Search results
1 – 10 of 770Carla Cleri Ferreira and Frida Lind
The purpose of this paper is to characterize the interfaces between manufacturing companies and the Internet of Things (IoT) suppliers involved in their digital servitization.
Abstract
Purpose
The purpose of this paper is to characterize the interfaces between manufacturing companies and the Internet of Things (IoT) suppliers involved in their digital servitization.
Design/methodology/approach
This paper builds on an explorative case study of a manufacturing firm and its IoT suppliers. This paper relies on the Industrial Network Approach to study interfaces between buying firms and their suppliers.
Findings
This paper identifies three distinct types of supplier interfaces: connected, digital and digital-physical. They all contain technical resource interfaces with additional organizational and/or technical complexities that need to be managed. Connectivity, an Agile approach to software development and strong technical dependence emerged as key factors that impact the interactions between manufacturing firms and IoT suppliers and how their resources are combined.
Practical implications
This paper offers managerial implications regarding the importance of internal organization (such as appropriate cross-functional teams) to manage the dynamics of collaborations required by digital technologies, maintain interactions with IoT suppliers and identify and manage interdependences between IoT suppliers. Building close relationships with suppliers of crucial infrastructure (e.g. IoT cloud platform and data security systems) can also be beneficial for manufacturing firms to reduce risks. Finally, attention should be given to IoT technology strategy, which impacts both digital and digital-physical supplier interfaces.
Originality/value
In digital servitization, manufacturing firms are heavily reliant on external resources for IoT technology. Despite this, few studies have investigated the characteristics of their interfaces with IoT suppliers, how these can be managed and how resources are combined.
Details
Keywords
Elina Haapamäki and Jukka Sihvonen
This paper aims to update the cybersecurity-related accounting literature by synthesizing 39 recent theoretical and empirical studies on the topic. Furthermore, the paper provides…
Abstract
Purpose
This paper aims to update the cybersecurity-related accounting literature by synthesizing 39 recent theoretical and empirical studies on the topic. Furthermore, the paper provides a set of categories into which the studies fit.
Design/methodology/approach
This is a synthesis paper that summarizes the research literature on cybersecurity, introducing knowledge from the extant research and revealing areas requiring further examination.
Findings
This synthesis identifies a research framework that consists of the following research themes: cybersecurity and information sharing, cybersecurity investments, internal auditing and controls related to cybersecurity, disclosure of cybersecurity activities and security threats and security breaches.
Practical implications
Academics, practitioners and the public would benefit from a research framework that categorizes the research topics related to cybersecurity in the accounting field. This type of analysis is vital to enhance the understanding of the academic research on cybersecurity and can be used to support the identification of new lines for future research.
Originality/value
This is the first literature analysis of cybersecurity in the accounting field, and it has significant implications for research and practice by detailing, for example, the benefits of and obstacles to information sharing. This synthesis also highlights the importance of the model for cybersecurity investments. Further, the review emphasizes the role of internal auditing and controls to improve cybersecurity.
Details
Keywords
Erik Framner, Simone Fischer-Hübner, Thomas Lorünser, Ala Sarah Alaqra and John Sören Pettersson
The purpose of this paper is to develop a usable configuration management for Archistar, which utilizes secret sharing for redundantly storing data over multiple independent…
Abstract
Purpose
The purpose of this paper is to develop a usable configuration management for Archistar, which utilizes secret sharing for redundantly storing data over multiple independent storage clouds in a secure and privacy-friendly manner. Selecting the optimal secret sharing parameters, cloud storage servers and other settings for securely storing the secret data shares, while meeting all of end user’s requirements and other restrictions, is a complex task. In particular, complex trade-offs between different protection goals and legal privacy requirements need to be made.
Design/methodology/approach
A human-centered design approach with structured interviews and cognitive walkthroughs of user interface mockups with system administrators and other technically skilled users was used.
Findings
Even technically skilled users have difficulties to adequately select secret sharing parameters and other configuration settings for adequately securing the data to be outsourced.
Practical implications
Through these automatic settings, not only system administrators but also non-technical users will be able to easily derive suitable configurations.
Originality/value
The authors present novel human computer interaction (HCI) guidelines for a usable configuration management, which propose to automatically set configuration parameters and to solve trade-offs based on the type of data to be stored in the cloud. Through these automatic settings, not only system administrators but also non-technical users will be able to easily derive suitable configurations.
Details
Keywords
Ana Faizi, Ali Padyab and Andreas Naess
This study aims to address the issue of practicing information security risk assessment (ISRA) on cloud solutions by studying municipalities and large organizations in Sweden.
Abstract
Purpose
This study aims to address the issue of practicing information security risk assessment (ISRA) on cloud solutions by studying municipalities and large organizations in Sweden.
