SCADA (Supervisory Control and Data Acquisition) systems are extensively executed in industrial systems to navigate real-time system monitoring, remote access, record, and assembling of data from a centralised unit. SCADA systems are the most essential element in control systems and have a striking influence in industries such as power grids, nuclear power plants and production lines by governing their vital substructure. SCADA has supported the digital economy with a fully automated control that has shown substantial results in lower production costs and increased efficiency in past several years or so. Since more digital field controllers are being implemented around production sites, these formerly unintelligent tools are becoming interconnected and contributing to the digital economy. However, these systems present various vulnerabilities since their frameworks don't enforce core protection metrics. In this paper, we devise certain security measures, for instance, authentication and access control because these control systems are prone to different types of cyber-attacks that can cause major destruction and disruption in production lines. Furthermore, we presented SCADA's future threats and attack hits by conducting an inquiry from several institutes and research areas and explained the facts, predicting to what extent these attacks could rise shortly.
{"title":"SECURING DIGITAL ECONOMIES THROUGH SCADA SYSTEMS: AN ANALYSIS ON AUTHENTICATION AND ACCESS CONTROL","authors":"B. Urooj, M. Ali Shah","doi":"10.1049/icp.2021.2413","DOIUrl":"https://doi.org/10.1049/icp.2021.2413","url":null,"abstract":"SCADA (Supervisory Control and Data Acquisition) systems are extensively executed in industrial systems to navigate real-time system monitoring, remote access, record, and assembling of data from a centralised unit. SCADA systems are the most essential element in control systems and have a striking influence in industries such as power grids, nuclear power plants and production lines by governing their vital substructure. SCADA has supported the digital economy with a fully automated control that has shown substantial results in lower production costs and increased efficiency in past several years or so. Since more digital field controllers are being implemented around production sites, these formerly unintelligent tools are becoming interconnected and contributing to the digital economy. However, these systems present various vulnerabilities since their frameworks don't enforce core protection metrics. In this paper, we devise certain security measures, for instance, authentication and access control because these control systems are prone to different types of cyber-attacks that can cause major destruction and disruption in production lines. Furthermore, we presented SCADA's future threats and attack hits by conducting an inquiry from several institutes and research areas and explained the facts, predicting to what extent these attacks could rise shortly.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123858082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As the use of smart vehicles is increasing day by day, issues such as privacy and authentication are also being faced by VANETs. To address these problems, a blockchain technique is used. This paper covers a linkable and decentralised architecture of the Internet of Vehicles system for the contact between smart vehicles by using blockchain for safe access verification among vehicles and roadside units (RSUs). As the concept of distributed storage and cloud computing is introduced with blockchain, the reason behind using distributed technology is to shift the trust from a single third party such as a central authority (CA) towards a decentralised approach. But still, most of the models rely on a single party CA or any other third party, and in most of the cases data is not decentralised, due to the trust issue that may arise under such conditions. Also, when a vehicle broadcasts any message in the network, the authentication process is fully dependent on a single RSU. If an RSU fails, then there is no security about the accurate delivery of messages. Due to that, any malicious user can take part in the network. Centred on the blockchain, this scheme offers a privacy-preserving authentication mechanism between vehicles. A comparison table between different features of VANETs is also made. The future of vehicles is dependent on technology and it will enhance the rise of the digital economy.
