Refine
Document Type
- Conference Proceeding (11)
- Part of a Book (1)
- Contribution to a Periodical (1)
- Internet Paper (1)
- Working Paper (1)
Is part of the Bibliography
- no (15)
Keywords
- Cyber Security (2)
- Cyber-Security (1)
- Digital Transformation (1)
- Digitalization (1)
- Energieflexibilitäten (1)
- Energiemanagement (2)
- Energy Management (1)
- FlAixEnergy (1)
- Geschäftsmodelle (1)
- IT-Security (1)
Institute
The number of cyber-attacks on small and medium enterprises (SMEs) is constantly increasing. SMEs do not recognize the attacks until the damage has occurred. Only then, they fight with measures to increase IT-security and IT-safety. Many studies come to the point that this refers to a lack of budget, expertise and awareness of the need for IT-security. There are many compendia with recommendations for action, but they are too comprehensive and unspecific to the individual needs of SMEs. In this paper, we present the results of a research activity on the gaps that address the challenges faced by SMEs. In addition, we develop a concept for a serious gaming approach that includes an economic perspective on IT-security measures and shows how SMEs can derive their own IT-seurity target state
Industry 4.0 is driven by Cyber-Physical Systems and Smart Products. Smart Products provide a value to both its users and its manufacturers in terms of a closer connection to the customer and his data as well as the provided smart services. However, many companies, especially SMEs, struggle with the transformation of their existing product portfolio into smart products. In order to facilitate this process, this paper presents a set of smart product use-cases from a manufacturer’s perspective. These use-cases can guide the definition of a smart product and be used during its architecture development and realization. Initially the paper gives an introduction in the field of smart products. After that the research results, based on case-study research, are presented. This includes the methodological approach, the case-study data collection and analysis. Finally, a set of use-cases, their definitions and components are presented and highlighted from the perspective of a smart product manufacturer.
In the age of digitalization, manufacturing companies are under increased pressure to change due to product complexity, growing customer requirements and digital business models. The increasing digitization of processes and products is opening up numerous opportunities for mechanical engineering companies to exploit the resulting potential for value creation. Subscription business is a new form of business model in the mechanical engineering industry, which aims to continuously increase customer benefit to align the interests of both companies and customers. Characterized by a permanent data exchange, databased learning about customer behavior, and the transfer into continuous innovations to increase customer value, subscription business helps to make Industry 4.0 profitable. The fact that machines and plants are connected to the internet and exchange large amounts of data results in critical information security risks. In addition, the loss of knowledge and control, data misuse and espionage, as well as the manipulation of transaction or production data in the context of subscription transactions are particularly high risks. Complementary to direct and obvious consequences such as loss of production, the attacks are increasingly shifting to non-transparent and creeping impairments of production or product quality, which are only apparent at a late stage, or the influencing of payment flows. A transparent presentation of possible risks and their scope, as well as their interrelationships, does not exist. This paper shows a research approach in which the structure of subscription models and their different manifestations based on their risks and vulnerabilities are characterized. This allows suitable cyber security measures to be taken at an early stage. From this basis, companies can secure existing or planned subscription business models and thus strengthen the trust of business partners and customers.
The digital transformation is changing the way companies think and design their manufacturing environment. Both due to the increasing number of connections between IoT-Devices, tooling machines, and production lines and the phenomenon of the convergence of IT and OT, systems are becoming more complex than years ago. Organizational and cultural changes within manufacturing companies strengthen this trend and form Industry 4.0 environments and cyber-physical production systems (CPPS). As these systems do not longer stay alone but are connected to each other and the company’s outside, the size of the potential attack surface is increasing as well. Besides that, manufacturing companies, small and medium-sized in particular, are facing complex challenges based on lack of knowledge, budget, and time to understand as well as to interpret their current situation and risk level and therefore to derive necessary counter-measures. Efficient as well as pragmatic tools and methods for these companies do not exist. This paper shows a research approach in which the company-specific set-up of Industry 4.0 environment and CPPS is characterized by its potential vulnerabilities. This enables companies to evaluate their risk potential before setting up this kind of environments and to undJo,erstand the potential consequences more precisely. By doing so, companies can derive and prioritize important counter-measures and so to strengthen their level of cyber-security efficiently. This will decrease the number of cyber-security attacks and increase the company’s competitiveness.
Feasibility Analysis of Entity Recognition as a Means to Create an Autonomous Technology Radar
(2021)
Mit den neuesten Technologietrends auf dem Laufenden zu bleiben, ist für Fertigungsunternehmen eine entscheidende Aufgabe, um auf einem global wettbewerbsfähigen Markt erfolgreich zu bleiben. Die Erstellung eines Technologieradars ist ein etablierter, jedoch meist manueller Prozess zur Visualisierung der neuesten Technologietrends.
Der Herausforderung, Technologien zu identifizieren und zu visualisieren, widmet sich das Projekt TechRad, das maschinelles Lernen einsetzt, um ein autonomes Technologie-Scouting-Radar zu realisieren. Eine der Kernfunktionen ist die Identifizierung von Technologien in Textdokumenten. Dies wird durch natürliche Sprachverarbeitung (NLP) realisiert.
Dieser Beitrag fasst die Herausforderungen und möglichen Lösungen für den Einsatz von Entity Recognition zur Identifikation relevanter Technologien in Textdokumenten zusammen. Die Autoren stellen eine frühe Phase der Implementierung des Entity Recognition Modells vor. Dies beinhaltet die Auswahl von Transfer Learning als geeignete Methode, die Erstellung eines Datensatzes, der aus verschiedenen Datenquellen besteht, sowie den angewandten Modell-Trainings-Prozess. Abschließend wird die Leistungsfähigkeit der gewählten Methode in einer Reihe von Tests überprüft und bewertet.