34,847 research outputs found

    Commercialisation of eHealth Innovations in the Market of UK Healthcare Sector: A Framework for Sustainable Business Model.

    Get PDF
    This is the peer reviewed version of the following article: Festus Oluseyi Oderanti, and Feng Li, ‘Commercialization of eHealth innovations in the market of the UK healthcare sector: A framework for a sustainable business model’, Psychology & Marketing, Vol. 35 (2): 120-137, February 2018, which has been published in final form at https://doi.org/10.1002/mar.21074. Under embargo until 10 January 2020. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Self-Archiving.Demographic trends with extended life expectancy are placing increasing pressures on the UK state-funded healthcare budgets. eHealth innovations are expected to facilitate new avenues for cost-effective and safe methods of care, for enabling elderly people to live independently at their own homes and for assisting governments to cope with the demographic challenges. However, despite heavy investment in these innovations, large-scale deployment of eHealth continues to face significant obstacles, and lack of sustainable business models (BMs) is widely regarded as part of the greatest barriers. Through various empirical methods that include facilitated workshops, case studies of relevant organizations, and user groups, this paper investigates the reasons the private market of eHealth innovations has proved difficult to establish, and therefore it develops a framework for sustainable BMs that could elimiesnate barriers of eHealth innovation commercialization. Results of the study suggest that to achieve sustainable commercialization, BM frameworks and innovation diffusion characteristics should be considered complements but not substitutes.Peer reviewe

    Connected vehicles:organizational cybersecurity processes and their evaluation

    Get PDF
    Abstract. Vehicles have become increasingly network connected cyber physical systems and they are vulnerable to cyberattacks. In the wake of multiple vehicle hacks, automotive industry and governments have recognized the critical need of cybersecurity to be integrated into vehicle development framework and get manufactures involved in managing whole vehicle lifecycle. The United Nations Economic Commission for Europe (UNECE) WP.29 (World Forum for Harmonization of Vehicle Regulations) committee published in 2021 two new regulations for road vehicles type approval: R155 for cybersecurity and R156 for software update. The latter of these influence also to agricultural vehicle manufacturers, which is the empirical context of this study. Also new cybersecurity engineering standard from International Standardization Organization (ISO) and Society of Automotive Engineers (SAE) organizations change organizations risk management framework. The vehicle manufacturers must think security from an entirely new standpoint: how to reduce vehicle cybersecurity risk to other road users. This thesis investigates automotive regulations and standards related to cybersecurity and cybersecurity management processes. The methodology of the empirical part is design science that is a suitable method for the development of new artifacts and solutions. This study developed an organization status evaluation tool in the form of a questionnaire. Stakeholders can use the tool to collect information about organizational capabilities for comprehensive vehicles cybersecurity management process. As a main result this thesis provides base information for cybersecurity principles and processes for cybersecurity management, and an overview of current automotive regulation and automotive cybersecurity related standards.Verkotetut ajoneuvot : organisaation kyberturvallisuusprosessit ja niiden arviointi. TiivistelmÀ. Ajoneuvoista on tullut kyberhyökkÀyksille alttiita tietoverkkoon yhdistettyjÀ kyberfyysisiÀ jÀrjestelmiÀ. Ajoneuvojen hakkeroinnit herÀttivÀt hallitukset ja ajoneuvoteollisuuden huomaamaan, ettÀ kyberturvallisuus on integroitava osaksi ajoneuvojen kehitysympÀristöÀ ja valmistajat on saatava mukaan hallitsemaan ajoneuvon koko elinkaarta. Yhdistyneiden Kansakuntien Euroopan talouskomission (UNECE) WP.29 (World Forum for Harmonization of Vehicle Regulations) -komitean jÀsenet julkaisivat vuonna 2021 kaksi uutta tyyppihyvÀksyntÀsÀÀdöstÀ maantiekÀyttöön tarkoitetuille ajoneuvoille. NÀmÀ ovat kyberturvallisuuteen R155 ja ohjelmistopÀivitykseen R156 liittyvÀt sÀÀdökset, joista jÀlkimmÀinen vaikuttaa myös maatalousajoneuvojen valmistajiin. Myös uusi International Standardization Organization (ISO) ja Society of Automotive Engineers (SAE) organisaatioiden yhdessÀ tekemÀ kyberturvallisuuden suunnittelustandardi muuttaa organisaatioiden riskienhallintaa. Ajoneuvovalmistajien on pohdittava turvallisuutta aivan uudesta nÀkökulmasta; kuinka pienentÀÀ ajoneuvojen kyberturvallisuusriskiÀ muille tienkÀyttÀjille. TÀmÀ opinnÀytetyö tutkii kyberturvallisuuteen liittyviÀ autoalan sÀÀdöksiÀ ja standardeja sekÀ kyberturvallisuuden johtamisprosesseja. Työn empiirinen osa kÀsittelee maatalousajonevoihin erikoistunutta yritystÀ. Empiirisen osan metodologia on suunnittelutiede, joka soveltuu uusien artefaktien ja ratkaisujen kehittÀmiseen. Tutkimuksen empiirisessÀ osassa kehitettiin uusi arviointityökalu, jolla sidosryhmÀt voivat kerÀtÀ tietoja organisaation valmiuksista ajoneuvojen kyberturvallisuuden hallintaan. TÀmÀ opinnÀytetyö tarjoaa pohjatietoa kyberturvallisuuden periaatteista ja kyberturvallisuuden hallinnan prosesseista sekÀ yleiskatsauksen nykyiseen autoalan sÀÀntelyyn ja kyberturvallisuuteen liittyviin ajoneuvostandardeihin

