TOWARD VALUE CREATION BY DEVELOPING CYBER-INFRASTRUCTURES
نویسندگان
چکیده
منابع مشابه
Toward a Service (Eco)Systems Perspective on Value Creation
This article discusses how the core concepts of service-dominant logic—service-for-service exchange, value co-creation, value propositions, resource integration, and highly collaborative relationships—point to a generic actor conceptualization in which all actors engaged in exchange (e.g., firms, customers, etc.) are viewed as service providing, value-creating enterprises. In other words, all s...
متن کاملGraph-theoretic characterization of cyber-threat infrastructures
In this paper, we investigate cyber-threats and the underlying infrastructures. More precisely, we detect and analyze cyber-threat infrastructures for the purpose of unveiling key players (owners, domains, IPs, organizations, malware families, etc.) and the relationships between these players. To this end, we propose metrics to measure the badness of different infrastructure elements using grap...
متن کاملA Vision for Open Cyber-Scholarly Infrastructures
The characteristics of modern science, i.e., data-intensive, multidisciplinary, open, and heavily dependent on Internet technologies, entail the creation of a linked scholarly record that is online and open. Instrumental in making this vision happen is the development of the next generation of Open Cyber-Scholarly Infrastructures (OCIs), i.e., enablers of an open, evolvable, and extensible scho...
متن کاملAnomaly Detection in Electricity Cyber Infrastructures
This paper presents a novel anomaly detection methodology for the protection of electricity critical infrastructures that learns the normal behaviour of the system, builds up a profile and detects anomalous operations which deviate from the profile. This can be used to identify attacks, failures and accidents and it can also be used to improve state estimation, correct topology errors and infor...
متن کاملVisualizing Cascading Failures in Critical Cyber Infrastructures
This paper explores the relationship between physical and cyber infrastructures, focusing on how threats and disruptions in physical infrastructures can cascade into failures in the cyber infrastructure. It also examines the challenges involved in organizing and managing massive amounts of critical infrastructure data that are geographically and logically disparate. To address these challenges,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Doboku Gakkai Ronbunshu
سال: 2005
ISSN: 0289-7806,1882-7187
DOI: 10.2208/jscej.2005.805_1