Search results

1 – 10 of 770
Open Access
Article
Publication date: 20 July 2022

Carla Cleri Ferreira and Frida Lind

The purpose of this paper is to characterize the interfaces between manufacturing companies and the Internet of Things (IoT) suppliers involved in their digital servitization.

1638

Abstract

Purpose

The purpose of this paper is to characterize the interfaces between manufacturing companies and the Internet of Things (IoT) suppliers involved in their digital servitization.

Design/methodology/approach

This paper builds on an explorative case study of a manufacturing firm and its IoT suppliers. This paper relies on the Industrial Network Approach to study interfaces between buying firms and their suppliers.

Findings

This paper identifies three distinct types of supplier interfaces: connected, digital and digital-physical. They all contain technical resource interfaces with additional organizational and/or technical complexities that need to be managed. Connectivity, an Agile approach to software development and strong technical dependence emerged as key factors that impact the interactions between manufacturing firms and IoT suppliers and how their resources are combined.

Practical implications

This paper offers managerial implications regarding the importance of internal organization (such as appropriate cross-functional teams) to manage the dynamics of collaborations required by digital technologies, maintain interactions with IoT suppliers and identify and manage interdependences between IoT suppliers. Building close relationships with suppliers of crucial infrastructure (e.g. IoT cloud platform and data security systems) can also be beneficial for manufacturing firms to reduce risks. Finally, attention should be given to IoT technology strategy, which impacts both digital and digital-physical supplier interfaces.

Originality/value

In digital servitization, manufacturing firms are heavily reliant on external resources for IoT technology. Despite this, few studies have investigated the characteristics of their interfaces with IoT suppliers, how these can be managed and how resources are combined.

Details

Journal of Business & Industrial Marketing, vol. 38 no. 6
Type: Research Article
ISSN: 0885-8624

Keywords

Open Access
Article
Publication date: 15 July 2019

Elina Haapamäki and Jukka Sihvonen

This paper aims to update the cybersecurity-related accounting literature by synthesizing 39 recent theoretical and empirical studies on the topic. Furthermore, the paper provides…

22251

Abstract

Purpose

This paper aims to update the cybersecurity-related accounting literature by synthesizing 39 recent theoretical and empirical studies on the topic. Furthermore, the paper provides a set of categories into which the studies fit.

Design/methodology/approach

This is a synthesis paper that summarizes the research literature on cybersecurity, introducing knowledge from the extant research and revealing areas requiring further examination.

Findings

This synthesis identifies a research framework that consists of the following research themes: cybersecurity and information sharing, cybersecurity investments, internal auditing and controls related to cybersecurity, disclosure of cybersecurity activities and security threats and security breaches.

Practical implications

Academics, practitioners and the public would benefit from a research framework that categorizes the research topics related to cybersecurity in the accounting field. This type of analysis is vital to enhance the understanding of the academic research on cybersecurity and can be used to support the identification of new lines for future research.

Originality/value

This is the first literature analysis of cybersecurity in the accounting field, and it has significant implications for research and practice by detailing, for example, the benefits of and obstacles to information sharing. This synthesis also highlights the importance of the model for cybersecurity investments. Further, the review emphasizes the role of internal auditing and controls to improve cybersecurity.

Details

Managerial Auditing Journal, vol. 34 no. 7
Type: Research Article
ISSN: 0268-6902

Keywords

Open Access
Article
Publication date: 9 October 2019

Erik Framner, Simone Fischer-Hübner, Thomas Lorünser, Ala Sarah Alaqra and John Sören Pettersson

The purpose of this paper is to develop a usable configuration management for Archistar, which utilizes secret sharing for redundantly storing data over multiple independent…

3955

Abstract

Purpose

The purpose of this paper is to develop a usable configuration management for Archistar, which utilizes secret sharing for redundantly storing data over multiple independent storage clouds in a secure and privacy-friendly manner. Selecting the optimal secret sharing parameters, cloud storage servers and other settings for securely storing the secret data shares, while meeting all of end user’s requirements and other restrictions, is a complex task. In particular, complex trade-offs between different protection goals and legal privacy requirements need to be made.

