Search results

1 – 10 of 129
Article
Publication date: 19 May 2022

Priyanka Kumari Bhansali, Dilendra Hiran, Hemant Kothari and Kamal Gulati

The purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and progresses…

Abstract

Purpose

The purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and progresses the ease of use, leading to a surge in the number of enterprises and individuals storing data in the cloud. Cloud services are used by various organizations (education, medical and commercial) to store their data. In the health-care industry, for example, patient medical data is outsourced to a cloud server. Instead of relying onmedical service providers, clients can access theirmedical data over the cloud.

Design/methodology/approach

This section explains the proposed cloud-based health-care system for secure data storage and access control called hash-based ciphertext policy attribute-based encryption with signature (hCP-ABES). It provides access control with finer granularity, security, authentication and user confidentiality of medical data. It enhances ciphertext-policy attribute-based encryption (CP-ABE) with hashing, encryption and signature. The proposed architecture includes protection mechanisms to guarantee that health-care and medical information can be securely exchanged between health systems via the cloud. Figure 2 depicts the proposed work's architectural design.

Findings

For health-care-related applications, safe contact with common documents hosted on a cloud server is becoming increasingly important. However, there are numerous constraints to designing an effective and safe data access method, including cloud server performance, a high number of data users and various security requirements. This work adds hashing and signature to the classic CP-ABE technique. It protects the confidentiality of health-care data while also allowing for fine-grained access control. According to an analysis of security needs, this work fulfills the privacy and integrity of health information using federated learning.

Originality/value

The Internet of Things (IoT) technology and smart diagnostic implants have enhanced health-care systems by allowing for remote access and screening of patients’ health issues at any time and from any location. Medical IoT devices monitor patients’ health status and combine this information into medical records, which are then transferred to the cloud and viewed by health providers for decision-making. However, when it comes to information transfer, the security and secrecy of electronic health records become a major concern. This work offers effective data storage and access control for a smart healthcare system to protect confidentiality. CP-ABE ensures data confidentiality and also allows control on data access at a finer level. Furthermore, it allows owners to set up a dynamic patients health data sharing policy under the cloud layer. hCP-ABES proposed fine-grained data access, security, authentication and user privacy of medical data. This paper enhances CP-ABE with hashing, encryption and signature. The proposed method has been evaluated, and the results signify that the proposed hCP-ABES is feasible compared to other access control schemes using federated learning.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Open Access
Article
Publication date: 9 October 2023

Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are…

1076

Abstract

Purpose

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are increasingly used in security-critical domains. Current survey works on databases and data security only consider authorization and access control in a very general way and do not regard most of today’s sophisticated requirements. Accordingly, the purpose of this paper is to discuss authorization and access control for relational and NoSQL database models in detail with respect to requirements and current state of the art.

Design/methodology/approach

This paper follows a systematic literature review approach to study authorization and access control for different database models. Starting with a research on survey works on authorization and access control in databases, the study continues with the identification and definition of advanced authorization and access control requirements, which are generally applicable to any database model. This paper then discusses and compares current database models based on these requirements.

Findings

As no survey works consider requirements for authorization and access control in different database models so far, the authors define their requirements. Furthermore, the authors discuss the current state of the art for the relational, key-value, column-oriented, document-based and graph database models in comparison to the defined requirements.

Originality/value

This paper focuses on authorization and access control for various database models, not concrete products. This paper identifies today’s sophisticated – yet general – requirements from the literature and compares them with research results and access control features of current products for the relational and NoSQL database models.

Details

International Journal of Web Information Systems, vol. 20 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 17 August 2021

Abir Al-Harrasi, Abdul Khalique Shaikh and Ali Al-Badi

One of the most important Information Security (IS) concerns nowadays is data theft or data leakage. To mitigate this type of risk, organisations use a solid infrastructure and…

1143

Abstract

Purpose

One of the most important Information Security (IS) concerns nowadays is data theft or data leakage. To mitigate this type of risk, organisations use a solid infrastructure and deploy multiple layers of security protection technology and protocols such as firewalls, VPNs and IPsec VPN. However, these technologies do not guarantee data protection, and especially from insiders. Insider threat is a critical risk that can cause harm to the organisation through data theft. The main purpose of this study was to investigate and identify the threats related to data theft caused by insiders in organisations and explore the efforts made by them to control data leakage.

