1,217 research outputs found

    Resilience of the Internet of Things (IoT) from an Information Assurance (IA) Perspective

    Get PDF
    Internet infrastructure developments and the rise of the IoT Socio-Technical Systems (STS) have frequently generated more unsecure protocols to facilitate the rapid intercommunication between the plethoras of IoT devices. Whereas, current development of the IoT has been mainly focused on enabling and effectively meeting the functionality requirement of digital-enabled enterprises we have seen scant regard to their IA architecture, marginalizing system resilience with blatant afterthoughts to cyber defence. Whilst interconnected IoT devices do facilitate and expand information sharing; they further increase of risk exposure and potential loss of trust to their Socio-Technical Systems. A change in the IoT paradigm is needed to enable a security-first mind-set; if the trusted sharing of information built upon dependable resilient growth of IoT is to be established and maintained. We argue that Information Assurance is paramount to the success of IoT, specifically its resilience and dependability to continue its safe support for our digital economy

    An information systems security framework for the e-Government Programme of Jordan

    Get PDF
    Any e-government programme provides e-services as one of the most important means by which the interaction between citizens, businesses and governments takes place. This has brought great opportunities but also raises serious cybersecurity challenges. Critical information assets are facing various potential security risks and threats. Information systems security is necessary to mitigate those risks and threats that are faced by the e-government programme and to safeguard the confidentiality, integrity and availability of the available e-services. In light of the above, the aim of this study is to examine how information security is managed and approached within e-government programmes and the case study of the Ministry of ICT in Jordan informs that aim. The study deconstructs information security through the Technical/Formal/Informal (TFI) framework and enriches that framework by customising it for e-government, expanding it also to include citizens’ online trust. To achieve this aim, a qualitative investigation of the Jordanian e-government programme was conducted by following the research design of a case study in the interpretivist tradition. Furthermore, a survey was used as a complementary phase to examine citizens’ perspectives on e-government security. By combining, analysing and reflecting on the empirical data, a consolidated information security framework was developed for different security aspects, based on the TFI model (technical, formal and informal). The dissertation contributes to the knowledge domain at the intersection of e-government and cybersecurity both practically and theoretically, focusing on technical aspects and non-technical aspects as well. The proposed framework provides an overview of the TFI-categorised elements that can help governments reflect on and manage the security challenges of their corresponding e-government programmes

    Security of Big Data in Healthcare Systems

    Get PDF
    As cyber-attacks have become more common and sophisticated, the need for a stable security framework has become essential. Information security requirements must be met by digital technologies utilized in the health care sector. Modern hospitals are becoming increasingly digital, and information and communication technology is becoming an increasingly significant element of the core business. This lays the groundwork for improved patient care quality. At the same time, the health sector's vulnerability to digital attacks and data breaches is growing, and so are the potential negative effects of security breaches. The Norwegian healthcare system is divided into different regions, each with its own set of processes and procedures. Because of the fragmentation, there are substantial communication issues between the many health regions and their systems, making transmitted data vulnerable to threat actors. A reorganization is required to effectively handle this issue and improve the security of healthcare systems. The research was conducted using a qualitative method with a problem-oriented phenomenon-driven research approach on Norwegian Healthcare Sector. In addition, interviews with different security employees from the different health regions in Norway, as well as a document analysis of published papers was done to gather empirical material for the master thesis

    Security of Big Data in Healthcare Systems

    Get PDF
    As cyber-attacks have become more common and sophisticated, the need for a stable security framework has become essential. Information security requirements must be met by digital technologies utilized in the health care sector. Modern hospitals are becoming increasingly digital, and information and communication technology is becoming an increasingly significant element of the core business. This lays the groundwork for improved patient care quality. At the same time, the health sector's vulnerability to digital attacks and data breaches is growing, and so are the potential negative effects of security breaches. The Norwegian healthcare system is divided into different regions, each with its own set of processes and procedures. Because of the fragmentation, there are substantial communication issues between the many health regions and their systems, making transmitted data vulnerable to threat actors. A reorganization is required to effectively handle this issue and improve the security of healthcare systems. The research was conducted using a qualitative method with a problem-oriented phenomenon-driven research approach on Norwegian Healthcare Sector. In addition, interviews with different security employees from the different health regions in Norway, as well as a document analysis of published papers was done to gather empirical material for the master thesis

    Collaborative networks: A pillar of digital transformation

    Get PDF
    UID/EEA/00066/2019 POCI-01-0247-FEDER-033926The notion of digital transformation encompasses the adoption and integration of a variety of new information and communication technologies for the development of more efficient, flexible, agile, and sustainable solutions for industrial systems. Besides technology, this process also involves new organizational forms and leads to new business models. As such, this work addresses the contribution of collaborative networks to such a transformation. An analysis of the collaborative aspects required in the various dimensions of the 4th industrial revolution is conducted based on a literature survey and experiences gained from several research projects. A mapping between the identified collaboration needs and research results that can be adopted from the collaborative networks area is presented. Furthermore, several new research challenges are identified and briefly characterized.publishe

