Search results

1 – 5 of 5
Open Access
Article
Publication date: 18 April 2023

Patience Mpofu, Solomon Hopewell Kembo, Marlvern Chimbwanda, Saulo Jacques, Nevil Chitiyo and Kudakwashe Zvarevashe

In response to food supply constraints resulting from coronavirus disease 2019 (COVID-19) restrictions, in the year 2020, the project developed automated household Aquaponics…

Abstract

Purpose

In response to food supply constraints resulting from coronavirus disease 2019 (COVID-19) restrictions, in the year 2020, the project developed automated household Aquaponics units to guarantee food self-sufficiency. However, the automated aquaponics solution did not fully comply with data privacy and portability best practices to protect the data of household owners. The purpose of this study is to develop a data privacy and portability layer on top of the previously developed automated Aquaponics units.

Design/methodology/approach

Design Science Research (DSR) is the research method implemented in this study.

Findings

General Data Protection and Privacy Regulations (GDPR)-inspired principles empowering data subjects including data minimisation, purpose limitation, storage limitation as well as integrity and confidentiality can be implemented in a federated learning (FL) architecture using Pinecone Matrix home servers and edge devices.

Research limitations/implications

The literature reviewed for this study demonstrates that the GDPR right to data portability can have a positive impact on data protection by giving individuals more control over their own data. This is achieved by allowing data subjects to obtain their personal information from a data controller in a format that makes it simple to reuse it in another context and to transmit this information freely to any other data controller of their choice. Data portability is not strictly governed or enforced by data protection laws in the developing world, such as Zimbabwe's Data Protection Act of 2021.

Practical implications

Privacy requirements can be implemented in end-point technology such as smartphones, microcontrollers and single board computer clusters enabling data subjects to be incentivised whilst unlocking the value of their own data in the process fostering competition among data controllers and processors.

Originality/value

The use of end-to-end encryption with Matrix Pinecone on edge endpoints and fog servers, as well as the practical implementation of data portability, are currently not adequately covered in the literature. The study acts as a springboard for a future conversation on the topic.

Details

International Journal of Industrial Engineering and Operations Management, vol. 5 no. 2
Type: Research Article
ISSN: 2690-6090

Keywords

Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

6323

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Book part
Publication date: 16 August 2023

Meropi Tzanetakis and Nigel South

This chapter explores the disruptive potential of the Internet to transform illicit drug markets while also challenging stereotypical depictions and superficial understandings of…

Abstract

This chapter explores the disruptive potential of the Internet to transform illicit drug markets while also challenging stereotypical depictions and superficial understandings of supply and demand. It argues that the digital transformation of illicit drug markets combines, on one hand, a reconfiguration of the scope and impact of how sellers, buyers, and other actors interact within and upon digitally mediated retail drug markets and, on the other hand, continuing trends in the embeddedness of market structures in cultural, economic, political, and legal realms. We develop conceptual ideas for studying the architecture of digital drug markets by drawing on interdisciplinary approaches to digitalisation, markets, and drugs. To understand the functioning of online drug markets, we first need to understand digitalisation. Thus, we draw on scholarship on the digital transformation of society and, second, put forward an understanding of markets that considers how personal relations and social structures enhance and restrict market exchange. Thus, we draw on economic sociology. Third, we build on and extend social science research on illicit drug markets which points out that drug markets exhibit significant variations over time and across jurisdictions. The introduction aims to provide a research agenda that can help us to explore ongoing digital transformations of illicit drug markets. It expands and deepens scholarship on the technological, structural, economic, and cultural factors underlying the resilience and growth of digital drug markets. It also goes beyond a concern with just one type of digital drug market into wider forms of digital environments.

Details

Digital Transformations of Illicit Drug Markets: Reconfiguration and Continuity
Type: Book
ISBN: 978-1-80043-866-8

Keywords

Open Access
Article
Publication date: 14 February 2023

Friso van Dijk, Joost Gadellaa, Chaïm van Toledo, Marco Spruit, Sjaak Brinkkemper and Matthieu Brinkhuis

This paper aims that privacy research is divided in distinct communities and rarely considered as a singular field, harming its disciplinary identity. The authors collected…

Abstract

Purpose

This paper aims that privacy research is divided in distinct communities and rarely considered as a singular field, harming its disciplinary identity. The authors collected 119.810 publications and over 3 million references to perform a bibliometric domain analysis as a quantitative approach to uncover the structures within the privacy research field.

Design/methodology/approach

The bibliometric domain analysis consists of a combined directed network and topic model of published privacy research. The network contains 83,159 publications and 462,633 internal references. A Latent Dirichlet allocation (LDA) topic model from the same dataset offers an additional lens on structure by classifying each publication on 36 topics with the network data. The combined outcomes of these methods are used to investigate the structural position and topical make-up of the privacy research communities.

Findings

The authors identified the research communities as well as categorised their structural positioning. Four communities form the core of privacy research: individual privacy and law, cloud computing, location data and privacy-preserving data publishing. The latter is a macro-community of data mining, anonymity metrics and differential privacy. Surrounding the core are applied communities. Further removed are communities with little influence, most notably the medical communities that make up 14.4% of the network. The topic model shows system design as a potentially latent community. Noteworthy is the absence of a centralised body of knowledge on organisational privacy management.

Originality/value

This is the first in-depth, quantitative mapping study of all privacy research.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 25 March 2024

Shivangi Viral Thakker, Santosh B. Rane and Vaibhav S. Narwane

Digital supply chains require nascent technologies like blockchain and Internet of Things (IoT). There is a need to develop a roadmap for the implementation of these technologies…

Abstract

Purpose

Digital supply chains require nascent technologies like blockchain and Internet of Things (IoT). There is a need to develop a roadmap for the implementation of these technologies, as they require a huge amount of resources and infrastructure. The purpose of this paper is to analyze the challenges of implementing blockchain-IoT integrated architecture in the green supply chain and develop strategies for the same.

Design/methodology/approach

After a thorough literature survey of Scopus-indexed journals and books, 37 barriers were identified, which were then brought down to 15 barriers after confirming with industry and academic experts using the Delphi method. Using the total interpretive structural modeling (TISM) method and cross-impact matrix multiplication applied to classification (MICMAC) analysis, the barriers were modeled, and finally, strategies were formulated using a concept map to handle the barriers in the blockchain-IoT integrated architecture for a green supply chain.

Findings

This paper presents the research on barriers that can be considered for incorporating blockchain and IoT in the green supply chain. It was found from the TISM model that environmental concerns are Level-1 barriers and need to be addressed by developing appropriate technology and allocating funds for the same. An integrated ecosystem with blockchain and IoT is developed.

Research limitations/implications

The focus of this study was on the challenges of blockchain and IoT; hence, it is required to extend the research and find challenges for different industries and also analyze the criteria using other multi-criteria decision-making (MCDM) methods. Further research is required for the integration of blockchain-IoT with supply chain functions.

Practical implications

The transformation of a traditional supply chain into a green supply chain is possible with the integration of technologies. This research work and the strategies developed are useful to managers and practitioners working on technology implementation. Planning resources and addressing key barriers is possible with the concept maps and architecture developed.

Social implications

Green supply chain management (SCM) is gaining importance in industry as well as the academic sector due to government Policies and norms worldwide for reducing emissions and encouraging environment-friendly production systems. Incorporating blockchain and IoT in a green supply chain will further digitize and increase transparency in supply chains.

Originality/value

We have done a categorization of all barriers based on the expert survey by academicians and industry experts from industries in India. The concept map helps in identifying possible solutions for the challenges and initiatives to be taken for the smooth integration of technologies in the green supply chain.

Details

Modern Supply Chain Research and Applications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2631-3871

Keywords

Access

Only Open Access

Year

Last 12 months (5)

Content type

1 – 5 of 5