Search results

1 – 10 of over 6000
Article
Publication date: 9 February 2022

Abel Yeboah-Ofori, Cameron Swart, Francisca Afua Opoku-Boateng and Shareeful Islam

Cyber resilience in cyber supply chain (CSC) systems security has become inevitable as attacks, risks and vulnerabilities increase in real-time critical infrastructure systems

Abstract

Purpose

Cyber resilience in cyber supply chain (CSC) systems security has become inevitable as attacks, risks and vulnerabilities increase in real-time critical infrastructure systems with little time for system failures. Cyber resilience approaches ensure the ability of a supply chain system to prepare, absorb, recover and adapt to adverse effects in the complex CPS environment. However, threats within the CSC context can pose a severe disruption to the overall business continuity. The paper aims to use machine learning (ML) techniques to predict threats on cyber supply chain systems, improve cyber resilience that focuses on critical assets and reduce the attack surface.

Design/methodology/approach

The approach follows two main cyber resilience design principles that focus on common critical assets and reduce the attack surface for this purpose. ML techniques are applied to various classification algorithms to learn a dataset for performance accuracies and threats predictions based on the CSC resilience design principles. The critical assets include Cyber Digital, Cyber Physical and physical elements. We consider Logistic Regression, Decision Tree, Naïve Bayes and Random Forest classification algorithms in a Majority Voting to predicate the results. Finally, we mapped the threats with known attacks for inferences to improve resilience on the critical assets.

Findings

The paper contributes to CSC system resilience based on the understanding and prediction of the threats. The result shows a 70% performance accuracy for the threat prediction with cyber resilience design principles that focus on critical assets and controls and reduce the threat.

Research limitations/implications

Therefore, there is a need to understand and predicate the threat so that appropriate control actions can ensure system resilience. However, due to the invincibility and dynamic nature of cyber attacks, there are limited controls and attributions. This poses serious implications for cyber supply chain systems and its cascading impacts.

Practical implications

ML techniques are used on a dataset to analyse and predict the threats based on the CSC resilience design principles.

Social implications

There are no social implications rather it has serious implications for organizations and third-party vendors.

Originality/value

The originality of the paper lies in the fact that cyber resilience design principles that focus on common critical assets are used including Cyber Digital, Cyber Physical and physical elements to determine the attack surface. ML techniques are applied to various classification algorithms to learn a dataset for performance accuracies and threats predictions based on the CSC resilience design principles to reduce the attack surface for this purpose.

Details

Continuity & Resilience Review, vol. 4 no. 1
Type: Research Article
ISSN: 2516-7502

Keywords

Article
Publication date: 23 November 2021

Anas Maazu Kademi and Ahmet Hasan Koltuksuz

This paper aims to establish a theoretic framework to provide a fundamental understanding of cyberspatial objects, their existence and their identification scheme while providing…

Abstract

Purpose

This paper aims to establish a theoretic framework to provide a fundamental understanding of cyberspatial objects, their existence and their identification scheme while providing a connection between cyber-enabled spaces and cyberspace. It develops an avenue to quantify general philosophical and theoretical questions, precisely, inherently spatial basis that produces an unprecedented space–time continuum, in which cyber-enabled relations evolve.

Design/methodology/approach

Multidisciplinary theoretical approaches are needed to describe complex systems, which in this paper are integrated in a quest for the principles underlying the structural organization and dynamics of cyberspace. A theoretic framework is presented, and the spatial conception of cyber-enabled physical, social, information and thinking spaces and entities existence are provided.

Findings

With spatial objects and spatial properties, cyberspace is inherently spatial. Its basic constructs are founded on its spatial qualities and producing radical space–time compression, cyber-enabled spaces in which dynamic relations develop and thrive. The cyberspatial object operations are primarily built on foundations that depend on physical space and other spatial metaphors. Information space, basically missing in the literature, is an important part of cyberspace.

Research limitations/implications

This work suggested a novel analytical approach to describing cyberspace from broader perspectives and fields. Due to the novelty and divergence of cyber concepts, an interdisciplinary study and methodology are needed. Thus, more research toward theoretical direction could help many of the practical implementations of concepts.

Practical implications

The research is of particular significance in cyberspatial mechanics to describe the dynamics and behavior of cyber physical systems. For example, object-based analysis functions like spatial query, node pattern analysis, cluster analysis, spatial similarity analysis and location modeling.

