Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Gerhard Steinke is active.

Publication


Featured researches published by Gerhard Steinke.


Industrial Management and Data Systems | 2003

Business rules as the basis of an organization’s information systems

Gerhard Steinke; Colleen Nickolette

Business rules are statements that aim to influence or guide behavior and information in the organization. They are the business policies, the business practices, and business definitions that should be well known and treated as a valuable asset to the organization. They are in essence how the actual business is run. Yet so often these business rules are implicit, assumed in the development of information systems in an organization. They have been buried in code, lived in the business experts’ heads and sporadically been documented in system manuals. In this paper we examine the value of business rules, compare the thinking of business rule experts and provide guidelines on how to derive and store an organization’s business rules.


Computers & Security | 1991

Design aspects of access control in a knowledge base system

Gerhard Steinke

Access control is the granting and enforcement of priveleges to access information in a system. The design of access control for knowledge base systems is based on access control concepts found in database systems. Additional characteristics found in knowledge base systems include object-oriented features as well as temporal information and predicative assertion languages to describe rules and constraints. Of particular complexity is the implication of access control on inherited objects, rules and constraints. The Group Security model provides users with discretionary access control to objects in a knowledge base system according to their requirement for a task. Further benefits and opportunities are achieved as a result of implementing access control in knowledge base systems.


international conference on engineering and technology management | 1996

Information security issues facing virtual enterprises

Gerhard Steinke; R. Leamon

Virtual enterprises require the communication and sharing of information. Only if each participant in the virtual enterprise is assured that the information they bring to the virtual enterprise is secure, will they share it. The authors examine some of the security issues facing virtual enterprises and refer to security measures taken by a specific organization.


Journal of Information Privacy and Security | 2011

Towards an Understanding of Web Application Security Threats and Incidents

Gerhard Steinke; Emanuel Tundrea; Kenmoro Kelly

Abstract This paper examines a variety of sources that provide web application security vulnerabilities and incident data. In particular, the research tracks the impact of SQL Injection, Cross-Site Scripting and Cross-Site Request Forgery vulnerabilities. A comparison of vulnerability data versus attacks that have actually resulted in data compromises is studied to determine how the type of vulnerabilities relate to actual methods used to steal data. The paper concludes with recommendations for more secure web applications.


Archive | 1999

Consumer Adoption of Electronic Commerce

Gerhard Steinke

Electronic commerce in North America, as well as around the world, has experienced dramatic growth during the last year. While electronic commerce encompasses a large variety of components, our focus is on consumer-to-business transactions, as exemplified by consumers purchasing goods electronically via the Internet or World Wide Web.


special interest group on computer personnel research annual conference | 1997

Preparing students to communicate in a virtual environment

Gerhard Steinke

In today’s global society, individuals with an understanding of different cultures that have the ability to apply this understanding to real world problem solving are more likely to become leaders. Preparing students for a global society is becoming a significant part of education. While many international online exchange projects have been conducted at schools to help expose students to the world and experience international collaborations, few studies have focused on both developing intercultural competence for elementary school students and discovering practical ways of implementing a cross-cultural exchange program into the public elementary school systems as well. This study, International Virtual Elementary Classroom Activities (IVECA), planned to explore how American and Korean students can develop culturally meaningful interactions through asynchronous online communications in a content management system (CMS), Blackboard; and investigate the factors or strategies useful for integrating IVECA into public school curricula. Data were collected using observation and interview methods, and also included reviewing students’ journals. The data analysis involved interpretive analytic induction. Findings indicated that IVECA (a) promotes students’ intercultural competence; (b) developed their social interaction skills both in the regular classrooms and the virtual classroom; (c) facilitated diverse students’ motivations for learning at school; (d) enhanced writing and reading skills; and (e) engaged learning disabled students in the classroom activities. Additional findings from this study indicate that (a) a systematic support system for teachers’ technology use and instructional design is necessary, and (b) school administrators’ positive perception toward cross-cultural exchange activities and their coherent connections between state learning standards and IVECA objectives are important. Further considerations are addressed and the different influences of IVECA on the U.S. students and Korean students and its implementation, which takes into consideration such influences, will also be discussed.


Proceedings ICCI `92: Fourth International Conference on Computing and Information | 1992

An approach to achieving multi-user integrity in a knowledge base system

Gerhard Steinke

The implementation of security results in a user being restricted to a subset of a knowledge base. The information content of constraints may mean that a user is not permitted to access some constraints. But without access permission to all constraints, a user may make modifications which do not satisfy the integrity of other users in the knowledge base system. The author describes an approach which shows how users who have access to a subset of the knowledge base which does not satisfy all constraints can act to restore their subset to a state where the information satisfies all integrity constraints. The user may make modifications to restore integrity, may place information in a pending state, or may work with unaffected areas of the knowledge base.<<ETX>>


Journal of Convergence Information Technology | 1990

Access control requirements for environmental information knowledge base systems

Gerhard Steinke

A description is given of how the group security model provides access control in knowledge base systems and supports the security requirements of data from a variety of sources in a comprehensive environmental information system. An overview of problems encountered when designing access control in knowledge bases is given. The access control requirements of an environmental information system are reviewed. The group security model, which provides for the specification of access criteria for groups and tasks and which can provide multilevel security for any entity of information in a knowledge base system, is then described. The implementation of the group security model in ConceptBase, a knowledge base management system, is considered. An example scenario from an environmental information system under ConceptBase is given.<<ETX>>


Advanced Materials Research | 2014

SmartModels – Contributions to Developing an Evolving Platform for Mechatronic Software Systems

Emanuel Țundrea; Gerhard Steinke; Ioan G. Pop

This paper applies the SmartModels approach for building software product lines (SPL), illustrated through the example of modeling a mechatronics framework for designing anti-lock braking system (ABS) embedded software solutions. This example proves the expressiveness of the SmartModels approach to capture within a model sufficient meta-information to enable the design of families of entities from the mechatronics domain, taking advantage of the polymorphism and abstraction properties of object-oriented approaches and parameterized genericity.


Applied Mechanics and Materials | 2013

Handling Dynamic Concerns of Designing a Platform for Mechatronic Software Systems

Emanuel Țundrea; Gerhard Steinke

One of the challenges today is to build software frameworks for the embedded software in mechatronic systems. This paper presents the SmartModels approach which facilitates the design of a framework to create and generate easy development of software product lines solutions. One of its main strength lies in the ease with which a designer can handle the dynamic aspects of a model by dealing with variability and flexibility of user requirements. We illustrate our approach by modeling the embedded software requirements for developing anti-lock braking systems (ABS).

Collaboration


Dive into the Gerhard Steinke's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Emmanuel U. Opara

California State University

View shared research outputs
Top Co-Authors

Avatar

Frank Lin

California State University

View shared research outputs
Top Co-Authors

Avatar

Jake Zhu

California State University

View shared research outputs
Top Co-Authors

Avatar

Jim Jenkins

Seattle Pacific University

View shared research outputs
Top Co-Authors

Avatar

Joseph A. Cazier

Appalachian State University

View shared research outputs
Researchain Logo
Decentralizing Knowledge