Comprehensive use of 6G cellular technology accounting activity costs and cyber security
Main Article Content
Abstract
The purpose of this study was in the research of prospects for simultaneous use of 6G generation cellular communications for the purposes of automatization of cost accounting of the activity of enterprises of various branches and cybersecurity of accounting information. The theoretical and methodological aspects of the use of 6G cellular network technologies for accounting and cybersecurity purposes have been studied on the basis of general research methods – institutional and innovative; economic and mathematical methods of analysis using Excel spreadsheets were used to predict the pace of implementation of cellular communication of new generations; to determine perspective areas of use of 6G technology – methods of bibliographic and comparative analysis using the information resource "ResearchGate". The methods of permanent collection and transmission of accounting data about the production process and the procedure for monitoring the stay of employees or outsiders at the workplace using production equipment connected to the 6G cellular network has been developed. The procedure for combining the functional abilities of Global Positioning System (GPS) and cellular positioning (mobile subscribers) for accounting of transport costs and control over the movement and economic use of vehicles has been proposed.The procedure for combining unmanned aerial vehicles in a cluster on the basis of 6G communication with the purpose of aerovisual surveillance of agricultural and construction activities for automated accounting of production costs and prevention of unauthorized getting into an enterprise of persons (drones). The methods for determining the cost of rental space from the lessor based on counting the popularity among visitors and identifying offenders (thieves of information and material resources) through automated monitoring of the location of 6G cellular subscribers. The practical implementation of the developments presented in the article on the use of 6G cellular technologies will contribute to reliable costing and accounting of production costs of production, agricultural, construction, trade activities in combination with effective cyber protection of enterprises in preventing and detecting violators of information and territorial security. Further research is needed on the methods of management of business entities on the basis of accounting information obtained with the use of 6G cellular network technology.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
1. Proposal of Policy for Free Access Periodics
Authors whom publish in this magazine should agree to the following terms:
a. Authors should keep the copyrights and grant to the magazine the right of the first publication, with the work simultaneously permitted under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 that allows the sharing of the work with recognition of the authorship of the work and initial publication in this magazine.
b. Authors should have authorization for assuming additional contracts separately, for non-exclusive distribution of the version of the work published in this magazine (e.g.: to publish in an institutional repository or as book chapter), with recognition of authorship and initial publication in this magazine.
c. Authors should have permission and should be stimulated to publish and to distribute its work online (e.g.: in institutional repositories or its personal page) to any point before or during the publishing process, since this can generate productive alterations, as well as increasing the impact and the citation of the published work (See The Effect of Free Access).
Proposal of Policy for Periodic that offer Postponed Free Access
Authors whom publish in this magazine should agree to the following terms:
a. Authors should keep the copyrights and grant to the magazine the right of the first publication, with the work simultaneously permitted under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 [SPECIFY TIME HERE] after the publication, allowing the sharing of the work with recognition of the authorship of the work and initial publication in this magazine.
b. Authors should have authorization for assuming additional contracts separately, for non-exclusive distribution of the version of the work published in this magazine (e.g.: to publish in institutional repository or as book chapter), with recognition of authorship and initial publication in this magazine.
c. Authors should have permission and should be stimulated to publish and to distribute its work online (e.g.: in institutional repositories or its personal page) to any point before or during the publishing process, since this can generate productive alterations, as well as increasing the impact and the citation of the published work (See The Effect of Free Access).
d. They allow some kind of open dissemination. Authors can disseminate their articles in open access, but with specific conditions imposed by the editor that are related to:
Version of the article that can be deposited in the repository:
Pre-print: before being reviewed by pairs.
Post-print: once reviewed by pairs, which can be:
The version of the author that has been accepted for publication.
The editor's version, that is, the article published in the magazine.
At which point the article can be made accessible in an open manner: before it is published in the magazine, immediately afterwards or if a period of seizure is required, which can range from six months to several years.
Where to leave open: on the author's personal web page, only departmental websites, the repository of the institution, the file of the research funding agency, among others.
References
Al-Mohammed, H., & Yaacoub, E. (2021). On The Use of Quantum Communications for Securing IoT Devices in the 6G Era. 1-6. 10.1109/ICCWorkshops50388.2021.9473793.
Bickauske, D., Simanaviciene, Z., Jakubavicius, A., Vilys, M. & Mykhalchyshyna, L. (2020). Analysis and Perspectives of the Level of Enterprises Digitalization (Lithuanian Manufacturing Sector Case). Independent Journal of Management & Production, 11(9), 2291-2307. DOI: http://dx.doi.org/10.14807/ijmp.v11i9.1404.
Concept of creation and development of 5G / IMT-2020 networks. URL: https://digital.gov.ru/uploaded/files/kontseptsiya-sozdaniya-i-razvitiya-setej-5g-imt-2020.pdf.
Global 5G subscription forecast 2019-2025. Statista. https://www.statista.com/statistics/760275/5g-mobile-subscriptions-worldwide/
Hoschek, M. (2021). Quantum security and 6G critical infrastructure. Serbian Journal of Engineering Management. 6. 1-8. 10.5937/SJEM2101001H.
Huang, R., & Turner, G. (2020). How the UK Can Lead in 5G and 6G Security and Standards. RUSI Newsbrief. Emerging Technologies. 40(7). 10.7945/18ch-1a56.
Khan, A., Hassan, U. L., Naveed, Y., Zhao, J., Niyato, D., Zhang, Y., & Poor, H. V. (2021). Blockchain and 6G: The Future of Secure and Ubiquitous Communication. ArXiv abs/2106.05673. https://www.researchgate.net/publication/352308474_Blockchain_and_6G_The_Future_of_Secure_and_Ubiquitous_Communication.
Lu, Yang. (2020). Security in 6G: The Prospects and the Relevant Technologies. Journal of Industrial Integration and Management. 5, 271-289. 10.1142/S2424862220500165.
Mobile broadband subscriptions worldwide 2007-2020. Statista. https://www.statista.com/statistics/273016/number-of-mobile-broadband-subscriptions-worldwide-since-2007/
Mobile technology share by generation 2016-2025. Statista. https://www.statista.com/statistics/740442/worldwide-share-of-mobile-telecommunication-technology/
Popovski, P., Chiariotti, F., Huang, K., Kalør, A., Kountouris, M., Pappas, N., & Soret, B. (2021). A Perspective on Time towards Wireless 6G.
Porambage, P., Gür, G., Osorio, D. P. M., Liyanage, M., Gurtov, A., & Ylianttila, M. (2021).The Roadmap to 6G Security and Privacy. IEEE Open Journal of the Communications Society, 2,1094-1122. 10.1109/OJCOMS.2021.3078081.
Siriwardhana, Y., Porambage, P., Liyanage, M., & Ylianttila, M. (2021). AI and 6G Security: Opportunities and Challenges. Joint European Conference on Networks and Communications (EuCNC) & 6G Summit. Porto, Portugal. https://www.researchgate.net/publication/350824466_AI_and_6G_Security_Opportunities_and_Challenges
Stitilis, D., Rotomskis, I., Laurinaitis, M., Nadvynychnyy, S. & Khorunzhak, N. (2020). National Cybersecurity Strategies: Management, Unification and Assessment. Independent Journal of Management & Production, 11(9), 2341-2354. DOI: http://dx.doi.org/10.14807/ijmp.v11i9.1431.
Wang, M., Zhu, T., Zhang, T., Zhang, J., Yu, S., & Zhou, W. (2020). Security and privacy in 6G networks: New areas and new challenges. Digital Communications and Networks. 6. 10.1016/j.dcan.2020.07.003.
Ylianttila M., Kantola, R., Gurtov, A., Mucchi, L., & Oppermann I., (Eds.). (2020). 6G White Paper: Research Challenges For Trust, Security And Privacy [White paper]. (6G Research Visions, 9). University of Oulu. http://urn.fi/urn:isbn:9789526226804.
Zadorozhnyi, Z., Muravskyi, V., Shevchuk, О., & Muravskyi, V. (2020). The accounting system as the basis for organising enterprise cybersecurity. Financial and credit activity: problems of theory and practice. 3. 147-156. 10.18371/fcaptp.v3i34.215462.
Zhang, J., Wang, Z., Wang, D., Zhang, X., Gupta, B. B., Liu, X., & Ma, J. (2021). A Secure Decentralized Spatial Crowdsourcing Scheme for 6G-Enabled Network in Box. IEEE Transactions on Industrial Informatics. 1-11. 10.1109/TII.2021.3081416.