To see the other types of publications on this topic, follow the link: Cyber security management tool.

Journal articles on the topic 'Cyber security management tool'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cyber security management tool.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Štitilis, Darius, Irmantas Rotomskis, Marius Laurinaitis, Sergiy Nadvynychnyy, and Nadiya Khorunzhak. "National cyber security strategies: management, unification and assessment." Independent Journal of Management & Production 11, no. 9 (November 1, 2020): 2341. http://dx.doi.org/10.14807/ijmp.v11i9.1431.

Full text
Abstract:
Cyber security has become an important issue both on the EU and the national level. Cyber security is now perceived as a part of national security. The newly emerging cyber security policy, comprising national cyber security strategies as an important constituent part, has been recently paid considerable attention. Speaking of national cyber security strategies, a positive thing is that the majority of EU member states have already approved such strategies. However, the approved strategies differ considerably in terms of their content and implementation. The present article aims at identifying reasons for differences in individual national strategies and analyses aspects of their unifications in expectation to find out an optimum balance between the degree of unification and the need to retain differences arising from intrinsic national singularities. To this end, the article analyses the issue of national cyber security on the basis of Lithuania's cyber security strategy as a sample in the context of ENISA good practices for the development of cyber security strategies and by application of ENISA developed KPIs and testing ENISA cyber security strategy evaluation tool. Finally, the article suggests recommendations on further development of national cyber security strategies in terms of their unification and national singularities.
APA, Harvard, Vancouver, ISO, and other styles
2

Fakiha, Bandr. "Business Organization Security Strategies to Cyber Security Threats." International Journal of Safety and Security Engineering 11, no. 1 (February 28, 2021): 101–4. http://dx.doi.org/10.18280/ijsse.110111.

Full text
Abstract:
It is argued that the advancement of Information, Communication and Technology went hand in hand with the emergence of certain threats and vulnerabilities to cybersecurity. In several cases, cyber attacks have targeted the information, communication and infrastructure networks of numerous organizations. Today, hackers and intruders have advanced technology within their scope that lets them access the organizational information system. The present study highlights numerous internet security related problems, it offers a broad-based overview of internet threats from the perspective of business enterprises, along with prevention measures and enhanced safety strategies. A systematic analysis of secondary literature was introduced by researchers, the study found that it is critical for organizations to choose an IT security management tool that can be categorized as best practices and standards. The Security Incident Event Management (SIEM) framework is one key instrument proposed here. SIEM instruments help security analysts gain insight into the security threats targeting the IT structures of a given organization.
APA, Harvard, Vancouver, ISO, and other styles
3

Суворов, Александр, Aleksandr Suvorov, Мария Матанцева, Mariya Matanceva, Евгения Плотникова, and Evgeniya Plotnikova. "Cyber Insurance as a Way of Cyber Risks Management." Safety in Technosphere 7, no. 5 (November 19, 2019): 35–42. http://dx.doi.org/10.12737/article_5d8b1f1205ad35.02378913.

Full text
Abstract:
A review of the cyber insurance domain has been carried out with a description of classical terms from the insurance industry. Have been considered two the most comprehensive today definitions of cyber risk in authors’ opinion. A diagram of processes for cyber risk management using insurance has been presented, and the place of cyber-risk among other company’s risks has been demonstrated, i. e. the context of cyber risk among the risks of any commercial organization has been shown. A typical cyber insurance process has been described, and a scheme of cyber insurance processes has been developed. A brief description of problem areas and controversial issues in cyber insurance, with which cyber-risk insurance practices may face, has been presented, as well as a table showing at which stage of cyber-insurance the specific problems may arise. Has been provided the basic economic utility function, which formalizes decision making for agents with a different attitude to risk. Standards in cyber security, and various software products that can be used as a tool for assessing the security level of an enterprise’s IT infrastructure have been presented, and it has been demonstrated how these products can help in cyber risk assessment. Different methods used at each stage of cyber insurance have been shown.
APA, Harvard, Vancouver, ISO, and other styles
4

Svilicic, Boris, Junzo Kamahara, Matthew Rooks, and Yoshiji Yano. "Maritime Cyber Risk Management: An Experimental Ship Assessment." Journal of Navigation 72, no. 5 (February 7, 2019): 1108–20. http://dx.doi.org/10.1017/s0373463318001157.

Full text
Abstract:
The maritime transport industry is increasingly reliant on computing and communication technologies, and the need for cyber risk management of critical systems and assets on vessels is becoming critically important. In this paper, a comprehensive cyber risk assessment of a ship is presented. An experimental process consisting of assessment preparation activities, assessment conduct and results communication has been developed. The assessment conduct relies on a survey developed and performed by interviewing a ship's crew. Computational vulnerability scanning of the ship's Electronic Chart Display and Information System (ECDIS) is introduced as a specific part of this cyber security assessment. The assessment process presented has been experimentally tested by evaluating the cyber security level of Kobe University's training ship Fukae-maru. For computational vulnerability scanning, an industry-leading software tool has been used, and a quantitative cyber risk analysis has been conducted to evaluate cyber risks on the ship.
APA, Harvard, Vancouver, ISO, and other styles
5

Karagozlu, Damla. "Determination of cyber security ensuring behaviours of pre-service teachers." Cypriot Journal of Educational Sciences 15, no. 6 (December 31, 2020): 1698–706. http://dx.doi.org/10.18844/cjes.v15i6.5327.

Full text
Abstract:
As cyber security attack rates increase, so do cyber security concerns. Cyber security is the collection of tools, policies, security concepts, security measures, risk management approaches, actions, education, applications, security and technologies that can be used in order to protect the cyber environment and user rights. The aim of this study is to determine the behaviours of pre-service teachers as this study’s objective is to determine the behaviours of pre-service teachers regarding cyber security. This study is designed according to the quantitative research method and the Personal Cyber Security Ensuring Scale has been used. 144 pre-service teachers of two different universities who took up instructional technologies and material design courses in the 2019–2020 spring semester participated in the study. It has been observed that the participants frequently took measures when they noticed unreliable people and situations in the internet environment but took occasional measures in terms of not leaving any trace, taking precautions and protecting personal privacy. Keywords: Cyber attack, cyber security, personal cyber security, pre-service teachers
APA, Harvard, Vancouver, ISO, and other styles
6

Kachynskyi, A. B., and M. S. Stremetska. "Operational analytics as a data monitoring and event management tool of the cyber security management systems." Reports of the National Academy of Sciences of Ukraine, no. 1 (February 2021): 9–16. http://dx.doi.org/10.15407/dopovidi2021.01.009.

Full text
Abstract:
With growing demand for the digitalization of data collection, transmission, processing and storage processes in all life spheres of individual, society, and state, there is an urgent need to construct an infrastructure of infor-mation transmission networks which can provide a secure connection between endpoints and data centers. These networks must have high availability and provide the fast and efficient processing of information requests, espe-cially in case of critical infrastructure networks. A structural functional scheme of data management for SIEM systems which includes straight and reverse relations between physical, mathematical and analytical levels is proposed, based on the stratum theory by M. Messarovich. A model of multilevel system for the data monito ring and cyber security event management is built in order to provide a systematic approach to maintain the safety state of complex systems and to ensure mechanisms for the operative real-time cyber security incident response.
APA, Harvard, Vancouver, ISO, and other styles
7

Russo, Pietro, Alberto Caponi, Marco Leuti, and Giuseppe Bianchi. "A Web Platform for Integrated Vulnerability Assessment and Cyber Risk Management." Information 10, no. 7 (July 17, 2019): 242. http://dx.doi.org/10.3390/info10070242.

Full text
Abstract:
Cyber risk management is a very important problem for every company connected to the internet. Usually, risk management is done considering only Risk Analysis without connecting it with Vulnerability Assessment, using external and expensive tools. In this paper we present CYber Risk Vulnerability Management (CYRVM)—a custom-made software platform devised to simplify and improve automation and continuity in cyber security assessment. CYRVM’s main novelties are the combination, in a single and easy-to-use Web-based software platform, of an online Vulnerability Assessment tool within a Risk Analysis framework following the NIST 800-30 Risk Management guidelines and the integration of predictive solutions able to suggest to the user the risk rating and classification.
APA, Harvard, Vancouver, ISO, and other styles
8

Atoum, Issa, Ahmed Otoom, and Amer Abu Ali. "A holistic cyber security implementation framework." Information Management & Computer Security 22, no. 3 (July 8, 2014): 251–64. http://dx.doi.org/10.1108/imcs-02-2013-0014.

Full text
Abstract:
Purpose – The purpose of this paper is to propose a holistic cyber security implementation framework (HCS-IF) that lays out the ground for a conceptual, coherent, systematic, overarching and consolidated approach to implement cyber security strategies (CSSs). Design/methodology/approach – The HCS-IF is conceptually proposed to address the actual needs that are extracted from literature review. The HCS-IF uses and integrates a set of high-level conceptual security controls, solutions, processes, entities, tools, techniques or mechanisms that are already known in the domains of information security management, software engineering and project management to address the identified needs. Findings – The HCS-IF components and controls collectively interact and cooperate to implement CSSs. The proposed framework is compared with other related frameworks, and the results show that the HCS-IF outperforms other frameworks on most of the suggested comparison criteria. Originality/value – From a practical standpoint, governments and practitioners alike stand to gain from the findings of this research. Governments who want to implement CSSs on a national level will find the proposed framework useful in overseeing cyber security implementation. Practitioners will be prepared to address the anticipated cyber security implementation challenges and the required controls needed to facilitate cyber-security implementation in a holistic overarching manner.
APA, Harvard, Vancouver, ISO, and other styles
9

Pavlík, Lukáš, Ekaterina Chytilová, and Jarmila Zimmermannová. "Security Aspects of Healthcare Organization from the Perspective of Digitization of Facility Management." WSEAS TRANSACTIONS ON BUSINESS AND ECONOMICS 18 (January 25, 2021): 360–66. http://dx.doi.org/10.37394/23207.2021.18.36.

