Search results

1 – 10 of over 6000
Article
Publication date: 19 May 2022

Priyanka Kumari Bhansali, Dilendra Hiran, Hemant Kothari and Kamal Gulati

The purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and progresses…

Abstract

Purpose

The purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and progresses the ease of use, leading to a surge in the number of enterprises and individuals storing data in the cloud. Cloud services are used by various organizations (education, medical and commercial) to store their data. In the health-care industry, for example, patient medical data is outsourced to a cloud server. Instead of relying onmedical service providers, clients can access theirmedical data over the cloud.

Design/methodology/approach

This section explains the proposed cloud-based health-care system for secure data storage and access control called hash-based ciphertext policy attribute-based encryption with signature (hCP-ABES). It provides access control with finer granularity, security, authentication and user confidentiality of medical data. It enhances ciphertext-policy attribute-based encryption (CP-ABE) with hashing, encryption and signature. The proposed architecture includes protection mechanisms to guarantee that health-care and medical information can be securely exchanged between health systems via the cloud. Figure 2 depicts the proposed work's architectural design.

Findings

For health-care-related applications, safe contact with common documents hosted on a cloud server is becoming increasingly important. However, there are numerous constraints to designing an effective and safe data access method, including cloud server performance, a high number of data users and various security requirements. This work adds hashing and signature to the classic CP-ABE technique. It protects the confidentiality of health-care data while also allowing for fine-grained access control. According to an analysis of security needs, this work fulfills the privacy and integrity of health information using federated learning.

Originality/value

The Internet of Things (IoT) technology and smart diagnostic implants have enhanced health-care systems by allowing for remote access and screening of patients’ health issues at any time and from any location. Medical IoT devices monitor patients’ health status and combine this information into medical records, which are then transferred to the cloud and viewed by health providers for decision-making. However, when it comes to information transfer, the security and secrecy of electronic health records become a major concern. This work offers effective data storage and access control for a smart healthcare system to protect confidentiality. CP-ABE ensures data confidentiality and also allows control on data access at a finer level. Furthermore, it allows owners to set up a dynamic patients health data sharing policy under the cloud layer. hCP-ABES proposed fine-grained data access, security, authentication and user privacy of medical data. This paper enhances CP-ABE with hashing, encryption and signature. The proposed method has been evaluated, and the results signify that the proposed hCP-ABES is feasible compared to other access control schemes using federated learning.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 9 April 2024

Ishrat Ayub Sofi, Ajra Bhat and Rahat Gulzar

The study aims to shed light on the current state of “Dataset repositories” indexed in Directory of Open Access Repositories (OpenDOAR).

Abstract

Purpose

The study aims to shed light on the current state of “Dataset repositories” indexed in Directory of Open Access Repositories (OpenDOAR).

Design/methodology/approach

From each repository/record information, the Open-Access Policies, Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH), year of creation and the number of data sets archived in the repositories were manually searched, documented and analyzed.

Findings

Developed countries like the United Kingdom and the USA are primarily involved in the development of institutional open-access repositories comprising significant components of OpenDOAR. The most extensively used software is DSpace. Most data set archives are OAI-PMH compliant but do not follow open-access rules. The study also highlights the sites’ embrace of Web 2.0 capabilities and discovers really simple syndication feeds and Atom integration. The use of social media has made its presence known. Furthermore, the study concludes that the number of data sets kept in repositories is insufficient, although the expansion of such repositories has been consistent over the years.

Practical implications

The work has the potential to benefit both researchers in general and policymakers in particular. Scholars interested in research data, data sharing and data reuse can learn about the present state of repositories that preserve data sets in OpenDOAR. At the same time, policymakers can develop recommendations and policies to assist in the construction and maintenance of repositories for data sets.

Originality/value

According to the literature, there have been numerous studies on open-access repositories and OpenDOAR internationally, but no research has focused on repositories preserving content-type data sets. As a result, the study attempts to uncover various characteristics of OpenDOAR Data set repositories.

Details

Digital Library Perspectives, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2059-5816

Keywords

Open Access
Article
Publication date: 9 October 2023

Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are…

1037

Abstract

Purpose

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are increasingly used in security-critical domains. Current survey works on databases and data security only consider authorization and access control in a very general way and do not regard most of today’s sophisticated requirements. Accordingly, the purpose of this paper is to discuss authorization and access control for relational and NoSQL database models in detail with respect to requirements and current state of the art.

