Search results

1 – 10 of over 16000
Open Access
Article
Publication date: 9 October 2023

Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are…

Abstract

Purpose

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are increasingly used in security-critical domains. Current survey works on databases and data security only consider authorization and access control in a very general way and do not regard most of today’s sophisticated requirements. Accordingly, the purpose of this paper is to discuss authorization and access control for relational and NoSQL database models in detail with respect to requirements and current state of the art.

Design/methodology/approach

This paper follows a systematic literature review approach to study authorization and access control for different database models. Starting with a research on survey works on authorization and access control in databases, the study continues with the identification and definition of advanced authorization and access control requirements, which are generally applicable to any database model. This paper then discusses and compares current database models based on these requirements.

Findings

As no survey works consider requirements for authorization and access control in different database models so far, the authors define their requirements. Furthermore, the authors discuss the current state of the art for the relational, key-value, column-oriented, document-based and graph database models in comparison to the defined requirements.

Originality/value

This paper focuses on authorization and access control for various database models, not concrete products. This paper identifies today’s sophisticated – yet general – requirements from the literature and compares them with research results and access control features of current products for the relational and NoSQL database models.

Details

International Journal of Web Information Systems, vol. 20 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Content available
Book part
Publication date: 30 July 2018

Abstract

Details

Marketing Management in Turkey
Type: Book
ISBN: 978-1-78714-558-0

Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

6135

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 18 April 2023

Heng Xu and Nan Zhang

Privacy scholars appear to struggle in conceptualizing blockchain from a privacy perspective: is it a privacy-enhancing mechanism like differential privacy, a privacy-intruding…

1307

Abstract

Purpose

Privacy scholars appear to struggle in conceptualizing blockchain from a privacy perspective: is it a privacy-enhancing mechanism like differential privacy, a privacy-intruding tool like third-party cookies or a technology orthogonal to the issue of privacy? Blockchain does not seem to neatly fit into any of these buckets that we traditionally use to gauge the privacy implications of information technologies. In this article, the authors argue that blockchain transcends the extant conceptualization of privacy because it modifies the nature of data flow upon which the modern concept of privacy is based.

Design/methodology/approach

The authors introduce a conceptualization of blockchain as a new mechanism for data management. Then, following this conceptualization, the authors present a functional review of blockchain, summarizing the features it provides for the data it manages. This review sets up the discussion of how blockchain redefines data flow by separating the power of collection, access and query of data to different entities. After illustrating how this change regrounds privacy concerns in a blockchain system, the authors conclude with a discussion of the recommendations for future privacy research on blockchain.

Findings

The authors demonstrate that blockchain, by design, separates three core data-centric operations that are assumed to be inextricably linked in the canonical conceptualization of privacy: the collection, access and query of data. Collection means to capture and then store the data; access means to modify or augment the data and query means the ability to test or verify certain properties of the data (e.g. whether a bank account has a zero balance). Traditionally, any entities that collect data can evidently read, modify or query the same data as they wish. With blockchain, however, an entity that stores the data may not be able to modify the data, yet an entity that cannot even read the data may be able to verify certain properties of the data.

Originality/value

Privacy scholars appear to struggle in conceptualizing blockchain from a privacy perspective: is it a privacy-enhancing mechanism like differential privacy, a privacy-intruding tool like third-party cookies or a technology orthogonal to the issue of privacy? In this article, the authors aim to respond to this important question.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 26 February 2019

Malkiat Thiarai, Sarunkorn Chotvijit and Stephen Jarvis

There is significant national interest in tackling issues surrounding the needs of vulnerable children and adults. This paper aims to argue that much value can be gained from the…

3755

Abstract

Purpose

There is significant national interest in tackling issues surrounding the needs of vulnerable children and adults. This paper aims to argue that much value can be gained from the application of new data-analytic approaches to assist with the care provided to vulnerable children. This paper highlights the ethical and information governance issues raised in the development of a research project that sought to access and analyse children’s social care data.

