Search results
1 – 10 of 151Utkarsh Shrivastava, Bernard Han, Ying Zhou and Muhammad Razi
Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR…
Abstract
Purpose
Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR) or security measures (SMs) influence hospitals’ use of health information exchange (HIE) to share PHI with other providers (e.g. physicians, labs, hospitals). The study specifically focuses on how multiple PRs can impede and a strong national security infrastructure (NSI) can support HIE.
Design/methodology/approach
The study uses secondary data from a multi-national and multi-hospital survey administered by the European Union. The multi-level structure of the cross-sectional panel data is used to test the influence of both hospital-level (e.g. PR) and national-level variables (e.g. NSI) on HIE. A total of nine types of HIE, three types of PRs, nine SMs and other relevant control variables are considered. This study uses a two-level random intercept generalized linear model to test the hypothesis proposed in the study.
Findings
The study finds that national-level PRs (NLPR) have the strongest positive influence on HIE in comparison to regional (RLPR) and hospital-level (HLPR) PRs. Moreover, the study finds evidence that the presence of RLPR and HLPR, on average, decreases the positive impact of NLPR by 264%. The SMs also have a significant and positive impact on HIE. Adoption of an additional SM can increase the odds of engaging in a certain type of HIE between 21% and 61%. On the other hand, a strong NSI can also amplify the positive impact of SM on certain types of HIE.
Originality/value
This study extends prior research on the role of PRs in enabling HIE by considering the complexities brought up by adopting multiple PRs. NLPRs have the strongest impact on HIE in comparison to RLPRs or HLPRs. Moreover, public infrastructure initiatives such as those related to secure communications can also complement SMs adopted by the providers by encouraging HIE.
Details
Keywords
Hedaia-t-Allah Nabil Abd Al Ghaffar
The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.
Abstract
Purpose
The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.
Design/methodology/approach
The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.
Findings
The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.
Practical implications
Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.
Originality/value
The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.
Details
Keywords
Rodolfo Canelón, Christian Carrasco and Felipe Rivera
It is well known in the mining industry that the increase in failures and breakdowns is due mainly to a poor maintenance policy for the equipment, in addition to the difficult…
Abstract
Purpose
It is well known in the mining industry that the increase in failures and breakdowns is due mainly to a poor maintenance policy for the equipment, in addition to the difficult access that specialized personnel have to combat the breakdown, which translates into more machine downtime. For this reason, this study aims to propose a remote assistance model for diagnosing and repairing critical breakdowns in mining industry trucks using augmented reality techniques and data analytics with a quality approach that considerably reduces response times, thus optimizing human resources.
Design/methodology/approach
In this work, the six-phase CRIPS-DM methodology is used. Initially, the problem of fault diagnosis in trucks used in the extraction of material in the mining industry is addressed. The authors then propose a model under study that seeks a real-time connection between a service technician attending the truck at the mine site and a specialist located at a remote location, considering the data transmission requirements and the machine's characterization.
Findings
It is considered that the theoretical results obtained in the development of this study are satisfactory from the business point of view since, in the first instance, it fulfills specific objectives related to the telecare process. On the other hand, from the data mining point of view, the results manage to comply with the theoretical aspects of the establishment of failure prediction models through the application of the CRISP-DM methodology. All of the above opens the possibility of developing prediction models through machine learning and establishing the best model for the objective of failure prediction.
Originality/value
The original contribution of this work is the proposal of the design of a remote assistance model for diagnosing and repairing critical failures in the mining industry, considering augmented reality and data analytics. Furthermore, the integration of remote assistance, the characterization of the CAEX, their maintenance information and the failure prediction models allow the establishment of a quality-based model since the database with which the learning machine will work is constantly updated.
Details
Keywords
By providing an overview of the existing knowledge on public governance in the context of Construction 4.0, this review serves as a valuable resource for researchers, policymakers…
Abstract
Purpose
By providing an overview of the existing knowledge on public governance in the context of Construction 4.0, this review serves as a valuable resource for researchers, policymakers and practitioners interested in understanding the current state of public governance in the context of Construction 4.0 and identifying avenues for future research and practical implementation.
Design/methodology/approach
This article presents a systematic and comprehensive review of the academic literature on public governance in the context of Construction 4.0. To ensure a systematic and rigorous selection of source material, the study adopts the Preferred Reporting Items for Systematic Reviews and Meta-Analyses guidelines.
