Competitive Advantage in the Digital Economy (CADE 2021)最新文献

筛选
英文 中文
5G as a Catalyst for a Wider Technological Fusion that Enables the Fourth Industrial Revolution 5G是推动第四次工业革命的更广泛技术融合的催化剂
Competitive Advantage in the Digital Economy (CADE 2021) Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2410
A. Stavdas
{"title":"5G as a Catalyst for a Wider Technological Fusion that Enables the Fourth Industrial Revolution","authors":"A. Stavdas","doi":"10.1049/icp.2021.2410","DOIUrl":"https://doi.org/10.1049/icp.2021.2410","url":null,"abstract":"In this work it is argued that the Fourth Industrial Revolution (I4.0) will be the result of a technology fusion between the following factors that define an economic epoch: a) The production systems and the type of tools these systems are employing; b) The communication technologies as well as the means used for information storage, processing, sensing and knowledge creation: the information and communication technologies (ICT); c) The energy generation and distribution systems used and d) The biotechnology. The thesis of this work is that ICT is the predominant factor in the context of I4.0. To justify this claim, the progress of the scientific fields from which this factor consists is elaborated and its impact on other factors is highlighted with emphasis on the societal impact. It is claimed that the eventual fusion of these factors will lead to a single technological continuum. The eventual fusion of all factors is made possible because they all exploit a common technological (hardware) framework while we are entering the era where we can regulate and superintend a vast amount of heterogeneous technologies via open software. In the context of I4.0, this results in a tremendous boost in productivity as it will allow a user to switch between different activities dynamically. Moreover, through this process a whole rank of middlemen is made redundant, cutting down costs and inefficiencies. Finally, one-click customisation will rationalise production, creating the conditions where overproduction will gradually die out, promoting the resilience of the economy. Therefore, ICT-enabled I4.0 will redefine the notions of ‘production’ and ‘work’, as it will allow us to overcome over-fragmentation in specialisation, while reshaping our cities, our personal lives and our relationship with science.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116856341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Comparative Study of Cyber Threats on Evolving Digital Identity Systems 发展中的数字身份系统的网络威胁比较研究
Competitive Advantage in the Digital Economy (CADE 2021) Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2428
A. Sheik, C. Maple, G. Epiphaniou, U. Atmaca
{"title":"A Comparative Study of Cyber Threats on Evolving Digital Identity Systems","authors":"A. Sheik, C. Maple, G. Epiphaniou, U. Atmaca","doi":"10.1049/icp.2021.2428","DOIUrl":"https://doi.org/10.1049/icp.2021.2428","url":null,"abstract":"Identity empowers global citizens; it helps an individual to play an active part in international development. To do so, there is often a need for individuals to formally identify themselves. This empowers them to engage in financial services, voting rights, business rights, land titles, social protection, school and various other benefits. Organisations are becoming increasingly customer-centric and many are realising the importance of digital identity as a key to improve customer experience. However, a significant proportion of the human population does not have access to credentials, and in a number of instances, identities have been counterfeited or misused. Robust identification and associated management systems need to be introduced and implemented to address these challenges. Novel digitised decentralised approaches are being explored, and this emerging field promises to empower individuals with an identity; however, emerging threats and risks prevent such systems from being trusted. Firstly, this paper aims to describe the existing model of evolving Digital Identity Management System(IDMS) and investigate the related cyber security requirements and challenges to such systems. Secondly, the STRIDE threat modelling approach is described in the context of IDMS. Finally, the paper identifies the threat landscape of IDMS by employing the threat modelling approach.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123704636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
INVESTIGATING THE IMPACT OF UNDERLYING HEALTH CONDITIONS ON PRIVACY CONCERNS OF IOT HEALTHCARE DEVICES 调查潜在健康状况对物联网医疗设备隐私问题的影响
Competitive Advantage in the Digital Economy (CADE 2021) Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2403
Nasar Alsiyabi, M. Kyritsis, S. Gulliver
{"title":"INVESTIGATING THE IMPACT OF UNDERLYING HEALTH CONDITIONS ON PRIVACY CONCERNS OF IOT HEALTHCARE DEVICES","authors":"Nasar Alsiyabi, M. Kyritsis, S. Gulliver","doi":"10.1049/icp.2021.2403","DOIUrl":"https://doi.org/10.1049/icp.2021.2403","url":null,"abstract":"Internet of things (IoT) wearable healthcare devices improve the quality of living, encourage healthy lifestyle improvements, and reduce the amount of time and resources spent on medical expenditure. Wearable devices generate large amounts of personal health data, which can potentially benefit all related stakeholders. However, there is evidence that some people feel that using healthcare IoT can put their private healthcare information at risk. Our research aims to understand the factors affecting users' willingness to share personal health information, and the intention to adopt and continue using wearable technology. This paper considers the wearer's perspective by proposing a conceptual model that combines the Delone and McLean model, UTAUT2 and ECM factors. The novel conceptual model was partially validated by conducting a pilot study, followed by Confirmatory Factor Analysis, which in turn was used to measure the validity and reliability of the constructs.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116080899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CYBERBULLYING IN ONLINE CLASSES: THE CASE OF COVID-19 网络课堂中的网络欺凌:以COVID-19为例
