Search results
1 – 10 of 241“Web3” is a practice in participatory digital infrastructures through the ability to read, write, and control own digital assets. Web3 is hailed as the alternative to the failings…
Abstract
“Web3” is a practice in participatory digital infrastructures through the ability to read, write, and control own digital assets. Web3 is hailed as the alternative to the failings of big tech, offering a participatory mode of digital organization and shared ownership of digital infrastructure through algorithmic governance. This paper offers an introductory playbook to researchers entering the field of Web3 by providing an analytical lens to approach the emergent field of Web3 as “infrastructuring.” It argues that Web3 can be understood as a collective, community exploration of “how to infrastructure.” Drawing on qualitative examples derived from digital ethnographic methods, the study reveals that play, politics, and prefiguration are fundamental qualities underpinning Web3’s vision of offering an “exit” from established institutional infrastructures. Therefore, a primary challenge Web3 faces in its governance experiments centers around the question of how to effectively build and manage infrastructure.
Details
Keywords
Swathi Pennapareddy, Ramprasad Srinivasan and Natarajan K.
Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one…
Abstract
Purpose
Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one of the most precise ways for tracking aircraft position. ADS-B is intended to provide greater situational awareness to the pilots by displaying the traffic information like aircraft ID, altitude, speed and other critical parameters on the Cockpit Display of Traffic Information displays in the cockpit. Unfortunately, due to the initial proposed nature of ADS-B protocol, it is neither encrypted nor has any other innate security mechanisms, which makes it an easy target for malicious attacks. The system is vulnerable to various active and passive attacks like message ingestion, message deletion, eavesdropping, jamming, etc., which has become an area of concern for the aviation industry. The purpose of this study is to propose a method based on modified advanced encryption standard (AES) algorithm to secure the ADS=B messages and increase the integrity of ADS-B data transmissions.
Design/methodology/approach
Though there are various cryptographic and non-cryptographic methods proposed to secure ADS-B data transmissions, it is evident that most of these systems have limitations in terms of cost, implementation or feasibility. The new proposed method implements AES encryption techniques on the ADS-B data on the sender side and correlated decryption mechanism at the receiver end. The system is designed based on the flight schedule data available from any flight planning systems and implementing the AES algorithm on the ADS-B data from each aircraft in the flight schedule.
Findings
The suitable hardware was developed using Raspberry pi, ESP32 and Ra-02. Several runs were done to verify the original message, transmitted data and received data. During transmission, encryption algorithm was being developed, which has got very high secured transmission, and during the reception, the data was secured. Field test was conducted to validate the transmission and quality. Several trials were done to validate the transmission process. The authors have successfully shown that the ADS-B data can be encrypted using AES algorithm. The authors are successful in transmitting and receiving the ADS-B data packet using the discussed hardware and software methodology. One major advantage of using the proposed solution is that the information received is encrypted, and the receiver ADS-B system can decrypt the messages on the receiving end. This clearly proves that when the data is received by an unknown receiver, the messages cannot be decrypted, as the receiver is not capable of decrypting the AES-authenticated messages transmitted by the authenticated source. Also, AES encryption is highly unlikely to be decrypted if the encryption key and the associated decryption key are not known.
Research limitations/implications
Implementation of the developed solution in actual onboard avionics systems is not within the scope of this research. Hence, assessing in the real-time distances is not covered.
Social implications
The authors propose to extend this as a software solution to the onboard avionics systems by considering the required architectural changes. This solution can also bring in positive results for unmanned air vehicles in addition to the commercial aircrafts. Enhancement of security to the key operational and navigation data elements is going to be invaluable for future air traffic management and saving lives of people.
Originality/value
The proposed solution has been practically implemented by developing the hardware and software as part of this research. This has been clearly brought out in the paper. The implementation has been tested using the actual ADS-B data/messages received from using the ADS-B receiver. The solution works perfectly, and this brings immense value to the aircraft-to-aircraft and aircraft-to-ground communications, specifically while using ADS-B data for communicating the position information. With the proposed architecture and minor software updates to the onboard avionics, this solution can enhance safety of flights.
