1,647 research outputs found

    Cyberwar: Clausewitzian Encounters

    Get PDF
    As Clausewitz’s masterpiece suggests, language matters for how states conceptualize and plan for war. ‘Cyberwar’, now on the lips of nearly every national security policymaker, may turn out to be a misnomer

    Blockchain Initiatives for Tax Administration

    Get PDF
    A thriving body of literature discusses various legal issues related to blockchain, but often it mixes the discussion about blockchain with cryptocurrency. However, blockchain is not the same as cryptocurrency. Defined as a decentralized, immutable, peer-to-leer ledger technology, blockchain is a newly emerging data management system. The private sector—including the financial industry and supply chains—and the public sector—property records, public health, voting, and compliance, have all begun to utilize blockchain. Since more data is processed remotely, and thus digitally, the evolution of blockchain is gaining stronger momentum. While scholarship on blockchain is growing, none of the scholarship has considered the impact of blockchain on the tax sector. This Article extends the study of blockchain to tax administration, evaluates the feasibility of incorporating blockchain within existing tax administrations, and provides policymakers with criteria to consider and some recommended designs for blockchain. Blockchain can enhance the efficiency and transparency of tax administration through its ability to deliver reliable, real-time information from many sources to a large audience. Further, a well-designed private consortium blockchain, evolved from the classic public blockchain, may effectively protect taxpayers\u27 information. Potential areas that blockchain could enhance are payroll taxes, withholding taxes, value added taxes, transfer pricing, the sharing of information between federal, state, and local governments as well as countries. This Article offers normative considerations for policymakers deliberating blockchain initiatives for tax administration, such as timeline, standardization, its integration with other systems, its limitations, and the accompanying legislation to regulate the government and the taxpayer’s rights and privacy. Those implications may resonate with a broader audience beyond tax policymakers

    HCI in e-Government and e-Democracy

    Full text link
    This chapter introduces the application of HCI design processes and design principles in e-government and e-democracy. We elaborate on HCI design processes and six HCI design principles in the context of e-government and e-democracy, including citizen-centered design, usability, accessibility, access to information, transaction efficiency, and security and privacy. Then, we present two cases to demonstrate the value of applying the HCI processes and design principles in developing and deploying e-government and e-democracy. Finally, we highlight the challenges faced by e-government and e-democracy as well as the future trends. In conclusion, HCI can help the success of e-government and e-democracy and their future growth

    A secure and intelligent framework for vehicle health monitoring exploiting big-data analytics

    Get PDF
    This is an accepted manuscript of an article published by IEEE in IEEE Transactions on Intelligent Transportation Systems on 04/01/2022. Available online: https://doi.org/10.1109/TITS.2021.3138255 The accepted version of the publication may differ from the final published version.The dependency on vehicles is increasing tremendously due to its excellent transport capacity, fast, efficient, flexible, pleasant journey, minimal physical effort, and substantial economic impact. As a result, the demand for smart and intelligent feature enhancement is growing and becoming a prime concern for maximum productivity based on the current perspective. In this case, the Internet of Everything (IoE) is an emerging concept that can play an essential role in the automotive industry by integrating the stakeholders, process, data, and things via networked connections. But the unavailability of intelligent features leads to negligence about proper maintenance of vehicle vulnerable parts, reckless driving and severe accident, lack of instructive driving, and improper decision, which incurred extra expenses for maintenance besides hindering national economic growth. For this, we proposed a conceptual framework for a central VHMS exploiting IoE-driven Multi-Layer Heterogeneous Networks (HetNet) and a machine learning technique to oversee individual vehicle health conditions, notify the respective owner driver real-timely and store the information for further necessary action. This article transparently portrayed an overview of central VHMS and proposed the taxonomy to achieve such an objective. Subsequently, we unveiled the framework for central VHMS, IoE-driven Multi-tire HetNet, with a secure and trustworthy data collection and analytics system. Finally, anticipating this proposition’s outcome is immense in the automotive sector. It may motivate the researcher to develop a central intelligent and secure vehicular condition diagnostic system to move this sector towards Industry 4.0.The authors would like to thank University Malaysia Pahang for providing the laboratory facilities and financial support under the University FLAGSHIP Research Grants (Project number RDU192203), International Matching Grant (No. RDU192704), and Postgraduate Research Scheme Grant (No. PGRS200325)

    A Systematic Literature Review on Automotive Digital Forensics: Challenges, Technical Solutions and Data Collection

    Get PDF
    A modern vehicle has a complex internal architecture and is wirelessly connected to the Internet, other vehicles, and the infrastructure. The risk of cyber attacks and other criminal incidents along with recent road accidents caused by autonomous vehicles calls for more research on automotive digital forensics. Failures in automated driving functions can be caused by hardware and software failures and cyber security issues. Thus, it is imperative to be able to determine and investigate the cause of these failures, something which requires trustable data. However, automotive digital forensics is a relatively new field for the automotive where most existing self-monitoring and diagnostic systems in vehicles only monitor safety-related events. To the best of our knowledge, our work is the first systematic literature review on the current research within this field. We identify and assess over 300 papers published between 2006 - 2021 and further map the relevant papers to different categories based on identified focus areas to give a comprehensive overview of the forensics field and the related research activities. Moreover, we identify forensically relevant data from the literature, link the data to categories, and further map them to required security properties and potential stakeholders. Our categorization makes it easy for practitioners and researchers to quickly find relevant work within a particular sub-field of digital forensics. We believe our contributions can guide digital forensic investigations in automotive and similar areas, such as cyber-physical systems and smart cities, facilitate further research, and serve as a guideline for engineers implementing forensics mechanisms

    On the Secure and Resilient Design of Connected Vehicles: Methods and Guidelines

    Get PDF
    Vehicles have come a long way from being purely mechanical systems to systems that consist of an internal network of more than 100 microcontrollers and systems that communicate with external entities, such as other vehicles, road infrastructure, the manufacturer’s cloud and external applications. This combination of resource constraints, safety-criticality, large attack surface and the fact that millions of people own and use them each day, makes securing vehicles particularly challenging as security practices and methods need to be tailored to meet these requirements.This thesis investigates how security demands should be structured to ease discussions and collaboration between the involved parties and how requirements engineering can be accelerated by introducing generic security requirements. Practitioners are also assisted in choosing appropriate techniques for securing vehicles by identifying and categorising security and resilience techniques suitable for automotive systems. Furthermore, three specific mechanisms for securing automotive systems and providing resilience are designed and evaluated. The first part focuses on cyber security requirements and the identification of suitable techniques based on three different approaches, namely (i) providing a mapping to security levels based on a review of existing security standards and recommendations; (ii) proposing a taxonomy for resilience techniques based on a literature review; and (iii) combining security and resilience techniques to protect automotive assets that have been subject to attacks. The second part presents the design and evaluation of three techniques. First, an extension for an existing freshness mechanism to protect the in-vehicle communication against replay attacks is presented and evaluated. Second, a trust model for Vehicle-to-Vehicle communication is developed with respect to cyber resilience to allow a vehicle to include trust in neighbouring vehicles in its decision-making processes. Third, a framework is presented that enables vehicle manufacturers to protect their fleet by detecting anomalies and security attacks using vehicle trust and the available data in the cloud
    • …
    corecore