16 research outputs found

    Methodology for Designing Decision Support Systems for Visualising and Mitigating Supply Chain Cyber Risk from IoT Technologies

    Full text link
    This paper proposes a methodology for designing decision support systems for visualising and mitigating the Internet of Things cyber risks. Digital technologies present new cyber risk in the supply chain which are often not visible to companies participating in the supply chains. This study investigates how the Internet of Things cyber risks can be visualised and mitigated in the process of designing business and supply chain strategies. The emerging DSS methodology present new findings on how digital technologies affect business and supply chain systems. Through epistemological analysis, the article derives with a decision support system for visualising supply chain cyber risk from Internet of Things digital technologies. Such methods do not exist at present and this represents the first attempt to devise a decision support system that would enable practitioners to develop a step by step process for visualising, assessing and mitigating the emerging cyber risk from IoT technologies on shared infrastructure in legacy supply chain systems

    Self protecting data for de-perimeterised information sharing

    Get PDF
    The emergence of high-speed networks, Grid Computing, Service-Oriented Architectures, and an ever increasing ambient connection to mobile Internet has enabled an underpinning infrastructure for the development of dynamically formed, collaborative working groups known as Virtual Organisations (VOs). VOs provide strong motivation for investigation into the infrastructure, and in particular the security necessary to protect the information and resources shared within a VO, both while resident on local machines and when allowed to move beyond the secure boundary of a local organisational network perimeter and into the realm of the distributed VO. Traditional access control systems are perimeter- centric, meaning they apply the controls to both internal and external requests for access to information within or at the perimeter of their information system. • This paper presents the initial results of the JISC funded SPIDER project, being led by Cardiff University. Through case based example, the research investigates the limitations to granularity and persistent control over information when using the perimeter- centric approach in a collaborative working environment

    Towards information sharing in virtual organisations: The development of an icon-based information control model

    Get PDF
    Today, innovation in information communication technology has encouraged contribution among different fields to tackle large-scale scientific problems or introduce novel inventories that, in both cases, demand extensive sharing of information among collaborating organisations in order to achieve the overall goal. Sharing information across different physical organisations, working as a single virtual organisation, raises a number of information security issues that limit the effectiveness, dynamism, and potential of collaborative working. Although extensive research has been conducted to provide secure information-sharing solutions within a single organisation, little research has investigated multi- organizational information-sharing environments where information requires to be protected but there are variations in information security needs and, in some cases, conflicts in applied information security controls. A key obstacle, the majority of research conducted in this area has overlooked, is not only the ability to govern remote access of users from one organisation to sensitive information stored in another organisation, but also having persistent control over owned information even after access has been granted and the information is either disseminated electronically, transformed into paper format, or even shared verbally. In addition, research was tailored to meet only specific research needs and address particular issues. Therefore, there is a lack of comprehensive, systematic approaches for controls on information usage shared electronically, regardless of specific circumstances. This paper aims to present a novel information control model that could keep information self-protected in dynamic collaborative environments by communicating information security needs along with the exchanged information using an Information Labelling Scheme. Based on SPIDER solution and Protective Commons, this scheme uses nine labelling icons (reflecting the protection type and level) associated with different information security controls (representing the information security mechanisms used to provide the protection). The model is demonstrated in the Microsoft Word 2007 application and a prototype has been developed as a plug-in software named Information Labelling Palette. It displays the nine self-explanatory icons in order for an information owner/user to label any information range within a single document using any icon. This consequently enforces the information security controls associated with the selected icon only into that particular range of electronic information, and secondly, communicates the information security needs to the recipient in a human-readable format, which would help keep recipients informed about how this information should be managed if printed out or shared verbally. Finally, the wide range of information security controls used in this proposed solution makes it widely applicable to meet the considerable diversity of organisations’ information security needs. Furthermore, it is believed to lay a solid foundation for future work in the area of information access control and control policy enforcement in collaborative environments

    Covalent penicillin-protein conjugates elicit anti-drug antibodies that are clonally and functionally restricted

    Get PDF
    Many archetypal and emerging classes of small-molecule therapeutics form covalent protein adducts. In vivo, both the resulting conjugates and their off-target side-conjugates have the potential to elicit antibodies, with implications for allergy and drug sequestration. Although β-lactam antibiotics are a drug class long associated with these immunological phenomena, the molecular underpinnings of off-target drug-protein conjugation and consequent drug-specific immune responses remain incomplete. Here, using the classical β-lactam penicillin G (PenG), we probe the B and T cell determinants of drug-specific IgG responses to such conjugates in mice. Deep B cell clonotyping reveals a dominant murine clonal antibody class encompassing phylogenetically-related IGHV1, IGHV5 and IGHV10 subgroup gene segments. Protein NMR and x-ray structural analyses reveal that these drive structurally convergent binding modes in adduct-specific antibody clones. Their common primary recognition mechanisms of the penicillin side-chain moiety (phenylacetamide in PenG)—regardless of CDRH3 length—limits cross-reactivity against other β-lactam antibiotics. This immunogenetics-guided discovery of the limited binding solutions available to antibodies against side products of an archetypal covalent inhibitor now suggests future potential strategies for the ‘germline-guided reverse engineering’ of such drugs away from unwanted immune responses

    Controlling and supporting sets in operator algebras

    Full text link
    corecore