Search results

1 – 10 of 267
Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

7480

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7582

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 31 October 2023

Neema Florence Mosha and Patrick Ngulube

The study aims to investigate the utilisation of open research data repositories (RDRs) for storing and sharing research data in higher learning institutions (HLIs) in Tanzania.

Abstract

Purpose

The study aims to investigate the utilisation of open research data repositories (RDRs) for storing and sharing research data in higher learning institutions (HLIs) in Tanzania.

Design/methodology/approach

A survey research design was employed to collect data from postgraduate students at the Nelson Mandela African Institution of Science and Technology (NM-AIST) in Arusha, Tanzania. The data were collected and analysed quantitatively and qualitatively. A census sampling technique was employed to select the sample size for this study. The quantitative data were analysed using the Statistical Package for the Social Sciences (SPSS), whilst the qualitative data were analysed thematically.

Findings

Less than half of the respondents were aware of and were using open RDRs, including Zenodo, DataVerse, Dryad, OMERO, GitHub and Mendeley data repositories. More than half of the respondents were not willing to share research data and cited a lack of ownership after storing their research data in most of the open RDRs and data security. HILs need to conduct training on using trusted repositories and motivate postgraduate students to utilise open repositories (ORs). The challenges for underutilisation of open RDRs were a lack of policies governing the storage and sharing of research data and grant constraints.

Originality/value

Research data storage and sharing are of great interest to researchers in HILs to inform them to implement open RDRs to support these researchers. Open RDRs increase visibility within HILs and reduce research data loss, and research works will be cited and used publicly. This paper identifies the potential for additional studies focussed on this area.

Open Access
Article
Publication date: 26 March 2024

Guilherme de Araujo Grigoli, Maurilio Ferreira Da Silva Júnior and Diego Pereira Pedra

This study aims to identify the main challenges to achieving humanitarian logistics in the context of United Nations peace missions in sub-Saharan Africa and to present…

Abstract

Purpose

This study aims to identify the main challenges to achieving humanitarian logistics in the context of United Nations peace missions in sub-Saharan Africa and to present suggestions for overcoming the logistical gaps encountered.

Design/methodology/approach

The methodological approach of the work focuses on the comparative case study of the United Nations Mission in South Sudan, the United Nations Multidimensional Integrated Stabilisation Mission in the Central African Republic and The United Nations Organisation Stabilisation Mission in the Democratic Republic of Congo from 2014 to 2021. The approach combined a systematic literature review with the authors’ empirical experience as participant observers in each mission, combining theory and practice.

Findings

As a result, six common challenges were identified for carrying out humanitarian logistics in the three peace missions. Each challenge revealed a logistical gap for which an appropriate solution was suggested based on the best practices found in the case study of each mission.

Research limitations/implications

This paper presents limitations when addressing the logistical analysis based on only three countries under the UN mission as a case study, as well as conceiving that certain flaws in the system, in the observed period, are already in the process of correction with the adoption of the 2016–2021 strategy by the UN Global Logistic Cluster. The authors suggest that further studies can be carried out by expanding the number of cases or using countries where other bodies (AU, NATO or EU) work.

Originality/value

To the best of the authors’ knowledge, this study is the first comparative case study of humanitarian logistics on the three principal missions of the UN conducted by academics and practitioners.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2042-6747

Keywords

Open Access
Article
Publication date: 17 November 2023

Peiman Tavakoli, Ibrahim Yitmen, Habib Sadri and Afshin Taheri

The purpose of this study is to focus on structured data provision and asset information model maintenance and develop a data provenance model on a blockchain-based digital twin…

1137

Abstract

Purpose

The purpose of this study is to focus on structured data provision and asset information model maintenance and develop a data provenance model on a blockchain-based digital twin smart and sustainable built environment (DT) for predictive asset management (PAM) in building facilities.

Design/methodology/approach

Qualitative research data were collected through a comprehensive scoping review of secondary sources. Additionally, primary data were gathered through interviews with industry specialists. The analysis of the data served as the basis for developing blockchain-based DT data provenance models and scenarios. A case study involving a conference room in an office building in Stockholm was conducted to assess the proposed data provenance model. The implementation utilized the Remix Ethereum platform and Sepolia testnet.

Findings

Based on the analysis of results, a data provenance model on blockchain-based DT which ensures the reliability and trustworthiness of data used in PAM processes was developed. This was achieved by providing a transparent and immutable record of data origin, ownership and lineage.

