Search results

1 – 10 of over 4000
Article
Publication date: 31 July 2020

Lurdes D. Patrício and João J. Ferreira

The continuous presence and intensity of the Internet of things (IoT) in our lives and the risk of security breaches in traditional transactional and financial platforms are the…

Abstract

Purpose

The continuous presence and intensity of the Internet of things (IoT) in our lives and the risk of security breaches in traditional transactional and financial platforms are the major cause of personal and organizational data losses. Blockchain emerges as a promised technology to ensure higher levels of data encryption and security. Thus, this study aims to develop a systematic literature review analyzing the previous literature and to purpose of a framework to better understand the process of blockchain security.

Design/methodology/approach

The 75 articles reviewed were obtained through the Scopus database and a bibliographic-coupling analysis was developed to identify the main themes of this research area, via VOSviewer software.

Findings

The results enable the categorization of the existing literature revealing four clusters: 1) feasibility, 2) fintech and cryptocurrency, 3) data trust and share and 4) applicability. Blockchain technology is still in its early stage of development and counting on researchers in security and cryptography to take it further to new highs, to allow its applicability to different areas and in long-term scenarios.

Originality/value

This systematic literature creates a base to reduce the blockchain security literature gap. In addition, it provides a framework that enables the scientific community to access the main subjects discussed and the articulation between concepts. Furthermore, it enhances the state-of-the-art literature on blockchain security and proposes a future research agenda.

Details

Journal of Advances in Management Research, vol. 18 no. 1
Type: Research Article
ISSN: 0972-7981

Keywords

Article
Publication date: 2 August 2021

Mazen El-Masri and Eiman Mutwali Abdelmageed Hussain

Blockchain is evolving to become a platform for securing Internet of things (IoT) ecosystems. Still, challenges remain. The purpose of this literature review is to highlight the…

830

Abstract

Purpose

Blockchain is evolving to become a platform for securing Internet of things (IoT) ecosystems. Still, challenges remain. The purpose of this literature review is to highlight the applicability of blockchain as a medium to secure IoT ecosystems. A two-dimensional framework anchored on (1) IoT layers and (2) security goals is used to organize the existent IoT security threats and their corresponding countermeasures identified in the reviewed literature. The framework helped in mapping the IoT security threats with the inherent features of blockchain and accentuate their prominence to IoT security.

Design/methodology/approach

An approach integrating computerized natural language processing (NLP) with a systematic literature review methodology was adopted. A large corpus of 2,303 titles and abstracts of blockchain articles was programmatically analyzed in order to identify the relevant literature. The identified literature was subjected to a systematic review guided by a well-established method in IS research.

Findings

The literature evidently highlights the prominence of blockchain as a mean to IoT security due to the distinctive features it encompasses. The authors’ investigation revealed that numerous existent threats are better addressed with blockchain than conventional mechanisms. Nevertheless, blockchain consumes resources such as electricity, time, bandwidth and disk space at a rate that is not yet easily accessible to common IoT ecosystems.

Research limitations/implications

Results suggest that a configurational approach that aligns IoT security requirements with the resource requirements of different blockchain features is necessary in order to realize the proper balance between security, efficiency and feasibility.

Practical implications

Practitioners can make use of the classified lists of convention security mechanisms and the IoT threats they address. The framework can help underline the countermeasures that best achieve their security goals. Practitioners can also use the framework to identify the most important features to seek for in a blockchain technology that can help them achieve their security goals.

Originality/value

This study proposes a novel framework that can help classify IoT threats based on the IoT layer impacted and the security goal at risk. Moreover, it applies a combined man-machine approach to systematically analyze the literature.

Details

Journal of Enterprise Information Management, vol. 34 no. 5
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 13 March 2020

Gaki Tshering and Shang Gao

The purpose of the research is to assess security concerns in government's use of Blockchain technology through the lens of value focused thinking (VFT) approach.

Abstract

Purpose

The purpose of the research is to assess security concerns in government's use of Blockchain technology through the lens of value focused thinking (VFT) approach.

