462 research outputs found
Taming âBlack Swansâ: A Schmittian Perspective on State-led Crisis Management
Using a design-thinking approach to state-led crisis management, this thesis seeks to resolve the contemporary problem of Black Swans; that is, crises that are unprecedented, unexpected, unpredictable, and uncertain.Due to their nature and composition, Black Swans cause a significant increase in state fragility (Introduction). Despite this, Black Swans remain understudied within existing literature on crisis management (Chapter One). This thesis argues that Black Swans cause a significant increase in state fragility because the strategies governments and leaders currently use to recognise and contain them are sub-optimal (Chapter Two). A resolution is found by drawing resources from the legal-political theory that Carl Schmitt (1888-1985) developed between 1918 and 1933 (Chapter Three). In particular, Schmittâs concepts of âthe exceptionâ and âsovereign dictatorshipâ are used to devise new strategies that enable governments and leaders to recognise and contain Black Swans optimally (Chapter Four & Chapter Five).This thesis articulates and defends a new way for constitutional states to manage Black Swans. It achieves this end by engaging in an innovative and revealing dialogue between crisis management studies and Schmittian studies (Conclusion). Unlike previous analyses, this thesis establishes that: (i) detailed strategies can be prescribed to manage Black Swans; and (ii) Carl Schmittâs legal-political theory can be used to resolve problems at the forefront of contemporary crisis management
Digitalization and Development
This book examines the diffusion of digitalization and Industry 4.0 technologies in Malaysia by focusing on the ecosystem critical for its expansion. The chapters examine the digital proliferation in major sectors of agriculture, manufacturing, e-commerce and services, as well as the intermediary organizations essential for the orderly performance of socioeconomic agents.
The book incisively reviews policy instruments critical for the effective and orderly development of the embedding organizations, and the regulatory framework needed to quicken the appropriation of socioeconomic synergies from digitalization and Industry 4.0 technologies. It highlights the importance of collaboration between government, academic and industry partners, as well as makes key recommendations on how to encourage adoption of IR4.0 technologies in the short- and long-term.
This book bridges the concepts and applications of digitalization and Industry 4.0 and will be a must-read for policy makers seeking to quicken the adoption of its technologies
NEMISA Digital Skills Conference (Colloquium) 2023
The purpose of the colloquium and events centred around the central role that data plays
today as a desirable commodity that must become an important part of massifying digital
skilling efforts. Governments amass even more critical data that, if leveraged, could
change the way public services are delivered, and even change the social and economic
fortunes of any country. Therefore, smart governments and organisations increasingly
require data skills to gain insights and foresight, to secure themselves, and for improved
decision making and efficiency. However, data skills are scarce, and even more
challenging is the inconsistency of the associated training programs with most curated for
the Science, Technology, Engineering, and Mathematics (STEM) disciplines.
Nonetheless, the interdisciplinary yet agnostic nature of data means that there is
opportunity to expand data skills into the non-STEM disciplines as well.College of Engineering, Science and Technolog
Comparing the Performance of Initial Coin Offerings to Crowdfunded Equity Ventures
Uncertainty in markets increases the likelihood of market failure due to volatility and suboptimal functioning. While initial coin offerings (ICOs) and crowdfunded equity (CFE) offerings may improve functioning in growing markets, there is a lack of knowledge and understanding pertaining to the relative efficiency and behavior of ICO markets compared to CFE markets, potentially perpetuating and thwarting the various communities they are intended to serve. The purpose of this correlational study was to compare a group of ICOs with a group of CFE offerings to identify predictive factors of funding outcomes related to both capital offering types. Efficient market hypothesis was the studyâs theoretical foundation, and analysis of variance was used to answer the research question, which examined whether capital offering type predicted the amount of funds raised while controlling for access to the offering companiesâ secondary control factors: historical financial data, pro forma financial projections, detailed product descriptions, video of product demonstrations, company website, company history, company leadership, and company investors. Relying on a random sample of 115 campaigns (84 ICOs and 31 CFE) from websites ICOdrops.com, localstake.com, fundable.com, and mainvest.com, results showed differences in mean funds raised between CFEs and ICOs (4,756,464, respectively). ANOVA results showed no single secondary control factors and only one two-factor interaction (company leadership and company investors) influenced mean funds raised. This study may contribute to positive social change by informing best practices among market participants including entrepreneurs, regulators, scholars, and investors
