Search results

1 – 10 of over 12000
Book part
Publication date: 15 May 2023

Mariya M. Shygun and Andrii Zhuravel

Purpose: Analysis and systematisation of global trends in the transformation of DSSs from the standpoint of solving their global and local problems and determining the central…

Abstract

Purpose: Analysis and systematisation of global trends in the transformation of DSSs from the standpoint of solving their global and local problems and determining the central axioms of setting up and supporting business processes in DSSs.

Need of the Study: Decision Support Systems (DSSs) are the basis of doing business in an enterprise by automating business processes, keeping accounting and reducing various risks associated with complexity, labour-intensiveness, slow execution time and, therefore, potential loss of profit. In recent decades, the rapid development of DSSs has led to the emergence of complex enterprise information system architectures. At the same time, many local business processes are not implemented or are partially implemented. In Ukraine, such techniques include VAT accounting.

Methodology: The study is based on the literature analysis, Internet resources and practical experience obtained during the SAP ERP system implementation projects. Particular attention is paid to developing information systems architecture to solve the problems enterprises face during their growth. Thanks to the analysis of the example of the realisation of the Internet sales process and the induction method, the axioms of automation of business processes in accounting systems were formed.

Findings: Regardless of the qualitative and quantitative transformation, modern DSSs still cannot solve all the enterprise’s problems, mainly due to the use of paper documents and the diversity of national legislation. By the example of the SAP ERP system, the optimal implementation of the business process of VAT liabilities was proposed by Ukrainian legislation for sales below cost price.

Practical Implications: Compliance with the established axioms of automation of business processes will reduce the cost of resources for their implementation, maintenance and correction of potential errors and, therefore, will provide an opportunity to process more transactions. Implementing the proposed algorithm for calculating VAT liabilities in SAP ERP for sales below the cost price will simplify the existing process and enable the fulfilment of other requirements within the framework of current legislation.

Details

Contemporary Studies of Risks in Emerging Technology, Part B
Type: Book
ISBN: 978-1-80455-567-5

Keywords

Article
Publication date: 17 August 2023

Tareq Na’el Al-Tawil

Malicious hackers are increasingly evolving with technology by developing advanced tools to infiltrate. They are looking at micro laundering via sites like PayPal or using job…

Abstract

Purpose

Malicious hackers are increasingly evolving with technology by developing advanced tools to infiltrate. They are looking at micro laundering via sites like PayPal or using job advertising sites, to avoid exposure. Micro laundering makes it possible to launder a large amount of money in small amounts through thousands of electronic transactions. Therefore, the purpose of this paper is to examine whether the ethical hacking pedagogy is both a feasible and effective approach to prepare information security professionals of the future to combat black hat hacking and other forms of unethical conduct in the cyberspace.

Design/methodology/approach

The paper will specifically explore the ethics and implications of teaching students how to hack. It examines the strengths and limitations of the ethical hacking pedagogy. The discussion will then form the basis for exploring whether ethical hacking pedagogy is logical and justifiable.

Findings

The research has examined whether the ethical hacking pedagogy is an initiative-taking and effective approach to preparing information security professionals. Teaching students to hack is the only feasible approach to preparing future cybersecurity professionals because such training will allow them to master technical skills necessary for penetration testing.

Originality/value

A dominant theme that emerged from the research is the inability to evaluate students’ intention and provide oversight after their graduation. Thus, professional networks and peer groups will play an instrumental role in sustaining students in an environment that fosters ethical conduct.

Details

Journal of Money Laundering Control, vol. 27 no. 1
Type: Research Article
ISSN: 1368-5201

Keywords

Book part
Publication date: 29 May 2023

Divya Nair and Neeta Mhavan

A zero-day vulnerability is a complimentary ticket to the attackers for gaining entry into the network. Thus, there is necessity to device appropriate threat detection systems and…

Abstract

A zero-day vulnerability is a complimentary ticket to the attackers for gaining entry into the network. Thus, there is necessity to device appropriate threat detection systems and establish an innovative and safe solution that prevents unauthorised intrusions for defending various components of cybersecurity. We present a survey of recent Intrusion Detection Systems (IDS) in detecting zero-day vulnerabilities based on the following dimensions: types of cyber-attacks, datasets used and kinds of network detection systems.

