Academic literature on the topic 'Cyber-FIT'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber-FIT.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cyber-FIT"

1

Watkins, Laura E., Rosalita C. Maldonado, and David DiLillo. "The Cyber Aggression in Relationships Scale: A New Multidimensional Measure of Technology-Based Intimate Partner Aggression." Assessment 25, no. 5 (September 2, 2016): 608–26. http://dx.doi.org/10.1177/1073191116665696.

Full text
Abstract:
The purpose of this study was to develop and provide initial validation for a measure of adult cyber intimate partner aggression (IPA): the Cyber Aggression in Relationships Scale (CARS). Drawing on recent conceptual models of cyber IPA, items from previous research exploring general cyber aggression and cyber IPA were modified and new items were generated for inclusion in the CARS. Two samples of adults 18 years or older were recruited online. We used item factor analysis to test the factor structure, model fit, and invariance of the measure structure across women and men. Results confirmed that three-factor models for both perpetration and victimization demonstrated good model fit, and that, in general, the CARS measures partner cyber aggression similarly for women and men. The CARS also demonstrated validity through significant associations with in-person IPA, trait anger, and jealousy. Findings suggest the CARS is a useful tool for assessing cyber IPA in both research and clinical settings.
APA, Harvard, Vancouver, ISO, and other styles
2

Ntingi, Nombeko, Petrus Duvenage, Jaco Du Toit, and Sebastian Von Solms. "Effective Cyber Threat Hunting: Where and how does it fit?" European Conference on Cyber Warfare and Security 21, no. 1 (June 8, 2022): 206–13. http://dx.doi.org/10.34190/eccws.21.1.240.

Full text
Abstract:
Traditionally threat detection in organisations is reactive through pre-defined and preconfigured rules that are embedded in automated tools such as firewalls, anti-virus software, security information and event management (SIEMs) and intrusion detection systems/intrusion prevention systems (IDS/IPS). As the fourth industrial revolution (4IR) brings with it an exponential increase in technological advances and global interconnectivity, the cyberspace presents security risks and threats the scale of which is unprecedented. These security risks and threats have the potential of exposing confidential information, damaging the reputation of credible organisations and/or inflicting harm. The regular occurrence and complexity of cyber intrusions makes the guarding enterprise and government networks a daunting task. Nation states and businesses need to be ingenious and consider innovative and proactive means of safeguarding their valuable assets. The growth of technological, physical and biological worlds necessitates the adoption of a proactive approach towards safeguarding cyber space. This paper centers on cyber threat hunting (CTH) as one such proactive and important measure that can be adopted. The paper has a central contention that effective CTH cannot be an autonomous ‘plug in’ or a standalone intervention. To be effective CTH has to be synergistically integrated with relevant existing fields and practices. Academic work on such conceptual integration of where CTH fits is scarce. Within the confines of the paper we do not attempt to integrate CTH with many of the various relevant fields and practices. Instead, we limit the scope to postulations on CTH’s interface with two fields of central importance in cyber security, namely Cyber Counterintelligence (CCI) and Cyber Threat Monitoring and Analysis (CTMA). The paper’s corresponding two primary objectives are to position CTH within the broader field of CCI and further contextualise CTH within the CTMA domain. The postulations we advanced are qualified as tentative, exploratory work to be expanded on. The paper concludes with observations on further research.
APA, Harvard, Vancouver, ISO, and other styles
3

Yaokumah, Winfred. "Development and Psychometric Analysis of Cyber Ethics Instrument (CEI)." International Journal of Technoethics 12, no. 1 (January 2021): 54–74. http://dx.doi.org/10.4018/ijt.2021010104.

Full text
Abstract:
This study developed and validated the psychometric properties of a new instrument, cyber ethics instrument (CEI), for assessing cyber ethics. Items related to cyber ethics were generated from a review of both scholarly and practitioner literature for the development of the instrument. The instrument was administered to university students. A sample of 503 responses was used for exploratory factor analysis (EFA) to extract the factor structure. The results of EFA suggested a six-factor structure (cyber privacy, computer ethics, academic integrity, intellectual property, netiquette, cyber safety), explaining 67.7% of the total variance. The results of confirmatory factor analysis (CFA) showed acceptable model fit indices. Therefore, the results established the viability of CEI for measuring cyber ethics. The instrument is essential for advancing the field of cyber ethics research as it will serve as a tool educators and researchers can use to measure the current stage of cyber ethics. The results obtained from using CEI can help identify and recommend cyber ethics interventions.
APA, Harvard, Vancouver, ISO, and other styles
4

Effendy, Faried, Eto Wuryanto, and Livia Felisia Marentina. "Penerapan Model Technology-to-Performance Chain pada Cyber Campus." Jurnal Edukasi dan Penelitian Informatika (JEPIN) 5, no. 2 (August 6, 2019): 176. http://dx.doi.org/10.26418/jp.v5i2.32684.

