首页 > 最新文献

Competitive Advantage in the Digital Economy (CADE 2021)最新文献

英文 中文
SECURITY ISSUES OF FEDERATED LEARNING IN REAL-LIFE APPLICATIONS 现实应用中联邦学习的安全问题
Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2409
H. Zheng, S. Sthapit, G. Epiphaniou, C. Maple
Machine Learning (ML) is becoming one of the most popular and widely used IT technologies in the past 10 years. The sharing and analysing of large volumes of data promises to revolutionalise many sectors, such as transport, healthcare and defence. This data's value and the consequent competitive advantages from its processing have attracted significant adversarial efforts against its security, privacy and availability. Recent advancements in federated learning (FL) show promising results in protecting data security and privacy and equally create additional opportunities for organised cyber criminals to capitalise from its use. This paper presents the existing and emerging security threats against FL using real-life scenarios and applications.
在过去的十年中,机器学习(ML)正在成为最流行和广泛使用的IT技术之一。对大量数据的共享和分析有望彻底改变交通、医疗和国防等许多行业。这些数据的价值及其处理带来的竞争优势吸引了大量针对其安全性、隐私性和可用性的对抗努力。联邦学习(FL)的最新进展在保护数据安全和隐私方面取得了可喜的成果,同时也为有组织的网络犯罪分子利用它创造了更多的机会。本文通过实际场景和应用介绍了针对FL的现有和新出现的安全威胁。
{"title":"SECURITY ISSUES OF FEDERATED LEARNING IN REAL-LIFE APPLICATIONS","authors":"H. Zheng, S. Sthapit, G. Epiphaniou, C. Maple","doi":"10.1049/icp.2021.2409","DOIUrl":"https://doi.org/10.1049/icp.2021.2409","url":null,"abstract":"Machine Learning (ML) is becoming one of the most popular and widely used IT technologies in the past 10 years. The sharing and analysing of large volumes of data promises to revolutionalise many sectors, such as transport, healthcare and defence. This data's value and the consequent competitive advantages from its processing have attracted significant adversarial efforts against its security, privacy and availability. Recent advancements in federated learning (FL) show promising results in protecting data security and privacy and equally create additional opportunities for organised cyber criminals to capitalise from its use. This paper presents the existing and emerging security threats against FL using real-life scenarios and applications.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129926460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pathways to Trust: A Model of Information Security and Trust Formation in Socio-Technical Environments Structured Abstract 信任之路:社会技术环境下信息安全和信任形成模型
Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2402
Duncan J Greaves, Harjit Sekhon, A. García-Pérez
1 Purpose The purpose of this research is to fill a gap in the existing literature for new models that deal with computational trust, for example in developing trust protocols, trust metrics and the place of trust in cybersecurity strategies [1]. Many models of trust and cybersecurity are based on cognitive assessments of risk prior to delegation of tasks, although it is known that trust and risk are associated [2]. Where delegation takes place without trust it is actions that influence the formation of trust, not the other way around. We argue that action shapes trust and is not merely a product of a process. It is known that consumers may delegate action to organisations as long as the perceived risks are lowered, and the inverted-U theory of trust [3] demonstrates that low trust marketplaces are regulated by guarantees that reduce the need for trust. Conversely, highly regulated marketplaces manage the rules of conduct to reduce the role of social trust. Therefore, trust is only necessary where the transaction types fall between these two poles and eliciting this trust can lead to competitive advantage [6]. This work utilises a model to operationalise the concepts in the Theory of Planned Behaviour (TPB) [7,8] to measure how information security and task delegation drive consumers to trusting behaviour by increasing their perceived control and lowering perceived risks.
