High-probability and wild-card scenarios for future crimes and terror attacks using the Internet of Things

  title={High-probability and wild-card scenarios for future crimes and terror attacks using the Internet of Things},
  author={Roey Tzezana},
Purpose The purpose of this paper is to provide a framework to thinking and creating scenarios about future crimes and terror attacks relying on the Internet of Things (IoT), and to present a crowdsourcing research based on this thinking, which resulted in both high- and low-probability scenarios with dramatic impact. Design/methodology/approach The research relies on general morphological analysis for deconstructing wicked problems into core components, and on… 

Tables from this paper

Foresight of cyber security threat drivers and affecting technologies
A relatively balanced long-term foresight study to elicit major significant threat drivers and to identify emerging technologies that are likely to have a significant impact on defense and attack capabilities in cyber security.
A systematic review of crime facilitated by the consumer Internet of Things
The nature of crime is changing—estimates suggest that at least half of all crime is now committed online. Once everyday objects (e.g. televisions, baby monitors, door locks) that are now internet
The contribution of foresight to improve long-term security planning
Purpose Despite the common focus on studying future events, the study of risk management and foresight have developed as two segmented scientific fields. This study aims to investigate
Integration of Internet of Things (IoT) and Blockchain to increase humanitarian aid supply chains performance
Global humanitarianism is largely based on the correct management of the humanitarian aid chain. Agility is a concept taken from supply chain management in manufacturing that has been recently
A Model for Understanding the Mediating Association of Transparency between Emerging Technologies and Humanitarian Logistics Sustainability
There has been considerable worldwide attention to the Internet of Things (IoT), blockchain technology (BCT), and artificial intelligence (AI) in all sectors of the economy. Despite still being in
Older Adults and the Authenticity of Emails: Grammar, Syntax, and Compositional Indicators of Social Engineering in Ransomware and Phishing Attacks.
The paper outlines a grammar and syntax-derived framework to assist older users in the ability and awareness to recognize fraudulent emails.
Integration of Internet-of-Things With Blockchain Technology to Enhance Humanitarian Logistics Performance
This study proves that transparency plays a crucial role in enhancing public trust, coordination, and ultimately HL performance through the integration of IoT with BCT.
IdeaChain: a conceptual proposal for blockchain-based STI policy development
The policy development theories and the logic of blockchain are synthesized to prepare a task model for the “IdeaChain” concept, the first attempt to explore the potentials of blockchain in STI policymaking.
The Role of Wild Cards Analysis in Foresight Studies: The Case of Russia
The wild cards conception as an element of foresight studies has been widely discussed by numerous scholars who have interest and qualification in strategic management field or STI policies from the
Cyberterrorism in the Cloud


Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
An Amazon Best Book of the Month for March 2015: It wont surprise many people to read that computers, networks, and personal information are under constant attack. Most of us install a commonly
Morphological Analysis
A computer program that is intended to carry out nontrivial operations on texts in an ordinary language must start by recognizing the words that the text is made up of, and there must be a list what the authors call a dictionary to define the mapping of words into linguistically interesting properties and a process to look words up in this dictionary.
General Morphological Analysis * A general method for non-quantified modelling
The fundamentals of the morphological approach are outlined and an application in policy analysis is described.
Wicked Problems – Social Messes
Security Analysis of Emerging Smart Home Applications
This paper analyzed Samsung-owned SmartThings, which has the largest number of apps among currently available smart home platforms, and supports a broad range of devices including motion sensors, fire alarms, and door locks, and discovered two intrinsic design flaws that lead to significant overprivilege in SmartApps.
Miss teen USA was ‘in tears and shock’ after a hacker took nude photos through her bedroom webcam
  • 2014
IoT to cover 100 billion connected devices by 2025
  • www. datamation.com/data-center/iot-to-cover-100-billion-connected-devices-by-2025.html (accessed
  • 2016
The Morphological Method of Analysis and Construction, California Institute
  • 1948