Design/methodology/approach

The study proposed a conceptual model to protect organisations’ data by preventing data theft by malicious insiders. The researchers conducted a comprehensive literature review to achieve the objectives of this study. The collection of the data for this study is based on earlier studies conducted by several researchers from January 2011 to December 2020. All the selected literature is from journal articles, conference articles and conference proceedings using various databases.

Findings

The study revealed three main findings: first, the main risks inherent in data theft are financial fraud, intellectual property theft, and sabotage of IT infrastructure. Second, there are still some organisations that are not considering data theft by insiders as being a severe risk that should be well controlled. Lastly, the main factors motivating the insiders to perform data leakage activities are financial gain, lack of fairness and justice in the workplace, the psychology or characteristics of the insiders, new technologies, lack of education and awareness and lack of management tools for understanding insider threats.

Originality/value

The study provides a holistic view of data theft by insiders, focusing on the problem from an organisational point of view. Organisations can therefore take into consideration our recommendations to reduce the risks of data leakage by their employees.

Details

International Journal of Organizational Analysis, vol. 31 no. 3
Type: Research Article
ISSN: 1934-8835

Keywords

Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

6399

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 18 April 2023

Solomon Hopewell Kembo, Patience Mpofu, Saulo Jacques, Nevil Chitiyo and Brighton Mukorera

Coronavirus Disease 2019 (COVID-19) necessitated the need for “Hospital-at-home” improvisations that involve wearable technology to classify patients within households before…

Abstract

Purpose

Coronavirus Disease 2019 (COVID-19) necessitated the need for “Hospital-at-home” improvisations that involve wearable technology to classify patients within households before visiting health institutions. Do-It-Yourself wearable devices allow for the collection of health data leading to the detection and/or prediction of the prevalence of the disease. The sensitive nature of health data requires safeguards to ensure patients’ privacy is not violated. The previous work utilized Hyperledger Fabric to verify transmitted data within Smart Homes, allowing for the possible implementation of legal restrictions through smart contracts in the future. This study aims to explore privacy-enhancing authentication schemes that are operated by multiple credential issuers and capable of integration into the Hyperledger ecosystem.

Design/methodology/approach

Design Science Research is the methodology that was used in this study. An architecture for ABC-privacy was developed and evaluated.

Findings

While the privacy-by-design architecture enhances data privacy through edge and fog computing architecture, there is a need to provide an additional privacy layer that limits the amount of data that patients disclose. Selective disclosure of credentials limits the number of information patients or devices divulge.

Originality/value

The evaluation of this study identified Coconut as the most suitable attribute-based credentials scheme for the Smart Homes Patients and Health Wearables use case Coconut user-centric architecture Hyperledger integration multi-party threshold authorities public and private attributes re-randomization and unlinkable revelation of selective attribute revelations.

Details

International Journal of Industrial Engineering and Operations Management, vol. 5 no. 2
Type: Research Article
ISSN: 2690-6090

Keywords

Article
Publication date: 9 November 2022

David E. Cavazos, Matthew Rutherford and Triss Ashton

This study aims to examine the implications of short-term and long-term reputation change because of government agency responses to firm product defects.

Abstract

Purpose

This study aims to examine the implications of short-term and long-term reputation change because of government agency responses to firm product defects.

Design/methodology/approach

This study’s findings have important implications for both scholars and practitioners. From a scholarly perspective, the authors create a more fine-grained examination of reputation that may be used to assess various performance dimensions. From a practice perspective, managers must realize that reputation can be one of an organization’s most important resources as it meets each of the valuable, rare, inimitable and nonsubstitutable criteria associated with those resources capable of providing sustainable competitive advantage.

Findings

Analysis of 17,879 product recalls from 15 automobile manufacturers in the US suggests that firms with higher long-term reputations are more likely to face regulator sanctions when a reputation-damaging event happens. On the other hand, firms with higher short-term reputations are less likely to face sanctions in such circumstances. Finally, firms whose short-term reputation exceeds their long-term reputation are less likely to be sanctioned by regulators when reputation-damaging events occur.

Research limitations/implications

There are several limitations that should be addressed. First, as our reputation measure is based on government investigations of potential defects, vehicles that have never been inspected are not included in the sample. Although this number is likely extremely low, omitting vehicles that have never been inspected leaves out some high-reputation firms from the sample. In addition, the study relies on a single-firm stakeholder that is capable of punitive actions.

Practical implications

From a practical perspective, this study’s findings encourage managers to think about the temporal aspects associated with firm reputation, and to realize that stakeholders may react differently when their expectations are not met depending on an organization’s relative long- and short-term reputations. From a theoretic perspective, the primary contribution of this study is to illustrate how long-term and short-term changes in reputation can provide mixed signals to firm stakeholders regarding future performance.

Originality/value

This study explores the temporal aspects of firm reputation by examining how government sanctions vary depending on firms’ long-term (10 years) and short-term (1 year) reputation. The findings of this study contribute to current reputation research by illustrating the variation in government responses to product defects as a function of short-term and long-term reputation. In doing so, the important role of the timing of firm performance is considered.

Details

International Journal of Organizational Analysis, vol. 31 no. 7
Type: Research Article
ISSN: 1934-8835

Keywords

Article
Publication date: 7 September 2023

Haiyi Zong, Guangbin Wang and Dongping Cao

As the foundation of social and economic development, infrastructure development projects are characterized by large initial investment, high technical requirements and thus…

Abstract

Purpose

As the foundation of social and economic development, infrastructure development projects are characterized by large initial investment, high technical requirements and thus generally delivered through complex contractor–subcontractor collaboration chains. This study aims to characterize the complexity of collaborative networks between contractors and subcontractors for infrastructure development through comparing the structural characteristics and the formation mechanisms of contractor–subcontractor collaborative networks for the following two different types of infrastructure: public works (PWCN) owned and operated by government agencies, and public utilities (PUCN) owned and operated by nongovernment agencies.

Design/methodology/approach

Based on the method of stochastic actor-oriented models and the longitudinal dataset of National Quality Award Projects in China during 2001–2020, this study compares how the structural characteristics of project-based collaborative networks between contractors and subcontractors for the two types of projects are different and how related micro-mechanisms, including both structure-based endogenous network effects and attribute-based exogenous homophily effects (institutional, organizational and geographical homophily), collectively underpin the formation of the networks.

Findings

The empirical results provide evidence that while the two networks are both characterized by relatively low levels of network density, PWCN is more globally connected around a minority of superconnected contractors as compared with PUCN. The results further reveal that compared with PUCN, the formation of PWCN is more significantly related to the structure-based anti in-isolates effect, suggesting that PWCN is more open for new entrant subcontractors. With regard to the attribute-based homophily effects, the results provide evidence that while both significantly and positively related to the effects of organizational (same company group) and geographical homophily (same location), the formation of PWCN and PUCN is oppositely driven by the institutional homophily effect (same ownership type).

Originality/value

As an exploratory effort of using network perspective to investigate the formation mechanisms of contractor–subcontractor relationships in the infrastructure development domain, this study contributes to a network and self-organizing system view of how contractors select subcontractors in different types of infrastructure projects. The study also provides insights into how contractor–subcontractor collaborative relationships can be better manipulated to promote the development of complex infrastructure in different contexts.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 11 July 2022

Abdul Habib Zaray, Abid Hasan, Sparsh Johari, Parvez Ahmad Hashmat and Kumar Neeraj Jha

The poor quality of construction work in war-affected regions is a significant issue. The large-scale destruction to the existing infrastructure from the war necessitates cost and…

Abstract

Purpose

The poor quality of construction work in war-affected regions is a significant issue. The large-scale destruction to the existing infrastructure from the war necessitates cost and time-efficient delivery of construction projects during and post-war to bring normalcy to affected lives and places. Consequently, there is always a tendency to finish construction projects in the shortest possible time on a limited budget without following the proper quality management processes. However, the poor quality of construction projects continues to affect the country's development, growth, credibility, reputation, and public safety for several years after the war. To this end, the present study was conducted to evaluate the significant attributes and factors contributing to the poor quality of construction projects in the war-affected Afghan construction sector.

Design/methodology/approach

A total of 31 attributes influencing construction project quality were ranked based on 110 completed survey responses collected from Afghan construction professionals. Moreover, independent samples t-test, Spearman's rank correlation test, and exploratory factor analysis were conducted.

Findings

The study found a moderate consensus between clients and contractors on attributes' rankings. In addition, the independent samples t-test showed statistically significant differences in means values of responses from clients and contractors for eight attributes. Based on factor analysis, 19 important attributes (median value greater than or equal to four) were classified into 4 latent factors – (1) poor-quality assurance and control, (2) unethical practices, (3) design and drawing errors, and (4) knowledge and skills gap.

Originality/value

Evaluating the factors affecting the quality of construction projects will help clients, government departments, and construction practitioners improve the construction quality management practices. The findings will also inform the policies and procedures of international aid providers.

Details

Engineering, Construction and Architectural Management, vol. 30 no. 10
Type: Research Article
ISSN: 0969-9988

Keywords

Book part
Publication date: 25 October 2023

Ali Katouzian Bolourforoush and Hamid Jahankhani

Banking traces back to 2000 BC in Assyria, India and Sumeria. Merchants used to give grain loans to farmers and traders to carry goods between cities. In ancient Greece and Roman…

Abstract

Banking traces back to 2000 BC in Assyria, India and Sumeria. Merchants used to give grain loans to farmers and traders to carry goods between cities. In ancient Greece and Roman Empire, lenders in temples, provided loans, and accepted deposits while performed change of money. The archaeological evidence uncovered in India and China corroborates this. The major development in banking came predominantly in the mediaeval, Renaissance Italy, with the major cities Florence, Venice and Genoa being the financial centres. Technology has become an inherent and integral part of our lives. We are generating a huge amount of data in transfer, storage and usage, with greater demands of ubiquitous accessibility, inducing an enormous impact on industry and society. With the emergence of smarter cities and societies, the security challenges pertinent to data become greater, impending impact on the consumer protection and security. The aim of this chapter is to highlight if SSI and passwordless authentication using FIDO-2 protocol assuage security concerns such as authentication and authorisation while preserving the individual's privacy.

Details

Technology and Talent Strategies for Sustainable Smart Cities
Type: Book
ISBN: 978-1-83753-023-6

Keywords

Article
Publication date: 1 May 2023

Elizabeth A. Cudney, Clair Reynolds Kueny and Susan L. Murray

As healthcare continues to become more expensive and complex, considering the voice of the patient in the design and operation of healthcare practices is important. Wound care and…

Abstract

Purpose

As healthcare continues to become more expensive and complex, considering the voice of the patient in the design and operation of healthcare practices is important. Wound care and rural healthcare scenarios pose additional complexities for providers and patients. This study sought to identify key determinants of patient service quality in wound care.

Design/methodology/approach

Patients at the wound care/ostomy clinic (WOC) in a rural hospital were surveyed using the Kano model. The Kano model enables the categorization of quality attributes based on the attributes' contribution to the subject's overall satisfaction (and dissatisfaction). Chi-square goodness-of-fit testing, multinomial analysis and power analysis were then used to determine the Kano categories for each satisfaction-related attribute.

Findings

The analyses resulted in 14 one-dimensional attributes and 3 indeterminable attributes. For the one-dimensional attributes, customer satisfaction is directly proportional to the level of performance for that attribute. The one-dimensional attributes included providing correct care on the first, provision of necessary supplies for care, appropriately qualified medical staff and confidence in care provided by medical staff, among others. Understanding the attributes important to the patient drive patient-centered care, which improves positive patient outcomes and recovery. These attributes can then be used by healthcare professionals to design patient-centric processes and services. This research provides a framework for incorporating the voice of the patient into healthcare services.

Research limitations/implications

While the research methodology can be used in other healthcare settings, the findings are not generalizable to other wound care clinics. This research was conducted in one small, rural hospital. In addition, the sample size was small due to the size of the wound clinic; therefore, an analysis of the differences between demographics could not be performed.

Practical implications

Considering the perspectives of rural wound care patients is important, as the patients are an under-served population with unique challenges related to patient care. The research findings detail rural patients' expectations during wound care treatments, which enable the clinic to focus on improving patient satisfaction. This research contributes to understanding the factors that are important to patient satisfaction in wound care. Further, the methodology presented can be applied to other healthcare settings.

Originality/value

While studies exist using the Kano model in healthcare and the literature is sparse in rural healthcare, this is the first case study using the Kano model in wound care to understand patient preferences.

Details

The TQM Journal, vol. 36 no. 4
Type: Research Article
ISSN: 1754-2731

Keywords

1 – 10 of 129