Details
Keywords
Denis Scott, Ling Ma and Tim Broyd
Poor cash flow management and lack of profitability have plagued the construction industry for decades. In response, the UK Government published the project bank account (PBA…
Abstract
Purpose
Poor cash flow management and lack of profitability have plagued the construction industry for decades. In response, the UK Government published the project bank account (PBA) payment strategy in 2012 to mitigate main contractors unfairly withholding liabilities. However, PBAs suffer from adoption challenges, such as systems fragmentation and a lack of incentives for main contractors to adopt them effectively. This study aims to investigate how to reduce systems fragmentation in construction by integrating PBA procedures with existing management workflows to increase payment automation, resulting in improved cash liquidity and better incentives for using PBAs.
Design/methodology/approach
A PBA blockchain decentralised application is developed, presented and critically evaluated. Blockchain is the technology used because of its permissionless, license-free, open-source and immutability properties. It is a suitable general-purpose technology layer for building and testing applications without the limitations associated with centralised technologies, such as high proprietary fees, vendor lock and intellectual property restrictions.
Findings
The research demonstrates how a blockchain application can integrate siloed construction workflows such as cash flow scheduling, supply chain management and payment executions, reducing the management workload for implementing PBAs in construction projects. Furthermore, the proposed application is open-source and replicable, and its user interface is available for external testing here: https://console.atra.io/app/bf26f846-7f16-4f80-90a0-c5488ab6edd3.
Originality/value
PBA is a suitable test case because it enforces an auditable, transparent and neutral account, which are inbuilt properties of blockchains; thus, both systems are harmonious to integrate. PBA is mandated in UK public sector construction projects; therefore, the research has a solid practical foundation.
Details
Keywords
Xi Zhang, Rui Chang, Minhao Gu and Baofeng Huo
Blockchain is a distributed ledger technology that uses cryptography to ensure transmission and access security, which provides solutions to numerous challenges to complex supply…
Abstract
Purpose
Blockchain is a distributed ledger technology that uses cryptography to ensure transmission and access security, which provides solutions to numerous challenges to complex supply networks. The purpose of this paper is to empirically test the impact of blockchain implementation on shareholder value varying from internal and external complexity from the complex adaptive systems (CASs) perspective. It further explores how business diversification, supply chain (SC) concentration and environmental complexity affect the relationship between blockchain implementation and shareholder value.
Design/methodology/approach
Based on 138 blockchain implementation announcements of listed companies on the Chinese A-share stock market, the authors use event study methodology to evaluate the impact of blockchain implementation on shareholder value.
Findings
The results show that blockchain implementation has a positive impact on shareholder value, and this impact will be moderated by business diversification, SC concentration and environmental complexity. In addition, environmental complexity exerts a moderating effect on SC concentration. In the post hoc analysis, the authors further explore the impact of blockchain implementation on long-term operational performance.
Originality/value
This is the first research empirically examining the effect of blockchain implementation on shareholder value varying from internal and external complexity from the CASs perspective. This paper provides evidence of the different effects of blockchain implementation on short- and long-term performance. It adds to the interdisciplinary research of information systems (IS) and operations management (OM).
Details
Keywords
Aswathy Sreenivasan and M. Suresh
The purpose of this study is to provide a literature review of the past literature on the use of blockchain for attaining sustainability in start-ups, covering major…
Abstract
Purpose
The purpose of this study is to provide a literature review of the past literature on the use of blockchain for attaining sustainability in start-ups, covering major characteristics of current findings, limitations and prospective study possibilities.
Design/methodology/approach
Papers that included the term “Blockchain,” “Sustainability” and “Start-ups” were considered for the analysis. Biblioshiny package under the R programming tool was considered for a detailed paper analysis.
Findings
Numerous sectors are quickly adopting blockchain technology, which has enormous potential to remove middlemen and boost sustainability in start-ups.
Research limitations/implications
This research is limited to 147 papers from the Scopus database through 2022.
Practical implications
This paper stresses the crucial part that blockchain technology has played in igniting a conversation about innovation and technology. This research will aid in advancing the researcher’s knowledge of blockchain technology in start-ups.
Social implications
Blockchain technology will give transparency and sustainable product or services to consumers of the start-ups.
