High-probability and wild-card scenarios for future crimes and terror attacks using the Internet of Things
@article{Tzezana2017HighprobabilityAW, title={High-probability and wild-card scenarios for future crimes and terror attacks using the Internet of Things}, author={Roey Tzezana}, journal={Foresight}, year={2017}, volume={19}, pages={1-14} }
Purpose
The purpose of this paper is to provide a framework to thinking and creating scenarios about future crimes and terror attacks relying on the Internet of Things (IoT), and to present a crowdsourcing research based on this thinking, which resulted in both high- and low-probability scenarios with dramatic impact.
Design/methodology/approach
The research relies on general morphological analysis for deconstructing wicked problems into core components, and on…
12 Citations
Foresight of cyber security threat drivers and affecting technologies
- Computer Scienceforesight
- 2018
A relatively balanced long-term foresight study to elicit major significant threat drivers and to identify emerging technologies that are likely to have a significant impact on defense and attack capabilities in cyber security.
A systematic review of crime facilitated by the consumer Internet of Things
- LawSecurity Journal
- 2019
The nature of crime is changing—estimates suggest that at least half of all crime is now committed online. Once everyday objects (e.g. televisions, baby monitors, door locks) that are now internet…
The contribution of foresight to improve long-term security planning
- Business
- 2018
Purpose
Despite the common focus on studying future events, the study of risk management and foresight have developed as two segmented scientific fields. This study aims to investigate…
Integration of Internet of Things (IoT) and Blockchain to increase humanitarian aid supply chains performance
- Business2019 5th International Conference on Transportation Information and Safety (ICTIS)
- 2019
Global humanitarianism is largely based on the correct management of the humanitarian aid chain. Agility is a concept taken from supply chain management in manufacturing that has been recently…
A Model for Understanding the Mediating Association of Transparency between Emerging Technologies and Humanitarian Logistics Sustainability
- BusinessSustainability
- 2022
There has been considerable worldwide attention to the Internet of Things (IoT), blockchain technology (BCT), and artificial intelligence (AI) in all sectors of the economy. Despite still being in…
Older Adults and the Authenticity of Emails: Grammar, Syntax, and Compositional Indicators of Social Engineering in Ransomware and Phishing Attacks.
- Computer Science2018 Fourteenth International Conference on Information Processing (ICINPRO)
- 2018
The paper outlines a grammar and syntax-derived framework to assist older users in the ability and awareness to recognize fraudulent emails.
Integration of Internet-of-Things With Blockchain Technology to Enhance Humanitarian Logistics Performance
- BusinessIEEE Access
- 2021
This study proves that transparency plays a crucial role in enhancing public trust, coordination, and ultimately HL performance through the integration of IoT with BCT.
IdeaChain: a conceptual proposal for blockchain-based STI policy development
- Computer Science
- 2020
The policy development theories and the logic of blockchain are synthesized to prepare a task model for the “IdeaChain” concept, the first attempt to explore the potentials of blockchain in STI policymaking.
The Role of Wild Cards Analysis in Foresight Studies: The Case of Russia
- Business
- 2018
The wild cards conception as an element of foresight studies has been widely discussed by numerous scholars who have interest and qualification in strategic management field or STI policies from the…
Cyberterrorism in the Cloud
- Political ScienceSecurity, Privacy, and Digital Forensics in the Cloud
- 2019
References
SHOWING 1-10 OF 36 REFERENCES
Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
- Art
- 2015
An Amazon Best Book of the Month for March 2015: It wont surprise many people to read that computers, networks, and personal information are under constant attack. Most of us install a commonly…
Morphological Analysis
- LinguisticsCOLING
- 1973
A computer program that is intended to carry out nontrivial operations on texts in an ordinary language must start by recognizing the words that the text is made up of, and there must be a list what the authors call a dictionary to define the mapping of words into linguistically interesting properties and a process to look words up in this dictionary.
General Morphological Analysis * A general method for non-quantified modelling
- Materials Science
- 2014
The fundamentals of the morphological approach are outlined and an application in policy analysis is described.
The Innovator's Dilemma: The Revolutionary Book That Will Change the Way You Do Business
- Sociology
- 2011
Security Analysis of Emerging Smart Home Applications
- Computer Science2016 IEEE Symposium on Security and Privacy (SP)
- 2016
This paper analyzed Samsung-owned SmartThings, which has the largest number of apps among currently available smart home platforms, and supports a broad range of devices including motion sensors, fire alarms, and door locks, and discovered two intrinsic design flaws that lead to significant overprivilege in SmartApps.
Miss teen USA was ‘in tears and shock’ after a hacker took nude photos through her bedroom webcam
- 2014
IoT to cover 100 billion connected devices by 2025
- www. datamation.com/data-center/iot-to-cover-100-billion-connected-devices-by-2025.html (accessed
- 2016
The Morphological Method of Analysis and Construction, California Institute
- 1948