Network Analysis of Research on Information Security Management Systems","authors":"Fernando Parra, Laura L. Hall","doi":"10.1109/HICSS.2014.536","DOIUrl":"https://doi.org/10.1109/HICSS.2014.536","url":null,"abstract":"This study offers a comprehensive examination of hypothetical concepts related to the behaviors, attitudes, outcomes, processes, experiences, manifestations and indicators connected with an organization's design, implementation and management of a coherent set of policies, procedures and systems to manage risks to its information assets. We introduce network analysis tools as a novel approach to highlight the construct relationships found in Information Security Management Systems (ISMS) literature published in the new millennium. Descriptive results display a significant expansion in the research of ISMS-related phenomena. Network analyses showcase the critical influence of certain constructs in scholarly publications as well as the most salient relationships among these constructs. Our study provides a gap analysis that also underscores those constructs that may require further exploration by this stream of research.","PeriodicalId":250241,"journal":{"name":"2014 47th Hawaii International Conference on System Sciences","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131472838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Things to Maintain or Change: The Importance of Critical Territory in Post-acquisition Integration Boundary Issues 需要维持或改变的内容:关键领域在收购后整合边界问题中的重要性
2014 47th Hawaii International Conference on System Sciences Pub Date : 2014-03-10 DOI: 10.1109/HICSS.2014.447
Dongcheol Heo, Heeseok Lee
{"title":"Things to Maintain or Change: The Importance of Critical Territory in Post-acquisition Integration Boundary Issues","authors":"Dongcheol Heo, Heeseok Lee","doi":"10.1109/HICSS.2014.447","DOIUrl":"https://doi.org/10.1109/HICSS.2014.447","url":null,"abstract":"Based upon two different but related post-acquisition cases of a global medical system manufacturing and service firm, this study explains why the preservation of a certain knowledge bearing domain, called critical territory, is essential in post-acquisition integration (PAI), particularly for the target firm. The lack of clear knowledge boundaries between the acquiring firm and the target firm and critical territories therein can jeopardize knowledge integration in PAI. The case analyses reveal both acquiring and target firms should promptly build and adjust their knowledge boundaries and critical territories, allowing selective, intelligent knowledge sharing and integration. It is also found that critical territory contributes to completing the ever-evolving knowledge cycle by enabling the synthesis and appropriation of PAI knowledge management activities of both the acquiring and target firms. Without the preservation of critical territory, knowledge integration in PAI hampers target firm knowledge management activities and maximum synergy generation, the goal of acquisition.","PeriodicalId":250241,"journal":{"name":"2014 47th Hawaii International Conference on System Sciences","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132449930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Securing KVM-Based Cloud Systems via Virtualization Introspection 通过虚拟化自省保护基于kvm的云系统
2014 47th Hawaii International Conference on System Sciences Pub Date : 2014-03-10 DOI: 10.1109/HICSS.2014.617
Sheng-Wei Lee, Fang Yu
{"title":"Securing KVM-Based Cloud Systems via Virtualization Introspection","authors":"Sheng-Wei Lee, Fang Yu","doi":"10.1109/HICSS.2014.617","DOIUrl":"https://doi.org/10.1109/HICSS.2014.617","url":null,"abstract":"Linux Kernel Virtual Machine (KVM) is one of the most commonly deployed hypervisor drivers in the IaaS layer of cloud computing ecosystems. The hypervisor provides a full-virtualization environment that intends to virtualize as much hardware and systems as possible, including CPUs, network interfaces and chipsets. With KVM, heterogeneous operating systems can be installed in Virtual Machines (VMs) in an homogeneous environment. However, it has been shown that various breaches due to software defects may cause damages on such a cloud ecosystem. We propose a new Virtualization Introspection System (VIS) to protect the host as well as VMs running on a KVM-based cloud structure from malicious attacks. VIS detects and intercepts attacks from VMs by collecting their static and dynamic status. We then replay the attacks on VMs and leverage artificial intelligence techniques to derive effective decision rules with unsupervised learning nature. The preliminary result shows the promise of the presented approach against several modern attacks on CVE-based vulnerabilities.","PeriodicalId":250241,"journal":{"name":"2014 47th Hawaii International Conference on System Sciences","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115263297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Which Factors Affect Software-as-a-Service Selection the Most? A Study from the Customer's and the Vendor's Perspective 哪些因素对软件即服务的选择影响最大?顾客与供应商视角下的研究
