Search results

1 – 10 of over 5000
Open Access
Article
Publication date: 9 October 2023

Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are…

1076

Abstract

Purpose

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are increasingly used in security-critical domains. Current survey works on databases and data security only consider authorization and access control in a very general way and do not regard most of today’s sophisticated requirements. Accordingly, the purpose of this paper is to discuss authorization and access control for relational and NoSQL database models in detail with respect to requirements and current state of the art.

Design/methodology/approach

This paper follows a systematic literature review approach to study authorization and access control for different database models. Starting with a research on survey works on authorization and access control in databases, the study continues with the identification and definition of advanced authorization and access control requirements, which are generally applicable to any database model. This paper then discusses and compares current database models based on these requirements.

Findings

As no survey works consider requirements for authorization and access control in different database models so far, the authors define their requirements. Furthermore, the authors discuss the current state of the art for the relational, key-value, column-oriented, document-based and graph database models in comparison to the defined requirements.

Originality/value

This paper focuses on authorization and access control for various database models, not concrete products. This paper identifies today’s sophisticated – yet general – requirements from the literature and compares them with research results and access control features of current products for the relational and NoSQL database models.

Details

International Journal of Web Information Systems, vol. 20 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Open Access
Article
Publication date: 1 June 2023

Edward Ayebeng Botchway, Kofi Agyekum, Hayford Pittri and Anthony Lamina

This study explores the importance of and vulnerabilities in deploying physical access control (PAC) devices in a typical university setting.

Abstract

Purpose

This study explores the importance of and vulnerabilities in deploying physical access control (PAC) devices in a typical university setting.

Design/methodology/approach

The study adopts face-to-face and telephone interviews. This study uses a semi-structured interview guide to solicit the views of 25 interviewees on the subject under consideration. Qualitative responses to the interview are thematically analyzed using NVivo 11 Pro analysis application software.

Findings

The findings reveal five importance and seven vulnerabilities in the deployment of PAC devices in the institution. Key among the importance of deploying the devices are “prevent unwanted premise access or intrusions,” “prevent disruptions to university/staff operations on campus” and “protect students and staff from outside intruders.” Key among the identified vulnerabilities are “tailgating”, “delay in emergent cases” and “power outage may affect its usage.”

Originality/value

This study offers insight into a rare area of study, especially in the Sub-Saharan Africa region. Furthermore, the study contributes to the state-of-the-art importance and vulnerabilities in deploying PAC devices in daily human activities. The study is valuable in that it has the potential to establish a foundation for future studies that may delve into investigating issues associated with the deployment of PAC devices.

Details

Frontiers in Engineering and Built Environment, vol. 4 no. 1
Type: Research Article
ISSN: 2634-2499

Keywords

Article
Publication date: 19 May 2022

Priyanka Kumari Bhansali, Dilendra Hiran, Hemant Kothari and Kamal Gulati

The purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and progresses…

Abstract

Purpose

The purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and progresses the ease of use, leading to a surge in the number of enterprises and individuals storing data in the cloud. Cloud services are used by various organizations (education, medical and commercial) to store their data. In the health-care industry, for example, patient medical data is outsourced to a cloud server. Instead of relying onmedical service providers, clients can access theirmedical data over the cloud.

Design/methodology/approach

This section explains the proposed cloud-based health-care system for secure data storage and access control called hash-based ciphertext policy attribute-based encryption with signature (hCP-ABES). It provides access control with finer granularity, security, authentication and user confidentiality of medical data. It enhances ciphertext-policy attribute-based encryption (CP-ABE) with hashing, encryption and signature. The proposed architecture includes protection mechanisms to guarantee that health-care and medical information can be securely exchanged between health systems via the cloud. Figure 2 depicts the proposed work's architectural design.

Findings

For health-care-related applications, safe contact with common documents hosted on a cloud server is becoming increasingly important. However, there are numerous constraints to designing an effective and safe data access method, including cloud server performance, a high number of data users and various security requirements. This work adds hashing and signature to the classic CP-ABE technique. It protects the confidentiality of health-care data while also allowing for fine-grained access control. According to an analysis of security needs, this work fulfills the privacy and integrity of health information using federated learning.