Next-Generation Industrial Control System (ICS) Security:Towards ICS Honeypots for Defence-in-Depth Security
The advent of Industry 4.0 and smart manufacturing has led to an increased convergence of traditional manufacturing and production technologies with IP communications. Legacy Industrial Control System (ICS) devices are now exposed to a wide range of previously unconsidered threats, which must be considered to ensure the safe operation of industrial processes. Especially as cyberspace is presenting itself as a popular domain for nation-state operations, including against critical infrastructure. Honeypots are a well-known concept within traditional IT security, and they can enable a more proactive approach to security, unlike traditional systems. More work needs to be done to understand their usefulness within OT and critical infrastructure. This thesis advances beyond current honeypot implementations and furthers the current state-of-the-art by delivering novel ways of deploying ICS honeypots and delivering concrete answers to key research questions within the area. This is done by answering the question previously raised from a multitude of perspectives. We discuss relevant legislation, such as the UK Cyber Assessment Framework, the US NIST Framework for Improving Critical Infrastructure Cybersecurity, and associated industry-based standards and guidelines supporting operator compliance. Standards and guidance are used to frame a discussion on our survey of existing ICS honeypot implementations in the literature and their role in supporting regulatory objectives. However, these deployments are not always correctly configured and might differ from a real ICS. Based on these insights, we propose a novel framework towards the classification and implementation of ICS honeypots. This is underpinned by a study into the passive identification of ICS honeypots using Internet scanner data to identify honeypot characteristics. We also present how honeypots can be leveraged to identify when bespoke ICS vulnerabilities are exploited within the organisational networkâfurther strengthening the case for honeypot usage within critical infrastructure environments. Additionally, we demonstrate a fundamentally different approach to the deployment of honeypots. By deploying it as a deterrent, to reduce the likelihood that an adversary interacts with a real system. This is important as skilled attackers are now adept at fingerprinting and avoiding honeypots. The results presented in this thesis demonstrate that honeypots can provide several benefits to the cyber security of and alignment to regulations within the critical infrastructure environment
Artificial Intelligence and International Conflict in Cyberspace
This edited volume explores how artificial intelligence (AI) is transforming international conflict in cyberspace. Over the past three decades, cyberspace developed into a crucial frontier and issue of international conflict. However, scholarly work on the relationship between AI and conflict in cyberspace has been produced along somewhat rigid disciplinary boundaries and an even more rigid sociotechnical divide â wherein technical and social scholarship are seldomly brought into a conversation. This is the first volume to address these themes through a comprehensive and cross-disciplinary approach. With the intent of exploring the question âwhat is at stake with the use of automation in international conflict in cyberspace through AI?â, the chapters in the volume focus on three broad themes, namely: (1) technical and operational, (2) strategic and geopolitical and (3) normative and legal. These also constitute the three parts in which the chapters of this volume are organised, although these thematic sections should not be considered as an analytical or a disciplinary demarcation
Cybersecurity: Past, Present and Future
The digital transformation has created a new digital space known as
cyberspace. This new cyberspace has improved the workings of businesses,
organizations, governments, society as a whole, and day to day life of an
individual. With these improvements come new challenges, and one of the main
challenges is security. The security of the new cyberspace is called
cybersecurity. Cyberspace has created new technologies and environments such as
cloud computing, smart devices, IoTs, and several others. To keep pace with
these advancements in cyber technologies there is a need to expand research and
develop new cybersecurity methods and tools to secure these domains and
environments. This book is an effort to introduce the reader to the field of
cybersecurity, highlight current issues and challenges, and provide future
directions to mitigate or resolve them. The main specializations of
cybersecurity covered in this book are software security, hardware security,
the evolution of malware, biometrics, cyber intelligence, and cyber forensics.
We must learn from the past, evolve our present and improve the future. Based
on this objective, the book covers the past, present, and future of these main
specializations of cybersecurity. The book also examines the upcoming areas of
research in cyber intelligence, such as hybrid augmented and explainable
artificial intelligence (AI). Human and AI collaboration can significantly
increase the performance of a cybersecurity system. Interpreting and explaining
machine learning models, i.e., explainable AI is an emerging field of study and
has a lot of potentials to improve the role of AI in cybersecurity.Comment: Author's copy of the book published under ISBN: 978-620-4-74421-
Security considerations in the open source software ecosystem
Open source software plays an important role in the software supply chain, allowing stakeholders to
utilize open source components as building blocks in their software, tooling, and infrastructure. But
relying on the open source ecosystem introduces unique challenges, both in terms of security and trust,
as well as in terms of supply chain reliability.
In this dissertation, I investigate approaches, considerations, and encountered challenges of stakeholders in the context of security, privacy, and trustworthiness of the open source software supply
chain. Overall, my research aims to empower and support software experts with the knowledge and
resources necessary to achieve a more secure and trustworthy open source software ecosystem. In the
first part of this dissertation, I describe a research study investigating the security and trust practices
in open source projects by interviewing 27 owners, maintainers, and contributors from a diverse set
of projects to explore their behind-the-scenes processes, guidance and policies, incident handling, and
encountered challenges, finding that participantsâ projects are highly diverse in terms of their deployed
security measures and trust processes, as well as their underlying motivations. More on the consumer
side of the open source software supply chain, I investigated the use of open source components in
industry projects by interviewing 25 software developers, architects, and engineers to understand their
projectsâ processes, decisions, and considerations in the context of external open source code, finding
that open source components play an important role in many of the industry projects, and that most
projects have some form of company policy or best practice for including external code. On the side of
end-user focused software, I present a study investigating the use of software obfuscation in Android
applications, which is a recommended practice to protect against plagiarism and repackaging. The
study leveraged a multi-pronged approach including a large-scale measurement, a developer survey, and
a programming experiment, finding that only 24.92% of apps are obfuscated by their developer, that
developers do not fear theft of their own apps, and have difficulties obfuscating their own apps. Lastly,
to involve end users themselves, I describe a survey with 200 users of cloud office suites to investigate
their security and privacy perceptions and expectations, with findings suggesting that users are generally
aware of basic security implications, but lack technical knowledge for envisioning some threat models.
The key findings of this dissertation include that open source projects have highly diverse security
measures, trust processes, and underlying motivations. That the projectsâ security and trust needs are
likely best met in ways that consider their individual strengths, limitations, and project stage, especially
for smaller projects with limited access to resources. That open source components play an important
role in industry projects, and that those projects often have some form of company policy or best
practice for including external code, but developers wish for more resources to better audit included
components.
This dissertation emphasizes the importance of collaboration and shared responsibility in building and maintaining the open source software ecosystem, with developers, maintainers, end users,
researchers, and other stakeholders alike ensuring that the ecosystem remains a secure, trustworthy, and
healthy resource for everyone to rely on
Comparing the Performance of Initial Coin Offerings to Crowdfunded Equity Ventures
Uncertainty in markets increases the likelihood of market failure due to volatility and suboptimal functioning. While initial coin offerings (ICOs) and crowdfunded equity (CFE) offerings may improve functioning in growing markets, there is a lack of knowledge and understanding pertaining to the relative efficiency and behavior of ICO markets compared to CFE markets, potentially perpetuating and thwarting the various communities they are intended to serve. The purpose of this correlational study was to compare a group of ICOs with a group of CFE offerings to identify predictive factors of funding outcomes related to both capital offering types. Efficient market hypothesis was the studyâs theoretical foundation, and analysis of variance was used to answer the research question, which examined whether capital offering type predicted the amount of funds raised while controlling for access to the offering companiesâ secondary control factors: historical financial data, pro forma financial projections, detailed product descriptions, video of product demonstrations, company website, company history, company leadership, and company investors. Relying on a random sample of 115 campaigns (84 ICOs and 31 CFE) from websites ICOdrops.com, localstake.com, fundable.com, and mainvest.com, results showed differences in mean funds raised between CFEs and ICOs (4,756,464, respectively). ANOVA results showed no single secondary control factors and only one two-factor interaction (company leadership and company investors) influenced mean funds raised. This study may contribute to positive social change by informing best practices among market participants including entrepreneurs, regulators, scholars, and investors
- âŠ