Search results

1 – 10 of 53
Article
Publication date: 28 March 2022

Nidhi Raghav and Anoop Kumar Bhola

To make more smart health-care system, the health-care data should be shared in the secure manner, and it improves health-care service quality. This paper aims to implement a…

Abstract

Purpose

To make more smart health-care system, the health-care data should be shared in the secure manner, and it improves health-care service quality. This paper aims to implement a modern decentralized blockchain, safe and easy-to-use health-care technology application in the cloud.

Findings

On observing the graph, the convergence analysis of proposed Levy Flight-integrated moth flame optimization method at 80th iteration was 4.59%, 2.80%, 3.316%, 8.92% and 2.55% higher than the traditional models MFO, artificial bee colony (ABC), particle swarm optimization (PSO), moth search algorithm (MSA) and glow worm swarm optimization (GWSO), respectively, for Hungarian data set. Particularly, in best case scenario, the adopted method attains low cost value (5.672671) when compared to all other traditional models such as MFO (5.727314), ABC (5.711577), PSO (5.706499), MSA (5.764517) and GWSO (5.723353).

Originality/value

The proposed method achieved effective performance in terms of key sensitivity, sanitization effectiveness, restoration effectiveness, etc.

Details

Journal of Engineering, Design and Technology, vol. 22 no. 2
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 21 March 2024

Zhaobin Meng, Yueheng Lu and Hongyue Duan

The purpose of this paper is to study the following two issues regarding blockchain crowdsourcing. First, to design smart contracts with lower consumption to meet the needs of…

Abstract

Purpose

The purpose of this paper is to study the following two issues regarding blockchain crowdsourcing. First, to design smart contracts with lower consumption to meet the needs of blockchain crowdsourcing services and also need to design better interaction modes to further reduce the cost of blockchain crowdsourcing services. Second, to design an effective privacy protection mechanism to protect user privacy while still providing high-quality crowdsourcing services for location-sensitive multiskilled mobile space crowdsourcing scenarios and blockchain exposure issues.

Design/methodology/approach

This paper proposes a blockchain-based privacy-preserving crowdsourcing model for multiskill mobile spaces. The model in this paper uses the zero-knowledge proof method to make the requester believe that the user is within a certain location without the user providing specific location information, thereby protecting the user’s location information and other privacy. In addition, through off-chain calculation and on-chain verification methods, gas consumption is also optimized.

Findings

This study deployed the model on Ethereum for testing. This study found that the privacy protection is feasible and the gas optimization is obvious.

Originality/value

This study designed a mobile space crowdsourcing based on a zero-knowledge proof privacy protection mechanism and optimized gas consumption.

Details

International Journal of Web Information Systems, vol. 20 no. 3
Type: Research Article
ISSN: 1744-0084

Keywords

Open Access
Article
Publication date: 15 January 2024

Christine Prince, Nessrine Omrani and Francesco Schiavone

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper…

1152

Abstract

Purpose

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment.

Design/methodology/approach

An empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population.

Findings

The main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment.

Originality/value

While few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.

Details

Information Technology & People, vol. 37 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 15 July 2021

Nehemia Sugianto, Dian Tjondronegoro, Rosemary Stockdale and Elizabeth Irenne Yuwono

The paper proposes a privacy-preserving artificial intelligence-enabled video surveillance technology to monitor social distancing in public spaces.

Abstract

Purpose

The paper proposes a privacy-preserving artificial intelligence-enabled video surveillance technology to monitor social distancing in public spaces.

Design/methodology/approach

The paper proposes a new Responsible Artificial Intelligence Implementation Framework to guide the proposed solution's design and development. It defines responsible artificial intelligence criteria that the solution needs to meet and provides checklists to enforce the criteria throughout the process. To preserve data privacy, the proposed system incorporates a federated learning approach to allow computation performed on edge devices to limit sensitive and identifiable data movement and eliminate the dependency of cloud computing at a central server.

Findings

The proposed system is evaluated through a case study of monitoring social distancing at an airport. The results discuss how the system can fully address the case study's requirements in terms of its reliability, its usefulness when deployed to the airport's cameras, and its compliance with responsible artificial intelligence.