Findings
By examining a wide range of scholarly works, the review identifies and discusses eight recurring themes that are crucial for understanding the role of public governance in Construction 4.0. These themes include policy and regulation, infrastructure and investment, skill development and education, digital inclusion and access, collaboration and partnerships, data governance and privacy, interactions with environmental and societal goals and the impact of Construction 4.0 on public governance itself. The review highlights a significant disparity between the normative debates on the importance of public governance in Construction 4.0 and the empirical knowledge available regarding its practical implementation. While the literature emphasizes the need for effective governance mechanisms to address the challenges and opportunities presented by Construction 4.0, there is a notable lack of empirical research examining the actual implementation and outcomes of public governance strategies.
Originality/value
This is the first systematic review of academic literature on public governance in the context of Construction 4.0.
Details
Keywords
Priyanka Kumari Bhansali, Dilendra Hiran, Hemant Kothari and Kamal Gulati
The purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and progresses…
Abstract
Purpose
The purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and progresses the ease of use, leading to a surge in the number of enterprises and individuals storing data in the cloud. Cloud services are used by various organizations (education, medical and commercial) to store their data. In the health-care industry, for example, patient medical data is outsourced to a cloud server. Instead of relying onmedical service providers, clients can access theirmedical data over the cloud.
Design/methodology/approach
This section explains the proposed cloud-based health-care system for secure data storage and access control called hash-based ciphertext policy attribute-based encryption with signature (hCP-ABES). It provides access control with finer granularity, security, authentication and user confidentiality of medical data. It enhances ciphertext-policy attribute-based encryption (CP-ABE) with hashing, encryption and signature. The proposed architecture includes protection mechanisms to guarantee that health-care and medical information can be securely exchanged between health systems via the cloud. Figure 2 depicts the proposed work's architectural design.
Findings
For health-care-related applications, safe contact with common documents hosted on a cloud server is becoming increasingly important. However, there are numerous constraints to designing an effective and safe data access method, including cloud server performance, a high number of data users and various security requirements. This work adds hashing and signature to the classic CP-ABE technique. It protects the confidentiality of health-care data while also allowing for fine-grained access control. According to an analysis of security needs, this work fulfills the privacy and integrity of health information using federated learning.
Originality/value
The Internet of Things (IoT) technology and smart diagnostic implants have enhanced health-care systems by allowing for remote access and screening of patients’ health issues at any time and from any location. Medical IoT devices monitor patients’ health status and combine this information into medical records, which are then transferred to the cloud and viewed by health providers for decision-making. However, when it comes to information transfer, the security and secrecy of electronic health records become a major concern. This work offers effective data storage and access control for a smart healthcare system to protect confidentiality. CP-ABE ensures data confidentiality and also allows control on data access at a finer level. Furthermore, it allows owners to set up a dynamic patients health data sharing policy under the cloud layer. hCP-ABES proposed fine-grained data access, security, authentication and user privacy of medical data. This paper enhances CP-ABE with hashing, encryption and signature. The proposed method has been evaluated, and the results signify that the proposed hCP-ABES is feasible compared to other access control schemes using federated learning.
Details
Keywords
Tulsi Pawan Fowdur and Ashven Sanghan
The purpose of this paper is to develop a blockchain-based data capture and transmission system that will collect real-time power consumption data from a household electrical…
Abstract
Purpose
The purpose of this paper is to develop a blockchain-based data capture and transmission system that will collect real-time power consumption data from a household electrical appliance and transfer it securely to a local server for energy analytics such as forecasting.
Design/methodology/approach
The data capture system is composed of two current transformer (CT) sensors connected to two different electrical appliances. The CT sensors send the power readings to two Arduino microcontrollers which in turn connect to a Raspberry-Pi for aggregating the data. Blockchain is then enabled onto the Raspberry-Pi through a Java API so that the data are transmitted securely to a server. The server provides real-time visualization of the data as well as prediction using the multi-layer perceptron (MLP) and long short term memory (LSTM) algorithms.
Findings
The results for the blockchain analysis demonstrate that when the data readings are transmitted in smaller blocks, the security is much greater as compared with blocks of larger size. To assess the accuracy of the prediction algorithms data were collected for a 20 min interval to train the model and the algorithms were evaluated using the sliding window approach. The mean average percentage error (MAPE) was used to assess the accuracy of the algorithms and a MAPE of 1.62% and 1.99% was obtained for the LSTM and MLP algorithms, respectively.
