12,178 research outputs found
Innovation-ICT-cybersecurity: The triad relationship and its impact on growth competitiveness
This study examines the global growth competitiveness of countries using the dynamics of growth, ICT, and innovation. It also introduces a new dynamic, cybersecurity, and argues that within a growth competitiveness framework, ICT, innovation, and cybersecurity mechanisms allow some countries to achieve higher ranks on the competitiveness ladder than others. Based on a theoretical framework that encompasses the economic growth model, the complementarity theory, and the international law theory, a model that integrates ICT, innovation, and cybersecurity, depicts the relationships amongst them and with growth competitiveness, and incorporates complementary factors with possible moderating effect is presented. The model proposed relationships are then tested using PLS-PM. The model proves to have adequate goodness-of-fit as well as predictive validity. Results support most hypotheses showing: (1) a positive relationship between ICT and innovation; (2) a positive relationship between each of innovation and ICT with growth competitiveness; (3) a mediating effect of innovation has in the ICT â growth competitiveness relationship; (4) a positive relationship between ICT and innovation on one hand and cybersecurity on the other; (5) a mediating role of cybersecurity in the ICT â growth as well as the innovation â growth relationships; and the (6) moderating effect that human capital has in the above relationships. Cyber threats, however, do not have a moderator role in these relationships. These findings are interpreted in relation to the extant body of knowledge related to ICT, innovation, and cybersecurity. Moreover, the theoretical and the practical implications are discussed and the practical significance is shown. Finally, the study limitations are listed, the recommendations are presented, and the direction for future work is discussed
Attack-Surface Metrics, OSSTMM and Common Criteria Based Approach to âComposable Securityâ in Complex Systems
In recent studies on Complex Systems and Systems-of-Systems theory, a huge effort has been put to cope with behavioral problems, i.e. the possibility of controlling a desired overall or end-to-end behavior by acting on the individual elements that constitute the system itself. This problem is particularly important in the âSMARTâ environments, where the huge number of devices, their significant computational capabilities as well as their tight interconnection produce a complex architecture for which it is difficult to predict (and control) a desired behavior; furthermore, if the scenario is allowed to dynamically evolve through the modification of both topology and subsystems composition, then the control problem becomes a real challenge. In this perspective, the purpose of this paper is to cope with a specific class of control problems in complex systems, the âcomposability of security functionalitiesâ, recently introduced by the European Funded research through the pSHIELD and nSHIELD projects (ARTEMIS-JU programme). In a nutshell, the objective of this research is to define a control framework that, given a target security level for a specific application scenario, is able to i) discover the system elements, ii) quantify the security level of each element as well as its contribution to the security of the overall system, and iii) compute the control action to be applied on such elements to reach the security target. The main innovations proposed by the authors are: i) the definition of a comprehensive methodology to quantify the security of a generic system independently from the technology and the environment and ii) the integration of the derived metrics into a closed-loop scheme that allows real-time control of the system. The solution described in this work moves from the proof-of-concepts performed in the early phase of the pSHIELD research and enrich es it through an innovative metric with a sound foundation, able to potentially cope with any kind of pplication scenarios (railways, automotive, manufacturing, ...)
The future of Cybersecurity in Italy: Strategic focus area
This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management
Great Success that Was on the Brink of Failure: The Case of a Techno-Legal Assemblage in the "Civil Trial On-Line" System in Italy
In the last twenty years, Italy has made massive investments in ICT projects in an attempt to improve the âquality of justiceâ. âMore technologyâ was considered the mantra policy to save justice from a never-ending state of crisis. These huge investments resulted in a highly sophisticated e-justice system, with full dematerialization of the civil justice procedures. However, this success did not take place automatically and without costs, as initially expected
Recommended from our members
Middleware architectures for the smart grid: A survey on the state-of-the-art, taxonomy and main open issues
The integration of small-scale renewable energy sources in the smart grid depends on several challenges that must be overcome. One of them is the presence of devices with very different characteristics present in the grid or how they can interact among them in terms of interoperability and data sharing. While this issue is usually solved by implementing a middleware layer among the available pieces of equipment in order to hide any hardware heterogeneity and offer the application layer a collection of homogenous resources to access lower levels, the variety and differences among them make the definition of what is needed in each particular case challenging. This paper offers a description of the most prominent middleware architectures for the smart grid and assesses the functionalities they have, considering the performance and features expected from them in the context of this application domain
Creating Local Peace Committee: A Participatory Action Research Project in Ojoo
The human society has experienced one form of violence or the other, and there have been efforts at various times and various communities to prevent violence and build peace. A nonviolent conflict intervention approach has gained popularity in recent years, but for most states, the popular approach has been the use of force expressed in the deployment of security agents and their actions in conflict interventions; at best, that often results is negative peace. For an effective conflict intervention and transformation, an approach whose outcome is positive peace is desired. This is where infrastructures for peace such as a local peace committee come to play. It is a cotton-edged approach to conflict intervention and largely defines a bottom-top configuration which often brings to fore the role of insiders cum locals as well as harnesses local resources to promote social change for peace in local communities and society at large. This study explores the idea of a local peace committee, adopts a participatory action research design to build such peace infrastructure and promotes the concepts of such local peace structure in the study area.Key Words: Local Peace Committee, Conflict Resolution, Participatory Action Research Projec
Global dynamic E-marketplaces, and their role in the internet-based economy
Collaboration capabilities are what will most probably create the gap between winners and losers in business-to-business (B2B) commerce. In this context, the electronic marketplace (EM) comes as a medium for trade and collaboration, and a common entry point where partners can share business processes and adopt a decentralized business model fuelled by market evolution. The thesis illustrates the advantages of collaborative business and presents the information technologies that support it. The purpose of this thesis is to educate both the author and the reader on the technology and infrastructure that supports collaborative business and to posit that among the three major information technology infrastructures that enable B2B commerce, the EM model provides significant advantages for individual companies and industries compared to Electronic Data Interchange (EDI) and Peer-to-Peer (P2P). The thesis identifies key tools and value-added services EM\u27s should provide their participants to meet the requirements of modern companies and the Internet-based economy. Finally, the thesis suggests potential impacts of EM\u27s on the modern business ecosystem
- âŠ