Competitive Advantage in the Digital Economy (CADE 2021) Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2400
Elma Afsar, M. A. Shah, M. Owais
{"title":"CYBERBULLYING IN ONLINE CLASSES: THE CASE OF COVID-19","authors":"Elma Afsar, M. A. Shah, M. Owais","doi":"10.1049/icp.2021.2400","DOIUrl":"https://doi.org/10.1049/icp.2021.2400","url":null,"abstract":"The digital economy has evolved due to the Covid-19 pandemic. Like businesses, the educational sector is also affected by this change. Students are using online educational platforms to continue their studies during the pandemic. The digital world provides resilience but it has also caused trust and privacy issues for students. Cyberbullying has significantly increased in online classrooms during the pandemic and it is essential to understand the increased risks of cyberbullying in online classrooms. It is vital to understand its effect on students. This study explores the impacts of cyber violence and cyber oppression that students face in online classrooms. An online survey is conducted to gain knowledge of (i) cyberbullying in online classrooms, (ii) its negative impacts on students, and (iii) the lack of awareness, policies and management regarding cyber laws in educational institutions under the pandemic. Based on this study's finding, students' online safety is at risk. Proper anti-cyberbullying policies are almost non-existent, and there is a lack of awareness about existing anti-cyberbullying laws. This survey also highlights the lack of research regarding successful practices, strategies, anti-cyberbullying policies, and legal reactions for cyberbullying victims. Therefore, a cyberbullying prevention framework is proposed in which reactive and preventive measures and educational institutions' responsibilities are suggested. The proposed framework will help to formulate cyberbullying anticipation programs for online educational platforms and it will also help in minimising students' trust and privacy concerns due to digitalised educational systems.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121045164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5G SECURITY THREATS AFFECTING DIGITAL ECONOMY AND THEIR COUNTERMEASURES 影响数字经济的5g安全威胁及其应对措施
Competitive Advantage in the Digital Economy (CADE 2021) Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2419
A. Ghafoor, M. A. Shah, M. Mushtaq, M. Iftikhar
{"title":"5G SECURITY THREATS AFFECTING DIGITAL ECONOMY AND THEIR COUNTERMEASURES","authors":"A. Ghafoor, M. A. Shah, M. Mushtaq, M. Iftikhar","doi":"10.1049/icp.2021.2419","DOIUrl":"https://doi.org/10.1049/icp.2021.2419","url":null,"abstract":"The 5G (fifth generation) network will provide a wide range of connectivity to share information and data with a low latency rate, higher bandwidth and more frequency spectrum to increase speed. Massive Internet of Things (IoT) devices' security is critical to secure communication between different devices. 5G wireless communication offers new services and frameworks, but it is also amplifying security impacts. However, there are a lot of challenges to users' privacy as well. This report provides an overall view of threats and challenges in 5G networks and presents solutions to these challenges. In addition, 5G is being used to increase communication security while providing essential building blocks for physical layer security.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115320075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SECURING DIGITAL ECONOMIES: DETECTION OF PHISHING ATTACKS USING MACHINE LEARNING APPROACHES 保护数字经济:使用机器学习方法检测网络钓鱼攻击
Competitive Advantage in the Digital Economy (CADE 2021) Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2412
N. Bari, M. Ali Shah
{"title":"SECURING DIGITAL ECONOMIES: DETECTION OF PHISHING ATTACKS USING MACHINE LEARNING APPROACHES","authors":"N. Bari, M. Ali Shah","doi":"10.1049/icp.2021.2412","DOIUrl":"https://doi.org/10.1049/icp.2021.2412","url":null,"abstract":"Due to the wide use of web resources such as online banking, social networking, education, entertainment, downloading software, and a rise in the economy's digitalisation, the prevalence of online fraud is rising. Phishing is mostly a launch attack on the internet. Phishing is a criminal attack that obtains credential data such as bank information, username, password and credit card information, etc which can be used to damage a single victim or the entire organisation. Criminals always use disasters as an opportunity to take advantage of recessions, hurricanes, and difficult times. The latest example is the Covid-19 pandemic. The phishing attacks are growing rapidly in 2020, cyber attackers launched Covid-19 themed phishing attacks against healthcare facilities, the unemployed and workers. A lot of anti-phishing solutions are available heuristic detection, virtual similarity detection, black and whitelisting, and machine learning. This paper compares various research for each machine learning technique in terms of detecting phishing attacks and discusses the benefits and drawbacks of each methodology. In addition, this paper presents a detailed list of existing phishing attack threats as well as potential research directions in this sphere.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127529378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploring Paradoxes of Distributed Ledger Technologies 探索分布式账本技术的悖论
Competitive Advantage in the Digital Economy (CADE 2021) Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2423
B. Altrichter, G. Parry
{"title":"Exploring Paradoxes of Distributed Ledger Technologies","authors":"B. Altrichter, G. Parry","doi":"10.1049/icp.2021.2423","DOIUrl":"https://doi.org/10.1049/icp.2021.2423","url":null,"abstract":"This research aims to identify paradoxes in the context of distributed ledger technologies (DLTs). Paradoxes are phenomena that are contradictory, appearing rational in isolation, but illogical in combination [1]. Expert interviews and a Delphi study will be used to identify paradoxes that are emerging with DLTs. From this we aim to deduce managerial implications on how to resolve challenges associated with these paradoxes and develop a research agenda. The identified paradoxes will help organisations working with DLTs as research sheds light on emerging tensions (eg related to sustainability and inherent trust), and potentially how they may be resolved.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125946022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HONEYPOTS IN DIGITAL ECONOMY: AN ANALYSIS OF INTRUSION DETECTION AND PREVENTION 数字经济中的蜜罐:入侵检测与防御分析