本研究的目的是填补现有文献中处理计算信任的新模型的空白,例如开发信任协议、信任指标和信任在网络安全策略中的地位[1]。许多信任和网络安全模型都是基于在委派任务之前对风险的认知评估,尽管我们知道信任和风险是相关的[2]。在没有信任的情况下进行授权,是行动影响了信任的形成,而不是相反。我们认为,行动塑造信任,而不仅仅是一个过程的产物。众所周知,只要感知风险降低,消费者可能会将行动委托给组织,而信任的倒u理论[3]表明,低信任市场受到降低信任需求的保证的监管。相反,高度监管的市场管理着行为规则,以减少社会信任的作用。因此,只有当交易类型处于这两个极点之间时,信任才有必要,而激发这种信任可以带来竞争优势[6]。这项工作利用一个模型来操作计划行为理论(TPB)中的概念[7,8],以衡量信息安全和任务授权如何通过增加他们的感知控制和降低感知风险来驱动消费者的信任行为。
{"title":"Pathways to Trust: A Model of Information Security and Trust Formation in Socio-Technical Environments Structured Abstract","authors":"Duncan J Greaves, Harjit Sekhon, A. García-Pérez","doi":"10.1049/icp.2021.2402","DOIUrl":"https://doi.org/10.1049/icp.2021.2402","url":null,"abstract":"1 Purpose The purpose of this research is to fill a gap in the existing literature for new models that deal with computational trust, for example in developing trust protocols, trust metrics and the place of trust in cybersecurity strategies [1]. Many models of trust and cybersecurity are based on cognitive assessments of risk prior to delegation of tasks, although it is known that trust and risk are associated [2]. Where delegation takes place without trust it is actions that influence the formation of trust, not the other way around. We argue that action shapes trust and is not merely a product of a process. It is known that consumers may delegate action to organisations as long as the perceived risks are lowered, and the inverted-U theory of trust [3] demonstrates that low trust marketplaces are regulated by guarantees that reduce the need for trust. Conversely, highly regulated marketplaces manage the rules of conduct to reduce the role of social trust. Therefore, trust is only necessary where the transaction types fall between these two poles and eliciting this trust can lead to competitive advantage [6]. This work utilises a model to operationalise the concepts in the Theory of Planned Behaviour (TPB) [7,8] to measure how information security and task delegation drive consumers to trusting behaviour by increasing their perceived control and lowering perceived risks.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127688641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SIGNIFICANCE OF MULTI-MODAL BIOMETRICS IN DIGITAL ECONOMY 多模态生物识别在数字经济中的意义
Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2414
A. Subhan, M. Ali Shah
Securing information is a prevailing challenge these days. Smart devices are increasingly relying on the internet and wireless networks. The data is stored on remote servers. The main problems are security theft and unauthorised access to a person's private data. Biometric systems provide the best authentication. A variety of biometrics are being used, such as finger sensors and digital signatures. A multimodal biometric system combines more traits and provides maximum accuracy in authenticating the users. The aim of this survey is to delineate the importance of using multimodal biometrics. Getting illegitimate access in unimodal biometric systems is easy, but multimodal biometric systems need more effort to break into the system. A digital biometric system works on the physiological and behavioural characteristics of an individual. It determines identification through automated technology. Many companies are investing large amounts in multimodal biometric systems and they are mostly being used in IoT devices for security purposes. An economy based on digital computing technologies is a digital economy and multimodal biometric systems are enhancing it. Multimodal biometric systems have a competitive advantage over conventional passwords and unimodal biometric systems. The paper will provide information for researchers constructing multimodal biometric systems.