Originality/value

The paper makes three contributions. First, it proposes a real-time social distancing breach detection system on edge that extends from a combination of cutting-edge people detection and tracking algorithms to achieve robust performance. Second, it proposes a design approach to develop responsible artificial intelligence in video surveillance contexts. Third, it presents results and discussion from a comprehensive evaluation in the context of a case study at an airport to demonstrate the proposed system's robust performance and practical usefulness.

Details

Information Technology & People, vol. 37 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 1 April 2024

Basmah Almekhled and Helen Petrie

This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19…

Abstract

Purpose

This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19 pandemic.

Design/methodology/approach

Online Questionnaire questionnaire was designed to explore Saudi HEI academic’s attitudes and concerns about privacy and security issues in online teaching. The questionnaire asked about attitudes and concerns held before the pandemic and since the pandemic. The questionnaire included four sections. At the beginning of the questionnaire, participants were asked what the phrase “online privacy and security” meant to them, to gain an initial understanding of what it meant to academics. A definition for what we intended for the survey was then provided: “that a person’s data, including their identity, is not accessible to anyone other than themselves and others whom they have authorised and that their computing devices work properly and are free from unauthorised interference” (based on my reading of a range of sources, e.g. Schatz et al., 2017; Steinberg, 2019; NCS; Windley, 2005). This was to ensure that participants did understand what I was asking about in subsequent sections.

Findings

This study investigated the attitudes and concerns of Saudi HEI academics about privacy and security in online teaching during the COVID-19 pandemic. The findings provide several key insights: Key aspects of online privacy and security for Saudi HEI academics: Saudi HEI academic’s notion of online privacy and security is about the protection of personal data, preventing unauthorized access to data and ensuring the confidentiality and integrity of data. This underscores the significance of robust measures to safeguard sensitive information in online teaching, but also the need to make academics aware of the other aspects of online privacy and security. Potential to improve policies and training about online privacy and security in Saudi HEIs: Although many participants were aware of the online privacy and security policies of their HEI, only a small percentage had received training in this area. Thus, there is a need to improve the development and dissemination of policies and to provide academics with appropriate training in this area and encourage them to take available training. Use of videoconferencing and chat technologies and cultural sensitivities: The study highlighted moderate levels of concern among Saudi HEI academics regarding the use of videoconferencing and online chat technologies, and their concerns about cultural factors around the use of these technologies. This emphasizes the need for online teaching and the growing use of technologies in such teaching to respect cultural norms and preferences, highlighting the importance of fostering a culturally sensitive approach to technology deployment and use. Surprising low webcam use: An unexpected finding is the low use of webcams by both academics and students during online teaching sessions, prompting a need for a deeper understanding of the dynamics surrounding webcam engagement in such sessions. This calls for a reevaluation of the effectiveness of webcam use in the teaching process and underscores the importance of exploring methods for enhancing engagement and interaction in online teaching. In summary, this paper investigated the attitudes and concerns about privacy and security in the online teaching of Saudi HEI academics during the coronavirus pandemic. The study reveals areas where further research and policy development can enhance the online teaching experience. As the education landscape continues to evolve, institutions must remain proactive in addressing the concerns of their academics while fostering a culturally sensitive approach to technology deployment.

Research limitations/implications

One limitation of this study is the relatively small qualitative data sample, despite the adequate size of the sample including 36 academics from various Saudi Arabian HEIs for quantitative analysis. It was necessary to make the most of the open-ended questions optional – participants did not have to answer about concerns if they did not want to, as we did not want to make the questionnaire too long and onerous to complete. Consequently, the number of academics responding to the open-ended questions was limited, emphasizing the need for additional data and alternative research methods to further these issues. The study was focused on investigating the concerns of HEI Saudi academics, recognizing that the attitudes and concerns of academics in other countries may differ. Furthermore, the research also includes an exploration of the changes in academic attitudes and concerns before and since the COVID-19 pandemic, which will be the subject of further data analysis.

Originality/value

This research delves into Saudi HEI academics' perceptions and concerns regarding privacy and security in online education during the COVID-19 Pandemic. Notably, it highlights the moderate priority placed on online privacy and security, the unexpectedly low usage of webcams and the potential for enhancing policies and training. The study emphasizes the necessity for comprehensive measures to protect sensitive data and the importance of tailored policies for educators. It also underscores the need for a more nuanced understanding of webcam usage dynamics, offering valuable insights for institutions aiming to improve online education and address educators' concerns amidst evolving educational landscapes.

