Abstract:An approach in achieving semantic interoperability among heterogeneous systems is to offer infrastructure to assist with linking and integration using a foundational ontology. Due to the creation of multiple foundational ontologies, this also means linking and integrating those ones. In order to achieve this, we have selected the widely used foundational ontologies DOLCE, BFO, and GFO, and their related modules, on which to perform ontology mediation (alignment, mapping, and merging). The foundational ontologies were aligned by identifying correspondences between ontology entities using seven tools, documentation, and our manual alignments, and comparing their effectiveness. Thereafter, based on the alignments, we created correspondences in the ontology files resulting in entity mappings and merged ontologies. However, during the mapping process, it was found that differences in foundational ontologies, such as their hierarchical structure, conflicting axioms due to complement and disjointness, and incompatible domain and range restriction, cause logical inconsistencies in foundational ontology alignments, thereby greatly reducing the number of mappings. We analyse and present these logical inconsistencies with possible solutions to some of them.
Large and complex ontologies lead to usage difficulties, thereby hampering the ontology developers' tasks. Ontology modules have been proposed as a possible solution, which is supported by some algorithms and tools. However, the majority of types of modules, including those based on abstraction, still rely on manual methods for modularisation. Toward filling this gap in modularisation techniques, the authors systematised abstractions and selected five types of abstractions relevant for modularisation for which they created novel algorithms, implemented them, and wrapped them in a GUI, called NOMSA, to facilitate their use by ontology developers. The algorithms were evaluated quantitatively by assessing the quality of the generated modules. The quality of a module is measured by comparing it to the benchmark metrics from an existing framework for ontology modularisation. The results show that the module's quality ranges between average to good, whilst also eliminating manual intervention.
The success of an organisation depends on its employees’ skills and the extent to which they are developed. Although organisations often assume employees are fit and ready for a new position or new developments in their functions, employees need adequate training before, during and after effective performance in their respective roles. Amongst other important roles, training is significant in problem-solving, continuously improving skills, and creating consistency or culture in the work environment. Nonetheless, the significance of training is often disregarded or not understood by organisations as there are often inadequacies, inconsistencies, and ignorance from the employer. Furthermore, organisations are facing cybersecurity skills shortages. Some specialists leave the profession due to a lack of skills or support. The lack of experienced and qualified cyber security specialists increases the risk of IT system systems being targeted with cyber-attacks. Having insufficient cybersecurity staff, companies may struggle to protect their networks from attacks. Organisations are being placed into a troubling position as the threat landscape continues to evolve. With the growth in volume and sophistication of cyber security attacks, the problem of a skilled workforce is exasperated. In order to support the cybersecurity workforce, this paper proposes the implementation of learning factories. Typically, learning factories have been used in the manufacturing sector. However, the fundamental principles and guiding ideologies can also be applied in the cybersecurity domain. Learning factories provide a mechanism to remove the barriers of entering the field of cybersecurity by cultivating and nurturing a cybersecurity workforce. They enable the broadening of the scope for talent and change our current working practices and tighten the gap between education and experience. The closing of the talent gap is an important imperative for cybersecurity. In this paper, a motivation and description of the functionality of learning factories for cybersecurity is provided. Through this paper the benefits of learning factories will be highlighted in order to show the advantages of active engagements in learning activities, real-world application and information sharing.
Although there is an increasing amount of information for counter-terrorism operations freely available online, it is a complex process to extract relevant information and to detect useful patterns in the data in order for intelligence functionaries to identify threats and to predict possible terror attacks. Automation is required for intelligent decision-making. To assist with this, in this paper, the researchers propose an ontology-based data access system for counter-terrorism. The system will enable intelligence analysts to perform specialised semantic searches about terrorist events or groups for analysis using an ontology. In this paper, the researchers present the ontology that was created by following an existing methodology for ontology development, and an ontology-based data access system together with all the components used in development (i.e., databases, web-scraper tools, ontology-based data access software, and data sources). Lastly, the ontology is demonstrated by means of use cases with example queries for generating actionable intelligence for operations.
Geospatial data is often perceived as only being related to maps, compasses and locations. However, the application areas of geospatial data are far wider and even extend to the field of cybersecurity. Not only is there an ability to show points of interest and emerging network traffic conditions, geospatial data also has the ability to model cyber crime growth patterns and indicate affected areas as well as the emergence of certain type of cyber threats. Geospatial data can feed into intelligence systems, help with analysis, information sharing, and help create situational awareness. This is particularly useful in the area of cyber security. Geospatial data is very powerful and can help to prioritise cyber threats and identify critical areas of concern. Previously, geospatial data was primarily used by militaries, intelligence agencies, weather services or traffic control. Currently, the application of geospatial data has multiplied, and it spans many more industries and sectors. So too for cyber security, geospatial data has a wide number of uses. It may be difficult to find patterns or trends in large data sets. However, the graphic capabilities of geo mapping help present data in more digestible manner. This may help analysts identify emerging issues, threats and target areas. In this paper, the usefulness of geospatial data for cyber security is explored. The paper will cover a framework of the key application areas that geospatial data can serve in the field of cyber security. The ten application areas covered in the paper are: tracking, data analysis, visualisation, situational awareness, cyber intelligence, collaboration, improved response to cyber threats, decision-making, cyber threat prioritisation and protect cyber infrastructure It is aimed that through the paper, the application areas of geospatial data can be more widely adopted.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.