scholarly journals Cybersecurity Risk Supervision

2019 ◽  
Vol 19 (15) ◽  
Author(s):  
Tamas Gaidosch ◽  
Frank Adelmann ◽  
Anastasiia Morozova ◽  
Christopher Wilson

This paper highlights the emerging supervisory practices that contribute to effective cybersecurity risk supervision, with an emphasis on how these practices can be adopted by those agencies that are at an early stage of developing a supervisory approach to strengthen cyber resilience. Financial sector supervisory authorities the world over are working to establish and implement a framework for cyber risk supervision. Cyber risk often stems from malicious intent, and a successful cyber attack—unlike most other sources of risk—can shut down a supervised firm immediately and lead to systemwide disruptions and failures. The probability of attack has increased as financial systems have become more reliant on information and communication technologies and as threats have continued to evolve.

Author(s):  
Nette Schultz ◽  
Lene Sørensen ◽  
Dan Saugstrup

This chapter presents and discusses a new design framework for involving users at an early stage in a mobile ICT development project. A user-centered design process, in which participatory design principles are combined with creativity techniques, is used in order to create scenarios as a communication tool between users and system designers. The theoretical basis for the framework is described, leading to a new participatory design and creativity framework. Empirical insight into how the framework has been developed and used in practice is presented based on the experiences and results from a large ICT development project within the ?eld of mobile communication. Finally, the value of applying creativity as part of a participatory design process is discussed.


Author(s):  
A.N. Bryntsev ◽  

The article discusses the issues of economic security, taking into account the congestion of the transport and logistics infrastructure. As an example, the indicator of freight transportation by rail is shown, which allows predicting the onset of crisis situations at an early stage of their development. A brief analysis of the development of the market of information and communication technologies in the light of the formation of a new concept for the formation of business is given.


Author(s):  
Wilson Sakpere ◽  
Valentina Gallerani

Information and communication technologies (ICT) have been at the centre of most innovations. With applications in science, technology, engineering, and mathematics fields, it has become prevalent in business, art, and humanities disciplines, among others, as well. Among the potential applications of ICT in social sciences and digital humanities, documentation and reconstruction of archaeological artefacts have garnered interest and resulted in several studies. This is because of the potential inherent in these artefacts for archaeological and historical studies. However, regarding pottery reassembly, challenges are experienced in implementing an optimal solution entailing high standards. Although existing studies attempted to solve these challenges, a high standard solution is still elusive. This article presents an approach to a machine-driven solution that intends to use computer vision and machine learning, whose potential is yet to be felt in pottery reassembly. This investigation, still at an early stage, has profound implications for future studies in pottery studies in general.


Author(s):  
Qiang Fang ◽  
Xiaoyun Huang ◽  
Shuenn-Yuh Lee

Cardiovascular disease has become the world’s number one killer. The prevalence of cardiovascular disease has caused many unnecessary premature deaths and imposed substantial burden to healthcare systems. Many continuous heart monitoring systems have been proposed with the aim to issue early stage warning for a possible forthcoming heart attack by utilising advanced information and communication technologies. Nevertheless, there is still a significant gap between the usability and reliability of those systems and the requirements from medical practitioners. This chapter presents our recent development of a mobile phone based ECG real-time intelligent analysis system. By fully employing the computational power of a mobile phone, the system provides local intelligence for ECG R wave detection, PQRS signature identification and segmentation, and arrhythmia classification. Because those processing can be performed on realtime, an early status warning can be issued promptly to initiate further rescue procedures. As an application of e-commerce in healthcare, a telecaridiology system like this is of great significance to support chronic cardiovascular disease patients.


2021 ◽  
Vol XV - Wydanie specjalne ◽  
pp. 1-28
Author(s):  
Marian KOZUB ◽  
Adrian Mitręga

Since its emergence, cyberspace has been developing dynamically. It has become an information and communication sphere for billions of people, and thus plays an increasingly important role in our lives, as many political, economic, social and cultural activities now take place in virtual space. Nevertheless, with the widespread use of the Internet and people’s growing dependence on information and communication technologies, threats from cyberspace have become a significant factor directly related to social stability and national security. Protection against threats that have appeared in cyberspace has become an important issue for countries and international organisations, as consequences to a cyber-attack may be equally as serious as a military attack. Therefore, the aim of this article is to present the relationship between strategic thinking and security in cyberspace.


Author(s):  
Bernd Carsten Stahl ◽  
Richard Heersmink ◽  
Philippe Goujon ◽  
Catherine Flick ◽  
Jeroen van den Hoven ◽  
...  