Originality/value
The novelty of this research is based on its presentation of an organized and thorough literature evaluation, which defines the current state of the art concerning the use of blockchain for sustainability in start-ups. To create a sustainable start-up, a thorough study of how the information gained in respect of its implementation might be spread into the start-ups is presented.
Details
Keywords
Eric Zanghi, Milton Brown Do Coutto Filho and Julio Cesar Stacchini de Souza
The current and modern electrical distribution networks, named smart grids (SGs), use advanced technologies to accomplish all the technical and nontechnical challenges naturally…
Abstract
Purpose
The current and modern electrical distribution networks, named smart grids (SGs), use advanced technologies to accomplish all the technical and nontechnical challenges naturally demanded by energy applications. Energy metering collecting is one of these challenges ranging from the most basic (i.e., visual assessment) to the expensive advanced metering infrastructure (AMI) using intelligent meters networks. The AMIs’ data acquisition and system monitoring environment require enhancing some routine tasks. This paper aims to propose a methodology that uses a distributed and sustainable approach to manage wide-range metering networks, focused on using current public or private telecommunication infrastructure, optimizing the implementation and operation, increasing reliability and decreasing costs.
Design/methodology/approach
Inspired by blockchain technology, a collaborative metering system architecture is conceived, managing massive data sets collected from the grid. The use of cryptography handles data integrity and security issues.
Findings
A robust proof-of-concept simulation results are presented concerning the resilience and performance of the proposed distributed remote metering system.
Originality/value
The methodology proposed in this work is an innovative AMI solution related to SGs. Regardless of the implementation, operation and maintenance of AMIs, the proposed solution is unique, using legacy and new technologies together in a reliable way.
Details
Keywords
Zijun Mao and Yuqian Zhu
The study focuses on influential factors of collaboration on government data security by the Chinese government.
Abstract
Purpose
The study focuses on influential factors of collaboration on government data security by the Chinese government.
Design/methodology/approach
The article explores the case of e-government in the Chinese centralized unitary state system context, using a structured–pragmatic–situational (SPS) approach and the boundary theory as an analytical lens.
Findings
The findings indicate that e-government operates in highly interconnected environments where the safe flow of government data requires collaborative and cross-boundary strategies. Any organization is a potential “weakest link”. In addition, collaboration is fragmented by ambiguous accountability and organizational inertia across government departments, resources differences and limited visibility and measurability of security efforts across government levels and conflicts and uncertainties in principal–agent relationships. The solutions for those obstacles are also discussed from the multi-function, multi-level and multi-actor dimensions, respectively. A multi-dimensional overarching security model for the flow of government data is proposed.
Originality/value
The study advances the technology-oriented micro-analysis of previous studies on government data security to cross-organizational revealing at the macrolevel by connecting streams of research in information systems and public administration. These findings will contribute to making the safe flow of government data more resilient in the transformation of e-government.
Details
Keywords
Faisal Lone, Harsh Kumar Verma and Krishna Pal Sharma
The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable…
Abstract
Purpose
The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.
Design/methodology/approach
This paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.
Findings
Despite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.
Originality/value
The proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.
Details
Keywords
Halil Kiymaz and Carlos Humberto Munoz Valdez
Blockchain technology and its applications have recently received the attention of practitioners and academics. Visualizing the full impact these technologies will have on the…
Abstract
Blockchain technology and its applications have recently received the attention of practitioners and academics. Visualizing the full impact these technologies will have on the world is challenging since their adoption is still in the early stages. This chapter explores how blockchain can disrupt the general business and financial world. Blockchain offers information transparency, live data synchronization, and immutable records that prevent fraud. Digital contracts and digital asset management may heavily depend on the development of blockchain and the adoption of smart contracts. Smart contracts can execute financial transactions automatically and enforce all parties' obligations without needing an intermediary and its cost. They can increase speed and simplify processes, reducing licensing ticketing costs and overhead charges. Blockchain also offers technology adoption solutions, like fair payment, cloud storage, smart contracts for financial assets, and international transactions with bilateral double taxation. It has further facilitated the creation of decentralized finance.
Details