Cyber security is the most critical aspect nowadays of our technologically based lives. Government institutions, banking sectors, public and private services, nuclear power plants, power grid operators, water suppliers or waste water treatment companies use information technologies in their day-to-day operations. Everything that uses technologies are based on communication and information systems and that means that it depends on cyber security. The public and private sector each year spend millions of dollars on technologies, security software and hardware devices that will increase the cyber security inside their companies, but they are still vulnerable. The main problem of this situation is that cyber security is still usually treated as a technical aspect or technology which can be easily implemented inside the organization and this implementation will guarantee cyber security. This attitude must change, because cyber security nowadays is something more than just the technology. This article presents the taxonomy of the critical infrastructure attacks, analyzes attack vectors and attack methods used to damage critical infrastructure as well as the most common cyber security mistakes which organizations make in the cyber security field when trying to make themselves safer from vulnerabilities. The main aim of this article is to provide theoretical aspects of the cyber security management model which can be used to ensure security of critical infrastructure in an organization or company. The cyber security management model that is presented in this article is analyzed from management perspectives and is not concerned with technological aspects and products that are used to protect critical infrastructure from cyber security attacks and vulnerabilities.
Two mainstream topics have been widely discussed over the past few years: ways to reduce the human impact on nature and the way that the industrial revolution 4.0 changes industries. The aim of this research topic is to analyse the positive and negative factors of big data implementation in the sector of cryptocurrency (as part of the industrial revolution 4.0) and in the sector of municipal waste management. The analysis reveals the differences and similarities between the cryptocurrency and municipal waste management sectors in the context of big data. The findings are significant for the estimation of the technological development of digitalized and non-digitalized sectors.
Bitcoin, Cryptocurrencies and Blockchain technologies are widely discussed nowadays. The Bitcoin market value is discussed in top magazines, the names of people who earned money from cryptocurrencies are on the Richest People list. The Blockchain technology is said to be a one of disruption pioneers on the one hand, and cryptocurrency is said to be an illegal phenomenon on the other hand. The Fourth Industrial Revolution, which is based on digitalized industry is changing the power centres. Will cryptocurrency disrupt the financial sector? Or perhaps it will disrupt the retail market or global monetary policy. Disruptive technologies together with the Internet, Mobile Internet and Internet of Things are changing our world. While society has gained simple and reachable comfort for a cheaper price on the one hand, many people have lost their jobs on the other. Consequently, the authors presuppose discussion about the phenomenon of cryptocurrency through the context of social phenomena and legal regulation: divulge definitions, principles, relating to the topic; identify possible tendencies according to legal regulation and its practical realization.
The evaluation of remote sensing imagery segmentation results plays an important role in the further image analysis and decision-making. The search for the optimal segmentation method for a particular data set and the suitability of segmentation results for the use in satellite image classification are examples where the proper image segmentation quality assessment can affect the quality of the final result. There is no extensive research related to the assessment of the segmentation effectiveness of the images. The designed objective quality assessment metrics that can be used to assess the quality of the obtained segmentation results usually take into account the subjective features of the human visual system (HVS). A novel approach is used in the article to estimate the effectiveness of satellite image segmentation by relating and determining the correlation between subjective and objective segmentation quality metrics. Pearson’s and Spearman’s correlation was used for satellite images after applying a k-means++ clustering algorithm based on colour information. Simultaneously, the dataset of the satellite images with ground truth (GT) based on the “DeepGlobe Land Cover Classification Challenge” dataset was constructed for testing three classes of quality metrics for satellite image segmentation.
In view of the changes taking place in society, social progress and the achievements of science and technology, the protection of fundamental rights must be strengthened. The aim of the article is to analyse the principles and peculiarities of safe management of the personal data in social networks. In this scientific article, methods of document analysis, scientific literature review, case study and generalization are used. Consumers themselves decide how much and what kind of information to publicize on the Facebook social network. In order to use the third-party applications, users at the time of authorization must confirm that they agree to give access to their personal data otherwise the service will not be provided. Personal data of the Facebook user comprise his/her public profile including user's photo, age, gender, and other public information; a list of friends; e-mail mail; time zone records; birthday; photos; hobbies, etc. Which personal data will be requested from the user depends on the third-party application. Analysis of the legal protection of personal data in the internet social networks reveals that it is limited to the international and European Union legal regulation on protection of the personal data in the online social networks. Users who make publicly available a large amount of personal information on the Facebook social network should decide on the issue if they want to share that information with third parties for the use of their services (applications). This article presents a model for user and third party application interaction, and an analysis of risks and recommendations to ensure the security of personal data of the user.
Cryptocurrency market is developing fast during the past few years. Cryptocurrency now is available as a form of payment for retail goods, as an instrument for a wholesale international transaction a mean of exchange for whatever goods and is available through ATM's. Moreover, it is developing as a possibility for fundraising a) as a private debt b) as seed capital. Companies like Facebook are discussing launching own cryptocurrency. Bank UBS is developing its blockchain based virtual currency as well. However, scientist agrees that cryptocurrency has an important impact to national security. It became a relevant instrument for illegal good transactions, a mean of exchange in the darknet and an instrument for money laundering or infrastructure for new kind of money-laundering practices (for example-"Smurfing" phenomena (EU Observer, 2019)) European Union is launching AML and KYC procedures for the cryptocurrency market. Would it be efficient? Why are we implementing KYC and AML procedures for cryptocurrency? Is it able to minimize risks?
Straipsnyje atskleisti elektroninės valdžios paslaugų pakopų modelių kūrimo ir taikymo ypatumai, atlikta elektroninės valdžios paslaugų pakopų modelių lyginamoji analizė. Remiantis užsienio mokslo autorių darbais, detaliai išanalizuoti ir įvertinti elektroninės valdžios paslaugų pakopų modeliai – „ANAO“, „SAFAD“, „Lee & Layne“, „Viešojo sektoriaus procesų atkūrimo“, „Hiller & Belanger“. Darbo naujumą ir originalumą sudaro įvairių elektroninės valdžios paslaugų pakopų modelių sisteminė analizė ir šių modelių bendrųjų pranašumų ir trūkumų išskyrimas lyginamuoju aspektu, elektroninės valdžios paslaugų pakopų modelių tobulinimo perspektyva. Straipsnyje siūloma elektroninės valdžios paslaugų pakopų modelius papildyti nauju įtinklinto ekspertinio konsultavimo paslaugų lygio fragmentu.Maturity Models of Electronic Government Services: Their Comparative AnalysisTadas Limba SummaryNowadays electronic government starts dominating in all world countries. Some states are more experienced, while others just started implementing it. Nevertheless, which models the country had reached, all of them should make the progress. It is important to try to overlook and analyse in essence the e-government services maturity models at the public administration level, that are used in various countries. The fi rst stage model that we analyse, is “ANAO” model. Another models are – “SAFAD”, “Lee&Layne”, “Hiller and Belanger” and “Public sector processes rebuilding” models. The comparative analysis of the stages models is also carried out ant presented in this article. All in all, despite which model is used, there are lots of areas, where governments should improve their actions. They should look ahead, if they want to do their best at e-government policy.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.