Search results for "Cybersecurity"

showing 10 items of 43 documents

Empirical Study on Cyber Range Capabilities, Interactions and Learning Features

2021

Emerging technologies and the globalization require constant investment in people and their performance in actual and virtual environments. New technologies such as autonomous systems, machine learning and artificial intelligence (AI) radically re-contextualize the human dimension of the organization. Technological developments are changing the ways people experience the physical and the virtual environments. Strategic changes have revealed new critical vulnerabilities such as social media-based disinformation campaigning with impact on the human aspects at state, societal, organizational and individual levels. Scenarios of gathering information, committing fraud or getting access to critic…

SDG 16 - PeaceKnowledge managementCybersecurityComputer scienceEmerging technologiesEmpirical researchAcquisition of skillsHuman PerformanceLearningResilience (network)Cognitive behaviourHuman Dimensionbusiness.industrySDG 16 - Peace Justice and Strong InstitutionsCyber-physical systemSDG 8 - Decent Work and Economic Growth/dk/atira/pure/sustainabledevelopmentgoals/quality_education/dk/atira/pure/sustainabledevelopmentgoals/peace_justice_and_strong_institutions/dk/atira/pure/sustainabledevelopmentgoals/decent_work_and_economic_growthJustice and Strong InstitutionsMixed realityCyber RangeVirtual learning environmentAugmented realitybusinessHuman factorsSDG 4 - Quality Education
researchProduct

La regolazione della cybersecurity in Italia

2023

Il saggio offre una panoramica generale della regolazione e dell'organizzazione della sicurezza cibernetica in Italia. In particolare, dopo una premessa volta a dedicare alcuni cenni all'evoluzione della materia e alla disciplina europea, l'elaborato si sofferma sullo stato dell'arte e sulle future sfide in materia di cybersecurity.

Sicurezza informatica sicurezza cibernetica cybersecurity strategia nazionale direttiva NIS direttiva NIS II Agenzia per la Cybersecurity Nazionale ACNSettore IUS/10 - Diritto Amministrativo
researchProduct

Leveraging the benefits of big data with fast data for effective and efficient cybersecurity analytics systems : A robust optimisation approach

2020

In recent times, major cybersecurity breaches and cyber fraud within the public and private sectors are making international headlines. Majority of organisations are facing cybersecurity adversity and advanced threats. On the one hand, we have asynchronous cybersecurity practices, many standards and frameworks to consider while on the other hand, we have to deal and secure our organisations against cyber-criminals, organised hacktivists, insider threats, hackers and nation-states with malafide intentions. The Center for Cyber Safety and Education's Global Information Security Workforce Study (GISWS) confirms that globally we are not only loosing but also backpedalling against threats and ri…

advanced cyber threatscybersecuritybig datacybersecurity analytic systemsComputingMilieux_LEGALASPECTSOFCOMPUTINGbig data analyticskyberturvallisuusverkkohyökkäyksetfast data
researchProduct

Beyond economic and financial analyses : A revelatory study of IT security investment decision-making process

2022

Information Technology (IT) security breaches and the extent of damage they may cause to an organization are inherently uncertain. Therefore, managers’ decisions about whether to make IT security investment (ITSI) and how much, depend upon a subjective assessment of the economic value of the investment and the likelihood of the damage to the organization. When managers delay or fail to decide on whether and how much to invest in IT security, it can make organizations vulnerable to operational and strategic perils. Based upon interviews, document reviews, and observations in three organizations in Finland that made ITSI decisions to acquire a secure email application system, we examined the …

behavioraljohtaminencybersecuritypäätöksentekorevelatory studyIT securitytietoturvatietotekniikkakyberturvallisuusdecision makinginvestoinnityrityksettietojärjestelmät
researchProduct

On the (In)Security of 1090ES and UAT978 Mobile Cockpit Information Systems : An Attacker Perspective on the Availability of ADS-B Safety- and Missio…

2022

Automatic dependent surveillance-broadcast (ADS-B) is a key air surveillance technology and a critical component of next-generation air transportation systems. It significantly simplifies aircraft surveillance technology and improves airborne traffic situational awareness. Many types of mobile cockpit information systems (MCISs) are based on ADS-B technology. MCIS gives pilots the flight and traffic-related information they need. MCIS has two parts: an ADS-B transceiver and an electronic flight bag (EFB) application. The ADS-B transceivers transmit and receive the ADS-B radio signals while the EFB applications hosted on mobile phones display the data. Because they are cheap, lightweight, an…

cybersecurityATClentokoneetUAT978availabilitylentoliikennecodesaerospace electronicsattackstransceiversaircraft navigationcomputer crashesATMsurveillanceDoSlennonjohtokyberturvallisuusaircraftverkkohyökkäyksetlennonvarmistusADS-B1090EStietojärjestelmät
researchProduct

Towards digital cognitive clones for the decision-makers: adversarial training experiments

2021

Abstract There can be many reasons for anyone to make a digital copy (clone) of own decision-making behavior. This enables virtual presence of a professional decision-maker simultaneously in many places and processes of Industry 4.0. Such clone can be used as one’s responsible representative when the human is not available. Pi-Mind (“Patented Intelligence”) is a technology, which enables “cloning” cognitive skills of humans using adversarial machine learning. In this paper, we present a cyber-physical environment as an adversarial learning ecosystem for cloning image classification skills. The physical component of the environment is provided by the logistic laboratory with camera-surveilla…

cybersecurityComputer scienceProcess (engineering)päätöksentukijärjestelmätneuroverkot02 engineering and technologytekoälyAdversarial machine learningAdversarial systemHuman–computer interactionComponent (UML)0202 electrical engineering electronic engineering information engineeringesineiden internetartificial digital immunitykyberturvallisuusGeneral Environmental ScienceGenerative Adversarial NetworksCloning (programming)ohjausjärjestelmät020206 networking & telecommunicationsAdversaryIndustry 4.0koneoppiminenälytekniikkaGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingClone (computing)Procedia Computer Science
researchProduct

Taxonomy of generative adversarial networks for digital immunity of Industry 4.0 systems

2021

Abstract Industry 4.0 systems are extensively using artificial intelligence (AI) to enable smartness, automation and flexibility within variety of processes. Due to the importance of the systems, they are potential targets for attackers trying to take control over the critical processes. Attackers use various vulnerabilities of such systems including specific vulnerabilities of AI components. It is important to make sure that inappropriate adversarial content will not break the security walls and will not harm the decision logic of critical systems. We believe that the corresponding security toolset must be organized as a trainable self-protection mechanism similar to immunity. We found cer…

cybersecurityIndustry 4.0Computer scienceVulnerabilityneuroverkot02 engineering and technologytekoälyComputer securitycomputer.software_genreAdversarial systemImmunityTaxonomy (general)0202 electrical engineering electronic engineering information engineeringesineiden internetartificial digital immunitykyberturvallisuusGeneral Environmental ScienceFlexibility (engineering)Generative Adversarial Networksbusiness.industryMechanism (biology)020206 networking & telecommunicationsIndustry 4.0AutomationVariety (cybernetics)koneoppiminenälytekniikkaGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingbusinesscomputerProcedia Computer Science
researchProduct

Developing and Validating a Behavioural Model of Cyberinsurance Adoption

2021

Business disruption from cyberattacks is a growing concern, yet cyberinsurance uptake remains low. Using an online behavioural economics experiment with 4800 participants across four EU countries, this study tests a predictive model of cyberinsurance adoption, incorporating elements of Protection Motivation Theory (PMT) and the Theory of Planned Behaviour (TPB) as well as factors in relation to risk propensity and price. During the experiment, participants were given the opportunity to purchase different cybersecurity measures and cyberinsurance products before performing an online task. Participants likelihood of suffering a cyberattack was dependent upon their adoption of cybersecurity me…

cybersecurityMoral hazardtheory of planned behaviourGeography Planning and Development0211 other engineering and technologiesPsychological interventionTJ807-83002 engineering and technologyManagement Monitoring Policy and LawTD194-195Structural equation modelingRenewable energy sourcesTask (project management)SAFER0502 economics and businessRisk propensityGE1-350050207 economics021110 strategic defence & security studiesActuarial scienceEnvironmental effects of industries and plantsRenewable Energy Sustainability and the Environmentcyberinsuranceprotection motivation theory05 social sciencesTheory of planned behaviorG900C800Environmental sciencesProtection motivation theoryPsychologySustainability
researchProduct

Online Expression, Personal Cybersecurity Costs, and the Specter of Cybercrime

2020

The internet is used increasingly as a platform both for free expression and e-commerce. The internet has unique security and privacy risks. Such risks include the threat of criminal cyberattacks, including hacking and doxing. Internet users have a variety of attitudes towards the security and privacy risks involved with using the internet and distinct concerns and behaviors with regard to expressing themselves online. In order to mitigate the security and privacy risks of the internet, some internet users spend valuable time thinking about and configuring the security settings of their devices. They may also have different attitudes towards personal spending of money for cybersecurity prod…

cybersecurityfrustration050801 communication & media studies02 engineering and technologyprivacy concernsComputer securitycomputer.software_genre0508 media and communications020204 information systemsyksityisyys0202 electrical engineering electronic engineering information engineeringkyberturvallisuusonline expressionriskitverkkopalvelutInternetkyberrikollisuustime consumption05 social sciencesitseilmaisukuluttajakäyttäytyminenCybercrimerisk avoidanceExpression (architecture)cybercrimePsychologycomputerpersonal cybersecurity spending
researchProduct

Developing Cybersecurity in an Industrial Environment by Using a Testbed Environment

2023

Critical infrastructure protection requires a testing environment that allows the testing of different kinds of equipment, software, networks, and tools to develop vital functions of the critical industrial environment. Used electrical equipment must be reliable, capable and maintain a stable critical industrial ecosystem. An industrial business needs to develop cybersecurity capabilities that detect and prevent IT/ICT and OT/ICS threats in an industrial environment. The emerging trend has been to create security operations center (SOC) services to detect ICS-related threats in enterprise networks. The energy supply sector must consist of crucial elements for safe business continuity and su…

cybersecuritytestbed security operations centerkyberturvallisuusoperational technologygovernance modelteollisuusyritykset
researchProduct