Design/methodology/approach

A human-centered design approach with structured interviews and cognitive walkthroughs of user interface mockups with system administrators and other technically skilled users was used.

Findings

Even technically skilled users have difficulties to adequately select secret sharing parameters and other configuration settings for adequately securing the data to be outsourced.

Practical implications

Through these automatic settings, not only system administrators but also non-technical users will be able to easily derive suitable configurations.

Originality/value

The authors present novel human computer interaction (HCI) guidelines for a usable configuration management, which propose to automatically set configuration parameters and to solve trade-offs based on the type of data to be stored in the cloud. Through these automatic settings, not only system administrators but also non-technical users will be able to easily derive suitable configurations.

Details

Information & Computer Security, vol. 27 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 25 August 2021

Ana Faizi, Ali Padyab and Andreas Naess

This study aims to address the issue of practicing information security risk assessment (ISRA) on cloud solutions by studying municipalities and large organizations in Sweden.

1825

Abstract

Purpose

This study aims to address the issue of practicing information security risk assessment (ISRA) on cloud solutions by studying municipalities and large organizations in Sweden.

Design/methodology/approach

Four large organizations and five municipalities that use cloud services and conduct ISRA to adhere to their information security risk management practices were studied. Data were gathered qualitatively to answer the study’s research question: How is ISRA practiced on the cloud? The Coat Hanger model was used as a theoretical lens to study and theorize the practices.

Findings

The results showed that the organizations aimed to follow the guidelines, in the form of frameworks or their own experience, to conduct ISRA; furthermore, the frameworks were altered to fit the organizations’ needs. The results further indicated that one of the main concerns with the cloud ISRA was the absence of a culture that integrates risk management. Finally, the findings also stressed the importance of a good understanding and a well-written legal contract between the cloud providers and the organizations using the cloud services.

Originality/value

As opposed to the previous research, which was more inclined to try out and evaluate various cloud ISRA, the study provides insights into the practice of cloud ISRA experienced by the organizations. This study represents the first attempt to investigate cloud ISRA that organizations practice in managing their information security.

Details

Information & Computer Security, vol. 30 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 12 April 2022

Dijana Peras and Renata Mekovec

The purpose of this paper is to improve the understanding of cloud service users’ privacy concerns, which are anticipated to considerably hinder cloud service market growth. The…

1491

Abstract

Purpose

The purpose of this paper is to improve the understanding of cloud service users’ privacy concerns, which are anticipated to considerably hinder cloud service market growth. The researchers have explored privacy concerns from dimensions that were identified as relevant in the cloud context.

Design/methodology/approach

Content analysis was used to identify privacy problems that were most often raised in previous cloud research. Multidimensional developmental theory (MDT) was used to build a conceptual model of cloud privacy concerns. Literature review was made to identify the privacy-related constructs used to measure privacy concerns in previous cloud research.

Findings

The paper provides systematization of recent cloud privacy research, proposal of a conceptual model of cloud privacy concerns, identification of measuring instruments that were used to measure privacy concerns in previous cloud research and identification of categories of problems that need to be addressed in future cloud research.

Originality/value

This paper has identified the categories of privacy problems and dimensions that have not yet been measured in the cloud context, to the best of the authors’ knowledge. Their simultaneous examination could clarify the effects of different dimensions on the privacy concerns of cloud users. The conceptual model of cloud privacy concerns will allow cloud service providers to focus on key cloud problems affecting users’ privacy concerns and use the most appropriate privacy protection communication and preservation approaches.

