scholarly journals Societal Impact Assessment of a Cyber Security Network Project

2020 ◽  
Vol 46 (1) ◽  
pp. 53-64
Author(s):  
Kirsi Aaltola ◽  
Harri Ruoslahti
2022 ◽  
Vol 17 ◽  
pp. 1274-1283
Author(s):  
Harri Ruoslahti ◽  
Bríd Davis

Solutions on both consumer and state levels have become increasingly vulnerable to sophisticated cyberattacks by e.g. malware, phishing, machine learning and artificial intelligence. As the adoption and integration of information technologies are increasing and solutions are developing, the need to invest in cyber-security is at an all-time high. Investment in cybersecurity is a chief priority within the European Union, and project ECHO is a one initiative that put emphasis on devising, elaborating, implementing and enhancing a series of technological solutions (assets) to counteract cyber-attacks. The research problem of this study is what societal impacts do the ECHO assets have as product, as knowledge use, and as benefits to society. The literature review includes theory and practice from academic papers, EU innovation project and professional reports, and some ECHO project workflows. Relevant academic theoretical approaches that provide a basis for this task are: e-skills and training, Organisational Learning (OL), Societal Impact (SI), Societal Impact Assessment (SIA). This is a qualitative pilot study that evaluates the usefulness of employing a Product/ Knowledge/ Benefit Societal Impact framework to assessment of societal impacts. Data collection involved qualitative participatory observation of a co-creative expert hackathon workshop. This pilot study shows that the methodology path, where societal impact of ICT and AI solutions (e.g. the ECHO assets) are examined as these three elements (product, knowledge use, societal benefit). This pilot study serves as a step to validate this path and design and select practical, rigorous and relevant quantitative methodology to further the understanding of both societal impact assessment of cyber, e-, and AI-based solutions and services. To incorporate societal impacts with cyber and e-skills this study recommends developing and refining actual key performance indicators (KPI) to provide a basis for rigorous and relevant qualitative and quantitative questionnaire based inquiry of cyber, e-, and AI-based solutions and services.


2021 ◽  
pp. 009182962110021
Author(s):  
Hae-Won Kim

This article explores ways of conceptualizing research impact and its assessment in the context of missiological research. Can it be assumed that there is a link between missiological research knowledge and research impact on mission practice and practitioners? First, the author defines and discusses some key concepts – research impact, impact assessment, academic impact and societal impact – as well as conceptual frameworks of and approaches to research impact assessment. The author then begins to conceptualize a framework for linking research to practice in missiological research which can be further developed into a framework for research impact assessment.


Author(s):  
Petar Radanliev ◽  
Rafael Mantilla Montalvo ◽  
Razvan Nicolescu ◽  
Michael Huth ◽  
Stacy Cannady ◽  
...  

This paper is focused on mapping the current evolution of Internet of Things (IoT) and its associated cyber risks for the Industry 4.0 (I4.0) sector. We report the results of a qualitative empirical study that correlates academic literature with 14 - I4.0 frameworks and initiatives. We apply the grounded theory approach to synthesise the findings from our literature review, to compare the cyber security frameworks and cyber security quantitative impact assessment models, with the world leading I4.0 technological trends. From the findings, we build a new impact assessment model of IoT cyber risk in Industry 4.0. We therefore advance the efforts of integrating standards and governance into Industry 4.0 and offer a better understanding of economics impact assessment models for I4.0.


2021 ◽  
Vol 31 (6) ◽  
pp. 443-449
Author(s):  
Dong-Wook Kim ◽  
Gun-Yoon Shin ◽  
Ji-Young Yun ◽  
Sung-Sam Hong ◽  
Myung-Mook Han

2020 ◽  
Vol 52 ◽  
pp. 101813 ◽  
Author(s):  
Niusha Esmaeilpoorarabi ◽  
Tan Yigitcanlar ◽  
Md. Kamruzzaman ◽  
Mirko Guaralda

Author(s):  
Khushpreet Kaur

Cybersecurity has a vital role in Information Technology. The cybersecurity security involves the security on data/information stored in various devices present on different networks. However, it is very difficult to secure information in today’s world because of the increasing number of devices like computer systems, mobile phones, televisions, etc. for technological development. The data can be in many forms like data of employees in the organization, an individual’s data present on a social media website, the data stored in mobile devices or on the cloud. This data is stored mostly on networks including the company’s websites, servers, the cloud which is the main reason for data to be hacked. Numerous cyber threats are increasing day by day and to ensure cybersecurity and privacy of internet users various challenges have been faced by IT industries. Those challenges include data security, mobile security, network security, Application Security, Biometric authentication. The elaboration of these cybersecurity challenges and cyberattacks will be discussed in this paper. Cyber attacks are not only harmful to organizations, but it is also dangerous for individuals. Those attacks are the attacks done by cyber attackers for their advantage or to harm individuals for their revenge. Some common cyber threats are phishing, ransomware attack, malware, etc. whose description is given below in the ‘Types of cyber-attacks’ section. Moreover, this paper includes cybersecurity techniques that will be helpful to reduce data breaches, identity theft, or other cyber threats. Awareness of those cyber techniques will help both individuals and organizations to protect their information from various types of cyberattacks.


Sign in / Sign up

Export Citation Format

Share Document