Full text
Abstract:
Many healthcare organizations are exposed to various cyber threats. The increase in the frequency of these cyber threats can also be observed during the Covid-19 pandemic. The security of information systems in hospitals and their management is also not part of the management of facilities in these organizations. The paper presents the possibilities of securing facility management processes in healthcare organizations from a security point of view. There is an analysis of security aspects of a particular medical facility and its information system with emphasis on the application of regular facility management. Analysis and evaluation of tools for ensuring the security of the hospital information network is also applied. The contribution of the paper is the identification and expression of the correlation between cyber threats and the following modules of the information system in the medical facility. Another part of the proven research compares safety mechanisms and their possible failure in a selected hospital. The main research results, which are based on the evaluation of safety aspects in these organizations, can be further used as a platform for the effectiveness of processes in healthcare and thus increase synergies between safety levels and ensure facility management processes
APA, Harvard, Vancouver, ISO, and other styles
10

Comizio, V. Gerard, Behnam Dayanim, and Laura Bain. "Cybersecurity as a global concern in need of global solutions: an overview of financial regulatory developments in 2015." Journal of Investment Compliance 17, no. 1 (May 3, 2016): 101–11. http://dx.doi.org/10.1108/joic-01-2016-0003.

Full text
Abstract:
Purpose To provide financial institutions an overview of the developments in cybersecurity regulation of financial institutions during 2015 by the United States, the United Kingdom, and the European Union, as well as guidance for developing effective cyber-risk management programs in light of evolving cyber-threats and cyber-regulatory expectations. Design/methodology/approach Reviews US, UK and EU regulatory developments in the cybersecurity area and provides several best practice tips financial institutions should consider and implement to improve their cybersecurity compliance programs. Findings While cyber-threats and financial regulators’ expectations for cyber-security are constantly evolving, recent guidance and enforcement efforts by the US, UK and EU illustrate the need for financial institutions to develop effective cybersecurity programs that address current regulatory compliance requirements and prepare for emergency cyber responses. Practical implications Financial institutions should utilize the Federal Financial Institutions Examination Council’s Cybersecurity Assessment Tool to assess their cyber-risk profile and cyber-preparedness. Originality/value Practical guidance from experienced financial regulatory and privacy lawyers that provides a survey of the current regulatory environment and recommendations for cyber-security compliance.
APA, Harvard, Vancouver, ISO, and other styles
11

Rani, Nazatul Shima Abdul, K. Sarojani Krishnan, Khairul Azizan Suda, and Chahhoub Fatimazahra. "An Effective Model for Fraud Risk Management in Mitigating Telecommunication Fraud Incidences." Asia Proceedings of Social Sciences 8, no. 2 (June 11, 2021): 112–16. http://dx.doi.org/10.31580/apss.v8i2.1919.

Full text
Abstract:
In the context of Malaysia, the most common types of cyber attacks are denial of service, intrusion attempts, spam, vulnerability report, fraud, malicious code, and content-related attacks as reported by Cyber Security Malaysia. However, since 2011, cyber attacks such as intrusion attempts, denial of service and spam are decreasing steadily as a result of security measures that have been taken by companies or internet users. Nevertheless, cyber attacks which are steadily increasing are cyber harassment, intrusion and fraud. Approximately 5,328 fraud incidences were reported in 2011 while in 2020, the number of cases rose to 7,593 cases. Out of these cyber attacks in Malaysia, the most proliferating ones have been identified as fraud incidences. Thus, it is highly needed to come up with and propose the best fraud risk management strategy to handle fraud incidences among internet users and internet providers through the utilization of business intelligence tools, and quality enhancement via quality systems in place, quality information, and quality users. With these tools in hand, it is hoped that the proposed model will serve as a framework to mitigate and/or prevent the occurrence of fraud incidences.
APA, Harvard, Vancouver, ISO, and other styles
12

González-Granadillo, Gustavo, Susana González-Zarzosa, and Rodrigo Diaz. "Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures." Sensors 21, no. 14 (July 12, 2021): 4759. http://dx.doi.org/10.3390/s21144759.

Full text
Abstract:
Security Information and Event Management (SIEM) systems have been widely deployed as a powerful tool to prevent, detect, and react against cyber-attacks. SIEM solutions have evolved to become comprehensive systems that provide a wide visibility to identify areas of high risks and proactively focus on mitigation strategies aiming at reducing costs and time for incident response. Currently, SIEM systems and related solutions are slowly converging with big data analytics tools. We survey the most widely used SIEMs regarding their critical functionality and provide an analysis of external factors affecting the SIEM landscape in mid and long-term. A list of potential enhancements for the next generation of SIEMs is provided as part of the review of existing solutions as well as an analysis on their benefits and usage in critical infrastructures.
APA, Harvard, Vancouver, ISO, and other styles
13

Gonzalez-Granadillo, Gustavo, Sofia Anna Menesidou, Dimitrios Papamartzivanos, Ramon Romeu, Diana Navarro-Llobet, Caxton Okoh, Sokratis Nifakos, Christos Xenakis, and Emmanouil Panaousis. "Automated Cyber and Privacy Risk Management Toolkit." Sensors 21, no. 16 (August 15, 2021): 5493. http://dx.doi.org/10.3390/s21165493.

Full text
Abstract:
Addressing cyber and privacy risks has never been more critical for organisations. While a number of risk assessment methodologies and software tools are available, it is most often the case that one must, at least, integrate them into a holistic approach that combines several appropriate risk sources as input to risk mitigation tools. In addition, cyber risk assessment primarily investigates cyber risks as the consequence of vulnerabilities and threats that threaten assets of the investigated infrastructure. In fact, cyber risk assessment is decoupled from privacy impact assessment, which aims to detect privacy-specific threats and assess the degree of compliance with data protection legislation. Furthermore, a Privacy Impact Assessment (PIA) is conducted in a proactive manner during the design phase of a system, combining processing activities and their inter-dependencies with assets, vulnerabilities, real-time threats and Personally Identifiable Information (PII) that may occur during the dynamic life-cycle of systems. In this paper, we propose a cyber and privacy risk management toolkit, called AMBIENT (Automated Cyber and Privacy Risk Management Toolkit) that addresses the above challenges by implementing and integrating three distinct software tools. AMBIENT not only assesses cyber and privacy risks in a thorough and automated manner but it also offers decision-support capabilities, to recommend optimal safeguards using the well-known repository of the Center for Internet Security (CIS) Controls. To the best of our knowledge, AMBIENT is the first toolkit in the academic literature that brings together the aforementioned capabilities. To demonstrate its use, we have created a case scenario based on information about cyber attacks we have received from a healthcare organisation, as a reference sector that faces critical cyber and privacy threats.
APA, Harvard, Vancouver, ISO, and other styles
14

Шумилина, Ольга, Ирина Езангина, and Irina Ezangina. "Management of financial and economic security of a modern bank: remote maintenance risks." Russian Journal of Management 5, no. 1 (April 4, 2017): 62–70. http://dx.doi.org/10.12737/22427.

Full text
Abstract:
The paper emphasizes that the variety of products offered by a modern bank in the remote access mode, its permanent renewal, integration services increase the downside risks to economic and financial security of the credit institution. Risks writers associated with cyber attacks as the main tool of remote financial fraud, which is confirmed by reliable statistical material. Analyzed species, tools, the initiators of the attacks proved their dual nature associated with purposefulness as well as the infrastructure of the credit institution and its customer base. Continuing studied private practice to counter cybercrime. The conclusion about the significance of direct and indirect participation of the state institution to ensure financial stability of the banking system as the basis of its economic security. Special attention is given to describing the activities of the prospects created by the Chief of Security and Information Protection of the Bank of Russia, as well as a mechanism to increase the financial literacy of the population in order to minimize the risk of fraud by unscrupulous market participants
APA, Harvard, Vancouver, ISO, and other styles
15

Panda, Abhilash, and Andrew Bower. "Cyber security and the disaster resilience framework." International Journal of Disaster Resilience in the Built Environment 11, no. 4 (April 20, 2020): 507–18. http://dx.doi.org/10.1108/ijdrbe-07-2019-0046.

Full text
Abstract:
Purpose The purpose of this paper is to concentrate on the place of cyber security risk in the framework of global commitments adopted in 2015 to reduce disaster risks in an all-hazards approach. It explores the correlations between traditional risks associated with critical infrastructures – as understood by the Sendai framework – cyber security risks and the cascading effects characteristic of today’s complex and interrelated shocks and stresses. It takes a step further, expanding the focus of traditionally understood technological risks to explore cyber security risks, at the heart of our societies’ digital transformations,and showcase opportunities from the European context. Design/methodology/approach By reviewing existing literature on cyber security, disaster resilience and cascading disasters, this paper highlights current challenges and good practices undertaken by various governments. Findings Understanding disaster risks is a precondition to improving the mitigation of impacts of existing risks and preventing new risks. Effective risk reduction relies on a solid understanding of losses resulting from events to inform future actions, and on the assessment of risks relying on a robust evidence base and state-of-the-art scientific capacity to model and simulate potential hazards. In this context, embedding cyber security risks, and the complexity of cascading impacts in improving the understanding of disaster risks, calls for appropriate methods and tools allowing for a multi-risk and holistic focus to the assessment of risks and the planning of risk management capacities that follow. Research limitations/implications Globally and in Europe, focus on interconnected risk and their impacts is steadily increasing. Risk assessments are still conservative; incorporation of cyber resilience into national and local level DRR plans is yet not visible. Originality/value Existing research is restricted to cyber security and disaster resilience, as separated subjects. This paper, for the first time, brings together the interconnection between the two topic options to address them.
APA, Harvard, Vancouver, ISO, and other styles
16

Nikolopoulos, Dionysios, Avi Ostfeld, Elad Salomons, and Christos Makropoulos. "Resilience Assessment of Water Quality Sensor Designs under Cyber-Physical Attacks." Water 13, no. 5 (February 28, 2021): 647. http://dx.doi.org/10.3390/w13050647.