Design/methodology/approach

The paper documents the process involved in identifying, accessing and using data held in Birmingham City Council’s social care system for collaborative research with a partner organisation. This includes identifying the data, its structure and format; understanding the Data Protection Act 1998 and 2018 (DPA) exemptions that are relevant to ensure that legal obligations are met; data security and access management; the ethical and governance approval process.

Findings

The findings will include approaches to understanding the data, its structure and accessibility tasks involved in addressing ethical and legal obligations and requirements of the ethical and governance processes.

Originality/value

The aim of this research is to highlight the potential use of use new data-analytic techniques to examine the flow of children’s social care data from referral, through the assessment process, to the resulting service provision. Data held by Birmingham City Council are used throughout, and this paper highlights key ethical and information governance issues which were addressed in preparing and conducting the research. The findings provide insight for other data-led studies of a similar nature.

Details

Records Management Journal, vol. 29 no. 1/2
Type: Research Article
ISSN: 0956-5698

Keywords

Open Access
Article
Publication date: 23 March 2022

Qi Ji, Yuanming Zhang, Gang Xiao, Hongfang Zhou and Zheng Lin

Data service (DS) is a special software service that enables data access in cloud environment and provides a unified data model for cross-origination data integration and data

355

Abstract

Purpose

Data service (DS) is a special software service that enables data access in cloud environment and provides a unified data model for cross-origination data integration and data sharing. The purpose of the work is to automatically compose DSs and quickly generate data view to satisfy users' various data requirements (DRs).

Design/methodology/approach

The paper proposes an automatic DS composition and view generation approach. DSs are organized into DS dependence graph (DSDG) based on their inherent dependences, and DSs can be automatically composed using the DSDG according to user's DRs. Then, data view will be generated by interpreting the composed DS.

Findings

Experimental results with real cross-origination data sets show the proposed approaches have high efficiency and good quality for DS composition and view generation.

Originality/value

The authors propose a DS composition algorithm and a data view generation algorithm according to users' DRs.

Details

Journal of Intelligent Manufacturing and Special Equipment, vol. 3 no. 1
Type: Research Article
ISSN: 2633-6596

Keywords

Content available
Article
Publication date: 8 July 2022

Vania Vidal, Valéria Magalhães Pequeno, Narciso Moura Arruda Júnior and Marco Antonio Casanova

Enterprise knowledge graphs (EKG) in resource description framework (RDF) consolidate and semantically integrate heterogeneous data sources into a comprehensive dataspace…

Abstract

Purpose

Enterprise knowledge graphs (EKG) in resource description framework (RDF) consolidate and semantically integrate heterogeneous data sources into a comprehensive dataspace. However, to make an external relational data source accessible through an EKG, an RDF view of the underlying relational database, called an RDB2RDF view, must be created. The RDB2RDF view should be materialized in situations where live access to the data source is not possible, or the data source imposes restrictions on the type of query forms and the number of results. In this case, a mechanism for maintaining the materialized view data up-to-date is also required. The purpose of this paper is to address the problem of the efficient maintenance of externally materialized RDB2RDF views.

Design/methodology/approach

This paper proposes a formal framework for the incremental maintenance of externally materialized RDB2RDF views, in which the server computes and publishes changesets, indicating the difference between the two states of the view. The EKG system can then download the changesets and synchronize the externally materialized view. The changesets are computed based solely on the update and the source database state and require no access to the content of the view.

Findings

The central result of this paper shows that changesets computed according to the formal framework correctly maintain the externally materialized RDB2RDF view. The experiments indicate that the proposed strategy supports live synchronization of large RDB2RDF views and that the time taken to compute the changesets with the proposed approach was almost three orders of magnitude smaller than partial rematerialization and three orders of magnitude smaller than full rematerialization.

Originality/value

The main idea that differentiates the proposed approach from previous work on incremental view maintenance is to explore the object-preserving property of typical RDB2RDF views so that the solution can deal with views with duplicates. The algorithms for the incremental maintenance of relational views with duplicates published in the literature require querying the materialized view data to precisely compute the changesets. By contrast, the approach proposed in this paper requires no access to view data. This is important when the view is maintained externally, because accessing a remote data source may be too slow.

