6 research outputs found
Weak signal identification with semantic web mining
We investigate an automated identification of weak signals according to Ansoff to improve strategic planning and technological forecasting. Literature shows that weak signals can be found in the organization's environment and that they appear in different contexts. We use internet information to represent organization's environment and we select these websites that are related to a given hypothesis. In contrast to related research, a methodology is provided that uses latent semantic indexing (LSI) for the identification of weak signals. This improves existing knowledge based approaches because LSI considers the aspects of meaning and thus, it is able to identify similar textual patterns in different contexts. A new weak signal maximization approach is introduced that replaces the commonly used prediction modeling approach in LSI. It enables to calculate the largest number of relevant weak signals represented by singular value decomposition (SVD) dimensions. A case study identifies and analyses weak signals to predict trends in the field of on-site medical oxygen production. This supports the planning of research and development (R&D) for a medical oxygen supplier. As a result, it is shown that the proposed methodology enables organizations to identify weak signals from the internet for a given hypothesis. This helps strategic planners to react ahead of time
ΠΠ°ΡΠΈΡΠ° ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΈ ΠΎΡ ΡΠΏΠΈΠΎΠ½ΡΠΊΠΈΡ ΠΏΡΠΎΠ³ΡΠ°ΠΌΠΌ
Π ΡΠΎΠ²ΡΠ΅ΠΌΠ΅Π½Π½ΠΎΠΌ ΠΌΠΈΡΠ΅ ΠΌΠ½ΠΎΠ³ΠΎΠ΅ ΡΠ΅ΡΠ°Π΅Ρ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΡ, ΠΈ Π½Π΅ ΡΠΎΠ»ΡΠΊΠΎ Π½Π°Ρ
ΠΎΠ΄ΡΡΠ°ΡΡΡ Π½Π° ΠΊΠΎΠΌΠΏΡΡΡΠ΅ΡΠ°Ρ
ΡΠ°Π·Π»ΠΈΡΠ½ΡΡ
ΠΊΠΎΠΌΠΏΠ°Π½ΠΈΠΉ, Π½ΠΎ ΠΈ Ρ ΠΏΡΠΎΡΡΡΡ
ΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΠ΅Π»Π΅ΠΉ. ΠΡΠΎ ΠΌΠΎΠ³ΡΡ Π±ΡΡΡ ΠΏΠ°ΡΠΎΠ»ΠΈ, Π°Π΄ΡΠ΅ΡΠ° ΡΠ»Π΅ΠΊΡΡΠΎΠ½Π½ΠΎΠΉ ΠΏΠΎΡΡΡ, Π»ΠΈΡΠ½Π°Ρ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΡ ΠΈ Ρ.Π΄. ΠΠ»Ρ ΠΌΠ½ΠΎΠ³ΠΈΡ
ΡΠΈΡΠΌ ΡΠ°ΠΊΠΈΠ΅ Π΄Π°Π½Π½ΡΠ΅ ΠΏΡΠ΅Π΄ΡΡΠ°Π²Π»ΡΡΡ Π±ΠΎΠ»ΡΡΠΎΠΉ ΠΈΠ½ΡΠ΅ΡΠ΅Ρ. Π£ΠΏΡΠΎΡΠ°Π΅Ρ ΡΠ±ΠΎΡ ΡΡΠΈΡ
ΡΠ²Π΅Π΄Π΅Π½ΠΈΠΉ ΠΏΠΎΡΠ²Π»Π΅Π½ΠΈΠ΅ Π±ΠΎΠ»ΡΡΠΎΠ³ΠΎ ΠΊΠΎΠ»ΠΈΡΠ΅ΡΡΠ²Π° ΡΠΏΠΈΠΎΠ½ΡΠΊΠΈΡ
ΠΏΡΠΎΠ³ΡΠ°ΠΌΠΌ, Π² ΡΠΎΠΌ ΡΠΈΡΠ»Π΅ ΠΈ Π²ΡΠ΅Π΄ΠΎΠ½ΠΎΡΠ½ΡΡ
, ΠΊΠΎΡΠΎΡΡΠ΅ Π½Π°ΡΠΈΠ½Π°ΡΡ ΡΠ»Π΅Π΄ΠΈΡΡ Π·Π° ΠΊΠ°ΠΆΠ΄ΡΠΌ Π½Π°ΡΠΈΠΌ Π΄Π΅ΠΉΡΡΠ²ΠΈΠ΅ΠΌ. Π ΡΡΠΎΠΉ ΡΡΠ°ΡΡΠ΅ ΡΠ°ΡΡΠΌΠΎΡΡΠ΅Π½Ρ ΠΎΡΠ½ΠΎΠ²Π½ΡΠ΅ ΠΌΠ΅ΡΠΎΠ΄Ρ Π·Π°ΡΠΈΡΡ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΈ ΠΎΡ ΠΏΡΠΎΠ³ΡΠ°ΠΌΠΌ-ΡΠΏΠΈΠΎΠ½ΠΎΠ².In the modern world, much is decided by the means of information, not only located in the computers of various companies, but also among ordinary users. Passwords, e-mail addresses, personal information are the most important issues of information security. For many companies such data are of great interest. The collection of this type of information is simplified by the appearance of a large number of spyware programs, including malicious ones, which begin to monitor our every action. This paper describes main methods of protecting information from spyware
Role of Governance in Achieving Sustainable Cybersecurity for Business Corporations
The study discusses the role of governance in the sustainability of cybersecurity for business corporations. Its objectives focus on tracking technology developments and their impact on industrial espionage attacks and theft of industrial intellectual property. It also identifies the indicators and effects of such espionage and theft on business corporations. The study is based on the content analysis methodology for analyzing intellectual production pertinent to cybersecurity governance and industrial cyber espionage. The study concludes that relying on information and communication technology without adopting a cybersecurity integrated approach including technical, organizational, and social measures leads to the disclosure of a corporationβs trade secrets by unauthorized persons. Moreover, loss of competitive advantage and damage to the corporateβs financial affairs and reputation may occur. The most important indicators of the study predicting dangers affecting business corporations are the absence of a strategic plan for cybersecurity, inefficient programs for training and cybersecurity awareness, and a lack of secure