Search results

1 – 10 of over 215000
Article
Publication date: 9 August 2021

Gnaneshwari G.R., M.S. Hema and S.C. Lingareddy

Pervasive computing environment allows the users to access the services anywhere and anytime. Due to the dynamicity, mobility, security, heterogeneity, and openness have become a…

Abstract

Purpose

Pervasive computing environment allows the users to access the services anywhere and anytime. Due to the dynamicity, mobility, security, heterogeneity, and openness have become a major challenging task in the Pervasive computing environment. To solve the security issues and to increase the communication reliability, an authentication-based access control approach is developed in this research to ensure the level of security in the Pervasive computing environment.

Design/methodology/approach

This paper aims to propose authentication-based access control approach performs the authentication mechanism using the hashing, encryption, and decryption function. The proposed approach effectively achieves the conditional traceability of user credentials to enhance security. Moreover, the performance of the proposed authentication-based access control approach is estimated using the experimental analysis, and performance improvement is proved using the evaluation metrics. It inherent the tradeoff between authentication and access control in the Pervasive computing environment. Here, the service provider requires authorization and authentication for the provision of service, whereas the end-users require unlinkability and untraceability for data transactions.

Findings

The proposed authentication-based access control obtained 0.76, 22.836 GB, and 3.35 sec for detection rate, memory, and time by considering password attack, and 22.772GB and 4.51 sec for memory and time by considering without attack scenario.

Originality/value

The communication between the user and the service provider is progressed using the user public key in such a way that the private key of the user can be generated through the encryption function.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 25 March 2019

Stuart Orr

In addition to their internal resources, companies in most industries rely upon external strategic resources to maintain and improve their performance. External strategic…

Abstract

Purpose

In addition to their internal resources, companies in most industries rely upon external strategic resources to maintain and improve their performance. External strategic resources have a similar effect on competitiveness but are located in the company’s networks or even in unrelated industries. Some companies underuse these resources, while other companies focus too strongly on accessing external resources in their own industry, which results in hyper-competition. This paper aims to explain how different industries use external resources and describes the criteria for a balanced approach which leads to knowledge transfer, diversity and supports the development of new business.

Design/methodology/approach

Examples and evidence from four different industries are used to identify the different approaches for accessing external strategic resources.

Findings

Valuable external strategic resources are non-transferable, located in a complementary product organisation, knowledge-oriented, located in a different country, preferably not part of the organisation’s primary external focus (e.g. supply chain), able to introduce diversity and innovation and are compatible with network behaviours.

Practical implications

External strategic resources are frequently found within the organisation’s supply chain, however, use of these resources should be balanced by external resources from non-related industries to increase diversity and reduce the likelihood of hyper-competition.

Originality/value

This paper explains why external strategic resources are valuable, identifies the different approaches to accessing them, describes the benefits and drawbacks associated with each approach and provides the key criteria for identifying a valuable external strategic resource.

Details

Journal of Business Strategy, vol. 40 no. 3
Type: Research Article
ISSN: 0275-6668

Keywords

Open Access
Article
Publication date: 9 October 2023

Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are…

1035

Abstract

Purpose

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are increasingly used in security-critical domains. Current survey works on databases and data security only consider authorization and access control in a very general way and do not regard most of today’s sophisticated requirements. Accordingly, the purpose of this paper is to discuss authorization and access control for relational and NoSQL database models in detail with respect to requirements and current state of the art.

Design/methodology/approach

This paper follows a systematic literature review approach to study authorization and access control for different database models. Starting with a research on survey works on authorization and access control in databases, the study continues with the identification and definition of advanced authorization and access control requirements, which are generally applicable to any database model. This paper then discusses and compares current database models based on these requirements.

Findings

As no survey works consider requirements for authorization and access control in different database models so far, the authors define their requirements. Furthermore, the authors discuss the current state of the art for the relational, key-value, column-oriented, document-based and graph database models in comparison to the defined requirements.

Originality/value

This paper focuses on authorization and access control for various database models, not concrete products. This paper identifies today’s sophisticated – yet general – requirements from the literature and compares them with research results and access control features of current products for the relational and NoSQL database models.