Full text
Abstract:
Water distribution networks (WDNs) are critical infrastructure for the welfare of society. Due to their spatial extent and difficulties in deployment of security measures, they are vulnerable to threat scenarios that include the rising concern of cyber-physical attacks. To protect WDNs against different kinds of water contamination, it is customary to deploy water quality (WQ) monitoring sensors. Cyber-attacks on the monitoring system that employs WQ sensors combined with deliberate contamination events via backflow attacks can lead to severe disruptions to water delivery or even potentially fatal consequences for consumers. As such, the water sector is in immediate need of tools and methodologies that can support cyber-physical quality attack simulation and vulnerability assessment of the WQ monitoring system under such attacks. In this study we demonstrate a novel methodology to assess the resilience of placement schemes generated with the Threat Ensemble Vulnerability Assessment and Sensor Placement Optimization Tool (TEVA-SPOT) and evaluated under cyber-physical attacks simulated using the stress-testing platform RISKNOUGHT, using multidimensional metrics and resilience profile graphs. The results of this study show that some sensor designs are inherently more resilient than others, and this trait can be exploited in risk management practices.
APA, Harvard, Vancouver, ISO, and other styles
17

Lee, In. "Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management." Future Internet 12, no. 9 (September 18, 2020): 157. http://dx.doi.org/10.3390/fi12090157.

Full text
Abstract:
Along with the growing threat of cyberattacks, cybersecurity has become one of the most important areas of the Internet of Things (IoT). The purpose of IoT cybersecurity is to reduce cybersecurity risk for organizations and users through the protection of IoT assets and privacy. New cybersecurity technologies and tools provide potential for better IoT security management. However, there is a lack of effective IoT cyber risk management frameworks for managers. This paper reviews IoT cybersecurity technologies and cyber risk management frameworks. Then, this paper presents a four-layer IoT cyber risk management framework. This paper also applies a linear programming method for the allocation of financial resources to multiple IoT cybersecurity projects. An illustration is provided as a proof of concept.
APA, Harvard, Vancouver, ISO, and other styles
18

Purnomo, Arif D., Charles Lim, and Burman Noviansyah. "Threat Hunting Early Experiment through Event Correlation and Memory Forensic." ACMIT Proceedings 6, no. 1 (July 6, 2021): 56–63. http://dx.doi.org/10.33555/acmit.v6i1.98.

Full text
Abstract:
The cyber threat landscapes nowadays are dynamically evolving over time, the cyber security practitioner in corporations need to adapt with more sophisticated way with the latest cyber threat attacks are launched. Cyber Threat Intelligence is one of the tools that can be utilized as a cyber threat detection. Generally, CTI operates by integrating its directory with events collected from Security Information and Event Management (SIEM) to correlates all of the appliances logs within corporation and providing summarized and meaningful information that can be reviewed to identify legitimate malicious cyber threat activity. However, relying only CTI subscription that only contains blacklist domain and ip addresses integrated with SIEM will only provide passive detection for known cyber threats. The needs for proactive cyber threat detection is required to compete with the modern threat landscape. This research work will try to explore the possibility of detecting unknown or undetected cyber threats using network event correlation and memory forensic to validate its existence. Throughout this research time span, we’re able to discover malicious network pattern that is proven to be undetected within internal organization endpoint protection. Therefore, this research will provide baseline for threat hunting activity based on network behavioural pattern.
APA, Harvard, Vancouver, ISO, and other styles
19

Baretić, Maja, and Nikola Protrka. "Healthcare Information Technology." International Journal of E-Services and Mobile Applications 13, no. 4 (October 2021): 77–87. http://dx.doi.org/10.4018/ijesma.2021100105.

Full text
Abstract:
The term “health information technology” (health IT) refers to the electronic systems that store, share, analyze, and protect electronic health records. It includes also electronic prescribing, knowledge sharing, patient support tools, and mobile health technology together with decision-making algorithms. The privacy, security, and ethics of health information are priority for both patients and healthcare providers. The health IT is a target for cyber-criminals; stolen health information, or blackmailing via different kind of cryptolockers, is good on the black market. While the healthcare industry relies more on technology, cyber-attacks are threatening health IT. This article argues health IT issues from two perspectives. The first one is a physician's point of view aiming to improve quality of care using fast and accurate health IT. The second is the standpoint of cyber-security specialists aiming to protect data form cyber-criminals, continually developing new strategies and best practices.
APA, Harvard, Vancouver, ISO, and other styles
20

Vasilenko, M., O. Kozin, M. Kozina, and V. Rachuk. "CYBER RISKS IN THE MUNICIPAL ECONOMY DURING THE PANDEMIC: DAMAGES AND THE STRUGGLE FOR CYBER SECURITY." Municipal economy of cities 3, no. 156 (July 1, 2020): 80–87. http://dx.doi.org/10.33042/2522-1809-2020-3-156-80-87.

Full text
Abstract:
As a result of remote control and automation, the urban infrastructure becomes extremely vulnerable to intrusions, attacks, human errors, accidents that are growing. Due to the concentration of local and global computer networks, systems and software, the “cyber risk” of the municipal economy is multiplicative, which makes it systemic and international. Its essence is manifested both at the national and global levels through the impact on business, municipal and state authorities. Today, the existing pandemic contributes to an increase in the number of cyberattacks, which indicates an even greater cyber vulnerability of municipal administrations and public authorities. Coronavirus COVID-19 has become a tool for hacker attacks on users and enterprises. The purpose of the article is to determine, based on a systematic analysis of the new cyber risks of the municipal economy that arose during the pandemic, to formulate our own views on the classification and methods of counteracting municipal organizations and enterprises. According to experts, since the beginning of this year, thousands of domains associated with coronavirus have been registered in the world. This number also includes sites of various hacker groups that offer information about coronavirus, masks, or quick treatment methods. In fact, these phishing sites are used by hackers to extort money or steal confidential, as well as commercial information. The main types of attacks that increase the threat and actually create a "cyber infection" are noted. Based on the material of this article and the experience of the authors, measures are proposed that ensure the safety of municipal enterprises, which should be carried out in the first place. Strict measures in IT management during a crisis are also recognized as undeniable and necessary. Such as help from cyber experts and help for cyber experts; preservation of evidence of intrusion, staff training, accumulation of experience to accelerate progress in work. Remote work during a pandemic can make it difficult for IT staff to monitor cyber risks, since many of these risks go beyond the financial or technical capabilities of municipalities. Therefore, based on these proposals for the safety of municipal enterprises, an integrated approach to cyber risks is proposed, including an emergency response plan. Based on international experience, the possibility of insuring municipal enterprises and organizations against potential losses associated with cyber attacks by hackers, as well as to eliminate the consequences of these attacks, is also noted. Keywords: cyber-security, cyber-risk, municipal economy, “phishing”, pandemic, Covid-19
APA, Harvard, Vancouver, ISO, and other styles
21

Kwon, YooJin, SangYoum Lee, Ralph King, Jong Lim, and Huy Kim. "Behavior Analysis and Anomaly Detection for a Digital Substation on Cyber-Physical System." Electronics 8, no. 3 (March 15, 2019): 326. http://dx.doi.org/10.3390/electronics8030326.

Full text
Abstract:
The electric power system infrastructure has begun to adopt digital information technologies such as transmission control protocol/internet protocol (TCP/IP) and Ethernet infrastructures. With this adoption, information technology-centric network and system management (NSM) tools are used to manage the intermediate communication systems and electric devices in digital substations. However, the technology to monitor the cyber–physical System (CPS) statistics for the intelligent electronic devices (IEDs) and serial communication for a digital substation does not exist yet. In this paper, we aim to propose cyber-physical analysis methodologies of a digital substation system, concerning issues of (1) International Electrotechnical Commission (IEC) 62351-7 based network and system management, (2) behavior analysis of the CPS, (3) cyber–physical anomaly detection systems, and (4) a testbed for a digital substation. By collaborating with Electric Power Research Institute (EPRI), a cyber security testbed for the digital substation has been developed to implement the use cases and analyze potential security threats. Newly integrated methodologies for information handling are expected to lead to improved safety and reliability for the CPS of electric power grid systems.
APA, Harvard, Vancouver, ISO, and other styles
22

Chaturvedi, Manmohan, Abhishek Narain Singh, Manmohan Prasad Gupta, and Jaijit Bhattacharya. "Analyses of issues of information security in Indian context." Transforming Government: People, Process and Policy 8, no. 3 (August 12, 2014): 374–97. http://dx.doi.org/10.1108/tg-07-2013-0019.