Full text
Abstract:
Model Technology to Performance Chain (TPC) merupakan suatu model komprehensif dari dua hal yang komplementer yaitu: sikap pengguna sebagai prediktor utilisasi atau pemanfaatan dan Task Technology Fit sebagai prediktor kinerja. Penelitian ini bertujuan untuk mengidentifikasi pengaruh antar variabel dari model TPC terhadap lingkungan Cyber Campus serta memberikan rekomendasi atau saran untuk peningkatan kualitas Cyber Campus. Pengolahan data menggunakan metode PLS-SEM dengan menggunakan responden 100 mahasiswa pengguna Cyber Campus. Dari hasil penelitian didapatkan 6 hipotesis diterima dan 2 hipotesis ditolak. Rekomendasi yang disarankan agar penggunaan Cyber Campus dapat meningkat adalah dengan pemberdayaan fitur yang sudah ada dan peningkatan layanan Helpdesk.
APA, Harvard, Vancouver, ISO, and other styles
5

Yılmaz Bingöl, Tuğba. "Determining The Predictors of Self-Efficacy and Cyber Bullying." International Journal of Higher Education 7, no. 2 (March 23, 2018): 138. http://dx.doi.org/10.5430/ijhe.v7n2p138.

Full text
Abstract:
In this study, it was aimed to determine the variables affecting self-efficacy and cyber bullying. The participants of the study were 223 high school students. The data was collected through the use of self-administered questionnaires which were the General Self-efficacy Scale, the Gratitude Scale, the Early Memories of Warmth and Safeness Scale and the Revised Cyber Bullying Inventory. Results of structural equation modeling analysis revealed that self-efficacy was affected by early memories of warmth and safeness and cyber bullying was affected by being a cyber victim. All goodness of fit indices of the model in this study was satisfactory. The results of the study demonstrated the importance of early memories of warmth in improving self-efficacy and preventing cyber victimization is effective in decreasing cyber bullying.
APA, Harvard, Vancouver, ISO, and other styles
6

Niki, O’Brien, Ghafur Saira, Sivaramakrishnan Arvind, and Durkin Mike. "Cyber-attacks are a permanent and substantial threat to health systems: Education must reflect that." DIGITAL HEALTH 8 (January 2022): 205520762211046. http://dx.doi.org/10.1177/20552076221104665.

Full text
Abstract:
Cyber-attacks on healthcare institutions have increased in recent years and have made headlines through the COVID-19 pandemic. With the fallout of attacks increasingly reported in academic research and in the media, there is a real urgency to address cyber-threats that must be augmented across and within health systems. Until now, clinical healthcare professionals have considered cyber-attacks on healthcare organisations a predominantly information and communication technology issue, but this perception is no longer fit-for-purpose. This commentary provides insights into the scale of cyber-attacks and their impact on staff wellbeing, arguing that cybersecurity education for all staff in healthcare organisations must be improved through online resources, simulation, and gaming. The role of national educators, policymakers, and multilateral organisations in achieving this is outlined alongside implications for future policy and practice.
APA, Harvard, Vancouver, ISO, and other styles
7

Slack, Chelsey, and Neil Robinson. "Co-operation: A Key to NATO’s Cyberspace Endeavour." European Foreign Affairs Review 24, Issue 2 (May 1, 2019): 154–66. http://dx.doi.org/10.54648/eerr2019010.