Details

International Journal of Web Information Systems, vol. 20 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 14 November 2008

M. Gordon Brown

The purpose of this paper is too analyze what causes judicial decisions about access impairment in American eminent domain and police power cases to be based on subjective…

Abstract

Purpose

The purpose of this paper is too analyze what causes judicial decisions about access impairment in American eminent domain and police power cases to be based on subjective interpretations instead of objective factual evidence about the spatio‐material conditions of access.

Design/methodology/approach

Following a review of commentary on decision making and language in legal contexts, contemporary rhetorical analysis combined with discourse analysis are employed to illuminate inconsistencies of legal terminologies with respect to access.

Findings

The analysis finds that legal terminology of access takings sustains cognitive indeterminacies and prevents the use of standard quantitative approaches to measurement.

Research limitations/implications

The implications of this research are that access conditions need to be considered in the context of transaction costs based on an underlying ontology of access phenomena.

Practical implications

This paper calls for changing legal policy so that objective measures of access can be used to evaluate impairment.

Originality/value

This is the first paper to analyze underlying problems in access takings and sets the stage for a more objective and scientific approach to a long unresolved problem involving property takings.

Details

International Journal of Law and Management, vol. 50 no. 6
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 1 March 2021

Feng Zhang

This study aims to analyze the subsequent investment success of EMNCs after their strategic asset-seeking foreign direct investments (FDIs), while internationalization…

Abstract

Purpose

This study aims to analyze the subsequent investment success of EMNCs after their strategic asset-seeking foreign direct investments (FDIs), while internationalization trajectories of multinational corporations from emerging economies (EMNCs) have been extensively studied, Post-internationalization investment success of EMNCs is defined as extensive technological knowledge access and transfer for knowledge combination. This paper focuses on EMNC explicit knowledge access and transfer.

Design/methodology/approach

This study analyzes US patents granted between 2000 and 2014 to leading innovation-oriented EMNCs from China and India as well as to their key competitors from mature industrialized countries (MMNCs). Wilcoxon Rank Sum Test is used to compare the explicit technological knowledge access and transfer patterns of EMNCs and MMNCs. With MMNCs as the benchmark, the comparison allows to imply the patterns and extent of technological knowledge access and transfer of EMNCs.

Findings

While subsidiary reverse knowledge transfer is largely missing, EMNCs adopt a parent-centric approach in which the parent directly accesses and transfers explicit knowledge from the external environment of host locations. In doing so, EMNCs at least partially achieve the knowledge access and transfer goals of strategic asset-seeking FDIs.

Originality/value

This study contributes to an in-depth understanding of EMNCs by empirically testing key predictions in extant EMNC literature, namely, the strategic asset-seeking in host locations and the systematic integration of accessed knowledge and resources with home country activities. This study also pioneers the use of the US patent and citation data to empirically study EMNCs.

Article
Publication date: 21 November 2011

Adam Barak and Jyoti Shankar Nandi

This article aims to provide a description of principal aspects of policy and practice associated with orphan drugs and treatments of rare diseases, and give perspectives for 2011…

Abstract

Purpose

This article aims to provide a description of principal aspects of policy and practice associated with orphan drugs and treatments of rare diseases, and give perspectives for 2011 on new and emerging approaches for addressing patient access.

Design/methodology/approach

Information has been synthesized from a wide variety of sources including the authors' experience and familiarity with this topic, having over the past ten years developed market access strategies for many orphan drugs. This is supplemented by pertinent information from conferences, meetings and articles published over the last 20 years and from policy documents released by relevant regulatory bodies.

Findings

While a small number of people suffer from any one rare disease, approximately 30 million in the EU and 25 million in the USA are affected by such diseases. Annual orphan drug treatment costs may approach $500,000. High costs coupled with relatively sparse supportive clinical data and difficulty in meeting standard cost‐effectiveness benchmarks raise significant issues for payers in allocating finite budgetary resources. Since the US (1983) and European (European Parliament, 2000) orphan drug regulations were approved, hundreds of agents have been granted orphan status although many fewer have achieved marketing authorization. Agencies have introduced a slew of incentives to help sponsors develop and market orphan medicinal products. The nature and focus of the programs are undergoing a metamorphosis as access to funding is becoming as important as supporting development.

Originality/value

The article represents a contemporary examination of orphan drug policy and practice, bringing together historic elements which influenced practice up to 2010 and the latest, emerging trends and approaches which stakeholders are now embracing and which will shape procedures from 2011.