Originality/value

The Internet of Things (IoT) technology and smart diagnostic implants have enhanced health-care systems by allowing for remote access and screening of patients’ health issues at any time and from any location. Medical IoT devices monitor patients’ health status and combine this information into medical records, which are then transferred to the cloud and viewed by health providers for decision-making. However, when it comes to information transfer, the security and secrecy of electronic health records become a major concern. This work offers effective data storage and access control for a smart healthcare system to protect confidentiality. CP-ABE ensures data confidentiality and also allows control on data access at a finer level. Furthermore, it allows owners to set up a dynamic patients health data sharing policy under the cloud layer. hCP-ABES proposed fine-grained data access, security, authentication and user privacy of medical data. This paper enhances CP-ABE with hashing, encryption and signature. The proposed method has been evaluated, and the results signify that the proposed hCP-ABES is feasible compared to other access control schemes using federated learning.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 17 August 2023

P.S. JosephNg

This study aims to highlight that security and flexibilities remain the main points of contention in the cordiality business. This research points to planning a framework that…

57

Abstract

Purpose

This study aims to highlight that security and flexibilities remain the main points of contention in the cordiality business. This research points to planning a framework that empowers hotel users to get to the room using a mobile access key. Advancing secured facilities, mobile phone “Near Field Communication” (NFC) innovation as the entrance device by carrying out an application containing an imitated mobile key for explicit verification access is used.

Design/methodology/approach

The proposed system is evaluated by triangulation of experimental, numerical and rational evaluation using partial least square structural equation modeling (PLS-SEM) with Malaysian hotel guests and employees.

Findings

The discoveries with the hypothesis supported validated that the suggested solution can eliminate physical cards, boost protection and encourage a contactless ecosystem. Theoretical, management and societal contributions are discussed here.

Research limitations/implications

This experiment comes with the constraints that it was conducted in only two hotels and does not fully reflect the choices of a wider range of travellers. Secondly, the cost of existing NFC smart locks is still relatively high, and along with the development of technology, the price will decrease when supply exceeds demand.

Practical implications

To promote high-security attributes, NFC technology as the access system by implementing an application containing an emulated smart key for specific authentication access is used. The host-card emulation enables cost-effectiveness profit and initiating a defence system in the pandemic era.

Social implications

To promote high-security attributes, NFC technology is used as the access system by implementing an application containing an emulated smart key for specific authentication access. The host-card emulation enables cost-effectiveness profit and initiating a defence system in the pandemic era.

Originality/value

The novelty of this study comes from the use of commonly available smartphone NFC features that are yet to be applied in the tourism ecosystem. The research provokes the applied concept of mobile smartkeys.

Details

Journal of Science and Technology Policy Management, vol. 15 no. 3
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 28 December 2021

Craig Proctor-Parker and Riaan Stopforth

The purpose of the research has been the primary consideration and evaluation of a cost effective, reliable, robust and simple process of radio frequency identification…

140

Abstract

Purpose

The purpose of the research has been the primary consideration and evaluation of a cost effective, reliable, robust and simple process of radio frequency identification (RFID)-based stock control, asset management and monitoring of concrete safety bollards used in the road environment. Likewise, the consideration of the use of the same system and technology to other items in and around the general road infrastructure.

Design/methodology/approach

The research approach undertaken has been an evaluation of the use of currently available RFID technology, with a key emphasis on low cost, ease of use, reliability and convenience. Practical field exercises completed in considering the relevant RFID tags and readers and associated software and apps and necessary software integration and development have been undertaken. At the same time, evaluating the specific limits created in the specific environment is being applied. Of particular interest has been the use of a moving scan in a vehicle drive-through or pass-bye, type reading system. This has been determined to be viable and completely practical, drastically reducing the key issue of time-taken. Practical application of the system from idea to real life application has been undertaken. The integration of the use of the RFID tag and reader system with necessary and related software to database upload and storage has been established. The creation of an online facility to allow the appropriate use of the data and to include the convenient output of an asset report has been undertaken.

Findings

The findings have provided the necessary insight confirming the use of RFID technology as a simple yet reliable, cost effective and adaptable stock control, asset management and geo-locating system in the road environment. The use of such systems in this particular environment is in its infancy, and is perhaps novel and original in the specific aspect of using the system to stock control, manage and monitor road safety concrete bollards and other roadside objects in the road environment.

