Journal articles on the topic 'Digital threats'

To see the other types of publications on this topic, follow the link: Digital threats.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Digital threats.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Irons, Alastair, and Jacques Ophoff. "Aspects of Digital Forensics in South Africa." Interdisciplinary Journal of Information, Knowledge, and Management 11 (2016): 273–83. http://dx.doi.org/10.28945/3576.

Full text
Abstract:
This paper explores the issues facing digital forensics in South Africa. It examines particular cyber threats and cyber threat levels for South Africa and the challenges in addressing the cybercrimes in the country through digital forensics. The paper paints a picture of the cybercrime threats facing South Africa and argues for the need to develop a skill base in digital forensics in order to counter the threats through detection of cybercrime, by analyzing cybercrime reports, consideration of current legislation, and an analysis of computer forensics course provision in South African universities. The paper argues that there is a need to develop digital forensics skills in South Africa through university programs, in addition to associated training courses. The intention in this paper is to promote debate and discussion in order to identify the cyber threats to South Africa and to encourage the development of a framework to counter the threats – through legislation, high tech law enforcement structures and protocols, digital forensics education, digital forensics skills development, and a public and business awareness of cybercrime threats.
APA, Harvard, Vancouver, ISO, and other styles
2

Arcos, Rubén, and Hanna Smith. "Digital Communication and Hybrid Threats." Revista ICONO14 Revista científica de Comunicación y Tecnologías emergentes 19, no. 1 (January 1, 2021): 1–14. http://dx.doi.org/10.7195/ri14.v19i1.1662.

Full text
Abstract:
La amenaza híbrida es un concepto que aparece en documentos oficiales y estrategias de seguridad de los estados. Tanto la UE como la OTAN han tomado medidas serias para contrarrestar la actividad relacionada con las amenazas híbridas. Este monográfico sobre comunicación digital y amenazas híbridas tiene como objetivo avanzar en la comprensión de cómo los actores de amenazas híbridas utilizan y pueden potencialmente explotar el entorno de la información para atacar las sociedades democráticas y los procesos de toma de decisiones en diferentes niveles, para diferentes propósitos. Las TIC han traído avances notables en la forma en que obtenemos información y construimos conciencia sobre el mundo y sus eventos e interactuamos con los demás, pero al mismo tiempo crean oportunidades para realizar operaciones e influenciar con una intención hostil. La guerra política, las medidas activas y las acciones encubiertas dirigidas por la comunicación no son nuevas, y la propaganda se ha utilizado a lo largo de la historia en situaciones de conflicto y guerra. Estas herramientas son empleadas por actores autoritarios hostiles y / o en una escala que ha interferido en procesos democráticos como las elecciones, erosiona la confianza en las instituciones, polariza y divide las sociedades de manera malsana. Dado que los seres humanos toman decisiones basadas en sus representaciones sobre el mundo y la información disponible a través de interacciones simbólicas interpersonales y a través de los diferentes medios, la información puede ser utilizada deliberadamente para actividades malignas que produzcan efectos cognitivos, afectivos y conductuales.
APA, Harvard, Vancouver, ISO, and other styles
3

Kareva, Yuliya Yr'evnaKashaeva, Aleksandrovna Victoriya, and Maksim Alekseevich Pendyuhov. "DIGITAL ECONOMY: THREATS AND PROSPECTS." Наука XXI века: актуальные направления развития, no. 1-1 (2021): 396–400. http://dx.doi.org/10.46554/sciencexxi-2021.02-1.1-pp.396.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fadeeva, Inna Avenirovna. "ECONOMIC THREATS TO DIGITAL SOVEREIGNTY." Journal of Applied Research 3, no. 11 (2022): 212–15. http://dx.doi.org/10.47576/2712-7516_2022_11_3_212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Khusainova, Ekaterina, Liliya Urazbahtina, Nina Serkina, Regina Salixova, and Zoya Shackih. "Threats to the economic security of a digital enterprise in the energy industry." E3S Web of Conferences 288 (2021): 01018. http://dx.doi.org/10.1051/e3sconf/202128801018.

Full text
Abstract:
The progressive development of regions as open multi-level systems in the context of aggravating contradictions between the interests of economic agents at the stages of deteriorating macroeconomic conditions and intensifying competition at the global and national levels determine the need to form an effective system of economic security at the meso-level, taking into account numerous threats and risk-forming factors. On the one hand, the digital transformation of enterprises provides competitive advantages in the market, on the other hand, it is a challenge that threatens the very existence of the enterprise. The article reveals the features of a digital enterprise through the prism of process vulnerability. Digital transformation creates new threats to economic security. The main specific threats to the digital enterprise are highlighted, as well as the specific industry threats to the digital enterprise in the energy industry. A classification of threats to the economic security of a digital enterprise in the energy industry in an unstable situation is presented, which can be used as a tool for managing the economic security of a digital enterprise.
APA, Harvard, Vancouver, ISO, and other styles
6

Ajetunmobi, Ridwan Lanre. "Digital Rights Management System and Administration: A Wake-up Call for Nigeria!" Law and Development Review 11, no. 2 (June 26, 2018): 609–25. http://dx.doi.org/10.1515/ldr-2018-0031.

Full text
Abstract:
Abstract The advent of the digital milieu and the explosion of the internet has made access, use, modification or duplication of original work easy. Physical reproductions have been replaced by digital reproduction, which has become much easier as well as cost-effective. The increased use of digital technology and online activities pose a serious threat to the cardinal objective of copyright protection. To counter these threats, measures have been developed technologically to make digital works difficult to copy, distribute and access without the necessary permission. These measures are covered under the heading of Digital Rights Management (DRM). Traditional copyright laws did not contemplate these threats and does not make provision to tackle them. Several countries have amended their copyright laws to address the threats posed by digital advancement. In this context, Nigeria has a draft (amendment) bill, 2015, which is before its national assembly. This paper calls for the swift passage of the bill to enable Nigeria to effectively provide for a legal framework to counter the threats posed by these digital advancements.
APA, Harvard, Vancouver, ISO, and other styles
7

Gambo Danmuchikwali, Bilkisu, and Muhammmad Muhammad Suleiman. "DIGITAL EDUCATION: OPPORTUNITIES, THREATS, AND CHALLENGES." Jurnal Evaluasi Pendidikan 11, no. 2 (November 3, 2020): 78–83. http://dx.doi.org/10.21009/10.21009/jep.0126.