Details

International Journal of Pharmaceutical and Healthcare Marketing, vol. 5 no. 4
Type: Research Article
ISSN: 1750-6123

Keywords

Article
Publication date: 19 August 2021

Sanjay Sudhir Kulkarni and Arjav A. Bavarva

Fifth-generation (5G) networks play a significant role in handover methods. 5G wireless network is open, flexible and highly heterogeneous along with the overlay coverage and…

Abstract

Purpose

Fifth-generation (5G) networks play a significant role in handover methods. 5G wireless network is open, flexible and highly heterogeneous along with the overlay coverage and small cell deployments. Handover management is one of the main problems in the heterogeneous network. Also, handover satisfies the needs of ultra-reliable communications along with very high reliability and availability in 5G networks. Handover management deals with every active connection of a user’s device, which moves the connection between the user’s device and the counterparty from one network point to another. Thus, the handover decision determines the best access network and also decides whether the handover is performed or not.

Design/methodology/approach

The main intention of this survey is to review several existing handover technologies in 5G. Using the categories of analysis, the existing techniques are divided into different techniques such as authentication-based techniques, blockchain-based techniques, software-defined-based techniques and radio access-based techniques. The survey is made by considering the methods such as used software, categorization of methods and used in the research works. Furthermore, the handover rate is considered for performance evaluation for the handover techniques in 5G. The drawbacks present in the existing review papers are elaborated in research gaps and issues division.

Findings

Through the detailed analysis and discussion, it can be summarized that the widely concerned evaluation metric for the performance evaluation is the handover rate. It is exploited that the handover rate within the range of 91%–99% is achieved by three research papers.

Originality/value

A survey on the various handover mechanisms in 5G networks is expected in this study. The research papers used in this survey are gathered from different sources such as Google Scholar and IEEE. Also, this survey suggests a further extension for the handover mechanism in 5G networks by considering various research gaps and issues.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 17 January 2020

Do Xuan Luan

The purpose of this paper is to investigate borrowing motivation, credit access barriers and their impacts on income of smallholder farmers engaging in cinnamon value chain…

Abstract

Purpose

The purpose of this paper is to investigate borrowing motivation, credit access barriers and their impacts on income of smallholder farmers engaging in cinnamon value chain development in Northwestern Vietnam.

Design/methodology/approach

A multistage sampling technique using a structural questionnaire and in-depth interviews was applied for collecting primary data from farmers and relevant stakeholders. The Propensity Score Matching was employed to analyze access barriers and examine whether relaxing these barriers can improve farmer income. To deal with the issue of model uncertainty and further increase the robustness of results, Bayesian model average and the bootstrapping approach were applied.

Findings

To fulfill the certain quality standards of cinnamon products which are later used in the medicinal and food industry, farmers as primary producers need credit for intensive investment to increase the value of their products. Still, there are 25.36 percent of farmers who have access constraints to formal credit. In the credit received group, 24.56 percent have not received full credit as demanded. Access problems are relevant to lack of collateral, lack of bank account holdings, inconvenient access to roads, weak chain linkage and limited organic farming. Removing credit access barriers can improve the income for farmers from cinnamon farming activities.

Research limitations/implications

More detailed information on the conditions under which credit serves a more important role in creating value addition for cinnamon products can help the government establish more effective credit policies.

Social implications

Great attention should be paid to smallholder farmers as primary producers in the chain for sustainable value chain development in developing and emerging economies. Policy interventions should facilitate access to bank accounts, speed up the process of granting residential land use certificates, certify organic farming and upgrade the road system. Strengthening the chain linkage can enhance smallholder farmers’ capacity to obtain credit through value chain lending development.

Originality/value

Empirical studies on agricultural credit from the perspective of value chain development remain scarce. A better understanding of credit access constraints allows for the positing of recommendations for policy makers to facilitate value chain lending and a medicinal plant-based agro-forestry system in similar situations.