Originality/value

To establish if in fact, stock control geo-locating can be reliably undertaken with the use of RFID tags and readers in the specific road and road construction environment, particularly with the use of moving RFID reading of passive tags. To establish the minimum requirements of a field usable RFID tag and reader, specifically applicable to the concrete safety bollards, however to other roadside furniture. To identify the minimum requirements of a function, simple app to minimise general requirements of the overall stock control and monitoring of the RFID-tagged objects. To establish the possibility of reading the tag data, global positioning system (GPS) location and video imaging footage as a single operation function. To determine the basic parameters or limits of the GPS geo-locating, on the proposed products selected and overall system. To determine the current best practice in respect of reasonable accuracy and detail in relation to price considerations to a fully function stock control and monitoring system. To identify the minimum requirements of an online database to receive, house and provide ongoing access to and report on the data. To identify the key differences and benefits between traditional stock control and monitoring systems, against that of proposed RFID tag, read and geo-locating system.

Details

Journal of Engineering, Design and Technology , vol. 22 no. 1
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 19 February 2024

Donia Waseem, Shijiao (Joseph) Chen, Zhenhua (Raymond) Xia, Nripendra P. Rana, Balkrushna Potdar and Khai Trieu Tran

In the online environment, consumers increasingly feel vulnerable due to firms’ expanding capabilities of collecting and using their data in an unsanctioned manner. Drawing from…

Abstract

Purpose

In the online environment, consumers increasingly feel vulnerable due to firms’ expanding capabilities of collecting and using their data in an unsanctioned manner. Drawing from gossip theory, this research focuses on two key suppressors of consumer vulnerability: transparency and control. Previous studies conceptualize transparency and control from rationalistic approaches that overlook individual experiences and present a unidimensional conceptualization. This research aims to understand how individuals interpret transparency and control concerning privacy vulnerability in the online environment. Additionally, it explores strategic approaches to communicating the value of transparency and control.

Design/methodology/approach

An interpretivism paradigm and phenomenology were adopted in the research design. Data were collected through semi-structured interviews with 41 participants, including consumers and experts, and analyzed through thematic analysis.

Findings

The findings identify key conceptual dimensions of transparency and control by adapting justice theory. They also reveal that firms can communicate assurance, functional, technical and social values of transparency and control to address consumer vulnerability.

Originality/value

This research makes the following contributions to the data privacy literature. The findings exhibit multidimensional and comprehensive conceptualizations of transparency and control, including user, firm and information perspectives. Additionally, the conceptual framework combines empirical insights from both experiencers and observers to offer an understanding of how transparency and control serve as justice mechanisms to effectively tackle the issue of unsanctioned transmission of personal information and subsequently address vulnerability. Lastly, the findings provide strategic approaches to communicating the value of transparency and control.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 26 April 2024

Rebecca Dei Mensah, Stephen Tetteh, Jacinta Martina Annan, Raphael Papa Kweku Andoh and Elijah Osafo Amoako

The purpose of this study was to investigate the roles of employee experience and top management commitment in the relationship between human resource (HR) records management…

Abstract

Purpose

The purpose of this study was to investigate the roles of employee experience and top management commitment in the relationship between human resource (HR) records management culture and HR records privacy control in organisations in Ghana.

Design/methodology/approach

Structural equation modelling was used in analysing the data. Following the specification of the model, three main types of analyses were carried out. They were reflective measurement model analyses to test reliability and validity; formative measurement model analyses to test redundancy, collinearity, significance and relevance of the lower-order constructs; and structural model analyses to ascertain the explanatory and predictive powers of the model, significance of the hypotheses and their effect sizes.

Findings

The study confirmed that communication, privacy awareness and training and risk assessment are dimensions of HR records management culture. Concerning the hypotheses, it was established that HR records management culture is related to HR records privacy control. Also, the study showed that employee experience positively moderated the relationship HR records management culture has with HR records privacy control. However, top management commitment negatively moderated the relationship HR records management culture has with HR records privacy control.

Practical implications

Organisations committed to the privacy control of HR records need to ensure the retention of their employees, as the longer they stay with the organisation, the more they embody the HR records management culture which improves the privacy control of HR records. For top management commitment, it should be restricted to providing strategic direction for HR records privacy control, as the day-to-day influence of top management commitment on the HR records management culture does not improve the privacy control of HR records.

Originality/value

This study demonstrates that communication, privacy awareness and training and risk assessment are dimensions of HR record management culture. Also, the extent of employee experience and top management commitment required in the relationship between HR records management culture and HR records privacy control is revealed.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 17 August 2023

Allan Farias Fávaro, Roderval Marcelino and Cristian Cechinel

This paper presents a review of the state of the art on the application of blockchain and smart contracts to the peer-review process of scientific papers. The paper seeks to…

Abstract

Purpose

This paper presents a review of the state of the art on the application of blockchain and smart contracts to the peer-review process of scientific papers. The paper seeks to analyse how the main characteristics of the existing blockchain solutions in this field to detect opportunities for the improvement of future applications.

