Search results

1 – 10 of 205
Article
Publication date: 10 October 2022

Nidhi Sharma and Ravindara Bhatt

Privacy preservation is a significant concern in Internet of Things (IoT)-enabled event-driven wireless sensor networks (WSNs). Low energy utilization in the event-driven system…

Abstract

Purpose

Privacy preservation is a significant concern in Internet of Things (IoT)-enabled event-driven wireless sensor networks (WSNs). Low energy utilization in the event-driven system is essential if events do not happen. When events occur, IoT-enabled sensor network is required to deal with enormous traffic from the concentration of demand data delivery. This paper aims to explore an effective framework for safeguarding privacy at source in event-driven WSNs.

Design/methodology/approach

This paper discusses three algorithms in IoT-enabled event-driven WSNs: source location privacy for event detection (SLP_ED), chessboard alteration pattern (SLP_ED_CBA) and grid-based source location privacy (GB_SLP). Performance evaluation is done using simulation results and security analysis of the proposed scheme.

Findings

The sensors observe bound events or sensitive items within the network area in the field of interest. The open wireless channel lets an opponent search traffic designs, trace back and reach the start node or the event-detecting node. SLP_ED and SLP_ED_CBA provide better safety level results than dynamic shortest path scheme and energy-efficient source location privacy protection schemes. This paper discusses security analysis for the GB_SLP. Comparative analysis shows that the proposed scheme is more efficient on safety level than existing techniques.

Originality/value

The authors develop the privacy protection scheme in IoT-enabled event-driven WSNs. There are two categories of occurrences: nominal events and critical events. The choice of the route from source to sink relies on the two types of events: nominal or critical; the privacy level required for an event; and the energy consumption needed for the event. In addition, phantom node selection scheme is designed for source location privacy.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 5
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 11 September 2023

Balakrishnan Unny R., Samik Shome, Amit Shankar and Saroj Kumar Pani

This study aims to provide a systematic review of consumer privacy literature in the context of smartphones and undertake a comprehensive analysis of academic research on this…

Abstract

Purpose

This study aims to provide a systematic review of consumer privacy literature in the context of smartphones and undertake a comprehensive analysis of academic research on this evolving research area.

Design/methodology/approach

This review synthesises antecedents, consequences and mediators reported in consumer privacy literature and presents these factors in a conceptual framework to demonstrate the consumer privacy phenomenon.

Findings

Based on the synthesis of constructs reported in the existing literature, a conceptual framework is proposed highlighting antecedents, mediators and outcomes of experiential marketing efforts. Finally, this study deciphers overlooked areas of consumer privacy in the context of smartphone research and provides insightful directions to advance research in this domain in terms of theory development, context, characteristics and methodology.

Originality/value

This study significantly contributes to consumer behaviour literature, specifically consumer privacy literature.

Details

Journal of Consumer Marketing, vol. 41 no. 1
Type: Research Article
ISSN: 0736-3761

Keywords

Article
Publication date: 28 March 2022

Nidhi Raghav and Anoop Kumar Bhola

To make more smart health-care system, the health-care data should be shared in the secure manner, and it improves health-care service quality. This paper aims to implement a…

Abstract

Purpose

To make more smart health-care system, the health-care data should be shared in the secure manner, and it improves health-care service quality. This paper aims to implement a modern decentralized blockchain, safe and easy-to-use health-care technology application in the cloud.

Findings

On observing the graph, the convergence analysis of proposed Levy Flight-integrated moth flame optimization method at 80th iteration was 4.59%, 2.80%, 3.316%, 8.92% and 2.55% higher than the traditional models MFO, artificial bee colony (ABC), particle swarm optimization (PSO), moth search algorithm (MSA) and glow worm swarm optimization (GWSO), respectively, for Hungarian data set. Particularly, in best case scenario, the adopted method attains low cost value (5.672671) when compared to all other traditional models such as MFO (5.727314), ABC (5.711577), PSO (5.706499), MSA (5.764517) and GWSO (5.723353).