Purpose: The study focuses on presenting an exhaustive review on the effectiveness of the recent IDS with respect to zero-day vulnerabilities.

Methodology: Systematic exploration was done at the IEEE, Elsevier, Springer, RAID, ESCORICS, Google Scholar, and other relevant platforms of studies published in English between 2015 and 2021 using keywords and combinations of relevant terms.

Findings: It is possible to train IDS for zero-day attacks. The existing IDS have strengths that make them capable of effective detection against zero-day attacks. However, they display certain limitations that reduce their credibility. Novel strategies like deep learning, machine learning, fuzzing technique, runtime verification technique, and Hidden Markov Models can be used to design IDS to detect malicious traffic.

Implication: This paper explored and highlighted the advantages and limitations of existing IDS enabling the selection of best possible IDS to protect the system. Moreover, the comparison between signature-based and anomaly-based IDS exemplifies that one viable approach to accurately detect the zero-day vulnerabilities would be the integration of hybrid mechanism.

Details

Smart Analytics, Artificial Intelligence and Sustainable Performance Management in a Global Digitalised Economy
Type: Book
ISBN: 978-1-80382-555-7

Keywords

Abstract

Details

The Cybersecurity Workforce of Tomorrow
Type: Book
ISBN: 978-1-80382-918-0

Article
Publication date: 28 September 2023

Mariam Moufaddal, Asmaa Benghabrit and Imane Bouhaddou

The health crisis has highlighted the shortcomings of the industry sector which has revealed its vulnerability. To date, there is no guarantee of a return to the “world before”…

Abstract

Purpose

The health crisis has highlighted the shortcomings of the industry sector which has revealed its vulnerability. To date, there is no guarantee of a return to the “world before”. The ability of companies to cope with these changes is a key competitive advantage requiring the adoption/mastery of industry 4.0 technologies. Therefore, companies must adapt their business processes to fit into similar situations.

Design/methodology/approach

The proposed methodology comprises three steps. First, a comparative analysis of the existing CPSs is elaborated. Second, following this analysis, a deep learning driven CPS framework is proposed highlighting its components and tiers. Third, a real industrial case is presented to demonstrate the application of the envisioned framework. Deep learning network-based methods of object detection are used to train the model and evaluation is assessed accordingly.

Findings

The analysis revealed that most of the existing CPS frameworks address manufacturing related subjects. This illustrates the need for a resilient industrial CPS targeting other areas and considering CPSs as loopback systems preserving human–machine interaction, endowed with data tiering approach for easy and fast data access and embedded with deep learning-based computer vision processing methods.

Originality/value

This study provides insights about what needs to be addressed in terms of challenges faced due to unforeseen situations or adapting to new ones. In this paper, the CPS framework was used as a monitoring system in compliance with the precautionary measures (social distancing) and for self-protection with wearing the necessary equipments. Nevertheless, the proposed framework can be used and adapted to any industrial or non-industrial environments by adjusting object detection purpose.

Details

International Journal of Intelligent Unmanned Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 10 June 2022

Hong-Sen Yan, Zhong-Tian Bi, Bo Zhou, Xiao-Qin Wan, Jiao-Jun Zhang and Guo-Biao Wang

The present study is intended to develop an effective approach to the real-time modeling of general dynamic nonlinear systems based on the multidimensional Taylor network (MTN).

Abstract

Purpose

The present study is intended to develop an effective approach to the real-time modeling of general dynamic nonlinear systems based on the multidimensional Taylor network (MTN).

Design/methodology/approach

The authors present a detailed explanation for modeling the general discrete nonlinear dynamic system by the MTN. The weight coefficients of the network can be obtained by sampling data learning. Specifically, the least square (LS) method is adopted herein due to its desirable real-time performance and robustness.

