60,081 research outputs found
Visualization in cyber-geography: reconsidering cartography's concept of visualization in current usercentric cybergeographic cosmologies
This article discusses some epistemological problems of a semiotic and cybernetic
character in two current scientific cosmologies in the study of geographic
information systems (GIS) with special reference to the concept of visualization in
modern cartography.
Setting off from Michael Battyâs prolegomena for a virtual geography and Michael
Goodchildâs âHuman-Computer-Reality-Interactionâ as the field of a new media
convergence and networking of GIS-computation of geo-data, the paper outlines
preliminarily a common field of study, namely that of cybernetic geography, or just
âcyber-geography) owing to the principal similarities with second order cybernetics.
Relating these geographical cosmologies to some of Scienceâs dominant, historical
perceptions of the exploring and appropriating of Nature as an âinventory of
knowledgeâ, the article seeks to identify some basic ontological and epistemological
dimensions of cybernetic geography and visualization in modern cartography.
The points made is that a generalized notion of visualization understood as the use of
maps, or more precisely as cybergeographic GIS-thinking seems necessary as an
epistemological as well as a methodological prerequisite to scientific knowledge in
cybergeography. Moreover do these generalized concept seem to lead to a
displacement of the positions traditionally held by the scientist and lay-man citizen,
that is not only in respect of the perception of the matter studied, i.e. the field of
geography, but also of the manner in which the scientist informs the lay-man citizen
in the course of action in the public participation in decision making; a displacement
that seems to lead to a more critical, or perhaps even quasi-scientific approach as
concerns the lay-man user
On the complexity of collaborative cyber crime investigations
This article considers the challenges faced by digital evidence specialists when collaborating with other specialists and agencies in other jurisdictions when investigating cyber crime. The opportunities, operational environment and modus operandi of a cyber criminal are considered, with a view to developing the skills and procedural support that investigators might usefully consider in order to respond more effectively to the investigation of cyber crimes across State boundaries
Moving from a "human-as-problem" to a "human-as-solution" cybersecurity mindset
Cybersecurity has gained prominence, with a number of widely publicised security incidents, hacking attacks and data breaches reaching the news over the last few years. The escalation in the numbers of cyber incidents shows no sign of abating, and it seems appropriate to take a look at the way cybersecurity is conceptualised and to consider whether there is a need for a mindset change.To consider this question, we applied a "problematization" approach to assess current conceptualisations of the cybersecurity problem by government, industry and hackers. Our analysis revealed that individual human actors, in a variety of roles, are generally considered to be "a problem". We also discovered that deployed solutions primarily focus on preventing adverse events by building resistance: i.e. implementing new security layers and policies that control humans and constrain their problematic behaviours. In essence, this treats all humans in the system as if they might well be malicious actors, and the solutions are designed to prevent their ill-advised behaviours. Given the continuing incidences of data breaches and successful hacks, it seems wise to rethink the status quo approach, which we refer to as "Cybersecurity, Currently". In particular, we suggest that there is a need to reconsider the core assumptions and characterisations of the well-intentioned human's role in the cybersecurity socio-technical system. Treating everyone as a problem does not seem to work, given the current cyber security landscape.Benefiting from research in other fields, we propose a new mindset i.e. "Cybersecurity, Differently". This approach rests on recognition of the fact that the problem is actually the high complexity, interconnectedness and emergent qualities of socio-technical systems. The "differently" mindset acknowledges the well-intentioned human's ability to be an important contributor to organisational cybersecurity, as well as their potential to be "part of the solution" rather than "the problem". In essence, this new approach initially treats all humans in the system as if they are well-intentioned. The focus is on enhancing factors that contribute to positive outcomes and resilience. We conclude by proposing a set of key principles and, with the help of a prototypical fictional organisation, consider how this mindset could enhance and improve cybersecurity across the socio-technical system
Recommended from our members
Applying the Full Protection and Security Standard of International Investment Law to Digital Assets
