Search results

1 – 10 of 407
Open Access
Article
Publication date: 31 December 2018

Carmen Bălan

This systematic literature review focuses on the following future advanced information and communication technologies (ICTs) applied in the maritime transport of cargo: Internet…

7145

Abstract

Purpose

This systematic literature review focuses on the following future advanced information and communication technologies (ICTs) applied in the maritime transport of cargo: Internet of Things (IoT), big data, cloud computing and autonomous ships/vessels (including unmanned ships/vessels). The review question is: “RQ: In what context and by means of what mechanism does the implementation of future advanced ICTs have disruptive impact on maritime transport?”.

Design/methodology/approach

The paper complies with the methodological requirements of systematic reviews. The information analysis and synthesis are based on the CIMO logic, referring to the context (C), intervention (I), mechanism (M) and outcome (O) of the implementation of future advanced ICTs in maritime transport.

Findings

The review identifies the contextual factors and components of the mechanism that lead to the disruptive impact of different types of future advanced ICT interventions on maritime transport.

Research limitations/implications

The review approaches only the most important future advanced ICTs that will disrupt maritime transport.

Practical implications

The maritime transport organizations should consider: intended outcome as intervention trigger; increased efficiency and responsiveness; benchmarking.

Originality/value

For the first time, the CIMO logic is applied in a systematic review focused on future advanced ICTs in maritime transport. The CIMO-DMT model is elaborated as a basis for further research. Ten directions of study are recommended in a future research agenda.

Open Access
Article
Publication date: 13 July 2023

Chong Guan, Ding Ding, Jiancang Guo and Yun Teng

This paper reviews the extant research on Web3.0 published between 2003 and 2022.

2165

Abstract

Purpose

This paper reviews the extant research on Web3.0 published between 2003 and 2022.

Design/methodology/approach

This study uses a topic modeling procedure latent Dirichlet allocation to uncover the research themes and the key phrases associated with each theme.

Findings

This study uncovers seven research themes that have been featured in the existing research. In particular, the study highlights the interaction among the research themes that contribute to the understanding of a number of solutions, applications and use cases, such as metaverse and non-fungible tokens.

Research limitations/implications

Despite the relatively small data size of the study, the results remain significant as they contribute to a more profound comprehension of the relevant field and offer guidance for future research directions. The previous analysis revealed that the current Web3.0 technology is still encountering several challenges. Building upon the pioneering research in the field of blockchain, decentralized networks, smart contracts and algorithms, the study proposes an exploratory agenda for future research from an ecosystem approach, targeting to enhance the current state of affairs.

Originality/value

Although topics around Web3.0 have been discussed intensively among the crypto community and technological enthusiasts, there is limited research that provides a comprehensive description of all the related issues and an in-depth analysis of their real-world implications from an ecosystem perspective.

Details

Journal of Electronic Business & Digital Economics, vol. 2 no. 1
Type: Research Article
ISSN: 2754-4214

Keywords

Open Access
Article
Publication date: 10 January 2023

Lorenzo Lynberg and Ahmed Deif

This paper addresses a gap in research literature in the fields of blockchain technology (BC), supply chain network dynamics (SC) and network effect phenomena (NE). Extant BC and…

1363

Abstract

Purpose

This paper addresses a gap in research literature in the fields of blockchain technology (BC), supply chain network dynamics (SC) and network effect phenomena (NE). Extant BC and SC literature describes the potential benefits to be reaped through the adoption of BC technology. While BC technology does not yet meet the researched expectations of adoption, performance and efficacy, the authors analyze the three inter-related fields (BC, SC and NE) to bridge this gap in theory.

Design/methodology/approach

This paper begins with a research review correlating the technological fundamentals of BC technology into fundamental value propositions for SC logistics contexts. The authors review the gap between these theoretical technological functions and the current ecosystem of BC applications. With an overarching understanding of BC in SC contexts, this paper then explores the phenomena of NE and attempts to synthesize various interrelated aspects of the three fields (BC, SC and NE). Research frameworks from extant literature are used for cross-comparing legacy software/information system solutions with potential and existing BC-based solutions. Case studies are utilized to support this analysis.

Findings

Several key considerations and themes are identified to better inform practitioner and researcher decision-making. Novel insights pertain to BC platform architecture and application modularity, integrated governance and decision-making capabilities, and the automation capabilities that arise from a healthy application and smart contract ecosystem.

Originality/value

The core contribution is the synthesis of network effect theory with SC phenomena and BC theory and the exploration of how these three fields are inter-related in the maturation of BC technology. Specifically, the authors deepen insights from extant literature by contextualizing findings with relevant interdisciplinary theoretical frameworks.

