Published: Jan 1, 2011
Converted to Gold OA:
DOI: 10.4018/jdtis.2011010101
Volume 2
Article
Sherrie Drye Cannoy
In this paper, the author examines the critical issues that have emerged in the area of electronic healthcare information exchange (HIE) in the United States. An interpretive, longitudinal study was...
Show More
In this paper, the author examines the critical issues that have emerged in the area of electronic healthcare information exchange (HIE) in the United States. An interpretive, longitudinal study was conducted over a total of four years through a study of seven field cases. This paper aggregates findings from these seven efforts into one research study for a more comprehensive view of HIE issues. The findings provide a framework for understanding the issues of HIE for researchers and practitioners. Research, teaching, and practitioner implications are discussed.
Content Forthcoming
Add to Your Personal Library: Article Published: Jan 1, 2011
Converted to Gold OA:
DOI: 10.4018/jdtis.2011010102
Volume 2
Article
Sandra A. Vannoy
The Internet and emerging technologies are facilitating the creation of new marketplaces designed to address a diverse range of business and societal needs. As companies are utilizing technology to...
Show More
The Internet and emerging technologies are facilitating the creation of new marketplaces designed to address a diverse range of business and societal needs. As companies are utilizing technology to manage their business processes, such a marketplace has emerged that is designed to provide third-party availability of business services delivered via Web services technology, particularly in the context of Cloud Computing. The Web Services Marketplace creates a common trading ground wherein buyers and sellers of business services can come together within a centralized marketplace. However, sellers of business services must provide a mechanism by which knowledge and awareness of the service is created for the buyer and a means by which sellers can effectively compete in the marketplace. The most widely accepted method for accomplishing these tasks is advertising. This study investigates the nascent phenomenon of the advertising of business services within the Web services marketplace, develops a theoretically grounded definition and characteristics of business services offered in the Web Services Marketplace, and develops a model for the effective advertisement of business services offered in the Web Services Marketplace.
Content Forthcoming
Add to Your Personal Library: Article Published: Jan 1, 2011
Converted to Gold OA:
DOI: 10.4018/jdtis.2011010103
Volume 2
Article
A. F. Salam
Increasingly firms are competing through the formation of extended enterprises. An extended enterprise consists of a set of firms within a value chain that collaborate to produce a finished product....
Show More
Increasingly firms are competing through the formation of extended enterprises. An extended enterprise consists of a set of firms within a value chain that collaborate to produce a finished product. The case of dependable supplier selection, in the context of the extended enterprise, is complex where the focal firm has to select the supplier(s) for a specific class of customers depending on the value of those customers to the focal firm and the extended enterprise. This process requires careful consideration of a set of selection criteria to be used in selecting the suppliers. In this article, a semantic intelligent agent-based architecture and decision support system are presented for selecting dependable suppliers in the context of extended enterprise.
Content Forthcoming
Add to Your Personal Library: Article Published: Apr 1, 2011
Converted to Gold OA:
DOI: 10.4018/jdtis.2011040101
Volume 2
Article
Afonso Araújo Neto, Marco Vieira
The multiplicity of existing software and component alternatives for web applications, especially in open source communities, has boosted interest in suitable benchmarks, able to assist in the...
Show More
The multiplicity of existing software and component alternatives for web applications, especially in open source communities, has boosted interest in suitable benchmarks, able to assist in the selection of candidate solutions, concerning several quality attributes. However, the huge success of performance and dependability benchmarking contrasts the small advances in security benchmarking. Traditional vulnerability/attack detection techniques can hardly be used alone to benchmark security, as security depends on hidden vulnerabilities and subtle properties of the system and its environment. A comprehensive security benchmarking process should consist of a two-step process: elimination of flawed alternatives followed by trustworthiness benchmarking. In this paper, the authors propose a trustworthiness benchmark based on the systematic collection of evidences that can be used to select one among several web applications, from a security point-of-view. They evaluate this benchmark approach by comparing its results with an evaluation conducted by a group of security experts and programmers. Results show that the proposed benchmark provides security rankings similar to those provided by human experts. In fact, although experts may take days to gather the information and rank the alternative web applications, the benchmark consistently provides similar results in a matter of few minutes.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Neto, Afonso Araújo, and Marco Vieira. "Selecting Secure Web Applications Using Trustworthiness Benchmarking." IJDTIS vol.2, no.2 2011: pp.1-16. http://doi.org/10.4018/jdtis.2011040101
APA
Neto, A. A. & Vieira, M. (2011). Selecting Secure Web Applications Using Trustworthiness Benchmarking. International Journal of Dependable and Trustworthy Information Systems (IJDTIS), 2(2), 1-16. http://doi.org/10.4018/jdtis.2011040101
Chicago
Neto, Afonso Araújo, and Marco Vieira. "Selecting Secure Web Applications Using Trustworthiness Benchmarking," International Journal of Dependable and Trustworthy Information Systems (IJDTIS) 2, no.2: 1-16. http://doi.org/10.4018/jdtis.2011040101
Export Reference
Published: Apr 1, 2011
Converted to Gold OA:
DOI: 10.4018/jdtis.2011040102
Volume 2
Article
Brahim Hamid, Yulin (Huaxi) Zhang, Jacob Geisel, David Gonzalez
The conception and design of Resource Constrained Embedded Systems (RCES) is an inherently complex endeavor. Non-functional requirements from security and dependability are exacerbate this...
Show More
The conception and design of Resource Constrained Embedded Systems (RCES) is an inherently complex endeavor. Non-functional requirements from security and dependability are exacerbate this complexity. Model-Driven Engineering (MDE) is a promising approach for the design of trusted systems, as it bridges the gap between design issues and implementation concerns. The purpose of process models is to document and communicate processes, as well as reuse them. Thus, processes can be better taught and executed. However, most useful metamodels are activity-oriented, and the required concepts of safety lifecycle, such as validation, cannot be easily modeled. In this paper, the authors propose a safety-oriented process metamodel that extends exiting framework to support all safety control requirements. A new safety lifecycle development processes technique has been built to ease its use in a building process of system/ software applications with safety support. As a proof of concept, the feasibility of the approach has been evaluated with an example. The example is an engineering process for building industry control systems with safety requirements for software and hardware resources. A prototype implementation of the approach is provided and applied to the example of industry control systems in the railway domain.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Hamid, Brahim, et al. "First Experiment on Modeling Safety LifeCycle Process in Railway Systems." IJDTIS vol.2, no.2 2011: pp.17-39. http://doi.org/10.4018/jdtis.2011040102
APA
Hamid, B., Zhang, Y. H., Geisel, J., & Gonzalez, D. (2011). First Experiment on Modeling Safety LifeCycle Process in Railway Systems. International Journal of Dependable and Trustworthy Information Systems (IJDTIS), 2(2), 17-39. http://doi.org/10.4018/jdtis.2011040102
Chicago
Hamid, Brahim, et al. "First Experiment on Modeling Safety LifeCycle Process in Railway Systems," International Journal of Dependable and Trustworthy Information Systems (IJDTIS) 2, no.2: 17-39. http://doi.org/10.4018/jdtis.2011040102
Export Reference
Published: Apr 1, 2011
Converted to Gold OA:
DOI: 10.4018/jdtis.2011040103
Volume 2
Article
Afolayan A. Obiniyi, Ezugwu E. Absalom, Mohammed Dikko
With the explosion of the public Internet, corporate networks connected to the Internet, if not adequately secured, are vulnerable to damaging attacks. Hackers, viruses, worms, Trojan horses, and...
Show More
With the explosion of the public Internet, corporate networks connected to the Internet, if not adequately secured, are vulnerable to damaging attacks. Hackers, viruses, worms, Trojan horses, and spyware try to invade privacy. This research examines how these threats affect the corporate network and ways to reduce them. MikroTik routerOS was configured as the router to examine these threats. Network Address Translation and packet filtering where the key features configured to make the network hidden for unauthorized users and filter unwanted traffics that might reflect malicious acts. The configuration and test were carried out at Iya Abubakar Computer Center, Ahamdu Bello University, Zaria, Nigeria. At the onset, the targeted network was full of virus, worms, Trojan horses, spyware, and vulnerable to unauthorized users. The signal strength of the network was usually very poor due to the effect from the threats affecting the bandwidth. The firewall was configured to filter out inherently dangerous services, exposing the network to fewer risks. After the research, the performance and efficiency of the network was improved tremendously.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Obiniyi, Afolayan A., et al. "Network Security and Firewall Technology: A Step to Safety of National IT Vision." IJDTIS vol.2, no.2 2011: pp.40-60. http://doi.org/10.4018/jdtis.2011040103
APA
Obiniyi, A. A., Absalom, E. E., & Dikko, M. (2011). Network Security and Firewall Technology: A Step to Safety of National IT Vision. International Journal of Dependable and Trustworthy Information Systems (IJDTIS), 2(2), 40-60. http://doi.org/10.4018/jdtis.2011040103
Chicago
Obiniyi, Afolayan A., Ezugwu E. Absalom, and Mohammed Dikko. "Network Security and Firewall Technology: A Step to Safety of National IT Vision," International Journal of Dependable and Trustworthy Information Systems (IJDTIS) 2, no.2: 40-60. http://doi.org/10.4018/jdtis.2011040103
Export Reference
Published: Jul 1, 2011
Converted to Gold OA:
DOI: 10.4018/jdtis.2011070101
Volume 2
Article
Charlie C. Chen
Case-based pedagogy has evolved as an important tool for enhancing students’ analytical thinking and problem solving skills, as well as fostering the ability to make decisions under conditions of...
Show More
Case-based pedagogy has evolved as an important tool for enhancing students’ analytical thinking and problem solving skills, as well as fostering the ability to make decisions under conditions of uncertainty. Due to the rapid development of technologies that allow collaboration and interaction despite geographic and temporal distances, educators are investigating the viability of emerging technologies such as cloud computing as platforms for case-based pedagogical techniques. This paper utilizes information systems (IS) success theory as the foundation of a study to examine case-based pedagogy in a cloud-computing environment. A three-week field experiment followed by a post-test survey is conducted in order to validate hypothesized relationships among cloud computing information quality, cloud computing system quality, cloud computing use, performance expectation in case-based pedagogy, and cloud computing critical mass. Results suggest that information quality has significant influence on not only use of cloud computing for case-based pedagogy, but also increases performance expectation and leads to critical mass. The findings of this study suggest that cloud computing is a viable platform for case-based pedagogy.
Content Forthcoming
Add to Your Personal Library: Article Published: Jul 1, 2011
Converted to Gold OA:
DOI: 10.4018/jdtis.2011070102
Volume 2
Article
Amir K.C, Harri Forsgren, Kaj Grahn, Timo Karvi, Göran Pulkkis
Host Identity Protocol (HIP) gives cryptographically verifiable identities to hosts. These identities are based on public key cryptography and consist of public and private keys. Public keys can be...
Show More
Host Identity Protocol (HIP) gives cryptographically verifiable identities to hosts. These identities are based on public key cryptography and consist of public and private keys. Public keys can be stored, together with corresponding IP addresses, in DNS servers. When entities are negotiating on a HIP connection, messages are signed with private keys and verified with public keys. Even if this system is quite secure, there is some vulnerability concerning the authenticity of public keys. The authors examine some possibilities to derive trust in public parameters. These are DNSSEC and public key certificates (PKI). Especially, the authors examine how to implement certificate handling and what is the time complexity of using and verifying certificates in the HIP Base Exchange. It turned out that certificates delayed the HIP Base Exchange only some milliseconds compared to the case where certificates are not used. In the latter part of our article the authors analyze four proposed HIP multicast models and how they could use certificates. There are differences in the models how many times the Base Exchange is performed and to what extent existing HIP specification standards must be modified.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
K.C, Amir, et al. "Security and Trust of Public Key Cryptography for HIP and HIP Multicast." IJDTIS vol.2, no.3 2011: pp.17-35. http://doi.org/10.4018/jdtis.2011070102
APA
K.C, A., Forsgren, H., Grahn, K., Karvi, T., & Pulkkis, G. (2011). Security and Trust of Public Key Cryptography for HIP and HIP Multicast. International Journal of Dependable and Trustworthy Information Systems (IJDTIS), 2(3), 17-35. http://doi.org/10.4018/jdtis.2011070102
Chicago
K.C, Amir, et al. "Security and Trust of Public Key Cryptography for HIP and HIP Multicast," International Journal of Dependable and Trustworthy Information Systems (IJDTIS) 2, no.3: 17-35. http://doi.org/10.4018/jdtis.2011070102
Export Reference
Published: Jul 1, 2011
Converted to Gold OA:
DOI: 10.4018/jdtis.2011070103
Volume 2
Article
Angel R. Otero, Abdel Ejnioui, Carlos E. Otero, Gurvirender Tejay
In an era where dependence of information systems is significantly high, the threat of incidents related to information security that could jeopardize the information held by is becoming critical....
Show More
In an era where dependence of information systems is significantly high, the threat of incidents related to information security that could jeopardize the information held by is becoming critical. Alarming facts within the literature point to inadequacies in information security practices, particularly the evaluation and prioritization of information security controls in organizations. Research efforts have resulted in various methodologies developed to deal with the ISC assessment problem. A closer look at these traditional methodologies highlights various weaknesses that can prevent effective assessments of information security controls in organizations. This research proposes a novel approach using Grey Relational Analysis to quantify the importance of each information security control taking into account organizations’ goals and objectives. Through a case study, the approach is proven successful in providing a way for measuring the quality of information security controls based on multiple application-specific criteria.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Otero, Angel R., et al. "Evaluation of Information Security Controls in Organizations by Grey Relational Analysis." IJDTIS vol.2, no.3 2011: pp.36-54. http://doi.org/10.4018/jdtis.2011070103
APA
Otero, A. R., Ejnioui, A., Otero, C. E., & Tejay, G. (2011). Evaluation of Information Security Controls in Organizations by Grey Relational Analysis. International Journal of Dependable and Trustworthy Information Systems (IJDTIS), 2(3), 36-54. http://doi.org/10.4018/jdtis.2011070103
Chicago
Otero, Angel R., et al. "Evaluation of Information Security Controls in Organizations by Grey Relational Analysis," International Journal of Dependable and Trustworthy Information Systems (IJDTIS) 2, no.3: 36-54. http://doi.org/10.4018/jdtis.2011070103
Export Reference
Published: Jul 1, 2011
Converted to Gold OA:
DOI: 10.4018/jdtis.2011070104
Volume 2
Article
Utpal Bose
Rapid transformation in marketing information technologies has enabled corporations to build ample consumer databases and analyze those using sophisticated data-mining techniques to obtain extensive...
Show More
Rapid transformation in marketing information technologies has enabled corporations to build ample consumer databases and analyze those using sophisticated data-mining techniques to obtain extensive knowledge about those consumers’ personal life styles and private matters. Considering that the United States Federal Trade Commission (FTC) has relied on fair information principles to guide privacy regulation and left it relatively unregulated, the burden of practicing consumer privacy lies mostly on the marketers who have to follow ethical behavior and maintain consumer privacy. In this paper the authors analyze the ethical nature of corporate decision making on matters of selling consumer data using the normative theories of business ethics and suggests approaches that balance the corporate goals of raising financial gains with the obligations they have to their stakeholders – mainly their customers. The authors also discuss the challenges faced in carrying out the analysis.
Content Forthcoming
Add to Your Personal Library: Article
IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface
that can easily searched or integrated into library discovery systems.
Browse IGI Global Open
Access Collection
Author Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.comOpen Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.comProduction-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.comRights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.comPublication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.comDiscoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100