Article
Publication date: 29 February 2024

Atefeh Hemmati, Mani Zarei and Amir Masoud Rahmani

Big data challenges and opportunities on the Internet of Vehicles (IoV) have emerged as a transformative paradigm to change intelligent transportation systems. With the growth of…

Abstract

Purpose

Big data challenges and opportunities on the Internet of Vehicles (IoV) have emerged as a transformative paradigm to change intelligent transportation systems. With the growth of data-driven applications and the advances in data analysis techniques, the potential for data-adaptive innovation in IoV applications becomes an outstanding development in future IoV. Therefore, this paper aims to focus on big data in IoV and to provide an analysis of the current state of research.

Design/methodology/approach

This review paper uses a systematic literature review methodology. It conducts a thorough search of academic databases to identify relevant scientific articles. By reviewing and analyzing the primary articles found in the big data in the IoV domain, 45 research articles from 2019 to 2023 were selected for detailed analysis.

Findings

This paper discovers the main applications, use cases and primary contexts considered for big data in IoV. Next, it documents challenges, opportunities, future research directions and open issues.

Research limitations/implications

This paper is based on academic articles published from 2019 to 2023. Therefore, scientific outputs published before 2019 are omitted.

Originality/value

This paper provides a thorough analysis of big data in IoV and considers distinct research questions corresponding to big data challenges and opportunities in IoV. It also provides valuable insights for researchers and practitioners in evolving this field by examining the existing fields and future directions for big data in the IoV ecosystem.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 9 April 2024

M A Shariful Amin, Vess L. Johnson, Victor Prybutok and Chang E. Koh

The purpose of this research is to propose and empirically validate a theoretical framework to investigate the willingness of the elderly to disclose personal health information…

Abstract

Purpose

The purpose of this research is to propose and empirically validate a theoretical framework to investigate the willingness of the elderly to disclose personal health information (PHI) to improve the operational efficiency of AI-integrated caregiver robots.

Design/methodology/approach

Drawing upon Privacy Calculus Theory (PCT) and the Technology Acceptance Model (TAM), 274 usable responses were collected through an online survey.

Findings

Empirical results reveal that trust, privacy concerns, and social isolation have a direct impact on the willingness to disclose PHI. Perceived ease of use (PEOU), perceived usefulness (PU), social isolation, and recognized benefits significantly influence user trust. Conversely, elderly individuals with pronounced privacy concerns are less inclined to disclose PHI when using AI-enabled caregiver robots.

Practical implications

Given the pressing need for AI-enabled caregiver robots due to the aging population and a decrease in professional human caregivers, understanding factors that influence the elderly's disclosure of PHI can guide design considerations and policymaking.

Originality/value

Considering the increased demand for accurate and comprehensive elder services, this is the first time that information disclosure and AI-enabled caregiver robot technologies have been combined in the field of healthcare management. This study bridges the gap between the necessity for technological improvement in caregiver robots and the importance of transparent operational information by disclosing the elderly's willingness to share PHI.

Article
Publication date: 5 April 2024

Mutairu Oyewale Akintunde and Halimah Odunayo Amuda

This study aimed to predict and understand the academic libraries' probability of successful adoption of blockchain within the lens of integrated technology acceptance model (TAM…

Abstract

Purpose

This study aimed to predict and understand the academic libraries' probability of successful adoption of blockchain within the lens of integrated technology acceptance model (TAM) and technology organization and environment theory (TOE) framework.

Design/methodology/approach

A mixed approach was employed to gather data from librarians (292) and system analysts (46) totaling 338 respondents. The total enumeration sampling technique was considered. Qualitative data were analyzed thematically, while quantitative data were analyzed using structural equation model (SEM).

Findings

Perceived usefulness and policy are the important factors that influence academic libraries' blockchain adoption intentions. Unlimited access to both print and electronic resources, security of users' information and easy collaboration between users and library staff were found to be the benefits of blockchain application to academic libraries' operations. Major challenges to the adoption of blockchain in academic libraries include the cost of infrastructure related to blockchain applications, privacy issues and a lack of understanding of blockchain technology among librarians.