保护信息安全是当今普遍存在的挑战。智能设备越来越依赖于互联网和无线网络。数据存储在远程服务器上。主要问题是安全盗窃和未经授权访问个人私人数据。生物识别系统提供了最好的身份验证。各种各样的生物识别技术正在被使用,比如手指传感器和数字签名。多模态生物识别系统结合了更多的特征,并在认证用户时提供了最大的准确性。本调查的目的是描述使用多模态生物识别技术的重要性。在单峰生物识别系统中,非法访问是很容易的,而在多峰生物识别系统中,非法访问则需要付出更多的努力。数字生物识别系统对个人的生理和行为特征起作用。它通过自动化技术确定身份。许多公司在多模态生物识别系统上投入了大量资金,这些系统主要用于物联网设备,用于安全目的。基于数字计算技术的经济是数字经济,多模式生物识别系统正在增强它。与传统密码和单模态生物识别系统相比,多模态生物识别系统具有竞争优势。本文将为构建多模态生物识别系统提供参考。
{"title":"SIGNIFICANCE OF MULTI-MODAL BIOMETRICS IN DIGITAL ECONOMY","authors":"A. Subhan, M. Ali Shah","doi":"10.1049/icp.2021.2414","DOIUrl":"https://doi.org/10.1049/icp.2021.2414","url":null,"abstract":"Securing information is a prevailing challenge these days. Smart devices are increasingly relying on the internet and wireless networks. The data is stored on remote servers. The main problems are security theft and unauthorised access to a person's private data. Biometric systems provide the best authentication. A variety of biometrics are being used, such as finger sensors and digital signatures. A multimodal biometric system combines more traits and provides maximum accuracy in authenticating the users. The aim of this survey is to delineate the importance of using multimodal biometrics. Getting illegitimate access in unimodal biometric systems is easy, but multimodal biometric systems need more effort to break into the system. A digital biometric system works on the physiological and behavioural characteristics of an individual. It determines identification through automated technology. Many companies are investing large amounts in multimodal biometric systems and they are mostly being used in IoT devices for security purposes. An economy based on digital computing technologies is a digital economy and multimodal biometric systems are enhancing it. Multimodal biometric systems have a competitive advantage over conventional passwords and unimodal biometric systems. The paper will provide information for researchers constructing multimodal biometric systems.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125379569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human Factors for Vehicle Platooning: A Review 车辆队列中的人为因素:综述
Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2429
U. Atmaca, C. Maple, G. Epiphaniou, A. Sheik
Vehicle platooning (a group of two or more consecutive connected autonomous vehicles that travel simultaneously at the same velocity with a short inter-vehicular distance based on vehicle to vehicle communication) has significant potential to advance traffic, including enhancing travel safety, improving traffic efficacy and decreasing energy consumption. Much focus has been put on developing machine learning-based autonomous driving systems. However, the interactions between humans and the autonomous driving system have not been widely studied, although understanding the human factor is critical as that can cause human errors and potential accidents. Besides, vehicle platooning introduces a new cooperative driving paradigm for drivers. From such circumstances may emerge a new pattern for human interaction with the vehicle platoons. This study presents a semisystematic methodology to review existing studies of human factors in vehicle platoons. Among the human factors, user acceptance and trust significantly impact the sustained development of autonomous driving and concerned user satisfaction. Achieving higher user satisfaction can present business advantages for vehicle platooning service providers in the future. In this paper, the human-vehicle platoon interaction is classified into three groups: pedestrians, other drivers and in-platoon driver interaction. Then the research gaps are highlighted for the field.
车辆队列(一组两辆或更多辆连续连接的自动驾驶汽车,基于车与车之间的通信,以相同的速度同时行驶,车与车之间的距离很短)在促进交通方面具有巨大的潜力,包括提高出行安全性,提高交通效率和降低能耗。开发基于机器学习的自动驾驶系统已经成为人们关注的焦点。然而,人类与自动驾驶系统之间的相互作用尚未得到广泛研究,尽管了解人为因素至关重要,因为这可能导致人为错误和潜在的事故。此外,车辆队列为驾驶员引入了一种新的协同驾驶模式。在这种情况下,可能会出现一种人类与车队互动的新模式。本研究提出了一种半系统的方法来回顾车辆排中人为因素的现有研究。在人为因素中,用户接受度和信任显著影响自动驾驶的持续发展和相关用户满意度。实现更高的用户满意度可以为未来的车辆队列服务提供商带来商业优势。本文将人车队列交互分为行人交互、其他驾驶员交互和队列内驾驶员交互三大类。然后强调了该领域的研究空白。