2014 47th Hawaii International Conference on System Sciences Pub Date : 2014-03-10 DOI: 10.1109/HICSS.2014.621
Ariana Polyviou, N. Pouloudi, Stamatia Rizou
{"title":"Which Factors Affect Software-as-a-Service Selection the Most? A Study from the Customer's and the Vendor's Perspective","authors":"Ariana Polyviou, N. Pouloudi, Stamatia Rizou","doi":"10.1109/HICSS.2014.621","DOIUrl":"https://doi.org/10.1109/HICSS.2014.621","url":null,"abstract":"Business interest in deploying Software-As-A-Service (SaaS) solutions has been increasing steadily. Despite this, there is limited empirical work addressing SaaS selection factors or attempting to understand the vendors' perception of the customer preferences. In this paper, we present the results of a qualitative study on SaaS selection factors that takes into account both the customers' and the vendors' perspectives. According to our findings, selection factors differ across customer segments. Furthermore, vendors appreciate the selection factors that relate more closely to the technical and branding aspects and seem to underestimate the importance of usability and support aspects that are highlighted by the customers.","PeriodicalId":250241,"journal":{"name":"2014 47th Hawaii International Conference on System Sciences","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131454704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
How Can Substitution and Complementarity Effects Be Leveraged for Broadband Internet Services Strategy? 宽带互联网服务战略如何利用替代和互补效应?
2014 47th Hawaii International Conference on System Sciences Pub Date : 2014-03-10 DOI: 10.1109/HICSS.2014.508
Gwangjae Jung, Youngsoo Kim, R. Kauffman
{"title":"How Can Substitution and Complementarity Effects Be Leveraged for Broadband Internet Services Strategy?","authors":"Gwangjae Jung, Youngsoo Kim, R. Kauffman","doi":"10.1109/HICSS.2014.508","DOIUrl":"https://doi.org/10.1109/HICSS.2014.508","url":null,"abstract":"With growth in mobile Internet services, the relationship between mobile and fixed broadband has become an issue in telecom firm strategy. Previous research focused on aggregate penetration for mobile and fixed broadband services. Our research analyzes the economic relationship between mobile and fixed broadband services at the household level, as a basis for how senior managers should rethink their strategy approach. Using data on broadband services subscriptions, we examine how changes that occur for mobile broadband services bandwidth (MBB) affect changes in fixed broadband bandwidth (FBB) services subscriptions, inclusive of new subscriptions - and vice versa. We explore the different cross-effects and asymmetric patterns of event-driven bandwidth changes. Mobile and fixed broadband services are complementary: both affect the consumption of the other. Our findings offer useful information for marketing strategy and broadband services promotion, such as bundling strategy based on bandwidth changes, and segmentation based on the bandwidth changes in both services.","PeriodicalId":250241,"journal":{"name":"2014 47th Hawaii International Conference on System Sciences","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125653561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Accelerating Economic Inequality and the Moral Responsibilities of Corporate-Employed Technologists 加速经济不平等和企业雇用技术人员的道德责任
2014 47th Hawaii International Conference on System Sciences Pub Date : 2014-03-10 DOI: 10.4018/IJSODIT.2015010103
A. Singer
{"title":"Accelerating Economic Inequality and the Moral Responsibilities of Corporate-Employed Technologists","authors":"A. Singer","doi":"10.4018/IJSODIT.2015010103","DOIUrl":"https://doi.org/10.4018/IJSODIT.2015010103","url":null,"abstract":"Corporate-employed technologists have a special moral responsibility to themselves and to others to help oppose the dynamics of accelerating inequality in the US and globally. They have distinctive capabilities in this respect and they are in a special position to do so. There exists a moral-responsibility-to-self in this context, involving meta-coherence and integrity. Responsibility-to-others can be enacted by attempting to inject scientific and ethical habits-of-thought into the global distributed governance process, but also by standing in opposition to corporate-level strategies and practices that make inequality worse.","PeriodicalId":250241,"journal":{"name":"2014 47th Hawaii International Conference on System Sciences","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134311066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信