Design/methodology/approach

This paper follows a systematic literature review approach to study authorization and access control for different database models. Starting with a research on survey works on authorization and access control in databases, the study continues with the identification and definition of advanced authorization and access control requirements, which are generally applicable to any database model. This paper then discusses and compares current database models based on these requirements.

Findings

As no survey works consider requirements for authorization and access control in different database models so far, the authors define their requirements. Furthermore, the authors discuss the current state of the art for the relational, key-value, column-oriented, document-based and graph database models in comparison to the defined requirements.

Originality/value

This paper focuses on authorization and access control for various database models, not concrete products. This paper identifies today’s sophisticated – yet general – requirements from the literature and compares them with research results and access control features of current products for the relational and NoSQL database models.

Details

International Journal of Web Information Systems, vol. 20 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 11 April 2023

Di Wang, Deborah Richards, Ayse Aysin Bilgin and Chuanfu Chen

The rising volume of open government data (OGD) contrasts with the limited acceptance and utilization of OGD among citizens. This study investigates the reasons for citizens’ not…

Abstract

Purpose

The rising volume of open government data (OGD) contrasts with the limited acceptance and utilization of OGD among citizens. This study investigates the reasons for citizens’ not using available OGD by comparing citizens’ attitudes towards OGD with the development of OGD portals. The comparison includes four OGD utilization processes derived from the literature, namely OGD awareness, needs, access and consumption.

Design/methodology/approach

A case study in China has been carried out. A sociological questionnaire was designed to collect data from Chinese citizens (demand), and personal visits were carried out to collect data from OGD portals (supply).

Findings

Results show that Chinese citizens have low awareness of OGD and OGD portals. Significant differences were recognized between citizens’ expectations and OGD portals development in OGD categories and features, data access services and support functions. Correlations were found between citizens’ OGD awareness, needs, access and consumption.

Originality/value

By linking the supply of OGD from the governments with each process of citizens’ OGD utilization, this paper proposes a framework for citizens’ OGD utilization lifecycle and provides a new tool to investigate reasons for citizens’ not making use of OGD.

Details

Aslib Journal of Information Management, vol. 76 no. 3
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 19 April 2023

Aasif Mohammad Khan, Fayaz Ahmad Loan, Umer Yousuf Parray and Sozia Rashid

Data sharing is increasingly being recognized as an essential component of scholarly research and publishing. Sharing data improves results and propels research and discovery…

Abstract

Purpose

Data sharing is increasingly being recognized as an essential component of scholarly research and publishing. Sharing data improves results and propels research and discovery forward. Given the importance of data sharing, the purpose of the study is to unveil the present scenario of research data repositories (RDR) and sheds light on strategies and tactics followed by different countries for efficient organization and optimal use of scientific literature.

Design/methodology/approach

The data for the study is collected from registry of RDR (re3data registry) (re3data.org), which covers RDR from different academic disciplines and provides filtration options “Search” and “Browse” to access the repositories. Using these filtration options, the researchers collected metadata of repositories i.e. country wise contribution, content-type data, repository language interface, software usage, metadata standards and data access type. Furthermore, the data was exported to Google Sheets for analysis and visualization.

Findings

The re3data registry holds a rich and diverse collection of data repositories from the majority of countries all over the world. It is revealed that English is the dominant language, and the most widely used software for the creation of data repositories are “DataVerse”, followed by “Dspace” and “MySQL”. The most frequently used metadata standards are “Dublin Core” and “Datacite metadata schema”. The majority of repositories are open, with more than half of the repositories being “disciplinary” in nature, and the most significant data sources include “scientific and statistical data” followed by “standard office documents”.

Research limitations/implications

The main limitation of the study is that the findings are based on the data collected through a single registry of repositories, and only a few characteristic features were investigated.

Originality/value

The study will benefit all countries with a small number of data repositories or no repositories at all, with tools and techniques used by the top repositories to ensure long-term storage and accessibility to research data. In addition to this, the study provides a global overview of RDR and its characteristic features.

