Chapter

Cybersecurity in Digital Transformation

Authors:
To read the full-text of this research, you can request a copy directly from the author.

Abstract

Digital transformation is a global phenomenon, capturing the attention in every industry and spurring major investment. However, digital transformation is not a single objective; it is a multifaceted approach depending on the goals of the respective industry and digital maturity. Thus, digital transformation is the way of change from a monolithic business approach to fully digitized business concepts. Therefore, Chap. 1 introduces us to relevant definitions on digital transformation and their main technological background. One major concern in digital transformation is the confluence of emerging technologies such as Artificial Intelligence, Big Data and Analytics, Blockchain, Cloud Computing and Services, Internet of Things and Industrial Internet of Things, and others. In this regard, Cloud Computing and Services achieve a new generation of Artificial Intelligence, applied in an increasing number of industrial applications with unprecedented results. Besides this, the Internet of Things connects industrial devices and entities within industrial value chains and infrastructure, however, generating terabytes of data every day, which requires Big Data and Analytics to deal with them. Therefore, the digital transformation has a huge impact on industrial control systems and processes, as well as on the Key Performance Indicator (KPI). Moreover, emerging technologies also will have a huge impact on the realization of circular economy in the industrial sectors, a paradigm in today’s digital transformation in industrial, public, and private discussion to reduce the greenhouse effect. Against this background, digital transformation has received a great attention in all industrial, public, and private organizations, which will be fundamentally changing operational business approaches in all sectors. Hence, the transformation of organizations through digitization and emerging technologies can be referred to as a technological wave, such as the third and now the fourth industrial transformation. In this context, the fourth industrial transformation optimizes computerization of the third through digitization, wireless infrastructure networks, intelligent algorithms, and others, which today is known as digital transformation paradigm. Thus, digitization and technologies in digital transformation create, and consequently change, market offerings, business processes, or business models, which result from the use of both. However, the intrinsic complexity of digital transformation also makes cybersecurity awareness a sine qua non. Cybersecurity deals with the presence of cyber attackers with their cybercriminal attack repertoire. Cybercrime causes $ 100 billion and more in damage annually, which means cybercriminal attack prevention has a clear need to address it. However, cybersecurity spans many areas, including, but not limited to, data security, information security, operational security, and others. Moreover, cybersecurity is fundamental to both protecting secret data and information and enabling their defense. Therefore, cybersecurity is understood as a body of knowledge with regard to technologies, processes, and practices designed to protect computer systems, networks, infrastructure resources, and others, from cyber-criminal attacks, damage, manipulation, or unauthorized access. In this context, Chap. 1 introduce in Sect. 1.1 into the manifold aspects of digital transformation with their great impact on industrial, public, and private organizations development, enhancing their business success. Section 1.2 focusses on emerging technologies required and used in digital transformation, presented in twenty Subsections. Against this background, Section 1.3 discusses the challenges of digital transformation in industrial businesses, while Sect. 1.4 introduces applications in digital transformation. Section 1.5 answers the question how to become a leader in digital transformation. Section 1.6 introduces the topic cybersecurity, taking into account knowledge about the interaction of digitization and emerging technologies to gain knowledge about cybersecurity risks through threat event attacks. In this sense, Section 1.6 also focusses on the CIA Triad and the actionable knowledge in cybersecurity that is still paramount. Finally, Section 1.7 describes the challenges of digital transformation to build up a circular economy. Section 1.8 contains comprehensive questions from the topics digital transformation, cybersecurity, and circular economy, followed by references for further reading section.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

... The digital economy, characterized by the integration of information technology in business processes, demands robust cybersecurity measures. As SMEs continue to integrate digital tools, they must navigate a landscape fraught with sophisticated cyberattacks that target their limited defenses (Möller, 2023) [32] . A single successful cyberattack can have devastating consequences, including financial loss, reputational damage, and, in some cases, business closure. ...
... The digital economy, characterized by the integration of information technology in business processes, demands robust cybersecurity measures. As SMEs continue to integrate digital tools, they must navigate a landscape fraught with sophisticated cyberattacks that target their limited defenses (Möller, 2023) [32] . A single successful cyberattack can have devastating consequences, including financial loss, reputational damage, and, in some cases, business closure. ...
... As businesses increasingly rely on interconnected systems, digital tools, and online transactions, the volume and complexity of cyber threats continue to rise (Comite, 2022) [17] . Cybercriminals, often leveraging sophisticated tools, target vulnerabilities in digital infrastructure to carry out attacks such as phishing, ransomware, malware infiltration, and distributed denial-ofservice (DDoS) attacks (Möller, 2023) [32] . Phishing attacks, for instance, exploit human error by tricking employees into revealing sensitive information such as passwords or financial details. ...
Article
Full-text available
Small and medium-sized enterprises (SMEs) are critical in driving innovation and economic growth in the digital economy. However, their growing reliance on digital technologies exposes them to significant cybersecurity threats, such as ransomware, phishing, and data breaches. Limited resources, technical expertise, and inadequate security infrastructure make SMEs particularly vulnerable. This paper explores the potential of AI-driven cybersecurity frameworks to address these challenges, emphasizing technologies like machine learning, anomaly detection, and automated threat response. It highlights the scalability, real-time threat detection, and cost-efficiency of AI solutions tailored to SMEs. The paper also underscores the importance of policy and regulatory frameworks, collaboration with technology providers, and ethical considerations, such as data privacy and algorithmic fairness, in ensuring the responsible deployment of AI in SME cybersecurity. Practical recommendations are provided to guide SMEs in implementing AI-driven solutions, fostering resilience, and securing their position in an increasingly interconnected digital economy.
... The digital economy, characterized by the integration of information technology in business processes, demands robust cybersecurity measures. As SMEs continue to integrate digital tools, they must navigate a landscape fraught with sophisticated cyberattacks that target their limited defenses (Möller, 2023) [32] . A single successful cyberattack can have devastating consequences, including financial loss, reputational damage, and, in some cases, business closure. ...
... The digital economy, characterized by the integration of information technology in business processes, demands robust cybersecurity measures. As SMEs continue to integrate digital tools, they must navigate a landscape fraught with sophisticated cyberattacks that target their limited defenses (Möller, 2023) [32] . A single successful cyberattack can have devastating consequences, including financial loss, reputational damage, and, in some cases, business closure. ...
... As businesses increasingly rely on interconnected systems, digital tools, and online transactions, the volume and complexity of cyber threats continue to rise (Comite, 2022) [17] . Cybercriminals, often leveraging sophisticated tools, target vulnerabilities in digital infrastructure to carry out attacks such as phishing, ransomware, malware infiltration, and distributed denial-ofservice (DDoS) attacks (Möller, 2023) [32] . Phishing attacks, for instance, exploit human error by tricking employees into revealing sensitive information such as passwords or financial details. ...
Article
Small and medium-sized enterprises (SMEs) are critical in driving innovation and economic growth in the digital economy. However, their growing reliance on digital technologies exposes them to significant cybersecurity threats, such as ransomware, phishing, and data breaches. Limited resources, technical expertise, and inadequate security infrastructure make SMEs particularly vulnerable. This paper explores the potential of AI-driven cybersecurity frameworks to address these challenges, emphasizing technologies like machine learning, anomaly detection, and automated threat response. It highlights the scalability, real-time threat detection, and cost-efficiency of AI solutions tailored to SMEs. The paper also underscores the importance of policy and regulatory frameworks, collaboration with technology providers, and ethical considerations, such as data privacy and algorithmic fairness, in ensuring the responsible deployment of AI in SME cybersecurity. Practical recommendations are provided to guide SMEs in implementing AI-driven solutions, fostering resilience, and securing their position in an increasingly interconnected digital economy.
... This misalignment can lead to inconsistencies in how organizations manage and secure data, increasing the risk of breaches and undermining consumer trust. Cyber threat attack progression sequence as presented by Möller, 2023, is shown in figure 2. ...
... Cyber threat attack progression sequence (Möller, 2023) The literature highlights the economic, legal, and technological implications of these misalignments. Economically, unresolved regulatory differences hinder trade and investment by increasing compliance costs and creating barriers to entry for businesses operating in both countries. ...
... Intrusion detection and prevention system architecture (IDPSA) (Möller, 2023) In addition to privacy and security harmonization, the framework also proposes standardized contractual clauses to address compliance across jurisdictions. Many organizations rely on data protection agreements, including standard contractual clauses, to ensure that their data exchanges comply with local regulations. ...
Article
Full-text available
As cross-border data flows between the United States and Canada continue to increase, the misalignment between privacy and security regulations presents significant challenges. These challenges stem from the differing approaches to data protection, with the U.S. adopting a sectoral framework and Canada enforcing a comprehensive privacy law under the Personal Information Protection and Electronic Documents Act (PIPEDA). This abstract examines the need for a unified harmonization framework that addresses these cross-border privacy and security misalignments while ensuring compliance and facilitating seamless data transfer between the two nations. The proposed framework aims to harmonize the regulatory requirements of both countries by aligning privacy standards and security protocols, fostering mutual recognition of compliance mechanisms, and ensuring that data protection measures meet both U.S. and Canadian legal standards. Key components of the framework include standardized contractual clauses, enhanced data localization policies, and the integration of emerging technologies such as blockchain and artificial intelligence to streamline privacy compliance. This research emphasizes the importance of cross-border cooperation between U.S. and Canadian regulators, businesses, and consumers in overcoming privacy and security challenges. By promoting consistent and transparent data protection practices, the framework seeks to bridge the gaps between differing regulatory landscapes, enabling businesses to operate more efficiently while safeguarding individual privacy rights. The benefits of the proposed framework are multifaceted, ranging from improved consumer trust and confidence to more efficient compliance processes for organizations. However, the implementation of this framework also faces challenges, such as resistance to data localization measures and the need for robust enforcement mechanisms. Nonetheless, this study suggests that with effective collaboration and innovative solutions, the U.S. and Canada can resolve cross-border privacy and security misalignments and create a more secure and trustworthy digital environment for all stakeholders.
... Researchers have explored various methods, including scalable encryption techniques, dynamic access controls, and real-time threat detection models, to fortify cloud infrastructures. The role of artificial intelligence (AI) and machine learning (ML) in continuously assessing risks and automatically adapting security policies has gained significant traction in recent years [12]. These technologies enable intelligent threat detection, self-healing security configurations, and anomaly-based intrusion prevention systems. ...
... Machine learning models continuously classify security risks, enabling predictive analysis and real-time defense adjustments [12]. Federated learning allows secure collaboration across cloud providers without exposing sensitive data. ...
Article
Full-text available
Purpose: This paper proposes an adaptive security model designed for cloud platforms, integrating information security principles and cryptographic protocols to address evolving cybersecurity threats. The model ensures dynamic security control adjustments based on real-time risk assessments to protect enterprise applications and business operations. Methodology: The proposed model employs continuous monitoring, intelligent threat detection, and automated responses to proactively mitigate risks. It integrates cryptographic techniques such as AES, RSA, and elliptic-curve cryptography to secure data transmission, storage, and access control. Additionally, machine learning-driven anomaly detection and behavioral analytics dynamically refine security policies. Findings: The model enhances cloud security resilience against data breaches, unauthorized access, and service disruptions. By leveraging automated security orchestration, it ensures scalability, resilience, and operational efficiency while minimizing system overhead. The experimental implementation confirms its effectiveness in mitigating threats while maintaining high system performance and availability. Unique Contribution to Theory, Practice, and Policy (Recommendations): This research contributes to cloud security advancements by presenting a comprehensive, adaptable security framework that addresses both known and emerging attack vectors. It ensures compliance with industry regulations such as GDPR, HIPAA, and SOC 2, providing organizations with a structured approach to meeting evolving cybersecurity mandates. Future research should explore enhanced AI-driven security orchestration, quantum-resistant cryptographic protocols, and cross-cloud security interoperability to further fortify cloud infrastructures.
... This modernization also facilitates access to the latest technologies, enabling digital entrepreneurs to develop innovative solutions and address changing market needs (George, 2024;Hidajat & al., 2023). The direct impact of modernizing IT infrastructure on digital entrepreneurship is evident in reducing barriers to entry in the digital market and increasing the competitiveness of new ventures (George, 2024;Möller, 2023). By providing a technological environment conducive to innovation, it stimulates the creation of startups and encourages the expansion of existing businesses. ...
... Modernization of IT InfrastructureModernizing IT infrastructure is essential for enabling digital transformation. This involves adopting cloud solutions, server virtualization, implementing integrated information systems, and securing data(Butt, 2020;Möller, 2023;Raj & al., 2022;Stefan, 2023). A modern and flexible IT infrastructure is necessary to support long-term digital transformation initiatives. ...