Originality/value

The proposed method achieved effective performance in terms of key sensitivity, sanitization effectiveness, restoration effectiveness, etc.

Details

Journal of Engineering, Design and Technology, vol. 22 no. 2
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 28 November 2023

Hitesh Sharma, Praveen Ranjan Srivastava, Sajjad M. Jasimuddin, Zuopeng Justin Zhang and Ikram Jebabli

This study aims to provide a comprehensive analysis of the current privacy concerns in the tourism industry by uncovering the key factors leading to such concerns (i.e. smart…

Abstract

Purpose

This study aims to provide a comprehensive analysis of the current privacy concerns in the tourism industry by uncovering the key factors leading to such concerns (i.e. smart public services, cyber security issues, consumer behaviour and governance). Using papers from multiple sources, the relationship between technology advancements and tourist’s privacy concerns has been established.

Design/methodology/approach

This study adopted a machine learning-based systematic literature review approach to find out the clusters. The study analysed 68 papers using the topic modelling approach. A four-cluster solution was considered to be most representative of the extant literature identified using bibliographic coupling. Finally, content analysis of the selected literature has been performed.

Findings

This study identified four factors majorly leading to privacy concerns amid increasing technological advancements. Moreover, these factors were found to have a dyadic relationship with technological advancements. To everyone’s amazement, sustainable tourism was also found to have led to privacy concerns among tourists along with a lack of governance and cyber security issues. Furthermore, cluster-wise future research directions are provided based on the content analysis.

Originality/value

This study contributes to the literature by systematically reviewing and identifying the four dimensions leading to privacy concerns. To the best of the authors’ knowledge, the study done is the only attempt to synthesize the extant literature on tourists’ privacy concerns using an unbiased scientific approach.

目的

本研究对旅游业当前的隐私问题进行了全面分析, 以揭示导致此类担忧的关键因素(即智能公共服务、网络安全问题、消费者行为和治理)。 通过考察来自多方渠道的现有文献, 本研究确立了技术进步与游客隐私问题之间的关系。

设计/方法/途径

本研究采用基于机器学习的系统文献综述方法来找出聚类。 该研究使用主题建模方法分析了 68 篇文章。四聚类解决方案是现有文献中最具代表的 文献分类方法。最后, 本研究对所选文献进行了内容分析。

研究结果

这项研究确定了在技术进步不断增加的情况下主要导致隐私问题的四个因素。 此外, 这些因素被发现与技术进步有二元关系。 本研究还发现可持续旅游业引发了游客对隐私的担忧以及缺乏治理和网络安全问题。 此外, 通过基于内容的分析, 本研究提供了未来的聚类研究方向。

独创性

本研究对现有文献的贡献在于通过系统地文献综述和分析以确定导致隐私问题的四个维度。该研究是基于公正的科学方法综合现有游客隐私问题文献的首度尝试。

Finalidad/Objetivo

Este estudio proporciona un análisis exhaustivo de la actual preocupación por la privacidad en el sector turístico, poniendo al descubierto los factores clave que la generan (los servicios públicos inteligentes, los problemas de ciberseguridad, el comportamiento de los consumidores y la gobernanza). Gracias al uso de artículos de múltiples fuentes, se ha establecido la relación entre los avances tecnológicos y la preocupación de los turistas por la privacidad.

Diseño/Metodología/Enfoque

Este estudio adoptó un enfoque de revisión sistemática de la literatura basado en el aprendizaje automático para descubrir los conglomerados. El estudio analizó sesenta y ocho artículos utilizando el enfoque de modelización de temas. Se consideró que una solución de cuatro conglomerados era la más representativa de la literatura existente identificada mediante el acoplamiento bibliográfico. Por último, se realizó un análisis de contenido de la bibliografía seleccionada.

Hallazgos

En este estudio se identificaron cuatro factores principales que suscitan inquietud por la privacidad en medio de los crecientes avances tecnológicos. Además, se descubrió que estos factores tienen una relación diádica con dichos avances. Para sorpresa de todos, se halló que el turismo sostenible, junto con la falta de gobernanza y los problemas de ciberseguridad, también suscitan entre los turistas preocupaciones por su privacidad. Finalmente, el análisis de contenido ofrece orientaciones para futuras investigaciones.