infrastructure. The vulnerability of business corporations to breaches has many implications. The study shows that cybersecurity governance in turn prepares the corporation to encounter risks targeting its trade secrets. The study finds that there are three integrated elements processes, technology, and persons, for establishing an effective cybersecurity governance program. Accordingly, the main aspects of cybersecurity governance can be employed. The study highlights a range of challenges that business corporations may face when implementing the cybersecurity governance program. These challenges are related to cybersecurity strategy, unified processes, implementation and accountability, senior leadership control, and resources
Mitigating the Risk of Knowledge Leakage in Knowledge Intensive Organizations: a Mobile Device Perspective
In the current knowledge economy, knowledge represents the most strategically
significant resource of organizations. Knowledge-intensive activities advance
innovation and create and sustain economic rent and competitive advantage. In
order to sustain competitive advantage, organizations must protect knowledge
from leakage to third parties, particularly competitors. However, the number
and scale of leakage incidents reported in news media as well as industry
whitepapers suggests that modern organizations struggle with the protection of
sensitive data and organizational knowledge. The increasing use of mobile
devices and technologies by knowledge workers across the organizational
perimeter has dramatically increased the attack surface of organizations, and
the corresponding level of risk exposure. While much of the literature has
focused on technology risks that lead to information leakage, human risks that
lead to knowledge leakage are relatively understudied. Further, not much is
known about strategies to mitigate the risk of knowledge leakage using mobile
devices, especially considering the human aspect. Specifically, this research
study identified three gaps in the current literature (1) lack of in-depth
studies that provide specific strategies for knowledge-intensive organizations
based on their varied risk levels. Most of the analysed studies provide
high-level strategies that are presented in a generalised manner and fail to
identify specific strategies for different organizations and risk levels. (2)
lack of research into management of knowledge in the context of mobile devices.
And (3) lack of research into the tacit dimension of knowledge as the majority
of the literature focuses on formal and informal strategies to protect explicit
(codified) knowledge.Comment: The University of Melbourne PhD Thesi
Protecting research and technology from espionage
In recent years, governmental and industrial espionage becomes an increased problem for governments and corporations. Especially information about current technology development and research activities are interesting targets for espionage. Thus, we introduce a new and automated methodology that investigates the information leakage risk of projects in research and technology (R&T) processed by an organization concerning governmental or industrial espionage. Latent semantic indexing is applied together with machine based learning and prediction modeling. This identifies semantic textual patterns representing technologies and their corresponding application fields that are of high relevance for the organization's strategy. These patterns are used to estimate organization's costs of an information leakage for each project. Further, a web mining approach is processed to identify worldwide knowledge distribution within the relevant technologies and corresponding application fields. This information is used to estimate the probability that an information leakage occur. A risk assessment methodology calculates the information leakage risk for each project. In a case study, the information leakage risk of defense based R&T projects is investigated. This is because defense based R&T is of particularly interest by espionage agents. Overall, it can be shown that the proposed methodology is successful in calculation the espionage information leakage risk of projects. This supports an organization by processing espionage risk management