Originality/value
A detailed performance analysis of the blockchain-based transmission model using time complexity, throughput and latency as well as energy forecasting has been performed.
Details
Keywords
Ghulam Mustafa, Waqas Rafiq, Naveed Jhamat, Zeeshan Arshad and Farhana Aziz Rana
This study aims to evaluate blockchain as an e-government governance model. It assesses its alignment with legal frameworks, emphasizing robustness against disruptions and…
Abstract
Purpose
This study aims to evaluate blockchain as an e-government governance model. It assesses its alignment with legal frameworks, emphasizing robustness against disruptions and adherence to existing laws.
Design/methodology/approach
The paper explores blockchain’s potential in e-government, focusing on legal, ethical and governance aspects. It conducts an in-depth analysis of blockchain’s integration into data governance, emphasizing legal compliance and resilient security protocols.
Findings
The study comprehensively evaluates blockchain’s implementation, covering privacy, interoperability, consensus mechanisms, scalability and regulatory alignment. It highlights governance’s critical role in ensuring legal compliance within blockchain paradigms.
Research limitations/implications
Ethical and legal concerns arising from blockchain adoption remain unresolved. The study underscores how blockchain challenges its core principles of anonymity and decentralization in e-government settings.
Practical implications
The framework outlined offers potential for diverse technological environments, albeit raising ethical and legal queries. It emphasizes governance’s pivotal role in achieving legal compliance in blockchain adoption.
Social implications
Blockchain’s impact on legal and ethical facets necessitates further exploration to align with its core principles while addressing governance in e-government settings.
Originality/value
This study presents a robust framework for assessing blockchain’s viability in e-government, emphasizing legal compliance, despite ethical and legal intricacies that challenge its fundamental principles.
Details
Keywords
Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng
Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are…
Abstract
Purpose
Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are increasingly used in security-critical domains. Current survey works on databases and data security only consider authorization and access control in a very general way and do not regard most of today’s sophisticated requirements. Accordingly, the purpose of this paper is to discuss authorization and access control for relational and NoSQL database models in detail with respect to requirements and current state of the art.
Design/methodology/approach
This paper follows a systematic literature review approach to study authorization and access control for different database models. Starting with a research on survey works on authorization and access control in databases, the study continues with the identification and definition of advanced authorization and access control requirements, which are generally applicable to any database model. This paper then discusses and compares current database models based on these requirements.
Findings
As no survey works consider requirements for authorization and access control in different database models so far, the authors define their requirements. Furthermore, the authors discuss the current state of the art for the relational, key-value, column-oriented, document-based and graph database models in comparison to the defined requirements.
Originality/value
This paper focuses on authorization and access control for various database models, not concrete products. This paper identifies today’s sophisticated – yet general – requirements from the literature and compares them with research results and access control features of current products for the relational and NoSQL database models.
Details
Keywords
Ji Shi, Minwoo Lee, V.G. Girish, Guangyu Xiao and Choong-Ki Lee
This study aims to investigate tourists’ attitudes and intentions regarding the usage of Chat Generative Pre-trained Transformer (ChatGPT) for accessing tourism information…
Abstract
Purpose
This study aims to investigate tourists’ attitudes and intentions regarding the usage of Chat Generative Pre-trained Transformer (ChatGPT) for accessing tourism information. Furthermore, by integrating the perceived risks associated with ChatGPT and the theory of planned behavior (TPB), this research examines the impact of three types of perceived risks, such as privacy risk, accuracy risk and overreliance risk, on tourists’ behavioral intention.
Design/methodology/approach
Data were gathered for this study by using two online survey platforms, thus resulting in a sample of 536 respondents. The online survey questionnaire assessed tourists’ perceived risks, attitude, subjective norm, perceived behavioral control, behavioral intention and demographic information related to their usage of ChatGPT.
Findings
The structural equation modeling analysis revealed that tourists express concerns about the associated risks of using ChatGPT to search for tourism information, specifically privacy risk, accuracy risk and overreliance risk. It was found that perceived risks significantly influence tourists’ attitude and intention toward the usage of ChatGPT, which is consistent with the hypotheses proposed in previous literature regarding tourists’ perceived risks of ChatGPT.
