Hybrid journal (It can contain Open Access articles) ISSN (Print) 1478-1476 - ISSN (Online) 1479-3091 Published by Inderscience Publishers[451 journals]
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Dennis B. Park, Xiaolong Li, A. Mehran Shahhosseini, Li-Shiang Tsay Pages: 125 - 148 Abstract: Data in cloud inherently possess the issues of copyright, confidentiality, and contract in a business sense as cloud consumers may store their data on their third party contractor's virtual servers, but may lose their rights to the data. The ownership issue of data in cloud has been one of the most complicated ones among the issues (Al-Issa et al., 2019). Hence, it is worth examining the data ownership issue in cloud. To conduct the examination, this research study applies a risk management concept to develop a structured approach and use it to study the issue. In addition, this research study develops the risk mitigation strategy framework to organise and better deal with legal matters surrounding data ownership in cloud. This study also reviews the US case of data breaches, which involves cloud services from a perspective of law enforcement as part of risk mitigation strategy. Keywords: cloud computing; sensitive data; legal issues; data jurisdiction; data protection Citation: International Journal of Forensic Engineering and Management, Vol. 1, No. 2 (2021) pp. 125 - 148 PubDate: 2022-01-10T23:20:50-05:00 DOI: 10.1504/IJFEM.2021.120174 Issue No:Vol. 1, No. 2 (2022)
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Dennis B. Park, Xiaolong Li, A. Mehran Shahhosseini, Li-Shiang Tsay Pages: 149 - 178 Abstract: This research proposes a three-echelon supply chain network design approach to manage supply, distribution and selling of product with improved responsiveness to market requirements. It plans realisation of finished product through the local and overseas suppliers. The proposed bi-objective design model optimises market response time and overall supply chain (SC) cost. It achieves such objectives for market response time and overall SC cost by deciding number and location of distribution centres to distribute product within optimum time. It also decides number and location of sales outlets to ensure product availability within optimum distances and thus improve market response time in addition to SC cost. Sales network is designed by including a set of existing and potential retail outlets and similar locations and outlets for the company operated outlets. It plans mobile distribution between retail and supply chain operated outlets to improve market response further. A numerical example illustrates applicability of the model and provides managerial insights for deriving trade off decisions considering cost and market response. Keywords: design model; mobile distribution; optimum response time; sales network design; number of distribution centre Citation: International Journal of Forensic Engineering and Management, Vol. 1, No. 2 (2021) pp. 149 - 178 PubDate: 2022-01-10T23:20:50-05:00 DOI: 10.1504/IJFEM.2021.120187 Issue No:Vol. 1, No. 2 (2022)
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Dennis B. Park, Xiaolong Li, A. Mehran Shahhosseini, Li-Shiang Tsay Pages: 179 - 208 Abstract: A recent survey shows that the most vulnerable IT sources are business applications (Skybox Security, 2019). Many risk assessment frameworks that exist today, however, do not use the application code as an input source of their risk assessments for the business applications. Instead, they mostly rely on traditional questionnaires, surveys, or meetings to collect the data. Thus, it would be gainful if one can assess the security posture of the software applications with the applications' codes themselves as their data source in assessing their cloud adoption risks. Therefore, this research studies and develops a risk assessment framework that utilises data generated from static code analysis (SCA) on applications as an input source for the application's cloud risk assessment, especially on health information applications because health information applications are the least cloud adopted applications (TCS, 2012). In addition, this study develops the harmonisation methods between security warning information obtained from the SCA tool and the common vulnerability scoring system (CVSS) scores to calculate the cloud risks instead of relying on risk evaluators' assessment. Keywords: vulnerability risk assessment framework; cloud; health information applications; mathematical model-driven risk calculation; static code analysis; SCA Citation: International Journal of Forensic Engineering and Management, Vol. 1, No. 2 (2021) pp. 179 - 208 PubDate: 2022-01-10T23:20:50-05:00 DOI: 10.1504/IJFEM.2021.120176 Issue No:Vol. 1, No. 2 (2022)
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Michel Kissi, Jonathan D. Walston, M. Affan Badar Pages: 209 - 224 Abstract: The COVID-19 pandemic in 2020 exposed numerous issues around healthcare availability. Data was collected for 151 rural hospital closures from 2005 to current. From the year of establishment (i.e., open year) until the closure was considered as time to failure (TTF). This research explored if factors like rural-urban commuting area (RUCA), number of beds, open year, and Medicare payment type affect TTF of rural hospitals. Medicare payment was a categorical variable, and the other three variables were continuous. The hypothesis was tested using multiple regression. The results showed that there were no significant correlations of rural hospital TTF with RUCA, number of beds, or Medicare payment type. However, open year was found to be significant. The mean open year was determined to be the year 1966 and the mean TTF was 48 years. Reasons for the hospital closures are discussed. The study is useful for hospital managers and policy makers. Keywords: COVID-19; rural hospitals; healthcare; life cycle; time to failure; TTF Citation: International Journal of Forensic Engineering and Management, Vol. 1, No. 2 (2021) pp. 209 - 224 PubDate: 2022-01-10T23:20:50-05:00 DOI: 10.1504/IJFEM.2021.120186 Issue No:Vol. 1, No. 2 (2022)