ترغب بنشر مسار تعليمي؟ اضغط هنا

Methodology for Designing Decision Support Systems for Visualising and Mitigating Supply Chain Cyber Risk from IoT Technologies

304   0   0.0 ( 0 )
 نشر من قبل Petar Radanliev
 تاريخ النشر 2019
  مجال البحث الهندسة المعلوماتية
والبحث باللغة English




اسأل ChatGPT حول البحث

This paper proposes a methodology for designing decision support systems for visualising and mitigating the Internet of Things cyber risks. Digital technologies present new cyber risk in the supply chain which are often not visible to companies participating in the supply chains. This study investigates how the Internet of Things cyber risks can be visualised and mitigated in the process of designing business and supply chain strategies. The emerging DSS methodology present new findings on how digital technologies affect business and supply chain systems. Through epistemological analysis, the article derives with a decision support system for visualising supply chain cyber risk from Internet of Things digital technologies. Such methods do not exist at present and this represents the first attempt to devise a decision support system that would enable practitioners to develop a step by step process for visualising, assessing and mitigating the emerging cyber risk from IoT technologies on shared infrastructure in legacy supply chain systems.

قيم البحث

اقرأ أيضاً

We study logistical investment flexibility provided by modular processing technologies for mitigating risk. Specifically, we propose a multi-stage stochastic programming formulation that determines optimal capacity expansion plans that mitigate deman d uncertainty. The formulation accounts for multi-product dependencies between small/large units and for trade-offs between expected profit and risk. The formulation uses a cumulative risk measure to avoid timeconsistency issues of traditional, per-stage risk-minimization formulations and we argue that this approach is more compatible with typical investment metrics such as the net present value. Case studies of different complexity are presented to illustrate the developments. Our studies reveal that the Pareto frontier of a flexible setting (allowing for deployment of small units) dominates the Pareto frontier of an inflexible setting (allowing only for deployment of large units). Notably, this dominance is prevalent despite benefits arising from economies of scale of large processing units.
166 - Bin Cao , Zixin Wang , Long Zhang 2021
In the past decade, blockchain has shown a promising vision greatly to build the trust without any powerful third party in a secure, decentralized and salable manner. However, due to the wide application and future development from cryptocurrency to Internet of Things, blockchain is an extremely complex system enabling integration with mathematics, finance, computer science, communication and network engineering, etc. As a result, it is a challenge for engineer, expert and researcher to fully understand the blockchain process in a systematic view from top to down. First, this article introduces how blockchain works, the research activity and challenge, and illustrates the roadmap involving the classic methodology with typical blockchain use cases and topics. Second, in blockchain system, how to adopt stochastic process, game theory, optimization, machine learning and cryptography to study blockchain running process and design blockchain protocol/algorithm are discussed in details. Moreover, the advantage and limitation using these methods are also summarized as the guide of future work to further considered. Finally, some remaining problems from technical, commercial and political views are discussed as the open issues. The main findings of this article will provide an overview in a methodology perspective to study theoretical model for blockchain fundamentals understanding, design network service for blockchain-based mechanisms and algorithms, as well as apply blockchain for Internet of Things, etc.
In this paper, we provide (i) a rigorous general theory to elicit conditions on (tail-dependent) heavy-tailed cyber-risk distributions under which a risk management firm might find it (non)sustainable to provide aggregate cyber-risk coverage services for smart societies, and (ii)a real-data driven numerical study to validate claims made in theory assuming boundedly rational cyber-risk managers, alongside providing ideas to boost markets that aggregate dependent cyber-risks with heavy-tails.To the best of our knowledge, this is the only complete general theory till date on the feasibility of aggregate cyber-risk management.
In this article we describe our efforts of extending demand-side control concepts to the application in portable electronic devices, such as laptop computers, mobile phones and tablet computers. As these devices feature built-in energy storage (in th e form of batteries) and the ability to run complex control routines, they are ideal for the implementation of smart charging concepts. We developed a prototype of a smart laptop charger that controls the charging process depending on the locally measured frequency of the electricity grid. If this technique is incorporated into millions of devices in UK households, this will contribute significantly to the stability of the electricity grid, help to mitigate the power production fluctuations from renewable energy sources and avoid the high cost of building and maintaining conventional power plants as standby reserve.
A subjective expected utility policy making centre, managing complex, dynamic systems, needs to draw on the expertise of a variety of disparate panels of experts and integrate this information coherently. To achieve this, diverse supporting probabili stic models need to be networked together, the output of one model providing the input to the next. In this paper we provide a technology for designing an integrating decision support system and to enable the centre to explore and compare the efficiency of different candidate policies. We develop a formal statistical methodology to underpin this tool. In particular, we derive sufficient conditions that ensure inference remains coherent before and after relevant evidence is accommodated into the system. The methodology is illustrated throughout using examples drawn from two decision support systems: one designed for nuclear emergency crisis management and the other to support policy makers in addressing the complex challenges of food poverty in the UK.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا