9 research outputs found

    Design eines BCM-Dashboards fĂŒr kleine und mittlere Unternehmen

    Get PDF
    Business Continuity Management (BCM) ist definiert als ganzheitlicher Managementprozess, der potenzielle Bedrohungen fĂŒr Organisationen und die Auswirkungen ermittelt, sowie ein GerĂŒst zum Aufbau der Belastbarkeit einer Organisation bereitstellt. Bereits existierende AnsĂ€tze in der Forschung legen den Fokus allerdings auf große Konzerne, wĂ€hrend die Umsetzung eines BCM-Konzepts fĂŒr kleine und mittlere Unternehmen (KMU) oft an den knappen finanziellen und personellen Ressourcen, aber auch an der KomplexitĂ€t des BCM scheitert. Um KMU bei der Implementierung eines an deren BedĂŒrfnisse angepasstem BCM-Systems (BCMS) zu unterstĂŒtzen, gibt es in der Forschung nur wenige LösungsansĂ€tze. Dieser Artikel stellt auf Basis einer empirischen Studie, welche Umsetzungsfaktoren fĂŒr BCM und Anforderungen fĂŒr BCMS untersucht, das prototypische Design eines BCM-Dashboards vor, welches mit wenig Konfigurationsaufwand möglichst relevante externe und interne Gefahrenquellen in einer kompakten ĂŒbersicht darzustellen vermag

    5. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen

    Get PDF
    Im Zentrum dieses Workshops stehen Erkenntnisse zur Mensch-Computer-Interaktion (MCI) in sicherheitskritischen Anwendungsgebieten. Da in solchen Feldern - etwa Katastrophenmanagement, Verkehr, Produktion oder Medizin - MCI eine immer grĂ¶ĂŸere Relevanz erhĂ€lt, sind viele wissenschaftliche Gebiete, unter anderem die Informatik oder Mensch-Maschine Interaktion, zunehmend gefragt. Die Herausforderung besteht darin, bestehende AnsĂ€tze und Methoden zu diskutieren, anzupassen und innovative Lösungen zu entwickeln, die von den Nutzenden sicher und effizient verwendet werden können

    5. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen

    Get PDF
    Im Zentrum dieses Workshops stehen Erkenntnisse zur Mensch-Computer-Interaktion (MCI) in sicherheitskritischen Anwendungsgebieten. Da in solchen Feldern - etwa Katastrophenmanagement, Verkehr, Produktion oder Medizin - MCI eine immer grĂ¶ĂŸere Relevanz erhĂ€lt, sind viele wissenschaftliche Gebiete, unter anderem die Informatik oder Mensch-Maschine Interaktion, zunehmend gefragt. Die Herausforderung besteht darin, bestehende AnsĂ€tze und Methoden zu diskutieren, anzupassen und innovative Lösungen zu entwickeln, die von den Nutzenden sicher und effizient verwendet werden können

    Resiliente Digitalisierung der kritischen Infrastruktur Landwirtschaft - mobil, dezentral, ausfallsicher

    Get PDF
    Diese Arbeit befasst sich mit der zunehmenden Digitalisierung der kritischen Infrastruktur ErnĂ€hrungswirtschaft und setzt den Fokus insbesondere auf die dadurch resultierenden informationstechnologischen Folgen bezĂŒglich der Angriffs- und Ausfallsicherheit in der Landwirtschaft und von ihr abhĂ€ngigen Sektoren. In diesem Kontext wird die Modernisierungen der Landmaschinen und deren Vernetzung sowie das Cloud-Computing in der Landwirtschaft analysiert und zu treffende Maßnahmen bezĂŒglich einer resilienten Struktur erlĂ€utert. In vielen Bereichen wird dabei aufgezeigt, dass das Ausfallrisiko der Produktion zugunsten von Vorteilen wie Ertrags- und QualitĂ€tssteigerung vernachlĂ€ssigt wird. Dieser Beitrag plĂ€diert fĂŒr eine resiliente Digitalisierung in der Landwirtschaft mit gebrauchstauglichen Sicherheitslösungen, um keine zusĂ€tzlichen AufwĂ€nde fĂŒr die Nutzer zu erzeugen und somit die praktische Sicherheit zu erhöhen