Details

International Journal of Web Information Systems, vol. 18 no. 5/6
Type: Research Article
ISSN: 1744-0084

Keywords

Content available
Article
Publication date: 9 October 2019

Ysabel Gerrard and Jo Bates

1065

Abstract

Details

Online Information Review, vol. 43 no. 6
Type: Research Article
ISSN: 1468-4527

Open Access
Article
Publication date: 9 May 2022

Dan-Richard Knudsen, Anatoli Bourmistrov and Katarina Kaarbøe

Research suggests that centers of calculation, empowered by accounting inscriptions, are similar to maps: they provide a useful, albeit simplified, version of reality. The…

1344

Abstract

Purpose

Research suggests that centers of calculation, empowered by accounting inscriptions, are similar to maps: they provide a useful, albeit simplified, version of reality. The purposes of this paper are to examine whether and how digital platforms change the nature of centers of calculation, and to improve the understanding of the relationship between digital platforms and accounting.

Design/methodology/approach

An in-depth, single case-study design is used to empirically investigate how a Nordic hotel chain competed with global online travel agencies (OTAs) in the quest for the “new oil”—customer data.

Findings

The paper demonstrates how the case organization created a local alternative to global digital platforms with the aim of acquiring customer data, thereby moving from a center of calculation (CoC) to what authors label a “center of data appropriation” (CDA). While CoCs are guided by accounting inscriptions that enable “mapping”, CDAs are constructed around accounting inscriptions with other properties that enable digital “mirrors” of the economic domain. The authors find that this has two governing effects. First, multiple centers emerge that compete for access to the periphery. Second, future forms of competition can follow dynamic trajectories, where mutual dependence between CDAs may lead to coopetition.

Originality/value

Scholars have suggested that surveillance capitalism creates market-power imbalances. This study indicates that the transformation of local organizations into CDAs enables them to challenge global digital-platform organizations. Therefore, authors argue that local organizations may retain some market power by establishing local CDAs.

Details

Accounting, Auditing & Accountability Journal, vol. 35 no. 9
Type: Research Article
ISSN: 0951-3574

Keywords

Open Access
Article
Publication date: 24 October 2022

Suzana Sukovic, Jamaica Eisner and Kerith Duncanson

Effective use of data across public health organisations (PHOs) is essential for the provision of health services. While health technology and data use in clinical practice have…

Abstract

Purpose

Effective use of data across public health organisations (PHOs) is essential for the provision of health services. While health technology and data use in clinical practice have been investigated, interactions with data in non-clinical practice have been largely neglected. The purpose of this paper is to consider what constitutes data, and how people in non-clinical roles in a PHO interact with data in their practice.

Design/methodology/approach

This mixed methods study involved a qualitative exploration of how employees of a large PHO interact with data in their non-clinical work roles. A quantitative survey was administered to complement insights gained through qualitative investigation.

Findings

Organisational boundaries emerged as a defining issue in interactions with data. The results explain how data work happens through observing, spanning and shifting of boundaries. The paper identifies five key issues that shape data work in relation to boundaries. Boundary objects and processes are considered, as well as the roles of boundary spanners and shifters.

Research limitations/implications

The study was conducted in a large Australian PHO, which is not completely representative of the unique contexts of similar organisations. The study has implications for research in information and organisational studies, opening fields of inquiry for further investigation.

Practical implications

Effective systems-wide data use can improve health service efficiencies and outcomes. There are also implications for the provision of services by other health and public sectors.

Originality/value

The study contributes to closing a significant research gap in understanding interactions with data in the workplace, particularly in non-clinical roles in health. Research analysis connects concepts of knowledge boundaries, boundary spanning and boundary objects with insights into information behaviours in the health workplace. Boundary processes emerge as an important concept to understand interactions with data. The result is a novel typology of interactions with data in relation to organisational boundaries.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

1 – 10 of over 16000