Full text
Abstract:
Digital education is largely an innovation of the last few decades, although it already existed in various forms slightly earlier. Shortly, the educational system environments are anticipated as mitigation to unforeseen natural and artificial pandemics such as Covid-19 in 2020 by the significant changes associated with the digitalization of some portion of the system. This article aims to provide valuable perspectives of ICT and digital education into its future benefits, risks, and challenges of embracing the latest technologies in the digital era, and vast online open courses. We have checked a profound change in the way we interact and generate within the academics with the advent of internet technologies. Globally, the digital revolution favoured open access to information. Classrooms today have a lot of ICT resources nearly all the teachers have made great strides to incorporate digital technology to increase access to information and collaborative activities for the learners.
APA, Harvard, Vancouver, ISO, and other styles
8

Konyeha, Susan. "Exploring Cybersecurity Threats in Digital Marketing." NIPES Journal of Science and Technology Research 2, no. 3 (August 31, 2020): 12. http://dx.doi.org/10.37933/nipes/2.3.2020.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kozlov, V. V., and T. V. Tomashevska. "Digital Economy: Preconditions, Threats and Prospects." Statistics of Ukraine 92, no. 2 (June 16, 2021): 58–66. http://dx.doi.org/10.31767/su.2(93)2021.02.06.

Full text
Abstract:
Digital economy is an economy based on digital computer technology. The current stage of civilization is characterized by the formation of a new information society technological structure, the basic innovations of which are infocommunication technologies (ICT), network market architecture, the information resources domination. Infocommunication nature of new technological way of life and digital economy determines the development of adequate digital reality of scientific and methodological support of the management system in infocommunications and related industries, and in general the national digital economy. Understanding the phenomenon of digital economy and information society is based on the analysis of human society and technological systems evolution. Although the impact of the digital economy on economic processes and relations is obvious, this issue is not yet sufficiently studied and needs detailed consideration. Modern realities are such that the dynamic development of information technology, the widespread complexity of business processes, as well as the accumulation of significant amounts of data leads to the objective emergence of such a concept as the digital economy. The digital type of economy affects all industries without exception, from retail to education, energy, and so on. The onslaught of the new digital economy on the position of the old industrial economy testifies to a natural, natural-historical and objectively inevitable process. Accumulation and renewal of knowledge is accelerating, a single global socio-planetary memory is being formed and, expanding, deepening, various types of intellectual property are intensively developing. However, the digitalization of economic and social activities has not only positive aspects. Information attacks on state and commercial structures of individual countries, theft of information, personal data are among the main problems in the transition to the information society. It is necessary to analyze in detail the world experience in cybersecurity of critical infrastructure. At present, there is a significant potential for the use of modern digital technologies in the activities of modern companies. The phenomenon of the digital economy leads to the transformation of information resources into the main source of added value, the emergence on this basis of opportunities to ensure the intensive nature of economic development based on low-cost technologies, including information management technologies. The countries of the post-Soviet space in the field of digital economy lagged behind the advanced countries. They have a paradoxical economic situation, namely: with an excess of outdated information flows, there is a hunger for information on the latest flows. To overcome the information gap, the governments of these countries are trying to close this gap through government regulation.
APA, Harvard, Vancouver, ISO, and other styles
10

Berghel, Hal. "Bruce Schneier on Future Digital Threats." Computer 51, no. 2 (February 2018): 64–67. http://dx.doi.org/10.1109/mc.2018.1451653.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Shcherbakova, N. V. "ISSUES OF INFORMATION SECURITY OF SOCIETY UNDER THE CONDITIONS OF THE DEVELOPMENT OF DIGITAL ECONOMY." Vestnik NSUEM, no. 1 (April 1, 2021): 245–53. http://dx.doi.org/10.34020/2073-6495-2021-1-245-253.

Full text
Abstract:
Cybercrime is a growing industry around the world imposing significant costs on firms. Cyber threats have driven companies to build layers of defenses, resorting to a variety of products and services developed by different cybersecurity vendors. The financial sector is a major target for cybercriminals. The pace of cyberattacks is accelerating too quickly for banks to rely on manual threat analysis and response. The financial organizations face a growing threat from malicious cyber activity. In the financial sector, speed of response is critical to identify and block cyber threats. Regulators are taking notice of the increased risk of cyber threats. Paper draws our attention to information protection system of bank.
APA, Harvard, Vancouver, ISO, and other styles
12

Gaivoronskaya, Yana. "Digitalization risks and threats." Advances in Law Studies 8, no. 5 (June 4, 2020): 25–32. http://dx.doi.org/10.29039/2409-5087-2020-8-5-25-32.

Full text
Abstract:
The aim of the study is to systematize risks and threats of digital transformation of the society for subsequent development of advanced law-making decisions. Having considered classification of digitalization threats and risks of proposed in science, the author proposes to divide all the threats of digitalization into 3 groups: hypothetical, real and epistemological. The most crucial are the real threats that appear at the present stage of technical development and urgently require legal solutions. In general, all the real threats are associated with security problems of individuals, businesses, society and the state in a digital environment.
APA, Harvard, Vancouver, ISO, and other styles
13

Gulbinas, Alanas, and Kamilė Jogminaitė. "Digital business taxation issues and threats abstract." Vilnius University Open Series, no. 4 (November 16, 2020): 98–121. http://dx.doi.org/10.15388/os.tmp.2020.5.

Full text
Abstract:
“Article of digital business taxation issues and threats”, analyzes the impact of the digitalization in modern society and the changes of corporate profit tax. This article has been concentrated on the regulation of the European Union but mentions the international adjustments as well. The article has been written in a discussion of national law and bilateral agreements, which apply to the traditional permanent headquarters concept. This article discusses the current situation, where digital businesses are not being taxed with corporate profit tax, and possibilities to change it according to the needs of the digital economy In addition, when digital businesses emerged, the permanent headquarters concept, which taxed based on the permanent location, required further discussion and a new definition. Therefore, the article talks over the proposals of the European Union to equalize corporate profit taxation. The article analyzes the possible consequences and issues of the adaptation of the EU directive. In question of regulating the corporate profit tax, the authors discussed the competence of the EU.
APA, Harvard, Vancouver, ISO, and other styles
14

Hrytsai, S. O. "CENTRAL BANKS' DIGITAL CURRENCY – THREATS AND CHALLENGES." Actual problems of native jurisprudence, no. 1 (2022): 144–49. http://dx.doi.org/10.32782/392256.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

SHEVCHENKO, L. S. "Digital competition: new opportunities and new threats." ECONOMIC THEORY AND LAW 45, no. 2 (2021): 11–31. http://dx.doi.org/10.31359/2411-5584-2021-45-2-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Griffin, James. "The Digital Copyright Exchange: Threats and Opportunities." International Review of Law, Computers & Technology 27, no. 1-2 (July 2013): 5–17. http://dx.doi.org/10.1080/13600869.2013.764136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Parn, Erika A., and David Edwards. "Cyber threats confronting the digital built environment." Engineering, Construction and Architectural Management 26, no. 2 (March 18, 2019): 245–66. http://dx.doi.org/10.1108/ecam-03-2018-0101.