Full text
Abstract:
Purpose – The purpose of this paper is to attempt to fill the need to identify critical information security issues at national level, both technical and social in the Indian context, and create a framework of these issues to provide interesting managerial insights about their hierarchy. Current literature advocates relevance of both technical and social issues in a potential framework to address national and organizational information security concerns. Such a framework can guide users in developing insight for strategy in the maize of important information security issues and their intricate interdependency. Design/methodology/approach – Delphi methodology is used to identify a set of topical issues with help from members of a cyber security group. These issues are further analyzed using Interpretive Structural Modeling (ISM) to impose order and direction to the complex relationships among them. Findings – The analysis using ISM creates a framework of these issues and provides interesting managerial insights about their hierarchy. These insights are used to recommend prioritized action for information security at national and organizational levels. Research limitations/implications – The highlight of this research is ingenious deployment of two idea engineering methods in developing interpretable structural model of 25 information security issues. This model provides valuable insights and can guide the policy formulation. This is the key contribution of this paper. It needs hardly any emphasis on the need for continuous search of all technical and social issues and formulating policies and programs using experts” judgment in a rigorous manner. Subsequent research may scale up to the global level for extension and validation by empanelling Delphi experts from nations belonging to different regions. Time-variant analysis can be attempted with the help of System Dynamics Modeling using causal-loop diagrams to account for the supportive and inhibiting influences of various issues. This approach has the potential to generate more realistic insights that can inform policy formulation. Practical implications – It brings about key information security issues connected with its various facets, viz. national/organizational level initiatives, supportive processes, capabilities and objectives. These issues, identified by Indian experts in the Indian context, offer a method that one could apply in other national contexts and see whether substantial differences occur, and how other experts prioritize these issues. The analysis of social issues along with technical issues using the ISM tool provides us insights that are considered applicable to a larger context than India. The policy and program formulations in other nations can benefit from the insights generated by this research. The fast-paced proliferation of technology and its resultant vulnerabilities have given birth to an underground economy of malware trading by criminals, terrorists and hostile nation states. Secure cyber space for legitimate use by the globalized world can only be achieved by international cooperation. Social implications – A “digital divide” in cyber defense cannot be afforded. As explained earlier, cyber security is a challenge for both developed and developing nations. Prioritization of resources in a sequence suggested by ISM analysis would help face the challenge of cyber security better. The methodology suggested in this paper would ensure adequate response to cyber threats and eliminate knee-jerk reaction. Originality/value – This research emphasizes identification of hierarchical relationship among the identified topical issues of information security rather than using them as a flat checklist. It helps us segregate the end objectives from root issues and highlights the necessity of addressing these root issues to achieve those objectives.
APA, Harvard, Vancouver, ISO, and other styles
23

Iakovakis, George, Constantinos-Giovanni Xarhoulacos, Konstantinos Giovas, and Dimitris Gritzalis. "Analysis and Classification of Mitigation Tools against Cyberattacks in COVID-19 Era." Security and Communication Networks 2021 (August 19, 2021): 1–21. http://dx.doi.org/10.1155/2021/3187205.

Full text
Abstract:
The COVID-19 outbreak has forced businesses to shift to an unprecedented “work from home” company environment. While this provides advantages for employees and businesses, it also leads to a multitude of shortcomings, most prevalent of which is the emergence of additional security risks. Previous to the outbreak, company computer networks were mainly confined within its facilities. The pandemic has now caused this network to “spread thin,” as the majority of employees work remotely. This has opened up a variety of new vulnerabilities, as workers’ cyber protection is not the same at home as it is in office. Although the effects of the virus are now subsiding, working remotely has embedded itself as the new normal. Thus, it is imperative for company management to take the necessary steps to ensure business continuity and be prepared to deal with an increased number of cyber threats. In our research, we provide a detailed classification for a group of tools which will facilitate risk mitigation and prevention. We also provide a selection of automated tools such as vulnerability scanners, monitoring and logging tools, and antivirus software. We outline each tool using tables, to show useful information such as advantages, disadvantages, scalability, cost, and other characteristics. Additionally, we implement decision trees for each category of tools, in an attempt to assist in navigating the large amount of information presented in this paper. Our objective is to provide a multifaceted taxonomy and analysis of mitigation tools, which will support companies in their endeavor to protect their computer networks. Our contribution can also help companies to have some type of cyber threat intelligence so as to put themselves one step ahead of cyber criminals.
APA, Harvard, Vancouver, ISO, and other styles
24

Arcuri, Maria Cristina, Lorenzo Gai, Federica Ielasi, and Elisabetta Ventisette. "Cyber attacks on hospitality sector: stock market reaction." Journal of Hospitality and Tourism Technology 11, no. 2 (June 25, 2020): 277–90. http://dx.doi.org/10.1108/jhtt-05-2019-0080.

Full text
Abstract:
Purpose The paper aims to analyze the impact of cyber attacks on stock returns of companies operating in the hospitality sector. The fast development of information and communication technologies has been posited as both an opportunity and a challenge to the United Nations Global Sustainable Development Goals. Digital technologies are significant tools for sustainable development, but if they are not addressed appropriately, they can potentially hinder the progress toward sustainability. Among negative impacts, it is necessary to consider cyber risk, a major concern today, in particular for industries which work with sensitive data, such as tourism businesses. Hospitality businesses have to adequately manage cyber insecurity and digital privacy issues, to prevent losses and contribute to socioeconomic sustainable growth. Design/methodology/approach Using event-study methodology, the paper provides empirical evidence on the effect of announcements of 170 information security breaches on the market value of firms operating in the hospitality sector in the past five years. Findings The study focuses on identifying potential threats of cyber attacks for the economic value of listed companies. The authors find that negative market returns occur following announcements of cyber attacks suffered by hospitality companies. Adequate investments in technology for cyber security and staff training are relevant in the hospitality sector to reduce cyber risk. Originality/value The paper contributes to identifying potential threats of cyber attacks for the economic value of listed companies operating in the hospitality sector. The analysis is carried out by collecting an original sample of global cyber attacks from newspaper announcements sourced from the LexisNexis database.
APA, Harvard, Vancouver, ISO, and other styles
25

Dzomira, Shewangu. "Electronic fraud (cyber fraud) risk in the banking industry Zimbabwe." Risk Governance and Control: Financial Markets and Institutions 4, no. 2 (2014): 17–27. http://dx.doi.org/10.22495/rgcv4i2art2.

Full text
Abstract:
The paper explores forms of electronic fraud which are being perpetrated in the banking industry and the challenges being faced in an attempt to combat the risk. The paper is based on a descriptive study which studied the cyber fraud phenomenon using content analysis. To obtain the data questionnaires and interviews were administered to the selected informants from 22 banks. Convenience and judgemental sampling techniques were used. It was found out that most of the cited types of electronic fraud are perpetrated across the banking industry. Challenges like lack of resources (detection tools and technologies), inadequate cyber-crime laws and lack of knowledge through education and awareness were noted. It is recommended that the issue of cyber security should be addressed involving all the stakeholders so that technological systems are safeguarded from cyber-attacks.
APA, Harvard, Vancouver, ISO, and other styles
26

Moskovchenko, Valeriy, Mikhail Gudkov, and Oleg Lauta. "Robotechnical System for Analyzing Cyber-Security of Information Communication Systems and Networks." NBI Technologies, no. 2 (February 2018): 30–38. http://dx.doi.org/10.15688/nbit.jvolsu.2018.2.5.

Full text
Abstract:
The paper deals with the various aspects of cybernetic confrontation. The authors substantiate the urgency of creating a proactive protection management system and propose hardware and software solutions based on the development of a mobile robotic system. The paper describes the system designed to audit the stability of the network infrastructure to existing and prospective cyber threats, to its architecture and functionality. Cyber warfare marks a new level of armed confrontation. An urgent requirement of the time, taking into account the robotization of weapons and military equipment, is the revision of the principles of building automated control systems, information systems and communication networks from the viewpoint of ensuring cybersecurity. The co-evolution of the cybersecurity system should provide: the detection of new, previously unknown cyber threats (cyber attacks) during the monitoring (exploration) of cyberspace; the automatic selection of the parameters of the functioning of information systems and communication networks under the conditions of destructive effects without deterioration of their main characteristics (cognitive platforms for building information and telecommunication networks). Intelligence in cyberspace requires digital penetration into the network and control systems of a potential enemy and involves the use of completely new sources, forms and methods of data and information collection, development of new intelligence tools and technologies, tactical and technical techniques. Thus, the system of cyber security should be provided for the possibility of pre-emptive hardware and software effects (pre-emptive attacks) and active attacks on information systems and resources of the opposing side, as well as the ability to misinformation by the opposing side of the true properties and parameters of information systems and communication networks.
APA, Harvard, Vancouver, ISO, and other styles
27

Houston Jr., Clemith J., and Douglas C. Sicker. "Maturity and Process Capability Models and Their Use in Measuring Resilience in Critical Infrastructure Protection Sectors." International Journal of Strategic Information Technology and Applications 5, no. 2 (April 2014): 44–63. http://dx.doi.org/10.4018/ijsita.2014040104.

Full text
Abstract:
This paper provides a literature review and survey of maturity and process capability models, Critical Infrastructure Protection (CIP) tools and frameworks to identify strategies for assessing and measuring resilience and risk management capabilities, with a specific focus on the electricity generating sector. The focus is on the use of models such as CERT-RMM, and others, as a means of addressing challenges associated with cyber security and risk management. Foundational concepts, terminology and definitions are provided; examples of maturity and process capability models are presented and discussed, tools that enable process capability and resilience are identified, including those specific to the electricity generating sector. The evolution of models and how they have addressed challenges is presented, in addition to the characteristics and differences of models and the growth in domains where they can be used. The benefits of the application of process capability and maturity models in maintaining and enhancing resilience and cyber security protection is supported in this paper and recommendations for research opportunities that may yield further insight and measurement capabilities are offered.
APA, Harvard, Vancouver, ISO, and other styles
28

Szczepankiewicz, Elżbieta. "Management of accounting information resources security in Polish entities – study results." Zeszyty Teoretyczne Rachunkowości 2018, no. 97 (153) (May 10, 2018): 115–39. http://dx.doi.org/10.5604/01.3001.0012.0379.