Practical implications

The proposed model enables decentralized applications (DApps) to publish real-time data obtained from dynamic operations and maintenance processes, enhancing the reliability and effectiveness of data for PAM.

Originality/value

The research presents a data provenance model on a blockchain-based DT, specifically tailored to PAM in building facilities. The proposed model enhances decision-making processes related to PAM by ensuring data reliability and trustworthiness and providing valuable insights for specialists and stakeholders interested in the application of blockchain technology in asset management and data provenance.

Details

Smart and Sustainable Built Environment, vol. 13 no. 1
Type: Research Article
ISSN: 2046-6099

Keywords

Open Access
Article
Publication date: 4 December 2023

Ignat Kulkov, Julia Kulkova, Daniele Leone, René Rohrbeck and Loick Menvielle

The purpose of this study is to examine the role of artificial intelligence (AI) in transforming the healthcare sector, with a focus on how AI contributes to entrepreneurship and…

1381

Abstract

Purpose

The purpose of this study is to examine the role of artificial intelligence (AI) in transforming the healthcare sector, with a focus on how AI contributes to entrepreneurship and value creation. This study also aims to explore the potential of combining AI with other technologies, such as cloud computing, blockchain, IoMT, additive manufacturing and 5G, in the healthcare industry.

Design/methodology/approach

Exploratory qualitative methodology was chosen to analyze 22 case studies from the USA, EU, Asia and South America. The data source was public and specialized podcast platforms.

Findings

The findings show that combining technologies can create a competitive advantage for technology entrepreneurs and bring about transitions from simple consumer devices to actionable healthcare applications. The results of this research identified three main entrepreneurship areas: 1. Analytics, including staff reduction, patient prediction and decision support; 2. Security, including protection against cyberattacks and detection of atypical cases; 3. Performance optimization, which, in addition to reducing the time and costs of medical procedures, includes staff training, reducing capital costs and working with new markets.

Originality/value

This study demonstrates how AI can be used with other technologies to cocreate value in the healthcare industry. This study provides a conceptual framework, “AI facilitators – AI achievers,” based on the findings and offer several theoretical contributions to academic literature in technology entrepreneurship and technology management and industry recommendations for practical implication.

Details

International Journal of Entrepreneurial Behavior & Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-2554

Keywords

Open Access
Article
Publication date: 6 May 2024

Lara Corona

This study aims to provide an overview of the dimension of stored collections displayed in visible storage and to indicate the main factors which hinder their accessibility.

Abstract

Purpose

This study aims to provide an overview of the dimension of stored collections displayed in visible storage and to indicate the main factors which hinder their accessibility.

Design/methodology/approach

This study is based on quantitative analysis: a survey was conducted through the offices of International Council of Museums and direct invitations to 2,558 museums located worldwide.

Findings

The study estimated 32% on average the share of stored collections displayed in visible storage. The analysis provides a picture of how many stored items are made accessible in visible storage across the continents, according to the collection’s type and size and the museums’ legal status. In addition, several aspects of visible storage are investigated to highlight whether or not it truly enables museums to achieve accessibility of their stored collections and which factors might hinder the accessibility. Amid them, the foremost factors involve the inadequacy of resources, such as the lack of staff (71%) and poor budget (68%). Because of it, museums are prone to setting up offsite storage (37%), often 16 km far from the city centre, thereby questioning the concept of accessibility itself.

Research limitations/implications

One major limitation of this study is that it does not consider people’s standpoints. Therefore, the author recommends that future studies focus on what people opine on visible storage, such as their appreciation of the display format, the behind-the-scenes, their need for interpretation and the degree of satisfaction with their information needs, as well as their perception of the size of stored collections.

Practical implications

These findings suggest that museums could take action in areas whereby the data demonstrated weaknesses in terms of accessibility. For instance, museums could set up a shuttle service or arrange public transportation service to allow people to visit offsite storage. Additionally, financial accessibility might be achieved by not charging some groups (elderly, students, etc.).

Social implications

The topic of stored collections and their accessibility has crucial social implications because not displaying collections triggers inequality amid social groups of excluded people and a small elite.

Originality/value

This study focuses on visible storage as a possible solution to enhance the accessibility of collections and indicates to what extent visible storage provides this accessibility. On the contrary, previous research did not estimate how much visible storage impacts the accessibility of stored collections.