Originality/value

Complementing the existing literature and defining information space to the research sphere, a theoretical framework providing a fundamental understanding of cyberspatial objects and the general cyberspace foundation has been proposed, resulting in a formalized concept of existence, interactions and applications and services, with respect to philosophy, science and technology, respectively.

Details

Kybernetes, vol. 52 no. 3
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 28 September 2023

Mariam Moufaddal, Asmaa Benghabrit and Imane Bouhaddou

The health crisis has highlighted the shortcomings of the industry sector which has revealed its vulnerability. To date, there is no guarantee of a return to the “world before”…

Abstract

Purpose

The health crisis has highlighted the shortcomings of the industry sector which has revealed its vulnerability. To date, there is no guarantee of a return to the “world before”. The ability of companies to cope with these changes is a key competitive advantage requiring the adoption/mastery of industry 4.0 technologies. Therefore, companies must adapt their business processes to fit into similar situations.

Design/methodology/approach

The proposed methodology comprises three steps. First, a comparative analysis of the existing CPSs is elaborated. Second, following this analysis, a deep learning driven CPS framework is proposed highlighting its components and tiers. Third, a real industrial case is presented to demonstrate the application of the envisioned framework. Deep learning network-based methods of object detection are used to train the model and evaluation is assessed accordingly.

Findings

The analysis revealed that most of the existing CPS frameworks address manufacturing related subjects. This illustrates the need for a resilient industrial CPS targeting other areas and considering CPSs as loopback systems preserving human–machine interaction, endowed with data tiering approach for easy and fast data access and embedded with deep learning-based computer vision processing methods.

Originality/value

This study provides insights about what needs to be addressed in terms of challenges faced due to unforeseen situations or adapting to new ones. In this paper, the CPS framework was used as a monitoring system in compliance with the precautionary measures (social distancing) and for self-protection with wearing the necessary equipments. Nevertheless, the proposed framework can be used and adapted to any industrial or non-industrial environments by adjusting object detection purpose.

Details

International Journal of Intelligent Unmanned Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 5 April 2024

Lida Haghnegahdar, Sameehan S. Joshi, Rohith Yanambaka Venkata, Daniel A. Riley and Narendra B. Dahotre

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems

19

Abstract

Purpose

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems. Manufacturing systems are increasingly faced with risk of attacks not only by traditional malicious actors such as hackers and cyber-criminals but also by some competitors and organizations engaged in corporate espionage. This paper aims to elaborate a plausible risk practice of designing and demonstrate a case study for the compromised-based malicious for polymer 3D printing system.

Design/methodology/approach

This study assumes conditions when a machine was compromised and evaluates the effect of post compromised attack by studying its effects on tensile dog bone specimens as the printed object. The designed algorithm removed predetermined specific number of layers from the tensile samples. The samples were visually identical in terms of external physical dimensions even after removal of the layers. Samples were examined nondestructively for density. Additionally, destructive uniaxial tensile tests were carried out on the modified samples and compared to the unmodified sample as a control for various mechanical properties. It is worth noting that the current approach was adapted for illustrating the impact of cyber altercations on properties of additively produced parts in a quantitative manner. It concurrently pointed towards the vulnerabilities of advanced manufacturing systems and a need for designing robust mitigation/defense mechanism against the cyber altercations.

Findings

Density, Young’s modulus and maximum strength steadily decreased with an increase in the number of missing layers, whereas a no clear trend was observed in the case of % elongation. Post tensile test observations of the sample cross-sections confirmed the successful removal of the layers from the samples by the designed method. As a result, the current work presented a cyber-attack model and its quantitative implications on the mechanical properties of 3D printed objects.

Originality/value

To the best of the authors’ knowledge, this is the original work from the team. It is currently not under consideration for publication in any other avenue. The paper provides quantitative approach of realizing impact of cyber intrusions on deteriorated performance of additively manufactured products. It also enlists important intrusion mechanisms relevant to additive manufacturing.

Details

Rapid Prototyping Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-2546

Keywords

Article
Publication date: 2 December 2019

Abhijeet Ghadge, Maximilian Weiß, Nigel D. Caldwell and Richard Wilding

In spite of growing research interest in cyber security, inter-firm based cyber risk studies are rare. Therefore, this study aims to investigate cyber risk management in supply…

6596

Abstract

Purpose

In spite of growing research interest in cyber security, inter-firm based cyber risk studies are rare. Therefore, this study aims to investigate cyber risk management in supply chain contexts.

Design/methodology/approach

Adapting a systematic literature review process, papers from interdisciplinary areas published between 1990 and 2017 were selected. Different typologies, developed for conducting descriptive and thematic analysis, were established using data mining techniques to conduct a comprehensive, replicable and transparent review.

Findings

The review identifies multiple future research directions for cyber security/resilience in supply chains. A conceptual model is developed, which indicates a strong link between information technology, organisational and supply chain security systems. The human/behavioural elements within cyber security risk are found to be critical; however, behavioural risks have attracted less attention because of a perceived bias towards technical (data, application and network) risks. There is a need for raising risk awareness, standardised policies, collaborative strategies and empirical models for creating supply chain cyber-resilience.

Research limitations/implications

Different types of cyber risks and their points of penetration, propagation levels, consequences and mitigation measures are identified. The conceptual model developed in this study drives an agenda for future research on supply chain cyber security/resilience.

Practical implications

A multi-perspective, systematic study provides a holistic guide for practitioners in understanding cyber-physical systems. The cyber risk challenges and the mitigation strategies identified support supply chain managers in making informed decisions.

Originality/value

To the best of the authors’ knowledge, this is the first systematic literature review on managing cyber risks in supply chains. The review defines supply chain cyber risk and develops a conceptual model for supply chain cyber security systems and an agenda for future studies.

Article
Publication date: 28 August 2018

Xueling Liang and Hong Chen

The purpose of this paper is to present the current state research of cyber-physical system (CPS) and its application in libraries. CPS is a kind of large-scale and networked…

2271

Abstract

Purpose

The purpose of this paper is to present the current state research of cyber-physical system (CPS) and its application in libraries. CPS is a kind of large-scale and networked system that consists of physical and cyber elements and is currently of interest in academia, industry and government. In this survey, the definitions, theoretical foundation and basic applications of CPS are systematically reviewed. In addition, the development of library and current research of CPS application in library management are presented. The vision and challenge of smart library are also discussed.

Design/methodology/approach

By retrieving the main scholarly databases, the literature of CPS and its application in libraries were examined.

Findings

This study shows that a lot of CPS technology applications are still in initial stage, and explores CPS potential impacts on libraries.

Originality/value

The application of CPS in library management has not been paid much attention, this study provides a prospective for the application of CPS in libraries.

Details

Library Hi Tech, vol. 38 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Book part
Publication date: 15 September 2022

Ayşen Akbaş Tuna and Zafer Türkmendağ

Cyber management of organizations includes eliminating security gaps, ensuring information confidentiality, and protecting customers' data. In addition, production and planning…

Abstract

Cyber management of organizations includes eliminating security gaps, ensuring information confidentiality, and protecting customers' data. In addition, production and planning, protecting cyber and digital infrastructure are included in the chapter. The chapter deals with these issues in the context of strategy and management. In addition, the conflicts arising from competitors to access the tacit knowledge (confidential information, commercial secrets, commercial relations, customers, and tenders) of the businesses are discussed in the chapter. Cyber conflicts have now turned into a business-to-business war. Businesses have become targets in cyberwars. This chapter, therefore, examines these issues in depth.

Article
Publication date: 1 August 2023

Frank Ato Ghansah and Weisheng Lu

Despite the growing attention on the relevance of improved building management systems with cognition in recent years in the architecture, engineering, construction and operation…

Abstract

Purpose

Despite the growing attention on the relevance of improved building management systems with cognition in recent years in the architecture, engineering, construction and operation (AECO) community, no review has been conducted to understand the human-environment interaction features of cyber-physical systems (CPS) and digital twins (DTs) in developing the concept of a cognitive building (CB). Thus, this paper aims to review existing studies on CPS and DTs for CB to propose a comprehensive system architecture that considers human-environment interactions.

Design/methodology/approach

Scientometric analysis and content analysis were adopted for this study.

Findings

The scientometric analysis of 1,042 journal papers showed the major themes of CPS/DTs for CB, and these can be categorized into three key technologies to realize CB in the AECO community: CPS, DTs and cognitive computing (CC). Content analysis of 44 relevant publications in the built environment assisted in understanding and evidently confirming the claim of this study on the integration of CPS and DTs for CB in construction by also involving the CC. It is found and confirmed that CB can be realized with CPS and DTs along with the CC. A CB system architecture (CBSA) is proposed from the three key technologies considering the human-environment interactions in the loop. The study discovered the potential applications of the CBSA across the building lifecycle phases, including the design, construction and operations and maintenance, with the potential promise of endowing resilience, intelligence, greater efficiency and self-adaptiveness. Based on the findings of the review, four research directions are proposed: human-environment interactions, CB for sustainable building performance, CB concept for modular buildings and moving beyond CB.