Originalidad

Este estudio contribuye a la literatura haciendo una revisión sistemática e identificando las cuatro dimensiones que conducen a la preocupación por la privacidad. Este estudio es el único intento de sintetizar la bibliografía existente sobre la preocupación de los turistas por su privacidad utilizando un enfoque científico imparcial.

Article
Publication date: 20 November 2023

Sandeep Kumar Singh and Mamata Jenamani

The purpose of this paper is to design a consortium-blockchain based framework for cross-organizational business process mining complying with privacy requirements.

Abstract

Purpose

The purpose of this paper is to design a consortium-blockchain based framework for cross-organizational business process mining complying with privacy requirements.

Design/methodology/approach

Business process modeling in a cross-organizational setting is complicated due to privacy concerns. The process mining in this situation occurs through trusted third parties (TTPs). It uses a special class of Petri-nets called workflow nets (WF-nets) to represent the formal specifications of event logs in a blockchain-enabled cross-organization.

Findings

Using a smart contract algorithm, the proposed framework discovers the organization-specific business process models (BPM) without a TTP. The discovered BPMs are formally represented using WF-nets with a message factor to support the authors’ claim. Finally, the applicability and suitability of the proposed framework is demonstrated using a case study of multimodal transportation.

Originality/value

The proposed framework complies with privacy requirements. It shows how to represent the formal specifications of event logs in a blockchain using a special class of Petri-nets called WF-nets. It also presents a smart contract algorithm to discover organization-specific business process models (BPM) without a TTP.

Details

Business Process Management Journal, vol. 30 no. 1
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 21 March 2024

Zhaobin Meng, Yueheng Lu and Hongyue Duan

The purpose of this paper is to study the following two issues regarding blockchain crowdsourcing. First, to design smart contracts with lower consumption to meet the needs of…

Abstract

Purpose

The purpose of this paper is to study the following two issues regarding blockchain crowdsourcing. First, to design smart contracts with lower consumption to meet the needs of blockchain crowdsourcing services and also need to design better interaction modes to further reduce the cost of blockchain crowdsourcing services. Second, to design an effective privacy protection mechanism to protect user privacy while still providing high-quality crowdsourcing services for location-sensitive multiskilled mobile space crowdsourcing scenarios and blockchain exposure issues.

Design/methodology/approach

This paper proposes a blockchain-based privacy-preserving crowdsourcing model for multiskill mobile spaces. The model in this paper uses the zero-knowledge proof method to make the requester believe that the user is within a certain location without the user providing specific location information, thereby protecting the user’s location information and other privacy. In addition, through off-chain calculation and on-chain verification methods, gas consumption is also optimized.

Findings

This study deployed the model on Ethereum for testing. This study found that the privacy protection is feasible and the gas optimization is obvious.

Originality/value

This study designed a mobile space crowdsourcing based on a zero-knowledge proof privacy protection mechanism and optimized gas consumption.

Details

International Journal of Web Information Systems, vol. 20 no. 3
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 29 February 2024

Khurram Shahzad, Shakeel Ahmad Khan and Abid Iqbal

The objectives of the study were to identify the effects of blockchain technology (BT) on the university librarians, the impact of BT on the university library services and to…

Abstract

Purpose

The objectives of the study were to identify the effects of blockchain technology (BT) on the university librarians, the impact of BT on the university library services and to reveal the challenges to adopt BT in the university libraries.

Design/methodology/approach

A systematic literature review was applied to address the objectives of the study. Around 25 studies published in peer-reviewed journals were selected to conduct the study.

Findings

The findings of the study revealed that blockchain technology (BT) has positive effects on the university librarians as it assists them in digital resources management, provision of integrated library services, effective records management and continued professional development. The study also displayed that BT has a positive impact on the university libraries through effective information management, user privacy, collaboration, technological innovation and access control. Results also revealed that technical issues, financial constraints, security problems, skill issues and sociocultural issues created challenges to adopt BT in the university libraries.

