3 research outputs found

    Renewable Energy Approach with Indonesian Regulation Guide Uses Blockchain-BIM to Green Cost Performance

    Get PDF
    Climate change is a threat and crisis that hit the world today; one of them is causing drought, rising sea levels, melting polar ice, and heat waves; therefore, the target towards Net Zero Emission (NZE) in 2060 must be an obligation in all countries. Green Building (GB) is a building that meets Building Technical Standards, and has demonstrated demonstrable success in conserving resources such as water, energy, and other resources. The application of GB principles following the function and classification in every stage of their implementation is expected to reduce greenhouse gas emissions. This research aims to analyze the cost of improvement work based on GB assessment in applying the Technical Guidelines from Minister of Public Works and Public Housing (PUPR) No. 1 of 2022, which is the latest regulation in Indonesia. The blockchain-BIM method and the implementation of the GB component will be analyzed using Structural Equation Modeling-Partial Least Squares (SEM-PLS) to find the most influential factors. The results of this study show that by applying Blockchain-BIM to overcome the cost constraints, it is proven to be able to increase the cost performance of GB in modern shopping center buildings by 3–3.8% in the Basic rating, while for other ratings, it is 0.5–2.1% higher, where the selection of a renewable energy model is very influential. Doi: 10.28991/CEJ-2023-09-10-09 Full Text: PD

    A two-fold Perspective on Enterprise Security in the Digital Twin Context

    Get PDF
    Digital twins represent and can manage an enterprise asset virtually along its lifecycle. The vital technologies the twin relies upon (e.g., Internet of Things) have only recently matured. Since then, literature has taken up on digital twins. The digital twin therefore constitutes a very young concept, where security is currently neglected. This dissertation aims at closing this research gap, and further contributes to the body of knowledge concerning digital twin security. To study digital twin security, a two-fold approach is necessary. On the one hand, digital twins are at risk for being attacked (security for digital twins). However, on the other hand, they can also be leveraged to gain novel security opportunities (digital twins for security). This dissertation lays the general foundations of the digital twin concept in enterprises and studies these two security perspectives hereinafter. It shows that the digital twin’s security can be fostered utilizing the blockchain technology. Furthermore, it proposes digital twins to be of use in corporate security: It is shown that digital twins can collaborate with traditional security tools like Security Information and Event Management (SIEM) systems and organizational structures like the Security Operations Center (SOC). In this regard, the use of digital twins is further proven to be beneficial for digital forensics as well as Cyber Threat Intelligence (CTI)

    Secure Information Sharing with Distributed Ledgers

    Get PDF
    In 2009, blockchain technology was first introduced as the supporting database technology for digital currencies. Since then, more advanced derivations of the technology have been developed under the broader term Distributed Ledgers, with improved scalability and support for general-purpose application logic. As a distributed database, they are able to support interorganizational information sharing while assuring desirable information security attributes like non-repudiation, auditability and transparency. Based on these characteristics, researchers and practitioners alike have begun to identify a plethora of disruptive use cases for Distributed Ledgers in existing application domains. While these use cases are promising significant efficiency improvements and cost reductions, practical adoption has been slow in the past years. This dissertation focuses on improving three aspects contributing to slow adoption. First, it attempts to identify application areas and substantiated use cases where Distributed Ledgers can considerably advance the security of information sharing. Second, it considers the security aspects of the technology itself, identifying threats to practical applications and detection approaches for these threats. And third, it investigates success factors for successful interorganizational collaborations using Distributed Ledgers
    corecore