• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 5
  • Tagged with
  • 5
  • 5
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Ethics in Data Science: Implementing a Harm Prevention Framework

Buffenbarger, Lauren 28 June 2021 (has links)
No description available.
2

DataOps : Towards Understanding and Defining Data Analytics Approach

Mainali, Kiran January 2020 (has links)
Data collection and analysis approaches have changed drastically in the past few years. The reason behind adopting different approach is improved data availability and continuous change in analysis requirements. Data have been always there, but data management is vital nowadays due to rapid generation and availability of various formats. Big data has opened the possibility of dealing with potentially infinite amounts of data with numerous formats in a short time. The data analytics is becoming complex due to data characteristics, sophisticated tools and technologies, changing business needs, varied interests among stakeholders, and lack of a standardized process. DataOps is an emerging approach advocated by data practitioners to cater to the challenges in data analytics projects. Data analytics projects differ from software engineering in many aspects. DevOps is proven to be an efficient and practical approach to deliver the project in the Software Industry. However, DataOps is still in its infancy, being recognized as an independent and essential task data analytics. In this thesis paper, we uncover DataOps as a methodology to implement data pipelines by conducting a systematic search of research papers. As a result, we define DataOps outlining ambiguities and challenges. We also explore the coverage of DataOps to different stages of the data lifecycle. We created comparison matrixes of different tools and technologies categorizing them in different functional groups to demonstrate their usage in data lifecycle management. We followed DataOps implementation guidelines to implement data pipeline using Apache Airflow as workflow orchestrator inside Docker and compared with simple manual execution of a data analytics project. As per evaluation, the data pipeline with DataOps provided automation in task execution, orchestration in execution environment, testing and monitoring, communication and collaboration, and reduced end-to-end product delivery cycle time along with the reduction in pipeline execution time. / Datainsamling och analysmetoder har förändrats drastiskt under de senaste åren. Anledningen till ett annat tillvägagångssätt är förbättrad datatillgänglighet och kontinuerlig förändring av analyskraven. Data har alltid funnits, men datahantering är viktig idag på grund av snabb generering och tillgänglighet av olika format. Big data har öppnat möjligheten att hantera potentiellt oändliga mängder data med många format på kort tid. Dataanalysen blir komplex på grund av dataegenskaper, sofistikerade verktyg och teknologier, förändrade affärsbehov, olika intressen bland intressenter och brist på en standardiserad process. DataOps är en framväxande strategi som förespråkas av datautövare för att tillgodose utmaningarna i dataanalysprojekt. Dataanalysprojekt skiljer sig från programvaruteknik i många aspekter. DevOps har visat sig vara ett effektivt och praktiskt tillvägagångssätt för att leverera projektet i mjukvaruindustrin. DataOps är dock fortfarande i sin linda och erkänns som en oberoende och viktig uppgiftsanalys. I detta examensarbete avslöjar vi DataOps som en metod för att implementera datarörledningar genom att göra en systematisk sökning av forskningspapper. Som ett resultat definierar vi DataOps som beskriver tvetydigheter och utmaningar. Vi undersöker också täckningen av DataOps till olika stadier av datalivscykeln. Vi skapade jämförelsesmatriser med olika verktyg och teknologier som kategoriserade dem i olika funktionella grupper för att visa hur de används i datalivscykelhantering. Vi följde riktlinjerna för implementering av DataOps för att implementera datapipeline med Apache Airflow som arbetsflödesorkestrator i Docker och jämfört med enkel manuell körning av ett dataanalysprojekt. Enligt utvärderingen tillhandahöll datapipelinen med DataOps automatisering i uppgiftskörning, orkestrering i exekveringsmiljö, testning och övervakning, kommunikation och samarbete, och minskad leveranscykeltid från slut till produkt tillsammans med minskningen av tid för rörledningskörning.
3

"(Un-)making" data to "make" security: A discursive and visual inquiry into the production, circulation and use of data across the pan-European information infrastructure

Ugolini, Vanessa 01 March 2023 (has links)
To counter hybrid threats – for example, international terrorism, transnational organised crime and (cyber-)attacks – security and intelligence communities increasingly gather, process and exchange vast amounts of data on presumably suspect individuals. This trend has been enabled by recent developments in surveillance capacities related to Information and Communications Technologies (ICTs). As a result, cross-border data transfers have become not only an element of international trade but also an important component of law enforcement strategies. Nevertheless, the exchange of data for policing purposes is not always smooth. Rather, there are frictions that emerge therein as well as technical and legal issues relating to the combination of data from different information systems and under different formats. This study advances the concept of data lifecycle in relation to the practices, such as the collection, entry, processing, storing, and analysis that direct data in specific ways to create multiple “cycles” of uses. Through the analytical lens of the lifecycle I aim to examine specifically how data are repurposed, not only by digital technologies, but also by provisions regulating access, storage and use of information for criminal matters. The core task consists in identifying the socio-political, legal and technical conditions of possibility that allow for the exchange of data at the pan-European level. By bringing together multiple conceptual and methodological subfields, I shed light on the politicality of EU data infrastructures that appear physically very remote or less visible, yet in a way that people do not realise how mundane they have become. Investigating the data lifecycle as a network of practices generates findings that are useful for understanding how security is enacted through the collection and use of different forms of data and hence for interpreting the evolving landscape of data-driven security governance in the EU.
4

Understanding the Knowledge, Skills, and Abilities (KSAs) of Data Professionals in United States Academic Libraries

Khan, Hammad Rauf 12 1900 (has links)
This study applies the knowledge, skills, and abilities (KSA) framework for eScience professionals to data service positions in academic libraries. Understanding the KSAs needed to provide data services is of crucial concern. The current study looks at KSAs of data professionals working in the United States academic libraries. An exploratory sequential mixed method design was adopted to discover the KSAs. The study was divided into two phases, a qualitative content analysis of 260 job advertisements for data professionals for Phase 1, and distribution of a self-administered online survey to data professionals working in academic libraries research data services (RDS) for Phase 2. The discovery of the KSAs from the content analysis of 260 job ads and the survey results from 167 data professionals were analyzed separately, and then Spearman rank order correlation was conducted in order to triangulate the data and compare results. The results from the study provide evidence on what hiring managers seek through job advertisements in terms of KSAs and which KSAs data professionals find to be important for working in RDS. The Spearman rank order correlation found strong agreement between job advertisement KSAs and data professionals perceptions of the KSAs.
5

Smart connected homes : concepts, risks, and challenges

Bugeja, Joseph January 2018 (has links)
The growth and presence of heterogeneous connected devices inside the home have the potential to provide increased efficiency and quality of life to the residents. Simultaneously, these devices tend to be Internet-connected and continuously monitor, collect, and transmit data about the residents and their daily lifestyle activities. Such data can be of a sensitive nature, such as camera feeds, voice commands, physiological data, and more. This data allows for the implementation of services, personalization support, and benefits offered by smart home technologies. Alas, there has been a rift of security and privacy attacks on connected home devices that compromise the security, safety, and privacy of the occupants. In this thesis, we provide a comprehensive description of the smart connected home ecosystem in terms of its assets, architecture, functionality, and capabilities. Especially, we focus on the data being collected by smart home devices. Such description and organization are necessary as a precursor to perform a rigorous security and privacy analysis of the smart home. Additionally, we seek to identify threat agents, risks, challenges, and propose some mitigation approaches suitable for home environments. Identifying these is core to characterize what is at stake, and to gain insights into what is required to build more robust, resilient, secure, and privacy-preserving smart home systems. Overall, we propose new concepts, models, and methods serving as a foundation for conducting deeper research work in particular linked to smart connected homes. In particular, we propose a taxonomy of devices; classification of data collected by smart connected homes; threat agent model for the smart connected home; and identify challenges, risks, and propose some mitigation approaches. / <p>Note: The papers are not included in the fulltext online.</p>

Page generated in 0.0504 seconds