Details

Information Discovery and Delivery, vol. 52 no. 1
Type: Research Article
ISSN: 2398-6247

Keywords

Article
Publication date: 5 April 2024

Jawahitha Sarabdeen and Mohamed Mazahir Mohamed Ishak

General Data Protection Regulation (GDPR) of the European Union (EU) was passed to protect data privacy. Though the GDPR intended to address issues related to data privacy in the…

Abstract

Purpose

General Data Protection Regulation (GDPR) of the European Union (EU) was passed to protect data privacy. Though the GDPR intended to address issues related to data privacy in the EU, it created an extra-territorial effect through Articles 3, 45 and 46. Extra-territorial effect refers to the application or the effect of local laws and regulations in another country. Lawmakers around the globe passed or intensified their efforts to pass laws to have personal data privacy covered so that they meet the adequacy requirement under Articles 45–46 of GDPR while providing comprehensive legislation locally. This study aims to analyze the Malaysian and Saudi Arabian legislation on health data privacy and their adequacy in meeting GDPR data privacy protection requirements.

Design/methodology/approach

The research used a systematic literature review, legal content analysis and comparative analysis to critically analyze the health data protection in Malaysia and Saudi Arabia in comparison with GDPR and to see the adequacy of health data protection that could meet the requirement of EU data transfer requirement.

Findings

The finding suggested that the private sector is better regulated in Malaysia than the public sector. Saudi Arabia has some general laws to cover health data privacy in both public and private sector organizations until the newly passed data protection law is implemented in 2024. The finding also suggested that the Personal Data Protection Act 2010 of Malaysia and the Personal Data Protection Law 2022 of Saudi Arabia could be considered “adequate” under GDPR.

Originality/value

The research would be able to identify the key principles that could identify the adequacy of the laws about health data in Malaysia and Saudi Arabia as there is a dearth of literature in this area. This will help to propose suggestions to improve the laws concerning health data protection so that various stakeholders can benefit from it.

Details

International Journal of Law and Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 15 March 2024

Beatrice Arthur and Thomas van der Walt

The purpose of this study is to investigate the current research data management practices among researchers in Ghana and their impact on data reuse and collaborative research…

Abstract

Purpose

The purpose of this study is to investigate the current research data management practices among researchers in Ghana and their impact on data reuse and collaborative research. The study aims to identify the methods used by researchers to store and preserve their research data, as well as to determine the extent to which researchers share their data with others.

Design/methodology/approach

The study uses a mixed-method research strategy to blend qualitative and quantitative data and is conducted at two public and two private universities in Ghana.

Findings

The study revealed that researchers in Ghana currently store and preserve their research data using personal devices, such as laptops, CDs and external flash drives, rather than keeping the data in university data repositories. They also do not share their research data with others, which negatively affects collaborative research. The current practice of storing data on personal devices and not sharing data with others hinders collaborative research. The study recommends that universities in Ghana revise their research policy documents to address RDM-related issues such as data storage, data preservation, data sharing and data reuse.

Research limitations/implications

The study was conducted at two public and two private universities in Ghana, but the findings were placed in a wider context through appropriate references.

Practical implications

This study emphasises the need for sound research data management procedures to support research collaboration and data reuse in Ghana. Universities should provide incentives to academics to disclose their data to encourage data sharing and collaboration.

Social implications

The government and management of universities should consciously invest in the needed technologies and equipment to implement research data management in their universities.

Originality/value

This study looks at how researchers in Ghana manage their research data and how it affects data reuse and collaborative research.

Details

Library Management, vol. 45 no. 3/4
Type: Research Article
ISSN: 0143-5124

Keywords

Article
Publication date: 3 November 2023

Xubu Ma, Yafan Xiang, Chunxiu Qin, Huigang Liang and Dongsu Liu

With the worldwide open government data (OGD) movement and frequent public health emergencies in recent years, academic research on OGD for public health emergencies has been…

Abstract

Purpose

With the worldwide open government data (OGD) movement and frequent public health emergencies in recent years, academic research on OGD for public health emergencies has been growing. However, it is not fully understood how to promote OGD on public health emergencies. Therefore, this paper aims to explore the factors that influence OGD on public health emergencies.

Design/methodology/approach

The technology–organization–environment framework is applied to explore factors that influence OGD during COVID-19. It is argued that the effects of four key factors – technical capacity, organizational readiness, social attention and top-down pressure – are contingent on the severity of the pandemic. A unique data set was created by combining multiple data sources which include archival government data, a survey of 1,034 Chinese respondents during the COVID-19 outbreak and official COVID-19 reports.