{"title":"Human Factors for Vehicle Platooning: A Review","authors":"U. Atmaca, C. Maple, G. Epiphaniou, A. Sheik","doi":"10.1049/icp.2021.2429","DOIUrl":"https://doi.org/10.1049/icp.2021.2429","url":null,"abstract":"Vehicle platooning (a group of two or more consecutive connected autonomous vehicles that travel simultaneously at the same velocity with a short inter-vehicular distance based on vehicle to vehicle communication) has significant potential to advance traffic, including enhancing travel safety, improving traffic efficacy and decreasing energy consumption. Much focus has been put on developing machine learning-based autonomous driving systems. However, the interactions between humans and the autonomous driving system have not been widely studied, although understanding the human factor is critical as that can cause human errors and potential accidents. Besides, vehicle platooning introduces a new cooperative driving paradigm for drivers. From such circumstances may emerge a new pattern for human interaction with the vehicle platoons. This study presents a semisystematic methodology to review existing studies of human factors in vehicle platoons. Among the human factors, user acceptance and trust significantly impact the sustained development of autonomous driving and concerned user satisfaction. Achieving higher user satisfaction can present business advantages for vehicle platooning service providers in the future. In this paper, the human-vehicle platoon interaction is classified into three groups: pedestrians, other drivers and in-platoon driver interaction. Then the research gaps are highlighted for the field.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124036207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DIGITISATION OF THE CHARITY SECTOR: UNRAVELLING THE TENSIONS OF THE DIGITAL VERSUS THE REALITY 慈善部门的数字化:解开数字与现实之间的紧张关系
Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2404
G. Doná, R. Nanton
Due to Covid-19, many charities have had to rapidly adapt their face-to-face services and transition to using digital platforms. This digitisation of services has led to the concept of Digitally Enhanced Advanced Services (DEAS), a model of servitisation applied in the manufacturing sector, being discussed in relation to the charity sector. This paper examines the applicability of DEAS to the charity sector. It explores how trust, resilience and privacy are addressed in co-creating digital platforms as well as the sustainability of digital services. Using the Refugee Council Children's Section as a case study, a mixed methods approach was applied including data mining, participant observation, and semi-structured interviews with 10 practitioners and service users. Findings show that there exists a tension between the digital and the reality in the charity sector: digital services increase access to service users in remote areas but digital poverty and illiteracy remain significant obstacles for digital servitisation. Resilience and adaptability have enabled the charity sector to operate inside the tension between the digital and reality. The adoption of DEAS in the charity sector will be dependent upon maximising opportunities, implementing changes, and overcoming barriers.
由于新冠肺炎疫情,许多慈善机构不得不迅速调整其面对面服务,并过渡到使用数字平台。这种服务的数字化导致了数字化增强高级服务(DEAS)的概念,这是一种应用于制造业的服务化模式,正在与慈善部门进行讨论。本文考察了DEAS在慈善领域的适用性。它探讨了如何在共同创建数字平台以及数字服务的可持续性中解决信任、弹性和隐私问题。以难民理事会儿童科为案例研究,采用了混合方法,包括数据挖掘、参与性观察和对10名从业人员和服务用户的半结构化访谈。调查结果表明,慈善部门的数字与现实之间存在紧张关系:数字服务增加了偏远地区服务用户的访问,但数字贫困和文盲仍然是数字服务化的重大障碍。弹性和适应性使慈善部门能够在数字和现实之间的紧张关系中运作。慈善部门采用DEAS将取决于机会最大化、实施变革和克服障碍。
{"title":"DIGITISATION OF THE CHARITY SECTOR: UNRAVELLING THE TENSIONS OF THE DIGITAL VERSUS THE REALITY","authors":"G. Doná, R. Nanton","doi":"10.1049/icp.2021.2404","DOIUrl":"https://doi.org/10.1049/icp.2021.2404","url":null,"abstract":"Due to Covid-19, many charities have had to rapidly adapt their face-to-face services and transition to using digital platforms. This digitisation of services has led to the concept of Digitally Enhanced Advanced Services (DEAS), a model of servitisation applied in the manufacturing sector, being discussed in relation to the charity sector. This paper examines the applicability of DEAS to the charity sector. It explores how trust, resilience and privacy are addressed in co-creating digital platforms as well as the sustainability of digital services. Using the Refugee Council Children's Section as a case study, a mixed methods approach was applied including data mining, participant observation, and semi-structured interviews with 10 practitioners and service users. Findings show that there exists a tension between the digital and the reality in the charity sector: digital services increase access to service users in remote areas but digital poverty and illiteracy remain significant obstacles for digital servitisation. Resilience and adaptability have enabled the charity sector to operate inside the tension between the digital and reality. The adoption of DEAS in the charity sector will be dependent upon maximising opportunities, implementing changes, and overcoming barriers.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124987865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Embracing Advanced Digital Services in the Charity and Voluntary Sector: a response to Covid-19 在慈善和志愿部门采用先进的数字服务:应对Covid-19
Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2408