Findings

Compared with the existing mainstream nonlinear time series analysis methods, the least square method-based multidimensional Taylor network (LSMTN) features its more desirable prediction accuracy and real-time performance. Model metric results confirm the satisfaction of modeling and identification for the generalized nonlinear system. In addition, the MTN is of simpler structure and lower computational complexity than neural networks.

Research limitations/implications

Once models of general nonlinear dynamical systems are formulated based on MTNs and their weight coefficients are identified using the data from the systems of ecosystems, society, organizations, businesses or human behavior, the forecasting, optimizing and controlling of the systems can be further studied by means of the MTN analytical models.

Practical implications

MTNs can be used as controllers, identifiers, filters, predictors, compensators and equation solvers (solving nonlinear differential equations or approximating nonlinear functions) of the systems of ecosystems, society, organizations, businesses or human behavior.

Social implications

The operating efficiency and benefits of social systems can be prominently enhanced, and their operating costs can be significantly reduced.

Originality/value

Nonlinear systems are typically impacted by a variety of factors, which makes it a challenge to build correct mathematical models for various tasks. As a result, existing modeling approaches necessitate a large number of limitations as preconditions, severely limiting their applicability. The proposed MTN methodology is believed to contribute much to the data-based modeling and identification of the general nonlinear dynamical system with no need for its prior knowledge.

Details

Kybernetes, vol. 52 no. 10
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 10 June 2022

Yu-Min Wang, Chung-Lun Wei and Meng-Wei Wang

A research framework that explains adoption intention in students with regard to brain–computer interface (BCI) games in the learning context was proposed and empirically examined.

Abstract

Purpose

A research framework that explains adoption intention in students with regard to brain–computer interface (BCI) games in the learning context was proposed and empirically examined.

Design/methodology/approach

In this study, an approach integrating the decomposed theory of planned behavior, perceived playfulness, risk and the task–technology fit (TTF) concept was used to assess data collected using a post-experiment questionnaire from a student sample in Taiwan. The research model was tested using the partial least-squares structural equation modeling (PLS-SEM) technique.

Findings

Attitude, subjective norms and TTF were shown to impact intention to play the BCI game significantly, while perceived behavioral control did not show a significant impact. The influence of superiors and peers was found to positively predict subjective norms. With the exception of perceived ease of use, all of the proposed antecedents were found to impact attitude toward BCI games. Technology facilitating conditions and BCI technology characteristics were shown to positively determine perceived behavior control and TTF, respectively. However, the other proposed factors did not significantly influence the latter two dependents.

Originality/value

This research contributes to the nascent literature on BCI games in the context of learning by highlighting the influence of belief-related psychological factors on user acceptance of BCI games. Moreover, this study highlights the important, respective influences of perceived playfulness, risk and TTF on users' perceptions of a game, body monitoring and technology implementation, each of which is known to influence willingness to play.

Article
Publication date: 14 October 2021

Boppana V. Chowdary and Deepak Jaglal

This paper aims to present a reverse engineering (RE) approach for three-dimensional (3D) model reconstruction and fast prototyping (FP) of broken chess pieces.

Abstract

Purpose

This paper aims to present a reverse engineering (RE) approach for three-dimensional (3D) model reconstruction and fast prototyping (FP) of broken chess pieces.

Design/methodology/approach

A case study involving a broken chess piece was selected to demonstrate the effectiveness of the proposed unconventional RE approach. Initially, a laser 3D scanner was used to acquire a (non-uniform rational B-spline) surface model of the object, which was then processed to develop a parametric computer aided design (CAD) model combined with geometric design and tolerancing (GD&T) technique for evaluation and then for FP of the part using a computer numerical controlled (CNC) machine.