Article
Full-text available
In a context of growing digital transformation, this theoretical article explores the role of digital entrepreneurship in revolutionizing digital marketing practices. By integrating the dimensions of digital transformation, digital entrepreneurship, and digital marketing, the study aims to understand the complex interactions between these domains. The central issue of the article focuses on how digital transformation and digital entrepreneurship influence digital marketing practices, with particular attention to underlying mechanisms and implications for businesses. Research objectives include identifying key success factors for digital entrepreneurship in a rapidly evolving digital environment and proposing a conceptual model to explain these dynamics, to illuminate digital marketing practices in a context of digital transformation. The methodology adopted involves a thorough literature review and a critical analysis of previous work, followed by conceptualization of relationships between key variables. Results highlight the importance of digitizing operations, modernizing IT infrastructures, and managing change in the digital transformation of businesses and their impact on digital marketing. In conclusion, this article underscores the increasing importance of digital entrepreneurship in a changing digital landscape, while highlighting implications for digital marketing practices. Additionally, it offers avenues for future research and practical implications for businesses.
... Contrary to this positive view of IOT and other DTs, many studies in the literature have discussed the threats and problems related to DT implementation [78][79][80][81][82]. These include but are not limited to integration problems, high costs of those technologies, which need huge initial investment, and finally, the most important limitation is the cybersecurity issues as putting DTs such as IOT on the company systems makes the full system vulnerable to cyberattacks, even if there are firewalls they can reduce the frequency of the risk while it cannot eliminate it [78,[80][81][82][83][84]. ...
... Contrary to this positive view of IOT and other DTs, many studies in the literature have discussed the threats and problems related to DT implementation [78][79][80][81][82]. These include but are not limited to integration problems, high costs of those technologies, which need huge initial investment, and finally, the most important limitation is the cybersecurity issues as putting DTs such as IOT on the company systems makes the full system vulnerable to cyberattacks, even if there are firewalls they can reduce the frequency of the risk while it cannot eliminate it [78,[80][81][82][83][84]. This negative view of the DT implementation tries to alert from the dark side of using DTs and AI technologies on the operational systems of companies as it may negatively impact the business continuity plans and privacy of information [85]. ...
Article
Full-text available
This study examines how digital technologies can improve a company’s overall sustainability. It also explores whether lean manufacturing practices can mediate the connection between digital technologies and sustainability. Data were collected from 319 senior managers, production managers, and general managers at Egyptian manufacturing companies and examined using the software Smart-PLS 4. The results show that digital technologies (i.e., blockchain, the Internet of Things, big data analytics, cloud computing, and the digital twins) have a positive impact on all three aspects of sustainability: environmental, social, and economic. Additionally, lean manufacturing was found to play a key role in this relationship. The model explained 34.3% of lean manufacturing practices, 59.7% of sustainable economic performance, 40.3% of sustainable social performance, and 40.6% of sustainable environmental performance. The findings of this study have some implications for companies, investors, and policymakers regarding how to improve economic, social, and environmental performance through fostering LMP and proper implementation of Digital Technologies (DTs). The current investigation extends the discourse on the role of digital technologies and new manufacturing techniques like lean manufacturing and how they can lead to sustainable performance. Positioned as one of the initial studies to examine the mediating role of lean manufacturing in the association between digital technologies and sustainable performance, this study provides insights within an emerging market context.
... The accelerated pace of digital transformation across various sectors, especially due to the impact of the COVID-19 pandemic (Brummer & Ueno, 2024;Hai et al., 2021), further spurred research into how digitalization affects aspects of national security. During this year, issues such as cybersecurity, data protection and critical infrastructure received more attention due to the increasing reliance on digital technologies (Hurel, 2022;Kuzior et al., 2022;Mishra & Gochhait, 2024;Mo ller, 2023aMo ller, , 2023bMongeau & Hajdasinski, 2021). The positive trend continued in 2022, with the number of publications rising to around 45. ...
... This year can be considered a period where the topic of digital transformation and national security became more mature in academic literature. Many studies began to focus more on specific aspects such as the use of artificial intelligence in national security, the impact of blockchain technology, and the development of policies and regulations related to new technologies (Ahad et al., 2023;Alareeni & Elgedawy, 2023;Banafa, 2020;Bharat Vagadia, 2017;Mo ller, 2023a). The rising number of publications also indicates that more researchers are engaging in exploring various dimensions of digital transformation in the context of national security. ...
Article
Full-text available
Digital transformation has profoundly impacted numerous sectors, with national security no exception. This article undertakes a thorough analysis of how digital transformation influences strategies in national security. Employing a bibliometric approach, the study explores the proliferation of digital technologies and their implications for security policies and frameworks. The research identifies key trends, thematic developments, and emerging research fronts at the intersection of digital transformation and national security. It becomes evident that digital technologies such as artificial intelligence, blockchain, and cybersecurity measures play crucial roles in enhancing national defence capabilities and addressing contemporary security threats. These technologies offer unprecedented opportunities for efficiency and effectiveness in security operations. However, alongside these benefits come new challenges, prominently cybersecurity risks and the necessity for robust regulatory frameworks. Integrating advanced technologies into national security strategies demands vigilant management to mitigate potential vulnerabilities and safeguard sensitive information. The article concludes by offering strategic recommendations for policymakers to navigate the complexities of the digital landscape while effectively bolstering national security. These recommendations emphasise the importance of adaptive policies that foster innovation while ensuring resilience against evolving threats. Overall, this research contributes significantly to the expanding literature on digital transformation by providing insights into its profound implications for national security. It sets the stage for future studies to delve deeper into specific technological impacts and policy responses necessary to maintain a secure digital environment.
... To mitigate cybersecurity risks during digital transformation (DT) implementation, the research aims to investigate the impact of cybersecurity and digital transformation on business resilience. Prioritising cybersecurity measures and ensuring systems are safe from potential threats are essential for organisations that utilise digital transformation (DT) [8,9]. The author adopted the PRISMA methodology and the systematic literature review approach, focusing on various sectors, including finance, healthcare, government, and industry, to discuss the unique challenges and solutions each faces in cybersecurity. ...
Preprint
Quantum computing is revolutionising information systems and will have a significant impact on accounting and finance, especially in the area of cybersecurity. It presents both opportunities and risks in ensuring confidentiality and protecting financial data. The purpose of this thesis is to show the application of quantum technologies in accounting cybersecurity, utilising quantum algorithms and QKD to overcome the limitations of classical computing. The literature review reveals the vulnerabilities of the current accounting cybersecurity to quantum attacks and the need for quantum-resistant cryptographic mechanisms. It elaborates on the risks associated with conventional encryption in the context of quantum capabilities. This study contributes to the understanding of how quantum computing can revolutionise accounting cybersecurity by enhancing quantum-resistant algorithms and utilising quantum key distribution (QKD) in accounting. The study employs PSALSAR systematic review methodology to ensure rigour and depth. The analysis shows that quantum computing enhances encryption techniques to superior possibilities than classical ones. Using quantum technologies in accounting minimises data breaches and unauthorised access. The study concludes that quantum-resistant algorithms and quantum key distribution (QKD) are necessary for securing the accounting and finance systems of the future. Keywords Quantum Computing, Cybersecurity, Accounting, Machine Learning, Artificial Intelligence, Quantum Key Distribution, Operations Management
... They can find hidden risks by sorting through and correlating various data points from network traffic to server logs across an organization's digital infrastructure. Machine learning models can look at this data faster and more comprehensively than human analysts could by using complex algorithms [9]. This comprehensive analysis helps organizations understand the context and intricacy of the attack vectors, which can enhance their calculated reaction [17]. ...
Article
Full-text available
Because of the advancement and combination of artificial intelligence and machine learning (AI) (ML), the cybersecurity environment is changing quickly. Along with exposing the increased vulnerabilities brought about by these technologies, This essay looks at how important ML and AI are to bolstering safeguards in cybersecurity against increasingly complex cyberthreats. The dual Examined is the nature of AI and ML in cybersecurity in detail using historical patterns, evaluations of technology, and forecast modeling. Significant topics are discussed, including as data protection, ongoing AI model training, manipulation threats, and ethical considerations. The study highlights a well-rounded strategy that makes use of both strong cybersecurity procedures and strict ethical standards in addition to technological progress. This strategy makes it easier for different stakeholders to work together to create rules that guarantee the proper and efficient application of artificial intelligence in cybersecurity, with the goal of improving privacy and system integrity without sacrificing security.
... Homomorphic encryption, which allows computations to be performed on encrypted data without decrypting it, promises to enhance data security [42], particularly in cloud computing environments, by enabling secure data processing. ...
Preprint
Website information security has become a critical concern in the digital age. This article explores the evolution of website information security, examining its historical development, current practices, and future directions. The early beginnings from the 1960s to the 1980s laid the groundwork for modern cybersecurity, with the development of ARPANET, TCP/IP, public-key cryptography, and the first antivirus programs. The 1990s marked a transformative era, driven by the commercialization of the Internet and the emergence of web-based services. As the Internet grew, so did the range and sophistication of cyber threats, leading to advancements in security technologies such as the Secure Sockets Layer (SSL) protocol, password protection, and firewalls. Current practices in website information security involve a multi-layered approach, including encryption, secure coding practices, regular security audits, and user education. The future of website information security is expected to be shaped by emerging technologies such as artificial intelligence, blockchain, and quantum computing, as well as the increasing importance of international cooperation and standardization efforts. As cyber threats continue to evolve, ongoing research and innovation in website information security will be essential to protect sensitive information and maintain trust in the digital world.
... The increasing prevalence of global cyber threats has elevated data protection to a critical concern, with privacy breaches rising by 68% globally between 2020 and 2023, exposing billions of sensitive records annually [3,13,18]. Integrating Privacy by Design (PbD) into the System Development Life Cycle (SDLC) represents a transformative approach to addressing these vulnerabilities by embedding robust privacy measures at every stage of system development [4,6,12,16,20]. With data breaches costing organizations an average of $4.45 million per incident in 2023 [ 19 34, 36], proactive privacy measures are essential. These figures emphasize the financial, reputational, and operational risks of reactive approaches to data protection. ...
Article
Full-text available
Globally, the increase in cyber-attacks and data breaches in the coming years has been predicted by reputable sources. The latest statistics from Cybersecurity Ventures project successful cyber-attacks could cost businesses over $10.5 trillion annually by 2025. In this context, information systems and software solutions have to change, as traditional practices, by incorporating security controls at later stages of development. 'Privacy by Design' (PbD) is attracting considerable resources, focus, and logically encouraging data protection as best practice applicable across the data lifecycle. However, the implementation of the PbD principle remains a challenge. Numerous developers cannot strike equilibrium between ‘functionality’ and privacy due to insufficient guidelines and resources. Many organizations with appropriate leadership have achieved higher levels within the boundaries of IT that effectively integrate PbD, while others are constantly trying to catch up. This paper aims to fill these gaps by incorporating different research outcomes, statistics, and best practices for incorporating privacy in information systems design practice. This contribution will assist IT practitioners in mitigating data breaches and adherence to the changing privacy laws which in the long run improve user confidence and data security in the systems being used
... Việc áp dụng một chiến lược an ninh mạng và quản lý rủi ro hiệu quả không chỉ giúp bảo vệ doanh nghiệp khỏi các mối đe dọa mà còn nâng cao khả năng thích ứng và cải tiến trong môi trường số [24]. Các doanh nghiệp cần xem xét an ninh mạng không chỉ là một yêu cầu kỹ thuật mà là một phần của chiến lược kinh doanh toàn diện, giúp bảo vệ giá trị doanh nghiệp và tạo điều kiện thuận lợi cho sự CĐS [25]. Từ các luận điểm trên, chúng tôi đề xuất giả thuyết H6 như sau: Quản lý rủi ro và an ninh mạng trong doanh nghiệp có ảnh hưởng tích cực đến quá trình CĐS. ...
Article
Full-text available
Tại Việt Nam, ngành công nghiệp chế biến chế tạo (CBCT) đóng vai trò trọng yếu trong nền kinh tế quốc dân, không chỉ góp phần tăng trưởng GDP mà còn là một trong những lĩnh vực tạo ra hàng triệu việc làm và thu hút đầu tư nước ngoài đáng kể. Để duy trì tính cạnh tranh và đáp ứng nhu cầu thay đổi nhanh chóng của thị trường, các doanh nghiệp trong ngành này cần phải áp nhanh chóng chuyển đổi số (CĐS). Nghiên cứu này đề xuất 7 biến tiềm ẩn có ảnh hưởng đến mức độ sẵn sàng CĐS của các doanh nghiệp CBCT tại Việt Nam. Thông qua dữ liệu thực nghiệm với 151 doanh nghiệp, chúng tôi đã chỉ ra 4 nhóm nhân tố tác động mạnh mẽ nhất là: Trải nghiệm khách hàng, Tổ chức và con người, An toàn thông tin và Định hướng chiến lược. Từ kết quả nghiên cứu sẽ cung cấp một số khuyến nghị cho các nhà quản lý trong việc thiết kế các chiến lược thích hợp để thúc đẩy quá trình CĐS doanh nghiệp.
... 7,8 A comprehensive framework for digital transformation includes considerations of societal impact and evolution over time and 23 categorised drivers termed "digital transformation interactions". 9 Ultimately, digital transformation involves a holistic approach towards implementing new methods to adapt to the digital economy's competitive landscape and technological advancements. ...