Full text
Abstract:
Purpose Smart cities provide fully integrated and networked connectivity between virtual/digital assets and physical building/infrastructure assets to form digital economies. However, industrial espionage, cyber-crime and deplorable politically driven cyber-interventions threaten to disrupt and/or physically damage the critical infrastructure that supports national wealth generation and preserves the health, safety and welfare of the populous. The purpose of this paper is to present a comprehensive review of cyber-threats confronting critical infrastructure asset management reliant upon a common data environment to augment building information modelling (BIM) implementation. Design/methodology/approach An interpretivist, methodological approach to reviewing pertinent literature (that contained elements of positivism) was adopted. The ensuing mixed methods analysis: reports upon case studies of cyber-physical attacks; reveals distinct categories of hackers; identifies and reports upon the various motivations for the perpetrators/actors; and explains the varied reconnaissance techniques adopted. Findings The paper concludes with direction for future research work and a recommendation to utilize innovative block chain technology as a potential risk mitigation measure for digital built environment vulnerabilities. Originality/value While cyber security and digitization of the built environment have been widely covered within the extant literature in isolation, scant research has hitherto conducted an holistic review of the perceived threats, deterrence applications and future developments in a digitized Architecture, Engineering, Construction and Operations (AECO) sector. This review presents concise and lucid reference guidance that will intellectually challenge, and better inform, both practitioners and researchers in the AECO field of enquiry.
APA, Harvard, Vancouver, ISO, and other styles
18

VLASOV, Maksim V., Ol'ga N. BUCHINSKAYA, and Vasilii V. SUKHIKH. "Digital environment of trust." Economic Analysis: Theory and Practice 20, no. 7 (July 29, 2021): 1343–67. http://dx.doi.org/10.24891/ea.20.7.1343.

Full text
Abstract:
Subject. The paper analyzes the digital environment of trust, its role in processes of digitalization of economic relationships, problems of trust, arising during the use of digital tools in the society. Objectives. The purpose is to perform a theoretical analysis of the digital environment of trust, identify and study external and internal factors affecting the emergence and strengthening of threats to the digital environment of trust, develop proposals to reduce these threats. Methods. We apply general scientific methods of knowledge, systems approach, methodological tools of institutional theory, comparative analysis of modern approaches to the study of digitalization, and evaluation of digital economy development. Results. We substantiate the use of the “digital environment of trust” term, undertake a theoretical analysis of digital environment of trust. The latter enabled to describe and investigate threats to digital environment of trust and propose measures to reduce the revealed threats. Conclusions. Digitalization increases risk and uncertainty in economic relations. Only trust can encourage people to take digitization without fears to go to the new digital world. It is crucial to create a digital environment of trust, i.e. certain conditions of interaction in the digital world that would help achieve a high level of confidence in digital technologies.
APA, Harvard, Vancouver, ISO, and other styles
19

Kulović, Jasmina, Sabina Baraković, and Jasmina Baraković Husić. "Analysis of Threats for Web of Things (WoT) System." B&H Electrical Engineering 14, no. 2 (December 1, 2020): 19–27. http://dx.doi.org/10.2478/bhee-2020-0009.

Full text
Abstract:
Abstract The Web of Things (WoT) emerges from applying Web technologies to the Internet of Things (IoT) to access information and services of physical objects. These systems are likely to characterize the future of digital environment and they put certain security issues in the story. In order to help detect potential threats to WoT-system that is being built and designed, it is advisory to implement a threat modelling process. Threat modelling is an engineering technique that can be used to identify threats, attacks, vulnerabilities and appropriate countermeasures in the context of a particular application and is a process best implemented at the system design stage. In this paper, we will analyse the threats for WoT-based door management system by using Microsoft Threat Modeling Tool (MTMT) in order to identify potential threats for this system in design phase. Obtained results justified the use of threat modelling in the design phase given that we have identified in total 89 threats, with Elevation of privilege and Denial of Service (DoS) being the most prominent ones. Those threats are characterized as high and medium risk ones.
APA, Harvard, Vancouver, ISO, and other styles
20

Александр, Н. Л., and А. Л. Юлия. "Digital Economy: Challenge or Threat to Economic Security? Normative Approach." ЖУРНАЛ ПРАВОВЫХ И ЭКОНОМИЧЕСКИХ ИССЛЕДОВАНИЙ, no. 4 (December 15, 2019): 21–27. http://dx.doi.org/10.26163/gief.2019.40.42.003.

Full text
Abstract:
Актуальность рассмотрения цифровой экономики в системе вызовов и угроз экономической безопасности определяется усилением цифровизации во всех сферах общественной жизни, важностью внедрения передовых информационных технологий для экономического роста страны, что влечет одновременное появление новых и генерирование имеющихся вызовов и угроз экономической безопасности. При этом самостоятельной задачей является проведение нормативного анализа разграничения имеющихся вызовов и угроз, в которых сегодня цифровая экономика занимает лидирующие позиции, и позиционирование ее самой как вызова или как угрозы экономической безопасности страны. The relevance of reviewing digital economy in the context of ongoing challenges and threats to economic security is based on the increased comprehensive digitalization in all spheres of public life. It also stems from the importance of introducing advanced information technologies to ensure economic growth of the country that results in immediate synchronous emergence of new challenges and threats to economic security as well as in generation of the ones already existing. At the same time there is a separate independent task dealing with performing normative analysis of the distinction between existing challenges and threats wherein digital economy has leading positions and also is deemed to be itself a challenge and threat to economic security.
APA, Harvard, Vancouver, ISO, and other styles
21

Khachaturyan, Ashot A. "Digitalization of the economy: Social threats." Resources and Environmental Economics 4, no. 2 (2022): 360–66. http://dx.doi.org/10.25082/ree.2022.02.002.