    Emerging issues in IT service management

    Full text link

    D1.1 DEMAND ASSESSMENT FRAMEWORK

    Get PDF
    This report proposes the initial draft of the LeADS ADS Framework composed by three major elements; identification and definition of technologies in scope; skills included under those technologies, and definition of job roles, where other skills frameworks are considered for comparison and alignment. The report summarises the first workshop held by the project with external constituencies even though the feedback will be incorporated in the final version of the framework, where the layer of job roles will be completed, and the others revised according to additional input. This framework serves as reference for the next step in LeADS: the assessment of the demand and the supply

    Scenarios for the development of smart grids in the UK: literature review

    Get PDF
    Smart grids are expected to play a central role in any transition to a low-carbon energy future, and much research is currently underway on practically every area of smart grids. However, it is evident that even basic aspects such as theoretical and operational definitions, are yet to be agreed upon and be clearly defined. Some aspects (efficient management of supply, including intermittent supply, two-way communication between the producer and user of electricity, use of IT technology to respond to and manage demand, and ensuring safe and secure electricity distribution) are more commonly accepted than others (such as smart meters) in defining what comprises a smart grid. It is clear that smart grid developments enjoy political and financial support both at UK and EU levels, and from the majority of related industries. The reasons for this vary and include the hope that smart grids will facilitate the achievement of carbon reduction targets, create new employment opportunities, and reduce costs relevant to energy generation (fewer power stations) and distribution (fewer losses and better stability). However, smart grid development depends on additional factors, beyond the energy industry. These relate to issues of public acceptability of relevant technologies and associated risks (e.g. data safety, privacy, cyber security), pricing, competition, and regulation; implying the involvement of a wide range of players such as the industry, regulators and consumers. The above constitute a complex set of variables and actors, and interactions between them. In order to best explore ways of possible deployment of smart grids, the use of scenarios is most adequate, as they can incorporate several parameters and variables into a coherent storyline. Scenarios have been previously used in the context of smart grids, but have traditionally focused on factors such as economic growth or policy evolution. Important additional socio-technical aspects of smart grids emerge from the literature review in this report and therefore need to be incorporated in our scenarios. These can be grouped into four (interlinked) main categories: supply side aspects, demand side aspects, policy and regulation, and technical aspects.

    Sensor networks and personal health data management: software engineering challenges

    Get PDF
    The advances of 5G, sensors, and information technologies enabled proliferation of smart pervasive sensor networks. 5G mobile networks provide low-power, high-availability, high density, and high-throughput data capturing by sensor networks and continuous streaming of multiple measured variables. Rapid progress in sensors that can measure vital signs, advances in the management of medical knowledge, and improvement of algorithms for decision support, are fueling a technological disruption to health monitoring. The increase in size and complexity of wireless sensor networks and expansion into multiple areas of health monitoring creates challenges for system design and software engineering practices. In this paper, we highlight some of the key software engineering and data-processing issues, along with addressing emerging ethical issues of data management. The challenges associated with ensuring high dependability of sensor network systems can be addressed by metamorphic testing. The proposed conceptual solution combines data streaming, filtering, cross-calibration, use of medical knowledge for system operation and data interpretation, and IoT-based calibration using certified linked diagnostic devices. Integration of blockchain technologies and artificial intelligence offers a solution to the increasing needs for higher accuracy of measurements of vital signs, high-quality decision-making, and dependability, including key medical and ethical requirements of safety and security of the data

    Exploring IoT in Smart Cities: Practices, Challenges and Way Forward

    Full text link
    The rise of Internet of things (IoT) technology has revolutionized urban living, offering immense potential for smart cities in which smart home, smart infrastructure, and smart industry are essential aspects that contribute to the development of intelligent urban ecosystems. The integration of smart home technology raises concerns regarding data privacy and security, while smart infrastructure implementation demands robust networking and interoperability solutions. Simultaneously, deploying IoT in industrial settings faces challenges related to scalability, standardization, and data management. This research paper offers a systematic literature review of published research in the field of IoT in smart cities including 55 relevant primary studies that have been published in reputable journals and conferences. This extensive literature review explores and evaluates various aspects of smart home, smart infrastructure, and smart industry and the challenges like security and privacy, smart sensors, interoperability and standardization. We provide a unified perspective, as we seek to enhance the efficiency and effectiveness of smart cities while overcoming security concerns. It then explores their potential for collective integration and impact on the development of smart cities. Furthermore, this study addresses the challenges associated with each component individually and explores their combined impact on enhancing urban efficiency and sustainability. Through a comprehensive analysis of security concerns, this research successfully integrates these IoT components in a unified approach, presenting a holistic framework for building smart cities of the future. Integrating smart home, smart infrastructure, and smart industry, this research highlights the significance of an integrated approach in developing smart cities
    • …
    corecore