Originality/value

The study has offered theoretical implications for future investigators through the provision of innovative literature on the prospectus and challenges associated with blockchain in the context of librarianship. The study has also provided practical implications for management bodies by offering recommendations for the successful adoption of blockchain in the university libraries. Additionally, a framework has been developed to adopt BT successfully in the university libraries for the delivery of smart library services to library patrons.

Open Access
Article
Publication date: 15 January 2024

Christine Prince, Nessrine Omrani and Francesco Schiavone

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper…

1152

Abstract

Purpose

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment.

Design/methodology/approach

An empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population.

Findings

The main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment.

Originality/value

While few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.

Details

Information Technology & People, vol. 37 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 25 July 2023

Smith Oduro-Marfo

The proliferation of surveillance-enhancing laws, policies and technologies across African countries deepens the risk of privacy rights breaches, as well as the risks of adverse…

Abstract

Purpose

The proliferation of surveillance-enhancing laws, policies and technologies across African countries deepens the risk of privacy rights breaches, as well as the risks of adverse profiling and social sorting. There is a heightened need for dedicated advocacy and activism to consistently demand accountability and transparency from African states, governments and their allies regarding surveillance. The purpose of this paper is to understand the issue frames that accompany anti-surveillance and privacy advocacy in Ghana and the related implications.

Design/methodology/approach

Using a qualitative and interpretivist approach, the author focuses on three different surveillance-oriented incidents/programs in Ghana and analyzes the frames underpinning the related advocacy and narratives of various non-state actors.

Findings

Privacy and anti-surveillance advocacy in Ghana tends to be less framed in the context of privacy rights and is more driven by concerns about corruption and value for money. Such pecuniary emphasis is rational per issue salience calculations as it elevates principles of economic probity, transparency and accountability and pursues a high public shock value and resonance.

Practical implications

Economics-centered critiques of surveillance could be counterproductive as they create a low bar for surveillance promoters and sustains a culture of permissible statist intrusions into citizens’ lives once economic virtues are satisfied.

Originality/value

While anti-surveillance and privacy advocacy is budding across African countries, little is known about its nature, frames and modus compared to such advocacy in European and North American settings. To the best of the author’s knowledge, this is likely the first paper or one of the first dedicated fully to anti-surveillance and advocacy in Africa.

Details

Journal of Information, Communication and Ethics in Society, vol. 21 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 15 July 2021

Nehemia Sugianto, Dian Tjondronegoro, Rosemary Stockdale and Elizabeth Irenne Yuwono

The paper proposes a privacy-preserving artificial intelligence-enabled video surveillance technology to monitor social distancing in public spaces.

Abstract

Purpose

The paper proposes a privacy-preserving artificial intelligence-enabled video surveillance technology to monitor social distancing in public spaces.

Design/methodology/approach

The paper proposes a new Responsible Artificial Intelligence Implementation Framework to guide the proposed solution's design and development. It defines responsible artificial intelligence criteria that the solution needs to meet and provides checklists to enforce the criteria throughout the process. To preserve data privacy, the proposed system incorporates a federated learning approach to allow computation performed on edge devices to limit sensitive and identifiable data movement and eliminate the dependency of cloud computing at a central server.

Findings

The proposed system is evaluated through a case study of monitoring social distancing at an airport. The results discuss how the system can fully address the case study's requirements in terms of its reliability, its usefulness when deployed to the airport's cameras, and its compliance with responsible artificial intelligence.

Originality/value

The paper makes three contributions. First, it proposes a real-time social distancing breach detection system on edge that extends from a combination of cutting-edge people detection and tracking algorithms to achieve robust performance. Second, it proposes a design approach to develop responsible artificial intelligence in video surveillance contexts. Third, it presents results and discussion from a comprehensive evaluation in the context of a case study at an airport to demonstrate the proposed system's robust performance and practical usefulness.

Details

Information Technology & People, vol. 37 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

1 – 10 of 205