Search results

1 – 10 of 241
Book part
Publication date: 1 July 2024

Kelsie Nabben

“Web3” is a practice in participatory digital infrastructures through the ability to read, write, and control own digital assets. Web3 is hailed as the alternative to the failings…

Abstract

“Web3” is a practice in participatory digital infrastructures through the ability to read, write, and control own digital assets. Web3 is hailed as the alternative to the failings of big tech, offering a participatory mode of digital organization and shared ownership of digital infrastructure through algorithmic governance. This paper offers an introductory playbook to researchers entering the field of Web3 by providing an analytical lens to approach the emergent field of Web3 as “infrastructuring.” It argues that Web3 can be understood as a collective, community exploration of “how to infrastructure.” Drawing on qualitative examples derived from digital ethnographic methods, the study reveals that play, politics, and prefiguration are fundamental qualities underpinning Web3’s vision of offering an “exit” from established institutional infrastructures. Therefore, a primary challenge Web3 faces in its governance experiments centers around the question of how to effectively build and manage infrastructure.

Details

Defining Web3: A Guide to the New Cultural Economy
Type: Book
ISBN: 978-1-83549-600-8

Keywords

Article
Publication date: 7 May 2024

Swathi Pennapareddy, Ramprasad Srinivasan and Natarajan K.

Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one…

Abstract

Purpose

Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one of the most precise ways for tracking aircraft position. ADS-B is intended to provide greater situational awareness to the pilots by displaying the traffic information like aircraft ID, altitude, speed and other critical parameters on the Cockpit Display of Traffic Information displays in the cockpit. Unfortunately, due to the initial proposed nature of ADS-B protocol, it is neither encrypted nor has any other innate security mechanisms, which makes it an easy target for malicious attacks. The system is vulnerable to various active and passive attacks like message ingestion, message deletion, eavesdropping, jamming, etc., which has become an area of concern for the aviation industry. The purpose of this study is to propose a method based on modified advanced encryption standard (AES) algorithm to secure the ADS=B messages and increase the integrity of ADS-B data transmissions.

Design/methodology/approach

Though there are various cryptographic and non-cryptographic methods proposed to secure ADS-B data transmissions, it is evident that most of these systems have limitations in terms of cost, implementation or feasibility. The new proposed method implements AES encryption techniques on the ADS-B data on the sender side and correlated decryption mechanism at the receiver end. The system is designed based on the flight schedule data available from any flight planning systems and implementing the AES algorithm on the ADS-B data from each aircraft in the flight schedule.

Findings

The suitable hardware was developed using Raspberry pi, ESP32 and Ra-02. Several runs were done to verify the original message, transmitted data and received data. During transmission, encryption algorithm was being developed, which has got very high secured transmission, and during the reception, the data was secured. Field test was conducted to validate the transmission and quality. Several trials were done to validate the transmission process. The authors have successfully shown that the ADS-B data can be encrypted using AES algorithm. The authors are successful in transmitting and receiving the ADS-B data packet using the discussed hardware and software methodology. One major advantage of using the proposed solution is that the information received is encrypted, and the receiver ADS-B system can decrypt the messages on the receiving end. This clearly proves that when the data is received by an unknown receiver, the messages cannot be decrypted, as the receiver is not capable of decrypting the AES-authenticated messages transmitted by the authenticated source. Also, AES encryption is highly unlikely to be decrypted if the encryption key and the associated decryption key are not known.

Research limitations/implications

Implementation of the developed solution in actual onboard avionics systems is not within the scope of this research. Hence, assessing in the real-time distances is not covered.

Social implications

The authors propose to extend this as a software solution to the onboard avionics systems by considering the required architectural changes. This solution can also bring in positive results for unmanned air vehicles in addition to the commercial aircrafts. Enhancement of security to the key operational and navigation data elements is going to be invaluable for future air traffic management and saving lives of people.

Originality/value

The proposed solution has been practically implemented by developing the hardware and software as part of this research. This has been clearly brought out in the paper. The implementation has been tested using the actual ADS-B data/messages received from using the ADS-B receiver. The solution works perfectly, and this brings immense value to the aircraft-to-aircraft and aircraft-to-ground communications, specifically while using ADS-B data for communicating the position information. With the proposed architecture and minor software updates to the onboard avionics, this solution can enhance safety of flights.