A. Raki, I. Chowdhury, M. Nieroda, J. Zolkiewski
Charity and voluntary services require significant human-to-human interactions alongside integrative offerings inclusive of core and complementary services to yield value and improve the wellbeing of their often vulnerable service users. The Covid-induced digitalisation of such services can pose a challenge to the productivity and resilience of the charity and voluntary sector as the extent to which human interactions and holistic offerings are replicable in digital services can be limited and can diminish the wellbeing outcomes of offerings. This research employs a transformative service research lens to study the digital transformation of charity and voluntary services. It does this in accordance with the concept of advanced services to generate insight into the capabilities necessary at the organisational level, and quality of interactions required at the interactional level, that can enable the sector to offer digitally enhanced advanced services. By identifying the antecedents of advanced digital service in the charity and voluntary sector, this research provides new opportunities to the sector to capitalise on the advantages of digitalisation while responding to their service users' multiplex needs, which in turn improves the sector's resilience and productivity.
慈善和志愿服务需要大量的人与人之间的互动,以及包括核心和补充服务在内的综合服务,以产生价值并改善往往是弱势的服务用户的福祉。疫情引发的此类服务数字化可能对慈善和志愿部门的生产力和复原力构成挑战,因为在数字服务中,人类互动和整体服务的可复制程度可能受到限制,并可能降低服务的福祉结果。本研究采用转型服务研究的视角来研究慈善与志愿服务的数字化转型。它根据高级服务的概念来实现这一点,以深入了解组织级别所需的功能和交互级别所需的交互质量,从而使该部门能够提供数字增强的高级服务。通过确定慈善和志愿部门先进数字服务的先例,本研究为该部门提供了新的机会,以利用数字化的优势,同时响应其服务用户的多元化需求,从而提高该部门的弹性和生产力。
{"title":"Embracing Advanced Digital Services in the Charity and Voluntary Sector: a response to Covid-19","authors":"A. Raki, I. Chowdhury, M. Nieroda, J. Zolkiewski","doi":"10.1049/icp.2021.2408","DOIUrl":"https://doi.org/10.1049/icp.2021.2408","url":null,"abstract":"Charity and voluntary services require significant human-to-human interactions alongside integrative offerings inclusive of core and complementary services to yield value and improve the wellbeing of their often vulnerable service users. The Covid-induced digitalisation of such services can pose a challenge to the productivity and resilience of the charity and voluntary sector as the extent to which human interactions and holistic offerings are replicable in digital services can be limited and can diminish the wellbeing outcomes of offerings. This research employs a transformative service research lens to study the digital transformation of charity and voluntary services. It does this in accordance with the concept of advanced services to generate insight into the capabilities necessary at the organisational level, and quality of interactions required at the interactional level, that can enable the sector to offer digitally enhanced advanced services. By identifying the antecedents of advanced digital service in the charity and voluntary sector, this research provides new opportunities to the sector to capitalise on the advantages of digitalisation while responding to their service users' multiplex needs, which in turn improves the sector's resilience and productivity.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124431178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SECURING SMART CITIES: AN ANALYSIS ON USING BLOCKCHAIN FOR DIGITAL ECONOMIES 保护智慧城市:数字经济使用区块链的分析
Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2417
Sidra Riasat, M. A. Shah
Smart cities have emerged as a new model for providing people with high-quality services by dynamically leveraging urban capital. To improve citizens' everyday lives, smart cities will deliver the best services. However, the idea of smart cities is still evolving, and security issues are growing rapidly despite its potential future. To accelerate the growth in smart cities, blockchain has the capacity for good qualities such as audibility, openness, immutability, and decentralisation. The digital economy is ready to move forward in the globalisation of the economy with blockchain technology. Blockchain technology has changed the digital economy and uses this technology to make the digital economy an additional milestone. The paper discusses IoT-based attacks on smart cities, including data and identity theft, MITM attack, device hijacking, and DDoS attacks. All these attacks are threats that make IoT devices vulnerable. In this report, different blockchain platforms and consensus algorithms are reviewed to overcome these threats. Results show that blockchain can solve these problems. And as blockchain is an emerging technology with further advancement, smart cities can be more secure in the future.