Design/methodology/approach

Qualitative methods such as open ended questions and interviews were used to gather data and the data was analysed in a structured approach to formulate a means-ends network of objectives. The data were collected from eight interviews of selected participants.

Findings

The findings are 35 objectives of which ten are fundamental objectives related to the values of identity, trust, data privacy, transparency, integrity, public service delivery, cost, availability of public information, responsibility and usability.

Practical implications

The study implies that governments or private organisations building blockchain solutions for governments can benefit from insights on values to focus on in blockchain security; and the current research serves as a base to understand more on blockchain use in the governments as well as security values and application of VFT approach for future academic researchers in this area.

Social implications

It is a need-driven approach in which blockchain is assessed to ensure its fit to societal needs and public values.

Originality/value

It is first of its kind in studying security in blockchain use by government through the lens of VFT approach, and it provides insights of values that are of importance to further blockchain use in the government.

Details

Journal of Enterprise Information Management, vol. 33 no. 3
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 22 March 2024

Ghulam Mustafa, Waqas Rafiq, Naveed Jhamat, Zeeshan Arshad and Farhana Aziz Rana

This study aims to evaluate blockchain as an e-government governance model. It assesses its alignment with legal frameworks, emphasizing robustness against disruptions and…

Abstract

Purpose

This study aims to evaluate blockchain as an e-government governance model. It assesses its alignment with legal frameworks, emphasizing robustness against disruptions and adherence to existing laws.

Design/methodology/approach

The paper explores blockchain’s potential in e-government, focusing on legal, ethical and governance aspects. It conducts an in-depth analysis of blockchain’s integration into data governance, emphasizing legal compliance and resilient security protocols.

Findings

The study comprehensively evaluates blockchain’s implementation, covering privacy, interoperability, consensus mechanisms, scalability and regulatory alignment. It highlights governance’s critical role in ensuring legal compliance within blockchain paradigms.

Research limitations/implications

Ethical and legal concerns arising from blockchain adoption remain unresolved. The study underscores how blockchain challenges its core principles of anonymity and decentralization in e-government settings.

Practical implications

The framework outlined offers potential for diverse technological environments, albeit raising ethical and legal queries. It emphasizes governance’s pivotal role in achieving legal compliance in blockchain adoption.

Social implications

Blockchain’s impact on legal and ethical facets necessitates further exploration to align with its core principles while addressing governance in e-government settings.

Originality/value

This study presents a robust framework for assessing blockchain’s viability in e-government, emphasizing legal compliance, despite ethical and legal intricacies that challenge its fundamental principles.

Details

International Journal of Law and Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 5 June 2020

Donghee Shin and Yujong Hwang

This study takes an affordance approach to explain how users perceive the affordance of user action within blockchain and examines how it influences the subsequent user…

1429

Abstract

Purpose

This study takes an affordance approach to explain how users perceive the affordance of user action within blockchain and examines how it influences the subsequent user experience. Focusing on the effect of trust on cognitive processes, the authors analyze how affordances in blockchains affect the user experience.

Design/methodology/approach

The blockchain affordances are examined through a two-stage process. The authors employ a qualitative analysis based on insights gained from the current literature and interviews. The authors then apply a quantitative survey to examine the role of trust in interactions with blockchain services. A structural user model was tested in which their appreciation of affordances of blockchain predicted the trust and satisfaction.

Findings

Users' appreciation for transparency and reliability explained to what extent they trust and are satisfied, thereby suggesting the heuristic roles of trust in blockchains. The study findings indicate a heuristic role for trust regarding underlying links to technological and affective affordances. A user's cognitive heuristics affect their attitudes toward blockchain, in which technological features are processed through users' perceptions and experience.

Research limitations/implications

The model contributes to the conceptualization of security, privacy and traceability along with trust, which is then linked to transparency and reliability. The findings show how the frame of affordances gains explanatory power by being linked to the concepts of affect and emotion. The heuristics of direct perception of security–traceability–privacy (STP) can be used to understand the trajectory of heuristics and ongoing choices of blockchain.

