Search results

1 – 10 of over 1000
Article
Publication date: 19 July 2023

Hamid Reza Nikkhah, Varun Grover and Rajiv Sabherwal

This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of…

Abstract

Purpose

This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of user’s perceptions of apps and providers on the effects of security and privacy concerns and investigate whether assurance mechanisms decrease such concerns.

Design/methodology/approach

This study conducts a scenario-based survey with 694 mobile cloud computing (MCC) app users to understand their perceptions and behaviors.

Findings

This study finds that while perceived value of data transfer to the cloud moderates the effects of security and privacy concerns on continued use behavior, trust only moderates the effect of privacy concerns. This study also finds that perceived effectiveness of security and privacy intervention impacts privacy concerns but does not decrease security concerns.

Originality/value

Prior mobile app studies mainly focused on mobile apps and did not investigate the perceptions of app providers along with app features in the same study. Furthermore, International Organization for Standardization 27018 certification and privacy policy notification are the interventions that exhibit data assurance mechanisms. However, it is unknown whether these interventions are able to decrease users’ security and privacy concerns after using MCC apps.

Details

Information & Computer Security, vol. 32 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 19 May 2022

Priyanka Kumari Bhansali, Dilendra Hiran, Hemant Kothari and Kamal Gulati

The purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and progresses…

Abstract

Purpose

The purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and progresses the ease of use, leading to a surge in the number of enterprises and individuals storing data in the cloud. Cloud services are used by various organizations (education, medical and commercial) to store their data. In the health-care industry, for example, patient medical data is outsourced to a cloud server. Instead of relying onmedical service providers, clients can access theirmedical data over the cloud.

Design/methodology/approach

This section explains the proposed cloud-based health-care system for secure data storage and access control called hash-based ciphertext policy attribute-based encryption with signature (hCP-ABES). It provides access control with finer granularity, security, authentication and user confidentiality of medical data. It enhances ciphertext-policy attribute-based encryption (CP-ABE) with hashing, encryption and signature. The proposed architecture includes protection mechanisms to guarantee that health-care and medical information can be securely exchanged between health systems via the cloud. Figure 2 depicts the proposed work's architectural design.

Findings

For health-care-related applications, safe contact with common documents hosted on a cloud server is becoming increasingly important. However, there are numerous constraints to designing an effective and safe data access method, including cloud server performance, a high number of data users and various security requirements. This work adds hashing and signature to the classic CP-ABE technique. It protects the confidentiality of health-care data while also allowing for fine-grained access control. According to an analysis of security needs, this work fulfills the privacy and integrity of health information using federated learning.

Originality/value

The Internet of Things (IoT) technology and smart diagnostic implants have enhanced health-care systems by allowing for remote access and screening of patients’ health issues at any time and from any location. Medical IoT devices monitor patients’ health status and combine this information into medical records, which are then transferred to the cloud and viewed by health providers for decision-making. However, when it comes to information transfer, the security and secrecy of electronic health records become a major concern. This work offers effective data storage and access control for a smart healthcare system to protect confidentiality. CP-ABE ensures data confidentiality and also allows control on data access at a finer level. Furthermore, it allows owners to set up a dynamic patients health data sharing policy under the cloud layer. hCP-ABES proposed fine-grained data access, security, authentication and user privacy of medical data. This paper enhances CP-ABE with hashing, encryption and signature. The proposed method has been evaluated, and the results signify that the proposed hCP-ABES is feasible compared to other access control schemes using federated learning.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 18 April 2024

Prajakta Chandrakant Kandarkar and V. Ravi

Industry 4.0 has put forward a smart perspective on managing supply chain networks and their operations. The current manufacturing system is primarily data-driven. Industries are…

Abstract

Purpose

Industry 4.0 has put forward a smart perspective on managing supply chain networks and their operations. The current manufacturing system is primarily data-driven. Industries are deploying new emerging technologies in their operations to build a competitive edge in the business environment; however, the true potential of smart manufacturing has not yet been fully unveiled. This research aims to extensively analyse emerging technologies and their interconnection with smart manufacturing in developing smarter supply chains.

Design/methodology/approach

This research endeavours to establish a conceptual framework for a smart supply chain. A real case study on a smart factory is conducted to demonstrate the validity of this framework for building smarter supply chains. A comparative analysis is carried out between conventional and smart supply chains to ascertain the advantages of smart supply chains. In addition, a thorough investigation of the several factors needed to transition from smart to smarter supply chains is undertaken.

Findings

The integration of smart technology exemplifies the ability to improve the efficiency of supply chain operations. Research findings indicate that transitioning to a smart factory radically enhances productivity, quality assurance, data privacy and labour efficiency. The outcomes of this research will help academic and industrial sectors critically comprehend technological breakthroughs and their applications in smart supply chains.