    Risk governance in organizations

    Get PDF
    Dieses Buch dokumentiert 10 Jahre Risk-Governance-Forschung an der UniversitĂ€t Siegen. In 50 BeitrĂ€gen reflektieren Forscher und Praktiker Risk Governance vor dem Hintergrund ihrer eigenen Forschungen und/oder Erfahrungen und geben jeweils einen Entwicklungsimpuls fĂŒr die Zukunft der Risk Governance. Das Buch zeigt die große Bandbreite und Tiefe des Forschungsgebietes auf und diskutiert Grundannahmen, Implementierungsfragen, die Rolle der Risk Governance als Transformationsmotor, ihre Wirkung in den verschiedenen betrieblichen Funktionen, Entwicklungsperspektiven und den Beitrag der Risk Governance zu einer nachhaltigen Ausrichtung von Unternehmen.This book documents 10 years of risk governance research at the University of Siegen. In 50 contributions, researchers and practitioners reflect on risk governance against the background of their own research and/or experience and provide a development impetus for the future of risk governance. The book shows the wide range and depth of the research field and discusses basic assumptions, implementation issues, the role of risk governance as transformation engine, its impact in the various operational functions, development perspectives, and the contribution of risk governance to a sustainable orientation of companies

    Design eines BCM-Dashboards fĂŒr kleine und mittlere Unternehmen

    No full text
    Business Continuity Management (BCM) ist definiert als ganzheitlicher Managementprozess, der poten-zielle Bedrohungen fĂŒr Organisationen und die Auswirkungen ermittelt, sowie ein GerĂŒst zum Aufbau der Belastbarkeit einer Organisation bereitstellt. Bereits existierende AnsĂ€tze in der Forschung legen den Fokus allerdings auf große Konzerne, wĂ€hrend die Umsetzung eines BCM-Konzepts fĂŒr kleine und mittlere Unternehmen (KMU) oft an den knappen finanziellen und personellen Ressourcen, aber auch an der KomplexitĂ€t des BCM scheitert. Um KMU bei der Implementierung eines an deren BedĂŒrfnisse angepasstem BCM-Systems (BCMS) zu unterstĂŒtzen, gibt es in der Forschung nur wenige Lösungsan-sĂ€tze. Dieser Artikel stellt auf Basis einer empirischen Studie, welche Umsetzungsfaktoren fĂŒr BCM und Anforderungen fĂŒr BCMS untersucht, das prototypische Design eines BCM-Dashboards vor, welches mit wenig Konfigurationsaufwand möglichst relevante externe und interne Gefahrenquellen in einer kom-pakten ĂŒbersicht darzustellen vermag

    Information Refinement Technologies for Crisis Informatics: User Expectations and Design Implications for Social Media and Mobile Apps in Crises

    Get PDF
    In the past 20 years, mobile technologies and social media have not only been established in everyday life, but also in crises, disasters, and emergencies. Especially large-scale events, such as 2012 Hurricane Sandy or the 2013 European Floods, showed that citizens are not passive victims but active participants utilizing mobile and social information and communication technologies (ICT) for crisis response (Reuter, Hughes, et al., 2018). Accordingly, the research field of crisis informatics emerged as a multidisciplinary field which combines computing and social science knowledge of disasters and is rooted in disciplines such as human-computer interaction (HCI), computer science (CS), computer supported cooperative work (CSCW), and information systems (IS). While citizens use personal ICT to respond to a disaster to cope with uncertainty, emergency services such as fire and police departments started using available online data to increase situational awareness and improve decision making for a better crisis response (Palen & Anderson, 2016). When looking at even larger crises, such as the ongoing COVID-19 pandemic, it becomes apparent the challenges of crisis informatics are amplified (Xie et al., 2020). Notably, information is often not available in perfect shape to assist crisis response: the dissemination of high-volume, heterogeneous and highly semantic data by citizens, often referred to as big social data (Olshannikova et al., 2017), poses challenges for emergency services in terms of access, quality and quantity of information. In order to achieve situational awareness or even actionable information, meaning the right information for the right person at the right time (Zade et al., 2018), information must be refined according to event-based factors, organizational requirements, societal boundary conditions and technical feasibility. In order to research the topic of information refinement, this dissertation combines the methodological framework of design case studies (Wulf et al., 2011) with principles of design science research (Hevner et al., 2004). These extended design case studies consist of four phases, each contributing to research with distinct results. This thesis first reviews existing research on use, role, and perception patterns in crisis informatics, emphasizing the increasing potentials of public participation in crisis response using social media. Then, empirical studies conducted with the German population reveal positive attitudes and increasing use of mobile and social technologies during crises, but also highlight barriers of use and expectations towards emergency services to monitor and interact in media. The findings led to the design of innovative ICT artefacts, including visual guidelines for citizens’ use of social media in emergencies (SMG), an emergency service web interface for aggregating mobile and social data (ESI), an efficient algorithm for detecting relevant information in social media (SMO), and a mobile app for bidirectional communication between emergency services and citizens (112.social). The evaluation of artefacts involved the participation of end-users in the application field of crisis management, pointing out potentials for future improvements and research potentials. The thesis concludes with a framework on information refinement for crisis informatics, integrating event-based, organizational, societal, and technological perspectives

