163 research outputs found

    Methodology for Designing Decision Support Systems for Visualising and Mitigating Supply Chain Cyber Risk from IoT Technologies

    Full text link
    This paper proposes a methodology for designing decision support systems for visualising and mitigating the Internet of Things cyber risks. Digital technologies present new cyber risk in the supply chain which are often not visible to companies participating in the supply chains. This study investigates how the Internet of Things cyber risks can be visualised and mitigated in the process of designing business and supply chain strategies. The emerging DSS methodology present new findings on how digital technologies affect business and supply chain systems. Through epistemological analysis, the article derives with a decision support system for visualising supply chain cyber risk from Internet of Things digital technologies. Such methods do not exist at present and this represents the first attempt to devise a decision support system that would enable practitioners to develop a step by step process for visualising, assessing and mitigating the emerging cyber risk from IoT technologies on shared infrastructure in legacy supply chain systems

    Design and Evaluation of Product Aesthetics: A Human-Machine Hybrid Approach

    Full text link
    Aesthetics are critically important to market acceptance in many product categories. In the automotive industry in particular, an improved aesthetic design can boost sales by 30% or more. Firms invest heavily in designing and testing new product aesthetics. A single automotive "theme clinic" costs between \$100,000 and \$1,000,000, and hundreds are conducted annually. We use machine learning to augment human judgment when designing and testing new product aesthetics. The model combines a probabilistic variational autoencoder (VAE) and adversarial components from generative adversarial networks (GAN), along with modeling assumptions that address managerial requirements for firm adoption. We train our model with data from an automotive partner-7,000 images evaluated by targeted consumers and 180,000 high-quality unrated images. Our model predicts well the appeal of new aesthetic designs-38% improvement relative to a baseline and substantial improvement over both conventional machine learning models and pretrained deep learning models. New automotive designs are generated in a controllable manner for the design team to consider, which we also empirically verify are appealing to consumers. These results, combining human and machine inputs for practical managerial usage, suggest that machine learning offers significant opportunity to augment aesthetic design

    Under the corporate radar: examining insider business cybercrime victimization through an application of routine activities theory

    Get PDF
    Cybercrime is recognized as one of the top threats to UK economic security. On a daily basis, the computer networks of businesses suffer security breaches. A less explored dimension of this problem is cybercrimes committed by insiders. This paper provides a criminological analysis of corporate insider victimization. It begins by presenting reviews of insider criminal threats and routine activities theory as applied to cybercrime. Analysis of the nationally representative Cardiff University UK Business Cybercrime Survey then informs statistical models that predict the likelihood of businesses suffering insider cyber victimization, using routine activities and guardianship measures as predictors

    Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems, cyber risk at the edge

    Get PDF
    The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture. By security posture this article refers to the cybersecurity strength of an organisation to predict, prevent and respond to cyberthreats. At present, there is a gap in the state of the art, because there are no self-assessment methods for quantifying IoT cyber risk posture. To address this gap, an empirical analysis is performed of 12 cyber risk assessment approaches. The results and the main findings from the analysis is presented as the current and a target risk state for IoT systems, followed by conclusions and recommendations on a transformation roadmap, describing how IoT systems can achieve the target state with a new goal-oriented dependency model. By target state, we refer to the cyber security target that matches the generic security requirements of an organisation. The research paper studies and adapts four alternatives for IoT risk assessment and identifies the goal-oriented dependency modelling as a dominant approach among the risk assessment models studied. The new goal-oriented dependency model in this article enables the assessment of uncontrollable risk states in complex IoT systems and can be used for a quantitative self-assessment of IoT cyber risk posture

    Impact and key challenges of insider threats on organizations and critical businesses

    Get PDF
    The insider threat has consistently been identified as a key threat to organizations and governments. Understanding the nature of insider threats and the related threat landscape can help in forming mitigation strategies, including non-technical means. In this paper, we survey and highlight challenges associated with the identification and detection of insider threats in both public and private sector organizations, especially those part of a nation’s critical infrastructure. We explore the utility of the cyber kill chain to understand insider threats, as well as understanding the underpinning human behavior and psychological factors. The existing defense techniques are discussed and critically analyzed, and improvements are suggested, in line with the current state-of-the-art cyber security requirements. Finally, open problems related to the insider threat are identified and future research directions are discussed