Findings

The data analysis indicates that the four factors positively affect OGD, and pandemic severity strengthens the effects of technical capacity, organizational readiness and social attention on OGD.

Originality/value

This study provides theoretical insights regarding how to improve OGD during public health emergencies, which can guide government efforts in sharing data with the public when dealing with outbreak in the future.

Details

The Electronic Library , vol. 42 no. 1
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 21 March 2024

Sukarmi Sukarmi, Kukuh Tejomurti and Udin Silalahi

This study aims to analyze the development of digital market characteristics particularly focusing on how the strategic choices of platforms are not fully reflected in pricing. In…

Abstract

Purpose

This study aims to analyze the development of digital market characteristics particularly focusing on how the strategic choices of platforms are not fully reflected in pricing. In addition, the implications for the development of theories of harm are investigated to explore the necessity of a relevant market definition in assessing infringement and evaluating the adequacy of Indonesian competition law.

Design/methodology/approach

This study is a legal analysis that uses statutory approaches, cases, comparative law and the development of theories of harm in digital mergers. The case approach is conducted by analyzing three cases decided by the Indonesia Business Competition Supervisory Commission. This approach provides insight into the response of Komisi Pengawas Persaingan Usaha concerning the merger and acquisition cases in the digital era as well as the provision of different analyses in conventional markets. However, competition can be potentially damaged in digital markets and a comparative law approach is taken by analyzing digital merger cases decided by authorities in other countries.

Findings

Results reveal that the digital market has created a “relevant market” that is challenging and blurred due to multi-sided network effects and consumer data usage characteristics. Platform-based enterprises’ prices fluctuate due to the digital market’s network effect and consumer data statistics. Smartphone prices depend on the number of apps and consumer data. Neoclassical theory focusing on product markets and location applied in Indonesia must be revised to establish a relevant digital economy market. To evaluate digital mergers, new harm theories are needed. The merger should also protect consumer data. Law Number 27 of 2022 on Personal Data Protection and Government Regulation on the Implementation of Electronic Systems and Transactions protects online consumers, a basic step in due diligence for digital mergers. The Indonesian Government should promptly strengthen the notion of “relevant markets” in the digital economy, which could lead to fair business competition violations like big data control. Notify partners or digital merger participants of the accessibility of sensitive data like transaction history and user location.

Originality/value

The development of digital market characteristics has implications for developing theories of harm in digital markets. Indonesian competition law needs to develop such theories of harm to analyze the potential for anticompetitive digital mergers in the digital economy era.

Details

International Journal of Law and Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 22 March 2024

Ghulam Mustafa, Waqas Rafiq, Naveed Jhamat, Zeeshan Arshad and Farhana Aziz Rana

This study aims to evaluate blockchain as an e-government governance model. It assesses its alignment with legal frameworks, emphasizing robustness against disruptions and…

Abstract

Purpose

This study aims to evaluate blockchain as an e-government governance model. It assesses its alignment with legal frameworks, emphasizing robustness against disruptions and adherence to existing laws.

Design/methodology/approach

The paper explores blockchain’s potential in e-government, focusing on legal, ethical and governance aspects. It conducts an in-depth analysis of blockchain’s integration into data governance, emphasizing legal compliance and resilient security protocols.

Findings

The study comprehensively evaluates blockchain’s implementation, covering privacy, interoperability, consensus mechanisms, scalability and regulatory alignment. It highlights governance’s critical role in ensuring legal compliance within blockchain paradigms.

Research limitations/implications

Ethical and legal concerns arising from blockchain adoption remain unresolved. The study underscores how blockchain challenges its core principles of anonymity and decentralization in e-government settings.

Practical implications

The framework outlined offers potential for diverse technological environments, albeit raising ethical and legal queries. It emphasizes governance’s pivotal role in achieving legal compliance in blockchain adoption.

Social implications

Blockchain’s impact on legal and ethical facets necessitates further exploration to align with its core principles while addressing governance in e-government settings.

Originality/value

This study presents a robust framework for assessing blockchain’s viability in e-government, emphasizing legal compliance, despite ethical and legal intricacies that challenge its fundamental principles.

Details

International Journal of Law and Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1754-243X

Keywords

1 – 10 of over 6000