Full text
Abstract:
For nearly seventy years, NATO has been used as a forum for its Allies to consult, co-operate, and act on the decisions taken collectively for the benefit of their security and defence. Against the backdrop of a rapidly evolving cyber threat landscape, the Alliance has taken a number of steps in recent years to bolster its cyber defences, recognizing that cyber defence forms a part of NATO’s core task of collective defence. This article will shed light on NATO’s approach to cultivating co-operation on cyber defence – among Allies but also with a broad partnership network of countries, international organizations, industry and academia. Specific initiatives that are being pursued by the Allies to support NATO’s broader deterrence and defence, enhance national cyber resilience, and collaborate with partners in a spirit of co-operative security will be explored. In the end, these activities contribute to ensuring thatNATOcontinues to adapt and remain fit for purpose as a platform for consultation and action on collective security in the digital age.
APA, Harvard, Vancouver, ISO, and other styles
8

Mohammadi, Fazel. "Emerging Challenges in Smart Grid Cybersecurity Enhancement: A Review." Energies 14, no. 5 (March 3, 2021): 1380. http://dx.doi.org/10.3390/en14051380.

Full text
Abstract:
In this paper, a brief survey of measurable factors affecting the adoption of cybersecurity enhancement methods in the smart grid is provided. From a practical point of view, it is a key point to determine to what degree the cyber resilience of power systems can be improved using cost-effective resilience enhancement methods. Numerous attempts have been made to the vital resilience of the smart grid against cyber-attacks. The recently proposed cybersecurity methods are considered in this paper, and their accuracies, computational time, and robustness against external factors in detecting and identifying False Data Injection (FDI) attacks are evaluated. There is no all-inclusive solution to fit all power systems requirements. Therefore, the recently proposed cyber-attack detection and identification methods are quantitatively compared and discussed.
APA, Harvard, Vancouver, ISO, and other styles
9

Pinko, Eyal. "Maritime Cyber Threats and Challenges." National security and the future 20, no. 1-2 (January 9, 2020): 63–70. http://dx.doi.org/10.37458/nstf.20.1-2.7.

Full text
Abstract:
The maritime trade becomes crucial for countries' economy, security and sovereignty. Side by side to the growth of shipping, the vessels themselves and the sea-ports become more and more sophisticated, advanced and controlled by computerized and automated systems. Most of the maritime industry companies (from sea ports to shipping companies) are not ready and protected enough against cyber-attacks. Furthermore, there are no world regulation for the maritime industry yet, although the IMO (International Maritime Organization) is working on regulation that will fit the maritime industry, focusing on vessels. The IMO regulation is expecting to be implemented during 2021.
APA, Harvard, Vancouver, ISO, and other styles
10

Leslie, Nandi O., Richard E. Harang, Lawrence P. Knachel, and Alexander Kott. "Statistical models for the number of successful cyber intrusions." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 15, no. 1 (June 30, 2017): 49–63. http://dx.doi.org/10.1177/1548512917715342.

Full text
Abstract:
We propose several generalized linear models (GLMs) to predict the number of successful cyber intrusions (or “intrusions”) into an organization’s computer network, where the rate at which intrusions occur is a function of the following observable characteristics of the organization: (i) domain name system (DNS) traffic classified by their top-level domains (TLDs); (ii) the number of network security policy violations; and (iii) a set of predictors that we collectively call the “cyber footprint” that is comprised of the number of hosts on the organization’s network, the organization’s similarity to educational institution behavior, and its number of records on scholar.google.com . In addition, we evaluate the number of intrusions to determine whether these events follow a Poisson or negative binomial (NB) probability distribution. We reveal that the NB GLM provides the best fit model for the observed count data, number of intrusions per organization, because the NB model allows the variance of the count data to exceed the mean. We also show that there are restricted and simpler NB regression models that omit selected predictors and improve the goodness-of-fit of the NB GLM for the observed data. With our model simulations, we identify certain TLDs in the DNS traffic as having a significant impact on the number of intrusions. In addition, we use the models and regression results to conclude that the number of network security policy violations is consistently predictive of the number of intrusions.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Cyber-FIT"

1

(11023221), Fahad Salamh. "A 3-DIMENSIONAL UAS FORENSIC INTELLIGENCE-LED TAXONOMY (U-FIT)." Thesis, 2021.

