Search results

1 – 3 of 3
Article
Publication date: 17 June 2019

Lamya Abdullah and Juan Quintero

The purpose of this study is to propose an approach to avoid having to trust a single entity in cloud-based applications. In cloud computing, data processing is delegated to a…

Abstract

Purpose

The purpose of this study is to propose an approach to avoid having to trust a single entity in cloud-based applications. In cloud computing, data processing is delegated to a remote party for efficiency and flexibility reasons. A practical user requirement usually is data privacy; hence, the confidentiality and integrity of data processing needs to be protected. In the common scenarios of cloud computing today, this can only be achieved by assuming that the remote party does not in any form act maliciously.

Design/methodology/approach

An approach that avoids having to trust a single entity is proposed. This approach is based on two concepts: the technical abstraction of sealed computation, i.e. a technical mechanism to confine a privacy-aware processing of data within a tamper-proof hardware container, and the role of an auditing party that itself cannot add functionality to the system but is able to check whether the system (including the mechanism for sealed computation) works as expected.

Findings

Discussion and analysis of the abstract, technical and procedural requirements of these concepts and how they can be applied in practice are explained.

Originality/value

A preliminary version of this paper was published in the proceedings of the second International Workshop on SECurity and Privacy Requirements Engineering (SECPRE, 2018).

Details

Information & Computer Security, vol. 27 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 2 April 2021

Anam Bhatti, Haider Malik, Ahtisham Zahid Kamal, Alamzeb Aamir, Lamya Abdulrahman Alaali and Zahir Ullah

In the field of business, digital transformation is the integration of digital technology into all areas of business, from generating to deliver value to customers. This concept…

2322

Abstract

Purpose

In the field of business, digital transformation is the integration of digital technology into all areas of business, from generating to deliver value to customers. This concept is essential for sustainable growth of a company and its overall economy. Based on this fact, this authentic and informative research is conducted whose major aim is to examine the importance of digital transformation within a business through big data, the Internet of things and blockchain-based capabilities for overall strategic performance within the telecom sector in China.

Design/methodology/approach

For that aim, data quality and technology competence are considered as independent variables, strategic performance as dependent variable and big data analytics capabilities, Internet of things capabilities and blockchain capabilities routinization acted as mediators within this paper. In its data collection mechanism, an online survey was conducted in which questionnaires are randomly distributed to the telecom sector's professionals in which only 343 of them gave their valid outcomes. After collecting primary data, confirmatory factor analysis (CFA) and structural equation modeling (SEM)–based statistical outcomes have been generated.

Findings

Results indicate that there is a significant relationship between data quality and strategic performance and between technological competence and strategic performance. Also, the big data analytics and Internet of Things capabilities acted as significant mediating role between both independent and dependent variables. But blockchain capabilities routinization is that variable that acts as an insignificant mediator between independent and dependent variables' relationship.

Originality/value

Overall, this study is an informative and attractive source for the Chinese government, its telecom industry, administrative body and related ones to understand the importance of such IT capabilities' implications within their operating activities for their strategic performance management. Also, related field scholars can utilize its reliable data in their research analysis. Its major limitations are (1) lack of qualitative/ mixed method of research and (2) lack of comparative analysis that may impact the acceptability factor of this paper, and this weakness can be overcome by upcoming scholars in their research.

Article
Publication date: 3 September 2020

Princy Randhawa, Vijay Shanthagiri, Ajay Kumar and Vinod Yadav

The paper aims to develop a novel method for the classification of different physical activities of a human being, using fabric sensors. This method focuses mainly on classifying…

Abstract

Purpose

The paper aims to develop a novel method for the classification of different physical activities of a human being, using fabric sensors. This method focuses mainly on classifying the physical activity between normal action and violent attack on a victim and verifies its validity.

Design/methodology/approach

The system is realized as a protective jacket that can be worn by the subject. Stretch sensors, pressure sensors and a 9 degree of freedom accelerometer are strategically woven on the jacket. The jacket has an internal bus system made of conductive fabric that connects the sensors to the Flora chip, which acts as the data acquisition unit for the data generated. Different activities such as still, standing up, walking, twist-jump-turn, dancing and violent action are performed. The jacket in this study is worn by a healthy subject. The main phases which describe the activity recognition method undertaken in this study are the placement of sensors, pre-processing of data and deploying machine learning models for classification.

Findings

The effectiveness of the method was validated in a controlled environment. Certain challenges are also faced in building the experimental setup for the collection of data from the hardware. The most tedious challenge is to collect the data without noise and error, created by voltage fluctuations when stretched. The results show that the support vector machine classifier can classify different activities and is able to differentiate normal action and violent attacks with an accuracy of 98.8%, which is superior to other methods and algorithms.

Practical implications

This study leads to an understanding of human physical movement under violent activity. The results show that data compared with normal physical motion, which includes even a form of dance is quite different from the data collected during violent physical motion. This jacket construction with woven sensors can capture every dimension of the physical motion adding features to the data on which the machine learning model will be built.

Originality/value

Unlike other studies, where sensors are placed on isolated parts of the body, in this study, the fabric sensors are woven into the fabric itself to collect the data and to achieve maximum accuracy instead of using isolated wearable sensors. This method, together with a fabric pressure and stretch sensors, can provide key data and accurate feedback information when the victim is being attacked or is in a normal state of action.

Details

Sensor Review, vol. 40 no. 5
Type: Research Article
ISSN: 0260-2288

Keywords

1 – 3 of 3