Originality/value

This study stands out for comprehensively surveying the intellectual core and the landscape of the general body of knowledge on CPS/DTs for CB in the built environment. It makes a distinctive contribution to knowledge as it does not only propose CBSA by integrating CPS and DTs along with CC but also suggests some potential practical applications. These may require expert judgments and real case examples to enhance reproducibility and validation.

Details

Construction Innovation , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1471-4175

Keywords

Open Access
Article
Publication date: 6 August 2019

Shipeng Wang, Lizhen Cui, Lei Liu, Xudong Lu and Qingzhong Li

The purpose of this paper is to build cyber-physical-psychological ternary fusion crowd intelligence network and realize comprehensive, real, correct and synchronous projection in…

Abstract

Purpose

The purpose of this paper is to build cyber-physical-psychological ternary fusion crowd intelligence network and realize comprehensive, real, correct and synchronous projection in cyberphysical–psychological ternary fusion system. Since the network of crowd intelligence is the future interconnected network system that takes on the features of large scale, openness and self-organization. The Digital-selfs in the network of crowd intelligence interact and cooperate with each other to finish transactions and achieve co-evolution eventually.

Design/methodology/approach

To realize comprehensive, real, correct and synchronous projection between cyberphysical–psychological ternary fusion system, the authors propose the rules and methods of projection from real world to the CrowdIntell Network. They build the mental model of the Digital-self including structure model and behavior model in four aspects: identity, provision, demand and connection, thus forming a theoretical mental model framework of Digital-self.

Findings

The mental model is excepted to lay a foundation for the theory of modeling and simulation in the research of crowd science and engineering.

Originality/value

This paper is the first one to propose the mental model framework and projection rules and methods of Digital-selfs in network of crowd intelligence, which lays a solid foundation for the theory of modeling, simulation, intelligent transactions, evolution and stability of CrowdIntell Network system, thus promoting the development of crowd science and engineering.

Details

International Journal of Crowd Science, vol. 3 no. 2
Type: Research Article
ISSN: 2398-7294

Keywords

Article
Publication date: 17 January 2020

Shipra Pandey, Rajesh Kumar Singh, Angappa Gunasekaran and Anjali Kaushik

The purpose of this study is to examine cyber security risks in globalized supply chains (SCs). It has been seen to have a greater impact on the performance of SCs. The…

3509

Abstract

Purpose

The purpose of this study is to examine cyber security risks in globalized supply chains (SCs). It has been seen to have a greater impact on the performance of SCs. The information and communication technology of a firm, which enhances the efficiency and effectiveness in the SC, could simultaneously be the cause of vulnerabilities and exposure to security threats. Researchers have primarily focussed on the cyber-physical system (CPS) vulnerabilities impacting SC. This paper tries to categorize the cyber security risks occurring because of the SCs operating in CPS.

Design/methodology/approach

Based on the flow of information along the upstream and downstream SC, this paper tries to identify cyber security risks in the global SCs. It has further tried to categorize these cyber security risks from a strategic point of view.

Findings

This paper tries to identify the various cyber security risk and cyber-attacks in globalized SC for improving the performance. The 16 cyber security risks have been categorized into three categories, namely, supply risk, operational risk and demand risk. The paper proposes a framework consisting of different cyber-attacks across the information that flows in global SCs along-with suitable mitigation strategies.

Research limitations/implications

The paper presents the conceptual model of cyber security risks and cyber-attacks in globalized SCs based on literature review and industry experts. Further validation and scale development of these risks can be done through empirical study.

Practical implications

This paper provides significant managerial insights by developing a framework for understanding the cyber security risks in terms of the drivers of these risks and how to deal with them. From a managerial perspective, this framework can be used as a decision-making process while considering different cyber security risks across the stages of globalized SCs.

Originality/value

The major contribution of this study is the identification and categorization of cyber security risks across the global SCs in the digital age. Thus, this paper introduces a new phenomenon to the field of management that has the potential to investigate new areas of future research. Based on the categorization, the paper provides insights on how cyber security risks impact the continuity of SC operations.

Details

Journal of Global Operations and Strategic Sourcing, vol. 13 no. 1
Type: Research Article
ISSN: 2398-5364

Keywords

1 – 10 of over 6000