Search results
1 – 7 of 7Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui
The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…
Abstract
The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.
Details
Keywords
Jayden Khakurel, Helinä Melkas and Jari Porras
The purpose of this paper is to expand current knowledge about the recent trend of wearable technology to assess both its potential in the work environment and the challenges…
Abstract
Purpose
The purpose of this paper is to expand current knowledge about the recent trend of wearable technology to assess both its potential in the work environment and the challenges concerning the utilisation of wearables in the workplace.
Design/methodology/approach
After establishing exclusion and inclusion criteria, an independent systematic search of the ACM Digital Library, IEEE Xplore, ScienceDirect and Web of Science databases for relevant studies was performed. Out of a total of 359 articles, 34 met the selection criteria.
Findings
This review identifies 23 categories of wearable devices. Further categorisation of the devices based on their utilisation shows they can be used in the work environment for activities including monitoring, augmenting, assisting, delivering and tracking. The review reveals that wearable technology has the potential to increase work efficiency among employees, improve workers’ physical well-being and reduce work-related injuries. However, the review also reveals that technological, social, policy and economic challenges related to the use of wearable devices remain.
Research limitations/implications
Many studies have investigated the benefits of wearable devices for personal use, but information about the use of wearables in the work environment is limited. Further research is required in the fields of technology, social challenges, organisation strategies, policies and economics to enhance the adoption rate of wearable devices in work environments.
Originality/value
Previous studies indicate that occupational stress and injuries are detrimental to employees’ health; this paper analyses the use of wearable devices as an intervention method to monitor or prevent these problems. Introducing a categorisation framework during implementation may help identify which types of device categories are suitable and could be beneficial for specific utilisation purposes, facilitating the adoption of wearable devices in the workplace.
Details
Keywords
Giovanna Culot, Guido Nassimbeni, Matteo Podrecca and Marco Sartor
After 15 years of research, this paper aims to present a review of the academic literature on the ISO/IEC 27001, the most renowned standard for information security and the third…
Abstract
Purpose
After 15 years of research, this paper aims to present a review of the academic literature on the ISO/IEC 27001, the most renowned standard for information security and the third most widespread ISO certification. Emerging issues are reframed through the lenses of social systems thinking, deriving a theory-based research agenda to inspire interdisciplinary studies in the field.
Design/methodology/approach
The study is structured as a systematic literature review.
Findings
Research themes and sub-themes are identified on five broad research foci: relation with other standards, motivations, issues in the implementation, possible outcomes and contextual factors.
Originality/value
The study presents a structured overview of the academic body of knowledge on ISO/IEC 27001, providing solid foundations for future research on the topic. A set of research opportunities is outlined, with the aim to inspire future interdisciplinary studies at the crossroad between information security and quality management. Managers interested in the implementation of the standard and policymakers can find an overview of academic knowledge useful to inform their decisions related to implementation and regulatory activities.
Details
Keywords
Aswathy Sreenivasan and M. Suresh
Research on the intersection of start-ups and digital transformation is still in its infancy, but it is gathering speed and has entered a period of ferment that may lead to…
Abstract
Purpose
Research on the intersection of start-ups and digital transformation is still in its infancy, but it is gathering speed and has entered a period of ferment that may lead to discoveries and deeper understandings. From a purely descriptive standpoint, the topic has only recently entered an exponential development phase. This study aims to provide an overview of the digital transformation in start-ups.
Design/methodology/approach
The research only looked into account papers that mentioned the ((“Digital transformation”) AND (“Startups”) OR (“Entrepreneurship”) OR (“Entrepreneur”)) for the title, abstract and keywords. The R programming language's Biblioshiny package was considered for thoroughly examining the papers.
Findings
This study evaluated the overview of digital transformation in start-ups between 2016
Research limitations/implications
The current study may serve as a general guideline for future investigation into this topic.
Practical implications
Regarding the practical ramifications, this study’s findings can help entrepreneurs prepare to launch a business or are already doing so. This study’s results provide a comprehensive framework of success variables that must be considered to improve the venture's performance.