Details

Information & Computer Security, vol. 30 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 14 February 2023

Lemma Lessa and Daniel Gebrehawariat

This study is aimed at assessing the information security management practice with a focus on banking card security in selected financial institutions in Ethiopia, using an…

1150

Abstract

Purpose

This study is aimed at assessing the information security management practice with a focus on banking card security in selected financial institutions in Ethiopia, using an international information security standard as a benchmark. It is to identify the gaps and recommend best security practices to help financial institutions meet the required security compliance.

Design/methodology/approach

Two financial sectors were purposively selected. A total of twenty-five respondents (IT executives and IT staff) were included in the study. Quantitative data was collected using the PCI-DSS (Payment Card Industry Data Security Standard) security standard questionnaire. In addition, observation and document analysis were made.

Findings

The result shows that most of the essential security management activities in the financial sectors do not comply with the international security standard. Similarly, the level of most of the indispensable security requirements that should be in place is found to be below the acceptable level. The study also revealed major security factors that prohibit the financial sectors from PCI-DSS security standard compliance.

Originality/value

This study assessed the information security management practice with a focus on banking card security and tried to figure out the limitations of security practices of the organizations surveyed based on the standard adopted. The topic has not been well explored especially in the Ethiopia context. Hence, the result can positively influence security policies, particularly in the banking sector.

Details

International Journal of Industrial Engineering and Operations Management, vol. 5 no. 2
Type: Research Article
ISSN: 2690-6090

Keywords

Open Access
Article
Publication date: 28 June 2023

Vladimirs Reiskarts and Konstantins Savenkovs

This study aims to explore the need for highly technological complexes for control and monitoring, as well as, new concepts and methodologies for maritime resource exploration and…

Abstract

Purpose

This study aims to explore the need for highly technological complexes for control and monitoring, as well as, new concepts and methodologies for maritime resource exploration and exploitation, which are in great demand nowadays.

Design/methodology/approach

This paper provides an analysis of demand, means of creation and development of the methodology and infrastructure for global monitoring, pollution control and supervision of smart systems for activities in exploration, future resource exploitation in deep-water and coastal areas based on Smarthub architecture, Unmanned Aircraft System (UAS), Continuous Acquisition and Life-Cycle Support (CALS) and Blockchain technologies.

Findings

Observational, experimental, simulation, derivational, hybrid descriptive and analytical models, as well as, surrogate models were created, analyzed and implemented for assigned tasks realization. Concept of distributed system for marine environmental monitoring, control and supervising as pilot technology in the context of Technology Readiness Levels (TRL) 3–5 was designed and evaluated.

Originality/value

The activities described in this article should be realized in the design and development of a complex, reliable, robust and sustainable monitoring and inspection system for the control and evaluation of the impact and risk assessment of the exploration and future exploitation of maritime resources.

Details

Marine Economics and Management, vol. 6 no. 1
Type: Research Article
ISSN: 2516-158X

Keywords

Open Access
Article
Publication date: 24 May 2021

Dhruman Gohil and Shivangi Viral Thakker

Blockchain technology was developed to synchronize the data and transactions over the supply chain network and connected nodes. This paper aims to show how blockchain technology…

10037

Abstract

Purpose

Blockchain technology was developed to synchronize the data and transactions over the supply chain network and connected nodes. This paper aims to show how blockchain technology can enhance flexibility and agility in supply chain operations. The integration of blockchain and other recently developed technology can help deal with supply chain uncertainties and other challenges being faced by the industry.

Design/methodology/approach

Through an extensive literature review of existing research papers and conversation with supply chain managers, barriers and challenges in the supply chain were identified. Some elements were researched of blockchain technology that can be used to resolve some challenges. Blockchain technology and other technologies integration is developed for implementation in supply chain for better visibility and efficiency of supply chain.

Findings

The challenges in the supply chain are categorized, and the solution is given through the integration of blockchain and other technologies like Internet of Things and artificial intelligence. The integration shows the execution of tasks through blockchain and various technologies in supply chain.

Research limitations/implications

Blockchain in supply chain is finding its strong place in India when compared to developing nations. There is a need for technology experts, supply chain managers and consumers to understand blockchain’s importance. Challenges faced by industries to use blockchain may be analyzed further with real-life industry case studies.

