22,134 Hits in 5.6 sec

Human-Computer Interaction Considerations When Developing Cyber Ranges [article]

Lynsay A. Shepherd, Stefano De Paoli, Jim Conacher
2020 arXiv   pre-print
Aspects of human-computer interaction are noted with regards to their relevance in the context of cyber ranges. We conclude with design suggestions when developing a cyber range platform.  ...  In this short paper, we outline upon human-computer interaction elements which should be considered when developing a cybersecurity training platform, in an effort to maintain levels of user engagement  ...  We hope that developers of cyber ranges will take these elements of human-computer interaction into consideration, creating an engaging cybersecurity platform. - Immersive Labs "Human Cyber Readiness Platform  ... 
arXiv:2007.04760v1 fatcat:4rkiupp2crcb3ipstfizbbscaq

Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training

Kirsi Aaltola, Petteri Taitto
2019 Information & Security An International Journal  
This article aims to advance the discussion suggesting viewpoints on training and exercises in the cyber domain, taking into consideration specifics of skills in cyber security.  ...  A B S T R A C T : Development of information technology and the globalization require constant investment in people.  ...  European Commission funded cyber pilot projects like European network of Cybersecurity centres and competence Hub for innovation and Operations (ECHO) bring opportunities for researchers to conduct experiments  ... 
doi:10.11610/isij.4311 fatcat:psjtv4qn3rbv5fsaefaimmghle

Social Dimensions in CPS & IoT Based Automated Production Systems

Hind Bril El-Haouzi, Etienne Valette, Bettina-Johanna Krings, António Brandão Moniz
2021 Societies  
Since the 1970s, the application of microprocessor in industrial machinery and the development of computer systems have transformed the manufacturing landscape.  ...  The rapid integration and automation of production systems have outpaced the development of suitable human design criteria, creating a deepening gap between humans and systems in which human was seen as  ...  Taking these issues into consideration, a number of scientific questions remain open to develop and explore future perspectives for a conscious and human cyber-physical society to reinforce the role and  ... 
doi:10.3390/soc11030098 fatcat:wenetlnnpvaf3dwl7qx63cg2g4

A Consilience-Based Approach to Engineering Services in Global Supply Chains [chapter]

Eswaran Subrahmanian, Albert Jones
2013 IFIP Advances in Information and Communication Technology  
Even though humans are, for the most part, only users of these systems, they are already having a considerable impact on the evolution of society.  ...  Computers and cell phones are two examples of a growing number of products that marry hardware, software, communications, and physical components into what are called cyber physical systems.  ...  Operators here are not users in the sense of human-computer interaction but of humans, machines, and systems that constitute the workplace.  ... 
doi:10.1007/978-3-642-41266-0_41 fatcat:2es2zps66feexbsifjxf3p2vjy

Conceptualizing the key features of cyber-physical systems in a multi-layered representation for safety and security analysis

Nelson H. Carreras Guzman, Morten Wied, Igor Kozine, Mary Ann Lundteigen
2019 Systems Engineering  
Enabling technologies, such as low-power wireless networks, commu- nication protocols, and cloud computing, open the possibility for a new range of applications developed from the interaction of devices  ...  vulnerable to physical harm when subjected to cyber-attacks.  ... 
doi:10.1002/sys.21509 fatcat:x34ni7nxvjdhll3lv4lb45m54q

User, Usage and Usability: Redefining Human Centric Cyber Security

Marthie Grobler, Raj Gaire, Surya Nepal
2021 Frontiers in Big Data  
In this paper, we survey advancements made in the development and design of the human centric cyber security domain.  ...  We explore the increasing complexity of cyber security with a wider perspective, defining user, usage and usability (3U's) as three essential components for cyber security consideration, and classify developmental  ...  That is, understanding how humans represent value, but also risk to an organization; understanding how humans and computer interact and what risks are introduced as a result of these interactions.  ... 
doi:10.3389/fdata.2021.583723 pmid:33748750 pmcid:PMC7968726 fatcat:y4aztmzsfjbzpfpiroomhmuhjm

Application of Artificial Intelligence in User Interfaces Design for Cyber Security Threat Modeling [chapter]

Jide Ebenezer Taiwo Akinsola, Samuel Akinseinde, Olamide Kalesanwo, Moruf Adeagbo, Kayode Oladapo, Ayomikun Awoseyi, Funmilayo Kasali
2021 Intelligent User Interfaces [Working Title]  
IUI helps developers or designers enhance flexibility, usability, and the relevance of the interaction to improving communication between computer and human.  ...  Meanwhile, this deficiency can only be handled through AI-enabled UI that utilizes baseline principles in the design of interfaces for effective Human-Machine Interaction (HMI) with lasting UX.  ...  threats in every Human Computer Interaction (HCI).  ... 
doi:10.5772/intechopen.96534 fatcat:o7bhfxrurbcp5lp7c5mb4x34q4

Cyber Terrorism Taxonomies

Ali Al Mazari, Ahmed H. Anjariny, Shakeel A. Habib, Emmanuel Nyakwende
2016 International Journal of Cyber Warfare and Terrorism  
The aim of this paper is to identify common features in: the definition of cyber terrorism, cyber terrorism targets, cyber terrorism crimes and then develop effective mitigation strategies and countermeasures  ...  They developed cyber terrorism taxonomies which represent a systematic organization and classification of knowledge that improves scientific awareness of cyber terrorism definition, boundaries, potential  ...  It has been reported that attacks are much more dangerous when done by insiders as internal terrorists have considerable access to the networks and systems as employees (Jalil, 2003) .  ... 
doi:10.4018/ijcwt.2016010101 fatcat:smy2tibpqvdstlmt7tchzyo3zi

Strengthening trust in the future ICT infrastructure

Tai-Won Um, Gyu Myoung Lee, Jun Kyun Choi
2015 2015 ITU Kaleidoscope: Trust in the Information Society (K-2015)  
Keywords-Trust, social-cyber-physical infrastructure, Internet of Things, ICT FUTURE ICT INFRASTRUCTURE FOR A HYPERCONNECTED SOCIETY While traditional ICT infrastructures have focused on computer-centric  ...  In this paper, we introduce the concept of a social-cyber-physical infrastructure from the social Internet of Things paradigm and present different meanings from various perspectives for a clear understanding  ...  Trust computation happens when the state of an object has changed or an interaction occurs between objects.  ... 
doi:10.1109/kaleidoscope.2015.7383628 dblp:conf/kaleidoscope/UmLC15 fatcat:rpkgwyxpkzbtzcewbsi5au4esm

Six Potential Game-Changers in Cyber Security: Towards Priorities in Cyber Science and Engineering [article]

Alexander Kott, Ananthram Swami, Patrick McDaniel
2015 arXiv   pre-print
The fields of study encompassed by cyber science and engineering are broad and poorly defined at this time.  ...  We explore results of a recent workshop that postulated possible game-changers or disruptive changes that might occur in cyber security within the next 15 years.  ...  These challenges will be even greater when a computing device and network augments and even invades the human, as in the case of prosthetics, exoskeletons, and brain-computer interfaces.  ... 
arXiv:1511.00509v1 fatcat:kb22j5nicbge5adwbstfxroce4

Cyber-I: Vision of the Individual's Counterpart on Cyberspace

Jie Wen, Kai Ming, Furong Wang, Benxiong Huang, Jianhua Ma
2009 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing  
Then, we discuss the special features of Cyber-I as compared with other related concepts and studies including AR (Augmented Reality), HCI (Human Computer Interaction), AI, artificial life, etc.  ...  It is closely related to human-centric computing ideology which focuses on placing human in the center of computing.  ...  Cyber-I will cover various research areas, ranging from human-centric computing, VR/AR, CPS (Cyber Physical System), HCI (Human Computer Interaction), social computing, AI, human related researches and  ... 
doi:10.1109/dasc.2009.127 dblp:conf/dasc/WenMWHM09 fatcat:v6jmcvblynevzjhumpsgwm3x2m

Human Digital Twin (HDT) Driven Human-Cyber-Physical Systems: Key Technologies and Applications

Baicun Wang, Huiying Zhou, Geng Yang, Xingyu Li, Huayong Yang
2022 Chinese Journal of Mechanical Engineering  
Cyber system, a major outcome of the digitalization revolution, is increasingly adopted in HPS and continuously evolving with the development of advanced manufacturing technologies, leading to the human-cyber-physical  ...  The growing advanced manufacturing technologies have considerably morphed the role and the responsibilities of human in industrial system.  ... 
doi:10.1186/s10033-022-00680-w doaj:7f9942ffd5464830877d628accaaa4ad fatcat:oqebvom4indizasovkzr52ywim

Factors Affecting Cyber Risk in Maritime

Kimberly Tam, Kevin Jones
2019 2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)  
maritime-cyber risks specifically.  ...  In addition to static and dynamic, maritime operational risks can be affected by elements classified as cyber, cyber-physical, or physical in nature.  ...  However, in a new development, cyber incidences (i.e., accidents, intentional attacks) are both a fast-rising and considerable threat to the maritime community, ranking as the 2 nd highest risk in 2018  ... 
doi:10.1109/cybersa.2019.8899382 dblp:conf/cybersa/TamJ19a fatcat:2lecyaodpfbzvjpv53q2thxmhq

Cyber Community Towards Society 5.0 And The Future Of Social Reality

Burhan Bungin, Monika Teguh, Muhammad Dafa
2021 International Journal of Computer and Information System (IJCIS)  
Abstract—In cyber community towards the Society 5.0 era, the use of industrial technology 4.0, especially communication media technology plays an important role.  ...  Therefore, the study wants to criticize the existence of reality in the midst of the development of communication technology that is so fast.  ...  As in real society, cyber community is built through computer-based social interaction through Adaptation of Human-Computer Interaction (HCI), with fellow members of the cyber community.  ... 
doi:10.29040/ijcis.v2i3.39 fatcat:dzng2kuluzctlpkl5jqjeqhwum

Understanding Data-Driven Cyber-Physical-Social System (D-CPSS) Using a 7C Framework in Social Manufacturing Context

Dao Yin, Xinguo Ming, Xianyu Zhang
2020 Sensors  
However, the current cyber-physical system (CPS) merges only cyber and physical space; social space is missing.  ...  With the development of the Internet of Things and social networks, a large volume of data is generated. A data-driven view is necessary to link tri-space.  ...  Acknowledgments: The authors would like to thank the SJTU Innovation Center of Producer Service Development, the Shanghai Research Center for industrial Informatics, for their support of this research.  ... 
doi:10.3390/s20185319 pmid:32957551 fatcat:5ybj4xekobafbjvgfd3hvb67qu
« Previous Showing results 1 — 15 out of 22,134 results