scholarly journals Citizens’ digital infrastructure as a new element of modern society critical infrastructure

Author(s):  
Leonid Reingold ◽  
Aleksandr Solovev ◽  
Oleg Grin ◽  
Elena Reingold

Widespread digitalization of the modern society - the emergence of digital devices, the introduction of Internet of Things, the development of Big Data processing and other technologies result in new challenges. Not only industrial and corporate automation that has already been considerably covered by the legislation initiatives but also the digitalization of everyday life has started to constitute a critical infrastructure in the modern society. This largely happens because digital devices substituting traditional technologies owned by citizens are incorporated into corporate, financial and state business processes. For instance, citizens’ devices are becoming the source of primary data for energy and utility companies. More opportunities for the direct interaction of automation solutions between themselves resulting in a controversial synergy effect have been emerging recently. The article addresses specifics of citizens’ digital infrastructure in the light of critical infrastructure, in particular the necessity and special aspects of legal and regulatory framework and possible development trends of this functionality.

2021 ◽  
Vol 11 (9) ◽  
pp. 4105
Author(s):  
Luis Daniel Samper-Escalante ◽  
Octavio Loyola-González ◽  
Raúl Monroy ◽  
Miguel Angel Medina-Pérez

The reach and influence of social networks over modern society and its functioning have created new challenges and opportunities to prevent the misuse or tampering of such powerful tools of social interaction. Twitter, a social networking service that specializes in online news and information exchange involving billions of users world-wide, has been infested by bots for several years. In this paper, we analyze both public and private databases from the literature of bot detection on Twitter. We summarize their advantages, disadvantages, and differences, recommending which is more suitable to work with depending on the necessities of the researcher. From this analysis, we present five distinct behaviors in automated accounts exhibited across all the bot datasets analyzed from these databases. We measure their level of presence in each dataset using a radar chart for visual comparison. Finally, we identify four challenges that researchers of bot detection on Twitter have to face when using these databases from the literature.


2021 ◽  
Vol 23 (8) ◽  
pp. 4-10
Author(s):  
Barakhsanova E.A. ◽  
Gotovtseva O.G. ◽  
Smetanina T.A.

The article is devoted to the actual pedagogical problem-the development of online e-learning in the conditions of digitalization of modern society. This problem is considered taking into account the increasing importance of electronic educational resources in improving the efficiency of the organization of the educational process in a remote interactive mode. The role and significance of the factors influencing the development of e-learning are presented: technical and organizational and methodological support of the educational process, the appropriate level of digital competence of the teaching staff, personal motivation of students. The results of recent studies conducted among students of the Pedagogical Institute of the North-Eastern Federal University (hereinafter-the University) and the Arctic Institute of Culture and Art (hereinafter-the Institute) for a complete picture of the state of network learning among students studying at the Institute and university, reflecting the main characteristics of the current state of digitalization of education. Based on the primary data of the study, the current problems are identified: the lack of contact interaction between the participants, which determines an individual, differentiated approach; compliance with personal conditions (motivation of the student); access to electronic sources of information; increase in the number of independent tasks in the absence of constant feedback from students, etc. The article reflects the approaches to determining the place of online e-learning in the system of professional training of future specialists using modern technologies in the organization of the educational process. The analysis of the obtained results shows that in order to implement the tasks of network learning, namely, the practical mastery of digital competence, training should be aimed at developing students ' sustainable interest in network learning.


2020 ◽  
Vol 8 (5) ◽  
pp. 42-48
Author(s):  
Yulia Matyuk

The article analyzes the risks and new opportunities that arise before man and modern society in the light of the development of artificial intelligence and robotics in the conditions of the fourth industrial revolution. The rapid development of AI indicates the absence of uniform approaches to assessing the risks and prospects associated with the use of AI. Using PESTEL analysis, the article examines the key areas of interaction between AI and humans, new challenges and prospects that open to humanity in the era of new technologies.


2021 ◽  
Vol 17 (1) ◽  
pp. 1-19
Author(s):  
Muhardi Saputra ◽  
Berlian Maulidya Izzati ◽  
Jannatul Rahmadiani

Government Resource Planning (GRP) system is a solution for managing all the resources that exist in government, namely people, technology, and business processes in it. This study aims to analyses how the acceptance of the Service and Licensing Information System for the Public (SIMPATIK) in the Investment Board and Integrated Licensing (DPMPTSP) of West Java Province. This study uses UTAUT 2 model that consist of six independent variables and two dependant variables. The relationship between the independent variable and the dependent variable is moderated by age, gender, and experience variables. The data used are primary data obtained from distributing questionnaires online to 42 DPMPTSP employees that using SIMPATIK. The hypothesis was tested with the SmartPLS and SPSS applications. The results show from a total of 14 hypotheses there are 3 hypotheses that have a significant or acceptable effect, while 11 other hypotheses are not significant or cannot be accepted.


2020 ◽  
Vol 5 (12) ◽  
pp. 82-91
Author(s):  
A. A. SERGEEV ◽  
◽  
E. P. SHIROBOKOVA ◽  

Developed countries are moving to the sixth technological order, which provides for a high proportion of innovations. Russia, possessing a great resource potential, does not fully realize it. The main reasons for the slowdown in digitalization are the incompetence and weak interest of the majority of employees in the implementation of digital technologies, high risks of investment in automation and digitalization of industrial enterprises. The high labor intensity of business processes, the low level of technology and the prevalence of labor of medium and low qualifications do not provide the necessary growth rates of labor productivity and do not stimulate investment in human capital. Information and knowledge are the main values of the digital economy, and their bearer is a person whose value lies in skills, abilities, intuition, as well as the ability to manage the most complex and intelligent digital devices that will never replace people, and people will always remain the main component of digital success. enterprises. The investment of financial resources in human capital remains not only the most relevant, but also the most effective, allowing to increase the competitiveness of the enterprise and increase the value of the human resource in the world market.


