scholarly journals Cyber threats confronting the digital built environment

2019 ◽  
Vol 26 (2) ◽  
pp. 245-266 ◽  
Author(s):  
Erika A. Parn ◽  
David Edwards

Purpose Smart cities provide fully integrated and networked connectivity between virtual/digital assets and physical building/infrastructure assets to form digital economies. However, industrial espionage, cyber-crime and deplorable politically driven cyber-interventions threaten to disrupt and/or physically damage the critical infrastructure that supports national wealth generation and preserves the health, safety and welfare of the populous. The purpose of this paper is to present a comprehensive review of cyber-threats confronting critical infrastructure asset management reliant upon a common data environment to augment building information modelling (BIM) implementation. Design/methodology/approach An interpretivist, methodological approach to reviewing pertinent literature (that contained elements of positivism) was adopted. The ensuing mixed methods analysis: reports upon case studies of cyber-physical attacks; reveals distinct categories of hackers; identifies and reports upon the various motivations for the perpetrators/actors; and explains the varied reconnaissance techniques adopted. Findings The paper concludes with direction for future research work and a recommendation to utilize innovative block chain technology as a potential risk mitigation measure for digital built environment vulnerabilities. Originality/value While cyber security and digitization of the built environment have been widely covered within the extant literature in isolation, scant research has hitherto conducted an holistic review of the perceived threats, deterrence applications and future developments in a digitized Architecture, Engineering, Construction and Operations (AECO) sector. This review presents concise and lucid reference guidance that will intellectually challenge, and better inform, both practitioners and researchers in the AECO field of enquiry.

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Nabin Chowdhury ◽  
Vasileios Gkioulos

Purpose The purpose of this paper can be encapsulated in the following points: identify the research papers published on the topic: competencies and skills necessary for critical infrastructure (CI) cyber-security (CS) protection; determine main focus areas within the identified literature and evaluate the dependency or lack thereof between them: make recommendations for future research. Design/methodology/approach This study is based on a systematic literature review conducted to identify scientific papers discussing and evaluating competencies, skills and essential attributes needed by the CI workforce for CS and preparedness to attacks and incidents. Findings After a comparative analysis of the articles reviewed in this study, a variety of skills and competencies was found to be necessary for CS assurance in CIs. These skills have been grouped into four categories, namely, technical, managerial, implementation and soft skills. Nonetheless, there is still a lack of agreement on which skills are the most critical and further research should be conducted on the relation between specific soft skills and CS assurance. Research limitations/implications Investigation of which skills are required by industry for specific CS roles, by conducting interviews and sending questionnaire\surveys, would allow consolidating whether literature and industry requirements are equivalent. Practical implications Findings from this literature review suggest that more effort should be taken to conciliate current CS curricula in academia with the skills and competencies required for CS roles in the industry. Originality/value This study provides a previously lacking current mapping and review of literature discussing skills and competencies evidenced as critical for CS assurance for CI. The findings of this research are useful for the development of comprehensive solutions for CS awareness and training.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Nandun Madhusanka Hewa Welege ◽  
Wei Pan ◽  
Mohan Kumaraswamy

PurposeApplications of social network analysis (SNA) are evidently popular amongst scholars for mapping stakeholder and other relational networks in improving the sustainability of construction activities and the resulting built environment. Nevertheless, the literature reveals a lack of thorough understanding of optimal SNA applications in this field. Therefore, this paper aims to convey a comprehensive critical review of past applications of SNA in this field.Design/methodology/approach95 relevant journal papers were initially identified from the “Web of Science” database and a bibliometric analysis was carried out using the “VOS Viewer” software. The subsequent in-depth review of the SNA methods, focussed on 24 specifically relevant papers selected from these aforesaid 95 papers.FindingsA significant growth of publications in this field was identified after 2014, especially related to topics on stakeholder management. “Journal of Cleaner Production”, “International Journal of Project Management” and “Sustainability” were identified as the most productive sources in this field, with the majority of publications from China. Interviews and questionnaires were the popular data collection methods while SNA “Centrality” measures were utilised in over 70% of the studies. Furthermore, potential areas were noted, to improve the mapping and thereby provide useful information to managers who could influence relevant networks and consequentially better sustainability outcomes, including those enhanced by collaborative networks.Originality/valueCloser collaboration has been found to help enhance sustainability in construction and built environment, hence attracting research interest amongst scholars on how best to enable this. SNA is established as a significant methodological approach to analysing interrelationships and collaborative potential in general. In a pioneering application here, this paper initiates the drawing together of findings from relevant literature to provide useful insights for future researchers to comprehensively identify, compare and contrast the applications of SNA techniques in construction and built environment management from a sustainability viewpoint.


2019 ◽  
Vol 11 (1) ◽  
pp. 81-96 ◽  
Author(s):  
Juma Bananuka ◽  
Musa Kasera ◽  
Grace Muganga Najjemba ◽  
Doreen Musimenta ◽  
Bob Ssekiziyivu ◽  
...  