Competitive Advantage in the Digital Economy (CADE 2021) Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2415
M. S. Rana, M. A. Shah
{"title":"HONEYPOTS IN DIGITAL ECONOMY: AN ANALYSIS OF INTRUSION DETECTION AND PREVENTION","authors":"M. S. Rana, M. A. Shah","doi":"10.1049/icp.2021.2415","DOIUrl":"https://doi.org/10.1049/icp.2021.2415","url":null,"abstract":"Today, many organisations are moving their subscriptions to the cloud because the number of clients is increasing day by day. To provide better services to users with less cost, cloud computing is a fair solution. However, use of cloud services has resulted in different issues such as: hosting service, hardware failure and memory allocation of data, in other words - data loss. There is the risk of security breaches by malicious users. Different sets of new security risks and difficulties have occurred in cloud architectures. Most intrusion detection systems (IDS) and intrusion prevention systems (IPS) are designed to deal with multiple types of attacks and there is no single system that can guarantee security from future attacks. Therefore, there is a need for an integrated system that can provide strong insurance against various risks. In this paper, a detailed review of the role of the firewall, intrusion detection and prevention (IDPS), honeypot, and integration of IDPS with honeypot in the security domain of the cloud is illustrated. One way is that an IDPS will look for data packets, if the data is found to be malicious, the system will be transferred to the honeypot via firewall. In the case of integration of IDPS, honeypot is being used to divert the malicious traffic away from the system. Honeypot is a non-violent infrastructure with limited network information. The attacker will understand it as a real environment and go here and there to get basic information. At this point, we can easily find the attacker. Our analysis goal is to provide an easy and concise view of the different security models for cloud architecture.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121810474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TERTIARY STUDY ON LANDSCAPING THE REVIEW IN CODE SMELLS 美化代码气味审查的第三次研究
Competitive Advantage in the Digital Economy (CADE 2021) Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2421
R. Yaqoob, .. Sanaa, S. U. R. Khan, M. A. Shah
{"title":"TERTIARY STUDY ON LANDSCAPING THE REVIEW IN CODE SMELLS","authors":"R. Yaqoob, .. Sanaa, S. U. R. Khan, M. A. Shah","doi":"10.1049/icp.2021.2421","DOIUrl":"https://doi.org/10.1049/icp.2021.2421","url":null,"abstract":"Code smells are a sign of bad design and poor implementation decisions, which increases fault proneness and code complexity and reduces software system maintainability. Digital innovations are increasingly transforming the world in which businesses operate. The infusion of digital technologies into services, processes and goods has significant implications for how companies achieve and retain competitive advantages. The timely detection of code smells in a company's systems and software that operates an internet-based business, such as an e-commerce company that sells products and services over the internet, aids the company's team to build strategies to maintain and gain competitive advantages in the digital economy. However, there has been no specific landscaping research on code smells in recent studies that combine all of the disparate and classified information into a single paper. We performed a manual search process to collect various systematic literature reviews (SLRs) and mapping studies from 2015 to 2020. The aim was to cover and integrate as much information as possible based on code smells, such as previous years' methods and techniques, domains targeted thus far, and challenges faced between 2015 and 2020.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"2021 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131035544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Examining attitudes towards cybersecurity compliance through the lens of the psychological contract 通过心理契约的视角审视对网络安全合规的态度
Competitive Advantage in the Digital Economy (CADE 2021) Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2401
N. Michaelides
{"title":"Examining attitudes towards cybersecurity compliance through the lens of the psychological contract","authors":"N. Michaelides","doi":"10.1049/icp.2021.2401","DOIUrl":"https://doi.org/10.1049/icp.2021.2401","url":null,"abstract":"This research proposal defines the aim to explore the perceptions and experiences of employees through a global pandemic. In an exploratory qualitative study, utilising thematic analysis, the intention is to take an interpretivist position to examine participants' accounts of working from home during a pandemic, by looking through the psychological contract (Rousseau, 1996a) lens to better understand this phenomenon. This research serves to offer a potential line of enquiry when it comes to the human factors of cyber and information security behaviour and any themes which may overlap with psychological contract breaches (PCB). Previous research has suggested that the psychological contract can impact on employee commitment towards their organisations (Jabeen, Behery and Hossam, 2015), and employees' attitudes towards cyber security affect the frequency in engaging in risky online behaviours, (Hadlington, 2018), this study aims to draw out any themes around these areas through semi-structured interviews with employees in a global law firm.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"2021 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131051759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信