My Latest Work

Blockchain and Clinical Trial

Showcases how blockchain technology can be considered for the healthcare industry as a way to protect the privacy of patient data. It also addresses blockchain as a decentralised method to retain healthcare data throughout the individual’s lifecycle as opposed to disparate silo data held in centralised systems.
Examines the effects of allowing the patient to control/release permission of its data for clinical research use and improve the transparency from the various phases of research trials to drugs post approval.

Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity

Concise review of cyber defence, legislative frameworks, C4ISR and Critical National Infrastructure.
Includes detailed analysis of the impact of AI, human interconnectivity, related technology and the overall impact of smart societies.
Describes bio hacking techniques, capabilities and the role of digital twins.
Addresses cyber-attack landscape, attack vectors, predictive control and cyber resilience.
Demonstrates the importance of the exponential growth in data, concerns of data exploitation, privacy and data ownership.

The Role of Blockchain with a Cybersecurity Maturity Model in the Governance of Pharmaceutical Supply Chains | Cyber Security and Supply Chain Management

The world of logistics has become ever more complex with the expansion of global supply chains with many moving parts, technological advancements and the growing importance given to the new ‘gold’ being data. The chain of custody and project management of the logistical workflow can no longer rely on just human competencies and interactive dashboards that aid management of these combined ecosystems of manufacturer, distributer and customer, through its cloud based monitor and control workflow. With the increasing complex workflow in supply chain more is needed to minimise the risk, that is often evaluated through tools and modern day methods; as there are many current issues in the chain of custody being contaminated through security corruptions, malpractice, accidental behaviours, cyberattacks and data breaches, etc and are explored in this chapter through a pharmaceutical supply chain case study. More attention is being given to applying new technologies such as blockchain where its attributes offer huge benefits of immutability, auditability, smart contracts, traceability and that single source of the truth many seek to reduce risk; these are proving to be great tools to lessen business vulnerabilities and reduce the impact of sophisticated cyberattacks that threaten the core business and its credibility. Larger and more serious issues/impacts exist when cyberattacks affect supply chain when it is concerning critical national infrastructure (CNI) such as in healthcare. Supply chain is of course present in any industry and this chapter will focus on pharmaceutical supply chain issues and a suggested hybrid framework is presented that details the benefits of a Cyber Security Maturity Model (CSMM). The framework assists in an end-to-end supply chain that ensures all those that sign up to the supply chain follow the CSMM framework requirements and utilises some methodology (e.g. CMMi, ITiL, etc) to ensure monitoring, training, compliance, etc are adhered to on an ongoing basis. Blockchain can then be the mechanism to enhance security that allows tracking from origin all the way through to manufacturing and distribution, using smart contracts, to offset criminality, counterfeiting, falsification and tampering.

Social Media Analytics, Strategies and Governance

Social media has spread rapidly on the global stage, driving consumers’ attention and influence, both consciously and subconsciously. Whilst this type of platform may have been initially designed as a tool for open communication and expression, it is also being utilized as a digital tool, with widescale use cases.
The intelligence explosion, information overload and disinformation play a significant part regarding individual, group and country perceptions. The complex nature of this data explosion created an increasing demand and use of artificial intelligence (AI) and machine learning (ML), to help provide ‘big insights’ to ‘big data’. AI and ML enable the analysis and dissemination of vast amounts of data, however the ungoverned pace at which AI and autonomous systems have been deployed, has created unforeseen problems. Many algorithms and AI systems have been trained on limited or unverified datasets, creating inbuilt and unseen biases. Where these algorithmic tools have been deployed in high impact systems, there are documented occurrences of disastrous decision making and outcomes that have negatively impacted people and communities. Little to no work had been conducted in its vulnerability and ability to exploit AI itself. So, AI and autonomous systems, whilst being a force for societal good, could have the potential to create and exacerbate societies greatest challenges.