Details

Aircraft Engineering and Aerospace Technology, vol. 96 no. 7
Type: Research Article
ISSN: 1748-8842

Keywords

Abstract

Details

Sustainable Innovation Reporting and Emerging Technologies
Type: Book
ISBN: 978-1-83797-740-6

Article
Publication date: 11 January 2024

Denis Scott, Ling Ma and Tim Broyd

Poor cash flow management and lack of profitability have plagued the construction industry for decades. In response, the UK Government published the project bank account (PBA…

Abstract

Purpose

Poor cash flow management and lack of profitability have plagued the construction industry for decades. In response, the UK Government published the project bank account (PBA) payment strategy in 2012 to mitigate main contractors unfairly withholding liabilities. However, PBAs suffer from adoption challenges, such as systems fragmentation and a lack of incentives for main contractors to adopt them effectively. This study aims to investigate how to reduce systems fragmentation in construction by integrating PBA procedures with existing management workflows to increase payment automation, resulting in improved cash liquidity and better incentives for using PBAs.

Design/methodology/approach

A PBA blockchain decentralised application is developed, presented and critically evaluated. Blockchain is the technology used because of its permissionless, license-free, open-source and immutability properties. It is a suitable general-purpose technology layer for building and testing applications without the limitations associated with centralised technologies, such as high proprietary fees, vendor lock and intellectual property restrictions.

Findings

The research demonstrates how a blockchain application can integrate siloed construction workflows such as cash flow scheduling, supply chain management and payment executions, reducing the management workload for implementing PBAs in construction projects. Furthermore, the proposed application is open-source and replicable, and its user interface is available for external testing here: https://console.atra.io/app/bf26f846-7f16-4f80-90a0-c5488ab6edd3.

Originality/value

PBA is a suitable test case because it enforces an auditable, transparent and neutral account, which are inbuilt properties of blockchains; thus, both systems are harmonious to integrate. PBA is mandated in UK public sector construction projects; therefore, the research has a solid practical foundation.

Details

Construction Innovation , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1471-4175

Keywords

Article
Publication date: 21 August 2023

Xi Zhang, Rui Chang, Minhao Gu and Baofeng Huo

Blockchain is a distributed ledger technology that uses cryptography to ensure transmission and access security, which provides solutions to numerous challenges to complex supply…

Abstract

Purpose

Blockchain is a distributed ledger technology that uses cryptography to ensure transmission and access security, which provides solutions to numerous challenges to complex supply networks. The purpose of this paper is to empirically test the impact of blockchain implementation on shareholder value varying from internal and external complexity from the complex adaptive systems (CASs) perspective. It further explores how business diversification, supply chain (SC) concentration and environmental complexity affect the relationship between blockchain implementation and shareholder value.

Design/methodology/approach

Based on 138 blockchain implementation announcements of listed companies on the Chinese A-share stock market, the authors use event study methodology to evaluate the impact of blockchain implementation on shareholder value.

Findings

The results show that blockchain implementation has a positive impact on shareholder value, and this impact will be moderated by business diversification, SC concentration and environmental complexity. In addition, environmental complexity exerts a moderating effect on SC concentration. In the post hoc analysis, the authors further explore the impact of blockchain implementation on long-term operational performance.

Originality/value

This is the first research empirically examining the effect of blockchain implementation on shareholder value varying from internal and external complexity from the CASs perspective. This paper provides evidence of the different effects of blockchain implementation on short- and long-term performance. It adds to the interdisciplinary research of information systems (IS) and operations management (OM).

Details

International Journal of Operations & Production Management, vol. 44 no. 3
Type: Research Article
ISSN: 0144-3577

Keywords

Article
Publication date: 8 August 2023

Aswathy Sreenivasan and M. Suresh

The purpose of this study is to provide a literature review of the past literature on the use of blockchain for attaining sustainability in start-ups, covering major…

454

Abstract

Purpose

The purpose of this study is to provide a literature review of the past literature on the use of blockchain for attaining sustainability in start-ups, covering major characteristics of current findings, limitations and prospective study possibilities.

Design/methodology/approach

Papers that included the term “Blockchain,” “Sustainability” and “Start-ups” were considered for the analysis. Biblioshiny package under the R programming tool was considered for a detailed paper analysis.

Findings

Numerous sectors are quickly adopting blockchain technology, which has enormous potential to remove middlemen and boost sustainability in start-ups.

Research limitations/implications

This research is limited to 147 papers from the Scopus database through 2022.

Practical implications

This paper stresses the crucial part that blockchain technology has played in igniting a conversation about innovation and technology. This research will aid in advancing the researcher’s knowledge of blockchain technology in start-ups.

Social implications

Blockchain technology will give transparency and sustainable product or services to consumers of the start-ups.