Full text
Abstract:
The article analyzes the hidden threats to society associated with the development of the digital economy. Shown are the main problems that digital can bring to social life and the fate of an individual worker. Chief among these concerns is that with the further digital transformation of the economy, more and more jobs could threatened with extinction. The disappearance of old jobs this time will not accompanied by the emergence of new ones. A situation may arise when the workers released due to digitalization will become not only unemployed, but also generally inoperable. A global question arises - what to do with those, who do not work, and what to support them for?
APA, Harvard, Vancouver, ISO, and other styles
22

Altukhov, V. V., and A. V. Kolesnikov. "Entrepreneurship in the Digital Economy: Opportunities and Threats." Normirovanie i oplata truda v promyshlennosti (Rationing and remuneration of labor in industry), no. 11 (November 1, 2021): 68–70. http://dx.doi.org/10.33920/pro-3-2111-07.

Full text
Abstract:
The article examines the sequence of the development of entrepreneurship in the digital economy, as well as the approach to the definition of “digital economy”, the significance of the digital economy in the modern world, opportunities and threats in this area.
APA, Harvard, Vancouver, ISO, and other styles
23

Gagnon, Marie-Pierre, Geneviève Rouleau, Hassane Alami, and Jean-Paul Fortin. "OP57 Threats And Opportunities To Digital Health In Primary Care." International Journal of Technology Assessment in Health Care 35, S1 (2019): 14. http://dx.doi.org/10.1017/s026646231900120x.

Full text
Abstract:
IntroductionThe use of digital technologies in healthcare systems (digital health)– such as electronic health records and telehealth – can improve primary care (PC). However, integration of digital health can be constrained/impaired and/or facilitated due to several factors. We propose an integrative framework for classifying the factors that could favour or limit digital health integration in PC in order to guide the identification of strategies that could be helpful for technology promoters, managers, clinicians and researchers.MethodsBased on a systematic review, our framework includes seven categories to classify the main opportunities and threats to digital health integration in PC: technological; individual/interpersonal; professional; organisational/institutional; ethical/legal; sociopolitical; economical. We consulted a panel of researchers, managers, clinicians, and citizens/patients in a scientific meeting regarding the main opportunities and threats to the integration of digital health in PC. We performed a content analysis of the reported factors according to the framework.ResultsTechnological factors such as maturity, interoperability and ease of use were often mentioned as key conditions for digital health integration. Individual and interpersonal factors such as depersonalisation and digital literacy were seen as threats. The impact on workload and shared responsibility were threats at the professional level, whereas silos and change management were noted as organisational threats. Current policies and social trends favored digital health. Threats regarding privacy and confidentiality were mentioned at the legal/ethical level. The possibility to reduce costs and sharing of benefits were noted as opportunities at the economic level.ConclusionsKnowing these multidimensional conditions, perceived as either threats or opportunities depending on the context of each PC setting, is essential to inform decisions, from strategic planning to evaluation. Our integrative framework allows a simple classification of opportunities and threats that can guide the development and implementation of tailored strategies favouring the integration of digital health in PC.
APA, Harvard, Vancouver, ISO, and other styles
24

GRETCHENKO, A. I., I. V. GOROKHOVA, O. G. DEMENKO, and A. A. GRETCHENKO. "Digital Economy: Challenges and Threats for Modern Russia." Journal of Advanced Research in Law and Economics 9, no. 4 (June 30, 2018): 1243. http://dx.doi.org/10.14505//jarle.v9.4(34).09.

Full text
Abstract:
The article describes the positive and negative aspects of transfer to the digital economy. An overview of literature regarding the digitization of society is presented. Preconditions for further digitization and economic development in Russia are stated. The beginning of the 21st century was marked by the flourishing of digital technologies, based on information revolution and economic globalization. Information has become the main resource in the society and in economic processes. People turn information into knowledge, and socioeconomic relations are increasingly transferred into a network environment. The key factor of digital transformation in the activities of the market players is the development of the digital culture.
APA, Harvard, Vancouver, ISO, and other styles
25

Kislyakov, P. A., I. L. S. Meyerson, E. A. Shmeleva, and M. O. Aleksandrovich. "Personal resilience to socio-cultural threats in the context of digital transformation of society." Education and science journal 23, no. 9 (November 12, 2021): 142–68. http://dx.doi.org/10.17853/1994-5639-2021-9-142-168.

Full text
Abstract:
Introduction. The digital transformation of society determines the presence of socio-cultural threats and risks, which are associated with the instability of the value system of the individual and the distortion of socio-cultural identity as a result thereof. Today, we can observe various violations of the processes of socio-cultural identification, which threaten the psychological security of the individual and the security of both society and the state. Overcoming threats to socio-cultural identity through the choice of productive strategies is possible due to such personality traits as psychological stability, the ability to counteract risks, formed on the basis of social norms, ethnicity, patriotism, and critical thinking.The aim of the present research is to identify the psychological factors and mechanisms that ensure the formation of personal resilience to sociocultural threats in the context of digital transformation of society.Methodology and research methods. The current research is based on the theory of digital socialisation of the individual, socio-cultural identity, as well as on the theory of socio-psychological security. The following psychodiagnostic methods were used: “Scale of subjective well-being” (Perrudel-Badoux, Mendelsohn, Chiche, adaptation by M. V. Sokolova), “Definition of socio-cultural identity” (modified version by Krupenko O. V., Frolova O. V.), “Questionnaire of moral grounds” (MFQ) (J. Haidt et al., in adaptation by O. A. Sychev et al.), “Index of self-assessment of information skills” (Voynilov Y. L., Maltseva D. V., Shubina L. V., in the author’s modification), “Index of socio-cultural security of a teenager” (Scale of virtual autism) (by Gilemkhanova E. N.), and the questionnaire of perception of socio-cultural threats to the digital transformation of society developed by the authors. The obtained data were processed using descriptive statistics, factor analysis (principal component analysis, Varimax rotation), and Spearman correlation analysisResults and scientific novelty. The study showed that students in general have a sufficient level (above average) of socio-cultural identity, critical thinking when working with information, moral norms of loyalty and respect for the authorities, as well as students demonstrate psychological well-being and a low level of virtual autism. Students see the greatest threat in threats to the individual (reduction of live interpersonal communication and withdrawal from the real world; growth of aggression, cyberbullying; growth of information stress) and the state (growth of cybercrime and cyberterrorism). Three factors of social risk of digital transformation of society were highlighted: ethno-cultural risks, antisocial risks, cognitive and communication risks. Three psychological mechanisms were identified that allow an individual to maintain resilience to socio-cultural threats in the context of digital transformation of society: the mechanism of social tolerance (vs alarmism, vs racism), the mechanism of conformity (social adaptation), and the mechanism of psychological protection (coping).Practical significance. The identified psychological factors and mechanisms allow the programmes for psychological and pedagogical support of students to be developed and implemented.
APA, Harvard, Vancouver, ISO, and other styles
26