Findings

The effectiveness of the proposed approach for reconstruction and FP of rotational parts was ascertained through a sample part. The study demonstrates non-contact data acquisition technologies such as 3D laser scanners together with RE systems can support to capture the entire part geometry that was broken/worn and developed quickly through the application of computer aided manufacturing principles and a CNC machine. The results indicate that design communication, customer involvement and FP can be efficiently accomplished by means of an integrated RE workflow combined with rapid product development tools and techniques.

Originality/value

This research established a RE approach for the acquisition of broken/worn part data and the development of parametric CAD models. Then, the developed 3D CAD model was inspected for accuracy by means of the GD&T approach and rapidly developed using a CNC machine. Further, the proposed RE led FP approach can provide solutions to similar industrial situations wherein agility in the product design and development process is necessary to produce physical samples and functional replacement parts for aging systems in a short turnaround time.

Details

Journal of Engineering, Design and Technology, vol. 21 no. 5
Type: Research Article
ISSN: 1726-0531

Keywords

Book part
Publication date: 7 December 2023

Annemarie Matthies

This chapter outlines how the academic field in Germany, particularly universities as institutions of research and education, became a constitutive element in the process of…

Abstract

This chapter outlines how the academic field in Germany, particularly universities as institutions of research and education, became a constitutive element in the process of digitalization. Institutions in higher education created long-lasting networks not only by scientific relations in the academic field but also by the establishment of business-oriented and application-oriented disciplines. This chapter focuses on the case of business information systems (BIS) and reconstructs the structural conditions under which BIS evolved from an initially marginal data-centric subfield of business administration into an independent discipline. This discipline has had a major influence on the transformation of work processes in recent decades and is an important player in the digital transformation in Germany. This chapter therefore also outlines the far-reaching implications of the paths taken, which are eventually not limited to the academic field but manifested in transformed work processes in almost all professional fields.

Details

How Universities Transform Occupations and Work in the 21st Century: The Academization of German and American Economies
Type: Book
ISBN: 978-1-83753-849-2

Keywords

Article
Publication date: 15 March 2023

Mithu Bhattacharya, Thiagarajan Ramakrishnan and Samuel Fosso Wamba

The purpose of this paper is to examine the factors that influence enterprise resource planning (ERP) effectiveness within the context of emergency service organizations. Drawing…

Abstract

Purpose

The purpose of this paper is to examine the factors that influence enterprise resource planning (ERP) effectiveness within the context of emergency service organizations. Drawing on information systems (IS) effectiveness, ERP implementation and job satisfaction literature, the authors posit that user involvement, top management involvement and training satisfaction are the antecedents to perceived job satisfaction, and perceived job satisfaction leads to ERP effectiveness in emergency service organizations.

Design/methodology/approach

Survey methodology is used for collecting data for this research, and the PLS-SEM technique is used for analysis.

Findings

Results indicate users will be more satisfied with their training if their inputs are taken into account during their training and the top management is actively involved during the training process. Further, if the users perceive that they are adequately trained, they will be more satisfied with their jobs in using ERP, which will also lead to more effective ERP usage in emergency service operations.

Research limitations/implications

The focus of this study is on a single emergency service organization and thus may not be generalizable to other sectors. The authors extend ERP research to the context of emergency service organizations and thus add to the literature on ERP and emergency services. They conceptualize perceived job satisfaction to integrate roles, teamwork, supervisor and their perception regarding their potential to grow in the organization.

Practical implications

The managerial contribution of this research is to identify the motivational aspects and provide practical insights into the effective use of ERP systems for emergency service organizations. From a managerial perspective, the study provides a framework for both IS and emergency service providers/executives to understand and evaluate the factors that help them use ERP effectively in their firms.

Originality/value

This study extends the knowledge of ERP systems. While most of the ERP research focuses on implementation, the authors’ focus is on the effective use of ERP in emergency service organizations. They focus on identifying key factors that are important to using ERP effectively, specifically in emergency service organizations.

Details

Business Process Management Journal, vol. 29 no. 3
Type: Research Article
ISSN: 1463-7154

Keywords

1 – 10 of over 12000