New Dutch agrifood business models are emerging in response to economic, social and ecological pressures: new players arrive, new logistical pathways come to the fore and innovative consumer and farmer relationships – food coöperatives – are forged. How do new business models relate to reconfiguring the Dutch agrifood system? Our research combines future exploration (backcasting) and analysis of new business models. We developed three agrifood transition scenarios with various groups of stakeholders. For each scenario, we then analysed a specific, representative business model to explore the different roles of business models in agrifood transition. Business models in the “Added value in and with the countryside” already exist and occupy a niche in the market. However, a breakthrough of these business models require large-scale institutional and behavioural change. Business models in the “New products, specific markets” exist but are rare. They usually concern high-value specialist products that could result in widespread market change, but might require little institutional change. The “Sustainable production methods” most resembles the current system. Some associated business models become successful, but they have difficulty distinguishing themselves from conventional produce, which raises questions about whether business models are able to drive a transition in this direction. Thus, our results lend credence to the hypothesis that different transition pathways offer specific potential for and requirements of new business models.
MULTIFILE
The growing availability of data offers plenty of opportunities for data driven innovation of business models for SMEs like interactive media companies. However, SMEs lack the knowledge and processes to translate data into attractive propositions and design viable data-driven business models. In this paper we develop and evaluate a practical method for designing data driven business models (DDBM) in the context of interactive media companies. The development follows a design science research approach. The main result is a step-by-step approach for designing DDBM, supported by pattern cards and game boards. Steps consider required data sources and data activities, actors and value network, revenue model and implementation aspects. Preliminary evaluation shows that the method works as a discussion tool to uncover assumptions and make assessments to create a substantiated data driven business model.
MULTIFILE
Despite the benefits of the widespread deployment of diverse Internet-enabled devices such as IP cameras and smart home appliances - the so-called Internet of Things (IoT) has amplified the attack surface that is being leveraged by cyber criminals. While manufacturers and vendors keep deploying new products, infected devices can be counted in the millions and spreading at an alarming rate all over consumer and business networks. The objective of this project is twofold: (i) to explain the causes behind these infections and the inherent insecurity of the IoT paradigm by exploring innovative data analytics as applied to raw cyber security data; and (ii) to promote effective remediation mechanisms that mitigate the threat of the currently vulnerable and infected IoT devices. By performing large-scale passive and active measurements, this project will allow the characterization and attribution of compromise IoT devices. Understanding the type of devices that are getting compromised and the reasons behind the attacker’s intention is essential to design effective countermeasures. This project will build on the state of the art in information theoretic data mining (e.g., using the minimum description length and maximum entropy principles), statistical pattern mining, and interactive data exploration and analytics to create a casual model that allows explaining the attacker’s tactics and techniques. The project will research formal correlation methods rooted in stochastic data assemblies between IoT-relevant measurements and IoT malware binaries as captured by an IoT-specific honeypot to aid in the attribution and thus the remediation objective. Research outcomes of this project will benefit society in addressing important IoT security problems before manufacturers saturate the market with ostensibly useful and innovative gadgets that lack sufficient security features, thus being vulnerable to attacks and malware infestations, which can turn them into rogue agents. However, the insights gained will not be limited to the attacker behavior and attribution, but also to the remediation of the infected devices. Based on a casual model and output of the correlation analyses, this project will follow an innovative approach to understand the remediation impact of malware notifications by conducting a longitudinal quasi-experimental analysis. The quasi-experimental analyses will examine remediation rates of infected/vulnerable IoT devices in order to make better inferences about the impact of the characteristics of the notification and infected user’s reaction. The research will provide new perspectives, information, insights, and approaches to vulnerability and malware notifications that differ from the previous reliance on models calibrated with cross-sectional analysis. This project will enable more robust use of longitudinal estimates based on documented remediation change. Project results and methods will enhance the capacity of Internet intermediaries (e.g., ISPs and hosting providers) to better handle abuse/vulnerability reporting which in turn will serve as a preemptive countermeasure. The data and methods will allow to investigate the behavior of infected individuals and firms at a microscopic scale and reveal the causal relations among infections, human factor and remediation.