Details

Modern Supply Chain Research and Applications, vol. 5 no. 1
Type: Research Article
ISSN: 2631-3871

Keywords

Content available
Book part
Publication date: 9 March 2021

Abstract

Details

The Emerald Handbook of Blockchain for Business
Type: Book
ISBN: 978-1-83982-198-1

Open Access
Article
Publication date: 14 February 2023

Friso van Dijk, Joost Gadellaa, Chaïm van Toledo, Marco Spruit, Sjaak Brinkkemper and Matthieu Brinkhuis

This paper aims that privacy research is divided in distinct communities and rarely considered as a singular field, harming its disciplinary identity. The authors collected…

Abstract

Purpose

This paper aims that privacy research is divided in distinct communities and rarely considered as a singular field, harming its disciplinary identity. The authors collected 119.810 publications and over 3 million references to perform a bibliometric domain analysis as a quantitative approach to uncover the structures within the privacy research field.

Design/methodology/approach

The bibliometric domain analysis consists of a combined directed network and topic model of published privacy research. The network contains 83,159 publications and 462,633 internal references. A Latent Dirichlet allocation (LDA) topic model from the same dataset offers an additional lens on structure by classifying each publication on 36 topics with the network data. The combined outcomes of these methods are used to investigate the structural position and topical make-up of the privacy research communities.

Findings

The authors identified the research communities as well as categorised their structural positioning. Four communities form the core of privacy research: individual privacy and law, cloud computing, location data and privacy-preserving data publishing. The latter is a macro-community of data mining, anonymity metrics and differential privacy. Surrounding the core are applied communities. Further removed are communities with little influence, most notably the medical communities that make up 14.4% of the network. The topic model shows system design as a potentially latent community. Noteworthy is the absence of a centralised body of knowledge on organisational privacy management.

Originality/value

This is the first in-depth, quantitative mapping study of all privacy research.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 17 July 2023

Lei Xu, K. Praveen Parboteeah and Hanqing Fang

The authors enrich and extend the existing institutional anomie theory (IAT) in the hope of sharpening the understanding of the joint effects of selected cultural values and…

Abstract

Purpose

The authors enrich and extend the existing institutional anomie theory (IAT) in the hope of sharpening the understanding of the joint effects of selected cultural values and social institutional changes on women's pre-entrant entrepreneurial attempts. The authors theorize that women are culturally discouraged to pursue pre-entrant entrepreneurial attempts or wealth accumulation in a specific culture. This discouragement creates an anomic strain that motivates women to deviate from cultural prescriptions by engaging in pre-entrant entrepreneurial attempts at a faster speed. Building on this premise, the authors hypothesize that changes in social institutions facilitate the means of achievement for women due to the potential opportunities inherent in such institutional changes.

Design/methodology/approach

Using a randomly selected sample of 1,431 registered active individual users with a minimum of 10,000 followers on a leading entertainment live-streaming platform in the People's Republic of China, the authors examined a unique mix of cultural and institutional changes and their effects on the speed of women's engagement in live-streaming platform activity.

Findings

The authors find support for the impact of the interaction between changes in social institution conditions and cultural values. Unexpectedly, the authors also find a negative impact of cultural values on women's speed of engaging in pre-entrant entrepreneurial attempts.

Originality/value

The authors add institutional change to the IAT framework and provide a novel account for the variation in the pre-entrant entrepreneurial attempts by women on the platform.

Details

New England Journal of Entrepreneurship, vol. 26 no. 2
Type: Research Article
ISSN: 2574-8904

Keywords

Open Access
Article
Publication date: 18 April 2023

Patience Mpofu, Solomon Hopewell Kembo, Marlvern Chimbwanda, Saulo Jacques, Nevil Chitiyo and Kudakwashe Zvarevashe

In response to food supply constraints resulting from coronavirus disease 2019 (COVID-19) restrictions, in the year 2020, the project developed automated household Aquaponics…

Abstract

Purpose

In response to food supply constraints resulting from coronavirus disease 2019 (COVID-19) restrictions, in the year 2020, the project developed automated household Aquaponics units to guarantee food self-sufficiency. However, the automated aquaponics solution did not fully comply with data privacy and portability best practices to protect the data of household owners. The purpose of this study is to develop a data privacy and portability layer on top of the previously developed automated Aquaponics units.

Design/methodology/approach

Design Science Research (DSR) is the research method implemented in this study.

Findings

General Data Protection and Privacy Regulations (GDPR)-inspired principles empowering data subjects including data minimisation, purpose limitation, storage limitation as well as integrity and confidentiality can be implemented in a federated learning (FL) architecture using Pinecone Matrix home servers and edge devices.

Research limitations/implications

The literature reviewed for this study demonstrates that the GDPR right to data portability can have a positive impact on data protection by giving individuals more control over their own data. This is achieved by allowing data subjects to obtain their personal information from a data controller in a format that makes it simple to reuse it in another context and to transmit this information freely to any other data controller of their choice. Data portability is not strictly governed or enforced by data protection laws in the developing world, such as Zimbabwe's Data Protection Act of 2021.

Practical implications

Privacy requirements can be implemented in end-point technology such as smartphones, microcontrollers and single board computer clusters enabling data subjects to be incentivised whilst unlocking the value of their own data in the process fostering competition among data controllers and processors.

Originality/value

The use of end-to-end encryption with Matrix Pinecone on edge endpoints and fog servers, as well as the practical implementation of data portability, are currently not adequately covered in the literature. The study acts as a springboard for a future conversation on the topic.

Details

International Journal of Industrial Engineering and Operations Management, vol. 5 no. 2
Type: Research Article
ISSN: 2690-6090

Keywords

Open Access
Article
Publication date: 11 May 2020

Zhizhao Zhang, Tianzhi Yang and Yuan Liu

The purpose of this work is to bridge FL and blockchain technology through designing a blockchain-based smart agent system architecture and applying in FL. and blockchain…

2256

Abstract

Purpose

The purpose of this work is to bridge FL and blockchain technology through designing a blockchain-based smart agent system architecture and applying in FL. and blockchain technology through designing a blockchain-based smart agent system architecture and applying in FL. FL is an emerging collaborative machine learning technique that trains a model across multiple devices or servers holding private data samples without exchanging their data. The locally trained results are aggregated by a centralized server in a privacy-preserving way. However, there is an assumption where the centralized server is trustworthy, which is impractical. Fortunately, blockchain technology has opened a new era of data exchange among trustless strangers because of its decentralized architecture and cryptography-supported techniques.

Design/methodology/approach

In this study, the author proposes a novel design of a smart agent inspired by the smart contract concept. Specifically, based on the proposed smart agent, a fully decentralized, privacy-preserving and fair deep learning blockchain-FL framework is designed, where the agent network is consistent with the blockchain network and each smart agent is a participant in the FL task. During the whole training process, both the data and the model are not at the risk of leakage.

Findings

A demonstration of the proposed architecture is designed to train a neural network. Finally, the implementation of the proposed architecture is conducted in the Ethereum development, showing the effectiveness and applicability of the design.

Originality/value

The author aims to investigate the feasibility and practicality of linking the three areas together, namely, multi-agent system, FL and blockchain. A blockchain-FL framework, which is based on a smart agent system, has been proposed. The author has made several contributions to the state-of-the-art. First of all, a concrete design of a smart agent model is proposed, inspired by the smart contract concept in blockchain. The smart agent is autonomous and is able to disseminate, verify the information and execute the supported protocols. Based on the proposed smart agent model, a new architecture composed by these agents is formed, which is a blockchain network. Then, a fully decentralized, privacy-preserving and smart agent blockchain-FL framework has been proposed, where a smart agent acts as both a peer in a blockchain network and a participant in a FL task at the same time. Finally, a demonstration to train an artificial neural network is implemented to prove the effectiveness of the proposed framework.

Details

International Journal of Crowd Science, vol. 4 no. 2
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Article
Publication date: 19 May 2022

Akhilesh S Thyagaturu, Giang Nguyen, Bhaskar Prasad Rimal and Martin Reisslein

Cloud computing originated in central data centers that are connected to the backbone of the Internet. The network transport to and from a distant data center incurs long…

1039

Abstract

Purpose

Cloud computing originated in central data centers that are connected to the backbone of the Internet. The network transport to and from a distant data center incurs long latencies that hinder modern low-latency applications. In order to flexibly support the computing demands of users, cloud computing is evolving toward a continuum of cloud computing resources that are distributed between the end users and a distant data center. The purpose of this review paper is to concisely summarize the state-of-the-art in the evolving cloud computing field and to outline research imperatives.

Design/methodology/approach

The authors identify two main dimensions (or axes) of development of cloud computing: the trend toward flexibility of scaling computing resources, which the authors denote as Flex-Cloud, and the trend toward ubiquitous cloud computing, which the authors denote as Ubi-Cloud. Along these two axes of Flex-Cloud and Ubi-Cloud, the authors review the existing research and development and identify pressing open problems.

Findings

The authors find that extensive research and development efforts have addressed some Ubi-Cloud and Flex-Cloud challenges resulting in exciting advances to date. However, a wide array of research challenges remains open, thus providing a fertile field for future research and development.

Originality/value

This review paper is the first to define the concept of the Ubi-Flex-Cloud as the two-dimensional research and design space for cloud computing research and development. The Ubi-Flex-Cloud concept can serve as a foundation and reference framework for planning and positioning future cloud computing research and development efforts.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Content available
Book part
Publication date: 9 March 2021

Abstract

Details

The Emerald Handbook of Blockchain for Business
Type: Book
ISBN: 978-1-83982-198-1

1 – 10 of 407