Full text
Abstract:
The presence of contemporary entities in the cyber-space shows that IT offers unlimited possibilities of running a business and developing an organisation. On the other hand, it involves a greater number of internal and external threats in the area of accounting information resources security. The objective of the paper is to diagnose the current level of accounting information resources security (AIRS) assurance in Polish business entities. The paper analyses two research hypotheses. In accordance with the first one, the AIRS assurance level in various entity groups may be different, even though all entities should have implemented the same requirements of the Accounting Act in the analyzed area. The identified differences may result from the effect of additional, industry-specific regulations. The other hypothesis claims that in the private business area, accounting and auditing companies adhere to AIRS regulations more strictly than other small and medium enterprises. The paper defines the fundamental factors affecting the functioning of corporate accounting systems in the three dimensions of the cyber-space. Subsequently, the author presents the results of empirical research on how corporate information security is ensured in the context of internal accounting control systems and the requirements of the Polish Accounting Act. The results of the empirical research show how the management of the analysed entities crafts the basic elements of their internal environment as well as internal communication and control processes connected with ensuring information resources security. The results also show the management’s approach to various aspects of risk management of accounting information resources security, as well as to adherence to organisational and administrative procedures, and to hardware and software safeguards in the IT environment of the accounting system. The issues analysed in the present paper open a scholarly discussion that should lead to the development of theoretical models, recommendation of efficient methods and tools, as well as indication of adequate legislative initiatives. Research methods used by the author include analysis of literature and legislation, analysis of survey results, deduction and inference.
APA, Harvard, Vancouver, ISO, and other styles
29

Koloveas, Paris, Thanasis Chantzios, Sofia Alevizopoulou, Spiros Skiadopoulos , and Christos Tryfonopoulos . "inTIME: A Machine Learning-Based Framework for Gathering and Leveraging Web Data to Cyber-Threat Intelligence." Electronics 10, no. 7 (March 30, 2021): 818. http://dx.doi.org/10.3390/electronics10070818.

Full text
Abstract:
In today’s world, technology has become deep-rooted and more accessible than ever over a plethora of different devices and platforms, ranging from company servers and commodity PCs to mobile phones and wearables, interconnecting a wide range of stakeholders such as households, organizations and critical infrastructures. The sheer volume and variety of the different operating systems, the device particularities, the various usage domains and the accessibility-ready nature of the platforms creates a vast and complex threat landscape that is difficult to contain. Staying on top of these evolving cyber-threats has become an increasingly difficult task that presently relies heavily on collecting and utilising cyber-threat intelligence before an attack (or at least shortly after, to minimize the damage) and entails the collection, analysis, leveraging and sharing of huge volumes of data. In this work, we put forward inTIME, a machine learning-based integrated framework that provides an holistic view in the cyber-threat intelligence process and allows security analysts to easily identify, collect, analyse, extract, integrate, and share cyber-threat intelligence from a wide variety of online sources including clear/deep/dark web sites, forums and marketplaces, popular social networks, trusted structured sources (e.g., known security databases), or other datastore types (e.g., pastebins). inTIME is a zero-administration, open-source, integrated framework that enables security analysts and security stakeholders to (i) easily deploy a wide variety of data acquisition services (such as focused web crawlers, site scrapers, domain downloaders, social media monitors), (ii) automatically rank the collected content according to its potential to contain useful intelligence, (iii) identify and extract cyber-threat intelligence and security artifacts via automated natural language understanding processes, (iv) leverage the identified intelligence to actionable items by semi-automatic entity disambiguation, linkage and correlation, and (v) manage, share or collaborate on the stored intelligence via open standards and intuitive tools. To the best of our knowledge, this is the first solution in the literature to provide an end-to-end cyber-threat intelligence management platform that is able to support the complete threat lifecycle via an integrated, simple-to-use, yet extensible framework.
APA, Harvard, Vancouver, ISO, and other styles
30

Chen, Chia-Mei, Zheng-Xun Cai, and Dan-Wei (Marian) Wen. "Designing and Evaluating an Automatic Forensic Model for Fast Response of Cross-Border E-Commerce Security Incidents." Journal of Global Information Management 30, no. 2 (July 2022): 1–19. http://dx.doi.org/10.4018/jgim.20220301.oa5.

Full text
Abstract:
The rapid development of cross-border e-commerce over the past decade has accelerated the integration of the global economy. At the same time, cross-border e-commerce has increased the prevalence of cybercrime, and the future success of e-commerce depends on enhanced online privacy and security. However, investigating security incidents is time- and cost-intensive as identifying telltale anomalies and the source of attacks requires the use of multiple forensic tools and technologies and security domain knowledge. Prompt responses to cyber-attacks are important to reduce damage and loss and to improve the security of cross-border e-commerce. This article proposes a digital forensic model for first incident responders to identify suspicious system behaviors. A prototype system is developed and evaluated by incident response handlers. The model and system are proven to help reduce time and effort in investigating cyberattacks. The proposed model is expected to enhance security incident handling efficiency for cross-border e-commerce.
APA, Harvard, Vancouver, ISO, and other styles
31

Hatalis, Kostas, Chengbo Zhao, Parv Venkitasubramaniam, Larry Snyder, Shalinee Kishore, and Rick S. Blum. "Modeling and Detection of Future Cyber-Enabled DSM Data Attacks." Energies 13, no. 17 (August 21, 2020): 4331. http://dx.doi.org/10.3390/en13174331.

Full text
Abstract:
Demand-Side Management (DSM) is an essential tool to ensure power system reliability and stability. In future smart grids, certain portions of a customer’s load usage could be under the automatic control of a cyber-enabled DSM program, which selectively schedules loads as a function of electricity prices to improve power balance and grid stability. In this scenario, the security of DSM cyberinfrastructure will be critical as advanced metering infrastructure and communication systems are susceptible to cyber-attacks. Such attacks, in the form of false data injections, can manipulate customer load profiles and cause metering chaos and energy losses in the grid. The feedback mechanism between load management on the consumer side and dynamic price schemes employed by independent system operators can further exacerbate attacks. To study how this feedback mechanism may worsen attacks in future cyber-enabled DSM programs, we propose a novel mathematical framework for (i) modeling the nonlinear relationship between load management and real-time pricing, (ii) simulating residential load data and prices, (iii) creating cyber-attacks, and (iv) detecting said attacks. In this framework, we first develop time-series forecasts to model load demand and use them as inputs to an elasticity model for the price-demand relationship in the DSM loop. This work then investigates the behavior of such a feedback loop under intentional cyber-attacks. We simulate and examine load-price data under different DSM-participation levels with three types of random additive attacks: ramp, sudden, and point attacks. We conduct two investigations for the detection of DSM attacks. The first studies a supervised learning approach, with various classification models, and the second studies the performance of parametric and nonparametric change point detectors. Results conclude that higher amounts of DSM participation can exacerbate ramp and sudden attacks leading to better detection of such attacks, especially with supervised learning classifiers. We also find that nonparametric detection outperforms parametric for smaller user pools, and random point attacks are the hardest to detect with any method.
APA, Harvard, Vancouver, ISO, and other styles
32

Wang, Yu Fei, Tao Zhang, Yuan Yuan Ma, and Bo Zhang. "An Information Security Assessments Framework for Power Control Systems." Advanced Materials Research 805-806 (September 2013): 980–84. http://dx.doi.org/10.4028/www.scientific.net/amr.805-806.980.

Full text
Abstract:
Information and cyber security of Industrial Control Systems (ICS) faces severe challenges and has gained considerable importance. Information security assessment is an essential component of information security assurance infrastructure mechanisms. First, a hierarchical model of smart grid was abstracted. Based on the proposed model and the information security risks and information security protection demands of power control systems, an information security assessments framework for power control systems was proposed in dimensions of system layers and life cycle to guide the security assessment contents of power control systems. Finally, a test bed function design for power control system security assessment was proposed. The power control system security test bed may include four parts, such as power control system security assessment management platform, power control system simulation environment, security assessment tools, and security policy. The proposed security assessment framework and test bed functional design can be used to guide the electric power utilities in their power control system information security efforts.
APA, Harvard, Vancouver, ISO, and other styles
33

Chaula, Job Asheri, and Godfrey Weston Luwemba. "Security Control Assessment of Supervisory Control and Data Acquisition for Power Utilities in Tanzania." European Journal of Engineering Research and Science 5, no. 7 (July 13, 2020): 785–89. http://dx.doi.org/10.24018/ejers.2020.5.7.1429.

Full text
Abstract:
The primary purpose of this research was to assess the adequacy and effectiveness of security control of the Supervisory Control and Data Acquisition (SCADA) communication network used by infrastructure companies. Initially, the SCADA networks were physically separated from other networks connected to the internet and hence assumed secure. However, the modern SCADA are now integrated with other network resulting in new security vulnerabilities and attacks similar to those found in traditional IT. Thus, it is important to reassess the security controls of the SCADA because it is operated in an open network environment. In this research, a case of the SCADA security controls in the power sector in Tanzania was assessed, whereby a specific SCADA implementation was studied. The data were gathered using observation, testing, interviews, questionnaire and documentation reviews. The results were analyzed using the Cyber Security Evaluation Tool (CSET) and checked for compliance based on the National Institute of Standards and Technology (NIST) and North America Electric Reliability Corporation (NERC) standards. The findings have shown that there exist security vulnerabilities both in security compliance of the standard and component-based vulnerabilities. Additionally, there is inadequate of audit and accountability, personnel security and system and information integrity. Also, for the component-based security compliance, the finding shows that identification and authentication, security management and audit and accountability. On the basis of the results, the research has indicated the areas that require immediate action in order to protect the critical infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
34

Таха Насіф, Нух. "Using statistical traffic analysis to calculate the confidential means of information transmission." Наука і техніка Повітряних Сил Збройних Сил України, no. 1(42,) (January 21, 2021): 118–25. http://dx.doi.org/10.30748/nitps.2021.42.15.