Practical implications

The study results offer a lens through which to address the technology's most common problems by pairing user experience principles and heuristics to blockchain technologies. This study offers insights into the understanding of user actions related to blockchains and into practical implications for developing trust-based services. The results guide the application and tailoring of motivational affordances in blockchain.

Originality/value

While blockchain technology has gained popularity and momentum, there has been little research on how specific features of blockchain technology create value. This study contributes to the research gap by highlighting the role and dimension of trust in relation to STP in blockchains and provides meaningful implications for theory and practice.

Details

Online Information Review, vol. 44 no. 4
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 20 January 2021

Pei Xu, Joonghee Lee, James R. Barth and Robert Glenn Richey

This paper discusses how the features of blockchain technology impact supply chain transparency through the lens of the information security triad (confidentiality, integrity and…

4045

Abstract

Purpose

This paper discusses how the features of blockchain technology impact supply chain transparency through the lens of the information security triad (confidentiality, integrity and availability). Ultimately, propositions are developed to encourage future research in supply chain applications of blockchain technology.

Design/methodology/approach

Propositions are developed based on a synthesis of the information security and supply chain transparency literature. Findings from text mining of Twitter data and a discussion of three major blockchain use cases support the development of the propositions.

Findings

The authors note that confidentiality limits supply chain transparency, which causes tension between transparency and security. Integrity and availability promote supply chain transparency. Blockchain features can preserve security and increase transparency at the same time, despite the tension between confidentiality and transparency.

Research limitations/implications

The research was conducted at a time when most blockchain applications were still in pilot stages. The propositions developed should therefore be revisited as blockchain applications become more widely adopted and mature.

Originality/value

This study is among the first to examine the way blockchain technology eases the tension between supply chain transparency and security. Unlike other studies that have suggested only positive impacts of blockchain technology on transparency, this study demonstrates that blockchain features can influence transparency both positively and negatively.

Details

International Journal of Physical Distribution & Logistics Management, vol. 51 no. 3
Type: Research Article
ISSN: 0960-0035

Keywords

Book part
Publication date: 16 January 2023

Hugo Benedetti and Gabriel Rodríguez-Garnica

Tokenization is a relatively new activity in digital finance. Tokenization, a process that creates a blockchain representation of the underlying instrument, can enhance the…

Abstract

Tokenization is a relatively new activity in digital finance. Tokenization, a process that creates a blockchain representation of the underlying instrument, can enhance the standard features and characteristics of assets and securities. Asset and security tokenization produces many benefits. These benefits include reducing issuance and trading costs, lessening dependency on intermediaries, facilitating more liquidity in markets, and providing greater transparency around an asset’s lifecycle for all parties involved. This chapter synthesizes the key characteristics, benefits, processes, tools, and techniques of tokenizing real-world assets. It also provides several examples of current asset-backed token applications to help understand the rapidly growing industry and analyzes future expectations of this new technology.

Details

The Emerald Handbook on Cryptoassets: Investment Opportunities and Challenges
Type: Book
ISBN: 978-1-80455-321-3

Keywords

Book part
Publication date: 15 May 2023

Seval Kardes Selimoglu and Mustafa Hakan Saldi

Purpose: The study is designed to investigate internal audit functions in banks’ cyber security governance processes by assessing the pros and cons of blockchain technology…

Abstract

Purpose: The study is designed to investigate internal audit functions in banks’ cyber security governance processes by assessing the pros and cons of blockchain technology through swot analysis.

Need of the Study: The study is needed to clarify the complexities in internal audit fields integrated into cyber security governance and explore the blockchain application opportunities.

Methodology: Blockchain technology is explored from the point of technical concepts and policy framework by swot analysis to propose a set of solutions for continuous audit methods in cyber security governance.

Limitations: The sample of this study is limited to the personal ideas and evaluations of academicians, experts in the banking sector and legal regulators of Türkiye, with the data received between March and December 2021.

Findings: Blockchain technology can be applied as an alternative to conventional risk control methods as a mechanism of continuous audit methods to reduce human mistakes and special causes.