Research limitations/implications

Future studies would need to include more relevant items to the observed variables of the independent variables that were found insignificant in this study.

Practical implications

The findings of this study will create a roadmap for government and polytechnic management on the factors that could strengthen the adoption of blockchain in the libraries.

Social implications

The outcome of this study came at a crucial moment when the majority of academic libraries in developing nations like Nigeria were skeptical about the deployment of blockchain technology in their libraries.

Originality/value

The study identified new factors that influence blockchain adoption intention.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Open Access
Article
Publication date: 5 April 2024

Aku Valtakoski and Besma Glaa

The study aims to promote the use of qualitative methods in service research by investigating how these methods are reported in service journals, how the level of reporting has…

Abstract

Purpose

The study aims to promote the use of qualitative methods in service research by investigating how these methods are reported in service journals, how the level of reporting has evolved and whether methodological reporting influences the downloads or citations received by qualitative articles.

Design/methodology/approach

Methodological reporting practices were identified through content analysis of 318 qualitative articles published in three major service research journals and comparison with prior methodological literature. Regression analysis was used to test how the level of methodological reporting influences article downloads and citations.

Findings

The study identifies 29 reporting practices related to 9 key methodological reporting areas. The overall level of methodological reporting in published qualitative articles has increased over time. While differences in the level of reporting between service journals persist, they are narrowing. The level of methodological reporting did not influence downloads or citations of qualitative articles.

Research limitations/implications

Service scholars using qualitative methods should pay attention to methodological reporting as it can improve the chances of being published. Factors such as theoretical contributions are likely to have a greater influence on article impact than methodological reporting.

Originality/value

No prior study has explored methodological reporting practices across different qualitative methodologies or how reporting influences article impact. For authors, reviewers and editors, the study provides an inventory of reporting practices relevant for evaluating qualitative articles, which should lower barriers for qualitative methods in service research by providing practical guidelines on what to focus on when reporting and assessing qualitative research.

Details

Journal of Service Management, vol. 35 no. 6
Type: Research Article
ISSN: 1757-5818

Keywords

Article
Publication date: 10 April 2024

Anna Visvizi, Radosław Malik, Gianluca Maria Guazzo and Vilma Çekani

Against the background of the I50 paradigm, this paper queries in what ways blockchain and blockchain-based applications deployed in the smart city context facilitate the…

32

Abstract

Purpose

Against the background of the I50 paradigm, this paper queries in what ways blockchain and blockchain-based applications deployed in the smart city context facilitate the integration of the I50 paradigm in smart urban contexts.

Design/methodology/approach

A mixed methods approach is applied. First, by means of desk research and thematic literature review, a conceptual model integrating the I50 paradigm, smart city and blockchain-based solutions is built. Second, science mapping bibliometric analysis (SciMat) based on keywords’ co-occurrence is applied to a sample of 491 research articles to identify key domains of blockchain-based applications’ use in smart city. Third, a semi-systematic literature review complements insights gained through SciMat. Fourth, the findings are interpreted through the precepts of the conceptual model devised earlier.

Findings

The key blockchain-based applications in smart cities pertain to two domains, i.e. the foundational, service facilitation-oriented domain, including security (and safety), networks, computing, resource management and the service delivery-oriented domain, including mobility, energy and healthcare. Blockchain serves as the key building block for applications developed to deliver functions specific to each of the thus identified domains. A substantial layering of blockchain-based tools and applications is necessary to advance from the less to the more complex functional domains of the smart city.

Originality/value

At the conceptual level, the intricacies of the (making of the) I50 paradigm are discussed and a case for I50 – smart city – blockchain nexus is made. Easton’s input–output model as well as constructivism is referenced. At the empirical level, the key major domains of blockchain-based applications are discussed; those that bear the prospect of integrating the I50 paradigm in the smart city are highlighted. At the methodological level, a strategic move is made aimed at restoring the literature review’s role as subservient to the key line of exploration, to justify and ultimately support it, rather than to showcase the literature review as the ultimate purpose for itself.

Details

European Journal of Innovation Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1460-1060

Keywords

1 – 10 of 53