Find full text
Abstract:
Although many counter-drone systems such as drone jammers and anti-drone guns have been implemented, drone incidents are still increasing. These incidents are categorized as deviant act, a criminal act, terrorist act, or an unintentional act (aka system failure). Examples of reported drone incidents are not limited to property damage, but include personal injuries, airport disruption, drug transportation, and terrorist activities. Researchers have examined only drone incidents from a technological perspective. The variance in drone architectures poses many challenges to the current investigation practices, including several operation approaches such as custom commutation links. Therefore, there is a limited research background available that aims to study the intercomponent mapping in unmanned aircraft system (UAS) investigation incorporating three critical investigative domains---behavioral analysis, forensic intelligence (FORINT), and unmanned aerial vehicle (UAV) forensic investigation. The UAS forensic intelligence-led taxonomy (U-FIT) aims to classify the technical, behavioral, and intelligence characteristics of four UAS deviant actions --- including individuals who flew a drone too high, flew a drone close to government buildings, flew a drone over the airfield, and involved in drone collision. The behavioral and threat profiles will include one criminal act (i.e., UAV contraband smugglers). The UAV forensic investigation dimension concentrates on investigative techniques including technical challenges; whereas, the behavioral dimension investigates the behavioral characteristics, distinguishing among UAS deviants and illegal behaviors. Moreover, the U-FIT taxonomy in this study builds on the existing knowledge of current UAS forensic practices to identify patterns that aid in generalizing a UAS forensic intelligence taxonomy. The results of these dimensions supported the proposed UAS forensic intelligence-led taxonomy by demystifying the predicted personality traits to deviant actions and drone smugglers. The score obtained in this study was effective in distinguishing individuals based on certain personality traits. These novel, highly distinguishing features in the behavioral personality of drone users may be of particular importance not only in the field of behavioral psychology but also in law enforcement and intelligence.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cyber-FIT"

1

Leiser, Mark, and Andrew Murray. The Role of Non-State Actors and Institutions in the Governance of New and Emerging Digital Technologies. Edited by Roger Brownsword, Eloise Scotford, and Karen Yeung. Oxford University Press, 2016. http://dx.doi.org/10.1093/oxfordhb/9780199680832.013.28.

Full text
Abstract:
New digital technologies pose particular problems for regulators. The utility of these technologies is maximized by linking them to the Internet. But Internet technology does not respect national borders, thereby undermining the traditional legitimacy of the Westphalian state to regulate activity within its jurisdictional borders. This has led to the development of competing cyber-regulatory models that attempt to bridge the gap between traditional Westphalian governance and the new reality of the global digital space. Many of these, although not all, fit within post-Westphalian literature. Some, drawing from globalization and post-Westphalian models, seek to identify and deploy key governance nodes. Such models identify roles for non-state actors, private corporations, and supranational governance institutions. The unhappy relationship between old-world, Westphalian legal governance and new-world, post-Westphalian governance generates ongoing conflict and is the backdrop to this chapter which identifies and discusses a number of case studies in digital governance.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Cyber-FIT"

1

Dobson, Geoffrey B., and Kathleen M. Carley. "Cyber-FIT: An Agent-Based Modelling Approach to Simulating Cyber Warfare." In Social, Cultural, and Behavioral Modeling, 139–48. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60240-0_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Boothby, William H. "Where Do Cyber Hostilities Fit in the International Law Maze?" In New Technologies and the Law of Armed Conflict, 59–73. The Hague: T.M.C. Asser Press, 2013. http://dx.doi.org/10.1007/978-90-6704-933-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Henschke, Adam. "Terrorism and the Internet of Things: Cyber-Terrorism as an Emergent Threat." In Advanced Sciences and Technologies for Security Applications, 71–87. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90221-6_5.

Full text
Abstract:
AbstractIn this chapter I present an argument that cyber-terrorism will happen. This argument is premised on the development of a cluster of related technologies that create a direct causal link between the informational realm of cyberspace and the physical realm. These cyber-enabled physical systems fit under the umbrella of the ‘Internet of Things’ (IoT). While this informational/physical connection is a vitally important part of the claim, a more nuanced analysis reveals five further features are central to the IoT enabling cyber-terrorism. These features are that the IoT is radically insecure, that the components of the IoT are in the world, that the sheer numbers of IoT devices mean potential attacks can be intense, that the IoT will likely be powered by a range of Artificial Intelligence aspects, making it inscrutable, and that the IoT is largely invisible. Combining these five factors together, the IoT emerges as a threat vector for cyber-terrorism. The point of the chapter is to go beyond recognising that the IoT is a thing in the world and so can enable physical impacts from cyber-attacks, to offer these five factors to say something more specific about just why the IoT can potentially be used for cyber-terrorism. Having outlined how the IoT can be used for cyber-terrorism, I attend to the question of whether such actions are actually terrorism or not. Ultimately, I argue, as the IoT grows in scope and penetration of our physical worlds and behaviours, it means that cyber-terrorism is not a question of if, but when. This, I suggest, has significant ethical implications as these five features of the IoT mean that we ought to be regulating these technologies.
APA, Harvard, Vancouver, ISO, and other styles
4

Lexa, Carsten. "Cyber Security." In Fit für die digitale Zukunft, 55–61. Wiesbaden: Springer Fachmedien Wiesbaden, 2021. http://dx.doi.org/10.1007/978-3-658-33073-6_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Moore, Daniel. "Virtual Victory." In Offensive Cyber Operations, 101–16. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780197657553.003.0005.

Full text
Abstract:
Abstract Where do offensive cyber operations (OCOs) fit in modern military strategy? No capability, warfighting domain, or approach works in a vacuum. Cyber can and does fit in a joint operations doctrine, but it requires acknowledging its unique circumstances, advantages and disadvantages. This chapter analyses the applicability of military concepts to OCOs. Where do they fit, and to what end? While event-based operations skew more heavily towards tactical, battlefield outcomes, presence-based operations facilitate deceptive surprise and may even result in strategic outcomes at the campaign level. One of the biggest failings of modern militaries is their incorrect application of cyber capabilities alongside kinetic or even other intangible means. Knowing how, when and where to exercise the unique force made available through OCOs can make the difference between an investment wasted and a key enabler of success. Cyber operations will never single-handedly win a war, but they can make a difference if used correctly. This chapter reviews military concepts and their application to cyber-warfare, including economy of force, centers of gravity, deception and the notion of asymmetry.
APA, Harvard, Vancouver, ISO, and other styles
6

Moore, Daniel. "Principles of Cyber-Warfare." In Offensive Cyber Operations, 15–44. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780197657553.003.0002.

Full text
Abstract:
Abstract What is cyber-warfare, and where does it fit? What are the thresholds that cross from an espionage campaign or an influence operation to an act of cyber-warfare? This chapter tackles the above questions not through a legal lens, but by layering military analysis with the realities of attacking through networks. The chapter has two principal parts; one establishes a five-step model--targeting, impact, attacker, goals, and relationships--to consider any incident as cyber-warfare. Each step requires increasingly complex analysis and allows the reader to distinguish between acts of social activism, peacetime espionage, criminal pursuits or military conflict. The second part of the chapter then dives into the differences between cyberwar and cyber-warfare. More than semantics, the former is a vehicle for fearmongering while the latter explains the role offensive cyber operations play in conflict.
APA, Harvard, Vancouver, ISO, and other styles
7

Arienmughare, Michael, Andrew S. Yoshimura, and Md Abdullah Al Momin. "Survey of Automotive Cyber-Physical System Security." In Security, Data Analytics, and Energy-Aware Solutions in the IoT, 78–97. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-7323-5.ch005.

Full text
Abstract:
This chapter will provide a survey on cyber-physical systems security related to automobiles. In modern vehicles, there has been discussion on how automobiles fit into the world of cyber-physical systems, considering their interaction with both the cyber and physical worlds and interconnected systems. With many modern vehicles being connected to the outside world, there are many vulnerabilities introduced. Modern cars contain many electronic control units and millions of lines of code, which, if compromised, could have fatal consequences. Interfaces to the outside world (e.g., in-vehicle infotainment) may be used as a vector to attack these critical components.
APA, Harvard, Vancouver, ISO, and other styles
8

Cirullies, J., and Y. Pikus. "Fit für die Digitalisierung – Chatbots sichern Anwendern den Zugriff auf die Cyber-Ebene." In 27. Deutscher Materialfluss-Kongress, 215–22. VDI Verlag, 2018. http://dx.doi.org/10.51202/9783181023259-215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Weinstein, James. "Cyber Harassment and Free Speech." In Free Speech in the Digital Age, 52–73. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190883591.003.0004.

Full text
Abstract:
For most people the internet has been a dream come true, allowing instantaneous access to a vast array of information, opinion, and entertainment and facilitating communication with friends and family throughout the world. For others, however, the internet has wrought a nightmare, allowing often anonymous enemies a platform for vicious attacks on the character of their victims and a means for revealing to the world embarrassing private information about them. To combat these attacks, victims and law enforcement officials in the United States have employed both analogue remedies such as harassment and stalking laws as well as cyber-specific provisions. Since the attacks involve speech, however, all these remedies must comport with the First Amendment. The typical response of courts and commentators to the First Amendment issues raised in these cases is to ask whether the perpetrator’s speech falls within one of the limited and narrow traditional exceptions to First Amendment coverage, such as true threats, defamation, obscenity, or fighting words. This approach is understandable in light of unfortunate dicta in several United States Supreme Court decisions—that all content-based restrictions of speech other than speech falling within one of these exceptions are subject to “strict scrutiny,” a rigorous test that few speech restrictions can pass. This chapter argues that this approach to dealing with cyber harassment is misguided. This methodology often results in shoehorning the speech at issue into exceptions into which the speech does not fit, or worse yet, in a finding that the speech is protected by the First Amendment simply because it does not fall within a recognized exception.
APA, Harvard, Vancouver, ISO, and other styles
10