Ethical issues of information and communication technologies (ICTs) are important because they can have significant effects on human liberty, happiness, and people’s ability to lead a good life. They are also of functional interest because they can determine whether technologies are used and whether their positive potential can unfold. For these reasons, policy makers are interested in finding out what these issues are and how they can be addressed. The best way of creating ICT policy that is sensitive to ethical issues pertain to being proactive in addressing such issues at an early stage of the technology life cycle. The present paper uses this position as a starting point and discusses how knowledge of ethical aspects of emerging ICTs can be gained. It develops a methodology that goes beyond established futures methodologies to cater for the difficult nature of ethical issues. The authors outline how the description of emerging ICTs can be used for an ethical analysis.


Author(s):  
Nette Schultz ◽  
Lene Sørensen ◽  
Dan Saugstrup

This chapter presents and discusses a new design framework for involving users at an early stage in a mobile ICT development project. A user-centered design process, in which participatory design principles are combined with creativity techniques, is used in order to create scenarios as a communication tool between users and system designers. The theoretical basis for the framework is described, leading to a new participatory design and creativity framework. Empirical insight into how the framework has been developed and used in practice is presented based on the experiences and results from a large ICT development project within the ?eld of mobile communication. Finally, the value of applying creativity as part of a participatory design process is discussed.


2016 ◽  
Vol 66 (6) ◽  
pp. 557
Author(s):  
Indivar Gupta ◽  
P.R. Mishra

<p>In the present cyber age, public services are getting more and more dependent on use of Information and communication technologies (ICT) day by day. A number of applications viz., Internet of Things, PDF, cloud computing and virtualization and machine to machine (M2M) system usage are sneaking deeply into our everyday life. The more we depend on ICT, the more deepens our concern about IT security or cyber security. Cyber security protects the data and integrity of assets that belong to or connect to a network. It is meant to defend those assets against all sorts of threat actors throughout the life cycle of a cyber attack. It is quite unsurprising that cyber security industry is growing at the same pace as ICT is doing.</p>


2010 ◽  
Vol 1 (4) ◽  
pp. 20-38 ◽  
Author(s):  
Bernd Carsten Stahl ◽  
Richard Heersmink ◽  
Philippe Goujon ◽  
Catherine Flick ◽  
Jeroen van den Hoven ◽  
...  

Ethical issues of information and communication technologies (ICTs) are important because they can have significant effects on human liberty, happiness, and people’s ability to lead a good life. They are also of functional interest because they can determine whether technologies are used and whether their positive potential can unfold. For these reasons, policy makers are interested in finding out what these issues are and how they can be addressed. The best way of creating ICT policy that is sensitive to ethical issues pertain to being proactive in addressing such issues at an early stage of the technology life cycle. The present paper uses this position as a starting point and discusses how knowledge of ethical aspects of emerging ICTs can be gained. It develops a methodology that goes beyond established futures methodologies to cater for the difficult nature of ethical issues. The authors outline how the description of emerging ICTs can be used for an ethical analysis.


2015 ◽  
Vol 64 (1/2) ◽  
pp. 135-153 ◽  
Author(s):  
Shabahat Husain ◽  
Mohammad Nazim

Purpose – This paper aims to present an exploration of the potential utilisation of different information and communication technologies (ICT) in Indian academic libraries. Design/methodology/approach – A survey method was used for the collection of data. A structured questionnaire, containing close-ended questions, was sent by postal mail to 30 librarians of the Central University Libraries in India, of which 15 questionnaires were returned. Findings – Academic libraries in India have mostly been involved in applying traditional ICT-based solutions for the management of various library functions and services, particularly for organising and retrieving information. Use of modern ICT-based tools of knowledge creation and sharing such as web discovery tools, blogs, wikis, Real Simple Syndication feeds, social networking and social bookmarking seems uncommon in academic libraries. Lack of trained staff in ICT, low level of ICT skills among library users, unawareness of potential benefits of ICT and inadequate ICT infrastructure were found as the major barriers of ICT applications in academic libraries. Practical implications – Academic libraries in India are still in the early stage of understanding the importance of modern ICTs. Librarians should renovate existing library environment and develop knowledge and skills among their staff in the fields of computer programming, website or portal development, hardware maintenance and metadata or e-resource management for providing quality information services to their users. Originality/value – Because no empirical study on the use ICT-based knowledge management (KM) tools in academic libraries in India has been carried out before, this study closes this gap and provides guidelines for practising librarians, policy makers, management and the University Grants Commission of India to promote the use of ICTs in libraries, and to design courses of information communication technology and related skills.


Sign in / Sign up

Export Citation Format

Share Document