Design/methodology/approach
Four large organizations and five municipalities that use cloud services and conduct ISRA to adhere to their information security risk management practices were studied. Data were gathered qualitatively to answer the study’s research question: How is ISRA practiced on the cloud? The Coat Hanger model was used as a theoretical lens to study and theorize the practices.
Findings
The results showed that the organizations aimed to follow the guidelines, in the form of frameworks or their own experience, to conduct ISRA; furthermore, the frameworks were altered to fit the organizations’ needs. The results further indicated that one of the main concerns with the cloud ISRA was the absence of a culture that integrates risk management. Finally, the findings also stressed the importance of a good understanding and a well-written legal contract between the cloud providers and the organizations using the cloud services.
Originality/value
As opposed to the previous research, which was more inclined to try out and evaluate various cloud ISRA, the study provides insights into the practice of cloud ISRA experienced by the organizations. This study represents the first attempt to investigate cloud ISRA that organizations practice in managing their information security.
Details
Keywords
Dijana Peras and Renata Mekovec
The purpose of this paper is to improve the understanding of cloud service users’ privacy concerns, which are anticipated to considerably hinder cloud service market growth. The…
Abstract
Purpose
The purpose of this paper is to improve the understanding of cloud service users’ privacy concerns, which are anticipated to considerably hinder cloud service market growth. The researchers have explored privacy concerns from dimensions that were identified as relevant in the cloud context.
Design/methodology/approach
Content analysis was used to identify privacy problems that were most often raised in previous cloud research. Multidimensional developmental theory (MDT) was used to build a conceptual model of cloud privacy concerns. Literature review was made to identify the privacy-related constructs used to measure privacy concerns in previous cloud research.
Findings
The paper provides systematization of recent cloud privacy research, proposal of a conceptual model of cloud privacy concerns, identification of measuring instruments that were used to measure privacy concerns in previous cloud research and identification of categories of problems that need to be addressed in future cloud research.
Originality/value
This paper has identified the categories of privacy problems and dimensions that have not yet been measured in the cloud context, to the best of the authors’ knowledge. Their simultaneous examination could clarify the effects of different dimensions on the privacy concerns of cloud users. The conceptual model of cloud privacy concerns will allow cloud service providers to focus on key cloud problems affecting users’ privacy concerns and use the most appropriate privacy protection communication and preservation approaches.
Details
Keywords
Lemma Lessa and Daniel Gebrehawariat
This study is aimed at assessing the information security management practice with a focus on banking card security in selected financial institutions in Ethiopia, using an…
Abstract
Purpose
This study is aimed at assessing the information security management practice with a focus on banking card security in selected financial institutions in Ethiopia, using an international information security standard as a benchmark. It is to identify the gaps and recommend best security practices to help financial institutions meet the required security compliance.
Design/methodology/approach
Two financial sectors were purposively selected. A total of twenty-five respondents (IT executives and IT staff) were included in the study. Quantitative data was collected using the PCI-DSS (Payment Card Industry Data Security Standard) security standard questionnaire. In addition, observation and document analysis were made.
Findings
The result shows that most of the essential security management activities in the financial sectors do not comply with the international security standard. Similarly, the level of most of the indispensable security requirements that should be in place is found to be below the acceptable level. The study also revealed major security factors that prohibit the financial sectors from PCI-DSS security standard compliance.
Originality/value
This study assessed the information security management practice with a focus on banking card security and tried to figure out the limitations of security practices of the organizations surveyed based on the standard adopted. The topic has not been well explored especially in the Ethiopia context. Hence, the result can positively influence security policies, particularly in the banking sector.
Details
Keywords
Vladimirs Reiskarts and Konstantins Savenkovs
This study aims to explore the need for highly technological complexes for control and monitoring, as well as, new concepts and methodologies for maritime resource exploration and…
Abstract
Purpose
This study aims to explore the need for highly technological complexes for control and monitoring, as well as, new concepts and methodologies for maritime resource exploration and exploitation, which are in great demand nowadays.
Design/methodology/approach
This paper provides an analysis of demand, means of creation and development of the methodology and infrastructure for global monitoring, pollution control and supervision of smart systems for activities in exploration, future resource exploitation in deep-water and coastal areas based on Smarthub architecture, Unmanned Aircraft System (UAS), Continuous Acquisition and Life-Cycle Support (CALS) and Blockchain technologies.
Findings
Observational, experimental, simulation, derivational, hybrid descriptive and analytical models, as well as, surrogate models were created, analyzed and implemented for assigned tasks realization. Concept of distributed system for marine environmental monitoring, control and supervising as pilot technology in the context of Technology Readiness Levels (TRL) 3–5 was designed and evaluated.