    Universal trapping scaling on the unstable manifold for a collisionless electrostatic mode

    Full text link
    An amplitude equation for an unstable mode in a collisionless plasma is derived from the dynamics on the two-dimensional unstable manifold of the equilibrium. The mode amplitude ρ(t)\rho(t) decouples from the phase due to the spatial homogeneity of the equilibrium, and the resulting one-dimensional dynamics is analyzed using an expansion in ρ\rho. As the linear growth rate γ\gamma vanishes, the expansion coefficients diverge; a rescaling ρ(t)γ2r(γt)\rho(t)\equiv\gamma^2\,r(\gamma t) of the mode amplitude absorbs these singularities and reveals that the mode electric field exhibits trapping scaling E1γ2|E_1|\sim\gamma^2 as γ0\gamma\rightarrow0. The dynamics for r(τ)r(\tau) depends only on the phase eiξe^{i\xi} where dϵk/dz=ϵkeiξ/2d\epsilon_{{k}} /dz=|{\epsilon_{{k}}}|e^{-i\xi/2} is the derivative of the dielectric as γ0\gamma\rightarrow0.Comment: 11 pages (Latex/RevTex), 2 figures available in hard copy from the Author ([email protected]); paper accepted by Physical Review Letter

    Nonlinear saturation of electrostatic waves: mobile ions modify trapping scaling

    Full text link
    The amplitude equation for an unstable electrostatic wave in a multi-species Vlasov plasma has been derived. The dynamics of the mode amplitude ρ(t)\rho(t) is studied using an expansion in ρ\rho; in particular, in the limit γ0+\gamma\rightarrow0^+, the singularities in the expansion coefficients are analyzed to predict the asymptotic dependence of the electric field on the linear growth rate γ\gamma. Generically Ekγ5/2|E_k|\sim \gamma^{5/2}, as γ0+\gamma\rightarrow0^+, but in the limit of infinite ion mass or for instabilities in reflection-symmetric systems due to real eigenvalues the more familiar trapping scaling Ekγ2|E_k|\sim \gamma^{2} is predicted.Comment: 13 pages (Latex/RevTex), 4 postscript encapsulated figures which are included using the utility "uufiles". They should be automatically included with the text when it is downloaded. Figures also available in hard copy from the authors ([email protected]

    Cyber risk at the edge: Current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains

    Get PDF
    Digital technologies have changed the way supply chain operations are structured. In this article, we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber risks. A taxonomic/cladistic approach is used for the evaluations of progress in the area of supply chain integration in the Industrial Internet of Things and Industry 4.0, with a specific focus on the mitigation of cyber risks. An analytical framework is presented, based on a critical assessment with respect to issues related to new types of cyber risk and the integration of supply chains with new technologies. This paper identifies a dynamic and self-adapting supply chain system supported with Artificial Intelligence and Machine Learning (AI/ML) and real-time intelligence for predictive cyber risk analytics. The system is integrated into a cognition engine that enables predictive cyber risk analytics with real-time intelligence from IoT networks at the edge. This enhances capacities and assist in the creation of a comprehensive understanding of the opportunities and threats that arise when edge computing nodes are deployed, and when AI/ML technologies are migrated to the periphery of IoT networks

    On Unbounded Composition Operators in L2L^2-Spaces

    Full text link
    Fundamental properties of unbounded composition operators in L2L^2-spaces are studied. Characterizations of normal and quasinormal composition operators are provided. Formally normal composition operators are shown to be normal. Composition operators generating Stieltjes moment sequences are completely characterized. The unbounded counterparts of the celebrated Lambert's characterizations of subnormality of bounded composition operators are shown to be false. Various illustrative examples are supplied
    corecore