Article
Full-text available
The government of Binh Dinh province has made significant progress in implementing digital transformation, focusing on improving efficiency, transparency, and people's satisfaction. This study provides information on the province's efforts to improve the PAPI Index from 2020 to the present by implementing various solutions across different aspects. Binh Dinh province has successfully streamlined administrative processes, optimised service delivery, and promoted greater accountability by utilising digital electronic platforms, social networks, and tools to connect people. The study presents practical evidence of notable improvement activities, such as enhancing people's access to public services and increasing the responsiveness and transparency of the Binh Dinh provincial government, as indicated by survey data and annual PAPI results. By sharing valuable information from the experience of Binh Dinh province, this study aims to provide valuable insights for other provinces and cities seeking to leverage the potential of digital technology to enhance governance in the field of public administration. Binh Dinh province, in this study, serves as a typical example that demonstrates the impact of digital transformation in public administration.
... Cybersecurity, as a major challenge of digitalisation, protects personal data and financial transactions. Cybercrime causes more than 100 billion USD in losses every year and requires highly qualified professionals and significant investments to ensure a high level of protection (Moller, 2023). At the same time, the issue of remote management remains relevant, as it is influenced by different socio-cultural, political and financial characteristics of countries and requires personnel who understand the specificities of the region (Ferreira et al., 2021;Lou, 2022). ...
Article
Full-text available
The development of the green economy has gained popularity due to the alarming increase in the consumption of natural resources, which has prompted the international community to create a new paradigm of economic activity in line with the sustainable development strategy. An equally important issue was the rapid development of digitalisation and its implementation in all areas of activity. The study therefore focused on the impact of digitalisation on the development of the green economy. The purpose of the study was to identify the positive and negative aspects of the impact of information technologies on the achievement of the principles of the green economy. The research methodology included methods of analysis, synthesis, systematisation, logical comparison and generalisation of results. Based on the analysis of the literature, it was found that there is no clear difference between the concepts of green economy and sustainable development. The primary objectives of sustainable development, as outlined in the Decree of the President of Ukraine, were subjected to thorough analysis. Furthermore, the key challenges hindering the attainment of these objectives, largely attributable to the ongoing war, were meticulously identified. The following conclusions were drawn: among the problems in achieving sustainable development goals, social, economic, political, environmental and organisational problems were identified. These included the growing economic crisis, the danger to people's lives, the destruction of infrastructure, the increase in unemployment, the number of internally displaced persons, the damage to the environment, education and entrepreneurship caused by active hostilities, the occupation of territories and rocket attacks. An investigation was conducted into the means of digitalisation that could be utilised to overcome the aforementioned issues. The following areas were examined: digital marketing, the development of online platforms for the purpose of searching for specialists and partners, educational, social and medical programmes, robotic demining of territories, applications for predicting energy efficiency and environmental friendliness of enterprises, and others. In addition, the negative aspects of the impact of information technologies on achieving sustainable development goals were identified. These include the growth of cybercrime, the security of personal data and financial transactions, the increase in the use of energy resources, and the growth of electronic waste. A proposal was made to improve the formula for determining the green economy development coefficient by determining the coefficients of digitalization productivity, the use of natural resources, and energy efficiency.
... The combination of AI and ML has come close as a strategy to identify and minimize these threats and their manifestations instantly (Jony & Hamim, 2024;Beerman et al., 2023). AI performs multiple advantageous aspects for cybersecurity such as improved threat identification, identification and estimation, and data management to improve the numerous vast data sets available in the computing environment (Thakur, 2024;Möller, 2023). Furthermore, the current advanced machine learning models have been highly effective in exposing trends and activity breakdowns that other standard security systems cannot detect (Manoharan & Sarker, 2023). ...
Article
The advancement of information technology is rapidly changing the face of cyber security and this makes it more important with the increasing trend of sophistication of cyber threats in the society. The authors in this research aim at analyze how AI and ML can improve cybersecurity capabilities and how these technologies can be employed to prevent cyber-attacks in real-time. By examining a few well-known cyber episodes – the SolarWinds attack and the Colonial Pipeline hack – in an exploration of the future of AI and machine learning in cybersecurity, the study underscores the potential for advancement along with the potential for obfuscation. Despite these benefits, these Integrated technologies come loaded with new risks, especially in matters concerning the ethical issues and future insecurities within the AI-based security systems. More specifically, this paper investigates the issue of maintaining the balance between the introduction of innovative technologies and the protection of networks, arguing that the only effective approach to combating modern threats is their combination and the implementation of layers based on traditional anti-virus programs and artificial intelligence. This discussion insists on the interdependence of governmental agencies, business entities, and academic organizations to mitigate growing new age cyber risks. Last but not the least, the study recommends that for the development of more resilience and ethical solutions towards AI for cybersecurity solutions, more research work has to be implemented in developing more robust cybersecurity models.
... This paper examines the convergence of cybersecurity and digital transformation, assessing their consequences and recommending solutions to manage related risks. Möller (2023) asserts that cybersecurity transcends a purely technical problem, including a holistic concern that overlaps with organisational strategies, policies, and culture. These technologies have transformed sectors, providing avenues for innovation and efficiency. ...
Article
The Information Age has transformed worldwide connections and commercial operations via digital transformation, however it also presents intricate cybersecurity issues. Digital transformation fosters creativity, efficiency, and data-driven decision-making across sectors.. These vulnerabilities arise from insufficient security frameworks, advancing cyber threats, and the emergence of sophisticated cyber-attacks. The interdependent characteristics of contemporary systems exacerbate the possible consequences of breaches, jeopardizing data privacy, operational continuity, and customer confidence. Moreover, adherence to changing legal frameworks like GDPR and CCPA poses a considerable problem for organisations balancing the conflicting demands of modernization and security. Cybersecurity must be prioritized strategically, necessitating organisations to implement proactive measures like zero-trust architectures, constant threat monitoring, and comprehensive incident response plans. The integration of cybersecurity and digital transformation is crucial for developing resilient ecosystems that use technology while maintaining security. Organisations may manage risks and capitalize on the advantages of digital transformation by prioritizing staff training, using sophisticated threat detection technology, and integrating security into the foundation of digital initiatives. This abstract emphasizes the critical need to tackle cybersecurity concerns as essential to the success of digital transformation efforts in the Information Age.
... Cybersecurity has emerged as an essential pillar within the realm of Information Technology (IT), serving as the backbone to ensure the confidentiality, integrity, and availability of computing systems. This infrastructure underpins applications, software, and APIs across a wide array of sectors, including communication, education, industrial automation, entertainment, transportation, and finance [1], among others. ...
Article
Full-text available
In cybersecurity, identifying and addressing vulnerabilities in source code is essential for maintaining secure IT environments. Traditional static and dynamic analysis techniques, although widely used, often exhibit high false-positive rates, elevated costs, and limited interpretability. Machine Learning (ML)-based approaches aim to overcome these limitations but encounter challenges related to scalability and adaptability due to their reliance on large labeled datasets and their limited alignment with the requirements of secure development teams. These factors hinder their ability to adapt to rapidly evolving software environments. This study proposes an approach that integrates Prototype-Based Model-Agnostic Meta-Learning(Proto-MAML) with a Question-Answer (QA) framework that leverages the Bidirectional Encoder Representations from Transformers (BERT) model. By employing Few-Shot Learning (FSL), Proto-MAML identifies and mitigates vulnerabilities with minimal data requirements, aligning with the principles of the Secure Development Lifecycle (SDLC) and Development, Security, and Operations (DevSecOps). The QA framework allows developers to query vulnerabilities and receive precise, actionable insights, enhancing its applicability in dynamic environments that require frequent updates and real-time analysis. The model outputs are interpretable, promoting greater transparency in code review processes and enabling efficient resolution of emerging vulnerabilities. Proto-MAML demonstrates strong performance across multiple programming languages, achieving an average precision of 98.49%, recall of 98.54%, F1-score of 98.78%, and exact match rate of 98.78% in PHP, Java, C, and C++.
... The literature on cybersecurity maturity models highlights the importance of assessing the effectiveness of national frameworks against international standards. Studies by Möller (2023) analyses the impact of digitization and advancements in technologies on digital transformation, focusing on the interaction between digitization and advanced technologies, and the resulting intrinsic cybersecurity risks. It emphasizes the need for actionable knowledge in cybersecurity to address the evolving threat landscape. ...
Article
This study assesses the maturity of Ukraine’s system for combating cyber and financial crimes under wartime conditions, focusing on the heightened risks caused by escalating cyberattacks and financial fraud during conflict. As adversaries exploit vulnerabilities in Ukraine’s digital infrastructure, this research examines the system’s preparedness, judicial efficiency, and alignment with international cybersecurity standards. Using data from the General Prosecutor’s Office of Ukraine (2014–2024), the study employs quantitative analyses, including maturity index calculations, trend assessments, and lag analysis through statistical modelling. Key offense categories include unauthorized system interference, malicious software distribution, and restricted information dissemination. The results reveal significant fluctuations in the system’s maturity over the study period, with periods of heightened judicial efficiency interspersed with notable delays in processing cyber and financial crime cases. Unauthorized system interference incidents increased fourfold over the decade, reaching 440 cases by late 2024, with judicial responses lagging by an average of one quarter for certain crimes. Similarly, crimes involving the dissemination of restricted-access information experienced judicial delays of up to one year. The maturity indices highlight areas of progress, such as improved prosecution rates for specific crimes during peak conflict periods, but also expose systemic inefficiencies in addressing advanced financial fraud and cryptocurrency-related crimes. Dynamic trends underscore the direct impact of hybrid warfare on cybercrime dynamics. The rapid digitalization of financial systems and public services during the war has expanded attack surfaces, with cybercriminals exploiting vulnerabilities in digital banking platforms and cryptocurrency transactions. While judicial efficiency has shown improvement in prosecuting certain offenses, the overall maturity of the system remains inconsistent, reflecting gaps in enforcement and resource allocation. These findings emphasize the need for Ukraine to align its cybersecurity and financial crime prevention frameworks with international best practices, ensuring resilience against evolving threats. This research contributes to the global understanding of cybersecurity challenges in wartime, offering practical insights for policymakers. It highlights the importance of adaptive frameworks and international cooperation in strengthening national resilience. Despite its contributions, the study acknowledges limitations, including reliance on secondary data and the unique geopolitical context of Ukraine, which may limit generalizability. Future research should explore qualitative aspects of institutional capacity and public trust to complement the quantitative findings. Overall, this study provides an evidence-based foundation for enhancing Ukraine’s cybersecurity maturity and offers valuable lessons for other nations navigating similar crises.
... In a digital era where cybersecurity threats are more sophisticated than ever, traditional security measures often fall short [1], [2]. In the landscape where both persistence and threat require a continuous evolution of network security to be comprehensively improved, these older methods typically focus on passive defenses and securing the perimeter, which doesn't quite cut it anymore [3]- [5]. ...
Article
Full-text available
In the age characterized by relentless cyber threats, the need for innovative and proactive security measures has never been more important. Deception is defined as the deliberate structure of tricks, traps, and false information to mislead and discourage threats, while providing timely warning signals and useful information to defenders. The two-tier deception-driven security model's implementation focuses on applying deception security techniques to deceive potential attackers and protect network resources, with an emphasis on a proactive defense approach. The study emphasized the deployment and deep testing of the model, which aims to assess its efficacy and feasibility in real-time practice. The study shows that the two-layered approach effectively defends the network within the multiple layers using a combination of decoys, honeypots, and deceptive network segments. The deception security model effectively prevents and confuses potential threats, improving the network's overall resilience and threat defense capabilities. The findings suggest that integrating deception techniques into cybersecurity frameworks can provide a robust layer of protection against evolving cyber threats. Furthermore, this research contributes to the ongoing discourse on proactive cybersecurity strategies and offers practical insights for improving network defense mechanisms.
... Among these are (cyber-)security concerns, both for industries in general (Vial 2019) and for the electricity sector in particular (Cozzi et al. 2017, p. 124). Digital transformation especially includes a fuller integration of the different components over the internet, leading to a greater attack surface, i.e., to more vulnerabilities and entry points that attackers can leverage (Möller 2023). These weaknesses can devastate the different digitized units, such as organizations, industries, or regions. ...
Article
Full-text available
The increased reliance of organizations on information technology inherently increases their vulnerability to cyber-security attacks. As a response, a host of cyber-security approaches exists. While useful, these approaches exhibit shortcomings such as an inclination to be fragmented, not accounting for up-to-date organizational data, focusing on singular vulnerabilities only, and being reactive, i.e., focusing on patching up vulnerabilities in current systems. The paper presents and evaluates a modeling method aiming to address those shortcomings and to support security by design with a focus on the electricity sector. The proposed modeling method encompasses a multi-level reference model reconstructing and integrating existing initiatives and supporting top-down and bottom-up analyses. Compared to earlier work, the paper contributes (1) a process model for cyber-security by design, which proactively considers security as a first-class citizen during the design process, (2) a complete coverage of the multi-level model, in terms of three views complementing the introduced process model, (3) an elaborated evaluation, in terms of reporting on an additional design science cycle.
... This overview provides a detailed analysis of 25 AI-powered attack simulators, including their features, functionalities, and performance.The importance of cybersecurity in today's digital landscape:In today's digital landscape, cybersecurity has become an indispensable aspect of our daily lives (Singer and Friedman 2014; Harel et al. 2017). As technology continues to advance and more aspects of our lives become digitized, the importance of cybersecurity grows exponentially(Möller. 2023). The sheer volume of sensitive information being transmitted and stored online has created a vast array of potential vulnerabilities, making it an attractive target for malicious actors). ...
Article
Full-text available
The cybersecurity landscape is undergoing a significant transformation, driven by the escalating sophistication and prevalence of cyber threats. Traditional defensive measures, focused on detection and prevention, are no longer sufficient to combat these evolving threats. To address this challenge, a more comprehensive strategy is required, incorporating advanced cybersecurity measures such as artificial intelligence (AI)-powered attack modelling and simulation tools. This review paper presents a thorough examination of existing attack simulators, analysing their capabilities, limitations, and applications in AI-driven cybersecurity. Our systematic review of 25 attack simulators reveals a predominant focus on network-based attacks, with limited coverage of endpoint, cloud, or IoT attacks. AI-powered simulators demonstrate enhanced accuracy and efficiency in predicting attack vectors and identifying vulnerabilities. However, current simulators lack realistic user behaviour modelling, hindering the accuracy of attack simulations. Furthermore, integration with existing security tools and frameworks is crucial for effective attack simulation and remediation. (Our review highlights the need for holistic attack simulators addressing diverse attack types and vectors, enhanced AI-powered simulation capabilities for improved accuracy and efficiency, realistic user behaviour modelling to simulate real-world attack scenarios, and standardized evaluation metrics for attack simulators to ensure comparability and effectiveness. This review serves as a foundation for future research in AI-powered attack modelling and simulation, providing valuable insights for cybersecurity professionals seeking to enhance their defences against evolving cyber threats, researchers exploring innovative approaches to cybersecurity, and organizations aiming to bolster their cybersecurity posture.
... DT represents a convergence of both technological and non-technological antecedents, illustrating the interconnectedness and dependencies inherent in its implementation Moreover, DT involves the adoption of a suite of technologies, blending non-technical and technological elements to drive multifaceted change (Sergei et al., 2018). High-speed networks such as 5G and fiber optics facilitate rapid data flow, enabling real-time communication, seamless connectivity, and efficient processing, empowering businesses to make informed decisions, optimize processes, and drive innovation (Möller, 2023). Key technologies driving DT in the tourism and hotel sectors involves various methods, including the internet, website services, email, blogs, simultaneous publishing technology, social networks, artificial intelligence, and smart mobile phone software (Wenzel & Wenzel, 2022;Abdelaziz & Naama, 2023). ...
Article
Full-text available
Digital Transformation. Unified Theory of Acceptance and Use of Technology. Intention to use Education Level Hotel Industry The research aims to examine how employees' intentions to use digital transformation technologies are affected by their acceptance of these technologies, with a particular emphasis on the moderating effect of education level. The researchers developed and examined a conceptual model grounded on the Unified Theory of Acceptance and Use of Technology (UTAUT) framework by empirically examining the education level's role in influencing employees' intention to use digital transformation technologies. Using a quantitative research technique, data was obtained from 401 employees and supervisors in the four and five-star hotels in Hurghada and Sharm El Sheikh Cities. The Partial Least Squares Structural Equation Modeling (PLS-SEM) method was used to analyze the collected data. The results show that performance expectancy (PE), effort expectancy (EE), social influence (SI), and facilitating conditions (FC) significantly influence employees' intention to use (IU) digital transformation technologies. Moreover, the results revealed that education level moderates the effect of PE and FC on employee intention to use digital transformation technologies, but does not significantly moderate the effect of SI and EE on employee intention to use digital transformation technologies. Additionally, the research contributes to filling a knowledge gap and offers practical implications.
... Malhotra, Bhargava, and Dave looked at e-government issues in the African and Indian economies. They identified a variety of risks and constraints in developing countries that hinder the expansion of digitalization of freely accessible public services (Möller, 2023). ...
Chapter
Full-text available
Data science, a prominent subset of artificial intelligence (AI), specializes in analyzing vast datasets using diverse tools and methods to derive insights and predictions. Its applications span various domains, notably cybersecurity, crucial for safeguarding systems and data from internal and external threats amid escalating challenges. The integration of data science in sectors like energy and environment underscores its transformative potential. The digitization of energy systems enables real-time data acquisition, facilitating timely analysis of human impacts on the environment and society. Furthermore, data science aids in monitoring policy effectiveness towards sustainable development (SD) goals. However, the rapid evolution of technology presents formidable challenges, necessitating organizational adaptability and utilization of cutting-edge advancements, especially in online communication. Amidst these shifts, data science emerges as a pivotal tool for informed decision-making and innovation, poised to make significant contributions across diverse sectors of the economy.
... These studies indicate that there is a positive impact of DTs on both SCRE and SCRO, as these technologies were found to strengthen the reactions to and recovery from disasters [29,60]. Contrary to these results, there are some rising voices that warn of the dark side of heavy reliance on DTs, as including DTs in the supply chain may results in cybersecurity risks that may result in the theft of data on customers, suppliers, and the like, thereby disrupting business continuity or the reliability of the supply chain and the information produced [14,[61][62][63][64][65]. ...
Article
Full-text available
This study aims to investigate the mediating role of supply chain resilience and robustness on the relationship between the use of digital technologies and sustainable environmental performance. Additionally, it investigates the moderating role of supply chain complexity on the impact of digital technologies on supply chain resilience and robustness. Data were gathered from 292 supply chain managers at registered manufacturing companies in Egypt and analyzed using Smart-PLS 4 software. The findings reveal that supply chain resilience and robustness partially mediate the link between digital technologies and sustainable environmental performance. Moreover, supply chain complexity was found to positively moderate the effect of digital technologies on both resilience and robustness. The model explained 53.2% of the variance in supply chain robustness, 56.6% in supply chain resilience, and 72.3% in sustainable environmental performance. These results provide critical insights for corporate policymaking, helping to drive continuous improvements in supply chain management, environmental performance, and sustainable development.
... By prioritizing cybersecurity, SMEs can create a secure digital environment that enables them to leverage digital tools and services to their fullest potential (Benjamin, et. al., 2024, Möller, 2023. Secure digital access significantly enhances financial inclusion for underbanked SMEs. ...
Article
Full-text available
The integration of digital technologies into the financial services industry has revolutionized how small and medium-sized enterprises (SMEs) access and utilize financial services. However, this digital transformation also brings heightened cybersecurity risks, making robust governance, risk management, and compliance (GRC) frameworks essential for fostering a safer digital ecosystem. This paper explores the pivotal role of cybersecurity GRC in enhancing digital access and inclusion for SMEs within the financial sector. By analyzing current challenges and opportunities, we propose a comprehensive approach to fortifying cybersecurity measures that align with the unique needs of SMEs. Firstly, the paper identifies the primary cybersecurity threats facing SMEs, including data breaches, phishing attacks, and ransomware, which can severely impact their operations and financial stability. It underscores the importance of a proactive GRC strategy that encompasses risk assessment, policy development, and continuous monitoring to mitigate these threats effectively. Moreover, the paper highlights the necessity for regulatory compliance, stressing how adherence to standards such as GDPR, PCI DSS, and ISO/IEC 27001 can bolster SMEs' defenses and enhance their credibility with customers and partners. Secondly, the research delves into the benefits of enhanced digital access and inclusion facilitated by a strong cybersecurity GRC framework. These benefits include improved financial inclusion for underbanked SMEs, streamlined access to digital financial services, and the promotion of innovation and competitiveness. The paper argues that by ensuring a secure digital environment, SMEs can confidently adopt emerging technologies such as blockchain, artificial intelligence, and cloud computing, driving growth and efficiency. Lastly, the paper presents case studies of successful cybersecurity GRC implementations in the financial services sector, showcasing best practices and lessons learned. It provides practical recommendations for SMEs to develop and maintain robust GRC frameworks, including leveraging automated tools for threat detection, fostering a culture of cybersecurity awareness, and engaging with cybersecurity experts for continuous improvement. In conclusion, the paper asserts that a comprehensive cybersecurity GRC strategy is crucial for enhancing digital access and inclusion for SMEs in the financial services industry. By addressing cybersecurity risks and ensuring compliance, SMEs can safely navigate the digital landscape, unlocking new opportunities for growth and innovation while contributing to a more secure and inclusive digital economy. Keywords: Digital Access, Inclusion, SMEs, Financial Services, Cybersecurity.
... DT represents a convergence of both technological and non-technological antecedents, illustrating the interconnectedness and dependencies inherent in its implementation Moreover, DT involves the adoption of a suite of technologies, blending non-technical and technological elements to drive multifaceted change (Sergei et al., 2018). High-speed networks such as 5G and fiber optics facilitate rapid data flow, enabling real-time communication, seamless connectivity, and efficient processing, empowering businesses to make informed decisions, optimize processes, and drive innovation (Möller, 2023). Key technologies driving DT in the tourism and hotel sectors involves various methods, including the internet, website services, email, blogs, simultaneous publishing technology, social networks, artificial intelligence, and smart mobile phone software (Wenzel & Wenzel, 2022;Abdelaziz & Naama, 2023). ...
Article
Full-text available
The research aims to examine how employees' intentions to use digital transformation technologies are affected by their acceptance of these technologies, with a particular emphasis on the moderating effect of education level. The researchers developed and examined a conceptual model grounded on the Unified Theory of Acceptance and Use of Technology (UTAUT) framework by empirically examining the education level's role in influencing employees' intention to use digital transformation technologies. Using a quantitative research technique, data was obtained from 401 employees and supervisors in the four and five-star hotels in Hurghada and Sharm El Sheikh Cities. The Partial Least Squares Structural Equation Modeling (PLS-SEM) method was used to analyze the collected data. The results show that performance expectancy (PE), effort expectancy (EE), social influence (SI), and facilitating conditions (FC) significantly influence employees' intention to use (IU) digital transformation technologies. Moreover, the results revealed that education level moderates the effect of PE and FC on employee intention to use digital transformation technologies, but does not significantly moderate the effect of SI and EE on employee intention to use digital transformation technologies. Additionally, the research contributes to filling a knowledge gap and offers practical implications.
Article
Full-text available
The advent of digital transformation will launch a new age for global higher education, one that presents numerous opportunities for administrative and instructional reform. Although there is a growing corpus of literature on digital transformation in higher education, there are still several important research gaps, especially when it comes to the examination of national policy documents in unique geopolitical situations like Vietnam. This study has identified the key strategies of digital transformation through the examination of 21 national policy papers, namely (1) Digital infrastructure and governance, (2) Equity and capacity building, (3) Digital pedagogy and administration, (4) Strategic planning and stakeholder collaboration, and (5) Financing and resource allocation. Based on the findings and Lewin's change theory as a conceptual framework, this research developed a conceptual model for guiding digital transformation at the institutional level, encompassing Activation, Implementation, and Institutionalisation Layers that can be broadly applied in various settings. The results of this study have important implications for educators, policymakers, and other stakeholders engaged in the advancement of digital transformation, not only in Vietnam but also in other nations starting similar paths toward the digital transformation of higher education.
Chapter
Cybersecurity is increasingly recognized as a key enabler of innovation in the digital economy. This chapter examines how five sectors—finance, healthcare, aviation, manufacturing, and education—are integrating cybersecurity into strategic innovation efforts. Through case studies such as blockchain in trade finance and federated learning in healthcare AI, it shows how early security integration enhances trust, scalability, and resilience. The analysis highlights sector-specific challenges, organizational capabilities, and shared success factors, while offering strategic recommendations for aligning cybersecurity with innovation governance. The chapter concludes by positioning cybersecurity as a cornerstone of sustainable digital transformation.
Chapter
This chapter explores how cybersecurity is strategically integrated into digital transformation in smart enterprises. With the rise of AI, IoT, and blockchain, cybersecurity is crucial not just for risk management but also for enabling innovation and resilience. It examines evolving cyber threats and the need for proactive, tailored security strategies. Using frameworks like NIST, ISO/IEC 27005, and the FAIR Model, the chapter outlines best practices in risk management, AI-driven threat detection, and secure architecture. It highlights the role of culture, leadership, and preparedness for emerging risks like quantum threats and regulatory shifts. Ultimately, it presents cybersecurity as a cornerstone of sustainable digital transformation, offering strategic guidance for innovation, collaboration, and resilience.
Chapter
In the evolution of this new paradigm where companies are interconnected, governments have been compelled to advance their digitalization strategies. This digital transformation of the state highlights the significant opportunities and challenges presented by new legal, economic, and environmental developments linked to the digital transformation of governmental activities and services. In this sense, this study has developed three primary bibliometric methods to analyze a sample of 371 publications related to the digitalization of governments extracted from Web of Sciences (WoS). The study provides comprehensive insights into the evolving landscape of government digitalization. As main conclusions, this study offers a total of 9 research topics, 36 research challenges, and 45 future research questions (RQs) regarding the digitalization of governments and offers insights related to these areas: digitalization, innovation, digital economy, law systems, adoption of information management systems, privacy and risk, sustainability, artificial intelligence, and green resources.
Chapter
This chapter covers the digital economy, privacy, and cybersecurity. Cyber protection, privacy, and data security address computer infections and cyberattacks. This study is a review article based on scholarly papers from valid sources, including Google Scholar, Scopus, and Web of Science (WOS), from 2020 to 2024. The findings show that digital privacy safeguards consumer data. Personal data, communication, and behavior are safe online. Shows internet data privacy rules. The data-driven society needs digital privacy. Digital platforms create vast amounts of personal data that could be misused, including financial and health records. Data theft is prevented via digital privacy. For democracy, we need digital privacy. Diverse viewpoints survive without manipulation. Digital privacy rules enhance customer trust and business reputation, enabling companies to compete more effectively.
Article
The global energy market is migrating toward sustainable renewable energy sources (RES), with solar energy (SE) being the most significant due to its abundance and reliability. Photovoltaic (PV) converts SE into electricity, relying on data integrity and security. However, digitized data has cybersecurity vulnerabilities, including data breaches and attacks. Traditional security systems can provide essential protection but fail to address PV's dynamic and distributed nature, leading to gaps in defense against evolving cyber threats. The study proposes an endogenous security model for improving data transmission and storage within PV. It uses a Verification Feedback Mechanism (VFM) to integrate routing methods, compute efficient data paths, schedule them periodically, and verify their integrity. The model also incorporates cryptographic key infrastructure and key management protocols to ensure secure data transmission and management. This approach addresses challenges in data forging and ensures the integrity of the network's components. The study compared two methods and found one model superior in communication integrity and system adaptability. It achieved latency statistics below 20 ms and maintained Network Throughput (NT) at 9.2 Gbps even when attacked, demonstrating its effectiveness in securing PV from multiple cyberattacks.
Chapter
Artificial intelligence is considered as most breakthrough technology nowadays with primary subdivisions machine learning and deep learning. Artificial intelligence enabling digital entities not only to learn but also to gain and optimize knowledge to the manifold of possible applications in essential and important smart environmental domains. This includes, but is not limited to control and optimization of many kind of smart systems like cities, energy, financial, home, medical, traffic, and others with exiting solutions, never seen before. Unfortunately, an emerged growth can be seen for cybercrime, conducted by cyber-threat attacks based on AI-system applications, which has a negative endeavor due to cybersecurity risks. However, AI can also be used to defend against cybercrime activities, which has a positive endeavor making AI-based systems cyber-secure. Given this fact, the objective of this chapter is to introduce into both aspects, using AI methods to detect and defend against cybercrime. Finally, a practical example illustrates how AI can be successfully applied in the smart environment sector.
Article
Digital transformation, one of the themes of the Information Age, is forming the basis of industries, rewarding innovation and fueling economic advancement. However, this advancement becomes faster and engulfs technology and with these new advancements comes a lot of virtual insecurity such as data leakage, privacy violation and increased virtual dangers. Digital transformation was discussed in this article in relation to cyber security in the context of interactions through interconnected systems. On the basis of existing theory, this work assesses the measures that organisations have to implement in order to address these threats where digitalization is implemented. The research also looks at a number of case studies and polices that have already been studied in prior educational work to show the effects that will be analyzed in the following sections on policy and governance, as well as future improvements in technology. The nature of cyber threats is evolving at an incredibly fast pace, making it impossible to implement changes that wouldn't demand constant investments in training, tools, and processes. As for the restriction of resources, the identification and prevention of breaches are also delayed during incident response. In order to counter these problems, organisations may turn to the use of a third-party cyber security services and products including cyber security-as-a-Service; incorporate automation to enable them achieve greater performances yet minimize workload; as well as engage in security culture campaigns that aim at reaching all organisational workforce. Lack of resources may be a major detriment in the ongoing fight against cyber threats, but better prioritization and alliance can flatten the negative effects of having scarce resources in one's arsenal. Introduction The research underscores the need for continuous monitoring, regular audits, and compliance with evolving regulations to mitigate risks. By methodically addressing these issues, companies may safeguard their digital transformation efforts while securing sensitive data and systems. While it aims at innovation and efficiency it at the same time leads companies to suffer from cyber threats. This is because this phenomenon must work in harmony, and only if their dynamics are understood adequately, growth and security are truly achievable. Damaraju, A. (2024) provides a detailed look on how security of the cloud systems can be addressed while undergoing digital transformation. Analyzing the wide list of inputs, Damaraju notices such serious threats as insecure clouds' configurations, weak cryptographic protection, and the invisibility of cloud infrastructures. The study stresses the shared responsibility model that results in ambiguity concerning security commitment between cloud providers and clients. The author also lays down several approaches to deal with these issues such as information monitoring through the use of AI technologies and the use of multi-form authentication mechanisms and there should be the encryption of such data. The focus is thereby placed on the full qualification of a cloud-native security technique, which comprises server less security services and containerization for improving business continuity. The paper also demonstrates the importance of mapping security responsibilities among IT teams and cloud service providers. It is also wise to carry out frequent security assessments, and it is legal to use conformity standards like SOC 2 and ISO 27001 to achieve secure cloud space. Determinedly, cloud security has its issues but Damaraju agrees that if a business uses a strategic and pre-emptive approach, it may help them create safer cloud adoption strategies. Thakur (2024) presents a systematic analysis of cyber security risks and the strategies that organizations could adopt in cyberspace. In the current paper, options to raise staff awareness and training levels as a way of strengthening human aspects of cyber security are of great prominence. The work identifies the signification of a collective approach and adherence to laws in preventing transnational cybercrime.
Article
Full-text available
Digital transformation, one of the themes of the Information Age, is forming the basis of industries, rewarding innovation and fueling economic advancement. However, this advancement becomes faster and engulfs technology and with these new advancements comes a lot of virtual insecurity such as data leakage, privacy violation and increased virtual dangers. Digital transformation was discussed in this article in relation to cyber security in the context of interactions through interconnected systems. On the basis of existing theory, this work assesses the measures that organisations have to implement in order to address these threats where digitalization is implemented. The research also looks at a number of case studies and polices that have already been studied in prior educational work to show the effects that will be analyzed in the following sections on policy and governance, as well as future improvements in technology. The nature of cyber threats is evolving at an incredibly fast pace, making it impossible to implement changes that wouldn’t demand constant investments in training, tools, and processes. As for the restriction of resources, the identification and prevention of breaches are also delayed during incident response. In order to counter these problems, organisations may turn to the use of a third-party cyber security services and products including cyber security-as-a-Service; incorporate automation to enable them achieve greater performances yet minimize workload; as well as engage in security culture campaigns that aim at reaching all organisational workforce. Lack of resources may be a major detriment in the ongoing fight against cyber threats, but better prioritization and alliance can flatten the negative effects of having scarce resources in one’s arsenal.
Chapter
This chapter offers an in-depth literature review on the definition, evolution, and key attributes of digital transformation within the creative and cultural industries. The author outlines digital transformation as the integration of digital technology into all business areas, which fundamentally changes operations and value delivery. The historical evolution is traced from the early internet era and e-commerce to current advanced technologies like Artificial Intelligence (AI), cloud computing, big data, and Internet of Things (IoT). Key attributes of digital transformation include agility, customer-centricity, data-driven decision-making, and cultivating a digital culture. The chapter also examines the significant impact of digital technologies on business models and value chains in creative industries such as advertising, music, fashion, architecture, and performing arts. Digital transformation has revolutionized customer segmentation, value propositions, distribution channels, customer relationships, revenue streams, key resources, activities, partnerships, and cost structures. The author highlights how digital platforms, data analytics, and personalized experiences enhance customer engagement and market reach while optimizing operations. The chapter addresses challenges including bridging the digital divide, ensuring cybersecurity, integrating legacy systems, managing cultural shifts, and demonstrating acceptable return on investment (ROI). Future trends like AI, edge computing, IoT, blockchain, and sustainability are discussed as drivers of the next phase of digital transformation. The chapter emphasizes the transformative potential and complexities of digital technologies in reshaping the creative and cultural industries.
Article
Full-text available
This paper explores the application of Artificial Intelligence (AI) and Machine Learning (ML) in adaptive eLearning platforms designed for cybersecurity training, with a focus on entrepreneurs. Due to limited resources and technical expertise, entrepreneurs face unique challenges in protecting their businesses from cyber threats. Traditional training methods often fail to meet their needs, highlighting the importance of AI-driven platforms that offer personalized learning experiences. The paper examines the benefits of AI-powered eLearning systems, including improved engagement, real-time assessments, and adaptation to diverse learning styles. It also addresses emerging trends in AI and ML for cybersecurity education, the integration of adaptive eLearning into entrepreneurial support systems, and the ethical and regulatory implications of AI-driven learning. Finally, recommendations are provided for policymakers and educators to support the growth of AI in cybersecurity training. The findings suggest that AI-powered platforms can offer scalable, effective solutions for entrepreneurs to enhance their cybersecurity skills and protect their digital assets. Keywords: Artificial Intelligence, Machine Learning, Cybersecurity Training, Adaptive eLearning, Entrepreneurs, Personalized Learning.
Chapter
This chapter explores the essential organizational and cultural prerequisites for successfully integrating Artificial Intelligence (AI) into network security. This research employs a qualitative methodology, including a comprehensive literature review, to analyze internal needs and address ethical considerations such as bias, privacy, and fairness. This study examines the impact of organizational culture on the acceptance and effectiveness of AI-based solutions. It emphasizes the significance of end-user trust in AI-driven security alerts. The findings highlight the necessity of organizational readiness and cultural adaptation for the effective implementation of AI in network security, concluding that a comprehensive approach is essential for maximizing AI's potential in enhancing security measures. This research will benefit cybersecurity professionals, organizational leaders, and policymakers seeking to understand and navigate the complexities of AI integration in network security.
Research
Full-text available
In the digital age, small and medium-sized enterprises (SMEs) are increasingly recognizing the critical role of business intelligence (BI) in driving growth and maintaining competitiveness. This paper examines how leveraging AI technologies and robust cybersecurity measures can enhance BI capabilities within SMEs, enabling them to make data-driven decisions and navigate market complexities effectively. By integrating AI tools into their BI frameworks, SMEs can gain deeper insights into customer behavior, operational efficiencies, and market trends, leading to improved strategic planning and resource allocation. Additionally, the importance of cybersecurity in protecting sensitive business data and fostering customer trust is emphasized, as SMEs face growing threats in an interconnected digital landscape. Through a series of case studies, this study illustrates successful applications of AI-driven BI solutions and the impact of comprehensive cybersecurity strategies on SME growth. The findings suggest that a synergistic approach to BI, AI, and cybersecurity is essential for SMEs seeking sustainable growth in the digital era. Ultimately, this paper highlights the necessity for SMEs to invest in these technologies to thrive in an evolving business environment.
Article
Full-text available
The drastic increase in digital data has brought about the Fourth Industrial Revolution, or Industry 4.0. Digital transformation is the way of changing from a monolithic business approach to fully digitalized business concepts, including Internet of Thing (IoT), Mobile communication, business processes, social media and healthcare. This development is now being threaten by cybercriminals leading to changing or destroying sensitive information in the cyberspace. This article study various identified cyber-attacks to examine cyber security threats deterring fostering digital transformation. For the purpose of conducting insightful data analysis and developing automated and intelligent systems to combat Cybercrime hindering digital transformation, this article provide strategic guidance to researchers on the potentiality of Artificial Intelligence (AI) to enhance the intelligence and improve security, trust, confidentiality and privacy of emerging cyber security applications.
Thesis
Full-text available
In recent years, technological advancement has had a profound impact on both individual lives and the operations of businesses. There is an increasing tendency for processes to become digitised, or to be conducted in a manner that makes use of digital technologies to some extent. This phenomenon is observed in both our daily lives and the corporate environment. Digital transformation signifies a pivotal shift in the incorporation of digital technology into the full spectrum of business operations, thereby fundamentally altering the manner in which organisations operate and deliver value to customers. An increasing number of organisations have initiated the process of digital transformation. In addition to establishing objectives for digital transformation, it is imperative that organisations conduct regular evaluations of their progress. This thesis offers a comprehensive examination of digital transformation, with a particular focus on the assessment of its implementation within the information and communication technology (ICT) sector in Greece. In the first part of the thesis, a historical review of the technological developments that have occurred over time is provided. A definition of digital transformation is given, emphasizing its distinguishing characteristics and differentiating it from Industry 4.0. The following section offers an overview of digital transformation, delineating the stages through which an organisation will progress and the strategic prerequisites that must be met. In addition, this section presents the primary dimensions of digital transformation. Subsequently, an examination of various maturity models is presented with the objective of identifying the most suitable model for the assessment. The selected maturity model is presented, accompanied by a description of the final survey that was conducted. In the fifth chapter, the results of the survey are presented along with the research findings. The final chapter provides an overview of the findings presented in this thesis and suggests areas for further research.
Article
Full-text available
The growing importance of cybersecurity in the digital age necessitates a comprehensive approach to securing web applications, particularly through robust front-end development practices. This review paper proposes a conceptual framework for integrating security best practices into front-end development to mitigate common vulnerabilities such as Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF). The framework emphasizes key components: threat modeling, secure coding practices, security automation, integration into Continuous Integration/Continuous Deployment (CI/CD) pipelines, and continuous monitoring. By embedding security into every stage of the development process, the framework enhances the security of web applications. It aligns with U.S. national interests in bolstering cybersecurity. The paper also discusses the implications of secure front-end development for national cybersecurity, highlighting the framework's potential to reduce the attack surface of critical web applications significantly. Recommendations are provided for policymakers and industry leaders to promote adopting secure front-end practices, ensuring a resilient digital infrastructure. Keywords: Secure Front-End Development, Cybersecurity, Web Application Security, Threat Modeling, Security Automation, National Cybersecurity.
Chapter
With the escalating sophistication of cyber threats in the digital landscape, traditional cybersecurity measures face unprecedented challenges. This article explores the integration of fuzzy logic, a computational paradigm inspired by human reasoning, as an intelligent shield to enhance cybersecurity strategies. Fuzzy logic’s ability to handle uncertainty and imprecision proves instrumental in adapting to the dynamic and evolving nature of cyber threats. The article delves into the theoretical foundations of fuzzy logic and its practical applications in fortifying digital defenses. Drawing on real-world examples, it demonstrates how fuzzy logic’s adaptive and self-learning capabilities contribute to the development of robust and proactive cybersecurity frameworks. As the digital age demands innovative approaches to safeguard sensitive information, this article advocates for the incorporation of fuzzy logic as a strategic element in the arsenal against cyber threats.
Article
Full-text available
While research has produced valuable insights about digital innovation, we lack a comprehensive understanding about its core nature, and research across disciplinary boundaries lacks integration. To address these issues, we review 227 articles on digital innovation across eight disciplines. Based on our findings, we (1) inductively develop a new definition and propose a new framing of current conceptualizations of digital innovation, (2) organize central concepts of the literature on digital phenomena and show how they intersect with our conceptualization, and (3) develop a framework to organize digital innovation research according to five key themes. We conclude by identifying two particularly promising areas of future research.
Article
Full-text available
The paper investigates the aviation sector, as a case in point for a Smart environment and as an example for Industry 5.0 and Society 5.0 purposes. In the smart complex environments, a systemic vision of the elements, which act and are acted within a given territory, should be the basis of a hypothesis of joint growth. Indeed, the synergies activated by the system can be seen as the product of the application of a particular knowledge-based open innovation strategy, as an orientation capable of transforming theoretical assumptions into concrete operational innovation paths. Through the evidence emerged from an important case study and the application of an MCDA methodology, we have tried to identify which are the optimal solutions for the implementation of the new human-centric logics of I5.0, analyzing them on the basis of the actual benefits for the ecosystem, going beyond the self-referential aptitude of the firm to instill technological changes and managerial visions. Knowledge circulation, dialogue between sub-systems, and the ability to adapt technology and entrepreneurial strategies to the environment in which it operates (with the users as first stakeholders) seem to be necessary practices in knowledge-based innovation, prioritization, and decision-making processes, for smart, sustainable, and inclusive solutions.
Article
Full-text available
In the last years, scholarly attention was on a steady rise leading to a significant increase in the number of papers addressing different technological and organizational aspects of digital transformation. In this paper, we consolidate existing findings which mainly stem from the literature of information systems, map the territory by sharing important macro- and micro-level observations, and propose future research opportunities for this pervasive field. The paper systematically reviews 58 peer-reviewed studies published between 2001 and 2019, dealing with different aspects of digital transformation. Emerging from our review, we develop inductive thematic maps which identify technology and actor as the two aggregate dimensions of digital transformation. For each dimension, we derive further units of analysis (nine core themes in total) which help to disentangle the particularities of digital transformation processes and thereby emphasize the most influential and unique antecedents and consequences. In a second step, in order to assist in breaking down disciplinary silos and strengthen the management perspective, we supplement the resulting state-of-the-art of digital transformation by integrating cross-disciplinary contributions from reviewing 28 papers on technological disruption and 32 papers on corporate entrepreneurship. The review reveals that certain aspects, such as the pace of transformation, the culture and work environment, or the middle management perspective are significantly underdeveloped.
Article
Full-text available
Research summary How firms respond to the emergence of dominant platforms that undermine their competitiveness remains a strategic puzzle. Our longitudinal study shows how one incumbent, Cisco, responded to such a challenge by creating a new platform, Fog, without undermining the dominant platform, Cloud, where it played a complementor role. By developing a process model we reveal how a firm in a peripheral role in a platform ecosystem can reposition itself through a dynamic mix of material, symbolic and institutional actions to develop and legitimize an alternative platform. This can be done first through symbiosis with the dominant platform, then partial competition with it. We theorize the value of a mutualistic “rising tide lifts all boats” strategy in contrast to hostile “winner takes all” approaches. Managerial summary The increasing pervasiveness of digital platforms are driving established firms to reboot their strategy to embrace emergent forms of competition, collaboration, and mutual coexistence. Fearing disruption in their traditional business models, firms may decide to jump into the platform game. However, this is not straightforward since they do not want to go head‐to‐head with existing platforms and alienate their partners and customers by being perceived as encroaching on their turf. We describe one way that established technology firms are overcoming this dilemma through a “rising‐tide‐lifts‐all‐boats” strategy to cultivate new platforms. We show the value of seemingly inconsistent and dynamic approaches toward strategic communication and investments firm can use to lead new platforms without facing backlash from others.
Article
Full-text available
Digital transformation and resultant business model innovation have fundamentally altered consumers’ expectations and behaviors, putting immense pressure on traditional firms, and disrupting numerous markets. Drawing on extant literature, we identify three stages of digital transformation: digitization, digitalization, and digital transformation. We identify and delineate growth strategies for digital firms as well as the assets and capabilities required in order to successfully transform digitally. We posit that digital transformation requires specific organizational structures and bears consequences for the metrics used to calibrate performance. Finally, we provide a research agenda to stimulate and guide future research on digital transformation.
Article
Full-text available
The purpose of this study was to identify leadership styles that impacted the digital transformation of an organization. Six information technology leaders from healthcare organizations were chosen to lead and participate in a digital transformation effort across several organizations in the Midwest (USA). The information collected was transcribed for clarity and to identify patterns in leadership styles that were evident. A qualitative research design using semi-structured interviews was established to determine this impact and how leadership style influenced an organization’s direction regarding its digital transformation. Specific research literature in this area was addressed and provided a framework for this issue, including the types of leadership styles which were commonly used. These styles influenced large-scale decisions within an organization. In addition, the success of this transformation was evaluated in the context of leadership styles occurring naturally within an organization. The research findings indicated that leadership style was highly impactful in transforming organizations and employee-based involvement and input played a critical role in the success of the change effort. In addition, organizational leaders lacked some of the technical knowledge required to lead this project. Leadership styles are influential in organizations and can implement norms, expectations, and desirable outcomes during large-scale transformative projects.
Article
Full-text available
This research investigates how entrepreneurs of small and medium enterprises (SMEs) with inadequate capabilities and limited resources drove digital transformation in their companies, a phenomenon that remains under-researched in the extant literature. We conduct qualitative research on digital transformation to cross-border e-commerce undergone by 7 SMEs on the Alibaba digital platform. We inductively derive a process model that aims to describe and explain how SME entrepreneurs, with support from the digital platform service provider, drive digital transformation through managerial cognition renewal, managerial social capital development, business team building, and organizational capability building. This model expands our understanding of both digital entrepreneurship and digital transformation. It also presents new insights into how digital platform service providers can help SMEs transform and compete.
Article
Full-text available
Although circular economy is usually indicated as a way to reconcile economic growth and sustainability, circular business models and related product-service systems are not implemented on a large scale yet. Providing information about how to develop circular business models and methods to evaluate their expected impacts, can support stakeholders to embrace this transition. To this regard, the aim of this paper is to propose and discuss the actions required for reshaping the washing machine industry towards a circular economy scenario. The paper, based on a recently launched research project, describes a set of actions and develops very preliminary computations of their expected impact. Results show that customers could benefit from an average yearly saving of almost 30% of the current washing cost, while country total electricity generation and water consumption could be reduced of about 0.6% and 1% respectively. Albeit they are only preliminary estimates and further research and empirical validation are certainly needed, these outcomes gives an idea about the order of magnitude of benefits gathered by a circular economy transition for a mass durable consumer goods industry such as washing machines.
Article
Full-text available
Nowadays, along with the application of new-generation information technologies in industry and manufacturing, the big data-driven manufacturing era is coming. However, although various big data in the entire product lifecycle, including product design, manufacturing, and service, can be obtained, it can be found that the current research on product lifecycle data mainly focuses on physical products rather than virtual models. Besides, due to the lack of convergence between product physical and virtual space, the data in product lifecycle is isolated, fragmented, and stagnant, which is useless for manufacturing enterprises. These problems lead to low level of efficiency, intelligence, sustainability in product design, manufacturing, and service phases. However, physical product data, virtual product data, and connected data that tie physical and virtual product are needed to support product design, manufacturing, and service. Therefore, how to generate and use converged cyber-physical data to better serve product lifecycle, so as to drive product design, manufacturing, and service to be more efficient, smart, and sustainable, is emphasized and investigated based on our previous study on big data in product lifecycle management. In this paper, a new method for product design, manufacturing, and service driven by digital twin is proposed. The detailed application methods and frameworks of digital twin-driven product design, manufacturing, and service are investigated. Furthermore, three cases are given to illustrate the future applications of digital twin in the three phases of a product respectively.
Conference Paper
Full-text available
An increasing number of firms are responding to new opportunities and risks originating from digital technologies by introducing company-wide digital transformation strategies as a means to systematically address their digital transformation. Yet, what processes and strategizing activities affect the formation of digital transformation strategies in organizations are not well understood. We adopt a phenomenon-based approach and investigate the formation of digital transformation strategies in organizations from a process perspective. Drawing on an activity-based process model that links Mintzberg’s strategy typology with the concept of IS strategizing, we conduct a multiple-case study at three European car manufacturers. Our results indicate that digital transformation strategies are predominantly shaped by a diversity of emergent strategizing activities of separate organizational subcommunities through a bottom-up process and prior to the initiation of a holistic digital transformation strategy by top management. As a result, top management’s deliberate strategies seek to accomplish the subsequent alignment of preexisting emergent strategy contents with their intentions and to simultaneously increase the share of deliberate contents. Besides providing practical implications for the formulation and implementation of a digital transformation strategy, we contribute to the literature on digital transformation and IS strategizing.
Chapter
Full-text available
Systems do not simply pop into existence. They progress through lifecycle phases of creation, production, operations, and disposal. The issues leading to undesirable and unpredicted emergent behavior are set in place during the phases of creation and production and realized during the operational phase, with many of those problematic issues due to human interaction. We propose that the idea of the Digital Twin, which links the physical system with its virtual equivalent can mitigate these problematic issues. We describe the Digital Twin concept and its development, show how it applies across the product lifecycle in defining and understanding system behavior, and define tests to evaluate how we are progressing. We discuss how the Digital Twin relates to Systems Engineering and how it can address the human interactions that lead to “normal accidents.” We address both Digital Twin obstacles and opportunities, such as system replication and front running. We finish with NASA’s current work with the Digital Twin.
Conference Paper
Full-text available
In the 1990s, the broad diffusion of the internet allowed firms such as Amazon, eBay, and Google to invent new digital business models. Since then, research has formalized recurring configurations as digital business model types, still frequently being used to analyze existing business models and develop new ones. Now, the next wave of digital transformation – enabled by ongoing improvements in processing power, the miniaturization of hardware, and ubiquitous wireless connectivity – is again driving innovation. For instance, in the mobility sector, startups such as Uber, Turo, and Streetline have formed business logics that cannot be understood with existing types. Therefore, we identified and formalized new business model configurations by systematically analyzing a comprehensive data set of technology startups from the US mobility sector. We found that, in order to adequately account for the new digital logics, 14 digital business model types must be added to existing collections: app developer, autonomous products/robots manufacturer, data analytics provider, integrator of third-party services, IT-enabled self-service provider, IT-guided service provider, manufacturer of connected physical products, manufacturer of connectivity devices for physical products, mobilized service provider, P2P goods sharing platform, P2P information sharing community, P2P service provision platform, seller of sensor information, and sensor-enabled service innovator.
Article
Full-text available
In recent years, firms in almost all industries have conducted a number of initiatives to explore new digital technologies and to exploit their benefits. This frequently involves transformations of key business operations and affects products and processes, as well as organizational structures and management concepts. Companies need to establish management practices to govern these complex transformations. An important approach is to formulate a digital transformation strategy that serves as a central concept to integrate the entire coordination, prioritization, and implementation of digital transformations within a firm. Despite first research efforts and the frequent challenges encountered in practice, academia still lacks specific guidelines for firms on how to formulate, implement, and evaluate digital transformation strategies.
Article
Full-text available
Article
Full-text available
Abstract Purpose — This paper aims to identify processes which may contribute to followers’ positive reactions to change. By focusing on the relationship between change antecedents and explicit reactions, we investigate the direct and indirect relationships between leadership styles (transformational and transactional) and followers’ appraisal of change through manager engagement. Design/methodology/approach — Using data from a longitudinal survey among 351 followers in two Danish organizations, our study tracked the planned implementation of team organization at two different times. Data were analyzed using structural equation modeling. Findings — Transformational and transactional leadership styles were positively related to the engagement of managers. Managers’ engagement was associated with followers’ appraisal of change. The two leadership styles also had a direct, long-term effect on followers’ change appraisal; positive for transformational leadership and negative for transactional leadership. Practical implications — Our results have potential implications for change management, as followers’ change appraisal may be improved by developing managers’ leadership style and engagement. Originality/value — This is the first study to provide longitudinal evidence of the direct and indirect effects of leadership styles on followers’ change appraisal.
Article
Full-text available
Today, in an Industry 4.0 factory, machines are connected as a collaborative community. Such evolution requires the utilization of advance- prediction tools, so that data can be systematically processed into information to explain uncertainties, and thereby make more “informed” decisions. Cyber-Physical System-based manufacturing and service innovations are two inevitable trends and challenges for manufacturing industries. This paper addresses the trends of manufacturing service transformation in big data environment, as well as the readiness of smart predictive informatics tools to manage big data, thereby achieving transparency and productivity.
Article
Full-text available
Our era is one of increasingly pervasive digital technologies, which penetrate deeply into the very core of the products, services, and operations of many organizations and radically change the nature of product and service innovations. The fundamental properties of digital technology are reprogrammability and data homogenization. Together, they provide an environment of open and flexible affordances that are used in creating innovations characterized by convergence and generativity. An analysis of convergence and generativity observed in innovations with pervasive digital technologies reveals three traits: (1) the importance of digital technology platforms, (2) the emergence of distributed innovations, and (3) the prevalence of combinatorial innovation. Each of the six articles in this special issue relates to one or more of these three traits. In this essay, we explore the organizational research implications of these three digital innovation traits and identify research opportunities for organization science scholars. Examples from the articles in this special issue on organizing for innovation in the digitized world are used to demonstrate the kind of organizational scholarship that can faithfully reflect and inform innovation in a world of pervasive digital technologies.
Book
Full-text available
In this book, the authors describe the fundamental concepts and practical aspects of wireless sensor networks. The book provides a comprehensive view to this rapidly evolving field, including its many novel applications, ranging from protecting civil infrastructure to pervasive health monitoring. Using detailed examples and illustrations, this book provides an inside track on the current state of the technology. The book is divided into three parts. In Part I, several node architectures, applications and operating systems are discussed. In Part II, the basic architectural frameworks, including the key building blocks required for constructing large-scale, energy-efficient sensor networks are presented. In Part III, the challenges and approaches pertaining to local and global management strategies are presented - this includes topics on power management, sensor node localization, time synchronization, and security. At the end of each chapter, the authors provide practical exercises to help students strengthen their grip on the subject. There are more than 200 exercises altogether. Key Features: Offers a comprehensive introduction to the theoretical and practical concepts pertaining to wireless sensor networks Explains the constraints and challenges of wireless sensor network design; and discusses the most promising solutions Provides an in-depth treatment of the most critical technologies for sensor network communications, power management, security, and programming Reviews the latest research results in sensor network design, and demonstrates how the individual components fit together to build complex sensing systems for a variety of application scenarios Includes an accompanying website containing solutions to exercises (http://www.wiley.com/go/dargie_fundamentals) This book serves as an introductory text to the field of wireless sensor networks at both graduate and advanced undergraduate level, but it will also appeal to researchers and practitioners wishing to learn about sensor network technologies and their application areas, including environmental monitoring, protection of civil infrastructure, health care, precision agriculture, traffic control, and homeland security.
Article
Full-text available
The 50-year march of Moore’s Law has led to the creation of a relatively cheap and increasingly easy-to-use world-wide digital infrastructure of computers, mobile devices, broadband network connections, and advanced application platforms. This digital infrastructure has, in turn, accelerated the emergence of new technologies—social media, cloud computing, analytics and “big data,” 3D printing, and intelligent autonomous systems. These types of new technologies enable transformations in how we live and work, how companies organize, and the structure of entire industries. As a result, it has become increasingly important for all business students (MBAs and undergraduates alike) to have a strong and appropriate grounding in IT in general and digital innovation in particular—in order to manage, lead and transform organizations that can benefit from digital innovation. Yet, at many schools students do not get such grounding, either because the required IS core class is stuck in the past, or because the required business core excludes IS altogether. We present a vision for a redesigned IS core class that adopts digital innovation as a fundamental and powerful concept (FPC). A good FPC serves as both a foundational concept and an organizing principle for a course. We espouse a particularly broad conceptualization of digital innovation that allows for a variety of teaching styles and topical emphases for the IS core class. This conceptualization includes three types of innovation (i.e., process, product, and business model innovation), and four stages for the overall innovation process (i.e., discovery, development, diffusion, and impact). Based on this conceptualization, we examine the implications of adopting digital innovation as an FPC. We also briefly discuss broader implications relating to: (1) the IS curriculum beyond the core class, (2) the research agenda for the IS field, and (3) the identity and legitimacy of IS in business schools.
Conference Paper
Full-text available
This paper is a tutorial, which discusses reference model; architectural principles and objectives of network virtualization. Network virtualization projects, challenges and future directions are also discussed.
Book
This book offers a selection of the best papers presented at the international scientific conference "Digital Transformation in Industry: Trends, Management, Strategies", held by the Institute of Economics of the Ural Branch of the Russian Academy of Sciences, Russia in November 2020. The main focus of the book is to evaluate trends and perspectives of digital transformation in industry and industrial markets through the dissemination of Industry 4.0. The aim of the topics discussed is to create an idea of introduction mechanisms for digitization processes and to specify successful strategies of digital transformation in all sectors of industrial enterprises. The experience of developed and developing economies, as well as small and large enterprises implementing IT and other technological innovations are included. Students as well as managers of industrial organizations alike can benefit from the results of the topics covered.
Book
This book brings together the essential methodologies required to understand the advancement of digital technologies into digital transformation, as well as to protect them against cyber threat vulnerabilities (in this context cybersecurity attack ontology is included, modeling different types of adversary knowledge). It covers such essential methodologies as CIA Triad, Security Risk, Likelihood, and Consequence Level, Threat Attack Profiling, Threat Intelligence, Threat Lifecycle and more. The idea behind digital transformation is to use digital technologies not only to replicate an existing process in a digital form, but to use digital technology to transform that process into something intelligent (where anything is connected with everything at any time and accessible and controlled and designed advanced). Against this background, cyber threat attacks become reality, using advanced digital technologies with their extreme interconnected capability which call for sophisticated cybersecurity protecting digital technologies of digital transformation. Scientists, advanced-level students and researchers working in computer science, electrical engineering and applied mathematics will find this book useful as a reference guide. Professionals working in the field of big data analytics or digital/intelligent manufacturing will also find this book to be a valuable tool.
Book
This comprehensive text/reference presents an in-depth review of the state of the art of automotive connectivity and cybersecurity with regard to trends, technologies, innovations, and applications. The text describes the challenges of the global automotive market, clearly showing where the multitude of innovative activities fit within the overall effort of cutting-edge automotive innovations, and provides an ideal framework for understanding the complexity of automotive connectivity and cybersecurity. Topics and features: • Discusses the automotive market, automotive research and development, and automotive electrical/electronic and software technology • Examines connected cars and autonomous vehicles, and methodological approaches to cybersecurity to avoid cyber-attacks against vehicles • Provides an overview on the automotive industry that introduces the trends driving the automotive industry towards smart mobility and autonomous driving • Reviews automotive research and development, offering background on the complexity involved in developing new vehicle models • Describes the technologies essential for the evolution of connected cars, such as cyber-physical systems and the Internet of Things • Presents case studies on Car2Go and car sharing, car hailing and ridesharing, connected parking, and advanced driver assistance systems • Includes review questions and exercises at the end of each chapter The insights offered by this practical guide will be of great value to graduate students, academic researchers and professionals in industry seeking to learn about the advanced methodologies in automotive connectivity and cybersecurity.
Book
The recent surge of interest in digital ecosystems is not only transforming the business landscape, but also poses several human and organizational challenges. Due to the pervasive effects of the transformation on firms and societies alike, both scholars and practitioners are interested in understanding the key mechanisms behind digital ecosystems, their emergence and evolution. In order to disentangle such factors, this book presents a collection of research papers focusing on the relationship between technologies (e.g. digital platforms, AI, infrastructure) and behaviours (e.g. digital learning, knowledge sharing, decision-making). Moreover, it provides critical insights into how digital ecosystems can shape value creation and benefit various stakeholders. The plurality of perspectives offered makes the book particularly relevant for users, companies, scientists and governments. The content is based on a selection of the best papers – original double-blind peer-reviewed contributions – presented at the annual conference of the Italian chapter of the AIS, which took place in Pavia, Italy in October 2018.
Article
Additive manufacturing (AM) is a set of technologies and are vital to fulfilling different requirements of Industry 4.0. So, there is a need to study different additive manufacturing applications toward its achievement. From the Scopus database, different research articles on ‘Industry 4.0’ and ‘additive manufacturing applications in Industry 4.0’ are identified and studied through a bibliometric analysis. It shows that there is an increasing trend of publications in this new area. Industry 4.0 entered new market which focus on customer delight by adding values in product and services. It supports automation, interoperability, actionable insights and information transparency. There are different components vital to implement Industry 4.0 requirements. Through this extensive literature review based work, we identified different components of Industry 4.0 and explained the critical ones briefly. Finally, identified thirteen important AM applications in Industry 4.0. The main limitation of the AM manufactured part is of comparable low strength & associated quality, coupled with a high cost of the printing machine system.. In this upcoming industrial revolution, AM is a crucial technology which has become the main components of product innovation & development. This disruptive technology can fulfil different challenges in the future manufacturing system and help the industry to produce innovative products. For this futuristic manufacturing system, additive manufacturing is an upcoming paradigm, and Industry 4.0 will use its potential to achieve required goals.
Article
The emergence of novel and powerful digital technologies, digital platforms and digital infrastructures has transformed innovation and entrepreneurship in significant ways. Beyond simply opening new opportunities for innovators and entrepreneurs, digital technologies have broader implications for value creation and value capture. Research aimed at understanding the digital transformation of the economy needs to incorporate multiple and cross-levels of analysis, embrace ideas and concepts from multiple fields/disciplines, and explicitly acknowledge the role of digital technologies in transforming organizations and social relationships. To help realize this research agenda, we identify three key themes related to digitization—openness, affordances, and generativity—and, outline broad research issues relating to each. We suggest that such themes that are innate to digital technologies could serve as a common conceptual platform that allows for connections between issues at different levels as well as the integration of ideas from different disciplines/areas. We then summarize the contributions of the 11 papers presented in this Special Issue relating them to one or more of these themes and outlining their implications for future research.
Article
Extant literature has increased our understanding of specific aspects of digital transformation, however we lack a comprehensive portrait of its nature and implications. Through a review of 282 works, we inductively build a framework of digital transformation articulated across eight building blocks. Our framework foregrounds digital transformation as a process where digital technologies create disruptions triggering strategic responses from organizations that seek to alter their value creation paths while managing the structural changes and organizational barriers that affect the positive and negative outcomes of this process. Building on this framework, we elaborate a research agenda that proposes [1] examining the role of dynamic capabilities, and [2] accounting for ethical issues as important avenues for future strategic IS research on digital transformation.
Book
Developing the core system science needed to enable the development of a complex industrial internet of things/manufacturing CPS (IIoT/M-CPS), this book will foster a research community committed to advancing research and education in IIoT/M-CPS and to transitioning applicable science and technology into engineering practice. Presenting the current state IIoT and the concept of cybermanufacturing, this book is at the nexus of research advances from the engineering and computer and information science domains. It features contributions from leading experts in the field with years of experience in advancing manufacturing. Readers will acquire the core system science needed to transform to cybermanufacturing that spans the full spectrum from ideation to physical realization.
Article
This important and timely text/reference presents a detailed review of high-performance computing infrastructures for next-generation big data and fast data analytics. Comprehensively covering a diverse range of computer systems and proven techniques for high-performance big-data analytics, the book also presents case studies, practical guidelines, and best practices for enabling decision-making toward implementing the appropriate computer systems and approaches. Topics and features: • Includes case studies and learning activities throughout the book, and self-study exercises at the end of every chapter • Presents detailed case studies on social media analytics for intelligent businesses, and on big data analytics in the healthcare sector • Describes the network infrastructure requirements for effective transfer of big data, and the storage infrastructure requirements of applications which generate big data • Examines real-time analytics solutions, such as machine data analytics and operational analytics • Introduces in-database processing and in-memory analytics techniques for data mining • Discusses the use of mainframes for handling real-time big data, and the latest types of data management systems for big and fast data analytics • Provides information on the use of cluster, grid and cloud computing systems for big data analytics and data-intensive processing • Reviews the peer-to-peer techniques and tools, and the common information visualization techniques, used in big data analytics Software engineers, cloud professionals and big data scientists will find this book to be an informative and inspiring read, highlighting the indispensable role data analytics will play in shaping a smart future.
Chapter
Augmented Reality (AR) has increased its popularity in both industry and academia since its introduction two decades ago. The AR has carried the way of accessing and manipulating the information to another level by enhancing perception of the real world with virtual information. In this chapter, the basic technical components of AR are introduced as well as its practical uses in the industry especially in manufacturing, maintenance, assembly, training and collaborative operations. After describing the underlying hardware and software systems establishing AR, recent applications of AR in the industry are reviewed.
Chapter
Industrial Revolution emerged many improvements in manufacturing and service systems. Because of remarkable and rapid changes appeared in manufacturing and information technology, synergy aroused from the integration of the advancements in information technology, services and manufacturing were realized. These advancements conduced to the increasing productivity both in service systems and manufacturing environment. In recent years, manufacturing companies and service systems have been faced substantial challenges due to the necessity in the coordination and connection of disruptive concepts such as communication and networking (Industrial Internet), embedded systems (Cyber Physical Systems), adaptive robotics, cyber security, data analytics and artificial intelligence, and additive manufacturing. These advancements caused the extension of the developments in manufacturing and information technology, and these coordinated and communicative technologies are constituted to the term, Industry 4.0 which was first announced from German government as one of the key initiatives and highlights a new industrial revolution. As a result, Industry 4.0 indicates more productive systems; companies have been searching the right adaptation of this term. On the other hand, the achievement criteria and performance measurements of the transformation to Industry 4.0 are still uncertain. Additionally, a structured and systematic implementation roadmap is still not clear. Thus, in this study, the fundamental relevance between design principles and technologies is given and conceptual framework for Industry 4.0 is proposed concerning fundamentals of smart products and smart processes development.
Chapter
Additive Manufacturing (AM) Technologies is has become widely popular manufacturing technique in the last 30 years. Additive manufacturing uses 3D Computer Aided Design (CAD) model to manufacture parts layer by layer through adding materials. Additive Manufacturing allows to manufacture complex geometries that cannot be manufactured using conventional manufacturing techniques. Additive manufacturing permits customized designs and prototypes to be produced easily. Over the past three decades thorough research has been done to commercialize AM techniques in varied areas. As a result of these research, AM techniques are being used in automotive, aerospace, biomedical, medicine, energy and in many other areas. Due to its advantage over the traditional manufacturing techniques, additive manufacturing is seen as one of the enablers that started fourth industrial revolution. In this chapter, we will review additive manufacturing processes by introducing its history, presenting different technologies of AM, giving examples of AM usage in different application areas and its impact on our society.
Book
This book examines the Internet of Things (IoT) and Data Analytics from a technical, application, and business point of view. Internet of Things and Data Analytics Handbook describes essential technical knowledge, building blocks, processes, design principles, implementation, and marketing for IoT projects. It provides readers with knowledge in planning, designing, and implementing IoT projects. The book is written by experts on the subject matter, including international experts from nine countries in the consumer and enterprise fields of IoT. The text starts with an overview and anatomy of IoT, ecosystem of IoT, communication protocols, networking, and available hardware, both present and future applications and transformations, and business models. The text also addresses big data analytics, machine learning, cloud computing, and consideration of sustainability that are essential to be both socially responsible and successful. Design and implementation processes are illustrated with best practices and case studies in action. In addition, the book: Examines cloud computing, data analytics, and sustainability and how they relate to IoT. overs the scope of consumer, government, and enterprise applications. Includes best practices, business model, and real-world case studies.
Book
Vorteile: - Einführung in das führende Softwareprogramm zur Schätzung von PLS-basierten Strukturgleichungsmodellen - Mit zahlreichen Grafiken, Tabellen und Illustrationen Zum Werk: Die Partial Least Squares Strukturgleichungsmodellierung (PLS-SEM) hat sich in der wirtschafts- und sozialwissenschaftlichen Forschung als geeignetes Verfahren zur Schätzung von Kausalmodellen behauptet. Dank der Anwenderfreundlichkeit des Verfahrens und der vorhandenen Software ist es inzwischen auch in der Praxis etabliert. Dieses Buch liefert eine anwendungsorientierte Einführung in die PLS-SEM. Der Fokus liegt auf den Grundlagen des Verfahrens und deren praktischer Umsetzung mit Hilfe der SmartPLS-Software. Das Konzept des Buches setzt dabei auf einfache Erläuterungen statistischer Ansätze und die anschauliche Darstellung zahlreicher Anwendungsbeispiele anhand einer einheitlichen Fallstudie. Viele Grafiken, Tabellen und Illustrationen erleichtern das Verständnis der PLS-SEM. Zudem werden dem Leser herunterladbare Datensätze, Aufgaben und weitere Fachartikel zur Vertiefung angeboten. Damit eignet sich das Buch hervorragend für Studierende, Forscher und Praktiker, die die PLS-SEM zur Gewinnung von Ergebnissen mit den eigenen Daten und Modellen nutzen möchten. SmartPLS ist das führende Softwareprogramm zur Schätzung von PLS-basierten Strukturgleichungsmodellen. Die Erläuterungen und die im Buch vorgeschlagenen Vorgehensweisen spiegeln den aktuellen Stand der Forschung wider. Zielgruppe: Lehrende und Studierende der Wirtschafts- und Sozialwissenschaften, Praktiker.
Book
This comprehensive guide/reference presents an in-depth review of the state of the art of cyber-physical systems (CPS) and their applications. The text describes the CPS approach in detail, highlighting where the multitude of CPS activities fit within the overall effort, and proposes an ideal framework for understanding the complexity of cyber-physical systems. Relevant case studies are also provided, to help the reader to master the interdisciplinary material. No prior background knowledge is required, other than some familiarity with basic calculus-based probability and statistics, and some experience with systems and software engineering. Topics and features: • Includes self-test exercises in each chapter, together with an extensive glossary at the end of the book • Offers a variety of teaching support materials at an associated website, including a comprehensive set of slides and lecture videos • Presents a brief overview of the study of systems, and embedded computing systems, before defining CPS • Introduces the concepts of the Internet of Things, and ubiquitous (or pervasive) computing • Reviews the design challenges of CPS, and their impact on systems and software engineering • Describes the ideas behind Industry 4.0 and the revolutions in digital manufacturing, including smart and agile manufacturing, as well as cybersecurity in manufacturing • Considers the social impact of the changes in skills required by the globalized, digital work environment of the future • With a foreword by Prof. Dr. K. B. Akhilesh of the Indian Institute of Science, Bangalore, India Ideally suitable as a textbook for college courses on CPS, this Guide to Computing Fundamentals in Cyber-Physical Systems may also be used as a self-study aid, or as a reference for practitioners and researchers involved in CPS and digital manufacturing/Industry 4.0. Prof. Dr.-Ing. Dietmar P.F. Möller is a Professor in the Institute of Applied Stochastics and Operations Research at Clausthal University of Technology (TUC), Germany, a Member of the Simulation Science Center Clausthal-Göttingen, Germany, and an Adjunct Professor in the Department of Electrical and Computer Engineering at the University of Nebraska-Lincoln (UNL), USA. His other publications include the Springer title Introduction to Transportation Analysis, Modeling and Simulation.
Article
The proliferation of Internet of Things and the success of rich cloud services have pushed the horizon of a new computing paradigm, Edge computing, which calls for processing the data at the edge of the network. Edge computing has the potential to address the concerns of response time requirement, battery life constraint, bandwidth cost saving, as well as data safety and privacy. In this paper, we introduce the definition of Edge computing, followed by several case studies, ranging from cloud offloading to smart home and city, as well as collaborative Edge to materialize the concept of Edge computing. Finally, we present several challenges and opportunities in the field of Edge computing, and hope this paper will gain attention from the community and inspire more research in this direction.
Article
The success of the Internet of Things and rich cloud services have helped create the need for edge computing, in which data processing occurs in part at the network edge, rather than completely in the cloud. Edge computing could address concerns such as latency, mobile devices' limited battery life, bandwidth costs, security, and privacy.
Article
The proliferation of cyber-physical systems introduces the fourth stage of industrialization, commonly known as Industry 4.0. The vertical integration of factory to implement flexible and reconfigurable manufacturing systems, i.e., smart factory, is one of the key features of Industry 4.0. In this paper, we present a smart factory framework that incorporates industrial network, cloud, and supervisory control terminals with smart shop-floor objects such as machines, conveyers, and products. Then, we give a classification of the smart objects into various types of agents and define a coordinator on cloud. The autonomous decision and distributed cooperation between agents lead the process achieving high flexibility. Moreover, this kind of self-organized system leverages on the feedback and coordination by the central coordinator in order to achieve high efficiency. Thus, the smart factory is characterized by the self-organized multi-agent system assisted with big data based feedback and coordination. Based on this model, we propose an intelligent negotiation mechanism for agents to cooperate with each other. Furthermore, the study illustrates that complementary strategies can be designed to prevent the deadlocks by improving the agents’ decision and the coordinator's behavior. The simulation results assess the effectiveness of the proposed negotiation mechanism and deadlock prevention strategies.
Book
This book presents and discusses the main strategic and organizational challenges posed by Big Data and analytics in a manner relevant to both practitioners and scholars. The first part of the book analyzes strategic issues relating to the growing relevance of Big Data and analytics for competitive advantage, which is also attributable to empowerment of activities such as consumer profiling, market segmentation, and development of new products or services. Detailed consideration is also given to the strategic impact of Big Data and analytics on innovation in domains such as government and education and to Big Data-driven business models. The second part of the book addresses the impact of Big Data and analytics on management and organizations, focusing on challenges for governance, evaluation, and change management, while the concluding part reviews real examples of Big Data and analytics innovation at the global level. The text is supported by informative illustrations and case studies, so that practitioners can use the book as a toolbox to improve understanding and exploit business opportunities related to Big Data and analytics.
Article
Network function virtualization was recently proposed to improve the flexibility of network service provisioning and reduce the time to market of new services. By leveraging virtualization technologies and commercial off-the-shelf programmable hardware, such as general-purpose servers, storage, and switches, NFV decouples the software implementation of network functions from the underlying hardware. As an emerging technology, NFV brings several challenges to network operators, such as the guarantee of network performance for virtual appliances, their dynamic instantiation and migration, and their efficient placement. In this article, we provide a brief overview of NFV, explain its requirements and architectural framework, present several use cases, and discuss the challenges and future directions in this burgeoning research area.
Article
Eco-effectiveness and cradle-to-cradle design present an alternative design and production concept to the strategies of zero emission and eco-efficiency. Where eco-efficiency and zero emission seek to reduce the unintended negative consequences of processes of production and consumption, eco-effectiveness is a positive agenda for the conception and production of goods and services that incorporate social, economic, and environmental benefit, enabling triple top line growth.Eco-effectiveness moves beyond zero emission approaches by focusing on the development of products and industrial systems that maintain or enhance the quality and productivity of materials through subsequent life cycles. The concept of eco-effectiveness also addresses the major shortcomings of eco-efficiency approaches: their inability to address the necessity for fundamental redesign of material flows, their inherent antagonism towards long-term economic growth and innovation, and their insufficiency in addressing toxicity issues.A central component of the eco-effectiveness concept, cradle-to-cradle design provides a practical design framework for creating products and industrial systems in a positive relationship with ecological health and abundance, and long-term economic growth. Against this background, the transition to eco-effective industrial systems is a five-step process beginning with an elimination of undesirable substances and ultimately calling for a reinvention of products by reconsidering how they may optimally fulfill the need or needs for which they are actually intended while simultaneously being supportive of ecological and social systems.This process necessitates the creation of an eco-effective system of “nutrient” management to coordinate the material flows amongst actors in the product system. The concept of intelligent materials pooling illustrates how such a system might take shape, in reality.
In: From Digital Transformation to Digital Corporate Managemen (Iín German). In: Digital Transformation and Corporate Management
  • J Schellinger
  • K O Tokarski
  • I Kissling-Näf