Full text
Abstract:
The article considers the modeling of security problems in the Internet as stochastic systems. This allows you to find flaws in existing security systems and offer new solutions. Studying the vulnerabilities of existing security tools can prevent cyber-attacks from taking advantage of weak systems. New, flexible and adaptive security schemes are necessary for emerging security threats elimination. A hybrid network security scheme, including intrusion detection systems and baits, scattered throughout the network is proposed. This combines the advantages of two security technologies. Honeypot is an activity-based network security system that can be a logical addition to the passive detection policies used by the IDS. This integration forces us to balance the safety indicators compared to costs, planning the operation of the device for the proposed system. Formulation of planning problems as a decentralized partially observable Markov decision-making process (DEC-POMDP) allows to make decisions in a distributed manner on each device without the need of centralized management.
APA, Harvard, Vancouver, ISO, and other styles
35

Ray, Argha, and Anjali Kaushik. "State transgression on electronic expression: is it for real?" Information & Computer Security 25, no. 4 (October 9, 2017): 382–401. http://dx.doi.org/10.1108/ics-03-2016-0024.

Full text
Abstract:
Purpose Cyberspace is a virtual environment where instantaneous communications are initiated and consumed using computer networks without any natural or artificial boundaries. These communications are not only an exchange of information but also a catharsis on the socio-political environment of the real world. This explosion of electronic expression is often detrimental to the traditional secretive maneuvers of nation states and the exercise of its power. Unable to come to terms with the new reality nation states through legislative action or otherwise attempt to assert its sovereignty in the space that has no political and societal boundaries. This may lead to an encroachment on basic human rights that often have constitutional guarantees in the real world but may be violated in the online milieu. This paper aims to investigate this issue in detail and evaluate whether nation states are using cyber-security as a propaganda tool to transgress on electronic expression. Design/methodology/approach The Website of the UN Office of the High Commissioner for Human Rights states “In December 2013, the United Nations General Assembly adopted resolution 68/167, which expresses deep concern at the negative impact that surveillance and interception of communications may have on human rights”. It further says “The General Assembly called on all States to review their procedures, practices and legislation related to communications surveillance, interception and collection of personal data and emphasized the need for States to ensure the full and effective implementation of their obligations under international human rights law”. With this development, this paper seeks to unravel the role of nation states in using cybersecurity as a propaganda tool by raising the specter of threat to national security and economic wellbeing. The paper is based on exploratory research with data compilation from secondary sources. To collect data, various research papers, books and journals have been referenced and data available in public domain has been accumulated. Findings This paper has tried to unravel state action on cyberspace which often runs counter to the concept of civil liberties. It indicates that in terms of both national security and economic impact, cybercrime represent a very nominal threat vector. Also, cybercrime as compared with other forms of crime is again nominal. Finally, cyber laws and policies of different countries need to be more nuanced such as to allow space for civil liberties. Overall, the propaganda surrounding the malaise of cybercrime seems to be more hype than real. We already have examples of countries who have transgressed into electronic expression in cyber space. Therefore, UN has a valid reason to raise a red flag on this unfolding issue. Originality/value This paper was published at 21st Americas Conference of Information Systems held at Puerto Rico, USA, between August 13-15, 2015 (AMCIS, 2015). The authors of this paper seek review by Editors of the Journal for Republication of original work. The authors have taken cognizance of the Originality Guidelines for Emerald published at this URL www.emeraldgrouppublishing.com/authors/writing/originality.htm
APA, Harvard, Vancouver, ISO, and other styles
36

Li, Chengcheng. "Penetration Testing Curriculum Development in Practice." Journal of Information Technology Education: Innovations in Practice 14 (2015): 085–99. http://dx.doi.org/10.28945/2189.

Full text
Abstract:
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity professionals nationwide throughout the next decade. To fill this job shortage we need a workforce with strong hands-on experience in the latest technologies and software tools to catch up with the rapid evolution of network technologies. It is vital that the IT professionals possess up-to-date technical skills and think and act one step ahead of the cyber criminals who are constantly probing and exploring system vulnerabilities. There is no perfect security mechanism that can defeat all the cyber-attacks; the traditional defensive security mechanism will eventually fail to the pervasive zero-day attacks. However, there are steps to follow to reduce an organization’s vulnerability to cyber-attacks and to mitigate damages. Active security tests of the network from a cyber-criminal’s perspective can identify system vulnerabilities that may lead to future breaches. “If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. But if you know the enemy and know yourself, you need not fear the result of hundred battles” (Sun, 2013). Penetration testing is a discipline within cybersecurity that focuses on identifying and exploiting the vulnerabilities of a network, eventually obtaining access to the critical business information. The pentesters, the security professionals who perform penetration testing, or ethical hackers, break the triad of information security - Confidentiality, Integrity, and Accountability (CIA) - as if they were a cyber-criminal. The purpose of ethical hacking or penetration testing is to know what the “enemy” can do and then generate a report for the management team to aid in strengthening the system, never to cause any real damages. This paper introduces the development of a penetration testing curriculum as a core class in an undergraduate cybersecurity track in Information Technology. The teaching modules are developed based on the professional penetration testing life cycle. The concepts taught in the class are enforced by hands-on lab exercises. This paper also shares the resources that are available to institutions looking for teaching materials and grant opportunities to support efforts when creating a similar curriculum in cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
37

Ch, Rupa, Thippa Reddy Gadekallu, Mustufa Haider Abidi, and Abdulrahman Al-Ahmari. "Computational System to Classify Cyber Crime Offenses using Machine Learning." Sustainability 12, no. 10 (May 16, 2020): 4087. http://dx.doi.org/10.3390/su12104087.

Full text
Abstract:
Particularly in the last decade, Internet usage has been growing rapidly. However, as the Internet becomes a part of the day to day activities, cybercrime is also on the rise. Cybercrime will cost nearly $6 trillion per annum by 2021 as per the cybersecurity ventures report in 2020. For illegal activities, cybercriminals utilize any network computing devices as a primary means of communication with a victims’ devices, so attackers get profit in terms of finance, publicity and others by exploiting the vulnerabilities over the system. Cybercrimes are steadily increasing daily. Evaluating cybercrime attacks and providing protective measures by manual methods using existing technical approaches and also investigations has often failed to control cybercrime attacks. Existing literature in the area of cybercrime offenses suffers from a lack of a computation methods to predict cybercrime, especially on unstructured data. Therefore, this study proposes a flexible computational tool using machine learning techniques to analyze cybercrimes rate at a state wise in a country that helps to classify cybercrimes. Security analytics with the association of data analytic approaches help us for analyzing and classifying offenses from India-based integrated data that may be either structured or unstructured. The main strength of this work is testing analysis reports, which classify the offenses accurately with 99 percent accuracy.
APA, Harvard, Vancouver, ISO, and other styles
38

Oriola, Oluwafemi, Adesesan Barnabas Adeyemo, Maria Papadaki, and Eduan Kotzé. "A collaborative approach for national cybersecurity incident management." Information & Computer Security 29, no. 3 (June 28, 2021): 457–84. http://dx.doi.org/10.1108/ics-02-2020-0027.

Full text
Abstract:
Purpose Collaborative-based national cybersecurity incident management benefits from the huge size of incident information, large-scale information security devices and aggregation of security skills. However, no existing collaborative approach has been able to cater for multiple regulators, divergent incident views and incident reputation trust issues that national cybersecurity incident management presents. This paper aims to propose a collaborative approach to handle these issues cost-effectively. Design/methodology/approach A collaborative-based national cybersecurity incident management architecture based on ITU-T X.1056 security incident management framework is proposed. It is composed of the cooperative regulatory unit with cooperative and third-party management strategies and an execution unit, with incident handling and response strategies. Novel collaborative incident prioritization and mitigation planning models that are fit for incident handling in national cybersecurity incident management are proposed. Findings Use case depicting how the collaborative-based national cybersecurity incident management would function within a typical information and communication technology ecosystem is illustrated. The proposed collaborative approach is evaluated based on the performances of an experimental cyber-incident management system against two multistage attack scenarios. The results show that the proposed approach is more reliable compared to the existing ones based on descriptive statistics. Originality/value The approach produces better incident impact scores and rankings than standard tools. The approach reduces the total response costs by 8.33% and false positive rate by 97.20% for the first attack scenario, while it reduces the total response costs by 26.67% and false positive rate by 78.83% for the second attack scenario.
APA, Harvard, Vancouver, ISO, and other styles
39

Arutyunov, Valery V. "SCIENTOMETRIC INDICATORS FOR LEADERS IN THE SCIENTIFIC RESEARCH OF THE INFORMATION SECURITY." RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, no. 2 (2020): 46–56. http://dx.doi.org/10.28995/2686-679x-2020-2-46-56.

Full text
Abstract:
Following the scientometric indicators of scientific activity (publication activity, citation index and Hirsch index) in the information security in the current decade the areas of research and also Russian scientistsleaders, whose results of scientific activities are in high demand have been identified. Those areas include the application of methodological analysis in security research, methods for assessing inconsistencies in the data protection tools, the ways to improve the LTE network stability against destructive cyber-attacks, early warning systems for computer attacks, the use of big data technologies in the information security field etc. The author notes some specifics in the dynamics of the Russian scientists’ publication activity in 2012 – 2019 as well as citation and relevance of their scientific activities results. The analysis was carried out using the RSCI database (Russian science citation index). Further development of the information flow research analysis in the field of information security using the RSCI database will allow identifying Russian organizations and leading scientists in the main modern information protection areas: Intrusion Detection Systems (IDS systems); identification and authentication of access subjects, including using modern biometric methods and security tools; confidential Data Leakage Prevention systems (DLP systems; cryptographic information protection (including in the field of quantum cryptography); information security management systems.
APA, Harvard, Vancouver, ISO, and other styles
40

Roy, Yanina, Olena Riabchun, and Valeriy Yermoshin. "MATURITY MODEL OF CYBER SECURITY SYSTEM OPPORTUNITIES AT CRITICAL INFRASTRUCTURE FACILITIES OF THE ES-C2M2 ENERGY SECTOR." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 67–74. http://dx.doi.org/10.28925/2663-4023.2020.10.6774.