    Towards Identifying and closing Gaps in Assurance of autonomous Road vehicleS - a collection of Technical Notes Part 1

    Get PDF
    This report provides an introduction and overview of the Technical Topic Notes (TTNs) produced in the Towards Identifying and closing Gaps in Assurance of autonomous Road vehicleS (Tigars) project. These notes aim to support the development and evaluation of autonomous vehicles. Part 1 addresses: Assurance-overview and issues, Resilience and Safety Requirements, Open Systems Perspective and Formal Verification and Static Analysis of ML Systems. Part 2: Simulation and Dynamic Testing, Defence in Depth and Diversity, Security-Informed Safety Analysis, Standards and Guidelines

    Anonymizing cybersecurity data in critical infrastructures: the CIPSEC approach

    Get PDF
    Cybersecurity logs are permanently generated by network devices to describe security incidents. With modern computing technology, such logs can be exploited to counter threats in real time or before they gain a foothold. To improve these capabilities, logs are usually shared with external entities. However, since cybersecurity logs might contain sensitive data, serious privacy concerns arise, even more when critical infrastructures (CI), handling strategic data, are involved. We propose a tool to protect privacy by anonymizing sensitive data included in cybersecurity logs. We implement anonymization mechanisms grouped through the definition of a privacy policy. We adapt said approach to the context of the EU project CIPSEC that builds a unified security framework to orchestrate security products, thus offering better protection to a group of CIs. Since this framework collects and processes security-related data from multiple devices of CIs, our work is devoted to protecting privacy by integrating our anonymization approach.Peer ReviewedPostprint (published version

    Audit Process during Projects for Development of New Mobile IT Application

    Get PDF
    This paper presents characteristics of the computer audit process during software development life cycle focused on specific aspects of the mobile IT applications. There are highlighted specific features of the distributed informatics systems implemented in wireless environments as hardware components, wireless technologies, classes of wireless systems, specialized software for mobile IT applications, quality characteristics of the mobile IT applications, software development models and their specific stages and issues aspects of the computer audit during software development life cycle of the distributed informatics systems customized on mobile IT applications. In the computer audit process, tasks of the computer auditors and what controls they must implement are also presented.Audit Process, Mobile It Applications, Software Development Life Cycle, Project Management

    Preliminaries of orthogonal layered defence using functional and assurance controls in industrial control systems

    Get PDF
    Industrial Control Systems (ICSs) are responsible for the automation of different processes and the overall control of systems that include highly sensitive potential targets such as nuclear facilities, energy-distribution, water-supply, and mass-transit systems. Given the increased complexity and rapid evolvement of their threat landscape, and the fact that these systems form part of the Critical National infrastructure (CNI), makes them an emerging domain of conflict, terrorist attacks, and a playground for cyberexploitation. Existing layered-defence approaches are increasingly criticised for their inability to adequately protect against resourceful and persistent adversaries. It is therefore essential that emerging techniques, such as orthogonality, be combined with existing security strategies to leverage defence advantages against adaptive and often asymmetrical attack vectors. The concept of orthogonality is relatively new and unexplored in an ICS environment and consists of having assurance control as well as functional control at each layer. Our work seeks to partially articulate a framework where multiple functional and assurance controls are introduced at each layer of ICS architectural design to further enhance security while maintaining critical real-time transfer of command and control traffic
    • 

    corecore