{"title":"PRIVACY-PRESERVING AUTHENTICATION SCHEME FOR VANETS IN DIGITAL ECONOMY","authors":"M. Afzal, M. Shah","doi":"10.1049/icp.2021.2418","DOIUrl":"https://doi.org/10.1049/icp.2021.2418","url":null,"abstract":"As the use of smart vehicles is increasing day by day, issues such as privacy and authentication are also being faced by VANETs. To address these problems, a blockchain technique is used. This paper covers a linkable and decentralised architecture of the Internet of Vehicles system for the contact between smart vehicles by using blockchain for safe access verification among vehicles and roadside units (RSUs). As the concept of distributed storage and cloud computing is introduced with blockchain, the reason behind using distributed technology is to shift the trust from a single third party such as a central authority (CA) towards a decentralised approach. But still, most of the models rely on a single party CA or any other third party, and in most of the cases data is not decentralised, due to the trust issue that may arise under such conditions. Also, when a vehicle broadcasts any message in the network, the authentication process is fully dependent on a single RSU. If an RSU fails, then there is no security about the accurate delivery of messages. Due to that, any malicious user can take part in the network. Centred on the blockchain, this scheme offers a privacy-preserving authentication mechanism between vehicles. A comparison table between different features of VANETs is also made. The future of vehicles is dependent on technology and it will enhance the rise of the digital economy.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"22 6S 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115942834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aim and scope of the study From 2017 to 2020, we conducted a research through design to address a number of identified obstacles to adoption of wearable computing. One obstacle was a perceived failure to design wearables for emotional engagement [1] [2] [3]. To address this, we began the inspiration phase with a participatory design process with an open-ended brief, instead of the typical approach of starting with a design exemplar. In this way, we elicited concepts from the participants to discover what kinds of everyday wearables they desired [4], rather than their preferences for some particular device type like an activity monitor [5]. The obstacles interrelate, and the outcome of our investigations against the obstacle of poor emotional engagement, give cause to reflect on another of the obstacles: privacy. This paper will reflect on the privacy issues evoked by our experience.
{"title":"How Not To Be Seen: Privacy and Security Considerations in the Design of Everyday Wearable Technology","authors":"Helen Oliver, Richard Mortier","doi":"10.1049/icp.2021.2424","DOIUrl":"https://doi.org/10.1049/icp.2021.2424","url":null,"abstract":"Aim and scope of the study From 2017 to 2020, we conducted a research through design to address a number of identified obstacles to adoption of wearable computing. One obstacle was a perceived failure to design wearables for emotional engagement [1] [2] [3]. To address this, we began the inspiration phase with a participatory design process with an open-ended brief, instead of the typical approach of starting with a design exemplar. In this way, we elicited concepts from the participants to discover what kinds of everyday wearables they desired [4], rather than their preferences for some particular device type like an activity monitor [5]. The obstacles interrelate, and the outcome of our investigations against the obstacle of poor emotional engagement, give cause to reflect on another of the obstacles: privacy. This paper will reflect on the privacy issues evoked by our experience.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127567909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The objective of this research is to identify the service design characteristics that provide competitive advantage to organisations in the digital economy. These characteristics relate to the customer and mediating technology interactions that provide resilience, trust and privacy. What are the service design characteristics for customer and mediating technology service systems? A literature review and case studies are used to explore design characteristics for technology-enabled interactions. This research aims to develop a conceptual framework for service design characteristics. The interactions of people, technology and organisations is a socio technical system that forms networks and interactions [1]. These networks of people and digitally enabled devices provide interactive services. The Unified Services Theory (UST) provides a theoretical lens to view service systems [2]. Digital devices require customers to provide inputs, these inputs are themselves, their possessions and their information. Interactions occur between entities creating service processes. These can be mapped using the process chain network (PCN) methodology [3]. Entities can be customers, providers and physical devices. The methodology enables mapping of service processes between entities. These interactions receive and process customer inputs to coproduce service. These interactions occur in the direct and surrogate regions of the PCN diagram, Figure 1.