Full text
Abstract:
Currently, a large set of IS maturity assessment models based on similar principles is available for both commercial and government organizations and institutions. At the same time, the actual use of such models is quite limited, primarily due to the weak attachment to the characteristics of specific organizations. This problem is partially solved by adapting existing approaches in the form of industry models (for example, ES-C2M2 for companies in the energy sector, ONG-C2M2 for companies in the oil and gas sector). Moreover, the emergence of a new model is very likely, which includes not only qualitative analysis through a set of characteristics / domains, but also a quantitative assessment of cybersecurity, which will use the assessment for both strategic and operational planning, as well as create an advanced expert analytical system . The best solution today is to start implementing any of the existing evaluation models with further adaptation and expansion for your own needs. Similar principles of model building will allow in the future to migrate painlessly to a more appropriate, while the experience gained in the assessment, as well as statistics will judge the progress of IS processes in the enterprise, and, importantly, in a convenient and understandable for senior management. The ES-C2M2 Cyber ​​Security Maturity Model can significantly help energy sector organizations to assess and improve their cybersecurity areas. The ES-C2M2 Capability Maturity Model is part of the DOE Cybersecurity Capability Maturity Program (C2M2) and was developed to address the unique characteristics of the energy subsector. The opportunity maturity model is a tool for self-assessment to measure and improve their cybersecurity areas. International standards and practices in the field of information security recommend that organizations when planning IS activities to assess the current state of IS and set a target for the near future, the achievement of which will allow the company to effectively address existing threats and respond to new challenges and threats of IS.
APA, Harvard, Vancouver, ISO, and other styles
41

Boschee, Pam. "Comments: Complexity of Cyber Crime Skyrockets." Journal of Petroleum Technology 73, no. 06 (June 1, 2021): 8. http://dx.doi.org/10.2118/0621-0008-jpt.

Full text
Abstract:
The cyberattack on the Colonial Pipeline system was impossible to “keep on the lowdown” as industrial attacks of limited scale often are. The shutdown of a 2.5 million B/D system of 5,500 miles of pipeline spanning from the US Gulf Coast to the East Coast does not go unnoticed. And early unconfirmed reports of a ransom payment made to decrypt the seized data intensified the spotlight on the incident. (Continental CEO Joseph Blount confirmed a $4.4-million payment on 19 May.) During what surely was a crisis management nightmare involving not only Colonial but also the US Department of Energy, Department of Transportation, Federal Bureau of Investigation (FBI), Federal Energy Regulatory Commission, Department of Homeland Security (DHS), and the Pipeline and Hazardous Materials Safety Administration (all agencies thanked by Colonial in a 15 May tweet), the information made public has heightened concerns about the security of data and critical infrastructure globally. Foremost is the escalation in the multiple layers of bad actors involved in a single attack. The FBI identified the ransomware-as-a-service (RaaS) DarkSide, which it has been investigating since October 2020. Criminal partners conduct attacks and then share the proceeds with the ransomware developers. The agency released a flash alert about DarkSide on 10 May with indicators of compromise and mitigation measures once infected. “Mitigation measures once infected.” The alert may have come too late for Colonial, whose business network was hit rather than its operational technology (OT) networks that control the pipeline. To contain the damage, it took down its own OT network. An example supporting this action of last resort occurred last year when a ransomware attack on an unidentified natural gas company’s business networks moved into its control systems at a compression facility, halting operations for 2 days, according to a DHS alert. DHS said the company did not have a plan to respond to a cyberattack. A report by FireEye, a cybersecurity firm that confirmed its hiring by Colonial, said since initially surfacing in August 2020, the creators of DarkSide and its partners have infiltrated organizations in more than 15 countries. Affiliates retain a portion of each ransom fee, ranging from 25% for fees less than $500,000 to 10% for fees greater than $5 million. Ransomware operators are masters in extortion and are using new tactics to widen their net of exploitation. In April, the DarkSide operators said in a press release that they were targeting organizations listed on the NASDAQ and other stock markets and were willing to give stock traders advance notice of upcoming attacks to allow them to reap profits when stock prices dropped as a result of the breach, according to FireEye. In another example, an attacker obtained the victim’s cyber insurance policy’s coverage limits and used that knowledge during ransom negotiation, refusing to lower the ransom fee. What this means for organizations is that their boards should assess the full spectrum of risk from prevention to detection as a business risk and have a plan in place to execute when an attack occurs. The investment required may be far less than the increasingly exorbitant ransom fees and the costs associated with the theft or destruction of data and disruption to the business.
APA, Harvard, Vancouver, ISO, and other styles
42

Ukwandu, Elochukwu, Mohamed Amine Ben Farah, Hanan Hindy, David Brosset, Dimitris Kavallieros, Robert Atkinson, Christos Tachtatzis, Miroslav Bures, Ivan Andonovic, and Xavier Bellekens. "A Review of Cyber-Ranges and Test-Beds: Current and Future Trends." Sensors 20, no. 24 (December 13, 2020): 7148. http://dx.doi.org/10.3390/s20247148.

Full text
Abstract:
Cyber situational awareness has been proven to be of value in forming a comprehensive understanding of threats and vulnerabilities within organisations, as the degree of exposure is governed by the prevailing levels of cyber-hygiene and established processes. A more accurate assessment of the security provision informs on the most vulnerable environments that necessitate more diligent management. The rapid proliferation in the automation of cyber-attacks is reducing the gap between information and operational technologies and the need to review the current levels of robustness against new sophisticated cyber-attacks, trends, technologies and mitigation countermeasures has become pressing. A deeper characterisation is also the basis with which to predict future vulnerabilities in turn guiding the most appropriate deployment technologies. Thus, refreshing established practices and the scope of the training to support the decision making of users and operators. The foundation of the training provision is the use of Cyber-Ranges (CRs) and Test-Beds (TBs), platforms/tools that help inculcate a deeper understanding of the evolution of an attack and the methodology to deploy the most impactful countermeasures to arrest breaches. In this paper, an evaluation of documented CRs and TBs platforms is evaluated. CRs and TBs are segmented by type, technology, threat scenarios, applications and the scope of attainable training. To enrich the analysis of documented CRs and TBs research and cap the study, a taxonomy is developed to provide a broader comprehension of the future of CRs and TBs. The taxonomy elaborates on the CRs/TBs dimensions, as well as, highlighting a diminishing differentiation between application areas.
APA, Harvard, Vancouver, ISO, and other styles
43

Volovici, Rodica-Maria, Elena Mărginean, and Ioan-Irinel Vişa. "Digital Risks. Case Study on Digitization Projects of the LBUS Library." International Journal of Advanced Statistics and IT&C for Economics and Life Sciences 9, no. 1 (June 1, 2019): 23–30. http://dx.doi.org/10.2478/ijasitels-2019-0003.

Full text
Abstract:
AbstractDigital technologies changed all the social life domains in society, as we are now living in the digital era, in the information society or in an interconnected world. Besides the improvements in every day life, digital changes also brought inherent risks, from cyber-security, hacking, cyber-bullying, to the vulnerability of personal data, or the mental health consequences of information explosion.This article reviews the risks of the changes brought by the digital transformation on libraries in general, with examples of the LBUS Library, drawing from the last 10 years of development experience of informatic book management systems (electronic catalogue) and of the digital library system. A group of library experts took part in local cultural projects promoting the city of Sibiu, as well as in four major European projects focusing on “Europeana”, and developing highly valuable cultural, historical, and scientific digital collections. As relatively new and highly complex technical activities comprising a high volume of new information, the management of these projects also posed risks related to decision-making and to choosing the best solutions to ensure their success. We have identified and highlighted the major risks.
APA, Harvard, Vancouver, ISO, and other styles
44

Papamartzivanos, Dimitrios, Sofia Anna Menesidou, Panagiotis Gouvas, and Thanassis Giannetsos. "A Perfect Match: Converging and Automating Privacy and Security Impact Assessment On-the-Fly." Future Internet 13, no. 2 (January 27, 2021): 30. http://dx.doi.org/10.3390/fi13020030.

Full text
Abstract:
As the upsurge of information and communication technologies has become the foundation of all modern application domains, fueled by the unprecedented amount of data being processed and exchanged, besides security concerns, there are also pressing privacy considerations that come into play. Compounding this issue, there is currently a documented gap between the cybersecurity and privacy risk assessment (RA) avenues, which are treated as distinct management processes and capitalise on rather rigid and make-like approaches. In this paper, we aim to combine the best of both worlds by proposing the APSIA (Automated Privacy and Security Impact Assessment) methodology, which stands for Automated Privacy and Security Impact Assessment. APSIA is powered by the use of interdependency graph models and data processing flows used to create a digital reflection of the cyber-physical environment of an organisation. Along with this model, we present a novel and extensible privacy risk scoring system for quantifying the privacy impact triggered by the identified vulnerabilities of the ICT infrastructure of an organisation. We provide a prototype implementation and demonstrate its applicability and efficacy through a specific case study in the context of a heavily regulated sector (i.e., assistive healthcare domain) where strict security and privacy considerations are not only expected but mandated so as to better showcase the beneficial characteristics of APSIA. Our approach can complement any existing security-based RA tool and provide the means to conduct an enhanced, dynamic and generic assessment as an integral part of an iterative and unified risk assessment process on-the-fly. Based on our findings, we posit open issues and challenges, and discuss possible ways to address them, so that such holistic security and privacy mechanisms can reach their full potential towards solving this conundrum.
APA, Harvard, Vancouver, ISO, and other styles
45

Ram, Jiwat, and Zeyang Zhang. "Belt and road initiative (BRI) supply chain risks: propositions and model development." International Journal of Logistics Management 31, no. 4 (September 8, 2020): 777–99. http://dx.doi.org/10.1108/ijlm-12-2019-0366.