Originality/value
The activities described in this article should be realized in the design and development of a complex, reliable, robust and sustainable monitoring and inspection system for the control and evaluation of the impact and risk assessment of the exploration and future exploitation of maritime resources.
Details
Keywords
Dhruman Gohil and Shivangi Viral Thakker
Blockchain technology was developed to synchronize the data and transactions over the supply chain network and connected nodes. This paper aims to show how blockchain technology…
Abstract
Purpose
Blockchain technology was developed to synchronize the data and transactions over the supply chain network and connected nodes. This paper aims to show how blockchain technology can enhance flexibility and agility in supply chain operations. The integration of blockchain and other recently developed technology can help deal with supply chain uncertainties and other challenges being faced by the industry.
Design/methodology/approach
Through an extensive literature review of existing research papers and conversation with supply chain managers, barriers and challenges in the supply chain were identified. Some elements were researched of blockchain technology that can be used to resolve some challenges. Blockchain technology and other technologies integration is developed for implementation in supply chain for better visibility and efficiency of supply chain.
Findings
The challenges in the supply chain are categorized, and the solution is given through the integration of blockchain and other technologies like Internet of Things and artificial intelligence. The integration shows the execution of tasks through blockchain and various technologies in supply chain.
Research limitations/implications
Blockchain in supply chain is finding its strong place in India when compared to developing nations. There is a need for technology experts, supply chain managers and consumers to understand blockchain’s importance. Challenges faced by industries to use blockchain may be analyzed further with real-life industry case studies.
Practical implications
This research helps enterprises in successful execution of smart technologies in their supply chains. This research helps enterprises in successful execution of smart technologies in their supply chains. Managers and practitioners may use the models developed in real-time implementation. The technologies are described in detail to help the practitioners select the best suitable for their organization.
Social implications
Digital supply chains are finding the way in industries due to lean and efficient nature. It is beneficial to use the smart technologies to make supply chain green and sustainable.
Originality/value
The implementation of the digital supply chain and its challenges are discussed in the research paper. This will work as a platform for research in the area of technologies for supply chain.
Details
Keywords
Cristina Rodrigues dos Santos Ramos and Maciel M. Queiroz
This paper aims to investigate the influence of trust on adopting and implementing blockchain technology in higher education institutions (HEIs) in Brazil.
Abstract
Purpose
This paper aims to investigate the influence of trust on adopting and implementing blockchain technology in higher education institutions (HEIs) in Brazil.
Design/methodology/approach
This study uses an exploratory qualitative approach to understand the construct of trust in the context of the educational sector. Data were collected through semistructured questionnaires and online interviews.
Findings
The research identified that, for most potential blockchain users, trust positively influences the HEIs, because benefits such as secure data sharing and transaction transparency could optimize the daily routine and avoid fraud in academic documents, providing a cooperative and reliable working environment. In addition, the results suggest that trust is needed to overcome challenges related to issues such as costs and privacy.
Research limitations/implications
This study contributes to the advances in the emerging literature on blockchain in the educational sector as a system with the potential to generate trust, as well as the literature on the technology acceptance models.
Practical implications
For HEI managers and practitioners, this study highlights the need for a greater understanding of the influence of trust in the relationships between HEIs and other stakeholders.
Social implications
This work shows that adopting blockchain technologies would allow users to build social relationships of trust in a cooperative work environment and develop trusted behavior by sharing data securely and transparently.
Originality/value
To the best of the authors’ knowledge, this is one of the first studies on the adoption and implementation of blockchain in the education sector in Brazil.
Details
Keywords
Jun Lin, Zhiqi Shen, Chunyan Miao and Siyuan Liu
With the rapid growth of the Internet of Things (IoT) market and requirement, low power wide area (LPWA) technologies have become popular. In various LPWA technologies, Narrow…
Abstract
Purpose
With the rapid growth of the Internet of Things (IoT) market and requirement, low power wide area (LPWA) technologies have become popular. In various LPWA technologies, Narrow Band IoT (NB-IoT) and long range (LoRa) are two main leading competitive technologies. Compared with NB-IoT networks, which are mainly built and managed by mobile network operators, LoRa wide area networks (LoRaWAN) are mainly operated by private companies or organizations, which suggests two issues: trust of the private network operators and lack of network coverage. This study aims to propose a conceptual architecture design of a blockchain built-in solution for LoRaWAN network servers to solve these two issues for LoRaWAN IoT solution.
Design/methodology/approach
The study proposed modeling, model analysis and architecture design.
Findings
The proposed solution uses the blockchain technology to build an open, trusted, decentralized and tamper-proof system, which provides the indisputable mechanism to verify that the data of a transaction has existed at a specific time in the network.
Originality/value
To the best of our knowledge, this is the first work that integrates blockchain technology and LoRaWAN IoT technology.
Details