221 research outputs found

    Scalable and Socially Inspired Blockchain Architecture for the Organic Food Supply Chain

    Get PDF
    Organic food supply chains are faced with heavy pressure to increase their output to meet the global demand. This confronts various challenges including scandals, adulteration, contamination, and growing regulations. As an alternative to third-party certification, Participatory Guarantee Systems (PGS) are popular community-based quality assurance system that integrates the social verification context into the organic certification process. As PGS is a local community-driven system, it has inherent limitations in the scalability of reaching consensus as the size of participants increases. The organic food industry has the potential to grow globally therefore, an appropriate scalable consensus mechanism is needed to deal with community-level consensus as an alternative to the existing PGS system. Blockchain architecture with hybrid consensus mechanisms seems to be the potential solution to address the trust and scalability issues in the organic food supply chain. This paper proposes a socially inspired hybrid blockchain architecture for the organic food supply chain to address the scalability issues via hybridizing two consensuses’ mechanisms with the combined advantages of Proof of Authority (PoA) and Federated Byzantine Agreement (FBA). In the proposed architecture, much eminent aspect of community-level trust is integrated into the consensus process. Furthermore, this paper presents a concept-level validation as a qualitative analysis of the proposed architecture based on experts’ opinions. Concept-level validation of the proposed model acknowledged that, in the context of social verification, the credibility of the organic products would be enhanced, and hybridization of the consensuses would mitigate the scalability issues

    PENERAPAN RADIO FREQUENCY IDENTIFICATION PADA SISTEM INFORMASI PERPUSTAKAAN SEBAGAI ALAT BANTU MAHASISWA UNIVERSITAS XYZ

    Get PDF
    The library is part of the learning resources that must be possessed by every field of education including universities. Because with the existence of a library it is expected that students can more easily find information or knowledge through a library. With the development of technology makes people think to be able to work more effectively and efficiently. One of them is to simplify activities in the library into a system that can help the process of activities at the university. By utilizing Radio Frequency Identification (RFID) technology, libraries can cut time. So that it can accelerate and simplify existing activities. In this study applying a web-based information system and utilizing RFID technology as a tool to facilitate students and library officers. With this system, it is expected to be able to overcome the various needs of students to search for books and conduct loans and make it easier for officers to circulate books and make reports. From the results of the research that has been done, the writer poured the results of the research into the Application of RFID Technology Information System as Electronic Access at the Aerospace University Marshal Suryadarma Library.Keywords: RFID, Library, Information Syste

    Volume 7, 2020

    Get PDF

    Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China

    Get PDF
    This dissertation problematizes the state dossier system (SDS): the production and accumulation of personal information on citizen subjects exceeding the reasonable bounds of risk management. SDS - comprising interconnecting subsystems of records and identification - damage individual autonomy and self-determination, impacting not only human rights, but also the viability of the social system. The research, a hybrid of case-study and cross-national comparison, was guided in part by a theoretical model of four primary SDS driving forces: technology, political economy, law and public sentiment. Data sources included government documents, academic texts, investigative journalism, NGO reports and industry white papers. The primary analytical instrument was the juxtaposition of two individual cases: the U.S. and China. Research found that constraints on the extent of the U.S. SDS today may not be significantly different from China\u27s, a system undergoing significant change amidst growing public interest in privacy and anonymity. Much activity within the U.S., such as the practice of suspicious activity reporting, is taking place outside the domain of federal privacy laws, while ID systems appear to advance and expand despite clear public opposition. Momentum for increasingly comprehensive SDS appears to be growing, in part because the harms may not be immediately evident to the data subjects. The future of SDS globally will depend on an informed and active public; law and policy will need to adjust to better regulate the production and storage of personal information. To that end, the dissertation offers a general model and linguistic toolkit for the further analysis of SDS

    Protecting Privacy in Indian Schools: Regulating AI-based Technologies' Design, Development and Deployment