Full text
Abstract:
PurposeBelt and road initiative (BRI) is a transcontinental endeavor strategically connecting supply chains (SCs) and economic infrastructures to ignite business activities and achieve trade benefits. However, the rising global SC failure costs and risks associated with this initiative (owing to unique geopolitical, economic and mega-connectivity involving over 70 countries) necessitate examining BRI SC risks. Yet, research on the subject remains limited, and the purpose of this paper is to address this gap in knowledge.Design/methodology/approachA two-pronged approach was taken. First, a data sample of 554 articles was analyzed and 178 articles found relevant were used to present a systematic, structured framework of risk factors along operational, economic, financial, social and security dimensions. Then informed by the theory of risk management and supplemented by literature evidence, we have built a BRI SC risk model.FindingsThe results presented through the model show that BRI SCs face a combination of risks triggered by operational processes, informational and environmental (PIE) deficiencies. Findings show that lack of risk and liability management, unbalanced risk-sharing partnerships, lack of transparency, inadequate project evaluation, incompatible corporate governance structures and cyber security all pose threats to BRI SCs specifically and SCs in general.Research limitations/implicationsAcademically, the results facilitate theory development by identifying and proposing seven risk factors and modeling relationship among them and BRI SC risks outcome. The results also extend application of theory of risk management to SC context.Practical implicationsThe findings provide a decision-making tool for managers to assess risk factors in their SCs, thus enabling improved decision making to avoid, mitigate, transfer or accept risks.Originality/valueIdentifies and proposes a set of seven risk factors that drive BRI SC risks. Develops a model of BRI SC risks which help build theory of SC risk management.
APA, Harvard, Vancouver, ISO, and other styles
46

Alashi, Shahad A., and Hanaa A. Aldahawi. "Cybersecurity Management for Virtual Private Network (VPN) Applications: A Proposed Framework for the Governance of their Use in the Kingdom of Saudi Arabia." Journal of Information Security and Cybercrimes Research 3, no. 1 (December 20, 2020): 31–57. http://dx.doi.org/10.26735/vsdj4585.

Full text
Abstract:
By using the research process, this study addresses the attitudes of the members of Saudi society towards using Virtual Private Network (VPN) applications and the former’s perceptions of the latter’s concept, security, and privacy, in addition to monitoring their risks to cybersecurity. The main objective of the study is to present a proposed framework for the governance of the use of VPN applications in the Kingdom of Saudi Arabia to strengthen cybersecurity management. To achieve the objectives of the study, the researchers used two methods: the social survey method and the content analysis method. The researchers also relied on the questionnaire tool to collect information from the 455 individuals in the study sample. The study yielded a set of findings, the most important of which are as follows: The use of free VPN applications represents 91% of the sample of the study. Also, the study revealed confusion in perceptions of the actual concept of VPN applications, which may be common among users, and showed a diversity of attitudes and motives for using VPN applications, most of which are related to entertainment. Moreover, the study showed that the study sample individuals had some knowledge about the risks of VPN applications to cybersecurity, although most of them did not use cyber protection means. The study recommended the need to organize and manage the use of VPN applications, conduct an evaluation of VPN applications available on Saudi smartphone stores, and prohibit those which contain security vulnerabilities and malware. The study proposed a framework for the governance of the use of VPN applications in the Kingdom of Saudi Arabia, which comprised three dimensions: legal, organizational and awareness-based dimensions.
APA, Harvard, Vancouver, ISO, and other styles
47

Ryczyński, Jacek. "Human Factor as a Determinant of Reliability and Safety of Technical Systems." Journal of KONBiN 49, no. 3 (October 1, 2019): 195–220. http://dx.doi.org/10.2478/jok-2019-0056.

Full text
Abstract:
Abstract The article presents the analysis of the state of knowledge about the impact of the human factor on selected aspects of reliability of technical systems based on selected papers delivered at the ESREL 2018 conference, which took place on June 17-22, 2018 in Trondheim, Norway. In the first part, statistical analysis was carried out in the area of thematic and methodological conference papers. Next, the impact of the human factor on the correct functioning of selected technical systems was discussed, using conference papers on the role of man in ensuring an appropriate level of cyber security, the role of expert knowledge in risk assessment, and innovative risk management methods. In summary, challenges for scientists were identified and further research directions in the analysed area.
APA, Harvard, Vancouver, ISO, and other styles
48

Chen, Chih-Wei, Ching-Yi Lin, Chine-Hung Tung, Hsiung-Ming Liao, Jr-Jie Jang, Kun-Chi Lai, Meng-Ying Li, and Yin-Ling Huang. "Employing GIS towards shaping a smart and sustainable future: a brief policy survey of global and Taiwan’s efforts." Proceedings of the ICA 2 (July 10, 2019): 1–8. http://dx.doi.org/10.5194/ica-proc-2-16-2019.

Full text
Abstract:
<p><strong>Abstract.</strong> Since UN announced 17 SDGs in 2015, many countries around the world have been endeavouring to promote SDGs towards building a sustainable future. Given the disparity of the regional development, national government is suggested to establish localised sustainable vision. Drawing on UN SDGs with targets and corresponding indicators, meanwhile considering local circumstances and sustainable vision, government further seeks to establish localised SDGs with related targets and indicators. Meanwhile, under the digital era, digital technologies have been extensively employed as the smart tool in many fields nowadays, and Geographic Information System (GIS) has been developed as the platform to visualise the SDGs progress in UN and many countries. On the above basis, this paper further demonstrates Taiwan’s efforts to establish localised SDGs, and develop National Geographic Information System (NGIS) to implement the sustainable development in Taiwan, monitor the SDGs progress, and provide feedback to policymakers to further make strategic policies in a top-down approach, meanwhile develop Community Geographic Information System (CGIS) to encourage stakeholders and citizens to harness the concept of CGIS to proactively create and tell their own stories and promote Regional Revitalisation policy in a bottom-up approach. Moreover, GIS could not function well without appropriate data management including massive data and open data policy, well-built digital infrastructure, as well as the selected “right data” and cyber security. Hence, with appropriate data management, GIS as a smart tool could facilitate the promotion and implementation of SDGs in an intuitive manner towards shaping a smart and sustainable future.</p>
APA, Harvard, Vancouver, ISO, and other styles
49

Torres, Diamantino, Carina Pimentel, and Susana Duarte. "Shop floor management system in the context of smart manufacturing: a case study." International Journal of Lean Six Sigma 11, no. 5 (November 13, 2019): 837–62. http://dx.doi.org/10.1108/ijlss-12-2017-0151.

Full text
Abstract:
Purpose The purpose of this study intends to make a characterization of a shop floor management (SFM) system in the context of smart manufacturing, through smart technologies and digital shop floor (DSF) features. Design/methodology/approach To attain the paper objective, a mixed method methodology was used. In the first stage, a theoretical background was carried out, to provide a comprehensive understanding on SFM system in a smart manufacturing perspective. Next, a case study within a survey was developed. The case study was introduced to characterize a SFM system, while the survey was made to understand the level of influence of smart manufacturing technologies and of DSF features on SFM. In total, 17 experts responded to the survey. Findings Data analytics is the smart manufacturing technology that influences more the SFM system and its components and the cyber security technology does not influence it at all. The problem solving (PS) is the SFM component more influenced by the smart manufacturing technologies. Also, the use of real-time digital visualization tools is considered the most influential DSF feature for the SFM components and the data security protocols is the least influential one. The four SFM components more influenced by the DSF features are key performance indicator tracking, PS, work standardization and continuous improvement. Research limitations/implications The study was applied in one multinational company from the automotive sector. Originality/value To the best of the authors’ knowledge, this work is one of the first to try to characterize the SFM system on smart manufacturing considering smart technologies and DSF features.
APA, Harvard, Vancouver, ISO, and other styles
50

Заярна, Інна Сергіївна. "ZOOM AS A TOOL OF WEB BASED TEACHING OF FOREIGN LANGUAGES TO STUDENTS OF HIGHER EDUCATION ESTABLISHMENTS IN UKRAINE." Information Technologies and Learning Tools 83, no. 3 (June 25, 2021): 152–63. http://dx.doi.org/10.33407/itlt.v83i3.4234.

Full text
Abstract:
Due to the COVID-19 pandemic a strict quarantine was imposed from March to May of 2020. Ukrainian higher education faced new challenges caused by unexpected distance teaching and learning implemented in all higher educational establishments during the period in question. Despite the sound theoretical achievements of Ukrainian scientists in the field of distance education, as well as the existing legal framework for the implementation of distance learning in higher education, not all educational institutions had well-established learning management systems. All the above induced foreign languages teachers to search for available technologies which allow delivering their lectures effectively. One of the most popular services was video conferencing, in particular Zoom. The research deals with the specifics of teaching foreign languages in higher educational establishments on Zoom Platform via video conferencing. The research presents the results of the survey conducted among the teachers who used Zoom for teaching foreign languages during the quarantine from March to June in 2020. Based on the survey respondents’ answers, the author determines benefits and drawbacks of Zoom for teaching foreign languages in higher educational establishments, specifies the factors for psychological comfort, as well as the conditions and tools for the development of language skills and speech abilities. Special attention is paid to methodological recommendations aimed at practical implementation of foreign languages online teaching via Zoom video conferencing. The author considers such aspects of foreign languages teaching via Zoom video conferencing as cyber security, discipline issues, creation of psychologically comfortable atmosphere, and Zoom technical tools for teaching foreign language communication.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography