Search results

1 – 7 of 7
Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

6178

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Content available
Book part
Publication date: 30 July 2018

Abstract

Details

Marketing Management in Turkey
Type: Book
ISBN: 978-1-78714-558-0

Open Access
Article
Publication date: 14 May 2018

Jayden Khakurel, Helinä Melkas and Jari Porras

The purpose of this paper is to expand current knowledge about the recent trend of wearable technology to assess both its potential in the work environment and the challenges…

13692

Abstract

Purpose

The purpose of this paper is to expand current knowledge about the recent trend of wearable technology to assess both its potential in the work environment and the challenges concerning the utilisation of wearables in the workplace.

Design/methodology/approach

After establishing exclusion and inclusion criteria, an independent systematic search of the ACM Digital Library, IEEE Xplore, ScienceDirect and Web of Science databases for relevant studies was performed. Out of a total of 359 articles, 34 met the selection criteria.

Findings

This review identifies 23 categories of wearable devices. Further categorisation of the devices based on their utilisation shows they can be used in the work environment for activities including monitoring, augmenting, assisting, delivering and tracking. The review reveals that wearable technology has the potential to increase work efficiency among employees, improve workers’ physical well-being and reduce work-related injuries. However, the review also reveals that technological, social, policy and economic challenges related to the use of wearable devices remain.

Research limitations/implications

Many studies have investigated the benefits of wearable devices for personal use, but information about the use of wearables in the work environment is limited. Further research is required in the fields of technology, social challenges, organisation strategies, policies and economics to enhance the adoption rate of wearable devices in work environments.

Originality/value

Previous studies indicate that occupational stress and injuries are detrimental to employees’ health; this paper analyses the use of wearable devices as an intervention method to monitor or prevent these problems. Introducing a categorisation framework during implementation may help identify which types of device categories are suitable and could be beneficial for specific utilisation purposes, facilitating the adoption of wearable devices in the workplace.

Open Access
Article
Publication date: 16 March 2021

Giovanna Culot, Guido Nassimbeni, Matteo Podrecca and Marco Sartor

After 15 years of research, this paper aims to present a review of the academic literature on the ISO/IEC 27001, the most renowned standard for information security and the third…

16248

Abstract

Purpose

After 15 years of research, this paper aims to present a review of the academic literature on the ISO/IEC 27001, the most renowned standard for information security and the third most widespread ISO certification. Emerging issues are reframed through the lenses of social systems thinking, deriving a theory-based research agenda to inspire interdisciplinary studies in the field.

Design/methodology/approach

The study is structured as a systematic literature review.

Findings

Research themes and sub-themes are identified on five broad research foci: relation with other standards, motivations, issues in the implementation, possible outcomes and contextual factors.

Originality/value

The study presents a structured overview of the academic body of knowledge on ISO/IEC 27001, providing solid foundations for future research on the topic. A set of research opportunities is outlined, with the aim to inspire future interdisciplinary studies at the crossroad between information security and quality management. Managers interested in the implementation of the standard and policymakers can find an overview of academic knowledge useful to inform their decisions related to implementation and regulatory activities.

Details

The TQM Journal, vol. 33 no. 7
Type: Research Article
ISSN: 1754-2731

Keywords

Open Access
Article
Publication date: 23 May 2023

Aswathy Sreenivasan and M. Suresh

Research on the intersection of start-ups and digital transformation is still in its infancy, but it is gathering speed and has entered a period of ferment that may lead to…

1859

Abstract

Purpose

Research on the intersection of start-ups and digital transformation is still in its infancy, but it is gathering speed and has entered a period of ferment that may lead to discoveries and deeper understandings. From a purely descriptive standpoint, the topic has only recently entered an exponential development phase. This study aims to provide an overview of the digital transformation in start-ups.

Design/methodology/approach

The research only looked into account papers that mentioned the ((“Digital transformation”) AND (“Startups”) OR (“Entrepreneurship”) OR (“Entrepreneur”)) for the title, abstract and keywords. The R programming language's Biblioshiny package was considered for thoroughly examining the papers.

Findings

This study evaluated the overview of digital transformation in start-ups between 20162022 using the articles from the Dimension database. The study of digital transformation is increasingly popular, but there needs to be more research focused specifically on the digital transformation of start-up companies. While the overall trend shows a rise in the interest and investigation of digital transformation, the number of studies explicitly addressing start-up digital transformation still needs to be higher. The highest publication and citation related to digital transformation is of Andreja Pucihar. The findings also show that the Sustainability journal has the highest network with other citations. Also, it has been found that the focus on digital transformation addresses the need for more research based on various theoretical perspectives. Based on the prominence percentile, the top three future research topics that can be explored are Product Innovation; Sustainability; Frugality, Digital Transformation; Strategic Alignment, and Cybersecurity; Strategies; Digital Transformation.