Information Security Technologies for Controlling Pandemics

Provides a concise review of potential global transformation methodology and new ways of working caused by positive impacts of COVID-19.
Discusses associated risks post COVID-19 transformation in the form of data leakage, privacy, transparency, exploitation, and ownership.
Presents analysis of defence tactics and countermeasures on growing vulnerabilities exposure and cybercriminal expansion.
Gives review of interconnected human-centric societies working remotely and new evolving technologies.

Strategy, Leadership, and AI in the Cyber Ecosystem

Strategy, Leadership and AI in the Cyber Ecosystem investigates the restructuring of the way cybersecurity and business leaders engage with the emerging digital revolution towards the development of strategic management, with the aid of AI, and in the context of growing cyber-physical interactions (human/machine co-working relationships). The book explores all aspects of strategic leadership within a digital context. It investigates the interactions from both the firm/organization strategy perspective, including cross-functional actors/stakeholders who are operating within the organization and the various characteristics of operating in a cyber-secure ecosystem. As consumption and reliance by business on the use of vast amounts of data in operations increase, demand for more data governance to minimize the issues of bias, trust, privacy and security may be necessary. The role of management is changing dramatically, with the challenges of Industry 4.0 and the digital revolution. With this intelligence explosion, the influence of artificial intelligence technology and the key themes of machine learning, big data, and digital twin are evolving and creating the need for cyber-physical management professionals.

Digital Twin Technologies and Smart Cities

Cyber-Physical Systems and Digital Twins are commonly used today in the industrial sector, and the healthcare sector is keen to implement these technological solutions to enhance their capabilities and offer better services for patient care provision. In fact, the adoption of Wireless Body Area Networks (WBAN) based on IoT along with cloud computing systems has led to the development of new methodologies to monitor and treat patients. However, the adoption of the new technologies comes with several challenges in terms of performance and security. Considering that, WBAN can be wearable or implanted under the skin, and the overall concept leads to several cybersecurity challenges that would require deeper investigation. This chapter presents an analysis of the impact that WBAN has on health care. It also provides some definitions of Medical Cyber-Physical Systems (MCPSs) and Digital Twins along with technological enablers such as cloud and IoT.

Cyber Security Practitioner's Guide

In an era of unprecedented volatile political and economic environments across the world, computer-based cyber security systems face ever growing challenges. While the internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber crime. The debate over how to plan for the cyber security of the future has focused the minds of developers and scientists alike.

Millennials vs. Cyborgs and Blockchain Role in Trust and Privacy

Over recent years, technology has rapidly advanced and is accelerating the emergence to Industry 4.0, particularly due to the connectivity abundance, volume increase of smart devices, and a growing interconnectivity between humans and technology. Within the last two years, 90% of the data in the world today was generated and in the next few years the volume of IoT interactions is said to reach approximately 4800 per day, which equates to a human interaction every 18 seconds. This correlates well with research undertaken regarding how consumers are exchanging information through smart devices and behavioural changes due to the technology adoption. The Generation Y and Z demand for smart devices, consumer behaviour online, and almost immediate data experiences is seeing fast consumption and data exchange without any preconceived concerns of trust, privacy, security, data profiling, or how data is used without their knowledge by third parties. This chapter will also analyse technology innovations to better protect identity data and processing of data through blockchain technology.

Securing Transparency and Governance of Organ Supply Chain Through Blockchain

The governance and supply chain of organs is a complicated process throughout the life cycle; from the outset of pre-assessment of organ placement, it’s supply chain journey and important post donor analysis. Healthcare organisations face a huge challenge in the diverse collation of data that are held in systems which are mostly in silo operation and little scope for interoperability or accessibility of medical data. Lack of data access or trust in its accuracy makes the task more challenging and problematic for healthcare institutions whose preference undoubtably would be to focus their energies on the decision making side of a patient’s health in assessing organ donor suitability and urgency to organ match due to the receiving patient criticalities, rather than time and resources spent on validating data authenticity, etc. There are further complications that can occur in potential mix-ups of organs, contamination of DNA during organ transplant, non-ethical organ supply and audit trail transparency related to these activities. There is a serious question on how to create a single source of the truth and blockchain may provide the best possibilities. Blockchain is becoming a more sought after technology being used in the healthcare space due to its attributes of immutability, traceability and security whilst providing that assurance of transparency and audit trail. Blockchain looks to be a good fit to manage the supply chain of organ procurement/placement and an audit control method to analyse data in any pre or post operation event. Combined with the right processes, in the form of a cyber security framework/maturity model for the healthcare industry, would ensure that all those who signed up to the blockchain deployed for the supply chain logistics would respect the ethics and requirements and expect transparency for those authorised to access. However, some challenges exist in GDPR compliancy of data that would exist on a certain proposed blockchain models and needs further exploring with regards to benefits in data held off-chain

