scholarly journals The Smart Factory and Its Risks

Systems ◽  
2018 ◽  
Vol 6 (4) ◽  
pp. 38 ◽  
Author(s):  
Frank Herrmann

In this paper, the risks of a Smart Factory are to be examined and structured in order to be able to evaluate the status of the Smart Factory. This thesis thus serves as an overview of the technical components of a Smart Factory and the associated risks. The study takes a holistic view of the smart factory. The results show that the greatest need for action lies in the technological field. Thus, the topics of standardization, information security, availability of IT infrastructure, availability of fast internet and complex systems were prioritized. The organizational and financial risks, which also play an important role in a Smart Factory transformation, are addressed.

2021 ◽  
pp. 93-101
Author(s):  
D.S. Kucherenko ◽  

The article discusses the problems of managing the information security of the enterprise in a changing business climate. The description, shortcomings and advantages of the existing asS TP security system are given. The specifics of the company's procedural and technological security capabilities have been revealed. The enterprise's IT infrastructure has been identified in the information security and cyber defense format, consisting of three components: the servers of applications that deliver business applications; database servers that contain business data and system administration channels to manage and monitor infrastructure that need to work together as a coherent and coordinated system. Structured architecture, uniting corporate cybersecurity in 11 functional areas covering the technical and operational breadth of enterprise cybersecurity. These functional areas are highlighted on the basis of their relative independence from each other and because they are well consistent with the way staff, experience and responsibilities are shared in the enterprise. This corporate cybersecurity architecture format provides the basis for managing the capabilities that the enterprise provides the tools of audit, forensics, detection, and preventive control. This structure provides consistent management of security capabilities and helps prioritize their deployment, maintenance, and updates over time. It also ensures strict accountability and good alignment of strategy, staff, budget and technology to meet the organization's security needs. The structure is designed to be flexible and scalable regardless of the size of the enterprise. It provides an expandable mechanism for adjusting cyber defense over time in response to changing cyber threats.


2012 ◽  
pp. 1282-1304
Author(s):  
Mangala Anil Hirwade

The National e-Governance Plan (NeGP) was approved by the Government of India in the year 2006, comprising of 27 Mission Mode Projects (MMPs) and 8 components. The vision of this programme is –“to make all government services accessible to the common man in his locality, through common service delivery outlets, and ensure efficiency, transparency, and reliability of such services at affordable costs to realise the basic needs of the common man.” The effort has been made to demystify and simplify the process of delivering government services by taking a holistic view of initiatives across the country and proving an enabling ICT based platform. The ultimate objective is to bring government services to citizens’ doorsteps. This article discusses major e-governance initiatives before the launch of NeGP and the status of MMPs under Central and State Government and under integrated service category after the launch of NeGP. It also takes an overview of the number of online services provided to the stakeholders through government portals. A review of recommendations of National Knowledge Commission of India on e-governance is taken along with the actions taken in this direction. Major challenges in implementation of e-governance are also discussed.


Author(s):  
Efstratia Mourtou

Since Hospital Information Systems (HIS) are designed to support doctors and healthcare professionals in their daily activities, information security plays a vital role in managing access control. Efficiency and effectiveness of information security policy is crucial, especially when dealing with situations that affect the status and life-history of the patient. In addition, the rules and procedures to follow, in order to provide confidentiality of sensitive information, have to focus on management of events on any table of the HIS. On the other hand, control and statement constraints, as well as events and security auditing techniques, play also an important role, due to the heterogeneity of healthcare professionals’ roles, actions and physical locations, as well as to the specific characteristics and needs of the healthcare organizations. This chapter will first explore issues in managing access control and security of healthcare information by reviewing the possible threats and vulnerabilities as well as the basic attributes of the hospital’s security plan. The authors will then present a hierarchical access model that, from a security policy perspective, refers to data ownership and access control issues. The authors conclude the chapter with discussions of upcoming security issues.


2014 ◽  
Vol 22 (1) ◽  
pp. 115-126 ◽  
Author(s):  
Eyong B. Kim

Purpose – The purpose of this paper is to survey the status of information security awareness among college students in order to develop effective information security awareness training (ISAT). Design/methodology/approach – Based on a review of the literature and theoretical standpoints as well as the National Institute of Standards and Technology Special Publication 800-50 report, the author developed a questionnaire to investigate the attitudes toward information security awareness of undergraduate and graduate students in a business college at a mid-sized university in New England. Based on that survey and the previous literature, suggestions for more effective ISAT are provided. Findings – College students understand the importance and the need for ISAT but many of them do not participate in it. However, security topics that are not commonly covered by any installed (or built-in) programs or web sites have a significant relationship with information security awareness. It seems that students learned security concepts piecemeal from variety of sources. Practical implications – Universities can assess their ISAT for students based on the findings of this study. Originality/value – If any universities want to improve their current ISAT, or establish it, the findings of this study offer some guidelines.


2015 ◽  
Vol 8 (2) ◽  
pp. 34-37 ◽  
Author(s):  
Сазонова ◽  
Svetlana Sazonova

Hydraulic systems belong to the category of complex systems, between the individual elements of the histories and subsystems exist internal communication, precluding the possibility of an Autonomous fashion from cancellation. The scale of such systems and their development trends lead to the inevitable decomposition approach. Research is not always to be the whole system, and some of its fragments, which border taking into account the accepted scheme of allocation of the target product to consumers submit a set of system nodes. In this case, the nodes acquire the status of power units, because through them there is an exchange of energy between IP investigated fragment of the system and the metasystem. Examines the emerging conflict between the need for a complementary decomposition and inner interconnection of all elements. He is overcome by the imposition of conditions one of znanosti, including boundary conditions.


Author(s):  
Friederike Lüpke

Atlantic is one of the controversial branches of the Niger-Congo language family. Both its validity as a genetic group and its internal classification are far from being settled. The longstanding debate on the status and structure of Atlantic cannot be closed before the descriptive situation of these languages allows for sufficient and reliable lexical data; before attempts at applying the comparative method have been made; and before the extensive role of language contact for shaping the languages in question is taken into account. Although no typological feature or feature combinations characterizes the group as a whole, several features are considered typical for Atlantic languages, including noun class systems, consonant mutation, and complex systems of verbal derivation, which have been used to justify suggested genealogical groupings. Atlantic languages, with the exception of Fula, are attested in an area from Liberia to Senegal, stretching from the Atlantic coast to the hinterland.


2020 ◽  
Vol 14 (3/4) ◽  
pp. 255-267
Author(s):  
Kimberly Underwood ◽  
Joy Taylor ◽  
Donna Smith ◽  
J. Medgar Roberts

Purpose This paper aims to provide a critical examination of the career trajectories of Black male educators through the discussion of key issues relevant to the professional development and advancement of this population. Design/methodology/approach The authors approach this paper through the examination of literature related to Black male educators. The authors seek to provide insight into the status of Black male educators through a critical focus of scholarship in the three critical areas of Black male educator recruitment, retention and mobility. Findings This examination supports the need to generate sustainable initiatives to diversify our nation’s classrooms and create additional opportunities for Black male representation in school leadership positions. Effectively dismantling the entrenched hurdles many encounter within their teaching careers requires a concerted commitment by advocates, policymakers and school administrators at all levels. Additionally, there is a continued need for stakeholders to keep the diversification of P-12 schools as a key priority in current education reform strategies. Social implications This paper serves as an impetus to highlight the continued need for further exploration and consequential action to increase the numbers of Black males in the teaching profession. Originality/value This paper adds to the literature surrounding Black male educators by providing a holistic view of their career trajectories of Black male educators and shedding light on the need for ongoing efforts to diversify the P-12 teaching workforce.


2014 ◽  
Vol 511-512 ◽  
pp. 120-125
Author(s):  
Qian Ye ◽  
Meng Wu ◽  
Yu Fei Wang

QoS assurance and information security are important for multimedia data transmission in wireless multimedia sensor networks. First, the status of multimedia sensor networks was introduced. Then research status of QoS assurance and information security of wireless multimedia sensor networks was surveyed, and the related open issues were also analyzed. Finally, the technology routes to solve the open issues were also studied and discussed. We argue that trusted QoS architecture considering various applications with different QoS requirements is important for wireless multimedia sensor networks. And network conditions and protocol layers must be well designed in QoS-aware secure multimedia routing mechanism to satisfy QoS requirements of multiple traffic classes. Technologies of information hiding, multimedia data resolution, and multi-routing can be used for privacy protection in wireless multimedia sensor networks.


1995 ◽  
Author(s):  
Nicholas Markovich ◽  

In order to be effective and meaningful for students, educational venues ought reflect the creative and technological essence of the culture they serve, indeed, show leadership in these areas. They must also be forward thinking, anticipating the hture state of being within a culture. Education must, in a sense, predict the status and expectations of future culture and find strategies viable for the students future existence. Education above all teaches about “being” and strategies for “being” within varying realms of reality. Being is in crisis and architectural education reflects that crisis today as it did at the turn of this century, when paradigmatic shifts occurred from Beaux Arts based teaching methodologies to Modernist/Bauhaus methods to present Post Modem methodologies. Today’s shift is one that moves from earlier Twentieth Century industrialized based paradigms to one that is now based in information and interpretation. This shift is critically rooted in change and the resultant ability to cope within an ongoing cloud of increasingly complex systems of understanding. The most important single change needed in the education of architects and designers is the implementation of education models based in diversity and change within interdisiplinary frameworks.


Sign in / Sign up

Export Citation Format

Share Document