Research limitations/implications

The current study may serve as a general guideline for future investigation into this topic.

Practical implications

Regarding the practical ramifications, this study’s findings can help entrepreneurs prepare to launch a business or are already doing so. This study’s results provide a comprehensive framework of success variables that must be considered to improve the venture's performance.

Originality/value

This study’s originality is from presenting a structured and in-depth literature review that describes the current state of the art for digital transformation in start-ups. A complete analysis of the data gathered on its digital transformation in start-ups is offered to establish that it is sustainable.

Details

Digital Transformation and Society, vol. 2 no. 3
Type: Research Article
ISSN: 2755-0761

Keywords

Content available
Article
Publication date: 23 June 2021

Joe Garcia, Russell Shannon, Aaron Jacobson, William Mosca, Michael Burger and Roberto Maldonado

This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software…

1323

Abstract

Purpose

This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software support activity (SSA), with said paradigm supporting strong traceability and provability concerning the SSA’s output product, known as an operational flight program (OFP). Through a secure development environment (SDE), each critical software development function performed on said OFP during its development has a corresponding record represented on a blockchain.

Design/methodology/approach

An SDE is implemented as a virtual machine or container incorporating software development tools that are modified to support blockchain transactions. Each critical software development function, e.g. editing, compiling, linking, generates a blockchain transaction message with associated information embedded in the output of a said function that, together, can be used to prove integrity and support traceability. An attestation process is used to provide proof that the toolchain containing SDE is not subject to unauthorized modification at the time said critical function is performed.

Findings

Blockchain methods are shown to be a viable approach for supporting exhaustive traceability and strong provability of development system integrity for mission-critical software produced by an NAE SSA for NAE embedded systems software.

Practical implications

A blockchain-based authentication approach that could be implemented at the OFP point-of-load would provide for fine-grain authentication of all OFP software components, with each component or module having its own proof-of-integrity (including the integrity of the used development tools) over its entire development history.

Originality/value

Many SSAs have established control procedures for development such as check-out/check-in. This does not prove the SSA output software is secure. For one thing, a build system does not necessarily enforce procedures in a way that is determinable from the output. Furthermore, the SSA toolchain itself could be attacked. The approach described in this paper enforces security policy and embeds information into the output of every development function that can be cross-referenced to blockchain transaction records for provability and traceability that only trusted tools, free from unauthorized modifications, are used in software development. A key original concept of this approach is that it treats assigned developer time as a transferable digital currency.

Open Access
Article
Publication date: 21 June 2023

Sudhaman Parthasarathy and S.T. Padmapriya

Algorithm bias refers to repetitive computer program errors that give some users more weight than others. The aim of this article is to provide a deeper insight of algorithm bias…

Abstract

Purpose

Algorithm bias refers to repetitive computer program errors that give some users more weight than others. The aim of this article is to provide a deeper insight of algorithm bias in AI-enabled ERP software customization. Although algorithmic bias in machine learning models has uneven, unfair and unjust impacts, research on it is mostly anecdotal and scattered.

Design/methodology/approach

As guided by the previous research (Akter et al., 2022), this study presents the possible design bias (model, data and method) one may experience with enterprise resource planning (ERP) software customization algorithm. This study then presents the artificial intelligence (AI) version of ERP customization algorithm using k-nearest neighbours algorithm.

Findings

This study illustrates the possible bias when the prioritized requirements customization estimation (PRCE) algorithm available in the ERP literature is executed without any AI. Then, the authors present their newly developed AI version of the PRCE algorithm that uses ML techniques. The authors then discuss its adjoining algorithmic bias with an illustration. Further, the authors also draw a roadmap for managing algorithmic bias during ERP customization in practice.

Originality/value

To the best of the authors’ knowledge, no prior research has attempted to understand the algorithmic bias that occurs during the execution of the ERP customization algorithm (with or without AI).

Details

Journal of Ethics in Entrepreneurship and Technology, vol. 3 no. 2
Type: Research Article
ISSN: 2633-7436

Keywords

Access

Only content I have access to

Year

Content type

1 – 7 of 7