Mateusz. "Threats Associated with Digital Technology in the Workplace." EUROPEAN RESEARCH STUDIES JOURNAL XXIV, Issue 1 (February 1, 2021): 1250–57. http://dx.doi.org/10.35808/ersj/2022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Nikitenko, Vìtalina, Regina Andriukaitiene, and Oleg Punchenko. "Formation ofsustainable digital economical concept: challenges, threats, priorities." HUMANITIES STUDIES 1(78) (2019): 140–53. http://dx.doi.org/10.26661/hst-2019-1-78-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Krotenko, T. Yu. "Opportunities and threats of digital transformation management education." Digital Sociology 5, no. 1 (March 30, 2022): 98–106. http://dx.doi.org/10.26425/2658-347x-2022-5-1-98-106.

Full text
Abstract:
The changes taking place in the world presuppose the inevitable entry of business, science, education into the digital space. For such a serious step, Russian organisations in any field of activity need a comprehensive readiness of the entire system, supported not only by the enthusiasm of employees and the ability of managers to experiment. Without thoughtful high-quality preparation of all system elements and connections, digital transformation can turn out to be an untimely costly measure that hinders the development of organisations. The article analyses the barriers to the economic digitalisation and management education that affect the digital transition success. Education is viewed as a leading factor in socio-economic development, therefore, the demand for digitalisation is addressed primarily to education. The article raises the problem of the lack of a convincing scientific psychological and pedagogical concept of digital learning, which could be used by subjects of education as a basic one. The results of a students’ survey of management specialties of the university showed: the professional competencies of modern managers necessary for activities in the era of the digital revolution have to be expanded, the question arises of the reasonable disciplines inclusion that correspond to real needs in the educational programs of the management university.
APA, Harvard, Vancouver, ISO, and other styles
29

Kolesnikov, A. V. "RISKS AND THREATS OF DIGITAL TECHNOLOGIES IN AGRICULTURE." Экономика сельского хозяйства России, no. 6 (June 2021): 11–19. http://dx.doi.org/10.32651/216-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Altuhov, V. V., and A. V. Kolesnikov. "Entrepreneurship in the Digital Economy: Opportunities and Threats." Normirovanie i oplata truda v promyshlennosti (Rationing and remuneration of labor in industry), no. 7 (June 10, 2021): 76–78. http://dx.doi.org/10.33920/pro-3-2107-08.

Full text
Abstract:
The article deals with the development of entrepreneurship in the digital economy, as well as an approach to the definition of «digital economy», its significance in the modern world, opportunities and threats.
APA, Harvard, Vancouver, ISO, and other styles
31

Vasil’eva, L. P., O. A. Polyanskaya, K. V. Khartanovich, A. V. Milenkiy, and S. V. Tereshchenko. "Digital technologies in the economy: opportunities and threats." IOP Conference Series: Earth and Environmental Science 806, no. 1 (August 1, 2021): 012036. http://dx.doi.org/10.1088/1755-1315/806/1/012036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Godin, V. V., M. N. Belousova, V. A. Belousov, and A. Е. Terekhova. "Agriculture in a digital era: threats and solutions." E-Management 3, no. 1 (May 20, 2020): 4–15. http://dx.doi.org/10.26425/2658-3445-2020-1-4-15.

Full text
Abstract:
The need for digitalization of the agro-industrial complex is obvious – implementation of digital economy principles will create an institutional environment that meets modern realities and allows to generally improve production efficiency. Foreign experience of agriculture digitalization in the USA, Germany, Switzerland, and Ireland has been analysed in the article. Main technologies used for agro-industrial complex digitalization have been described. Advantages and potential of the smart farming implementation to control the accuracy of fertilizer application, prediction of adverse environmental events, quality improve of growing products and more open interaction between farmers and consumers, resource costs reduction and increase of farms profitability have been considered. Opportunities and obstacles for implementing technologies of the state project “Digital Agriculture” have been evaluated: big data, blockchain, smart farming, quantum technologies, Internet of things, robotics, wireless communications, virtual and augmented realities. Ingeneral the main obstacles are related to high cost of introducing new technologies, lack of necessary knowledge among farmers, lack of legal framework and standards, and lack of information and software protection mechanism. Barriers and their potential solutions in the process of agriculture digitalization in Russia have been defined in the article. Main solutions to overcome the barriers described include: favorable regulatory environment for digital agriculture development, information and economic security of agricultural producers, nationwide information and communication infrastructure for the industry (including provision of public services on the basis of a single cloud platform), necessary training for “intellectual” agriculture, implementation of digital technologies in related industries, development of the agricultural digital enterprise concept and the way of its implementation.
APA, Harvard, Vancouver, ISO, and other styles
33

Tsvetova, G. V. "Digital Economy: benefits, threats, and the influences factors." POWER AND ADMINISTRATION IN THE EAST OF RUSSIA 91, no. 2 (2020): 45–50. http://dx.doi.org/10.22394/1818-4049-2020-91-2-45-50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Michota, Alexandra. "Digital security concerns and threats facing women entrepreneurs." Journal of Innovation and Entrepreneurship 2, no. 1 (2013): 7. http://dx.doi.org/10.1186/2192-5372-2-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Omand, David. "The threats from modern digital subversion and sedition." Journal of Cyber Policy 3, no. 1 (January 2, 2018): 5–23. http://dx.doi.org/10.1080/23738871.2018.1448097.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Edu, Abeeku Sam, Mary Agoyi, and Divine Agozie. "Digital security vulnerabilities and threats implications for financial institutions deploying digital technology platforms and application: FMEA and FTOPSIS analysis." PeerJ Computer Science 7 (August 3, 2021): e658. http://dx.doi.org/10.7717/peerj-cs.658.

Full text
Abstract:
Digital disruptions have led to the integration of applications, platforms, and infrastructure. They assist in business operations, promoting open digital collaborations, and perhaps even the integration of the Internet of Things (IoTs), Big Data Analytics, and Cloud Computing to support data sourcing, data analytics, and storage synchronously on a single platform. Notwithstanding the benefits derived from digital technology integration (including IoTs, Big Data Analytics, and Cloud Computing), digital vulnerabilities and threats have become a more significant concern for users. We addressed these challenges from an information systems perspective and have noted that more research is needed identifying potential vulnerabilities and threats affecting the integration of IoTs, BDA and CC for data management. We conducted a step-by-step analysis of the potential vulnerabilities and threats affecting the integration of IoTs, Big Data Analytics, and Cloud Computing for data management. We combined multi-dimensional analysis, Failure Mode Effect Analysis, and Fuzzy Technique for Order of Preference by Similarity for Ideal Solution to evaluate and rank the potential vulnerabilities and threats. We surveyed 234 security experts from the banking industry with adequate knowledge in IoTs, Big Data Analytics, and Cloud Computing. Based on the closeness of the coefficients, we determined that insufficient use of backup electric generators, firewall protection failures, and no information security audits are high-ranking vulnerabilities and threats affecting integration. This study is an extension of discussions on the integration of digital applications and platforms for data management and the pervasive vulnerabilities and threats arising from that. A detailed review and classification of these threats and vulnerabilities are vital for sustaining businesses’ digital integration.
APA, Harvard, Vancouver, ISO, and other styles
37

Буров, Олександр, Олександр Бутнік-Сіверський, Олена Орлюк, and Катерина Горська. "CYBERSECURITY AND INNOVATIVE DIGITAL EDUCATIONAL ENVIRONMENT." Information Technologies and Learning Tools 80, no. 6 (December 22, 2020): 414–30. http://dx.doi.org/10.33407/itlt.v80i6.4159.

Full text
Abstract:
The article considers interaction of innovation, cybersecurity, and digital education environment. It has been demonstrated that comprehensive digitalization of society is being accompanied by changes in the innovative potential and educational needs of Ukraine, especially in the development of the human intellectual capital and its protection in the digital environment. Human capital in innovation plays a significant role, especially in the digital age. Young people are considered as a vulnerable group that could be the main goal of cyber cognitive operations and as the weakest link of the System. The analysis of the Global Innovation Report has revealed that the real level of digitalization in Ukraine does not match its actual human potential and creative outputs. Ukraine has faced gaps in the triangle "human capital (potential) - technological support of innovations - creative activity" that should be eliminated to increase the national Global Innovation Index (GII). Human talent and competence (as a capital) are developed in the learning process. It has been noted that a joint project is the weakest link in terms of intellectual capital and the intellectual property right. Personal information about the project competitors is usually not defended. The issues of innovation in the digital learning environment exacerbate the issues of cybersafety of the education process participants.The traditional cybersecurity approach is unable to detect and tackle new sophisticated attacks. The authors have developed a general model of cyber threats in the field of education and mitigation of their impact.The new strategy in cybersecurity is proposed: not only prompt defence, but threat hunting and resilience training of users. Threat hunting can be presented by two approaches: threat detection (reactive) and threat discovery (proactive), as components of the proposed model. The resilience training of users is associated with threat awareness and special cybersafety training. A general model of cyber threats in the field of education and ways to avoid them is presented. Special attention should be paid to the strengthening of the role of media in educational processes in digital environment, as a current area of cyber hazards. The role of media in stimulating horizontal communication in the educational process is growing. Participants in the digital environment are confidently turning from passive consumers to prosumers, and the media are becoming an information intermediary with a double function: a platform for providing access and information exchange in the educational process and technological tools for joint creation of products (creative commons).
APA, Harvard, Vancouver, ISO, and other styles
38

Rantos, Konstantinos, Arnolnt Spyros, Alexandros Papanikolaou, Antonios Kritsas, Christos Ilioudis, and Vasilios Katos. "Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem." Computers 9, no. 1 (March 6, 2020): 18. http://dx.doi.org/10.3390/computers9010018.

Full text
Abstract:
Threat intelligence helps businesses and organisations make the right decisions in their fight against cyber threats, and strategically design their digital defences for an optimised and up-to-date security situation. Combined with advanced security analysis, threat intelligence helps reduce the time between the detection of an attack and its containment. This is achieved by continuously providing information, accompanied by data, on existing and emerging cyber threats and vulnerabilities affecting corporate networks. This paper addresses challenges that organisations are bound to face when they decide to invest in effective and interoperable cybersecurity information sharing and categorises them in a layered model. Based on this, it provides an evaluation of existing sources that share cybersecurity information. The aim of this research is to help organisations improve their cyber threat information exchange capabilities, to enhance their security posture and be more prepared against emerging threats.
APA, Harvard, Vancouver, ISO, and other styles
39

Pavlík, Lukáš, Martin Ficek, and Jakub Rak. "Dynamic Assessment of Cyber Threats in the Field of Insurance." Risks 10, no. 12 (November 22, 2022): 222. http://dx.doi.org/10.3390/risks10120222.

Full text
Abstract:
The area of digital technologies is currently the subject of many cyber threats, the frequency of which is increasing. One of the areas of cyber security is also the creation of models and estimates of the process of cyber threats and their possible financial impacts. However, some studies show that cyber-threat assessment to identify potential financial impacts for organizations is a very challenging process. A relatively large problem here is the detection of scenarios of cyber threats and their expression in time. This paper focuses on the design of an algorithm that can be applied to the field of cyber-threat assessment in order to express the financial impacts. The study is based on an in-depth analysis of the insurance industry. The results obtained in our research show the importance of the time perspective for determining the potential financial impacts of cyber threats for the field of insurance.
APA, Harvard, Vancouver, ISO, and other styles
40

Yildirim Yayilgan, Sule, Filip Holik, Mohamed Abomhara, Doney Abraham, and Alemayehu Gebremedhin. "An Approach for Analyzing Cyber Security Threats and Attacks: A Case Study of Digital Substations in Norway." Electronics 11, no. 23 (December 2, 2022): 4006. http://dx.doi.org/10.3390/electronics11234006.

