Search results

1 – 10 of 47
Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

5866

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Article
Publication date: 11 November 2019

Vaibhav S. Narwane, Rakesh D. Raut, Bhaskar B. Gardas, Mahesh S. Kavre and Balkrishna E. Narkhede

The purpose of this study is to determine the significant factors affecting the adoption of Cloud of Things (CoT) by Indian small and medium-sized enterprises, using exploratory…

Abstract

Purpose

The purpose of this study is to determine the significant factors affecting the adoption of Cloud of Things (CoT) by Indian small and medium-sized enterprises, using exploratory and confirmatory factor analysis.

Design/methodology/approach

Significant factors that impact CoT implementation were identified through a detailed literature survey. A conceptual framework and hypotheses were proposed for linking the significant factors so identified, namely, cost saving, relative advantage, sharing and collaboration, reliability, security and privacy, technical issues and adoption intention. The data were collected from 270 Indian SMEs using an online survey. Structural equation modelling (SEM) was used to test the proposed model.

Findings

It was observed that factors such as “sharing and collaboration”, “cost saving” and “relative advantage” had a positive influence on CoT adoption. Findings of the study also supported the hypothesis that “security and privacy” were the prime concerns for CoT adoption.

Research limitations/implications

Sample coverage across different geographical areas with qualitative data can be helpful. The SEM methodology is only capable of verifying linear relationships; to counter this, a hybrid approach with tools such as artificial neural network and multiple linear regression can be used.

Practical implications

This study intends to guide the managers of SMEs, cloud service providers and regulatory organisations for formulating an effective strategy to adopt CoT. It may be noted that CoT is the prime building block of Industry 4.0 and SMEs will benefit from government support for the same.

Originality/value

This paper highlights the influence of factors on the adoption intention of CoT with a focus on the SMEs of a developing country like India.

Article
Publication date: 10 August 2023

Ali Alshaher, Hani Ramadhan Alkhaled and Mohammed Mustafa H.H.

There is a growing awareness in today's organizations of the gap between existing digital technologies and those arising from digital innovation that contribute to reducing work…

Abstract

Purpose

There is a growing awareness in today's organizations of the gap between existing digital technologies and those arising from digital innovation that contribute to reducing work exhaustion. However, no comprehensive framework has been proposed for the importance of adopting digital innovation in reducing work exhaustion. The purpose of this paper is to provide a holistic view by proposing a model for the importance of adopting digital innovation technologies and their role in reducing work exhaustion in Iraq as a developing country, and the model was proposed based on the theory of technology-organization-environment and diffusion of innovation.

Design/methodology/approach

To collect data, an electronic questionnaire was designed for a survey conducted on 183 Iraqi firms in the industrial sector. For data analysis, the structured equation model was used through the (AMOS. 26) program.

Findings

The results revealed the importance and significance of the study model in adopting the cloud of things (CoT) as one of the techniques of digital innovation in reducing work exhaustion.

Research limitations/implications

The authors can conclude that the adoption of the CoT in small and medium enterprises (SMEs) can have a positive impact on the performance of the employees. The adoption of the CoT may provide SME managers with an opportunity to effectively manage various roles and responsibilities. While there were many limitations that this study faced, the authors focused on one type of digital innovation dynamics, which is the CoT, as they must focus on other technologies.

Originality/value

To the best of the authors’ knowledge, this study is one of the first studies in Iraq as a developing country that explains how emerging digital innovation can be leveraged to create innovative digital products and services as a CoT technology and subsequently lead to the reduction of work exhaustion. It also fills the literature gaps related to adoption factors of digital innovation and their role in reducing work exhaustion.

Details

VINE Journal of Information and Knowledge Management Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2059-5891

Keywords

Article
Publication date: 9 October 2019

Elham Ali Shammar and Ammar Thabit Zahary

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by…

6400

Abstract

Purpose

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by enabling connections between smart objects and humans, and also between smart objects themselves, which leads to anything, anytime, anywhere, and any media communications. IoT allows objects to physically see, hear, think, and perform tasks by making them talk to each other, share information and coordinate decisions. To enable the vision of IoT, it utilizes technologies such as ubiquitous computing, context awareness, RFID, WSN, embedded devices, CPS, communication technologies, and internet protocols. IoT is considered to be the future internet, which is significantly different from the Internet we use today. The purpose of this paper is to provide up-to-date literature on trends of IoT research which is driven by the need for convergence of several interdisciplinary technologies and new applications.

Design/methodology/approach

A comprehensive IoT literature review has been performed in this paper as a survey. The survey starts by providing an overview of IoT concepts, visions and evolutions. IoT architectures are also explored. Then, the most important components of IoT are discussed including a thorough discussion of IoT operating systems such as Tiny OS, Contiki OS, FreeRTOS, and RIOT. A review of IoT applications is also presented in this paper and finally, IoT challenges that can be recently encountered by researchers are introduced.

Findings

Studies of IoT literature and projects show the disproportionate importance of technology in IoT projects, which are often driven by technological interventions rather than innovation in the business model. There are a number of serious concerns about the dangers of IoT growth, particularly in the areas of privacy and security; hence, industry and government began addressing these concerns. At the end, what makes IoT exciting is that we do not yet know the exact use cases which would have the ability to significantly influence our lives.

Originality/value

This survey provides a comprehensive literature review on IoT techniques, operating systems and trends.

Details

Library Hi Tech, vol. 38 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 17 June 2019

Lamya Abdullah and Juan Quintero

The purpose of this study is to propose an approach to avoid having to trust a single entity in cloud-based applications. In cloud computing, data processing is delegated to a…

Abstract

Purpose

The purpose of this study is to propose an approach to avoid having to trust a single entity in cloud-based applications. In cloud computing, data processing is delegated to a remote party for efficiency and flexibility reasons. A practical user requirement usually is data privacy; hence, the confidentiality and integrity of data processing needs to be protected. In the common scenarios of cloud computing today, this can only be achieved by assuming that the remote party does not in any form act maliciously.

Design/methodology/approach

An approach that avoids having to trust a single entity is proposed. This approach is based on two concepts: the technical abstraction of sealed computation, i.e. a technical mechanism to confine a privacy-aware processing of data within a tamper-proof hardware container, and the role of an auditing party that itself cannot add functionality to the system but is able to check whether the system (including the mechanism for sealed computation) works as expected.

Findings

Discussion and analysis of the abstract, technical and procedural requirements of these concepts and how they can be applied in practice are explained.

Originality/value

A preliminary version of this paper was published in the proceedings of the second International Workshop on SECurity and Privacy Requirements Engineering (SECPRE, 2018).

Details

Information & Computer Security, vol. 27 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 31 May 2023

Basma Al-Mutawa and Muneer Mohammed Saeed Al Mubarak

The purpose of this study is to investigate the adoption of cloud computing as a digital technology by small and medium enterprises (SMEs) and assess its impact on sustainability…

Abstract

Purpose

The purpose of this study is to investigate the adoption of cloud computing as a digital technology by small and medium enterprises (SMEs) and assess its impact on sustainability of such enterprises.

Design/methodology/approach

A model was developed that featured factors influencing SMEs sustainability. Primary quantitative data was gathered using a survey as an instrument. Total set of n = 387 responses were gathered using a convenience sampling method.

Findings

Findings reveal that cost reduction, ease of use, reliability and sharing and collaboration factors have significant statistical impacts on SMEs sustainability, whereas privacy and security factor has no significant statistical on SMEs sustainability.

Practical implications

The study poses significant implications on managers and SME development authority to create an inductive environment for technological support for SMEs’ sustainability.

Originality/value

The study enhances SMEs’ performance and sustainability by upgrading their existing information and communications technology as a digital infrastructure and benefiting from novel IT-based cloud revolution. Several studies have provided an understanding of the use of cloud computing services in SMEs but lack enough information about the challenges and impact on SMEs sustainability.