{"title":"Service Design for Customer Surrogate Interaction: design characteristics for customer acceptance","authors":"Dr Stephen R Pearce","doi":"10.1049/icp.2021.2406","DOIUrl":"https://doi.org/10.1049/icp.2021.2406","url":null,"abstract":"The objective of this research is to identify the service design characteristics that provide competitive advantage to organisations in the digital economy. These characteristics relate to the customer and mediating technology interactions that provide resilience, trust and privacy. What are the service design characteristics for customer and mediating technology service systems? A literature review and case studies are used to explore design characteristics for technology-enabled interactions. This research aims to develop a conceptual framework for service design characteristics. The interactions of people, technology and organisations is a socio technical system that forms networks and interactions [1]. These networks of people and digitally enabled devices provide interactive services. The Unified Services Theory (UST) provides a theoretical lens to view service systems [2]. Digital devices require customers to provide inputs, these inputs are themselves, their possessions and their information. Interactions occur between entities creating service processes. These can be mapped using the process chain network (PCN) methodology [3]. Entities can be customers, providers and physical devices. The methodology enables mapping of service processes between entities. These interactions receive and process customer inputs to coproduce service. These interactions occur in the direct and surrogate regions of the PCN diagram, Figure 1.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"26 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132609531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In a digital economy, more of an organisation's valuable assets are digital, enabling competitive advantage. However, they also represent a threat, illustrated by increasing levels of data leakage. Such leakage via email remains a key concern across organisations and, to combat this, a range of data leakage prevention (DLP) measures exist. One such technology is an email boundary control (or guard). However, even with mature tools there is a gap between availability and adoption, that this paper proposes is due to the management challenges in application, rather than technology. The home working trend, accelerated by the pandemic, has further exacerbated data leakage risks and heightened the need to ensure an organisation's operations remain resilient and enable trust while keeping private data secure. This paper describes work whose methodology combined the results of a literature review with an in-depth practical case study in an industrial company. This was followed by analysis of the management challenges and then proposed steps to address these. The steps require management commitment and subject matter expertise. Finally, this applied research is important to industry to address the gap between technological capability and its application, in order to support the secure sustainment of increasingly digital enterprises.
{"title":"Management Challenges in the Implementation of an Email Boundary Control for Data Leakage Prevention","authors":"J. Dunn, C. Maple, G. Epiphaniou","doi":"10.1049/icp.2021.2407","DOIUrl":"https://doi.org/10.1049/icp.2021.2407","url":null,"abstract":"In a digital economy, more of an organisation's valuable assets are digital, enabling competitive advantage. However, they also represent a threat, illustrated by increasing levels of data leakage. Such leakage via email remains a key concern across organisations and, to combat this, a range of data leakage prevention (DLP) measures exist. One such technology is an email boundary control (or guard). However, even with mature tools there is a gap between availability and adoption, that this paper proposes is due to the management challenges in application, rather than technology. The home working trend, accelerated by the pandemic, has further exacerbated data leakage risks and heightened the need to ensure an organisation's operations remain resilient and enable trust while keeping private data secure. This paper describes work whose methodology combined the results of a literature review with an in-depth practical case study in an industrial company. This was followed by analysis of the management challenges and then proposed steps to address these. The steps require management commitment and subject matter expertise. Finally, this applied research is important to industry to address the gap between technological capability and its application, in order to support the secure sustainment of increasingly digital enterprises.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133015841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Schumpeter considers crisis as a chance for development and opportunity for (endogenous and exogenous) innovation. He describes innovation as an enabling force to escape systemic malfunction in an economy. Innovation interrupts and changes the economy: it causes economic upswings but is also a driver of economic downswings accompanied by prize- and quantity wars. Innovation causes constant unrest within systems and continuously relocates the economic equilibrium.
{"title":"Conceptualization of the dynamic entrepreneur for system innovation and resilience - conceptual paper","authors":"F. Maurer","doi":"10.1049/icp.2021.2427","DOIUrl":"https://doi.org/10.1049/icp.2021.2427","url":null,"abstract":"Schumpeter considers crisis as a chance for development and opportunity for (endogenous and exogenous) innovation. He describes innovation as an enabling force to escape systemic malfunction in an economy. Innovation interrupts and changes the economy: it causes economic upswings but is also a driver of economic downswings accompanied by prize- and quantity wars. Innovation causes constant unrest within systems and continuously relocates the economic equilibrium.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124977399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the healthcare industry, we cannot deny, contradict or oppose the importance of the Internet of Medical Things (IoMT). The ultimate purpose of the IoMT system is to gather and transmit health information such as ECG, weight, blood pressure and sugar levels. Such data may be shared with an approved individual, who may be a physician, a participating health company, insurance provider, or an external contractor regardless of their time, location, and device. But the story is not as simple because IoMT faces various emerging cyber-attacks and threats. Day by day new malware attacks are created and launched on IoMT because an attacker knows that this market is worth billions. The purpose of writing this paper is to introduce you to some of the well-known attacks that are launched on IoT. Such as denial of service, router attack, sensor attack, repay attack, fingerprint, and time-based spoofing, and recent malware attacks such as like Miari, Emoted, Gamut and NE curs and ransomware in IOMT.
{"title":"THE INTERNET OF MEDICAL THINGS (IOMT): SECURITY THREATS AND ISSUES AFFECTING DIGITAL ECONOMY","authors":"M. Mushtaq, M. A. Shah, A. Ghafoor","doi":"10.1049/icp.2021.2420","DOIUrl":"https://doi.org/10.1049/icp.2021.2420","url":null,"abstract":"In the healthcare industry, we cannot deny, contradict or oppose the importance of the Internet of Medical Things (IoMT). The ultimate purpose of the IoMT system is to gather and transmit health information such as ECG, weight, blood pressure and sugar levels. Such data may be shared with an approved individual, who may be a physician, a participating health company, insurance provider, or an external contractor regardless of their time, location, and device. But the story is not as simple because IoMT faces various emerging cyber-attacks and threats. Day by day new malware attacks are created and launched on IoMT because an attacker knows that this market is worth billions. The purpose of writing this paper is to introduce you to some of the well-known attacks that are launched on IoT. Such as denial of service, router attack, sensor attack, repay attack, fingerprint, and time-based spoofing, and recent malware attacks such as like Miari, Emoted, Gamut and NE curs and ransomware in IOMT.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122941284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A rising digital economy implies more cybersecurity challenges. As organisations continue with their digital transformations, they need to implement pervasive cyber defense measures to comply with the corresponding severe security threats. The number of organisations and individuals falling victim to targeted attacks such as spear-phishing attacks is growing rapidly. Regardless of substantial exploration in mitigation systems, attackers today are becoming more sophisticated as they cultivate their techniques, employing advanced natural language (NL) capabilities to deceive email security systems. Game theory approaches based on cybersecurity are mostly concentrated on proposing defence algorithms against attacks. This work is comprehensively centred on the role of the attacker in spear-phishing attacks, using OpenAI text generating model Generative Pre-trained Transformer 2 (GPT-2) to generate emails with various malicious content. Attackers use those emails to attack a target and attempt to deceive the defence system. Considering the lack of theoretic analysis from the attacker's perspective, a non-cooperative zero-sum spear-phishing game model is proposed that allows an attacker to choose an optimal strategy for maximising payoff. Moreover, we calculated the Nash equilibrium (NE) in mixed strategies for the attacker-defender game and provided a reasonable scheme for an attacker to gain an advantage over the target.
{"title":"OFFENSIVE AI: UNIFICATION OF EMAIL GENERATION THROUGH GPT-2 MODEL WITH A GAME-THEORETIC APPROACH FOR SPEAR-PHISHING ATTACKS","authors":"Hamzullah Khan, M. Alam, S. Al-Kuwari, Y. Faheem","doi":"10.1049/icp.2021.2422","DOIUrl":"https://doi.org/10.1049/icp.2021.2422","url":null,"abstract":"A rising digital economy implies more cybersecurity challenges. As organisations continue with their digital transformations, they need to implement pervasive cyber defense measures to comply with the corresponding severe security threats. The number of organisations and individuals falling victim to targeted attacks such as spear-phishing attacks is growing rapidly. Regardless of substantial exploration in mitigation systems, attackers today are becoming more sophisticated as they cultivate their techniques, employing advanced natural language (NL) capabilities to deceive email security systems. Game theory approaches based on cybersecurity are mostly concentrated on proposing defence algorithms against attacks. This work is comprehensively centred on the role of the attacker in spear-phishing attacks, using OpenAI text generating model Generative Pre-trained Transformer 2 (GPT-2) to generate emails with various malicious content. Attackers use those emails to attack a target and attempt to deceive the defence system. Considering the lack of theoretic analysis from the attacker's perspective, a non-cooperative zero-sum spear-phishing game model is proposed that allows an attacker to choose an optimal strategy for maximising payoff. Moreover, we calculated the Nash equilibrium (NE) in mixed strategies for the attacker-defender game and provided a reasonable scheme for an attacker to gain an advantage over the target.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131130815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As we know, we are living in the era of the digital economy, which relies on electronic computing. In any technological or digital economy field, privacy preservation is our major concern. Every device that can process, store, or communicate needs privacy. The privacy preservation field is polished by many researchers based on cloud computing and big data. New research on privacy preservation based on cloud computing, big data and other platforms creates innovation in this field. This paper proposes existing different techniques which are helpful in the field of privacy preservation and trying to explore the field from numerous aspects. We are making a comparison of different techniques and analysing it deeply with the multiple types of constraints which relate to privacy. It includes the combined ideas of different authors about their work carried out from the different types of platforms. This paper also addresses the security threats and how to overcome these privacy threats. Future or emerging trends about privacy preservation against big data and cloud computing are discussed.