Practical implications

This research helps enterprises in successful execution of smart technologies in their supply chains. This research helps enterprises in successful execution of smart technologies in their supply chains. Managers and practitioners may use the models developed in real-time implementation. The technologies are described in detail to help the practitioners select the best suitable for their organization.

Social implications

Digital supply chains are finding the way in industries due to lean and efficient nature. It is beneficial to use the smart technologies to make supply chain green and sustainable.

Originality/value

The implementation of the digital supply chain and its challenges are discussed in the research paper. This will work as a platform for research in the area of technologies for supply chain.

Details

Modern Supply Chain Research and Applications, vol. 3 no. 2
Type: Research Article
ISSN: 2631-3871

Keywords

Open Access
Article
Publication date: 1 June 2022

Cristina Rodrigues dos Santos Ramos and Maciel M. Queiroz

This paper aims to investigate the influence of trust on adopting and implementing blockchain technology in higher education institutions (HEIs) in Brazil.

1520

Abstract

Purpose

This paper aims to investigate the influence of trust on adopting and implementing blockchain technology in higher education institutions (HEIs) in Brazil.

Design/methodology/approach

This study uses an exploratory qualitative approach to understand the construct of trust in the context of the educational sector. Data were collected through semistructured questionnaires and online interviews.

Findings

The research identified that, for most potential blockchain users, trust positively influences the HEIs, because benefits such as secure data sharing and transaction transparency could optimize the daily routine and avoid fraud in academic documents, providing a cooperative and reliable working environment. In addition, the results suggest that trust is needed to overcome challenges related to issues such as costs and privacy.

Research limitations/implications

This study contributes to the advances in the emerging literature on blockchain in the educational sector as a system with the potential to generate trust, as well as the literature on the technology acceptance models.

Practical implications

For HEI managers and practitioners, this study highlights the need for a greater understanding of the influence of trust in the relationships between HEIs and other stakeholders.

Social implications

This work shows that adopting blockchain technologies would allow users to build social relationships of trust in a cooperative work environment and develop trusted behavior by sharing data securely and transparently.

Originality/value

To the best of the authors’ knowledge, this is one of the first studies on the adoption and implementation of blockchain in the education sector in Brazil.

Details

RAUSP Management Journal, vol. 57 no. 3
Type: Research Article
ISSN: 2531-0488

Keywords

Open Access
Article
Publication date: 4 September 2017

Jun Lin, Zhiqi Shen, Chunyan Miao and Siyuan Liu

With the rapid growth of the Internet of Things (IoT) market and requirement, low power wide area (LPWA) technologies have become popular. In various LPWA technologies, Narrow…

10740

Abstract

Purpose

With the rapid growth of the Internet of Things (IoT) market and requirement, low power wide area (LPWA) technologies have become popular. In various LPWA technologies, Narrow Band IoT (NB-IoT) and long range (LoRa) are two main leading competitive technologies. Compared with NB-IoT networks, which are mainly built and managed by mobile network operators, LoRa wide area networks (LoRaWAN) are mainly operated by private companies or organizations, which suggests two issues: trust of the private network operators and lack of network coverage. This study aims to propose a conceptual architecture design of a blockchain built-in solution for LoRaWAN network servers to solve these two issues for LoRaWAN IoT solution.

Design/methodology/approach

The study proposed modeling, model analysis and architecture design.

Findings

The proposed solution uses the blockchain technology to build an open, trusted, decentralized and tamper-proof system, which provides the indisputable mechanism to verify that the data of a transaction has existed at a specific time in the network.

Originality/value

To the best of our knowledge, this is the first work that integrates blockchain technology and LoRaWAN IoT technology.

Details

International Journal of Crowd Science, vol. 1 no. 3
Type: Research Article
ISSN: 2398-7294

Keywords

1 – 10 of 770