智慧城市已经成为一种通过动态利用城市资本为人们提供高质量服务的新模式。为了改善市民的日常生活,智慧城市将提供最好的服务。然而,智慧城市的概念仍在不断发展,安全问题也在迅速增长,尽管它有潜在的未来。为了加速智慧城市的发展,区块链具有可听性、开放性、不变性和去中心化等良好品质。数字经济已经准备好在区块链技术的经济全球化中向前发展。区块链技术改变了数字经济,并利用这项技术使数字经济成为另一个里程碑。本文讨论了基于物联网的智慧城市攻击,包括数据和身份盗窃、MITM攻击、设备劫持和DDoS攻击。所有这些攻击都是使物联网设备易受攻击的威胁。在本报告中,回顾了不同的区块链平台和共识算法,以克服这些威胁。结果表明,区块链可以解决这些问题。由于区块链是一项新兴技术,未来智能城市将更加安全。
{"title":"SECURING SMART CITIES: AN ANALYSIS ON USING BLOCKCHAIN FOR DIGITAL ECONOMIES","authors":"Sidra Riasat, M. A. Shah","doi":"10.1049/icp.2021.2417","DOIUrl":"https://doi.org/10.1049/icp.2021.2417","url":null,"abstract":"Smart cities have emerged as a new model for providing people with high-quality services by dynamically leveraging urban capital. To improve citizens' everyday lives, smart cities will deliver the best services. However, the idea of smart cities is still evolving, and security issues are growing rapidly despite its potential future. To accelerate the growth in smart cities, blockchain has the capacity for good qualities such as audibility, openness, immutability, and decentralisation. The digital economy is ready to move forward in the globalisation of the economy with blockchain technology. Blockchain technology has changed the digital economy and uses this technology to make the digital economy an additional milestone. The paper discusses IoT-based attacks on smart cities, including data and identity theft, MITM attack, device hijacking, and DDoS attacks. All these attacks are threats that make IoT devices vulnerable. In this report, different blockchain platforms and consensus algorithms are reviewed to overcome these threats. Results show that blockchain can solve these problems. And as blockchain is an emerging technology with further advancement, smart cities can be more secure in the future.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"347 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132417624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparative Analysis of LSTM-FCN on Multiple Datasets LSTM-FCN在多数据集上的对比分析
Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2411
S. Akhtar, M. Ali Shah
Classification of time series data is a critical problem. With the growth of time series data, several algorithms have been proposed. The deep learning technique Long Short-Term Memory (LSTM) with Fully Convolutional Networks (FCN) is widely used for the classification of time series data. The use of LSTM-FCN to improve fully convolutional networks. Through attention mechanism visualisation of context, the vector is performed and enhances the results of time series classification. The aim of this research is to compare the results of LSTM-FCN output on a multiple dataset. The results show that the selected technique is more effective at classifying time series. Visualisation is given for the performance analysis of the LSTM-FCN technique on all datasets.