Originality/value
This study’s originality is from presenting a structured and in-depth literature review that describes the current state of the art for digital transformation in start-ups. A complete analysis of the data gathered on its digital transformation in start-ups is offered to establish that it is sustainable.
Details
Keywords
Joe Garcia, Russell Shannon, Aaron Jacobson, William Mosca, Michael Burger and Roberto Maldonado
This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software…
Abstract
Purpose
This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software support activity (SSA), with said paradigm supporting strong traceability and provability concerning the SSA’s output product, known as an operational flight program (OFP). Through a secure development environment (SDE), each critical software development function performed on said OFP during its development has a corresponding record represented on a blockchain.
Design/methodology/approach
An SDE is implemented as a virtual machine or container incorporating software development tools that are modified to support blockchain transactions. Each critical software development function, e.g. editing, compiling, linking, generates a blockchain transaction message with associated information embedded in the output of a said function that, together, can be used to prove integrity and support traceability. An attestation process is used to provide proof that the toolchain containing SDE is not subject to unauthorized modification at the time said critical function is performed.
Findings
Blockchain methods are shown to be a viable approach for supporting exhaustive traceability and strong provability of development system integrity for mission-critical software produced by an NAE SSA for NAE embedded systems software.
Practical implications
A blockchain-based authentication approach that could be implemented at the OFP point-of-load would provide for fine-grain authentication of all OFP software components, with each component or module having its own proof-of-integrity (including the integrity of the used development tools) over its entire development history.
Originality/value
Many SSAs have established control procedures for development such as check-out/check-in. This does not prove the SSA output software is secure. For one thing, a build system does not necessarily enforce procedures in a way that is determinable from the output. Furthermore, the SSA toolchain itself could be attacked. The approach described in this paper enforces security policy and embeds information into the output of every development function that can be cross-referenced to blockchain transaction records for provability and traceability that only trusted tools, free from unauthorized modifications, are used in software development. A key original concept of this approach is that it treats assigned developer time as a transferable digital currency.
Details
Keywords
- Software development
- Blockchain
- Cybersecurity
- Operational flight program
- Secure development environment
- Secure virtual machine
- Zero trust
- Embedded systems
- Mission-critical systems
- OFP
- DevOps
- DevSecOps
- Software support activity
- SSA
- SDE
- Permissioned blockchain
- Cryptocurrency
- Time-limited authorization for developer action
- TADA
- Code signing
- Trusted software guard
- SGX
- Trusted eXecution technology
- TXT
- Trusted platform module
- Self-hosting
- Controlled access blockchain
- CABlock
- Role-based access control
- RBAC
Sudhaman Parthasarathy and S.T. Padmapriya
Algorithm bias refers to repetitive computer program errors that give some users more weight than others. The aim of this article is to provide a deeper insight of algorithm bias…
Abstract
Purpose
Algorithm bias refers to repetitive computer program errors that give some users more weight than others. The aim of this article is to provide a deeper insight of algorithm bias in AI-enabled ERP software customization. Although algorithmic bias in machine learning models has uneven, unfair and unjust impacts, research on it is mostly anecdotal and scattered.
Design/methodology/approach
As guided by the previous research (Akter et al., 2022), this study presents the possible design bias (model, data and method) one may experience with enterprise resource planning (ERP) software customization algorithm. This study then presents the artificial intelligence (AI) version of ERP customization algorithm using k-nearest neighbours algorithm.
Findings
This study illustrates the possible bias when the prioritized requirements customization estimation (PRCE) algorithm available in the ERP literature is executed without any AI. Then, the authors present their newly developed AI version of the PRCE algorithm that uses ML techniques. The authors then discuss its adjoining algorithmic bias with an illustration. Further, the authors also draw a roadmap for managing algorithmic bias during ERP customization in practice.
Originality/value
To the best of the authors’ knowledge, no prior research has attempted to understand the algorithmic bias that occurs during the execution of the ERP customization algorithm (with or without AI).
Details