Full text
Abstract:
In this paper, we provide an approach for analyzing cyber security threats and attacks in digital substations, which is based on several steps we performed within our work on two Research Council of Norway (RCN) projects. In the literature, there are various separate or theoretical concepts to understand and follow a security analysis of smart grids in general, but none is focused specifically on digital substations. Moreover, none is showing real applicability on an existing use case, making the implementation difficult. The approach we propose here is a result of our attempts to create a comprehensive overview of the individual steps we have been taking to do the analysis. For that reason, firstly, we start with defining and explaining a digital substation and its concepts, and the security challenges related to digital substations. Afterwards, we present the main steps of the security analysis for digital substation. The first step is the security pyramid. The following steps are threat analysis, threat modeling, risk assessment and the simulation impact analysis, which are another contribution from our group presented in this paper. Considering that the main goal of a security analysis is to create awareness for the stakeholders of digital substations, such an impact simulation provides a flexible way for stakeholders to see and to understand the consequences of security threats and attacks. We summarize the paper with an illustration of the steps we are taking in the form of the approach for digital substation.
APA, Harvard, Vancouver, ISO, and other styles
41

Sorokoumova, Elena A., Elena B. Puchkova, Elena I. Cherdymova, and Larisa V. Temnova. "The risks and threats of digital educational technologies and products." World Journal on Educational Technology: Current Issues 13, no. 4 (October 31, 2021): 851–62. http://dx.doi.org/10.18844/wjet.v13i4.6270.

Full text
Abstract:
Modern research is paying much attention to the issue of digital addiction of students in recent times since it can lead students to pay less attention to their academics. This article intends to discuss the possible threats and risks of the formation of digital dependence among teenagers from the use of gadgets. As a research method, the questionnaire method was used. The participants consisted of 13 specialists and 508 teenagers aged 11 to 14, studying in the 5th-8th grades of secondary schools. From the study, digital education increased the time spent of digital devices and technology. The authors also found that when students are learning with digital devices, they waste time on non-educational contents. The authors of the article propose psychological and pedagogical measures aimed at preventing digital addiction of students. Keywords: students, digital educational technologies, digital products, Internet addiction, prevention, gadget, typology of threats and risks.
APA, Harvard, Vancouver, ISO, and other styles
42

Renee Staton, A., and Michele Kielty. "A Lurking Threat: Counselor Practices to Guard Against Cyber Threats." Journal of Mental Health Counseling 45, no. 1 (January 1, 2023): 20–33. http://dx.doi.org/10.17744/mehc.45.1.02.

Full text
Abstract:
As a result of shifts in global power, the growth of cyber capabilities worldwide, and the impact of COVID-19 on the increasing use of technology in varied workplaces, the potential for threat and disruption to mental health facilities is expected to increase. Counselors and their clients are vulnerable to these threats any time they share data online with each other, with third-party payers, and with allied health professionals. In fact, any private information stored digitally is potentially at risk for exploitation or theft. This current environment highlights the need for an intentional process and approach that can help mental health counselors understand their digital assets and vulnerabilities in order to anticipate and protect against potential cyber threats. This type of process can be facilitated through the application of cyber intelligence and cybersecurity principles to online counseling services in order to address ethical and legal obligations of counselors and to assuage client fears about potential privacy breaches. When counselors keep client data safe, Health Information Portability and Accountability Act and Family Educational Rights and Privacy Act violations are less likely to occur in a variety of settings where clients may be seen. An overview of the need for cybersecurity, a framework for bolstering cybersecurity, and specific guidelines for counselors are provided.
APA, Harvard, Vancouver, ISO, and other styles
43

Khachaturyan, Ashot A. "Digitalization of the economy: social threats." Market economy problems, no. 3 (2020): 124–34. http://dx.doi.org/10.33051/2500-2325-2020-3-124-134.

Full text
Abstract:
The article analyzes the hidden threats to society associated with the development of the digital economy. The paper describes the main problems that digitalization can bring to social life and the fate of an individual worker. Chief among these concerns is that with the further digital transformation of the economy, more and more jobs could be threatened with extinction. The disappearance of old jobs this time will not be accompanied by the emergence of new ones. A situation may arise when the workers released due to digitalization will become not only unemployed, but also generally inoperable. A global question arises – what to do with those who do not work, and what to support them for?
APA, Harvard, Vancouver, ISO, and other styles
44

Potanina, Olga. "Digitalization of the political process of modern Russia: experience of problematic analysis." Advances in Law Studies 8, no. 5 (June 4, 2020): 105–12. http://dx.doi.org/10.29039/2409-5087-2020-8-5-105-112.

Full text
Abstract:
The research goal of the article is to problem the digital transformation of the political process in modern Russia. The existing problems, threats and risks of digitalization of the political process are considered. The author distinguishes between problems and threats of digitalization, justifying the thesis that threats are the result of synergistic action of unresolved problems. The conclusion provides an indicative list of threats posed by the digital transformation of the political process.
APA, Harvard, Vancouver, ISO, and other styles
45

Ali, Md Iman, and Sukhkirandeep Kaur. "Next-Generation Digital Forensic Readiness BYOD Framework." Security and Communication Networks 2021 (March 20, 2021): 1–19. http://dx.doi.org/10.1155/2021/6664426.

Full text
Abstract:
Intel’s “Bring Your Own Device” (BYOD) adoption quickly became popular as an alternative workplace solution strategy. It enables employees to use their personally owned devices to perform business activities, leading to increased productivity and employee satisfaction. However, BYOD also brought associated risks because of exponential growth in the number of cybersecurity incidents due to which business ecosystem gets disrupted and fragmented. Although several methods and mechanisms have been developed and adopted to mitigate the risk associated with BYOD, they still represent a challenge as corporate network gets exposed to inherent threats caused by the BYOD threat landscape. This work demonstrates especially two key aspects: The first focuses on how to detect and protect BYOD environment from an advanced level attack which cannot be detected by traditional tools and techniques even though available tools are quite effective. Before the attack and damage to the critical infrastructure due to BYOD threat, a strategy was indeed the key requirement for detecting attacks and protecting the environment. The second part of the research focuses on conducting forensic investigation model and developing a new approach by providing a reliable forensic investigation infrastructure to find digital evidence and detect the source of attack. This research work concluded with two different novel strategic ideas. The first part contributes to a new method of detecting and protecting against malicious activities which cannot be otherwise detected and protected by traditional security technology like IPS, IDS, AntiBot, or AntiVirus. The proposed technique compared to the existing methods led to a significant contribution to the identification of threats before an attack takes place. The second part of the research contributes to the defining of a new approach of the next-generation digital forensic readiness (NG-DFR) model in order to build a cyber forensic ecosystem so that cyber secured BYOD environment can be enabled safely.
APA, Harvard, Vancouver, ISO, and other styles
46

Chałubińska-Jentkiewicz, Katarzyna. "Digital Single Market. Cyber Threats and the Protection of Digital Contents: An Overview." Santander Art and Culture Law Review, no. 2 (6) (2020): 279–92. http://dx.doi.org/10.4467/2450050xsnr.20.020.13023.