时间序列数据的分类是一个关键问题。随着时间序列数据的增长,人们提出了几种算法。基于全卷积网络的长短期记忆(LSTM)深度学习技术被广泛应用于时间序列数据的分类。利用LSTM-FCN改进全卷积网络。通过对上下文的注意机制可视化,实现向量化,增强了时间序列分类的结果。本研究的目的是比较LSTM-FCN在多个数据集上的输出结果。结果表明,所选择的方法对时间序列的分类更有效。给出了LSTM-FCN技术在所有数据集上的性能分析的可视化。
{"title":"Comparative Analysis of LSTM-FCN on Multiple Datasets","authors":"S. Akhtar, M. Ali Shah","doi":"10.1049/icp.2021.2411","DOIUrl":"https://doi.org/10.1049/icp.2021.2411","url":null,"abstract":"Classification of time series data is a critical problem. With the growth of time series data, several algorithms have been proposed. The deep learning technique Long Short-Term Memory (LSTM) with Fully Convolutional Networks (FCN) is widely used for the classification of time series data. The use of LSTM-FCN to improve fully convolutional networks. Through attention mechanism visualisation of context, the vector is performed and enhances the results of time series classification. The aim of this research is to compare the results of LSTM-FCN output on a multiple dataset. The results show that the selected technique is more effective at classifying time series. Visualisation is given for the performance analysis of the LSTM-FCN technique on all datasets.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115179554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Supply Chain Security Management through Data Process Decomposition: An Architecture Perspective 通过数据过程分解的供应链安全管理:一个体系结构视角
Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2426
W. Afrifah, G. Epiphaniou, C. Maple
In today's volatile environment, we have never been more reliant on a tightly knit supply chain (SC). Globalisation, mass manufacturing, and specialisation are now hallmarks of our integrated, industrialised world. Decision-makers rely heavily on accurate up-to-the-minute data. Even the tiniest interruption in data flow can have a huge effect on the quality of decision-making and performance. In the full interconnection paradigm, this dependency has inadvertently pushed device connectivity toward an Industrial Internet of Things (IIoT) approach. This has allowed the provision of 'added value resources' such as SC optimisation for Industry 4.0 (I4.0) or enhanced process controls. While system interconnectivity has increased, Internet of Things (IoT) and I4.0 SC protection measures have lagged behind. The root cause of this disparity is the existing mainstream security practices inherited from industrial networks and linking systems that neglect any specific security capability. This paper introduces the preliminary design of an I4.0 SC architecture that offers a complete protocol break about how exacting security functions could be implemented by isolation, a rigorous access control system, and surveillance to ensure the proposed architecture's end-to-end security to I4.0 SC.
在当今动荡的环境中,我们从未像现在这样依赖于紧密结合的供应链。全球化、大规模制造和专业化现在是我们这个一体化、工业化世界的标志。决策者在很大程度上依赖于准确的最新数据。即使是数据流中最微小的中断也会对决策质量和性能产生巨大影响。在完全互连范例中,这种依赖性无意中将设备连接推向了工业物联网(IIoT)方法。这允许提供“附加价值资源”,例如工业4.0 (I4.0)的SC优化或增强的过程控制。虽然系统互联性提高了,但物联网(IoT)和I4.0 SC保护措施却落后了。造成这种差异的根本原因是现有的主流安全实践继承自工业网络和连接系统,忽视了任何特定的安全能力。本文介绍了I4.0 SC架构的初步设计,该架构提供了一个完整的协议突破,关于如何通过隔离、严格的访问控制系统和监视来实现严格的安全功能,以确保所提议的架构对I4.0 SC的端到端安全性。
{"title":"Supply Chain Security Management through Data Process Decomposition: An Architecture Perspective","authors":"W. Afrifah, G. Epiphaniou, C. Maple","doi":"10.1049/icp.2021.2426","DOIUrl":"https://doi.org/10.1049/icp.2021.2426","url":null,"abstract":"In today's volatile environment, we have never been more reliant on a tightly knit supply chain (SC). Globalisation, mass manufacturing, and specialisation are now hallmarks of our integrated, industrialised world. Decision-makers rely heavily on accurate up-to-the-minute data. Even the tiniest interruption in data flow can have a huge effect on the quality of decision-making and performance. In the full interconnection paradigm, this dependency has inadvertently pushed device connectivity toward an Industrial Internet of Things (IIoT) approach. This has allowed the provision of 'added value resources' such as SC optimisation for Industry 4.0 (I4.0) or enhanced process controls. While system interconnectivity has increased, Internet of Things (IoT) and I4.0 SC protection measures have lagged behind. The root cause of this disparity is the existing mainstream security practices inherited from industrial networks and linking systems that neglect any specific security capability. This paper introduces the preliminary design of an I4.0 SC architecture that offers a complete protocol break about how exacting security functions could be implemented by isolation, a rigorous access control system, and surveillance to ensure the proposed architecture's end-to-end security to I4.0 SC.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131484027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANOMALY DETECTION IN SYSTEM LOGS IN THE SPHERE OF DIGITAL ECONOMY 数字经济领域系统日志异常检测
