Listing 1 - 10 of 15 | << page >> |
Sort by
|
Choose an application
This book aims to help research practitioners in technology science avoid some of the most common pitfalls or at least make them easier to overcome. Many technology scientists put too little weight on how they conduct their work and should be able to become significantly better at what they do by being more aware of methodological issues. The book differs from other related works in two main respects: First, by focusing on creating, producing, or inventing new artifacts – in other words, technology science. Second, by describing a general approach to technology science linking together specialized research methods. The book consists of 14 chapters. Following the first introductory chapter are two chapters providing the foundation for the rest of the book. These chapters clarify the meaning of key concepts and describe an overall process for technology science. The subsequent chapters 4–11 are about this process. Chapters 4, 5, and 6 concern problem analysis, research planning, and hypothesis formulation. The following five chapters then aim at evaluation. Chapter 7 introduces the concept of prediction, which plays a fundamental role in evaluating hypotheses. Chapters 8–10 address the evaluation of universal, existential, and statistical hypotheses. Chapter 11 concerns quality assurance and introduces the concepts of validity and reliability. Next, in chapters 12 and 13, we address publishing with an emphasis on the specifics of technology science. Eventually the last chapter, chapter 14, briefly introduces the philosophy of science. The book systematically collects in the form of suggestions, recommendations, and guidelines the author’s 35-year experience as a researcher, author and reviewer in technology science. It is written for anyone working in technology science, from master’s students to researchers and supervisors.
Research—Methodology. --- Computers. --- Science—Moral and ethical aspects. --- Technology—Moral and ethical aspects. --- Research Skills. --- Computing Milieux. --- Science Ethics. --- Ethics of Technology. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Technology. --- Applied science --- Arts, Useful --- Science, Applied --- Useful arts --- Science --- Industrial arts --- Material culture
Choose an application
Choose an application
This book aims to help research practitioners in technology science avoid some of the most common pitfalls or at least make them easier to overcome. Many technology scientists put too little weight on how they conduct their work and should be able to become significantly better at what they do by being more aware of methodological issues. The book differs from other related works in two main respects: First, by focusing on creating, producing, or inventing new artifacts - in other words, technology science. Second, by describing a general approach to technology science linking together specialized research methods. The book consists of 14 chapters. Following the first introductory chapter are two chapters providing the foundation for the rest of the book. These chapters clarify the meaning of key concepts and describe an overall process for technology science. The subsequent chapters 4-11 are about this process. Chapters 4, 5, and 6 concern problem analysis, research planning, and hypothesis formulation. The following five chapters then aim at evaluation. Chapter 7 introduces the concept of prediction, which plays a fundamental role in evaluating hypotheses. Chapters 8-10 address the evaluation of universal, existential, and statistical hypotheses. Chapter 11 concerns quality assurance and introduces the concepts of validity and reliability. Next, in chapters 12 and 13, we address publishing with an emphasis on the specifics of technology science. Eventually the last chapter, chapter 14, briefly introduces the philosophy of science. The book systematically collects in the form of suggestions, recommendations, and guidelines the author's 35-year experience as a researcher, author and reviewer in technology science. It is written for anyone working in technology science, from master's students to researchers and supervisors.
Science --- Computer science --- Computer. Automation --- computers --- informatica --- onderzoeksmethoden
Choose an application
This book presents a fundamental mathematical and logical approach to soft ware and systems engineering. Considering the large number of books de scribing mathematical approaches to program development, it is important to explain what we consider to be the specific contribution of our book, to identify our goals, and to characterize our intended target audience. Most books dealing with the mathematics and logics of programming and system development are mainly devoted to programming in the small. This is in contrast to our book where the emphasis is on modular system development with the help of component specifications with precisely identified interfaces and refinement concepts. Our book aims at systems development carried out in a systematic way, based on a clear mathematical theory. We do not claim that this book presents a full-blown engineering method. In fact, this is certainly not a book for the application-driven software engi neer looking for a practical method for system development in an industrial context. It is much rather a book for the computer scientist and the scientifi cally interested engineer who looks for basic principles of system development and, moreover, its mathematical foundations. It is also a book for method builders interested in a proper mathematical foundation on which they can build a practical development method and industrial-strength support tools.
Computer science --- Software engineering. --- Systems engineering. --- Computers. --- Computer logic. --- Mathematical logic. --- Theory of Computation. --- Software Engineering/Programming and Operating Systems. --- Logics and Meanings of Programs. --- Mathematical Logic and Formal Languages. --- Algebra of logic --- Logic, Universal --- Mathematical logic --- Symbolic and mathematical logic --- Symbolic logic --- Mathematics --- Algebra, Abstract --- Metamathematics --- Set theory --- Syllogism --- Computer science logic --- Logic, Symbolic and mathematical --- Computer software engineering --- Engineering --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace
Choose an application
This book provides a brief and general introduction to cybersecurity and cyber-risk assessment. Not limited to a specific approach or technique, its focus is highly pragmatic and is based on established international standards (including ISO 31000) as well as industrial best practices. It explains how cyber-risk assessment should be conducted, which techniques should be used when, what the typical challenges and problems are, and how they should be addressed. The content is divided into three parts. First, part I provides a conceptual introduction to the topic of risk management in general and to cybersecurity and cyber-risk management in particular. Next, part II presents the main stages of cyber-risk assessment from context establishment to risk treatment and acceptance, each illustrated by a running example. Finally, part III details four important challenges and how to reasonably deal with them in practice: risk measurement, risk scales, uncertainty, and low-frequency risks with high consequence. The target audience is mainly practitioners and students who are interested in the fundamentals and basic principles and techniques of security risk assessment, as well as lecturers seeking teaching material. The book provides an overview of the cyber-risk assessment process, the tasks involved, and how to complete them in practice.
Computer Science --- Engineering & Applied Sciences --- Computer crimes --- Cyberspace --- Computer security. --- Data protection. --- Prevention. --- Security measures. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Management. --- Industrial management. --- Mathematical statistics. --- Management information systems. --- Quality control. --- Reliability. --- Industrial safety. --- Computer Science. --- Systems and Data Security. --- Quality Control, Reliability, Safety and Risk. --- Management of Computing and Information Systems. --- Probability and Statistics in Computer Science. --- Innovation/Technology Management. --- Data protection --- Security systems --- Hacking --- Industrial accidents --- Industries --- Job safety --- Occupational hazards, Prevention of --- Occupational health and safety --- Occupational safety and health --- Prevention of industrial accidents --- Prevention of occupational hazards --- Safety, Industrial --- Safety engineering --- Safety measures --- Safety of workers --- Accidents --- System safety --- Dependability --- Trustworthiness --- Conduct of life --- Factory management --- Industrial engineering --- Reliability (Engineering) --- Sampling (Statistics) --- Standardization --- Quality assurance --- Quality of products --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Mathematics --- Statistical inference --- Statistics, Mathematical --- Statistics --- Probabilities --- Business administration --- Business enterprises --- Business management --- Corporate management --- Corporations --- Industrial administration --- Management, Industrial --- Rationalization of industry --- Scientific management --- Business --- Industrial organization --- Administration --- Industrial relations --- Organization --- Informatics --- Science --- Prevention --- Communication systems --- Statistical methods --- Electronic data processing --- Space and time --- Telematics --- System safety. --- Information Systems. --- Safety, System --- Safety of systems --- Systems safety --- Industrial safety --- Systems engineering
Choose an application
The term “risk” is known from many fields, and we are used to references to contractual risk, economic risk, operational risk, legal risk, security risk, and so forth. We conduct risk analysis, using either offensive or defensive approaches to identify and assess risk. Offensive approaches are concerned with balancing potential gain against risk of investment loss, while defensive approaches are concerned with protecting assets that already exist. In this book, Lund, Solhaug and Stølen focus on defensive risk analysis, and more explicitly on a particular approach called CORAS. CORAS is a model-driven method for defensive risk analysis featuring a tool-supported modelling language specially designed to model risks. Their book serves as an introduction to risk analysis in general, including the central concepts and notions in risk analysis and their relations. The authors’ aim is to support risk analysts in conducting structured and stepwise risk analysis. To this end, the book is divided into three main parts. Part I of the book introduces and demonstrates the central concepts and notation used in CORAS, and is largely example-driven. Part II gives a thorough description of the CORAS method and modelling language. After having completed this part of the book, the reader should know enough to use the method in practice. Finally, Part III addresses issues that require special attention and treatment, but still are often encountered in real-life risk analysis and for which CORAS offers helpful advice and assistance. This part also includes a short presentation of the CORAS tool support. The main target groups of the book are IT practitioners and students at graduate or undergraduate level. They will appreciate a concise introduction into the emerging field of risk analysis, supported by a sound methodology, and completed with numerous examples and detailed guidelines.
Risk assessment -- Computer simulation. --- Risk assessment --- Risk management --- Management --- Engineering & Applied Sciences --- Business & Economics --- Management Styles & Communication --- Management Theory --- Computer Science --- Computer simulation --- Mathematical models. --- Computer science. --- Management. --- Industrial management. --- Computer security. --- Management information systems. --- Quality control. --- Reliability. --- Industrial safety. --- Computer Science. --- Management of Computing and Information Systems. --- Innovation/Technology Management. --- Quality Control, Reliability, Safety and Risk. --- Systems and Data Security. --- Risk assessment - Computer simulation
Choose an application
The term risk is known from many fields, and we are used to references to contractual risk, economic risk, operational risk, legal risk, security risk, and so forth. We conduct risk analysis, using either offensive or defensive approaches to identify and assess risk. Offensive approaches are concerned with balancing potential gain against risk of investment loss, while defensive approaches are concerned with protecting assets that already exist. In this book, Lund, Solhaug and Stølen focus on defensive risk analysis, and more explicitly on a particular approach called CORAS. CORAS is a model-driven method for defensive risk analysis featuring a tool-supported modelling language specially designed to model risks. Their book serves as an introduction to risk analysis in general, including the central concepts and notions in risk analysis and their relations. The authors' aim is to support risk analysts in conducting structured and stepwise risk analysis. To this end, the book is divided into three main parts. Part I of the book introduces and demonstrates the central concepts and notation used in CORAS, and is largely example-driven. Part II gives a thorough description of the CORAS method and modelling language. After having completed this part of the book, the reader should know enough to use the method in practice. Finally, Part III addresses issues that require special attention and treatment, but still are often encountered in real-life risk analysis and for which CORAS offers helpful advice and assistance. This part also includes a short presentation of the CORAS tool support. The main target groups of the book are IT practitioners and students at graduate or undergraduate level. They will appreciate a concise introduction into the emerging field of risk analysis, supported by a sound methodology, and completed with numerous examples and detailed guidelines.
Production management --- Computer. Automation --- Computer architecture. Operating systems --- technologiebeleid --- Engineering sciences. Technology --- kwaliteitscontrole --- informatica management --- computerbeveiliging --- Risk assessment --- Risk management --- Evaluation du risque --- Gestion du risque --- Computer simulation --- Simulation par ordinateur --- EPUB-LIV-FT LIVINFOR SPRINGER-B --- Computer simulation.
Choose an application
This book constitutes revised selected papers from the 4th International Workshop on Graphical Models for Security, GraMSec 2017, held in Santa Barbara, CA, USA, in August 2017. The 5 full and 4 short papers presented in this volume were carefully reviewed and selected from 19 submissions. The book also contains one invited paper from the WISER project. The contributions deal with the latest research and developments on graphical models for security.
Computer science. --- Computer organization. --- Computer programming. --- Software engineering. --- Computer security. --- Artificial intelligence. --- Computers. --- Computer Science. --- Systems and Data Security. --- Programming Techniques. --- Software Engineering. --- Artificial Intelligence (incl. Robotics). --- Computing Milieux. --- Computer Systems Organization and Communication Networks. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- AI (Artificial intelligence) --- Artificial thinking --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer software engineering --- Engineering --- Electronic computer programming --- Programming (Electronic computers) --- Coding theory --- Organization, Computer --- Informatics --- Science --- Protection --- Security measures --- Programming --- Computer network architectures. --- Artificial Intelligence. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Computer networks
Choose an application
Choose an application
This book provides a brief and general introduction to cybersecurity and cyber-risk assessment. Not limited to a specific approach or technique, its focus is highly pragmatic and is based on established international standards (including ISO 31000) as well as industrial best practices. It explains how cyber-risk assessment should be conducted, which techniques should be used when, what the typical challenges and problems are, and how they should be addressed. The content is divided into three parts. First, part I provides a conceptual introduction to the topic of risk management in general and to cybersecurity and cyber-risk management in particular. Next, part II presents the main stages of cyber-risk assessment from context establishment to risk treatment and acceptance, each illustrated by a running example. Finally, part III details four important challenges and how to reasonably deal with them in practice: risk measurement, risk scales, uncertainty, and low-frequency risks with high consequence. The target audience is mainly practitioners and students who are interested in the fundamentals and basic principles and techniques of security risk assessment, as well as lecturers seeking teaching material. The book provides an overview of the cyber-risk assessment process, the tasks involved, and how to complete them in practice.
Methodology of economics --- Operational research. Game theory --- Mathematical statistics --- Hygiene. Public health. Protection --- Organization theory --- Plant and equipment --- Production management --- Business management --- Business economics --- Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- betrouwbaarheid --- financieel management --- MIS (management informatie systeem) --- stochastische analyse --- veiligheid (bouw) --- computers --- informatica --- management --- statistiek --- informatietechnologie --- computerbeveiliging --- informatica management --- kwaliteitscontrole --- computerkunde
Listing 1 - 10 of 15 | << page >> |
Sort by
|