Search results
1 – 10 of 326J. Buckley, B. O'Flynn, J. Barton and S.C. O'Mathuna
The purpose of this paper is to develop a highly miniaturized wireless inertial sensor system based on a novel 3D packaging technique using a flexible printed circuit (FPC). The…
Abstract
Purpose
The purpose of this paper is to develop a highly miniaturized wireless inertial sensor system based on a novel 3D packaging technique using a flexible printed circuit (FPC). The device is very suitable for wearable applications in which small size and lightweight are required such as body area network, medical, sports and entertainment applications.
Design/methodology/approach
Modern wireless inertial measurement units are typically implemented on a rigid 2D printed circuit board (PCB). The design concept presented here is based around the use of a novel planar, six‐faceted, crucifix or cross‐shaped FPC instead of a rigid PCB. A number of specific functional blocks (such as microelectromechanical systems gyroscope and accelerometer sensors, microcontroller (MCU), radio transceiver, antenna, etc.) are first assigned to each of the six faces which are each 1 cm2 in area. The FPC cross is then developed into a 1 cm3, 3D configuration by folding the cross at each of five bend planes. The result is a low‐volume and lightweight, 1 cm3 wireless inertial sensor that can sense and send motion sensed data wirelessly to a base station. The wireless sensor device has been designed for low power operation both at the hardware and software levels. At the base station side, a radio receiver is connected to another MCU unit, which sends received data to a personal computer (PC) and graphical user interface. The industrial, scientific and medical band (2.45 GHz) is used to achieve half duplex communication between the two sides.
Findings
A complete wireless sensor system has been realized in a 3D cube form factor using an FPC. The packaging technique employed during the work is shown to be efficient in fabricating the final cubic system and resulted in a significant saving in the final size and weight of the system. A number of design issues are identified regarding the use of FPC for implementing the 3D structure and the chosen solutions are shown to be successful in dealing with these issues.
Research limitations/implications
Currently, a limitation of the system is the need for an external battery to power the sensor system. A second phase of development would be required to investigate the possibility of the integration of a battery and charging system within the cube structure. In addition, the use of flexible substrate imposes a number of restrictions in terms of the ease of manufacturability of the final system due to the requirement of the required folding step.
Practical implications
The small size and weight of the developed system is found to be extremely useful in different deployments. It would be useful to further explore the system performance in different application scenarios such as wearable motion tracking applications. In terms of manufacturability, component placement needs to be carefully considered, ensuring that there is sufficient distance between the components, bend planes and board edges and this leads to a slightly reduced usable area on the printed circuit.
Originality/value
This paper provides a novel and useful method for realizing a wireless inertial sensor system in a 3D package. The value of the chosen approach is that a significant reduction in the required system volume is achieved. In particular, a 78.5 per cent saving in volume is obtained in decreasing the module size from a 25 to a 15 mm3 size.
Details
Keywords
Abel Yeboah-Ofori and Francisca Afua Opoku-Boateng
Various organizational landscapes have evolved to improve their business processes, increase production speed and reduce the cost of distribution and have integrated their…
Abstract
Purpose
Various organizational landscapes have evolved to improve their business processes, increase production speed and reduce the cost of distribution and have integrated their Internet with small and medium scale enterprises (SMEs) and third-party vendors to improve business growth and increase global market share, including changing organizational requirements and business process collaborations. Benefits include a reduction in the cost of production, online services, online payments, product distribution channels and delivery in a supply chain environment. However, the integration has led to an exponential increase in cybercrimes, with adversaries using various attack methods to penetrate and exploit the organizational network. Thus, identifying the attack vectors in the event of cyberattacks is very important in mitigating cybercrimes effectively and has become inevitable. However, the invincibility nature of cybercrimes makes it challenging to detect and predict the threat probabilities and the cascading impact in an evolving organization landscape leading to malware, ransomware, data theft and denial of service attacks, among others. The paper explores the cybercrime threat landscape, considers the impact of the attacks and identifies mitigating circumstances to improve security controls in an evolving organizational landscape.
Design/methodology/approach
The approach follows two main cybercrime framework design principles that focus on existing attack detection phases and proposes a cybercrime mitigation framework (CCMF) that uses detect, assess, analyze, evaluate and respond phases and subphases to reduce the attack surface. The methods and implementation processes were derived by identifying an organizational goal, attack vectors, threat landscape, identification of attacks and models and validation of framework standards to improve security. The novelty contribution of this paper is threefold: first, the authors explore the existing threat landscapes, various cybercrimes, models and the methods that adversaries are deploying on organizations. Second, the authors propose a threat model required for mitigating the risk factors. Finally, the authors recommend control mechanisms in line with security standards to improve security.
Findings
The results show that cybercrimes can be mitigated using a CCMF to detect, assess, analyze, evaluate and respond to cybercrimes to improve security in an evolving organizational threat landscape.
Research limitations/implications
The paper does not consider the organizational size between large organizations and SMEs. The challenges facing the evolving organizational threat landscape include vulnerabilities brought about by the integrations of various network nodes. Factor influencing these vulnerabilities includes inadequate threat intelligence gathering, a lack of third-party auditing and inadequate control mechanisms leading to various manipulations, exploitations, exfiltration and obfuscations.
Practical implications
Attack methods are applied to a case study for the implementation to evaluate the model based on the design principles. Inadequate cyber threat intelligence (CTI) gathering, inadequate attack modeling and security misconfigurations are some of the key factors leading to practical implications in mitigating cybercrimes.
Social implications
There are no social implications; however, cybercrimes have severe consequences for organizations and third-party vendors that integrate their network systems, leading to legal and reputational damage.
Originality/value
The paper’s originality considers mitigating cybercrimes in an evolving organization landscape that requires strategic, tactical and operational management imperative using the proposed framework phases, including detect, assess, analyze, evaluate and respond phases and subphases to reduce the attack surface, which is currently inadequate.
Details
Keywords
Ayodeji E. Oke, Seyi S. Stephen and Clinton O. Aigbavboa
James Lappeman, Michaela Franco, Victoria Warner and Lara Sierra-Rubia
This study aims to investigate the factors that influence South African customers to potentially switch from one bank to another. Instead of using established models and survey…
Abstract
Purpose
This study aims to investigate the factors that influence South African customers to potentially switch from one bank to another. Instead of using established models and survey techniques, the research measured social media sentiment to measure threats to switch.
Design/methodology/approach
The research involved a 12-month analysis of social media sentiment, specifically customer threats to switch banks (churn). These threats were then analysed for co-occurring themes to provide data on the reasons customers were making these threats. The study used over 1.7 million social media posts and focused on all five major South African retail banks (essentially the entire sector).
Findings
This study concluded that seven factors are most significant in understanding the underlying causes of churn. These are turnaround time, accusations of unethical behaviour, billing or payments, telephonic interactions, branches or stores, fraud or scams and unresponsiveness.
Originality/value
This study is unique in its measurement of unsolicited social media sentiment as opposed to most churn-related research that uses survey- or customer-data-based methods. In addition, this study observed the sentiment of customers from all major retail banks across 12 months. To date, no studies on retail bank churn theory have provided such an extensive perspective. The findings contribute to Susan Keaveney’s churn theory and provide a new measurement of switching threat through social media sentiment analysis.
Details