Details

Competitiveness Review: An International Business Journal , vol. 34 no. 1
Type: Research Article
ISSN: 1059-5422

Keywords

Abstract

Details

Marketing in Customer Technology Environments
Type: Book
ISBN: 978-1-83909-601-3

Abstract

Details

A Circular Argument
Type: Book
ISBN: 978-1-80071-385-7

Article
Publication date: 14 November 2016

Lisardo Prieto González, Corvin Jaedicke, Johannes Schubert and Vladimir Stantchev

The purpose of this study is to analyze how embedding of self-powered wireless sensors into cloud computing further enables such a system to become a sustainable part of work…

841

Abstract

Purpose

The purpose of this study is to analyze how embedding of self-powered wireless sensors into cloud computing further enables such a system to become a sustainable part of work environment.

Design/methodology/approach

This is exemplified by an application scenario in healthcare that was developed in the context of the OpSIT project in Germany. A clearly outlined three-layer architecture, in the sense of Internet of Things, is presented. It provides the basis for integrating a broad range of sensors into smart healthcare infrastructure. More specifically, by making use of short-range communication sensors (sensing layer), gateways which implement data transmission and low-level computation (fog layer) and cloud computing for processing the data (application layer).

Findings

A technical in-depth analysis of the first two layers of the infrastructure is given to prove reliability and to determine the communication quality and availability in real-world scenarios. Furthermore, two example use-cases that directly apply to a healthcare environment are examined, concluding with the feasibility of the presented approach.

Practical implications

Finally, the next research steps, oriented towards the semantic tagging and classification of data received from sensors, and the usage of advanced artificial intelligence-based algorithms on this information to produce useful knowledge, are described together with the derived social benefits.

Originality/value

The work presents an innovative, extensible and scalable system, proven to be useful in healthcare environments.

Details

Journal of Information, Communication and Ethics in Society, vol. 14 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 17 January 2024

Lakshminarayana Kompella

In socio-technical transition theory, resistance by existing technology and regime resistance plays a key role. The resistance is in the form of intentional improvements;…

Abstract

Purpose

In socio-technical transition theory, resistance by existing technology and regime resistance plays a key role. The resistance is in the form of intentional improvements; eventually, the regime destabilizes and adopts the new technology, referred to as the sailing-ship effect. Researchers used a structural view and examined it as a strategic action and its relationship with new technology (competitive/symbiotic) in non-fast-changing sailing systems. This study uses a microlevel view and examines it in a fast-changing where products/services are developed by integrating existing technology with new product innovations; their success depends on addressing technical/market uncertainty. This study examines the sailing-ship effect in a fast-changing system and contributes to the socio-technical transition theory.

Design/methodology/approach

The authors need to examine the phenomena of the sailing-ship effect in its setting, and a case-study method is appropriate. The selected case provided diverse analytic and heuristic perspectives to examine the phenomena; therefore, it was a single case study.

Findings

In an IT scenario, the strategic actions decide and realize agility and competitive advantage by formulating appropriate goals with required budgets and coevolutionary changes to resources at product, process and organizational levels, addressing technical/market uncertainty. Moreover, the agility displayed by strategic actions determines the relationship with new technology, which is interspersed. Finally, it provided insights into struggle, navigation and negotiations, forming strategic actions to display the sailing-ship effect.

Research limitations/implications

The study selected a Banking Financial Services and Insurance product of an IT Services company. As start-ups exhibit inherent (emergent) agility, the authors can examine agility as a combination of emergent and strategic actions by selecting a start-up.

Practical implications

The study highlights the strategic actions specific to an IT services company. It developed its product and services by steering clear from IT innovations such as native cloud and continuous deployment. It improved its products/services with necessary organizational changes and achieved the desired agility and competitive advantage. Therefore, organizations devise appropriate strategic actions to combat the sailing-ship effect apart from setting goals and selecting IT innovations.

Originality/value

The study expands the socio-technical transition theory by selecting a fast-changing system. It provided insights into the relationship between existing and new technology and the strategic actions necessary to manage technical and market uncertainty and achieve the desired competitive advantage, or the sailing-ship effect.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

1 – 10 of 47