Essays about: "industrial security management"

Showing result 1 - 5 of 34 essays containing the words industrial security management.

  1. 1. Digitalization and Electrification´s Transformational Impact on the Automotive Mobility Industry - A multiple case study on the Swedish automotive mobility industry facing changing business models, challenges, and future opportunities

    University essay from Göteborgs universitet/Graduate School

    Author : Max Guron; [2023-07-19]
    Keywords : Digitalization; Electrification; Business model; Business model framework; Business model innovation; Technological Change; Industrial Change; Disruptive technology; Automotive Mobility; Automotive Industry; Mobility services; Car-sharing; Automotive manufacturers; Car-sharing providers; ride-hailing providers;

    Abstract : The automotive mobility industry, including car manufactures, car-sharing, and ride-hailing companies, is experiencing technological change through electrification and digitalization. These two trends can potentially disrupt the whole industry through, i.e. READ MORE

  2. 2. Carbon Capture from Biomass Boiler Flue Gas Emissions using Microalgae : A Case Study

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Graham Kirn; [2023]
    Keywords : ;

    Abstract : Capture and storage of carbon dioxide (CO2) is expected to play an important role in climate change mitigation efforts intended to limit global warming to 1.5 °C. Bioenergy with carbon capture and storage (BECCS), in which carbon is captured during energy generation from sustainably sourced biomass fuels, is of particular interest in Sweden. READ MORE

  3. 3. Digitizing the Document Management Process : Challenges and Opportunities

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Pascal Nahayo; Sora Al-Azawi; [2023]
    Keywords : ;

    Abstract : Date: 2023-06-04 Level: Master Thesis in Industrial Engineering & Management and Master Thesis in Product- & Process Development, 30 ECTS Institution: School of Innovation, Design and Engineering & School of Innovation, Design and Technology, Mälardalen University Authors: Sora Al-Azawi Pascal Nahayo 1999-12-16 1991-04-03 Title: Digitizing the Document Management Process: Challenges and Opportunities Supervisor (University): Catarina Bojesson, Mälardalen University Supervisor (Company): Sofia Lillback, Stora Enso Fors AB Keywords: BPM, Value, Value Creation, Digitalization, Sustainability, Security, Cybersecurity Research Question: What potential challenges and opportunities should be considered to optimize the value when adopting digital alternatives to the Bill of Lading (B/L) in the manufacturing sector? Purpose: The purpose of this study is to explore the potential value of digitizing the document management process in the manufacturing sector while enhancing sustainability and ensuring security and privacy. Specifically, the study aims to evaluate the value of adopting digital alternatives to the B/L. READ MORE

  4. 4. Third-party risks in industrial control systems: : A case study in the wind power sector

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Abdullahi Ahmed; [2023]
    Keywords : Supply chain security; Wind power; Risk management; Third-party risk management; SCADA-system; Säkerhetshantering för försörjningskedjan; Vindkraft; Riskhantering; Tredjeparts riskhantering; SCADA-system;

    Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE

  5. 5. Attack Surface Management : Principles for simplifying the complexity of OT security

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Jyotirmay Veshne; [2023]
    Keywords : OT; ICS; SCADA; CPS; IIoT; IoT; Attack Surface; MES; Attack Surface Management; Security; Remote connectivity;

    Abstract : Purpose: Operational technology (OT) environments face significant risks and threats stemming from Industry 4.0. The security landscape for OT is confronted with unprecedented challenges due to the expanding attack surface resulting from factors like cloud adoption, Industrial Internet of Things, and increased mobility. READ MORE