{"title":"PRIVACY PRESERVATION IN DIGITAL ECONOMY PLATFORMS","authors":"B. Qadeer, M. A. Shah, A. Ishaq","doi":"10.1049/icp.2021.2416","DOIUrl":"https://doi.org/10.1049/icp.2021.2416","url":null,"abstract":"As we know, we are living in the era of the digital economy, which relies on electronic computing. In any technological or digital economy field, privacy preservation is our major concern. Every device that can process, store, or communicate needs privacy. The privacy preservation field is polished by many researchers based on cloud computing and big data. New research on privacy preservation based on cloud computing, big data and other platforms creates innovation in this field. This paper proposes existing different techniques which are helpful in the field of privacy preservation and trying to explore the field from numerous aspects. We are making a comparison of different techniques and analysing it deeply with the multiple types of constraints which relate to privacy. It includes the combined ideas of different authors about their work carried out from the different types of platforms. This paper also addresses the security threats and how to overcome these privacy threats. Future or emerging trends about privacy preservation against big data and cloud computing are discussed.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115841382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Typically considered as being limited to the manufacturing sector, servitisation involves the transition from a product-based to a service-based offering. If the UK is to be an international leader in the adoption of servitisation business models, other sectors must be considered. The EPSRC-funded Digitally Enhanced Advanced Services (DEAS) Network Plus comprises researchers and practitioners working collectively across various disciplines and different sectors. The work of the network has illustrated that manufacturing is an exemplar, rather than the only model that could be followed, and that it would be beneficial if DEAS principles could be established that are not specific to a particular sector or discipline. Although there is an existing body of research there is minimal agreement on the key concepts and terms, making the topic inaccessible to researchers from disciplines outside servitisation. A broad range of disciplines need to come together especially given the reliance on digital transformation. Following reviews of existing research and the DEAS work to date, this paper discusses the principles of servitisation that could, and should, be applied to sectors outside manufacturing. Further work will make use of these principles in establishing a common terminology framework, in the form of an ontology of servitisation.
{"title":"Establishing the Core Principles of Servitisation for Application Outside Manufacturing","authors":"Z. Wood, P. Godsiff","doi":"10.1049/icp.2021.2425","DOIUrl":"https://doi.org/10.1049/icp.2021.2425","url":null,"abstract":"Typically considered as being limited to the manufacturing sector, servitisation involves the transition from a product-based to a service-based offering. If the UK is to be an international leader in the adoption of servitisation business models, other sectors must be considered. The EPSRC-funded Digitally Enhanced Advanced Services (DEAS) Network Plus comprises researchers and practitioners working collectively across various disciplines and different sectors. The work of the network has illustrated that manufacturing is an exemplar, rather than the only model that could be followed, and that it would be beneficial if DEAS principles could be established that are not specific to a particular sector or discipline. Although there is an existing body of research there is minimal agreement on the key concepts and terms, making the topic inaccessible to researchers from disciplines outside servitisation. A broad range of disciplines need to come together especially given the reliance on digital transformation. Following reviews of existing research and the DEAS work to date, this paper discusses the principles of servitisation that could, and should, be applied to sectors outside manufacturing. Further work will make use of these principles in establishing a common terminology framework, in the form of an ontology of servitisation.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130586322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}