Originality/value

The novelty of this research is based on its presentation of an organized and thorough literature evaluation, which defines the current state of the art concerning the use of blockchain for sustainability in start-ups. To create a sustainable start-up, a thorough study of how the information gained in respect of its implementation might be spread into the start-ups is presented.

Details

Management Research Review, vol. 47 no. 3
Type: Research Article
ISSN: 2040-8269

Keywords

Article
Publication date: 6 February 2023

Eric Zanghi, Milton Brown Do Coutto Filho and Julio Cesar Stacchini de Souza

The current and modern electrical distribution networks, named smart grids (SGs), use advanced technologies to accomplish all the technical and nontechnical challenges naturally…

Abstract

Purpose

The current and modern electrical distribution networks, named smart grids (SGs), use advanced technologies to accomplish all the technical and nontechnical challenges naturally demanded by energy applications. Energy metering collecting is one of these challenges ranging from the most basic (i.e., visual assessment) to the expensive advanced metering infrastructure (AMI) using intelligent meters networks. The AMIs’ data acquisition and system monitoring environment require enhancing some routine tasks. This paper aims to propose a methodology that uses a distributed and sustainable approach to manage wide-range metering networks, focused on using current public or private telecommunication infrastructure, optimizing the implementation and operation, increasing reliability and decreasing costs.

Design/methodology/approach

Inspired by blockchain technology, a collaborative metering system architecture is conceived, managing massive data sets collected from the grid. The use of cryptography handles data integrity and security issues.

Findings

A robust proof-of-concept simulation results are presented concerning the resilience and performance of the proposed distributed remote metering system.

Originality/value

The methodology proposed in this work is an innovative AMI solution related to SGs. Regardless of the implementation, operation and maintenance of AMIs, the proposed solution is unique, using legacy and new technologies together in a reliable way.

Details

International Journal of Innovation Science, vol. 16 no. 2
Type: Research Article
ISSN: 1757-2223

Keywords

Article
Publication date: 12 April 2023

Zijun Mao and Yuqian Zhu

The study focuses on influential factors of collaboration on government data security by the Chinese government.

Abstract

Purpose

The study focuses on influential factors of collaboration on government data security by the Chinese government.

Design/methodology/approach

The article explores the case of e-government in the Chinese centralized unitary state system context, using a structured–pragmatic–situational (SPS) approach and the boundary theory as an analytical lens.

Findings

The findings indicate that e-government operates in highly interconnected environments where the safe flow of government data requires collaborative and cross-boundary strategies. Any organization is a potential “weakest link”. In addition, collaboration is fragmented by ambiguous accountability and organizational inertia across government departments, resources differences and limited visibility and measurability of security efforts across government levels and conflicts and uncertainties in principal–agent relationships. The solutions for those obstacles are also discussed from the multi-function, multi-level and multi-actor dimensions, respectively. A multi-dimensional overarching security model for the flow of government data is proposed.

Originality/value

The study advances the technology-oriented micro-analysis of previous studies on government data security to cross-organizational revealing at the macrolevel by connecting streams of research in information systems and public administration. These findings will contribute to making the safe flow of government data more resilient in the transformation of e-government.

Details

Aslib Journal of Information Management, vol. 76 no. 4
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 16 January 2023

Faisal Lone, Harsh Kumar Verma and Krishna Pal Sharma

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable…

Abstract

Purpose

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.

Design/methodology/approach

This paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.

Findings

Despite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.

Originality/value

The proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Book part
Publication date: 4 October 2024

Halil Kiymaz and Carlos Humberto Munoz Valdez

Blockchain technology and its applications have recently received the attention of practitioners and academics. Visualizing the full impact these technologies will have on the…

Abstract

Blockchain technology and its applications have recently received the attention of practitioners and academics. Visualizing the full impact these technologies will have on the world is challenging since their adoption is still in the early stages. This chapter explores how blockchain can disrupt the general business and financial world. Blockchain offers information transparency, live data synchronization, and immutable records that prevent fraud. Digital contracts and digital asset management may heavily depend on the development of blockchain and the adoption of smart contracts. Smart contracts can execute financial transactions automatically and enforce all parties' obligations without needing an intermediary and its cost. They can increase speed and simplify processes, reducing licensing ticketing costs and overhead charges. Blockchain also offers technology adoption solutions, like fair payment, cloud storage, smart contracts for financial assets, and international transactions with bilateral double taxation. It has further facilitated the creation of decentralized finance.

Details

The Emerald Handbook of Fintech
Type: Book
ISBN: 978-1-83753-609-2

Keywords

1 – 10 of 241