    Technology Assessment of Dual-Use ICTs - How to Assess Diffusion, Governance and Design

    Get PDF
    Technologies that can be used in military and civilian applications are referred to as dual-use. The dual-use nature of many information and communications technologies (ICTs) raises new questions for research and development for national, international, and human security. Measures to deal with the risks associated with the various dual-use technologies, including proliferation control, design approaches, and policy measures, vary widely. For example, Autonomous Weapon Systems (AWS) have not yet been regulated, while cryptographic products are subject to export and import controls. Innovations in artificial intelligence (AI), robotics, cybersecurity, and automated analysis of publicly available data raise new questions about their respective dual-use risks. Dual-use risks have been systematically discussed so far, especially in the life sciences, which have contributed to the development of methods for assessment and risk management. Dual-use risks arise, among other things, from the fact that safety-critical technologies can be easily disseminated or modified, as well as used as part of a weapon system. Therefore, the development and adaptation of robots and software requires an independent consideration that builds on the insights of related dual-use discourses. Therefore, this dissertation considers the management of such risks in terms of the proliferation, regulation, and design of individual dual-use information technologies. Technology Assessment (TA) is the epistemological framework for this work, bringing together the concepts and approaches of Critical Security Studies (CSS) and Human-Computer Interaction (HCI) to help evaluate and shape dual-use technologies. In order to identify the diffusion of dual-use at an early stage, the dissertation first examines the diffusion of dual-use innovations between civilian and military research in expert networks on LinkedIn, as well as on the basis of AI patents in a patent network. The results show low diffusion and tend to confirm existing studies on diffusion in patent networks. In the following section, the regulation of dual-use technologies is examined in the paper through two case studies. The first study uses a discourse analysis to show the value conflicts with regard to the regulation of autonomous weapons systems using the concept of Meaningful Human Control (MHC), while a second study, as a long-term comparative case study, analyzes the change and consequences of the regulation of strong cryptography in the U.S. as well as the programs of intelligence agencies for mass surveillance. Both cases point to the central role of private companies, both in the production of AWS and as intermediaries for the dissemination of encryption, as well as surveillance intermediaries. Subsequently, the dissertation examines the design of a dual-use technology using an Open Source Intelligence System (OSINT) for cybersecurity. For this purpose, conceptual, empirical, and technical studies are conducted as part of the Value-Sensitive Design (VSD) framework. During the studies, implications for research on and design of OSINT were identified. For example, the representative survey of the German population has shown that transparency of use while reducing mistrust is associated with higher acceptance of such systems. Additionally, it has been shown that data sparsity through the use of expert networks has many positive effects, not only improving the performance of the system, but is also preferable for legal and social reasons. Thus, the work contributes to the understanding of specific dual-use risks of AI, the regulation of AWS and cryptography, and the design of OSINT in cybersecurity. By combining concepts from CSS and participatory design methods in HCI, this work provides an interdisciplinary and multi-method contribution
    corecore