2021 ◽  
pp. 327-347
Author(s):  
Fred Cate ◽  
Rachel Dockery

This chapter discusses cybersecurity laws. Many measures employed to enhance cybersecurity pose a risk to privacy. In addition, data protection laws focus only on personally identifiable information, while cybersecurity is also concerned with securing economic data such as trade secrets and company databases, government information, and the systems that transmit and process information. As a practical matter, despite the prominence of security obligations in data protection legislation, these were often downplayed or ignored entirely until recent years. Only as cybersecurity threats became more pressing did regulators begin actively enforcing the security obligations found in most data protection laws. More recently, legislative bodies and regulators have begun adopting cybersecurity-specific obligations. However, even these have often mirrored or been combined with privacy protections, sometimes to the detriment of effective cybersecurity. The chapter describes major categories of cybersecurity law, including unfair or deceptive practices legislation, breach notification laws, and data destruction laws. It also considers the new focus on critical infrastructure and information sharing, the China Cybersecurity Law, and the new challenges to data privacy and security law.


Author(s):  
Jeffrey Kurebwa ◽  
Jacqueline Rumbidzai Tanhara

The purpose of this study was to understand the effects of cybercrime to Zimbabwe's peace and security. In the 21st century, cybercrime has become an international threat. This has necessitated many states to enact legislation and other measures to curb cybercrime. Primary data was gathered through key informant interviews, while documentary search was used to review scholarly literature on the subject. Key informants for the study were drawn from institutions that deal in combating cybercrime. Zimbabwe does not have adequate and effective legislative instruments to combat cybercrime. Cybercrime is a threat to peace and security as it can be used to bring down critical infrastructure and disrupt communication networks of the country. Some of the measures identified to curbing cybercrime include prevention and awareness, training and development, development of new technology and introduction of new laws, and updating of current and introduction of new legislations.


Author(s):  
Dhiraj Jain ◽  
Yuvraj Sharma

In the global era, Electronic Word of Mouth (E-WOM) has become an important emerging business strategy in the marketing and consumer environment. Along with the growth of digital connectivity and E-WOM, new ongoing challenges have also emerged for online users, businesses, and services. The chapter mainly aims to look closer upon how Electronic Word of Mouth faced challenges related to social, personal, psychological and human appeal in FMCG sector which influence customers as well as firms. The study used survey method to approach the respondents. The primary data was collected from 250 respondents and descriptive statistics and F-test ANOVA were used to test the significant of the association / non-association between variables. It was found that mostly customers have positive attitude towards E-WOM phenomenon. The study could help the FMCG Company in taking such steps that could make improvements in their business processes and expand their business without spending lot of money.


2020 ◽  
pp. 1107-1122
Author(s):  
Jeffrey Kurebwa ◽  
Jacqueline Rumbidzai Tanhara

The purpose of this study was to understand the effects of cybercrime to Zimbabwe's peace and security. In the 21st century, cybercrime has become an international threat. This has necessitated many states to enact legislation and other measures to curb cybercrime. Primary data was gathered through key informant interviews, while documentary search was used to review scholarly literature on the subject. Key informants for the study were drawn from institutions that deal in combating cybercrime. Zimbabwe does not have adequate and effective legislative instruments to combat cybercrime. Cybercrime is a threat to peace and security as it can be used to bring down critical infrastructure and disrupt communication networks of the country. Some of the measures identified to curbing cybercrime include prevention and awareness, training and development, development of new technology and introduction of new laws, and updating of current and introduction of new legislations.


2019 ◽  
Vol 10 (2) ◽  
pp. 19-40
Author(s):  
Badreya Al-Jenaibi

CSR is the obligation of businessmen to follow specific policies for making decisions or to do certain actions with the purpose of recognizing the need of society or any ethical factor to be followed in the entity. It is also for mangers to have responsibility for the public good, where that includes investigating whether the action is effective and contributes in promoting the public good and for advancing the basic societal beliefs to manage and contribute in its stability, harmony and strength. Corporate managers are normally appointed as being public trustees. The UAE offers insights into CSR because other Middle Eastern countries have not adopted the concept as quickly as the UAE. One indication of CSR in the UAE is its transparent firms. This article explores the current stage of CSR implementation in Arab countries, with special attention given to the UAE. An in-depth study was conducted to explore CSR implementation among local managers. Primary data from 198 questionnaires and case studies were analyzed to obtain valuable insights into the current state of CSR in the UAE. Key concepts are highlighted regarding the definition and practices of CSR in the UAE. Secondary data from both western and eastern cultures was also analyzed to examine the extent of adoption and adaptation of CSR and corporate philanthropy from multiple perspectives. Findings suggest all organizations, both local and multinational, must consider environmental and stakeholder interests in order to become global. Some confusion appears to exist between the concept of philanthropy and CSR. Some CSR highlighted by firms includes following regulations effectively and efficiently, adopting environmentally friendly business processes, organizing seminars, and creating awareness of the concept among peers. Although CSR is maturing in the Middle East, UAE firms need to improve CSR to compete with the practices that have become the CSR standard in western countries. In the last few years, governments and local organizations have strictly enforced business ethics and environmental regulations to support the growth of CSR in the country.


Sign in / Sign up

Export Citation Format

Share Document