Narrow your search

Library

ULB (7)

KU Leuven (6)

Odisee (6)

Thomas More Kempen (6)

Thomas More Mechelen (6)

UCLL (6)

ULiège (6)

VIVES (6)

AP (5)

KDG (5)

More...

Resource type

book (10)

digital (5)


Language

English (15)


Year
From To Submit

2023 (3)

2018 (1)

2015 (2)

2014 (2)

2011 (2)

More...
Listing 1 - 10 of 15 << page
of 2
>>
Sort by

Book
Technology research explained : design of software, architectures, methods, and technology in general
Author:
ISBN: 9783031258176 Year: 2023 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book aims to help research practitioners in technology science avoid some of the most common pitfalls or at least make them easier to overcome. Many technology scientists put too little weight on how they conduct their work and should be able to become significantly better at what they do by being more aware of methodological issues. The book differs from other related works in two main respects: First, by focusing on creating, producing, or inventing new artifacts – in other words, technology science. Second, by describing a general approach to technology science linking together specialized research methods. The book consists of 14 chapters. Following the first introductory chapter are two chapters providing the foundation for the rest of the book. These chapters clarify the meaning of key concepts and describe an overall process for technology science. The subsequent chapters 4–11 are about this process. Chapters 4, 5, and 6 concern problem analysis, research planning, and hypothesis formulation. The following five chapters then aim at evaluation. Chapter 7 introduces the concept of prediction, which plays a fundamental role in evaluating hypotheses. Chapters 8–10 address the evaluation of universal, existential, and statistical hypotheses. Chapter 11 concerns quality assurance and introduces the concepts of validity and reliability. Next, in chapters 12 and 13, we address publishing with an emphasis on the specifics of technology science. Eventually the last chapter, chapter 14, briefly introduces the philosophy of science. The book systematically collects in the form of suggestions, recommendations, and guidelines the author’s 35-year experience as a researcher, author and reviewer in technology science. It is written for anyone working in technology science, from master’s students to researchers and supervisors.


Book
Technology Research Explained : Design of Software, Architectures, Methods, and Technology in General
Author:
ISBN: 3031258169 3031258177 Year: 2023 Publisher: Cham Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Digital
Technology Research Explained : Design of Software, Architectures, Methods, and Technology in General
Author:
ISBN: 9783031258176 9783031258169 9783031258183 Year: 2023 Publisher: Cham Springer Nature

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book aims to help research practitioners in technology science avoid some of the most common pitfalls or at least make them easier to overcome. Many technology scientists put too little weight on how they conduct their work and should be able to become significantly better at what they do by being more aware of methodological issues. The book differs from other related works in two main respects: First, by focusing on creating, producing, or inventing new artifacts - in other words, technology science. Second, by describing a general approach to technology science linking together specialized research methods. The book consists of 14 chapters. Following the first introductory chapter are two chapters providing the foundation for the rest of the book. These chapters clarify the meaning of key concepts and describe an overall process for technology science. The subsequent chapters 4-11 are about this process. Chapters 4, 5, and 6 concern problem analysis, research planning, and hypothesis formulation. The following five chapters then aim at evaluation. Chapter 7 introduces the concept of prediction, which plays a fundamental role in evaluating hypotheses. Chapters 8-10 address the evaluation of universal, existential, and statistical hypotheses. Chapter 11 concerns quality assurance and introduces the concepts of validity and reliability. Next, in chapters 12 and 13, we address publishing with an emphasis on the specifics of technology science. Eventually the last chapter, chapter 14, briefly introduces the philosophy of science. The book systematically collects in the form of suggestions, recommendations, and guidelines the author's 35-year experience as a researcher, author and reviewer in technology science. It is written for anyone working in technology science, from master's students to researchers and supervisors.

Specification and development of interactive systems: focus on streams, interfaces, and refinement
Authors: ---
ISBN: 0387950737 1461265185 1461300916 Year: 2001 Publisher: New York. N.Y. Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents a fundamental mathematical and logical approach to soft­ ware and systems engineering. Considering the large number of books de­ scribing mathematical approaches to program development, it is important to explain what we consider to be the specific contribution of our book, to identify our goals, and to characterize our intended target audience. Most books dealing with the mathematics and logics of programming and system development are mainly devoted to programming in the small. This is in contrast to our book where the emphasis is on modular system development with the help of component specifications with precisely identified interfaces and refinement concepts. Our book aims at systems development carried out in a systematic way, based on a clear mathematical theory. We do not claim that this book presents a full-blown engineering method. In fact, this is certainly not a book for the application-driven software engi­ neer looking for a practical method for system development in an industrial context. It is much rather a book for the computer scientist and the scientifi­ cally interested engineer who looks for basic principles of system development and, moreover, its mathematical foundations. It is also a book for method builders interested in a proper mathematical foundation on which they can build a practical development method and industrial-strength support tools.


Book
Cyber-Risk Management
Authors: --- ---
ISBN: 3319235699 3319235702 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides a brief and general introduction to cybersecurity and cyber-risk assessment. Not limited to a specific approach or technique, its focus is highly pragmatic and is based on established international standards (including ISO 31000) as well as industrial best practices. It explains how cyber-risk assessment should be conducted, which techniques should be used when, what the typical challenges and problems are, and how they should be addressed. The content is divided into three parts. First, part I provides a conceptual introduction to the topic of risk management in general and to cybersecurity and cyber-risk management in particular. Next, part II presents the main stages of cyber-risk assessment from context establishment to risk treatment and acceptance,  each illustrated by a running example. Finally, part III details four important challenges and how to reasonably deal with them in practice: risk measurement, risk scales, uncertainty, and low-frequency risks with high consequence. The target audience is mainly practitioners and students who are interested in the fundamentals and basic principles and techniques of security risk assessment, as well as lecturers seeking teaching material. The book provides an overview of the cyber-risk assessment process, the tasks involved, and how to complete them in practice.

Keywords

Computer Science --- Engineering & Applied Sciences --- Computer crimes --- Cyberspace --- Computer security. --- Data protection. --- Prevention. --- Security measures. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Management. --- Industrial management. --- Mathematical statistics. --- Management information systems. --- Quality control. --- Reliability. --- Industrial safety. --- Computer Science. --- Systems and Data Security. --- Quality Control, Reliability, Safety and Risk. --- Management of Computing and Information Systems. --- Probability and Statistics in Computer Science. --- Innovation/Technology Management. --- Data protection --- Security systems --- Hacking --- Industrial accidents --- Industries --- Job safety --- Occupational hazards, Prevention of --- Occupational health and safety --- Occupational safety and health --- Prevention of industrial accidents --- Prevention of occupational hazards --- Safety, Industrial --- Safety engineering --- Safety measures --- Safety of workers --- Accidents --- System safety --- Dependability --- Trustworthiness --- Conduct of life --- Factory management --- Industrial engineering --- Reliability (Engineering) --- Sampling (Statistics) --- Standardization --- Quality assurance --- Quality of products --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Mathematics --- Statistical inference --- Statistics, Mathematical --- Statistics --- Probabilities --- Business administration --- Business enterprises --- Business management --- Corporate management --- Corporations --- Industrial administration --- Management, Industrial --- Rationalization of industry --- Scientific management --- Business --- Industrial organization --- Administration --- Industrial relations --- Organization --- Informatics --- Science --- Prevention --- Communication systems --- Statistical methods --- Electronic data processing --- Space and time --- Telematics --- System safety. --- Information Systems. --- Safety, System --- Safety of systems --- Systems safety --- Industrial safety --- Systems engineering


Book
Model-driven risk analysis : the CORAS approach
Authors: --- ---
ISBN: 3642123228 9786612973260 1282973266 3642123236 9783642447013 9783642123221 3642447015 Year: 2011 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The term “risk” is known from many fields, and we are used to references to contractual risk, economic risk, operational risk, legal risk, security risk, and so forth. We conduct risk analysis, using either offensive or defensive approaches to identify and assess risk. Offensive approaches are concerned with balancing potential gain against risk of investment loss, while defensive approaches are concerned with protecting assets that already exist. In this book, Lund, Solhaug and Stølen focus on defensive risk analysis, and more explicitly on a particular approach called CORAS. CORAS is a model-driven method for defensive risk analysis featuring a tool-supported modelling language specially designed to model risks. Their book serves as an introduction to risk analysis in general, including the central concepts and notions in risk analysis and their relations. The authors’ aim is to support risk analysts in conducting structured and stepwise risk analysis. To this end, the book is divided into three main parts. Part I of the book introduces and demonstrates the central concepts and notation used in CORAS, and is largely example-driven. Part II gives a thorough description of the CORAS method and modelling language. After having completed this part of the book, the reader should know enough to use the method in practice. Finally, Part III addresses issues that require special attention and treatment, but still are often encountered in real-life risk analysis and for which CORAS offers helpful advice and assistance. This part also includes a short presentation of the CORAS tool support. The main target groups of the book are IT practitioners and students at graduate or undergraduate level. They will appreciate a concise introduction into the emerging field of risk analysis, supported by a sound methodology, and completed with numerous examples and detailed guidelines.


Book
Model-Driven Risk Analysis : The CORAS Approach
Authors: --- ---
ISBN: 9783642123238 9783642123221 3642123228 3642447015 9783642447013 Year: 2010 Publisher: Berlin ; London ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The term risk  is known from many fields, and we are used to references to contractual risk, economic risk, operational risk, legal risk, security risk, and so forth. We conduct risk analysis, using either offensive or defensive approaches to identify and assess risk. Offensive approaches are concerned with balancing potential gain against risk of investment loss, while defensive approaches are concerned with protecting assets that already exist. In this book, Lund, Solhaug and Stølen focus on defensive risk analysis, and more explicitly on a particular approach called CORAS. CORAS is a model-driven method for defensive risk analysis featuring a tool-supported modelling language specially designed to model risks. Their book serves as an introduction to risk analysis in general, including the central concepts and notions in risk analysis and their relations. The authors' aim is to support risk analysts in conducting structured and stepwise risk analysis. To this end, the book is divided into three main parts. Part I of the book introduces and demonstrates the central concepts and notation used in CORAS, and is largely example-driven. Part II gives a thorough description of the CORAS method and modelling language. After having completed this part of the book, the reader should know enough to use the method in practice. Finally, Part III addresses issues that require special attention and treatment, but still are often encountered in real-life risk analysis and for which CORAS offers helpful advice and assistance. This part also includes a short presentation of the CORAS tool support. The main target groups of the book are IT practitioners and students at graduate or undergraduate level. They will appreciate a concise introduction into the emerging field of risk analysis, supported by a sound methodology, and completed with numerous examples and detailed guidelines.


Book
Graphical Models for Security : 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers
Authors: --- ---
ISBN: 3319748602 3319748599 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes revised selected papers from the 4th International Workshop on Graphical Models for Security, GraMSec 2017, held in Santa Barbara, CA, USA, in August 2017.  The 5 full and 4 short papers presented in this volume were carefully reviewed and selected from 19 submissions. The book also contains one invited paper from the WISER project. The contributions deal with the latest research and developments on graphical models for security.

Keywords

Computer science. --- Computer organization. --- Computer programming. --- Software engineering. --- Computer security. --- Artificial intelligence. --- Computers. --- Computer Science. --- Systems and Data Security. --- Programming Techniques. --- Software Engineering. --- Artificial Intelligence (incl. Robotics). --- Computing Milieux. --- Computer Systems Organization and Communication Networks. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- AI (Artificial intelligence) --- Artificial thinking --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer software engineering --- Engineering --- Electronic computer programming --- Programming (Electronic computers) --- Coding theory --- Organization, Computer --- Informatics --- Science --- Protection --- Security measures --- Programming --- Computer network architectures. --- Artificial Intelligence. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Computer networks


Digital
Model-Driven Risk Analysis : The CORAS Approach
Authors: --- ---
ISBN: 9783642123238 Year: 2011 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg


Digital
Cyber-Risk Management
Authors: --- ---
ISBN: 9783319235707 9783319235691 9783319235714 Year: 2015 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides a brief and general introduction to cybersecurity and cyber-risk assessment. Not limited to a specific approach or technique, its focus is highly pragmatic and is based on established international standards (including ISO 31000) as well as industrial best practices. It explains how cyber-risk assessment should be conducted, which techniques should be used when, what the typical challenges and problems are, and how they should be addressed. The content is divided into three parts. First, part I provides a conceptual introduction to the topic of risk management in general and to cybersecurity and cyber-risk management in particular. Next, part II presents the main stages of cyber-risk assessment from context establishment to risk treatment and acceptance, each illustrated by a running example. Finally, part III details four important challenges and how to reasonably deal with them in practice: risk measurement, risk scales, uncertainty, and low-frequency risks with high consequence. The target audience is mainly practitioners and students who are interested in the fundamentals and basic principles and techniques of security risk assessment, as well as lecturers seeking teaching material. The book provides an overview of the cyber-risk assessment process, the tasks involved, and how to complete them in practice.

Listing 1 - 10 of 15 << page
of 2
>>
Sort by