Pub Date : 1900-01-01 DOI: 10.1049/icp.2021.2432
N. Shahid, M. Ali Shah
Anomaly detection in log file analysis is a method of automatically monitoring log files to identify suspicious activities. It plays a major role in the management of modern distributed large-scale systems. The detection of anomalies is a critical issue for data-driven systems in the digital economy. The real objective of a system log is to record the state of the system, its execution trajectory, and the important events at different critical points. System log data is a valuable and meaningful resource for understanding the status of system and performance problems; therefore, these logs are an extremely useful source for online monitoring and detection of anomalies. Simple statistical analytical techniques cannot fully capture log information for system detection of effective anomalies. In this paper, we introduce an approach of analysing the logs by combining a method of feature extraction with an anomaly detection algorithm from deep learning. For feature extraction, word2vec is used and after that, a deep autoencoder model with Long Short-Term Memory (LSTM) units is used for anomaly detection. In this process several techniques are applied to data ie principal component analysis (PCA) for dimension reduction, gaussian multivariate normal distribution to normally distributed data using mean and covariance. After detecting anomalies, the logs are further classified into different web attacks ie brute force, port scanning, sql injection and file inclusion are visualised with different graphs in the results section. The experimental findings show the effectiveness of the proposed anomaly detection learning algorithm.
日志文件分析中的异常检测是对日志文件进行自动监控,识别可疑活动的一种方法。它在现代分布式大型系统的管理中起着重要的作用。异常检测是数字经济中数据驱动系统的一个关键问题。系统日志的真正目的是记录系统的状态、它的执行轨迹以及不同临界点上的重要事件。系统日志数据是了解系统状态和性能问题的有价值和有意义的资源;因此,这些日志对于在线监测和检测异常非常有用。简单的统计分析技术不能完全捕获日志信息,用于系统检测有效异常。在本文中,我们介绍了一种将特征提取方法与深度学习中的异常检测算法相结合的日志分析方法。对于特征提取,使用word2vec,然后使用具有长短期记忆(LSTM)单元的深度自编码器模型进行异常检测。在这个过程中,一些技术应用于数据,如主成分分析(PCA)降维,高斯多元正态分布到正态分布的数据使用均值和协方差。在检测到异常后,将日志进一步分类为不同的web攻击,如暴力破解、端口扫描、sql注入和文件包含,并在结果部分以不同的图形显示。实验结果表明了所提异常检测学习算法的有效性。
{"title":"ANOMALY DETECTION IN SYSTEM LOGS IN THE SPHERE OF DIGITAL ECONOMY","authors":"N. Shahid, M. Ali Shah","doi":"10.1049/icp.2021.2432","DOIUrl":"https://doi.org/10.1049/icp.2021.2432","url":null,"abstract":"Anomaly detection in log file analysis is a method of automatically monitoring log files to identify suspicious activities. It plays a major role in the management of modern distributed large-scale systems. The detection of anomalies is a critical issue for data-driven systems in the digital economy. The real objective of a system log is to record the state of the system, its execution trajectory, and the important events at different critical points. System log data is a valuable and meaningful resource for understanding the status of system and performance problems; therefore, these logs are an extremely useful source for online monitoring and detection of anomalies. Simple statistical analytical techniques cannot fully capture log information for system detection of effective anomalies. In this paper, we introduce an approach of analysing the logs by combining a method of feature extraction with an anomaly detection algorithm from deep learning. For feature extraction, word2vec is used and after that, a deep autoencoder model with Long Short-Term Memory (LSTM) units is used for anomaly detection. In this process several techniques are applied to data ie principal component analysis (PCA) for dimension reduction, gaussian multivariate normal distribution to normally distributed data using mean and covariance. After detecting anomalies, the logs are further classified into different web attacks ie brute force, port scanning, sql injection and file inclusion are visualised with different graphs in the results section. The experimental findings show the effectiveness of the proposed anomaly detection learning algorithm.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134295746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Competitive Advantage in the Digital Economy (CADE 2021)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1