163 research outputs found
Methodology for Designing Decision Support Systems for Visualising and Mitigating Supply Chain Cyber Risk from IoT Technologies
This paper proposes a methodology for designing decision support systems for
visualising and mitigating the Internet of Things cyber risks. Digital
technologies present new cyber risk in the supply chain which are often not
visible to companies participating in the supply chains. This study
investigates how the Internet of Things cyber risks can be visualised and
mitigated in the process of designing business and supply chain strategies. The
emerging DSS methodology present new findings on how digital technologies
affect business and supply chain systems. Through epistemological analysis, the
article derives with a decision support system for visualising supply chain
cyber risk from Internet of Things digital technologies. Such methods do not
exist at present and this represents the first attempt to devise a decision
support system that would enable practitioners to develop a step by step
process for visualising, assessing and mitigating the emerging cyber risk from
IoT technologies on shared infrastructure in legacy supply chain systems
Design and Evaluation of Product Aesthetics: A Human-Machine Hybrid Approach
Aesthetics are critically important to market acceptance in many product
categories. In the automotive industry in particular, an improved aesthetic
design can boost sales by 30% or more. Firms invest heavily in designing and
testing new product aesthetics. A single automotive "theme clinic" costs
between \$100,000 and \$1,000,000, and hundreds are conducted annually. We use
machine learning to augment human judgment when designing and testing new
product aesthetics. The model combines a probabilistic variational autoencoder
(VAE) and adversarial components from generative adversarial networks (GAN),
along with modeling assumptions that address managerial requirements for firm
adoption. We train our model with data from an automotive partner-7,000 images
evaluated by targeted consumers and 180,000 high-quality unrated images. Our
model predicts well the appeal of new aesthetic designs-38% improvement
relative to a baseline and substantial improvement over both conventional
machine learning models and pretrained deep learning models. New automotive
designs are generated in a controllable manner for the design team to consider,
which we also empirically verify are appealing to consumers. These results,
combining human and machine inputs for practical managerial usage, suggest that
machine learning offers significant opportunity to augment aesthetic design
Under the corporate radar: examining insider business cybercrime victimization through an application of routine activities theory
Cybercrime is recognized as one of the top threats to UK economic security. On a daily basis, the computer networks of businesses suffer security breaches. A less explored dimension of this problem is cybercrimes committed by insiders. This paper provides a criminological analysis of corporate insider victimization. It begins by presenting reviews of insider criminal threats and routine activities theory as applied to cybercrime. Analysis of the nationally representative Cardiff University UK Business Cybercrime Survey then informs statistical models that predict the likelihood of businesses suffering insider cyber victimization, using routine activities and guardianship measures as predictors
Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems, cyber risk at the edge
The Internet of Things (IoT) triggers new types of cyber risks. Therefore,
the integration of new IoT devices and services requires a self-assessment of
IoT cyber security posture. By security posture this article refers to the
cybersecurity strength of an organisation to predict, prevent and respond to
cyberthreats. At present, there is a gap in the state of the art, because there
are no self-assessment methods for quantifying IoT cyber risk posture. To
address this gap, an empirical analysis is performed of 12 cyber risk
assessment approaches. The results and the main findings from the analysis is
presented as the current and a target risk state for IoT systems, followed by
conclusions and recommendations on a transformation roadmap, describing how IoT
systems can achieve the target state with a new goal-oriented dependency model.
By target state, we refer to the cyber security target that matches the generic
security requirements of an organisation. The research paper studies and adapts
four alternatives for IoT risk assessment and identifies the goal-oriented
dependency modelling as a dominant approach among the risk assessment models
studied. The new goal-oriented dependency model in this article enables the
assessment of uncontrollable risk states in complex IoT systems and can be used
for a quantitative self-assessment of IoT cyber risk posture
Impact and key challenges of insider threats on organizations and critical businesses
The insider threat has consistently been identified as a key threat to organizations and governments. Understanding the nature of insider threats and the related threat landscape can help in forming mitigation strategies, including non-technical means. In this paper, we survey and highlight challenges associated with the identification and detection of insider threats in both public and private sector organizations, especially those part of a nation’s critical infrastructure. We explore the utility of the cyber kill chain to understand insider threats, as well as understanding the underpinning human behavior and psychological factors. The existing defense techniques are discussed and critically analyzed, and improvements are suggested, in line with the current state-of-the-art cyber security requirements. Finally, open problems related to the insider threat are identified and future research directions are discussed
Universal trapping scaling on the unstable manifold for a collisionless electrostatic mode
An amplitude equation for an unstable mode in a collisionless plasma is
derived from the dynamics on the two-dimensional unstable manifold of the
equilibrium. The mode amplitude decouples from the phase due to the
spatial homogeneity of the equilibrium, and the resulting one-dimensional
dynamics is analyzed using an expansion in . As the linear growth rate
vanishes, the expansion coefficients diverge; a rescaling
of the mode amplitude absorbs these
singularities and reveals that the mode electric field exhibits trapping
scaling as . The dynamics for
depends only on the phase where is the derivative of the dielectric as
.Comment: 11 pages (Latex/RevTex), 2 figures available in hard copy from the
Author ([email protected]); paper accepted by Physical Review
Letter
Nonlinear saturation of electrostatic waves: mobile ions modify trapping scaling
The amplitude equation for an unstable electrostatic wave in a multi-species
Vlasov plasma has been derived. The dynamics of the mode amplitude is
studied using an expansion in ; in particular, in the limit
, the singularities in the expansion coefficients are
analyzed to predict the asymptotic dependence of the electric field on the
linear growth rate . Generically , as
, but in the limit of infinite ion mass or for
instabilities in reflection-symmetric systems due to real eigenvalues the more
familiar trapping scaling is predicted.Comment: 13 pages (Latex/RevTex), 4 postscript encapsulated figures which are
included using the utility "uufiles". They should be automatically included
with the text when it is downloaded. Figures also available in hard copy from
the authors ([email protected]
Cyber risk at the edge: Current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains
Digital technologies have changed the way supply chain operations are structured. In this article, we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber risks. A taxonomic/cladistic approach is used for the evaluations of progress in the area of supply chain integration in the Industrial Internet of Things and Industry 4.0, with a specific focus on the mitigation of cyber risks. An analytical framework is presented, based on a critical assessment with respect to issues related to new types of cyber risk and the integration of supply chains with new technologies. This paper identifies a dynamic and self-adapting supply chain system supported with Artificial Intelligence and Machine Learning (AI/ML) and real-time intelligence for predictive cyber risk analytics. The system is integrated into a cognition engine that enables predictive cyber risk analytics with real-time intelligence from IoT networks at the edge. This enhances capacities and assist in the creation of a comprehensive understanding of the opportunities and threats that arise when edge computing nodes are deployed, and when AI/ML technologies are migrated to the periphery of IoT networks
On Unbounded Composition Operators in -Spaces
Fundamental properties of unbounded composition operators in -spaces are
studied. Characterizations of normal and quasinormal composition operators are
provided. Formally normal composition operators are shown to be normal.
Composition operators generating Stieltjes moment sequences are completely
characterized. The unbounded counterparts of the celebrated Lambert's
characterizations of subnormality of bounded composition operators are shown to
be false. Various illustrative examples are supplied
- …