Originality/value

This study highlights the implications of incorporating smart technologies into supply chain operations, specifically in smart purchasing, smart factory operations, smart warehousing and smart customer performance. A paradigm transition from conventional, smart to smarter supply chains offers a comprehensive perspective on the evolving dynamics in automation, optimisation and manufacturing technology domains, ultimately leading to the emergence of Industry 5.0.

Details

Journal of Manufacturing Technology Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1741-038X

Keywords

Article
Publication date: 28 February 2023

Tulsi Pawan Fowdur, M.A.N. Shaikh Abdoolla and Lokeshwar Doobur

The purpose of this paper is to perform a comparative analysis of the delay associated in running two real-time machine learning-based applications, namely, a video quality…

Abstract

Purpose

The purpose of this paper is to perform a comparative analysis of the delay associated in running two real-time machine learning-based applications, namely, a video quality assessment (VQA) and a phishing detection application by using the edge, fog and cloud computing paradigms.

Design/methodology/approach

The VQA algorithm was developed using Android Studio and run on a mobile phone for the edge paradigm. For the fog paradigm, it was hosted on a Java server and for the cloud paradigm on the IBM and Firebase clouds. The phishing detection algorithm was embedded into a browser extension for the edge paradigm. For the fog paradigm, it was hosted on a Node.js server and for the cloud paradigm on Firebase.

Findings

For the VQA algorithm, the edge paradigm had the highest response time while the cloud paradigm had the lowest, as the algorithm was computationally intensive. For the phishing detection algorithm, the edge paradigm had the lowest response time, and the cloud paradigm had the highest, as the algorithm had a low computational complexity. Since the determining factor for the response time was the latency, the edge paradigm provided the smallest delay as all processing were local.

Research limitations/implications

The main limitation of this work is that the experiments were performed on a small scale due to time and budget constraints.

Originality/value

A detailed analysis with real applications has been provided to show how the complexity of an application can determine the best computing paradigm on which it can be deployed.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Book part
Publication date: 12 February 2024

Lerato Aghimien, Clinton Ohis Aigbavboa and Douglas Aghimien

The current era of the fourth industrial revolution has attracted significant research on the use of digital technologies in improving construction project delivery. However, less…

Abstract

The current era of the fourth industrial revolution has attracted significant research on the use of digital technologies in improving construction project delivery. However, less emphasis has been placed on how these digital tools will influence the management of the construction workforce. To this end, using a review of existing works, this chapter explores the fourth industrial revolution and its associated technologies that can positively impact the management of the construction workforce when implemented. Also, the possible challenges that might truncate the successful deployment of digital technologies for effective workforce management were explored. The chapter submitted that implementing workforce management-specific digital platforms and other digital technologies designed for project delivery can aid effective workforce management within construction organisations. Technologies such as cloud computing, the Internet of Things, big data analytics, robotics and automation, and artificial intelligence, among others, offer significant benefits to the effective workforce management of construction organisations. However, several challenges, such as resistance to change due to fear of job loss, cost of investment in digital tools, organisational structure and culture, must be carefully considered as they might affect the successful use of digital tools and by extension, impact the success of workforce management in the organisations.

Details

Construction Workforce Management in the Fourth Industrial Revolution Era
Type: Book
ISBN: 978-1-83797-019-3

Keywords

Article
Publication date: 27 December 2021

Riddhi Thavi, Rujuta Jhaveri, Vaibhav Narwane, Bhaskar Gardas and Nima Jafari Navimipour

This paper aims to provide a literature review on the cloud-based platforms for the education sectors. The several aspects of cloud computing adoption in education…

Abstract

Purpose

This paper aims to provide a literature review on the cloud-based platforms for the education sectors. The several aspects of cloud computing adoption in education, remote/distance learning and the application of cloud-based design and manufacturing (CBDM) have been studied and theorised.

Design/methodology/approach

A four-step methodology was adopted to analyse and categorise the papers obtained through various search engines. Out of 429 research articles, 72 papers were shortlisted for the detailed analysis.

Findings

Many factors that influence cloud computing technology adoption in the education sector have been identified in this paper. The research findings on several research items have been tabulated and discussed. Based on the theoretical research done on cloud computing for education, cloud computing for remote/distance learning and CBDM, cloud computing could enhance the educational systems in mainly developing countries and improve the scope for remote/distance learning.

Research limitations/implications

This study is limited to papers published only in the past decade from 2011 to 2020. Besides, this review was unable to include journal articles published in different languages. Nevertheless, for the effective teaching and learning process, this paper could help understand the importance and improve the process of adopting cloud computing concepts in educational universities and platforms.

Originality/value

This study is a novel one as a research review constituting cloud computing applications in education and extended for remote/distance learning and CBDM, which have not been studied in the existing knowledge base.

Open Access
Article
Publication date: 25 May 2023

Suchismita Swain, Kamalakanta Muduli, Anil Kumar and Sunil Luthra

The goal of this research is to analyse the obstacles to the implementation of mobile health (mHealth) in India and to gain an understanding of the contextual inter-relationships…

Abstract

Purpose

The goal of this research is to analyse the obstacles to the implementation of mobile health (mHealth) in India and to gain an understanding of the contextual inter-relationships that exist amongst those obstacles.

Design/methodology/approach

Potential barriers and their interrelationships in their respective contexts have been uncovered. Using MICMAC analysis, the categorization of these barriers was done based on their degree of reliance and driving power (DP). Furthermore, an interpretive structural modeling (ISM) framework for the barriers to mHealth activities in India has been proposed.

Findings

The study explores a total of 15 factors that reduce the efficiency of mHealth adoption in India. The findings of the Matrix Cross-Reference Multiplication Applied to a Classification (MICMAC) investigation show that the economic situation of the government, concerns regarding the safety of intellectual technologies and privacy issues are the primary obstacles because of the significant driving power they have in mHealth applications.

Practical implications

Promoters of mHealth practices may be able to make better plans if they understand the social barriers and how they affect each other; this leads to easier adoption of these practices. The findings of this study might be helpful for governments of developing nations to produce standards relating to the deployment of mHealth; this will increase the efficiency with which it is adopted.

Originality/value

At this time, there is no comprehensive analysis of the factors that influence the adoption of mobile health care with social cognitive theory in developing nations like India. In addition, there is a lack of research in investigating how each of these elements affects the success of mHealth activities and how the others interact with them. Because developed nations learnt the value of mHealth practices during the recent pandemic, this study, by investigating the obstacles to the adoption of mHealth and their inter-relationships, makes an important addition to both theory and practice.

Details

International Journal of Industrial Engineering and Operations Management, vol. 6 no. 2
Type: Research Article
ISSN: 2690-6090

Keywords

Article
Publication date: 21 March 2024

Zhaobin Meng, Yueheng Lu and Hongyue Duan

The purpose of this paper is to study the following two issues regarding blockchain crowdsourcing. First, to design smart contracts with lower consumption to meet the needs of…

Abstract

Purpose

The purpose of this paper is to study the following two issues regarding blockchain crowdsourcing. First, to design smart contracts with lower consumption to meet the needs of blockchain crowdsourcing services and also need to design better interaction modes to further reduce the cost of blockchain crowdsourcing services. Second, to design an effective privacy protection mechanism to protect user privacy while still providing high-quality crowdsourcing services for location-sensitive multiskilled mobile space crowdsourcing scenarios and blockchain exposure issues.

Design/methodology/approach

This paper proposes a blockchain-based privacy-preserving crowdsourcing model for multiskill mobile spaces. The model in this paper uses the zero-knowledge proof method to make the requester believe that the user is within a certain location without the user providing specific location information, thereby protecting the user’s location information and other privacy. In addition, through off-chain calculation and on-chain verification methods, gas consumption is also optimized.

Findings

This study deployed the model on Ethereum for testing. This study found that the privacy protection is feasible and the gas optimization is obvious.

Originality/value

This study designed a mobile space crowdsourcing based on a zero-knowledge proof privacy protection mechanism and optimized gas consumption.

Details

International Journal of Web Information Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 16 January 2023

Faisal Lone, Harsh Kumar Verma and Krishna Pal Sharma

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable…

Abstract

Purpose

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.

Design/methodology/approach

This paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.

Findings

Despite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.

Originality/value

The proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 29 February 2024

Atefeh Hemmati, Mani Zarei and Amir Masoud Rahmani

Big data challenges and opportunities on the Internet of Vehicles (IoV) have emerged as a transformative paradigm to change intelligent transportation systems. With the growth of…

Abstract

Purpose

Big data challenges and opportunities on the Internet of Vehicles (IoV) have emerged as a transformative paradigm to change intelligent transportation systems. With the growth of data-driven applications and the advances in data analysis techniques, the potential for data-adaptive innovation in IoV applications becomes an outstanding development in future IoV. Therefore, this paper aims to focus on big data in IoV and to provide an analysis of the current state of research.

Design/methodology/approach

This review paper uses a systematic literature review methodology. It conducts a thorough search of academic databases to identify relevant scientific articles. By reviewing and analyzing the primary articles found in the big data in the IoV domain, 45 research articles from 2019 to 2023 were selected for detailed analysis.

Findings

This paper discovers the main applications, use cases and primary contexts considered for big data in IoV. Next, it documents challenges, opportunities, future research directions and open issues.

Research limitations/implications

This paper is based on academic articles published from 2019 to 2023. Therefore, scientific outputs published before 2019 are omitted.

Originality/value

This paper provides a thorough analysis of big data in IoV and considers distinct research questions corresponding to big data challenges and opportunities in IoV. It also provides valuable insights for researchers and practitioners in evolving this field by examining the existing fields and future directions for big data in the IoV ecosystem.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 10 of over 1000