Full text
Abstract:
Access to audio-visual and digitized heritage is crucial for the economy and overall well-being. It also offers important avenues for the development of creativity and intercultural dialogue, shaping people’s identity and contributing to cultural diversity. Yet the rise of the digital sector has also been accompanied by the proliferation of cyber or computer-related crime. Therefore, the harmonization of cybercrime legislation has widely been discussed in different international fora. At the same time, the protection of digital content has become a highly important issue in the context of the expanding policies aimed at ensuring public, open access to digitized resources for non-commercial, educational, and cultural purposes. This article offers an overview of these topical questions, with specific reference to the EU Digital Single Market.
APA, Harvard, Vancouver, ISO, and other styles
47

Jungherr, Andreas, and Ralph Schroeder. "Disinformation and the Structural Transformations of the Public Arena: Addressing the Actual Challenges to Democracy." Social Media + Society 7, no. 1 (January 2021): 205630512198892. http://dx.doi.org/10.1177/2056305121988928.

Full text
Abstract:
Current debate is dominated by fears of the threats of digital technology for democracy. One typical example is the perceived threats of malicious actors promoting disinformation through digital channels to sow confusion and exacerbate political divisions. The prominence of the threat of digital disinformation in the public imagination, however, is not supported by empirical findings which instead indicate that disinformation is a limited problem with limited reach among the public. Its prominence in public discourse is instead best understood as a “moral panic.” In this article, we argue that we should shift attention from these evocative but empirically marginal phenomena of deviance connected with digital media toward the structural transformations that give rise to these fears, namely those that have impacted information flows and attention allocation in the public arena. This account centers on structural transformations of the public arena and associated new challenges, especially in relation to gatekeepers, old and new. How the public arena serves actually existing democracy will not be addressed by focusing on disinformation, but rather by addressing structural transformations and the new challenges that arise from these.
APA, Harvard, Vancouver, ISO, and other styles
48

Tarkhanovа, N., and V. Romanov. "Digitalization of the service economy: advantages and threats." Transbaikal State University Journal 26, no. 9 (2020): 111–20. http://dx.doi.org/10.21209/2227-9245-2020-26-9-111-120.

Full text
Abstract:
Recently, the number of businesses using digital technologies has increased. The service sector is no exception. The article is devoted to the use of digital technologies in the service sector. The authors reviewed the advantages and threats of digitalization. As a result of the analysis, the concept of “digital economy” and “service sector” is clarified, and the need for digitalization is justified. The advantages obtained through the use of innovative technologies, both for the industry and for individual enterprises, are indicated. In relation to the industry, this will include: the use of new business models and forms of doing business; increasing the availability and promotion of services on the market up to the world; the emergence of new types of services; the use of control systems that replace humans. As a result of the analysis, the concept of “digital economy” and “service sector” has been clarified, and the need for digitalization is justified. For a single service enterprise, the benefits of implementing digital technologies can be expressed in: reaching the optimal consumer segment; determining the customer’s need for certain services; designing more flexible services; improving the quality of service by improving control of business processes; minimizing the time for services to enter the market; reducing costs by accelerating business processes; minimizing costs; increasing the availability of services through the dissemination of information in social networks; eliminating intermediaries in the delivery of services to the consumer and reducing costs, reducing the number of personnel performing routine operations. Digitalization provides not only the benefits but also pose a threat. These include various types of fraudulent schemes, an underdeveloped regulatory framework, a reduction in the number of employees, and changes in the labor market. As a result, there are increasing requirements for planning at the strategic, tactical and operational levels. Otherwise, the benefits of implementing digital technologies may be lost
APA, Harvard, Vancouver, ISO, and other styles
49

Holik, Filip, Lars Halvdan Flå, Martin Gilje Jaatun, Sule Yildirim Yayilgan, and Jørn Foros. "Threat Modeling of a Smart Grid Secondary Substation." Electronics 11, no. 6 (March 8, 2022): 850. http://dx.doi.org/10.3390/electronics11060850.

Full text
Abstract:
A full smart grid implementation requires the digitization of all parts of the smart grid infrastructure, including secondary electrical substations. Unfortunately, this introduces new security threats, which were not apparent before. This article uses a Smart Grid Threat Modeling Template implementing the STRIDE model to create a threat model of a digital secondary substation and its communication with the control center. Threats are classified by priority and need for further investigation. The tool was compared with a CORAS analysis, and was determined to be more time efficient. Denial of service (DoS) threats were classified as the most critical, and they were further evaluated in a precise simulation model created for this purpose. This model combines simulation with emulated communication, and enables verification of threat likelihoods and impacts. The results show that even publicly available tools can be easily used to disrupt grid communication and potentially cause loss of the entire grid’s observability and controllability.
APA, Harvard, Vancouver, ISO, and other styles
50

Kalenov, O. E. "Digital Opportunities and Threats of Organization in New Economy." Vestnik of the Plekhanov Russian University of Economics, no. 3 (May 31, 2021): 66–75. http://dx.doi.org/10.21686/2413-2829-2021-3-66-75.

Full text
Abstract:
The subject of the research presented by the article is opportunities and threats for the organization, which are carried by digital era. The author provides characteristic of the three industrial revolutions that already took place and describes prospects of the fourth one that we witness right now. Its foundation is formed by interaction of industrial and digital technologies and its precondition is mass spread of the Internet. The article gives a list of key technologies, whose combination could seriously raise the efficiency of organization work. It includes the Internet of things, mobile devices and applications, cloud calculations, cyber-physical systems, analysis of big data and new industrial technologies. The author divides digital opportunities into 4 groups: industrial, market, logistic and organizational-managerial. It is also underlined that besides vast opportunities digitalization implies threats: socialeconomic, technological, ecological and informational. Principle problems, which hinder home organizations to integrate into digital economy, were studied. At the same time the level of using new technologies by Russian enterprises and index of business digitalization were analyzed. In conclusion the author substantiates the necessity to introduce digital technologies to ensure competitiveness of companies in new economy.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography