Auflistung nach Schlagwort "best practices"
1 - 3 von 3
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragChallenges in Data Preservation for AI and ML Systems(INFORMATIK 2024, 2024) Tonkin, Emma L.; Tourte, Gregory J. L.The management and preservation of machine learning (ML) and artificial intelligence (AI) data is increasingly a concern for research institutions, as well as for institutions and industry organisations making use of this type of data and method. This paper summarises key issues in this area, presenting the case that there are significant benefits to the industry in developing best practices and joint standards in this area, and identifying the benefits of this approach, as well as highlighting risks and a current paucity of best practice in the area.
- ZeitschriftenartikelIoT Security Best Practices(HMD Praxis der Wirtschaftsinformatik: Vol. 58, No. 2, 2021) Barenkamp, MarcoDer Artikel gibt einen Überblick über Best-Practice-Standards zur Authentifizierung von IoT (Internet of Things) Zugängen. Es wird aufgezeigt, dass clientseitige Authentifizierung gegenüber einer herkömmlichen Authentifizierung und Blockchain-basierten Ansätzen das höchste Potential für sichere Prozessautomatisierung bei hoher Interaktionsfrequenz bietet. Ein neuartiges Konzept des clientseitigen automatisierten Zugangsmanagements auf Basis von TLS (transport layer security), welches sich im Agriculture Segment seit über einem Jahr bewährt hat, wird vorgestellt. Gegenüber derzeitig eingesetzten Authentifizierungsverfahren bietet es den Vorteil höherer Sicherheit bei gleichzeitig automatisierter Anmeldung jeglicher Endgeräte auf dem IoT-Server. Aufgrund dieser Potentiale eignet sich der dargestellte Authentifizierungsstandard zukünftig als allgemeines branchenübergreifendes Zugangssystem für IoT-Anwendungen. The article gives an overview of best practice standards for IoT (Internet of things) access authentication. It is shown that client-side authentication offers the highest potential for secure process automation at high interaction frequency compared to default authentication and blockchain-based-approaches. A novel concept of client-side automated access management using the TLS (transport layer security) standard, which has proven in the agriculture segment for over a year, is presented. Compared to established authentication methods, it offers the advantage of higher security with simultaneous automated login of multiple end devices on the IoT server. Due to these potentials, the presented new authentication standard is suitable as a general cross-industry access concept for IoT applications.
- TextdokumentThe status-quo of companies' data privacy and security communication: An ethical evaluation and future paths(INFORMATIK 2022, 2022) Carl,K. ValerieAdvancing digital technologies and the omnipresent digitalization bear chances but also threats for companies and consumers. Especially data privacy and security risks remain one key concern of consumers. However, fulfilling legally binding requirements is not sufficient anymore for many consumers. Instead, consumers expect companies to behave ethically responsible and voluntarily assume more responsibilities in the digital context, particularly related to data privacy and security. Broader approaches, like the emerging concept of Corporate Digital Responsibility, make it possible to see responsibility with regard to data privacy and security in the broader context of a company’s digital responsibilities and thus to develop a more holistic understanding. However, responsible behavior alone is not enough; rather an adequate communication is the evaluation basis of consumers. Accordingly, this work-in-progress evaluates current corporate communication regarding data privacy and security from an ethical view, thus illustrating best practices and paving future paths for corporate communication.