Search results
1 – 10 of over 4000Lurdes D. Patrício and João J. Ferreira
The continuous presence and intensity of the Internet of things (IoT) in our lives and the risk of security breaches in traditional transactional and financial platforms are the…
Abstract
Purpose
The continuous presence and intensity of the Internet of things (IoT) in our lives and the risk of security breaches in traditional transactional and financial platforms are the major cause of personal and organizational data losses. Blockchain emerges as a promised technology to ensure higher levels of data encryption and security. Thus, this study aims to develop a systematic literature review analyzing the previous literature and to purpose of a framework to better understand the process of blockchain security.
Design/methodology/approach
The 75 articles reviewed were obtained through the Scopus database and a bibliographic-coupling analysis was developed to identify the main themes of this research area, via VOSviewer software.
Findings
The results enable the categorization of the existing literature revealing four clusters: 1) feasibility, 2) fintech and cryptocurrency, 3) data trust and share and 4) applicability. Blockchain technology is still in its early stage of development and counting on researchers in security and cryptography to take it further to new highs, to allow its applicability to different areas and in long-term scenarios.
Originality/value
This systematic literature creates a base to reduce the blockchain security literature gap. In addition, it provides a framework that enables the scientific community to access the main subjects discussed and the articulation between concepts. Furthermore, it enhances the state-of-the-art literature on blockchain security and proposes a future research agenda.
Details
Keywords
Mazen El-Masri and Eiman Mutwali Abdelmageed Hussain
Blockchain is evolving to become a platform for securing Internet of things (IoT) ecosystems. Still, challenges remain. The purpose of this literature review is to highlight the…
Abstract
Purpose
Blockchain is evolving to become a platform for securing Internet of things (IoT) ecosystems. Still, challenges remain. The purpose of this literature review is to highlight the applicability of blockchain as a medium to secure IoT ecosystems. A two-dimensional framework anchored on (1) IoT layers and (2) security goals is used to organize the existent IoT security threats and their corresponding countermeasures identified in the reviewed literature. The framework helped in mapping the IoT security threats with the inherent features of blockchain and accentuate their prominence to IoT security.
Design/methodology/approach
An approach integrating computerized natural language processing (NLP) with a systematic literature review methodology was adopted. A large corpus of 2,303 titles and abstracts of blockchain articles was programmatically analyzed in order to identify the relevant literature. The identified literature was subjected to a systematic review guided by a well-established method in IS research.
Findings
The literature evidently highlights the prominence of blockchain as a mean to IoT security due to the distinctive features it encompasses. The authors’ investigation revealed that numerous existent threats are better addressed with blockchain than conventional mechanisms. Nevertheless, blockchain consumes resources such as electricity, time, bandwidth and disk space at a rate that is not yet easily accessible to common IoT ecosystems.
Research limitations/implications
Results suggest that a configurational approach that aligns IoT security requirements with the resource requirements of different blockchain features is necessary in order to realize the proper balance between security, efficiency and feasibility.
Practical implications
Practitioners can make use of the classified lists of convention security mechanisms and the IoT threats they address. The framework can help underline the countermeasures that best achieve their security goals. Practitioners can also use the framework to identify the most important features to seek for in a blockchain technology that can help them achieve their security goals.
Originality/value
This study proposes a novel framework that can help classify IoT threats based on the IoT layer impacted and the security goal at risk. Moreover, it applies a combined man-machine approach to systematically analyze the literature.
Details
Keywords
The purpose of the research is to assess security concerns in government's use of Blockchain technology through the lens of value focused thinking (VFT) approach.
Abstract
Purpose
The purpose of the research is to assess security concerns in government's use of Blockchain technology through the lens of value focused thinking (VFT) approach.
Design/methodology/approach
Qualitative methods such as open ended questions and interviews were used to gather data and the data was analysed in a structured approach to formulate a means-ends network of objectives. The data were collected from eight interviews of selected participants.
Findings
The findings are 35 objectives of which ten are fundamental objectives related to the values of identity, trust, data privacy, transparency, integrity, public service delivery, cost, availability of public information, responsibility and usability.
Practical implications
The study implies that governments or private organisations building blockchain solutions for governments can benefit from insights on values to focus on in blockchain security; and the current research serves as a base to understand more on blockchain use in the governments as well as security values and application of VFT approach for future academic researchers in this area.
Social implications
It is a need-driven approach in which blockchain is assessed to ensure its fit to societal needs and public values.
Originality/value
It is first of its kind in studying security in blockchain use by government through the lens of VFT approach, and it provides insights of values that are of importance to further blockchain use in the government.
Details
Keywords
Ghulam Mustafa, Waqas Rafiq, Naveed Jhamat, Zeeshan Arshad and Farhana Aziz Rana
This study aims to evaluate blockchain as an e-government governance model. It assesses its alignment with legal frameworks, emphasizing robustness against disruptions and…
Abstract
Purpose
This study aims to evaluate blockchain as an e-government governance model. It assesses its alignment with legal frameworks, emphasizing robustness against disruptions and adherence to existing laws.
Design/methodology/approach
The paper explores blockchain’s potential in e-government, focusing on legal, ethical and governance aspects. It conducts an in-depth analysis of blockchain’s integration into data governance, emphasizing legal compliance and resilient security protocols.
Findings
The study comprehensively evaluates blockchain’s implementation, covering privacy, interoperability, consensus mechanisms, scalability and regulatory alignment. It highlights governance’s critical role in ensuring legal compliance within blockchain paradigms.
Research limitations/implications
Ethical and legal concerns arising from blockchain adoption remain unresolved. The study underscores how blockchain challenges its core principles of anonymity and decentralization in e-government settings.
Practical implications
The framework outlined offers potential for diverse technological environments, albeit raising ethical and legal queries. It emphasizes governance’s pivotal role in achieving legal compliance in blockchain adoption.
Social implications
Blockchain’s impact on legal and ethical facets necessitates further exploration to align with its core principles while addressing governance in e-government settings.
Originality/value
This study presents a robust framework for assessing blockchain’s viability in e-government, emphasizing legal compliance, despite ethical and legal intricacies that challenge its fundamental principles.
Details
Keywords
This study takes an affordance approach to explain how users perceive the affordance of user action within blockchain and examines how it influences the subsequent user…
Abstract
Purpose
This study takes an affordance approach to explain how users perceive the affordance of user action within blockchain and examines how it influences the subsequent user experience. Focusing on the effect of trust on cognitive processes, the authors analyze how affordances in blockchains affect the user experience.
Design/methodology/approach
The blockchain affordances are examined through a two-stage process. The authors employ a qualitative analysis based on insights gained from the current literature and interviews. The authors then apply a quantitative survey to examine the role of trust in interactions with blockchain services. A structural user model was tested in which their appreciation of affordances of blockchain predicted the trust and satisfaction.
Findings
Users' appreciation for transparency and reliability explained to what extent they trust and are satisfied, thereby suggesting the heuristic roles of trust in blockchains. The study findings indicate a heuristic role for trust regarding underlying links to technological and affective affordances. A user's cognitive heuristics affect their attitudes toward blockchain, in which technological features are processed through users' perceptions and experience.
Research limitations/implications
The model contributes to the conceptualization of security, privacy and traceability along with trust, which is then linked to transparency and reliability. The findings show how the frame of affordances gains explanatory power by being linked to the concepts of affect and emotion. The heuristics of direct perception of security–traceability–privacy (STP) can be used to understand the trajectory of heuristics and ongoing choices of blockchain.
Practical implications
The study results offer a lens through which to address the technology's most common problems by pairing user experience principles and heuristics to blockchain technologies. This study offers insights into the understanding of user actions related to blockchains and into practical implications for developing trust-based services. The results guide the application and tailoring of motivational affordances in blockchain.
Originality/value
While blockchain technology has gained popularity and momentum, there has been little research on how specific features of blockchain technology create value. This study contributes to the research gap by highlighting the role and dimension of trust in relation to STP in blockchains and provides meaningful implications for theory and practice.
Details
Keywords
Pei Xu, Joonghee Lee, James R. Barth and Robert Glenn Richey
This paper discusses how the features of blockchain technology impact supply chain transparency through the lens of the information security triad (confidentiality, integrity and…
Abstract
Purpose
This paper discusses how the features of blockchain technology impact supply chain transparency through the lens of the information security triad (confidentiality, integrity and availability). Ultimately, propositions are developed to encourage future research in supply chain applications of blockchain technology.
Design/methodology/approach
Propositions are developed based on a synthesis of the information security and supply chain transparency literature. Findings from text mining of Twitter data and a discussion of three major blockchain use cases support the development of the propositions.
Findings
The authors note that confidentiality limits supply chain transparency, which causes tension between transparency and security. Integrity and availability promote supply chain transparency. Blockchain features can preserve security and increase transparency at the same time, despite the tension between confidentiality and transparency.
Research limitations/implications
The research was conducted at a time when most blockchain applications were still in pilot stages. The propositions developed should therefore be revisited as blockchain applications become more widely adopted and mature.
Originality/value
This study is among the first to examine the way blockchain technology eases the tension between supply chain transparency and security. Unlike other studies that have suggested only positive impacts of blockchain technology on transparency, this study demonstrates that blockchain features can influence transparency both positively and negatively.
Details
Keywords
Hugo Benedetti and Gabriel Rodríguez-Garnica
Tokenization is a relatively new activity in digital finance. Tokenization, a process that creates a blockchain representation of the underlying instrument, can enhance the…
Abstract
Tokenization is a relatively new activity in digital finance. Tokenization, a process that creates a blockchain representation of the underlying instrument, can enhance the standard features and characteristics of assets and securities. Asset and security tokenization produces many benefits. These benefits include reducing issuance and trading costs, lessening dependency on intermediaries, facilitating more liquidity in markets, and providing greater transparency around an asset’s lifecycle for all parties involved. This chapter synthesizes the key characteristics, benefits, processes, tools, and techniques of tokenizing real-world assets. It also provides several examples of current asset-backed token applications to help understand the rapidly growing industry and analyzes future expectations of this new technology.
Details
Keywords
Seval Kardes Selimoglu and Mustafa Hakan Saldi
Purpose: The study is designed to investigate internal audit functions in banks’ cyber security governance processes by assessing the pros and cons of blockchain technology…
Abstract
Purpose: The study is designed to investigate internal audit functions in banks’ cyber security governance processes by assessing the pros and cons of blockchain technology through swot analysis.
Need of the Study: The study is needed to clarify the complexities in internal audit fields integrated into cyber security governance and explore the blockchain application opportunities.
Methodology: Blockchain technology is explored from the point of technical concepts and policy framework by swot analysis to propose a set of solutions for continuous audit methods in cyber security governance.
Limitations: The sample of this study is limited to the personal ideas and evaluations of academicians, experts in the banking sector and legal regulators of Türkiye, with the data received between March and December 2021.
Findings: Blockchain technology can be applied as an alternative to conventional risk control methods as a mechanism of continuous audit methods to reduce human mistakes and special causes.
Practical Implications: The control of risk management operations for cyber security processes should be performed with the support of audit units of the banks. Therefore, innovations are being implemented to cyber-risk controls to drop the defects that cause technical and ethical issues with blockchain technology as a way of using automation. So, this advancement can be applied in audit operations practically for unanticipated events which can emerge in cyberspace to mitigate inherent risk to residual levels. However, there is ample room to adapt this technology for cyber security management and audit practices from the point of view of the labour force, regulations and environmental issues.
Details
Keywords
Y.P. Tsang, C.H. Wu, W.H. Ip and Wen-Lung Shiau
Due to the rapid growth of blockchain technology in recent years, the fusion of blockchain and the Internet of Things (BIoT) has drawn considerable attention from researchers and…
Abstract
Purpose
Due to the rapid growth of blockchain technology in recent years, the fusion of blockchain and the Internet of Things (BIoT) has drawn considerable attention from researchers and industrial practitioners and is regarded as a future trend in technological development. Although several authors have conducted literature reviews on the topic, none have examined the development of the knowledge structure of BIoT, resulting in scattered research and development (R&D) efforts.
Design/methodology/approach
This study investigates the intellectual core of BIoT through a co-citation proximity analysis–based systematic review (CPASR) of the correlations between 44 highly influential articles out of 473 relevant research studies. Subsequently, we apply a series of statistical analyses, including exploratory factor analysis (EFA), hierarchical cluster analysis (HCA), k-means clustering (KMC) and multidimensional scaling (MDS) to establish the intellectual core.
Findings
Our findings indicate that there are nine categories in the intellectual core of BIoT: (1) data privacy and security for BIoT systems, (2) models and applications of BIoT, (3) system security theories for BIoT, (4) frameworks for BIoT deployment, (5) the fusion of BIoT with emerging methods and technologies, (6) applied security strategies for using blockchain with the IoT, (7) the design and development of industrial BIoT, (8) establishing trust through BIoT and (9) the BIoT ecosystem.
Originality/value
We use the CPASR method to examine the intellectual core of BIoT, which is an under-researched and topical area. The paper also provides a structural framework for investigating BIoT research that may be applicable to other knowledge domains.
Details
Keywords
Yingjie Ju, Jianliang Yang, Jingping Ma and Yuehang Hou
The objective of this study is to explore the impact of a government-supported initiative for operational security, specifically the establishment of the national security…
Abstract
Purpose
The objective of this study is to explore the impact of a government-supported initiative for operational security, specifically the establishment of the national security emergency industry demonstration base, on the profitability of local publicly traded companies. Additionally, the study investigates the significance of firms' blockchain strategies and technologies within this framework.
Design/methodology/approach
Using the differences-in-differences (DID) approach, this study evaluates the impact of China's national security emergency industry demonstration bases (2015–2022) on the profitability of local firms. Data from the China Research Data Service (CNRDS) platform and investor Q&As informed our analysis of firms' blockchain strategy and technology, underpinned by detailed data collection and a robust DID model.
Findings
Emergency industry demonstration bases have notably boosted enterprise profitability in both return on assets (ROA) and return on equity (ROE). Companies adopting blockchain strategies and operational technology see a clear rise in profitability over non-blockchain peers. Additionally, the technical operation of blockchain presents a more pronounced advantage than at the strategic level.
Originality/value
We introduced a new perspective, emphasizing the enhancement of corporate operational safety and financial performance through the pathway of emergency industry policies, driven by the collaboration between government and businesses. Furthermore, we delved into the potential application value of blockchain strategies and technologies in enhancing operational security and the emergency industry.
Details