Practical Implications: The control of risk management operations for cyber security processes should be performed with the support of audit units of the banks. Therefore, innovations are being implemented to cyber-risk controls to drop the defects that cause technical and ethical issues with blockchain technology as a way of using automation. So, this advancement can be applied in audit operations practically for unanticipated events which can emerge in cyberspace to mitigate inherent risk to residual levels. However, there is ample room to adapt this technology for cyber security management and audit practices from the point of view of the labour force, regulations and environmental issues.

Details

Contemporary Studies of Risks in Emerging Technology, Part B
Type: Book
ISBN: 978-1-80455-567-5

Keywords

Article
Publication date: 16 March 2021

Y.P. Tsang, C.H. Wu, W.H. Ip and Wen-Lung Shiau

Due to the rapid growth of blockchain technology in recent years, the fusion of blockchain and the Internet of Things (BIoT) has drawn considerable attention from researchers and…

1109

Abstract

Purpose

Due to the rapid growth of blockchain technology in recent years, the fusion of blockchain and the Internet of Things (BIoT) has drawn considerable attention from researchers and industrial practitioners and is regarded as a future trend in technological development. Although several authors have conducted literature reviews on the topic, none have examined the development of the knowledge structure of BIoT, resulting in scattered research and development (R&D) efforts.

Design/methodology/approach

This study investigates the intellectual core of BIoT through a co-citation proximity analysis–based systematic review (CPASR) of the correlations between 44 highly influential articles out of 473 relevant research studies. Subsequently, we apply a series of statistical analyses, including exploratory factor analysis (EFA), hierarchical cluster analysis (HCA), k-means clustering (KMC) and multidimensional scaling (MDS) to establish the intellectual core.

Findings

Our findings indicate that there are nine categories in the intellectual core of BIoT: (1) data privacy and security for BIoT systems, (2) models and applications of BIoT, (3) system security theories for BIoT, (4) frameworks for BIoT deployment, (5) the fusion of BIoT with emerging methods and technologies, (6) applied security strategies for using blockchain with the IoT, (7) the design and development of industrial BIoT, (8) establishing trust through BIoT and (9) the BIoT ecosystem.

Originality/value

We use the CPASR method to examine the intellectual core of BIoT, which is an under-researched and topical area. The paper also provides a structural framework for investigating BIoT research that may be applicable to other knowledge domains.

Details

Journal of Enterprise Information Management, vol. 34 no. 5
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 26 March 2024

Yingjie Ju, Jianliang Yang, Jingping Ma and Yuehang Hou

The objective of this study is to explore the impact of a government-supported initiative for operational security, specifically the establishment of the national security

60

Abstract

Purpose

The objective of this study is to explore the impact of a government-supported initiative for operational security, specifically the establishment of the national security emergency industry demonstration base, on the profitability of local publicly traded companies. Additionally, the study investigates the significance of firms' blockchain strategies and technologies within this framework.

Design/methodology/approach

Using the differences-in-differences (DID) approach, this study evaluates the impact of China's national security emergency industry demonstration bases (2015–2022) on the profitability of local firms. Data from the China Research Data Service (CNRDS) platform and investor Q&As informed our analysis of firms' blockchain strategy and technology, underpinned by detailed data collection and a robust DID model.

Findings

Emergency industry demonstration bases have notably boosted enterprise profitability in both return on assets (ROA) and return on equity (ROE). Companies adopting blockchain strategies and operational technology see a clear rise in profitability over non-blockchain peers. Additionally, the technical operation of blockchain presents a more pronounced advantage than at the strategic level.

Originality/value

We introduced a new perspective, emphasizing the enhancement of corporate operational safety and financial performance through the pathway of emergency industry policies, driven by the collaboration between government and businesses. Furthermore, we delved into the potential application value of blockchain strategies and technologies in enhancing operational security and the emergency industry.

Details

Industrial Management & Data Systems, vol. 124 no. 4
Type: Research Article
ISSN: 0263-5577

Keywords

1 – 10 of over 4000