Research limitations/implications
This work is a preliminary empirical study that assesses tourists’ behavioral intention toward the use of ChatGPT in the field of tourism. Previous research has remained at the hypothetical level, speculating about the impact of ChatGPT on the tourism industry. This study investigates the behavioral intention of tourists who have used ChatGPT to search for travel information. Furthermore, this study provides evidence based on the outcome of this research and offers theoretical foundations for the sustainable development of generative AI in the tourism domain. This study has limitations in that it primarily focused on exploring the risks associated with ChatGPT and did not extensively investigate its range of benefits.
Practical implications
First, to address privacy concerns that pose significant challenges for chatbots various measures, such as data encryption, secure storage and obtaining user consent, are crucial. Second, despite concerns and uncertainties, the introduction of ChatGPT holds promising prospects for the tourism industry. By offering personalized recommendations and enhancing operational efficiency, ChatGPT has the potential to revolutionize travel experiences. Finally, recognizing the potential of ChatGPT in enhancing customer service and operational efficiency is crucial for tourism enterprises.
Social implications
Recognizing the potential of ChatGPT in enhancing customer service and operational efficiency is crucial for tourism enterprises. As their interest in adopting ChatGPT grows, increased investments and resources will be dedicated to developing and implementing ChatGPT solutions. This enhancement may involve creating customized ChatGPT solutions and actively engaging in training and development programs to empower employees in effectively using ChatGPT’s capabilities. Such initiatives can contribute to improved customer service and overall operations within the tourism industry.
Originality/value
This study integrates TPB with perceived risks in ChatGPT, thus providing empirical evidence. It highlights the importance of considering perceived risks in tourists’ intentions and contributes to the sustainable development of generative AI in tourism. As such, it provides valuable insights for practitioners and policymakers.
研究目的
本研究旨在调查游客对使用ChatGPT获取旅游信息的态度和意向。此外, 通过将与ChatGPT相关的感知风险与计划行为理论(TPB)相结合, 本研究探讨了三种感知风险(隐私风险、准确性风险和过度依赖风险)对游客行为意向的影响。
研究方法
本研究通过两个在线调查平台收集了536名受访者的数据。在线调查问卷评估了游客对ChatGPT使用的感知风险、态度、主观规范、感知行为控制、行为意向以及与其使用ChatGPT相关的人口统计信息。
研究发现
结构方程建模分析显示, 游客对使用ChatGPT搜索旅游信息的相关风险表示关切, 特别是隐私风险、准确性风险和过度依赖风险。发现感知风险显著影响游客对使用ChatGPT的态度和意向, 与先前有关游客对ChatGPT感知风险的文献中提出的假设一致。
研究创新
本研究将TPB与ChatGPT中的感知风险相结合, 提供了实证证据。它强调了在考虑游客意向时考虑感知风险的重要性, 并为旅游中生成AI的可持续发展提供了贡献。因此, 它为从业者和政策制定者提供了宝贵的见解。
Details
Keywords
Eric Zanghi, Milton Brown Do Coutto Filho and Julio Cesar Stacchini de Souza
The current and modern electrical distribution networks, named smart grids (SGs), use advanced technologies to accomplish all the technical and nontechnical challenges naturally…
Abstract
Purpose
The current and modern electrical distribution networks, named smart grids (SGs), use advanced technologies to accomplish all the technical and nontechnical challenges naturally demanded by energy applications. Energy metering collecting is one of these challenges ranging from the most basic (i.e., visual assessment) to the expensive advanced metering infrastructure (AMI) using intelligent meters networks. The AMIs’ data acquisition and system monitoring environment require enhancing some routine tasks. This paper aims to propose a methodology that uses a distributed and sustainable approach to manage wide-range metering networks, focused on using current public or private telecommunication infrastructure, optimizing the implementation and operation, increasing reliability and decreasing costs.
Design/methodology/approach
Inspired by blockchain technology, a collaborative metering system architecture is conceived, managing massive data sets collected from the grid. The use of cryptography handles data integrity and security issues.
Findings
A robust proof-of-concept simulation results are presented concerning the resilience and performance of the proposed distributed remote metering system.
Originality/value
The methodology proposed in this work is an innovative AMI solution related to SGs. Regardless of the implementation, operation and maintenance of AMIs, the proposed solution is unique, using legacy and new technologies together in a reliable way.
Details