    Get PDF
    Education is one of the priority areas for the Indian government, where Artificial Intelligence (AI) technologies are touted to bring digital transformation. Several Indian states have also started deploying facial recognition-enabled CCTV cameras, emotion recognition technologies, fingerprint scanners, and Radio frequency identification tags in their schools to provide personalised recommendations, ensure student security, and predict the drop-out rate of students but also provide 360-degree information of a student. Further, Integrating Aadhaar (digital identity card that works on biometric data) across AI technologies and learning and management systems (LMS) renders schools a ‘panopticon’. Certain technologies or systems like Aadhaar, CCTV cameras, GPS Systems, RFID tags, and learning management systems are used primarily for continuous data collection, storage, and retention purposes. Though they cannot be termed AI technologies per se, they are fundamental for designing and developing AI systems like facial, fingerprint, and emotion recognition technologies. The large amount of student data collected speedily through the former technologies is used to create an algorithm for the latter-stated AI systems. Once algorithms are processed using machine learning (ML) techniques, they learn correlations between multiple datasets predicting each student’s identity, decisions, grades, learning growth, tendency to drop out, and other behavioural characteristics. Such autonomous and repetitive collection, processing, storage, and retention of student data without effective data protection legislation endangers student privacy. The algorithmic predictions by AI technologies are an avatar of the data fed into the system. An AI technology is as good as the person collecting the data, processing it for a relevant and valuable output, and regularly evaluating the inputs going inside an AI model. An AI model can produce inaccurate predictions if the person overlooks any relevant data. However, the state, school administrations and parents’ belief in AI technologies as a panacea to student security and educational development overlooks the context in which ‘data practices’ are conducted. A right to privacy in an AI age is inextricably connected to data practices where data gets ‘cooked’. Thus, data protection legislation operating without understanding and regulating such data practices will remain ineffective in safeguarding privacy. The thesis undergoes interdisciplinary research that enables a better understanding of the interplay of data practices of AI technologies with social practices of an Indian school, which the present Indian data protection legislation overlooks, endangering students’ privacy from designing and developing to deploying stages of an AI model. The thesis recommends the Indian legislature frame better legislation equipped for the AI/ML age and the Indian judiciary on evaluating the legality and reasonability of designing, developing, and deploying such technologies in schools

    Employee and Organization Security Value Alignment Through Value Sensitive Security Policy Design

    Get PDF
    Every member of the organization must be involved in proactively and consistently preventing data loss. Implementing a culture of security has proven to be a reliable method of enfranchising employees to embrace security behavior. However, it takes more than education and awareness of policies and directives to effect a culture of security. Research into organizational culture has shown that programs to promote organizational culture - and thus security behavior - are most successful when the organization\u27s values are congruent with employee values. What has not been clear is how to integrate the security values of the organization and its employees in a manner that promotes security culture. This study extended current research related to values and security culture by applying Value Sensitive Design (VSD) methodology to the design of an end user security policy. Through VSD, employee and organizational security values were defined and integrated into the policy. In so doing, the study introduced the concept of value sensitive security policy (VSP) and identified a method for using VSPs to promote a culture of security. At a time when corporate values are playing such a public role in defining the organization, improving security by increasing employee-organization value congruence is both appealing and practical

    Organizational-economic mechanism of management innovative development of economic entities: collective monograph

    Get PDF
    The authors of the book have come to the conclusion that it is necessary to effectively use modern approaches the management of innovative development the economic entities in order to increase the efficiency of activity, to ensure competitiveness, to intensify innovation activity. Basic research focuses on assessing the innovation processes, the fourth generation of new industrial revolution, diagnosis of sources of innovation financing, assessment of social innovations. The research results have been implemented in the different models of development innovation management, renewable energy, introduction of start-up projects and lifelong learning. The results of the study can be used in decision-making at the level the economic entities in different areas of activity and organizational-legal forms of ownership, ministries and departments that promote of development the economic entities on an innovative basis. The results can also be used by students and young scientists in modern concepts and mechanisms for management of innovative development the economic entities in the context of efficient use the resource potential and improvement of innovation policy

    The commission on sustainable development (CSD) national report 2009

    Get PDF
    노트 : 18th-19th Session of The Commission on Sustainable Development (CSD

    Social informatics

    Get PDF
    5th International Conference, SocInfo 2013, Kyoto, Japan, November 25-27, 2013, Proceedings</p
    • …
    corecore