This article considers the possibility that digital assets of foreign investors such as websites and computer systems could be protected by the full protection and security (âFPSâ) standard common to many bilateral investment treaties. Such assets can properly be described as investments and the flexible nature of the FPS standard observed in recent arbitration practice could be extended to cover civil disturbances such as 'cyber attacks' against companies. The article considers host state liability with respect to the prevention of harm to digital assets as well as failure to enforce laws that prohibit it. The lack of governmental control over websites suggests that it would be difficult to ascribe state liability under an FPS clause, except possibly in situations of large scale internet infrastructure collapse. A duty to prosecute attacks against digital assets, while common to many jurisdictions and seen in international instruments, is inappropriate as an investment treaty claim because of difficulties in compensation. The FPS standard further appears to incorporate a degree of contextual proportionality linked to the host stateâs resources and this may prevent successful claims against Developing States where many cyber attacks occur
Federated Embedded Systems â a review of the literature in related fields
This report is concerned with the vision of smart interconnected objects, a vision that has attracted much attention lately. In this paper, embedded, interconnected, open, and heterogeneous control systems are in focus, formally referred to as Federated Embedded Systems. To place FES into a context, a review of some related research directions is presented. This review includes such concepts as systems of systems, cyber-physical systems, ubiquitous
computing, internet of things, and multi-agent systems. Interestingly, the reviewed fields seem to overlap with each other in an increasing number of ways
Thoughts about a General Theory of Influence in a DIME/PMESII/ASCOP/IRC2 Model
The leading question of this paper is: âHow would influence warfare (âiWarâ) work and how can we simulate it?â The paper discusses foundational aspects of a theory and model of influence warfare by discussing a framework built along the DIME/PMESII/ASCOP dimension forming a prism with three axes. The DIME concept groups the many instruments of power a nation state can muster into four categories: Diplomacy, Information, Military and Economy. PMESII describes the operational environment in six domains: Political, Military, Economic, Social, Information and Infrastructure. ASCOPE is used in counter insurgency (COIN) environments to analyze the cultural and human environment (aka the âhuman terrainâ) and encompasses Areas, Structures, Capabilities, Organization, People and Events. In addition, the model reflects about aspects of information collection requirements (ICR) and information capabilities requirements (ICR) - hence DIME/PMESII/ASCOP/ICR2. This model was developed from an influence wargame that was conducted in October 2018. This paper introduces basic methodical questions around model building in general and puts a special focus on building a framework for the problem space of influence/information/hybrid warfare takes its shape in. The article tries to describe mechanisms and principles in the information/influence space using cross discipline terminology (e.g. physics, chemistry and literature). On a more advanced level this article contributes to the Human, Social, Culture, Behavior (HSCB) models and community. One goal is to establish an academic, multinational and whole of government influence wargamer community. This paper introduces the idea of the perception field understood as a molecule of a story or narrative that influences an observer. This molecule can be drawn as a selection of vectors that can be built inside the DIME/PMESII/ASCOP prism. Each vector can be influenced by a shielding or shaping action. These ideas were explored in this influence wargame
Mapping Big Data into Knowledge Space with Cognitive Cyber-Infrastructure
Big data research has attracted great attention in science, technology,
industry and society. It is developing with the evolving scientific paradigm,
the fourth industrial revolution, and the transformational innovation of
technologies. However, its nature and fundamental challenge have not been
recognized, and its own methodology has not been formed. This paper explores
and answers the following questions: What is big data? What are the basic
methods for representing, managing and analyzing big data? What is the
relationship between big data and knowledge? Can we find a mapping from big
data into knowledge space? What kind of infrastructure is required to support
not only big data management and analysis but also knowledge discovery, sharing
and management? What is the relationship between big data and science paradigm?
What is the nature and fundamental challenge of big data computing? A
multi-dimensional perspective is presented toward a methodology of big data
computing.Comment: 59 page
- âŠ