Details

Collection and Curation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9326

Keywords

Open Access
Article
Publication date: 6 December 2022

Pieter Lagerwaard

In 2019, FIU-the Netherlands celebrated its 25th anniversary. This study takes the occasion to reflect on the role of the FIU in financial surveillance and to describe its core…

2129

Abstract

Purpose

In 2019, FIU-the Netherlands celebrated its 25th anniversary. This study takes the occasion to reflect on the role of the FIU in financial surveillance and to describe its core practices of collecting, analysing and disseminating financial intelligence.

Design/methodology/approach

Because FIU practices are often secret and its transaction data classified as state secrets, the FIU’s daily operational activities remain obscure. Drawing on interviews, public reports and an online training course, this study encircles secrecy and offers a fine-grained analysis of the FIU's core activities.

Findings

The article finds that the FIU plays a pivotal role in financial surveillance because it can operate at various intersections. An FIU operates at the intersection of finance and security, in between the public and private sector and at the national and international domain. This pivotal role makes the FIU indispensable in the surveillance of payment systems and spending behavior.

Social implications

The article poses that the desirability and effectiveness of financial surveillance has to date not received sufficient consideration, while it affects (the privacy of) anyone with a bank account. The article asks: is it ethically justifiable that transaction information is declared suspect, investigated, and shared nationally and internationally, without the individual or entity concerned officially being notified and legally named a suspect?

Originality/value

This case-study is not only relevant for the study of finance/security, AML/CFT and financial surveillance, but also to policy makers and the broader public who merit an understanding of how their financial behaviour is being surveilled.

Details

Journal of Money Laundering Control, vol. 26 no. 7
Type: Research Article
ISSN: 1368-5201

Keywords

Open Access
Article
Publication date: 19 January 2023

Benjamin Hellenborn, Oscar Eliasson, Ibrahim Yitmen and Habib Sadri

The purpose of this study is to identify the key data categories and characteristics defined by asset information requirements (AIR) and how this affects the development and…

1676

Abstract

Purpose

The purpose of this study is to identify the key data categories and characteristics defined by asset information requirements (AIR) and how this affects the development and maintenance of an asset information model (AIM) for a blockchain-based digital twin (DT).

Design/methodology/approach

A mixed-method approach involving qualitative and quantitative analysis was used to gather empirical data through semistructured interviews and a digital questionnaire survey with an emphasis on AIR for blockchain-based DTs from a data-driven predictive analytics perspective.

Findings

Based on the analysis of results three key data categories were identified, core data, static operation and maintenance (OM) data, and dynamic OM data, along with the data characteristics required to perform data-driven predictive analytics through artificial intelligence (AI) in a blockchain-based DT platform. The findings also include how the creation and maintenance of an AIM is affected in this context.

Practical implications

The key data categories and characteristics specified through AIR to support predictive data-driven analytics through AI in a blockchain-based DT will contribute to the development and maintenance of an AIM.

Originality/value

The research explores the process of defining, delivering and maintaining the AIM and the potential use of blockchain technology (BCT) as a facilitator for data trust, integrity and security.

Details

Smart and Sustainable Built Environment, vol. 13 no. 1
Type: Research Article
ISSN: 2046-6099

Keywords

Open Access
Article
Publication date: 20 October 2023

Usman Musa, Mastura Jaafar and Faraziera Mohd Raslim

This study attempts to examine the factors that influence user intention to adopt e-procurement in the Nigerian public sector.

2040

Abstract

Purpose

This study attempts to examine the factors that influence user intention to adopt e-procurement in the Nigerian public sector.

Design/methodology/approach

A well-structured questionnaire was used to collect primary data from 278 procurement and information technology (IT) departments’ officials of key federal government ministries and agencies. The technology acceptance model (TAM) model was adopted and extended with security-related factors, namely perceived trust and perceived security. A partial least squares-structural equation modelling (PLS-SEM) approach was used to test and validate the model.

Findings

The results indicated that perceived usefulness is the best predictor of users’ intention to adopt e-procurement, followed by perceived security and perceived trust. In contrast, however, perceived ease of use was found to have a significant negative effect on the intention to adopt e-procurement.

Originality/value

This study is among the first in the Nigerian public sector context to evaluate users’ perceptions on e-procurement adoption with the use of a distinctive research model (TAM). The study's findings contribute to a better understanding of the factors influencing the adoption of e-procurement in the Nigerian public sector.

Details

Arab Gulf Journal of Scientific Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1985-9899

Keywords

Access

Only Open Access

Year

Last 12 months (267)

Content type

1 – 10 of 267