Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

High-probability and wild-card scenarios for future crimes and terror attacks using the Internet of Things

High-probability and wild-card scenarios for future crimes and terror attacks using the Internet... <jats:sec> <jats:title content-type="abstract-subheading">Purpose</jats:title> <jats:p>The purpose of this paper is to provide a framework to thinking and creating scenarios about future crimes and terror attacks relying on the Internet of Things (IoT), and to present a crowdsourcing research based on this thinking, which resulted in both high- and low-probability scenarios with dramatic impact.</jats:p> </jats:sec> <jats:sec> <jats:title content-type="abstract-subheading">Design/methodology/approach</jats:title> <jats:p>The research relies on general morphological analysis for deconstructing wicked problems into core components, and on crowdsourcing 50 experts on Wikistrat’s commercial platform, allowing them to suggest core components, rank them by importance and develop scenarios together. This methodology allowed a wider view than usual, and allowed the experts to examine unorthodox combination of components, leading to the creation of wild-card scenarios.</jats:p> </jats:sec> <jats:sec> <jats:title content-type="abstract-subheading">Findings</jats:title> <jats:p>Analysis of both the core components and the resulting scenarios indicates that the IoT is set to have a dramatic role in crime and terror attacks in the near future. High-impact high-probability scenarios include attacks on power plants, cyber wallets and personal assistants. High-impact low-probability scenarios include terrorist attacks by environmentalist groups, accidental attacks conducted by immature pranksters and having a computer worm propagating in a low-security but critical facility like a hospital.</jats:p> </jats:sec> <jats:sec> <jats:title content-type="abstract-subheading">Originality/value</jats:title> <jats:p>This paper brings a standardized method which can be used to examine complex events like crime and terror attacks using a disruptive and emerging technology. The results can be used by practitioners to further study the issue and develop many other scenarios more tailored to their needs. The scenarios presented in this paper can also be of value to security bodies who wish to be better prepared for the future.</jats:p> </jats:sec> http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png foresight CrossRef

High-probability and wild-card scenarios for future crimes and terror attacks using the Internet of Things

foresight , Volume 19 (1): 1-14 – Mar 13, 2017

High-probability and wild-card scenarios for future crimes and terror attacks using the Internet of Things


Abstract

<jats:sec>
<jats:title content-type="abstract-subheading">Purpose</jats:title>
<jats:p>The purpose of this paper is to provide a framework to thinking and creating scenarios about future crimes and terror attacks relying on the Internet of Things (IoT), and to present a crowdsourcing research based on this thinking, which resulted in both high- and low-probability scenarios with dramatic impact.</jats:p>
</jats:sec>
<jats:sec>
<jats:title content-type="abstract-subheading">Design/methodology/approach</jats:title>
<jats:p>The research relies on general morphological analysis for deconstructing wicked problems into core components, and on crowdsourcing 50 experts on Wikistrat’s commercial platform, allowing them to suggest core components, rank them by importance and develop scenarios together. This methodology allowed a wider view than usual, and allowed the experts to examine unorthodox combination of components, leading to the creation of wild-card scenarios.</jats:p>
</jats:sec>
<jats:sec>
<jats:title content-type="abstract-subheading">Findings</jats:title>
<jats:p>Analysis of both the core components and the resulting scenarios indicates that the IoT is set to have a dramatic role in crime and terror attacks in the near future. High-impact high-probability scenarios include attacks on power plants, cyber wallets and personal assistants. High-impact low-probability scenarios include terrorist attacks by environmentalist groups, accidental attacks conducted by immature pranksters and having a computer worm propagating in a low-security but critical facility like a hospital.</jats:p>
</jats:sec>
<jats:sec>
<jats:title content-type="abstract-subheading">Originality/value</jats:title>
<jats:p>This paper brings a standardized method which can be used to examine complex events like crime and terror attacks using a disruptive and emerging technology. The results can be used by practitioners to further study the issue and develop many other scenarios more tailored to their needs. The scenarios presented in this paper can also be of value to security bodies who wish to be better prepared for the future.</jats:p>
</jats:sec>

Loading next page...
 
/lp/crossref/high-probability-and-wild-card-scenarios-for-future-crimes-and-terror-G0IgsQcr40

References (36)

Publisher
CrossRef
ISSN
1463-6689
DOI
10.1108/fs-11-2016-0056
Publisher site
See Article on Publisher Site

Abstract

<jats:sec> <jats:title content-type="abstract-subheading">Purpose</jats:title> <jats:p>The purpose of this paper is to provide a framework to thinking and creating scenarios about future crimes and terror attacks relying on the Internet of Things (IoT), and to present a crowdsourcing research based on this thinking, which resulted in both high- and low-probability scenarios with dramatic impact.</jats:p> </jats:sec> <jats:sec> <jats:title content-type="abstract-subheading">Design/methodology/approach</jats:title> <jats:p>The research relies on general morphological analysis for deconstructing wicked problems into core components, and on crowdsourcing 50 experts on Wikistrat’s commercial platform, allowing them to suggest core components, rank them by importance and develop scenarios together. This methodology allowed a wider view than usual, and allowed the experts to examine unorthodox combination of components, leading to the creation of wild-card scenarios.</jats:p> </jats:sec> <jats:sec> <jats:title content-type="abstract-subheading">Findings</jats:title> <jats:p>Analysis of both the core components and the resulting scenarios indicates that the IoT is set to have a dramatic role in crime and terror attacks in the near future. High-impact high-probability scenarios include attacks on power plants, cyber wallets and personal assistants. High-impact low-probability scenarios include terrorist attacks by environmentalist groups, accidental attacks conducted by immature pranksters and having a computer worm propagating in a low-security but critical facility like a hospital.</jats:p> </jats:sec> <jats:sec> <jats:title content-type="abstract-subheading">Originality/value</jats:title> <jats:p>This paper brings a standardized method which can be used to examine complex events like crime and terror attacks using a disruptive and emerging technology. The results can be used by practitioners to further study the issue and develop many other scenarios more tailored to their needs. The scenarios presented in this paper can also be of value to security bodies who wish to be better prepared for the future.</jats:p> </jats:sec>

Journal

foresightCrossRef

Published: Mar 13, 2017

There are no references for this article.