Design/methodology/approach

A systematic review of the literature on the subject was carried out in three databases recognized by the research community (IEEE Xplore, Scopus and Web of Science) and the Frontiers in Blockchain journal. A total of 1,967 articles were initially found, and after the exclusion process, the 26 remaining articles were classified according to the following dimensions: System Type, Open Access, Review Type, Reviewer Incentive, Token Economy, Blockchain Access, Blockchain Identification, Blockchain Used, Paper Storage, Anonymity and Maturity of the solution.

Findings

Results show that the solutions are normally concerned on offering incentives to the reviewers' work (often monetary). Other common general preferences among the solutions are the adoption of open reviews, the use of Ethereum, the implementation of publishing ecosystems and the use of InterPlanetary File System to the storage of the papers.

Originality/value

There are currently no studies covering the main aspects of blockchain solutions in the field of scientific peer review. The present study provides an overall review of the topic, summarizing important information on the current research and helping new adopters to develop solutions grounded on the existing literature.

Details

Data Technologies and Applications, vol. 58 no. 2
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 29 February 2024

Khurram Shahzad, Shakeel Ahmad Khan and Abid Iqbal

The objectives of the study were to identify the effects of blockchain technology (BT) on the university librarians, the impact of BT on the university library services and to…

Abstract

Purpose

The objectives of the study were to identify the effects of blockchain technology (BT) on the university librarians, the impact of BT on the university library services and to reveal the challenges to adopt BT in the university libraries.

Design/methodology/approach

A systematic literature review was applied to address the objectives of the study. Around 25 studies published in peer-reviewed journals were selected to conduct the study.

Findings

The findings of the study revealed that blockchain technology (BT) has positive effects on the university librarians as it assists them in digital resources management, provision of integrated library services, effective records management and continued professional development. The study also displayed that BT has a positive impact on the university libraries through effective information management, user privacy, collaboration, technological innovation and access control. Results also revealed that technical issues, financial constraints, security problems, skill issues and sociocultural issues created challenges to adopt BT in the university libraries.

Originality/value

The study has offered theoretical implications for future investigators through the provision of innovative literature on the prospectus and challenges associated with blockchain in the context of librarianship. The study has also provided practical implications for management bodies by offering recommendations for the successful adoption of blockchain in the university libraries. Additionally, a framework has been developed to adopt BT successfully in the university libraries for the delivery of smart library services to library patrons.

Article
Publication date: 2 February 2024

Alireza Moghayedi, Kathy Michell, Karen Le Jeune and Mark Massyn

Safety and security (S&S) are critical concerns in South Africa, especially in Cape Town, one of the country’s most crime-ridden cities. The University of Cape Town (UCT)…

Abstract

Purpose

Safety and security (S&S) are critical concerns in South Africa, especially in Cape Town, one of the country’s most crime-ridden cities. The University of Cape Town (UCT), situated on a large, open campus, has experienced increased malefaction. Facilities management (FM) services at universities bear the primary responsibility for providing S&S to their communities. To comprehensively understand and address the community’s demands regarding S&S, the current study was conducted to investigate the challenges specific to open universities. This study aims to determine whether implementing community-based FM (CbFM) principles and using technological innovations could offer a more effective and sustainable solution.

Design/methodology/approach

The study adopted interpretivist overarching case study methodology, which is ontologically based. A mixed-method approach was used to incorporate the strengths and limitations of the weaknesses of both methods. The data collection took the form of an online survey of the university community and semi-structured interviews with university executive management to obtain data from the single case study of UCT. Descriptive statistics were used to analyze the quantitative data, and thematic analysis was used to identify emergent themes from the qualitative data.

Findings

The study presents an overall view of the provision of S&S at UCT, the unique challenges faced by management and the main S&S issues affecting the community. Moreover, the study reveals that UCT has implemented community participation processes in the past with limited success. This is because the strategies implemented constitute a narrow perspective of community participation. Therefore, a much smarter and more inclusive perspective using technological innovation is required for successful community participation to occur and to be successfully used in providing S&S toward achieving future-proofing facilities.

Originality/value

This research has demonstrated the influence of CbFM and innovative technologies on the S&S of the open campus. Hence, future-proof facilities can be achieved when FM actively engages university communities in managing campuses through technological innovation.

1 – 10 of over 5000