Are We Prepared for the 4th Industrial Revolution? Data Protection and Data Security Challenges of Industry 4.0 in the EU Context

2018 ◽  
Vol 6 ◽  
pp. 253-259 ◽  
Author(s):  
Martina Kováčiková ◽  
Katarína Repková Štofková

Our society goes beyond the threshold of a new technological revolution, which will obviously affect the world economy, affect the life, work, communication of people and facilities. Significant features of the economy include the growth of market variability, the shortening of product lifecycles, the growth of global chain influences, but also the fact that current consumers demand products with individual solutions. Intelligent items, products, machines and devices will allow manufacturers to produce original products without increasing costs. Industry 4.0 or the fourth industrial revolution is the name for dramatic changes and their current entry into the industry. The bearer of these changes is product digitization, digitization and optimization of all business processes, including services. The period of globalization brings new challenges for businesses.This contribution is focused on the characteristics of Industry 4.0, the tools used for the area in question, the advantages and disadvantages of Industry 4.0 and the Industry 4.0 initiative concept and the comparison of the concept with the Czech Republic and Germany. The Czech Republic is geographically and culturally close to Slovakia, while Germany is the leader in this area within the EU.


2018 ◽  
Vol 7 (2.31) ◽  
pp. 101
Author(s):  
K Vamsi Krishna ◽  
V Srikanth

Cloud Computing has been intrinsically changing the way we utilize computers to keep and retrieve our personal & business data. With the advent of this emerging paradigm of computing, it arises the new security challenges. Existent cryptographic data security techniques i.e., encryption deteriorated in preventing data theft attacks once the key is compromised, especially those perpetrated by insiders. Cloud Security Alliance reckoned this threat as a significant danger of Cloud Computing. Although the majority of Cloud users are very much known of this risk, they are leftover with the only choice of trusting the cloud service provider, regards to their data protection. In this paper, we propose an alternate way to secure data on the cloud which is more efficient and secure by the concoction of user profile mapping using Hadoop framework and offensive decoy technology. 


2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Siyue Li ◽  
Chunyu Kit

Abstract Based on the self-compiled corpora of the European Union and Chinese laws on data governance, this study adopts a corpus-driven approach to comparatively study the legislative design of the EU and China on digital governance, especially on key issues such as data protection, data processing and utilization, and cross-border data transfer. It is found through corpus analysis that the EU has developed a relatively comprehensive data protection system, which internally focuses on the protection of individual data rights and externally sets high standards on the cross-border transfer of data. Despite the data protection paradigm as it manifests, the EU is facing new challenges on data exportation, data jurisdiction in the competitive digital marketplace. Shared the same concern on the data protection legislation, Chinese data law has made significant progress in personal data protection with the nascent enactment of Data Security Law and Personal Data Protection Law. Notably, Chinese legislation features the hierarchal taxonomy of data under the principle of the national security exception, while it requires more legislative skills, flexible response mechanisms, and more subordinate laws to prevent future data security threats. Moreover, the corpus-driven method conducted in this study provides evidential insights for the comparative legal textual studies across jurisdictions.


2020 ◽  
Vol 16 (6) ◽  
pp. 998-1012
Author(s):  
G.V. Fedotova ◽  
D.D. Tkachenko

Subject. The article discusses the modeling of preventive protection of IT systems and evaluates their cyber resilience. Objectives. The study evaluates the existing threats and determines how informatization processes may unfold in the credit segment. Methods. Research is based on methods of regulatory and legislative analysis. We evaluate today’s public administration of cybersecurity in the financial and credit sector. To give a view of the existing situation and sum up the sector’s performance for the recent years, we performed the content analysis of statistics on data hacking and leakages. Results. The article highlights new trends in the financial and credit sector and the growing complexity of data security systems. As proposed by the Bank of Russia, the integration of smart technologies is showed to reinforce the cybersecurity of banking systems. Conclusions and Relevance. The informatization of all banking operation systems, growing complexity of procedures and work logs require new robust resources to be integrated into financial technologies. Stronger cybersecurity should lay a trend in the financial and credit sector in the nearest future. The findings can be used to flag strategic milestones of the banking development in the information-driven society.


Author(s):  
Klaus Schwab

The rapid pace of technological developments played a key role in the previous industrial revolutions. However, the fourth industrial revolution (Industry 4.0) and its embedded technology diffusion progress is expected to grow exponentially in terms of technical change and socioeconomic impact. Therefore, coping with such transformation require a holistic approach that encompasses innovative and sustainable system solutions and not just technological ones. In this article, we propose a framework that can facilitate the interaction between technological and social innovation to continuously come up with proactive, and hence timely, sustainable strategies. These strategies can leverage economic rewards, enrich society at large, and protect the environment. The new forthcoming opportunities that will be generated through the next industrial wave are gigantic at all levels. However, the readiness for such revolutionary conversion require coupling the forces of technological innovation and social innovation under the sustainability umbrella.


Author(s):  
Siti Salwa Sheikh Mokhtar ◽  
Anuar Shah Bali Mahomed ◽  
Yuhanis Abdul Aziz ◽  
Suhaimi Ab. Rahman

Small and medium-sized enterprises (SMEs) are commonly perceived as an essential part of boosting and stabilizing global economic growth. In 2018, SMEs recorded a 38.3% contribution to GDP of RM521.7 billion compared to RM491.2 billion in 2017. SMEs are expected to contribute 50% to Malaysia's GDP by 2030 relative to its present 38% contribution. However, in the context of Malaysia businesses, particularly small and medium-sized enterprises, are still not embracing the latest technology revolution sufficiently, as reported by the Ministry of International Trade and Industry (2018). Malaysia is currently in the third industrial revolution (automation), and some are still under the second industrial revolution. Such matter is worrying as only a few industries in Malaysia can adopt pillars of Industry 4.0, where business owners in Malaysia were still hesitant to embrace technologies such as the cloud. To bridge the gap in this analysis, this research adopted the technology acceptance model developed by Davis (1989) and Rogers' Diffusion Innovation Theory (1995), which incorporates the contexts of technology and innovation among SMEs in Malaysia. By using survey questionnaires, data was collected among manufacturing and services SMEs in Malaysia. Structural equation model employed to assess the important factors of innovation in adopting cloud computing among SMEs in Malaysia by using Smart-PLS. Keywords: Cloud computing, Industry 4.0, Innovation, Technological


Sign in / Sign up

Export Citation Format

Share Document