2 research outputs found
IoT & Digital Twins Concept Integration Effects on Supply Chain Strategy: Challenges and Effects
IoT is set to revolutionize the supply chain—both in terms of its operational efficiencies and revenue opportunities—by making it transparent. This paper is devoted to the investigation of the challenges and effects of IoT and Digital Twins integration. The goal is to ensure the formation of a methodological basis for calculating the cumulative effect of the accelerated implementation of digital twins, which should become a source of reserved growth and increase the competitiveness of a modern industrial enterprise. Our study revealed that in the context of the modern digital transformation of industry, these concepts are mutually penetrating and complementary for two reasons: 1) Big Data being the basis of IoT implementation are not valuable in themselves, since they are characterized by the lack of systematization of huge data arrays presented in different metrics. Big Data gain value in solving specific business problems; 2) The digital transformation of industry determines the shift in the value of the assets of a company towards such a specific asset as Digital Twins. In this regard, IoT should be considered as one of the environments for creating the most valuable asset of companies in a digital economy - Digital Twins. From a methodological point of view, the integration of these concepts allows us to form several intermediate digital standardization forms within the continuum “standardization - technological breakthroughâ€
Security Assurance Cases -- State of the Art of an Emerging Approach
Security Assurance Cases (SAC) are a form of structured argumentation used to
reason about the security properties of a system. After the successful adoption
of assurance cases for safety, SACs are getting significant traction in recent
years, especially in safety-critical industries (e.g., automotive), where there
is an increasing pressure to be compliant with several security standards and
regulations. Accordingly, research in the field of SAC has flourished in the
past decade, with different approaches being investigated. In an effort to
systematize this active field of research, we conducted a systematic literature
review (SLR) of the existing academic studies on SAC. Our review resulted in an
in-depth analysis and comparison of 51 papers. Our results indicate that, while
there are numerous papers discussing the importance of security assurance cases
and their usage scenarios, the literature is still immature with respect to
concrete support for practitioners on how to build and maintain a SAC. More
importantly, even though some methodologies are available, their validation and
tool support is still lacking