Details

Journal of Agribusiness in Developing and Emerging Economies, vol. 10 no. 2
Type: Research Article
ISSN: 2044-0839

Keywords

Article
Publication date: 9 November 2015

Rebecca Mary Marsh

This paper aims to uncover the central purposes of institutional repositories, how developments are being affected by policies and researcher behaviour and also what services and…

3176

Abstract

Purpose

This paper aims to uncover the central purposes of institutional repositories, how developments are being affected by policies and researcher behaviour and also what services and approaches are appropriate in supporting repositories from those partners involved in scholarly communication with a particular focus on services that support the publication of research.

Design/methodology/approach

The research reviews the literature and current practices within higher education with regard to the core purposes of institutional repositories, the possible causes of low population of repositories in some institutions and subject disciplines, how this is being addressed and likely future developments. A qualitative survey using semi-structured interviews explores current best practices and tests the specific research questions that emerged from the literature review.

Findings

The rate at which institutional repositories have grown in number has been very fast in recent years, but the population of repositories with research has been relatively slow. The research identified a number of reasons as to why the population of repositories was likely to accelerate in the future and have a more significant impact on scholarly communication. The main catalysts are: strengthening of national and funder policies that serve to both mandate open access (green or gold) and raise awareness of open access amongst faculty; the alignment of repositories with current research information systems within universities; and the development of metadata and open archives initiative harvesting that will improve discoverability and usage data.

Research limitations/implications

As many of the issues around the development of repositories centre on the attitudes of faculty, it would also provide an interesting extension to the research to understand their views of the role of institutional repositories, too.

Practical implications

The study presents a number of possible new ways of working by both information professionals and publishers to improve scholarly communication through the inclusion of research within institutional repositories and how perceived barriers could be overcome.

Social implications

The study provides guidance on how the communication of scholarly research could be improved and reach a wider audience. This, in turn, will benefit researchers, corporate organisations and the public at large.

Originality/value

The paper provides a review of current best practices in managing institutional repositories and identifies new ways of addressing some of the perceived barriers to populating repositories and the benefits for each stakeholder in the scholarly communication process.

Details

OCLC Systems & Services: International digital library perspectives, vol. 31 no. 4
Type: Research Article
ISSN: 1065-075X

Keywords

Article
Publication date: 18 October 2018

Ria Christine Siagian and Jorge Emilio Osorio

The purpose of this paper is to identify, analyze and describe the novel approaches that affect vaccine development in lower-middle income countries (LMICs).

Abstract

Purpose

The purpose of this paper is to identify, analyze and describe the novel approaches that affect vaccine development in lower-middle income countries (LMICs).

Design/methodology/approach

The vaccine market in LMICs currently focuses on traditional Expanded Program for Immunization vaccines instead of new ones. Unlike the successful introduction of those traditional vaccines, the introduction of new vaccines appears to be very slow, mainly due to financial issues. This paper systematically reviews a set of published papers on vaccine development and analyzes them against a specific region-setting framework.

Findings

Public–private partnership alone could not ensure long-term vaccine sustainability. Several factors that encourage domestic vaccine development were identified. The findings demonstrate that the regulatory approach of hybrid collaboration and market opportunity strategies can be a major breakthrough for domestic vaccine development in LMICs.

Research limitations/implications

Further research is required to include qualitative and quantitative methods for policy analysis, as all of the discussion in this research focused on literature reviews. The authors did not discuss how strategic decisions are affected from a political perspective and this needs to be specified in future research. Think tanks, considerably and fundamentally, affect policy ideas and decisions. However, important breakthroughs continue to be made at the same time.

Social implications

The development of vaccines in LMICs is expected to be a mechanism to overcome the inadequate access to vaccines in those countries, as solving this problem requires tackling issues from both the supply and demand sides.

Originality/value

This is a literature review that creates recommendation and approaches for domestic vaccine development in LMICs. This review aims to encourage LMICs to produce their own vaccines for sustainability of the vaccine access through vaccine development lifecycle, instead of expecting donor that provides funding and vaccines (vaccine access) in certain period of time. Donor is not always the solution for the problem, since vaccine development requires finance to function infrastructure. There are many efforts in revoking this, including World Health Organization through several reports; however, this effort still has many doubts. Therefore, the article would like to try to see this as a viable solution from the policy perspectives, with several examples to make recommendations more practical.

Details

International Journal of Health Governance, vol. 23 no. 4
Type: Research Article
ISSN: 2059-4631

Keywords

1 – 10 of over 215000