The fourth industrial revolution glossarium: over 1500 of the hottest terms you will use to create the future. Alexander Chesalov. Читать онлайн. Newlib. NEWLIB.NET

Автор: Alexander Chesalov
Издательство: Издательские решения
Серия:
Жанр произведения:
Год издания: 0
isbn: 9785005986269
Скачать книгу
can also give customer-facing staff members detailed information on customers’ personal information, purchase history, buying preferences and concerns303.

      Cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices. An attacker is a person or process that attempts to access data, functions, or other restricted areas of the system without authorization, potentially with malicious intent. Depending on the context, cyberattacks can be part of cyber warfare or cyberterrorism. A cyberattack can be employed by sovereign states, individuals, groups, society, or organizations, and it may originate from an anonymous source304.

      Cybercrime also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government305.

      Cyber-Physical Production Systems (CPPS) it is when physical and digital items are connected, monitored and managed with computer programming and algorithms306.

      Cyber-physical systems are intelligent networked systems with built-in sensors, processors and drives that are designed to interact with the physical environment and support the operation of computer information systems in real time; cloud computing is an information technology model for providing ubiquitous and convenient access using the information and telecommunications network «Internet» to a common set of configurable computing resources («cloud»), data storage devices, applications and services that can be promptly provided and relieved from the load with minimal operating costs or almost without the participation of the provider.

      Cyber-resilience this is a «new» term, and only used in specific contexts of modern business challenges. Check it out the World Economic Forum definition: At its simplest, being cyber-resilient means taking measures to prevent and protect against the criminal or unauthorized use of electronic data. As digital transformation gathers pace, Cyber-resilience will move up the world’s agenda. The number of data breaches is increasing, as is the severity of the attacks. Based on the Gemalto Breach Level Index, the first half of 2018 saw 945 data breaches affecting 4.5 billion records, a 133% increase over the same period last year. More than 90% of events involved unencrypted data and 65% identity theft. A significant number of breaches involved government records. The Forum recently published the 2018 Global Risk report, showing the increasing risks to cybersecurity over the past decade. More pointedly a respondent pool of 12,500 companies covering the three largest regions of North America, Europe and EAPAC named digital Cyber-resilience as the biggest global risk. Business, government and citizens all stand to lose if we cannot create a safe digital environment to capture the potential gains from the Fourth Industrial Revolution307.

      Cybersecurity are the processes employed to safeguard and secure assets used to carry information of an organisation from being stolen or attacked. It requires extensive knowledge of the possible threats. Identity management, risk management and incident management form the crux of cyber security strategies of an organization. Also, Cybersecurity is protection against unauthorized entry or use of electronic data or systems using technologies, processes and controls, networks, programs, devices, data, and other IoT solutions. The goal is to reduce the risk of cyberattacks308,309.

      Cyberspace refers to the virtual computer world, and more specifically, an electronic medium that is used to facilitate online communication. Cyberspace typically involves a large computer network made up of many worldwide computer subnetworks that employ TCP/IP protocol to aid in communication and data exchange activities. Cyberspace’s core feature is an interactive and virtual environment for a broad range of participants. In the common IT lexicon, any system that has a significant user base or even a well-designed interface can be thought to be «cyberspace»310.

      Cybersquatting refers to the unauthorized registration and use of Internet domain names that are identical or similar to trademarks, service marks, company names, or personal names. Cybersquatting registrants obtain and use the domain name with the bad faith intent to profit from the goodwill of the actual trademark owner311.

      Cyberthreat is the spread of malicious information and spam on the Web that threatens the personal information security of a person, company, state.

      Сloud robotics is a field of robotics that attempts to invoke cloud technologies such as cloud computing, cloud storage, and other Internet technologies centred on the benefits of converged infrastructure and shared services for robotics. When connected to the cloud, robots can benefit from the powerful computation, storage, and communication resources of modern data center in the cloud, which can process and share information from various robots or agent (other machines, smart objects, humans, etc.). Humans can also delegate tasks to robots remotely through networks. Cloud computing technologies enable robot systems to be endowed with powerful capability whilst reducing costs through cloud technologies. Thus, it is possible to build lightweight, low cost, smarter robots have intelligent “brain” in the cloud. The “brain” consists of data center, knowledge base, task planners, deep learning, information processing, environment models, communication support, etc.312.