The Role of Blockchain in Underpinning Mission Critical Infrastructure

There is a fast-growing desire to look at the technology of blockchain as a method to enhance and further protect mission critical data in large-scale critical national infrastructure (CNI) such as healthcare organisations, ICS and SCADA systems used for key industrial processes. During recent years the level of cyberattacks and attack formations has progressed from ‘script kiddies’ to crime-for-hire (such as ransomware-as-a-service and malware-as-a-service) and more sophisticated attacks designed to take down a whole network infrastructure such as WannaCry ransomware attack in 2017 or the Ukraine 2015 cyberattack shutting down the power grid. Blockchain offers a decentralised method, essentially a trustless environment to store sensitive related data where it can remain private but accessible to where authorised.
Depending on the environment requirements, it can dictate how the data is stored (if on-chain or off-chain) but mainly giving the benefits of immutability, audit trail and enhanced security encryption layers. On a more serious level is the potential for state-sponsored cyberattacks designed to bring down CNI, which tend to be cultivated in more complex manners, and so an added security layer of blockchain may help protect core data.
The positioning of blockchain technology can therefore have a double effect to add to the traditional security layers of regular compliance policy reviews, training, patching, intrusion detection and prevention systems (IDPS) but also provide the enhancements of security and privacy of data.

Blockchain for Strengthening the Privacy of Healthcare Data

The desire for eHealth systems is ever-growing as public institutions, healthcare providers, and its users see the positive gains from having systems of patient health information held in a single place; a decentralized connected architecture called blockchain. This concept can solve the interoperability issues and integrate the fragmented way healthcare records are held and present a more transparent, secure method to share data and protect patient privacy. The aim of this article is to provide a supportive environment for the health and social care workplace with special reference in the Primary Care sector in England on the impact and changes to the information governance toolkit (IGTK) as a result of the new European General Data Protection Regulation (GDPR) coming into force from May 2018. These challenges will also include the implementation of the National Data Guardian (NDG) review of data security and opt-outs amongst others.

The Role of Blockchain in Supporting Critical National Infrastructure

Cyber-attacks have become more sophisticated over recent years with the different configuration types and various industry sectors have suffered from a range of these different attack vectors resulting in some devastating outcomes. These have manifested in the shape of ransomware, malware, manipulation methods, phishing and spear-phishing. Whilst data breaches are a serious incident, in most organisations, there is a growing concern regarding attacks that are designed to have a more destructive effect such as the Ukraine cyber-attack in 2015 that resulted in a shutdown of the power grid. Or the WannaCry ransomware attack in 2017 that caused widespread chaos with healthcare institutions unable to carry out any tasks since access to data/systems was unavailable. These critical national infrastructure (CNI) attacks into sectors such as healthcare cause data breaches/disruptions and are also able to leverage vulnerabilities in the industrial processes containing ICS and SCADA systems. Perhaps the state sponsored cyber-attacks cause the most concern as they tend to be at the more sophisticated level of the spectrum and maximize on amount of potential harm that is delivered. There is growing interest in how to protect CNI besides just using traditional methods such as regular patching, Intrusion Detection and Prevention systems (IDPS), up to date compliance policies, etc., and blockchain can be the mechanism that gives another protection layer to protect mission critical data. Blockchain, a decentralized network, offers the features of immutability, non-tampering, security encryption, auditability, and can be a permissioned type of environment where the set of users are invited and not open for all. Blockchain can complement these traditional systems by offering another layer of protection to the sensitive and mission critical data.