2 research outputs found

    IoT & Digital Twins Concept Integration Effects on Supply Chain Strategy: Challenges and Effects

    Get PDF
    IoT is set to revolutionize the supply chain—both in terms of its operational efficiencies and revenue opportunities—by making it transparent. This paper is devoted to the investigation of the challenges and effects of IoT and Digital Twins integration. The goal is to ensure the formation of a methodological basis for calculating the cumulative effect of the accelerated implementation of digital twins, which should become a source of reserved growth and increase the competitiveness of a modern industrial enterprise. Our study revealed that in the context of the modern digital transformation of industry, these concepts are mutually penetrating and complementary for two reasons: 1) Big Data being the basis of IoT implementation are not valuable in themselves, since they are characterized by the lack of systematization of huge data arrays presented in different metrics. Big Data gain value in solving specific business problems; 2) The digital transformation of industry determines the shift in the value of the assets of a company towards such a specific asset as Digital Twins. In this regard, IoT should be considered as one of the environments for creating the most valuable asset of companies in a digital economy - Digital Twins. From a methodological point of view, the integration of these concepts allows us to form several intermediate digital standardization forms within the continuum “standardization - technological breakthroughâ€

    Security Assurance Cases -- State of the Art of an Emerging Approach

    Full text link
    Security Assurance Cases (SAC) are a form of structured argumentation used to reason about the security properties of a system. After the successful adoption of assurance cases for safety, SACs are getting significant traction in recent years, especially in safety-critical industries (e.g., automotive), where there is an increasing pressure to be compliant with several security standards and regulations. Accordingly, research in the field of SAC has flourished in the past decade, with different approaches being investigated. In an effort to systematize this active field of research, we conducted a systematic literature review (SLR) of the existing academic studies on SAC. Our review resulted in an in-depth analysis and comparison of 51 papers. Our results indicate that, while there are numerous papers discussing the importance of security assurance cases and their usage scenarios, the literature is still immature with respect to concrete support for practitioners on how to build and maintain a SAC. More importantly, even though some methodologies are available, their validation and tool support is still lacking
    corecore