      Сonstructed language (Also conlang) is a language whose phonology, grammar, and vocabulary are consciously devised, instead of having developed naturally. Constructed languages may also be referred to as artificial, planned, or invented languages.

      Сonvolutional neural network – in deep learning, a convolutional neural network (CNN, or ConvNet) is a class of deep neural networks, most commonly applied to analyzing visual imagery. CNNs use a variation of multilayer perceptrons designed to require minimal preprocessing. They are also known as shift invariant or space invariant artificial neural networks (SIANN), based on their shared-weights architecture and translation invariance characteristics. Сonvolutional neural network is a class of artificial neural network most commonly used to analyze visual images. They are also known as Invariant or Spatial Invariant Artificial Neural Networks (SIANN) based on an architecture with a common weight of convolution kernels or filters that slide over input features and provide equivalent translation responses known as feature maps.

      «D»

      Dashboard is a panel that shows operational and instrument vitals/readings and that helps process experts to monitor the most important production KPIs in one central point of access. It enables manufacturers to track and optimize the production quality and is a valuable analytics tool to manage all related manufacturing costs efficiently313.

      Data Access is the authorized, on-demand ability to access, modify or edit selected data, regardless of location. Data Access is one of the main aspects of establishing successful data governance systems314.

      Data Altruism – term used in the Data Governance Act. Data that is made available without reward for purely non-commercial usage that benefits communities or society at large, such as the use of mobility data to improve local transport315.

      Data


<p>303</p>

Customer relationship management (CRM) – Text: electronic. – www.techtarget.com (date of request: 07.07.2022) URL: https://www.techtarget.com/searchcustomerexperience/definition/CRM-customer-relationship-management

<p>304</p>

Cyberattack – Text: electronic. – https://en.wikipedia.org (date of request: 07.07.2022) URL: https://en.wikipedia.org/wiki/Cyberattack

<p>305</p>

Cybercrime – Text: electronic. – www.britannica.com (date of request: 07.07.2022) URL:https://www.britannica.com/topic/cybercrime

<p>306</p>

Cyber-Physical Production Systems (CPPSs) – Text: electronic. – https://packiot.com URL: https://packiot.com/glossary-of-digital-transformation-in-manufacturing-40-terms-you-must-know/ (date of request: 25.02.2023)

<p>307</p>

Cyber-resilience – Text: electronic. – https://packiot.com URL: https://packiot.com/glossary-of-digital-transformation-in-manufacturing-40-terms-you-must-know/ (date of request: 25.02.2023)

<p>308</p>

Cybersecurity – Text: electronic. – https://digitalhealtheurope.eu URL: https://digitalhealtheurope.eu/glossary/cybersecurity/ (date of request: 10.11.2022)

<p>309</p>

Cybersecurity – Text: electronic. – https://blog.pruftechnik.com URL: https://blog.pruftechnik.com/industry-4-0-iiot-glossary-of-terms/ (date of request: 25.02.2023)

<p>310</p>

Cyberspace – Text: electronic. – www.techopedia.com (date of request: 07.07.2022) URL: https://www.techopedia.com/definition/2493/cyberspace

<p>311</p>

Cybersquatting – Text: electronic. – www.winston.com (date of request: 07.07.2022) URL:https://www.winston.com/en/legal-glossary/cybersquatting.html

<p>312</p>

Сloud robotics – Text: electronic. – https://digitrode.ru URL: http://digitrode.ru/articles/2683-chto-takoe-oblachnaya-robototehnika.html (date of request: 09.02.2022)

<p>313</p>

Dashboard – Text: electronic. – https://www.trendminer.com URL: https://www.trendminer.com/iiot-glossary/ (date of request: 25.02.2023)

<p>314</p>

Data Access – Text: electronic. – https://digitalhealtheurope.eu URL: https://digitalhealtheurope.eu/glossary/data-access/ (date of request: 10.11.2022)

<p>315</p>

Data Altruism – Text: electronic. – https://digitalhealtheurope.eu URL: https://digitalhealtheurope.eu/glossary/data-altruism/ (date of request: 10.11.2022)