Kharade, Sonali Sagar. "An Adverse Effect of Social, Gaming, and Entertainment Media on Overall Development of Adolescents." In Impact and Role of Digital Technologies in Adolescent Lives, 26–34. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-8318-0.ch003.

Full text
Abstract:
Digital technology in general and social media in particular entail both positive as well as negative impacts on the psyche of the adolescents. The current generation of gen-z has grown up in a media-saturated world. However, it is pretty difficult to judge how media exactly influences their lives. It's commonly observed that social media platforms help saving time establishing contact with our acquaintances. The excessive use of it however leads to various negative repercussions. This may include cyber bullying, low self-esteem, gaming addiction, and less time devoted for doing physical activities. Playing indoor and outdoor games makes adolescents physically fit and mentally healthy. There are however various video games on social media gaming platforms that affect their creativity and logical thinking in an adverse manner. Negative consequences of video game addiction can lead to many problems such as severe body-ache, skin blisters, weakened eyesight, and insomnia. Long-term addiction could lead to obesity, weakness or numbness in the hands, and even blood clots.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cyber-FIT"

1

Ghosh, Dipanjan D., Junghan Kim, Andrew Olewnik, Arun Lakshmanan, and Kemper E. Lewis. "Cyber-Empathic Design: A Data Driven Framework for Product Design." In ASME 2016 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/detc2016-59642.

Full text
Abstract:
One of the critical tasks in product design is to map information from the consumer space to the design space. Currently, this process is largely dependent on the designer to identify and map how psychological and consumer level factors relate to engineered product attributes. In this way current methodologies lack provision to test a designer’s cognitive reasoning and could therefore introduce bias while mapping from consumer to design space. Also, current dominant frameworks do not include user-product interaction data in design decision making and neither do they assist designers in understanding why a consumer has a particular perception about a product. This paper proposes a new framework — Cyber-Empathic Design — where user-product interaction data is acquired via embedded sensors in the products. To understand the motivations behind consumer perceptions, a network of latent constructs is used which forms a causal model framework. Structural Equation Modeling is used as the parameter estimation and hypothesis testing technique making the framework falsifiable in nature. To demonstrate the framework and demonstrate its effectiveness a case study of sensor integrated shoes is presented in this work, where two models are compared — one survey based and using the Cyber-Empathic framework model. It is shown that the Cyber-Empathic framework results in improved fit. The case study also demonstrates the technique to test a designers’ cognitive hypothesis.
APA, Harvard, Vancouver, ISO, and other styles
2

Isaac Gabriel, Odun-Ayo. "A Review of Common Tools and Techniques for Reconnaissance Attacks.. Proceedings of the." In 28th iSTEAMS Multidisciplinary Research Conference AIUWA The Gambia. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v28p11.

Full text
Abstract:
Background: A reconnaissance helps the attacker gain valuable information on the target to help the attacker select the best tools that would make the attack successful. Aim: This study aims to review tools for reconnaissance attacks which will be beneficial to professional ethical hackers and also enlighten organizations and the general public of the potential harm of successful reconnaissance attacks. Methodology: The databases – Springer, Elsevier, Wiley, IEEE, ACM, ArXiv, and Google Scholar were explored. A quantitative evaluation was conducted on 19 selected articles. Result: 95.2% of the reconnaissance tools allowed experts to gather information by use of the command line. While 4.8% of the tools do not provide a commandline interface. 61.9% of the tools are network-based – can be used to gather data about the target’s network infrastructure. Conclusion: The best-fit tool is massively dependent on the attacker or penetration tester. Therefore, a tool should be selected based on the user’s preference and the attack style. Keywords: Reconnaissance, cyber-attack, cybersecurity,social engineering, techniques.
APA, Harvard, Vancouver, ISO, and other styles
3

Hussain, Sayed Shahid, Khurram S. Khattak, Ali Khan, and Zawar H. Khan. "Cyber Physical System for Solar Energy Monitoring." In 2019 International Conference on Frontiers of Information Technology (FIT). IEEE, 2019. http://dx.doi.org/10.1109/fit47737.2019.00043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Usman, Awais, and Hamid Mukhtar. "Design Time Considedrations for Cyber Physical Systems." In 2012 10th International Conference on Frontiers of Information Technology (FIT 2012). IEEE, 2012. http://dx.doi.org/10.1109/fit.2012.56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rehman, Shafiq ur, Christopher Allgaier, and Volker Gruhn. "Security Requirements Engineering: A Framework for Cyber-Physical Systems." In 2018 International Conference on Frontiers of Information Technology (FIT). IEEE, 2018. http://dx.doi.org/10.1109/fit.2018.00062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Iqbal, Zafar, Zahid Anwar, and Rafia Mumtaz. "STIXGEN - A Novel Framework for Automatic Generation of Structured Cyber Threat Information." In 2018 International Conference on Frontiers of Information Technology (FIT). IEEE, 2018. http://dx.doi.org/10.1109/fit.2018.00049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mohsin, Mujahid, and Zahid Anwar. "Where to Kill the Cyber Kill-Chain: An Ontology-Driven Framework for IoT Security Analytics." In 2016 International Conference on Frontiers of Information Technology (FIT). IEEE, 2016. http://dx.doi.org/10.1109/fit.2016.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Riaz, Faisal, and Muaz A. Niazi. "Spectrum Mobility in Cognitive Radio-Based Vehicular Cyber Physical Networks: A Fuzzy Emotion-Inspired Scheme." In 2015 13th International Conference on Frontiers of Information Technology (FIT). IEEE, 2015. http://dx.doi.org/10.1109/fit.2015.53.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kosasi, Sandy, Edy Victor, I. Dewa Ayu Eka Yuliani, Utin Kasma, Diana Fitriani, and Benedikta Bunyi. "Effects of IT Service Management on E-Learning Readiness through the HOT-Fit Model." In 2022 10th International Conference on Cyber and IT Service Management (CITSM). IEEE, 2022. http://dx.doi.org/10.1109/citsm56380.2022.9935923.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Laudante, Elena, and Francesco Caputo. "Design and Digital Manufacturing: an ergonomic approach for Industry 4.0." In Systems & Design: Beyond Processes and Thinking. Valencia: Universitat Politècnica València, 2016. http://dx.doi.org/10.4995/ifdp.2016.3297.

Full text
Abstract:
The contribution proposes innovative methods for design and ergonomic configuration of tools, equipment and manual workplaces for automobile assembly tasks, in order to increase the worker’s welfare and the system’s performance by improving general safety conditions. Developed activities are part of the research project “DEWO – Design Environment for WorkPlace Optimization”, financed by Italian Government to the Second University of Naples. The aim of this project is to identify new methods for optimization of assembly tasks in a virtual environment in terms of overall integration among materials management, working tasks organization and layout, starting from the principles of "WorkPlace Organization" and the modern theories of "Lean Production ". The manufacturing industry is heading to the ever more pushed use of digital technologies in order to achieve very dynamic production environments and to be able to develop continuous process and product innovations to fit into the so called Fourth Industrial Revolution, Industry 4.0. The main goal of Industry 4.0 is to “rethink” companies through the use of digital, to reconsider the design approach and to monitor the production process in real time. The research addresses the evolution of innovation 4.0 in relation to the discipline of design, where the management of knowledge in the production process has led to the strengthening and improvement of tangible goods. Starting by current ergonomic analysis models and innovative approaches to the process of industrial production line, the manufacturing processes in the virtual environment were defined and optimized with the use of innovative 3D enjoyment technologies. The constant interaction among the different disciplines of design, engineering and occupational medicine, enables the creation of advanced systems for simulating production processes based on virtual reality and augmented reality, mainly focused on the needs and requirements of the workers on a production line where it is possible to bring out the interaction between real and virtual factory (Cyber-Physical System). The objective is to define new models of analysis, of development and testing for the configuration of ergonomic processes that improve and facilitate the human-machine interaction in a holistic view, in order to protect and enhance human capital, transferring the experiences and knowledge in the factory system, key factors for the company and for the sustainability of workers welfare levels.DOI: http://dx.doi.org/10.4995/IFDP.2016.3297
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography