Quantifying the Impact of Design Strategies for Big Data Cyber Security Analytics: An Empirical Investigation

Author(s):  
Faheem Ullah ◽  
M. Ali Babar
2019 ◽  
Vol 109 ◽  
pp. 33-37 ◽  
Author(s):  
Patrick Bajari ◽  
Victor Chernozhukov ◽  
Ali Hortaçsu ◽  
Junichi Suzuki

We examine the impact of “big data” on firm performance in the context of forecast accuracy using proprietary retail sales data obtained from Amazon. We measure the accuracy of forecasts in two relevant dimensions: the number of products (N), and the number of time periods for which a product is available for sale (T). Theory suggests diminishing returns to larger N and T, with relative forecast errors diminishing at rate 1/sqrt(N)+1/sqrt(T). Empirical results indicate gains in forecast improvement in the T dimension but essentially flat N effects.


Author(s):  
Anandakumar Haldorai ◽  
Arulmurugan Ramu

In order to scrutinize or evaluate an extremely high quantity of an ever-present and diversified nature of data, new technologies are developed. With the application of these technologies, called big data technologies, to the constantly developing various internal as well as external sources of data, concealed correlations between data can be identified, and promising strategies can be developed, which is necessary for economic growth and new innovations. This chapter deals with the analysis of the real-time uses of big data to both individual persons and the society too, while concentrating on seven important areas of key usage: big data for business optimization and customer analytics, big data and healthcare, big data and science, big data and finance, big data as enablers of openness and efficiency in government, big data and the emerging energy distribution systems, and big data security.


2020 ◽  
Vol 4 (4) ◽  
pp. 40
Author(s):  
Hossein Hassani ◽  
Stephan Unger ◽  
Christina Beneki

This article investigates the impact of big data on the actuarial sector. The growing fields of applications of data analytics and data mining raise the ability for insurance companies to conduct more accurate policy pricing by incorporating a broader variety of data due to increased data availability. The analyzed areas of this paper span from automobile insurance policy pricing, mortality and healthcare modeling to estimation of harvest-, climate- and cyber risk as well as assessment of catastrophe risk such as storms, hurricanes, tornadoes, geomagnetic events, earthquakes, floods, and fires. We evaluate the current use of big data in these contexts and how the utilization of data analytics and data mining contribute to the prediction capabilities and accuracy of policy premium pricing of insurance companies. We find a high penetration of insurance policy pricing in almost all actuarial fields except in the modeling and pricing of cyber security risk due to lack of data in this area and prevailing data asymmetries, for which we identify the application of artificial intelligence, in particular machine learning techniques, as a possible solution to improve policy pricing accuracy and results.


2020 ◽  
Vol 4 (2) ◽  
Author(s):  
Hamdan Nafiatur Rosyida ◽  
Demeiati Nur Kusumaningrum ◽  
Palupi Anggraheni

ABSTRAKHasil survei oleh Asosiasi Penyelenggara Jasa Internet Indonesia (APJII) pada tahun 2016 menunjukkan bahwa 51,8 persen dari 256,2 juta penduduk Indonesia merupakan pengguna internet dan 47,6 persennya menggunakan internet melalui gawai pribadi. Meskipun demikian, fenomena sosial mencatat tidak semua individu dapat menggunakan media sosial secara bijak. Hal itulah yang menjadi semangat kemitraan tim UMM dengan SMA 1 Muhammadiyah Malang dalam program pelatihan literasi digital. Pemahaman siswa tentang literasi digital dalam penggunaan media sosial masih minim. Siswa menguasai penggunaan media sosial popular seperi Instagram, Twitter maupun Facebook namun dampak media sosial seperti munculnya hoax, fenomena ‘firehose falsehood’ maupun efek domino lainnya belum terlalu mendapat perhatian. Program literasi digital dilaksanakan melalui 2 (dua) format. Pertama, Seminar dan Talkshow Literasi Digital yang terdiri dari topik perkembangan terkini media social, pengenalan tentang logika big data yang menentukan tajuk komposisi berita, dan pengenalan keamanan digital (cyber security). Kedua, sosialisasi berinternet secara bijak menggunakan instrumen buku saku (booklet) yang bertujuan memberikan pemahaman bagi siswa mengenai bagaimana penggunaan sosial media dan dampak positif negatif dalam berbagai perspektif studi kasus.Kata Kunci: internet; literasi; millenial; pelatihan; remaja Invites Generation Z of Muhammadiyah Malang 1 High School to Internet WiselyABSTRACTThe results of a survey by the Indonesian Internet Service Providers Association (APJII) in 2016 showed that 51.8 percent of 256.2 million Indonesians were internet users and 47.6 percent used the internet through private devices. However, social phenomena noted that not all individuals can use social media wisely. That was the spirit of the partnership between UMM and SMA 1 Muhammadiyah Malang in the digital literacy training program. Students' understanding of digital literacy in the use of social media is still minimal. Students master the use of popular social media like Instagram, Twitter and Facebook but the impact of social media such as the emergence of hoaxes, the phenomenon of 'firehose falsehood' and other domino effects have not received much attention. Digital literacy program is carried out in 2 (two) formats. First, the Seminar and Digital Literacy Talkshow which consists of the latest developments in social media, the introduction of the logic of big data that determines the headline of news composition, and the introduction of digital security (cyber security). Second, internet socialization wisely uses a booklet instrument which aims to provide students with an understanding of how social media is used and its positive and negative impacts in a variety of case study perspectives.Keywords: internet; literacy; millennial; training; teenager


Author(s):  
A. G. Rekha

With the availability of large volumes of data and with the introduction of new tools and techniques for analysis, the security analytics landscape has changed drastically. To face the challenges posed by cyber-terrorism, espionage, cyber frauds etc. Government and law enforcing agencies need to enhance the security and intelligence analysis systems with big data technologies. Intelligence and security insight can be improved considerably by analyzing the under-leveraged data like the data from social media, emails, web logs etc. This Chapter provides an overview of the opportunities presented by Big Data to provide timely and reliable intelligence in properly addressing terrorism, crime and other threats to public security. This chapter also discusses the threats posed by Big Data to public safety and the challenges faced in implementing Big Data security solutions. Finally some of the existing initiatives by national governments using Big Data technologies to address major national challenges has been discussed.


Author(s):  
Subil Abraham ◽  
Suku Nair

Dependable metrics are one of the critical elements of an organization’s information security program and are crucial for its long-term success. Current research in the area of enterprise security metrics provides limited insight on understanding the impact that attacks have on the overall security goals of an enterprise as well as predicting the future security state of the network. In this paper we present a novel security analytics framework that takes into account both the inter-relationship between different vulnerabilities and the temporal features that evolve over time, such as the vulnerability discovery rate and the lifecycle events. We then formally define a non-homogenous stochastic model that incorporates time dependent covariates, namely the vulnerability age and the vulnerability discovery rate, to help visualize the future security state of the network leading to actionable knowledge and insight. We will perform a comparative analysis and also describe the patch optimization methodology by applying this model on a sample network to demonstrate the practicality of our approach.


Sign in / Sign up

Export Citation Format

Share Document