Purpose The purpose of this paper is to report on the results of a study carried out to examine the mediating effect of attitude in the relationship between subjective norm, religiosity and intention to adopt Islamic banking in a developing secular state like Uganda. Design/methodology/approach This study’ research design was cross sectional. Closed ended questionnaires were distributed to 258 managers of micro businesses in Uganda. Data were analyzed with the help of SPSS v22 and MedGraph program (Excel version). Findings Attitude is a significant mediator in the relationship between subjective norm and intention to adopt Islamic banking. Also, attitude significantly mediates the relationship between religiosity and intention to adopt Islamic banking. Research limitations/implications The study used only a single research methodological approach; therefore, future research could be undertaken using a mixed-methods approach. Practical implications Emphasis should be put on improving the mindsets of Ugandans toward Islamic banking. Originality/value While there has been a number of studies on Islamic banking, this study provides an initial empirical evidence on the mediation effect of attitude in the relationship between subjective norm, religiosity and intention to adopt Islamic banking in a single study in an African developing secular state like Uganda.


Author(s):  
Ana Kovacevic ◽  
Dragana Nikolic

We are facing the expansion of cyber incidents, and they are becoming more severe. This results in the necessity to improve security, especially in the vulnerable field of critical infrastructure. One of the problems in the security of critical infrastructures is the level of awareness related to the effect of cyberattacks. The threat to critical infrastructure is real, so it is necessary to be aware of it and anticipate, predict, and prepare against a cyber attack. The main reason for the escalation of cyberattacks in the field of Critical Infrastructure (CI) may be that most control systems used for CI do not utilise propriety protocols and software anymore; they instead utilise standard solutions. As a result, critical infrastructure systems are more than ever before becoming vulnerable and exposed to cyber threats. It is important to get an insight into what attack types occur, as this may help direct cyber security efforts. In this chapter, the authors present vulnerabilities of SCADA systems against cyber attack, analyse and classify existing cyber attacks, and give future directions to achieve better security of SCADA systems.


2017 ◽  
Vol 9 (3) ◽  
pp. 206-228 ◽  
Author(s):  
Colette Henry ◽  
Barbara Orser ◽  
Susan Coleman ◽  
Lene Foss

Purpose Government attention to women’s entrepreneurship has increased in the past two decades; however, there are few cross-cultural studies to inform policy development. This paper aims to draw on gender and institutional theory to report on the status of female-focused small and medium-sized enterprises/entrepreneurship policies and to ask how – and to what extent – do women’s entrepreneurship policies differ among countries? Design/methodology/approach A common methodological approach is used to identify gaps in the policy-practice nexus. Findings The study highlights countries where policy is weak but practice is strong, and vice versa. Research limitations/implications The study’s data were restricted to policy documents and observations of practices and initiatives on the ground. Practical implications The findings have implications for policy makers in respect of support for women’s entrepreneurship. Recommendations for future research are advanced. Originality/value The paper contributes to extant knowledge and understanding about entrepreneurship policy, specifically in relation to women’s entrepreneurship. It is also one of the few studies to use a common methodological approach to explore and compare women’s entrepreneurship policies in 13 countries.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ashish Pandey

Purpose This study aims to examine some of the commonly proposed deviants associated with the banking industry in the context of the capital structure puzzle. The paper considers the role of guarantees, information asymmetry and other frictional factors in the context of modern financial markets and examines whether these factors deserve special consideration in solving the capital structure puzzle for banks. Design/methodology/approach The authors adopt the argumentation theory model proposed by Toulmin (1958) as the methodological approach in this paper. Findings The findings from this paper demonstrate that any solution to the capital structure puzzle, whenever available, will also solve the capital structure puzzle for banks without additional efforts. The focus of future research should be on solving the generic capital structure puzzle for a universal set of firms rather than focusing on the banking industry as a subset with unique features. Originality/value The paper adopts a novel methodological approach offered by argumentation theory to pursue the enquiry. To the best of the knowledge, this paper is the first paper in the finance literature that uses argumentation theory to develop a theoretical construct. The finding from this study offers guidance for the proliferation of research paradigms in the capital structure puzzle.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Felicitas Hoppe ◽  
Nadine Gatzert ◽  
Petra Gruner

PurposeThis article aims to gain insights on the current state of small- and medium-sized enterprises’ (SMEs’) cyber risk management process and to derive future research directions.Design/methodology/approachThis is done by collecting market insights from 37 recent industry surveys and structuring them based on the steps of the risk management process. From this analysis, major challenges are derived and future fields of research identified.FindingsThe results indicate that deficiencies in risk culture as well as the strained market for IT experts are the major obstacles with respect to the implementation of cyber risk management in SMEs, and that these challenges are similar across countries. The findings suggest that especially the relationship between cyber security culture and cyber risk management should be investigated further, and that a stronger link between the research streams on enterprise risk management and cyber risk management would be desirable.Originality/valueThis paper contributes to the literature by providing a systematic overview on the current state of SMEs' cyber risk management from a market perspective. The findings provide support for the existing academic literature by emphasizing the central role of cyber security culture (perception, knowledge, attitude) for a successful cyber risk management, which however should be addressed in more depth in future (empirical) research.


Author(s):  
Ana Kovacevic ◽  
Dragana Nikolic

We are facing the expansion of cyber incidents, and they are becoming more severe. This results in the necessity to improve security, especially in the vulnerable field of critical infrastructure. One of the problems in the security of critical infrastructures is the level of awareness related to the effect of cyberattacks. The threat to critical infrastructure is real, so it is necessary to be aware of it and anticipate, predict, and prepare against a cyber attack. The main reason for the escalation of cyberattacks in the field of Critical Infrastructure (CI) may be that most control systems used for CI do not utilise propriety protocols and software anymore; they instead utilise standard solutions. As a result, critical infrastructure systems are more than ever before becoming vulnerable and exposed to cyber threats. It is important to get an insight into what attack types occur, as this may help direct cyber security efforts. In this chapter, the authors present vulnerabilities of SCADA systems against cyber attack, analyse and classify existing cyber attacks, and give future directions to achieve better security of SCADA systems.


2020 ◽  
Vol 26 (4) ◽  
pp. 669-687 ◽  
Author(s):  
Sathies T. ◽  
Senthil P. ◽  
Anoop M.S.

Purpose Fabrication of customized products in low volume through conventional manufacturing incurs a high cost, longer processing time and huge material waste. Hence, the concept of additive manufacturing (AM) comes into existence and fused deposition modelling (FDM), is at the forefront of researches related to polymer-based additive manufacturing. The purpose of this paper is to summarize the research works carried on the applications of FDM. Design/methodology/approach In the present paper, an extensive review has been performed related to major application areas (such as a sensor, shielding, scaffolding, drug delivery devices, microfluidic devices, rapid tooling, four-dimensional printing, automotive and aerospace, prosthetics and orthosis, fashion and architecture) where FDM has been tested. Finally, a roadmap for future research work in the FDM application has been discussed. As an example for future research scope, a case study on the usage of FDM printed ABS-carbon black composite for solvent sensing is demonstrated. Findings The printability of composite filament through FDM enhanced its application range. Sensors developed using FDM incurs a low cost and produces a result comparable to those conventional techniques. EMI shielding manufactured by FDM is light and non-oxidative. Biodegradable and biocompatible scaffolds of complex shapes are possible to manufacture by FDM. Further, FDM enables the fabrication of on-demand and customized prosthetics and orthosis. Tooling time and cost involved in the manufacturing of low volume customized products are reduced by FDM based rapid tooling technique. Results of the solvent sensing case study indicate that three-dimensional printed conductive polymer composites can sense different solvents. The sensors with a lower thickness (0.6 mm) exhibit better sensitivity. Originality/value This paper outlines the capabilities of FDM and provides information to the user about the different applications possible with FDM.


2019 ◽  
Vol 37 (5) ◽  
pp. 638-661 ◽  
Author(s):  
Abdul-Rasheed Amidu ◽  
David Boyd ◽  
Fernand Gobet

Purpose Behavioural studies of valuers have suggested that valuers rely on a number of cognitive strategies involving reasoning and intuition when undertaking a valuation task. However, there are few studies of the actual reasoning mechanisms in valuation. In other fields, much attention has been paid to forward and backward reasoning, as this shows the choices and decisions that are made in undertaking a complex task. This paper studied this during a valuation task. The purpose of this paper is twofold: first, to develop a methodological approach for empirical research on valuers’ reasoning, and, second, to report expert-novice differences on valuers’ use of forward and backward reasoning during a valuation problem solving. Design/methodology/approach The study utilised a verbal protocol analysis (VPA) to elicit think-aloud data from a purposive sample of a group of valuers of different levels of expertise undertaking a commercial-valuation task. Through a content analysis interpretive strategy, the transcripts were analysed into different cognitive segments identifying the forward and backward reasoning strategies. Findings The findings showed that valuers accomplished the valuation task by dividing the overall problem into sub-problems. These sub-problems are thereafter solved by integrating available data with existing knowledge by relying more on forward reasoning than backward reasoning. However, there were effects associated with the level of expertise in the way the processes of forward and backward reasoning are used, with the expert and intermediate valuers being more thorough and comprehensive in their reasoning process than the novices. Research limitations/implications This study explores the possibility that forward and backward reasoning play an important role in commercial valuation problem solving using a limited sample of valuers. Given this, data cannot be generalised to all valuation practice settings but may motivate future research that examines the effectiveness of forward and backward reasoning in diverse valuation practice settings and develops a holistic model of valuation reasoning. Practical implications The findings of this study are applicable to valuation practice. Future training efforts need to evaluate the usefulness of teaching problem solving and explicitly recognise forward and backward reasoning, along with other problem-solving strategies uncovered in this study, as standard training strategies for influencing the quality of valuation decisions. Originality/value By adopting VPA, this study employs an insightful and rich dataset which allows an interpretation of thoughts of valuers into cognitive reasoning strategies that provide a deeper level of understanding of how valuers solve valuation problem; this has not been possible in previous related valuation studies.


Sign in / Sign up

Export Citation Format

Share Document